gtcicourse 221

364
Course 221 Introduction to Wireless Data for 3G Technology Gordon Technical Consultants, Inc. www.gtcpro.com

Upload: micolcalzada

Post on 12-Sep-2014

81 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: GTCICourse 221

Course 221 Introduction to Wireless Data for 3G Technology

Gordon Technical Consultants, Inc.

www.gtcpro.com

Page 2: GTCICourse 221

Your Complete Training Source

Visit us at www.gtcpro.com

Page 3: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1

Course 221Introduction to Wireless Data for 3G Technology

Page 4: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2

Course Objectives

! Examine Current Wireless Networks! Examine TCP/IP and Data Fundamentals! Examine Wireless Intelligent Networks! Examine 2G Wireless Networks and Services! Examine Wireless Applications and Enablers ! Examine 2.5G Wireless Networks and Services! Examine 3G Wireless Networks and Services

Page 5: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3

Table of Contents

Current Wireless Networks 1-1

TCP/IP and Data Fundamentals 2-1

Wireless Intelligent Networks 3-1

2G Wireless Networks and Services 4-1

Wireless Applications and Enablers 5-1

2.5G Wireless Networks and Services 6-1

3G Wireless Networks and Services 7-1

Appendix A - Acronyms A-1

Appendix B - Standardization B-1

Page 6: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-1

Current Wireless NetworksLesson 1

Page 7: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-2

Objectives

! Examine the Radio Frequency Spectrum! Define the Different Wireless Technologies! Define the Different Technology Access Methods! Examine the Evolution of US Operators! Examine Different Issues in Today’s Networks ! Examine Current Wireless Technology Growth

Page 8: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-3

Wireless Network Evolution Roadmap

data multi-media early adopters mass market

regional global

1G 2G

2G 2G+

2G+ 3G

3G 3G+3G+ 4G

Business Technical

voice voice mass early adopters market

national regionalno data low rate

CS data

analog digital

low rate medium rate CS data packet data

(CS/TDM IP CN ++packet) CN ATM RANmono mode multi-modeterminal terminal

standard open IP service services platform

IP-CN all-IP

new air interfacenew air

interface

new air interfacenew air

interface

new air interfacenew air

interface

carrierbusiness

end customer &content providerbusiness

OFDM/CDMA ad-hocMobile IP network?

cost reductionnew services

Throughout this course, we will look at how wireless networks are going to evolve towards their third generation and beyond. As a final thought provoker, it might be worth considering what happens after that. The fourth generation wireless network.

By the time third generation is widely deployed, newer and cheaper services will be available. The core network has evolved to an all-IP packet network. So what could happen after that. We introduce the concept of an ad-hoc or self-organizing network.

This is a dynamic network that changes with the users around it. A network created as quickly as it is dissolved. And one that does not require the user to know anything about the equipment. Only the services matter.

Page 9: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-4

2000 Telecommunication Facts

USA NorthAmerica

World

Wired Lines (M) 211 230 997

Penetration (%) 75.2% 72.8% 16.4%

Wireless Subscribers (M) 108 114 474.8

Penetration (%) 38.4% 36.4% 7.9%

Internet Users (M) 153.8 169.1 407.1

Penetration (%) 56% 43% 3.7%

Source: Media Metrix

Some more interesting facts show how the US compares to the rest of North America (Canada) and to the rest of the world as a whole.

The US represents nearly one fifth of the total world wired line installations with nearly three quarters of the population having at least one wired phone line (since there are approximately 103 million households, many of them have multiple lines).

Nearly one third of the population have a wireless phone compared to less than 10% for the total world.

More than one third of the population have subscriptions to the Internet.

Page 10: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-5

The 800 MHz Cellular Spectrum

A - Non Wireline CarriersB - Wireline Carriers

A - Non Wireline CarriersB - Wireline Carriers

Paired Bands45 MHz Duplex Spacing

otherusesA” A”A B A’ B’

Forward link(cell site transmits)

Reverse link(mobile transmits)

824MHz

849MHz

1 10 10 1.5 2.5

A B A’ B’

1 10 10 1.5 2.5869MHz

Channel Numbers

9911023

1 333334

666667

716717

799

9911023

1 333334

666667

716717

799Channel Numbers

894MHz

Downlink / Forward / Cell-to-User

Uplink / Reverse / User-to-Cell

United States cellular and PCS frequencies lie in the UHF (Ultra High Frequency band). That band runs between 300 MHz and 3000 MHz (3GHz). The cellular frequencies start at 824 MHz and end at 894 MHz, a total of 69.66 megahertz.

In AMPS, IS-54B, IS-136, and PCS 1900, 45 MHz separates transmit and receive frequencies. That keeps them from interfering with each other and allows simultaneous talking.

North American cellular development got going in earnest after the Bell System breakup in 1984. To foster competition in a limited radio spectrum, the United States licensed two carriers in every large metropolitan area. One license went automatically to the local telephone company, the local exchange carriers or LECs (the wireline carriers). The other went to an individual, a company or a group of investors who met a long list of requirements and who properly petitioned the FCC (the non-wireline carriers).

Each company in each area took half the spectrum available. What's called the "A Band" and the "B Band." The non-wireline carriers usually got the A Band and the wireline carriers got the B band.

For this spectrum, the FCC granted the licenses.

Page 11: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-6

The 1900 MHz PCS Spectrum

Paired Bands80 MHz Duplex Spacing

Forward link(cell site transmits)

Reverse link(mobile transmits)Channel

NumbersChannel Numbers

1850MHz

MTA BTAMTABTA MTAMTA

A F CBC AB E FD D E

1910MHz

1930MHz

1990MHz

Data Voice

15 51010 1515151515 555 55

Licensed

Unlicensed

0

299

300

400

699

700

800

900

1199 0

299300

400

699

700

800

900

1199

Licensed

BTA

BTA

BTA

BTA

BTA

BTA

MTA - Major Trading AreasBTA - Basic Trading Areas

PCS broadband frequencies go from1850 MHz to1990 MHz (a total of 140 MHz).

From 1995 to 1997 the FCC licensed the so called PCS spectrum, the area around 1900 MHz and some additional radio space around 900 MHZ. What they call the PCS broadband and narrowband frequencies. PCS licenses differ in bandwidth size from cellular licenses. PCS operators can have two different sized licenses: 30 MHz and 10 MHz, of which they are allowed to put together. Six PCS licenses exist for each market. These licenses were auctioned by the FCC.

Narrowband PCS uses narrower frequency blocks. Less room means N-PCS is better suited for advanced paging services. 50 kHz wide paired and unpaired channels make up narrowband's frequency ranges. Besides paging services, something this spectrum isn't limited to by regulation, N-PCS can be used for telemetry, such as remotely monitoring gas and electric meters. Even keeping track of copier usage or vending machines.

Broadband PCS belongs in the microwave band near 2GHz., utilizing 30 MHz wide frequency blocks. This room allows voice, data, and video. Of the 140 MHz allotted, 20MHz is reserved for "unlicensed applications that could include both data and voice services." Within each range are scattered frequency blocks. The A, B, and C blocks are 30 MHz wide while the D, E, and F blocks are 10 MHz wide.

Page 12: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-7

TechnologyTechnology

AMPSAdvanced

Mobile Phone Service

AMPSAdvanced

Mobile Phone ServiceNAMPS

Narrowband AMPS

NAMPSNarrowband

AMPS

D-AMPSDigital AMPS

North American TDMA

D-AMPSDigital AMPS

North American TDMA

GSMEuropean

2nd-Generation TDMA

GSMEuropean

2nd-Generation TDMA

CDMACode Division

Multiple Access

CDMACode Division

Multiple Access

StandardsDocumentsStandards

Documents

EIA/TIA 553IS-19 mobileIS-20 BTS

EIA/TIA 553IS-19 mobileIS-20 BTS

IS-88IS-88

IS-54BIS-54B

IS-136IS-136

FirstUsedFirstUsed

19831983

19901990

19931993

19951995

ETSI/TIA/ITUmultiple

documents

ETSI/TIA/ITUmultiple

documents

IS-95AJ-STD-008,

+features stds

IS-95AJ-STD-008,

+features stds

19921992

19951995

Modula-tion

Modula-tion

AnalogFM

AnalogFM

AnalogFM

AnalogFM

DigitalDQPSKDigital

DQPSK

ServiceTypes

ServiceTypes

VoiceVoice

VoiceSMS

VoiceSMS

VoiceData

VoiceData

+CAVE+DCCH+SMS

+CAVE+DCCH+SMS

DigitalGMSK

DigitalGMSK

DigitalOQPSKSpread

Spectrum

DigitalOQPSKSpread

Spectrum

VoiceSMS

Cell Bcstfrq hop’g

VoiceSMS

Cell Bcstfrq hop’g

VoiceSMSData

+more

VoiceSMSData

+more

Band-width

Band-width

30 kHz30

kHz

10 kHz10

kHz

30 kHz30

kHz

200 kHz

200 kHz

1250 kHz

1250 kHz

Wireless Technology Comparison

Users/CarrierUsers/Carrier

11

11

3 (6 with half-rate)

3 (6 with half-rate)

8 (16 with half-rate)

8 (16 with half-rate)

22 8kb17 13kb22 8kb17 13kb

The AMPS family of wireless standards were intended to be just another analog radio-telephone standard. However, due to the high capacity allowed by the cellular concept, the lower power-enabling portable operation and the robust design of AMPS, it has been a stunning success. Today, more than half the cellular phones in the world operate according to AMPS standards.

TDMA digital systems get their name by dividing a single channel into a number of timeslots, with each user getting one out of every few slots. The first implementation of AMPS digital cellular used TDMA, in the IS-54 standard. This requires digitizing voice, compressing it and transmitting it in regular bursts. Following IS-54, which provided a TDMA voice channel, IS-136, the next generation, uses TDMA on the control channel. TDMA triples the capacity of cellular frequencies by dividing a 30 kHz cellular channel into 3 timeslots, which supports 3 users in strict alternation. Future systems may also utilize half-rate voice coders, which will allow 6 users in one 30 kHz channel.

CDMA is a "spread spectrum" technology, which means that it spreads the information contained in a particular signal of interest over a much greater bandwidth than the original signal. A CDMA call starts with a standard rate of 9.6 kilobits per second. This is then spread to a transmitted rate of about 1.23 Mbps. Spreading means that digital codes are applied to the data bits associated with users in a cell. These data bits are transmitted along with the signals of all the other users in that cell. When the signal is received, the codes are removed from the desired signal, separating the users and returning the call to a rate of 9600 bps.

Page 13: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-8

US Telephone Family Tree – August 2000

AmeritechAmeritech

Southwestern BellSouthwestern Bell

Pacific TelesisPacific Telesis

NynexNynex

Bell AtlanticBell Atlantic

Bell SouthBell South

US WestUS West

AT&TAT&T

American

Telephone &

Telegraph

American

Telephone &

Telegraph

AT&TAT&T

NCRNCR LucentLucent

SBCSBC

Acquired 1997

Bell AtlanticBell Atlantic GTEGTE

SNETSNET

Acquired 1997

Bell SouthBell South

US WestUS West

Split up in 1984

Three-waysplit 1997

Acquisition pending

New Mega Carriers

QwestQwest

Merger Pending

TCITCI

TeleportTeleport

MediaOneMediaOne

Merger Pending

AT&TAT&T

SBCSBC

Bell SouthBell South

QwestQwest

VerizonVerizon

MCIMCI

WorldComWorldCom

SprintSprint

MCI WorldComMCI WorldCom WorldComWorldCom

SprintSprint

On January 1, 1984, in the midst of cellular's arrival in the marketplace, the Bell System broke itself up to settle an antitrust suit between AT&T and the Department of Justice. The breakup divided the system roughly into a local part and an 'all other' part that included long distance. The local part, which consisted of all the Bell telephone companies, was further broken up into seven regional pieces (RBOCs), which were barred from the long distance business. Cellular service fell on the 'local' side of the breakup and Bell's interests in it were accordingly split into seven regional cellular service companies.

From that point on, mergers and acquisitions have been occurring in both the local and long distance side.

Page 14: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-9

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-9

US Cellular Family Tree - August 2000

Ameritech MobileAmeritech Mobile

Southwestern Bell Mobile

Southwestern Bell Mobile

AT&TAT&TAT&T WirelessAT&T Wireless

SBC CellularSBC CellularSNETSNET

New Mega CarriersVanguardVanguard

Comcast Cell.Comcast Cell.

McCaw CellularMcCaw Cellular

AT&T WirelessAT&T Wireless TDMA

Bell South MobilityBell South Mobility Bell South MobilityBell South Mobility

Pacific Telesis -AirTouch

Pacific Telesis -AirTouch

Nynex MobileNynex Mobile

Bell Atlantic - BAMBell Atlantic - BAM

US West - New VectorUS West - New Vector

BAMBAMGTE WirelessGTE Wireless

AirTouchAirTouch

CommNetCommNet

PrimeCoPrimeCo

Frontier CellFrontier Cell

Vodafone AirTouchVodafone AirTouch

50%

50%

Verizon

Wireless

Verizon

Wireless

45%

55%

CDMA

Alltel CellularAlltel Cellular Alltel CellularAlltel Cellular CDMA

CingularCingular

60%

40%

TDMA/GSM

Just as with the wireline side of the house, the wireless operators (both the traditional telcos as well as the non-traditional players such as McCaw Cellular) have been undergoing dramatic change. Mergers and acquisitions have been happening at a frantic pace.

For cellular operators (the 800 MHz folks), the landscape has pared itself down to four major carriers across the country. There are, of course, hundreds of other small (regional to local) carriers as well as affiliates, resellers, etc. but AT&T, Verizon, Alltel and SBC/BellSouth make up the vast majority.

Digital cellular operators have had an additional burden in that they have an obligation to support legacy AMPS subscribers which causes undue capacity problems.

Page 15: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-10

US PCS Family Tree - August 2000

AT&T WirelessAT&T Wireless

VoiceStreamVoiceStream

OmnipointOmnipoint

AerialAerial

PowertelPowertel

PrimeCoPrimeCo

US West PCSUS West PCS

Sprint PCSSprint PCS

VoiceStreamVoiceStream

BellSouth Mobility DCSBellSouth Mobility DCS

SBC/PBMSSBC/PBMS

PowertelPowertel

BellSouth Mobility DCSBellSouth Mobility DCS

SBC/PBMSSBC/PBMS

BAM/GTE/AirTouch/PrimeCoBAM/GTE/AirTouch/PrimeCo

Qwest/US West PCSQwest/US West PCS

Sprint PCSSprint PCS

AT&T WirelessAT&T WirelessTDMA

CDMA

CDMA

CDMA

GSM

GSMTDMA

GSM

GSM

GSM

GSM

Sprint PCSSprint PCS

Verizon WirelessVerizon Wireless

CingularCingular

60%

40%

VoiceStreamVoiceStream

AT&T WirelessAT&T Wireless

Qwest/US West PCSQwest/US West PCS

Deutsche TelekomDeutsche Telekom

DigiPHDigiPHGSM

Merger Pending

NTT DoCoMoNTT DoCoMo Investment Pending

The PCS players (1900 MHZ operators) have undergone nothing lessdramatic than the cellular carriers in terms of transformations through mergers and acquisitions.

Just five short years ago, there were more than 15 well known and recognized names in the PCS end of the industry. Thanks to the FCC’s somewhat unusual splitting of the 1900 MHz frequency into 6 bands in every region, carriers have been popping up all over the place. Each technology had at least 2 operator choices in virtually every region. A number of them have since gone bankrupt and those that have remained have been combining at an unprecedented rate.

We have whittled it down to 5 major nationwide operators and now they are beginning to attract attention from outside the US (witness Duetsche Telekom’s pending acquisition of VoiceStream or NTT DoCoMo’s investment in AT&T Wireless).

In contrast to 800 MHz cellular, there is no analog support required for 1900 MHz operators.

Page 16: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-11

Wireless Growing Pains

Push factors which drive the wireless industry

Push factors which drive the wireless industry

FeaturesData Services

“Future-Proofing”

Capacity LimitsQualitySecurity

Pull factors which lead the wireless industry

Pull factors which lead the wireless industry

The wireless industry has been experiencing tremendous growing pains as it tries to keep up with demand. A number of forces are exerting their influence and all of them are helping to shape the networks of the future.

On the one hand, there are the factors that are pushing the industry. These are the forces that are driving operators to evolve their networks. Factors such as ever increasing needs for higher capacity, better quality of service and tighter security.

On the other hand, there are the forces pulling the networks towards the needs of their subscribers. Better and more advanced features and services, new high speed data services and the unattainable “future-proofed” technology are just a few of the many requirements that subscribers are placing on the operators.

Additional factors at play that are affecting the direction and growth of the networks are the drastic reduction in the costs of the phones, the availability of multi-band, multi-mode phones and the ever popular ‘bucket-o-minute’ plans.

Page 17: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-12

Current US Wireless Issues

No specific spectrum has been allocated for 3G services in the USSpectrum Availability

Operators have a 45 MHz limit in the current 800/1900 frequency range. This may not be enough to overlay wideband 3G networks

FCC plans to auction (eventually) additional spectrum (in 20 MHzand 10 MHz blocks) in the 700Mhz range not subject to the 45MHz limit. Many issues surround the current occupancy of this frequency by TV broadcast stations (UHF channels 60 to 69)

Auction currently ongoing of 1900 MHz spectrum from bankrupt C-block license winners like NextWave

Additional spectrum may be freed up in the future by the FCC in either the 1.7 GHz or 2.6 GHz band

The radio frequency spectrum is the single most important asset that the wireless operator’s own. It is also the source of a lot of problems. The US, unlike the rest of the world, has not set aside specific spectrum for third generation networks. For members of the ITU, the 3G spectrum is in the same frequency range as that of the current US PCS operators (1900 MHz).

By law, a US wireless operator can not own more than 45 MHz of spectrum (most have much less than that). This is not adequate for deploying a wideband 3G overlay network, given the current spectrum usage vs. the requirements for 3G.

The FCC plans to auction spectrum in the 700 MHz range that is not subject to any limitations. The problem is that currently, this spectrum is occupied by TV broadcast stations and they do not have to vacate it until 2006. The auctions keep getting delayed and many wireless operators are hesitant to invest in this asset that has numerous risks.

As of this writing, the FCC is currently auctioning spectrum in the 1900 MHz range for C-block licenses that were owned by now bankrupt companies such as NextWave Telecom.

There is the possibility of future spectrum to be auctioned but it is probably a year or two away.

Page 18: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-13

Current US Wireless Issues

Of the 2.5G technologies, CDMA 1xRTT offers additional voice capacity, while GPRS is for packet data services only

Voice Capacity vs. Data ServicesMost operators, regardless of technology are experiencing capacity issues. Given the fact that the current wireless subscriber penetration of 30% is expected to double by 2005, the capacity issues will only get worse

No solid projections for 3G data services. The initial drive to deploy 3G technology will be based on the need for high speed data services as well as additional voice capacity

The GSM and TDMA communities come together with GPRS/EDGE. This creates opportunities covering more than 80% of wireless subs

With wireless subscriber growth booming, most operators have capacity issues in their networks. But the capacity constraints are not in the backbone or core network, they are in the “last mile”. The radio spectrum they own to reach their subscribers.

The promise of the great demand for wireless data has been hyped for many years. Numerous forecasts paint a bright picture for this in the future. But most remain skeptical. Their real motivation for deploying 3G technology is not for the high speed wireless data but for additional voice capacity the new technologies will bring.

Currently, 1xRTT technology provides an increase in voice capacity. The other high speed data services are for data only and will not support voice (initially).

But the convergence of GSM and TDMA via the GPRS/EDGE introduction will lead to global economies of scale covering more than 80% of the global wireless subscriber base.

Page 19: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-14

Current US Wireless Issues

The OHG (Operator’s Harmonization Group) is a 3GPP2 standards group working to define how to connect CDMA base stations to a UMTS core network and vice-versa

Standards IssuesCDMA operators will follow an upgrade path from 2G to 2.5G/3G using 1xRTT and then to cdma2000 3xRTT or alternatives

The GSM and TDMA communities have united their evolution paths through GPRS/EDGE. UWC-136 has been included as an IMT-2000 RTT

GAIT (GSM ANSI-136 Interoperability Team) created to facilitate roaming between ANSI-136 and GSM networks

The standardization battles continue to rage through constant upheavals from wrinkles thrown into the mix by vendors who are tweaking their products to stretch its capabilities just a little farther than the last.

The Operator’s Harmonization Group (OHG) is currently working onstandards that will allow mixing and matching of technologies, connecting one kind of radio to a different kind of network.

With the uniting of the GSM and TDMA communities (and PDC in Japan), the move towards global interoperability across these networks is being driven by the GAIT team.

Page 20: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-15

Current US Wireless Issues

IP-optimized networks appear to be the backbone of choice for the future given its flexibility and universal acceptance

Core Network ConsiderationsVoice and data are converging into a single backbone packet network running IP or ATM

Operators will seek to maximize the utilization in current backbone networks when upgrading for 3G capabilities

ATM backbones offer high reliability and superior QoS for voice, but the initial investment required is higher than IP-centric networks

VoIP or VoATM are feasible depending on the core network choice

The evolution of the core network also has its variances. While everyone believes that packet data and voice over packet is a given, the medium over which the packets are transported is not the same to all. The IP vs. ATM argument continues to rage. Each has its advantages and each has its supporters. Which one chosen will likely depend on the individual needs of the operators.

While ATM has better built in mechanisms for Quality of Service, it is also more expensive than IP. The tradeoff must be weighed and made accordingly.

Page 21: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-16

G S M8.0%

A N S I-136/A MPS

64.5%

IS -9527.5%

Cellular Subscribers by Technology

North American Subscribers by TechnologySource: UWCC, June 2000

North American TDMA-EDGE subscribers increased by 98%!North American TDMA-EDGE subscribers increased by 98%!

The Yankee Group is predicting that the total wireless subscriber base in North America will double within the next five years. It is likely that it will happen even sooner than that.

The Universal Wireless Communications Consortium (UWCC, Bellevue, WA) claims that worldwide subscriber numbers for TDMA-EDGE have grown 87% over the past year, reaching nearly 41 million by the end of the first quarter 2000.

North American TDMA-EDGE subscribers increased by 98% and currently serves over 22 million subscribers in North America.

Page 22: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-17

G S M62%

A NS I -13619%

P D C8%

IS -95/A MP S11%

Systems that willuse GPRS as the backbone forIP traffic

Cellular Subscribers by Technology

World Subscribers by Technology - EstimatedSource: UWCC, Herschel Shosteck

Herschel Shosteck, another well known and respected research andconsulting company has estimated that by the end of 2000, almost 90% of the world’s wireless subscribers will be connected to a TDMA-based technology.

The evolution of each of these networks includes the implementation of GPRS for their backbone. Following GPRS, each network will deploy EDGE or W-CDMA or a combination of the two.

What this means is that GSM and ANSI-136 subscribers will enjoy global roaming for their high speed data and eventually voice services. The economies of scale brought by this union will create an undeniable force in the future high speed wireless network and ensuring the TDMA technology a long and healthy life.

Page 23: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 1-18

Spec

trum

Use

Trad

ition

alN

on-T

radi

tiona

l

Incumbents Challengers

Auction Participants

Capacity-strainedOperators

Coverage-limitedOperators

“Local Wireless”Operators

Partnership betweenIncumbent and ISPs /

Content Provider /Portals / Automakers

“Carrier’s Carrier”Wholesale / Resale

Model

ISPs, Web Portals,Content Providers

“Local Wireless”Start-Ups

CLECs

Foreign-ownedTelecoms

Domestic Telecomswithout wireless

assets

“DE’s” Small BusinessEntrepreneurs

Cellular / PCS operatorsadding capacity for resale

Potential Wireless Auction Players

With the upcoming (hopefully) spectrum auctions that the FCC intends to hold for the 700 MHz spectrum as well as the future 1.6 GHz spectrum, there are a number of potential new players.

Beyond the incumbents that are normally expected to participate, there will likely be several unexpected newcomers. These could be in the form of “partially” foreign owned telecom operators, ISPs, new wireless start ups and maybe even companies completely outside the current wireless industry scope (such as financial institutions).

Page 24: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 1-19

Lesson 1: Self-Check

1. What are the different wireless technologies used in the US?

2. How is the 800 MHz cellular spectrum defined?

3. How are the PCS 1900 MHz frequencies defined?

4. What are the different wireless access technologies and how do they differ?

5. What are the different possibilities for core networks as they evolve?

6. Who are some of the potential bidders in the future spectrum auctions?

Page 25: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-1

TCP/IP and Data Fundamentals

Lesson 2

Page 26: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-2

Objectives

! Review the history of the Internet! Define Ethernet! Define the seven layers of the OSI reference model! Compare circuit and packet switching! Discuss IP routing and its protocols! Examine how routing works! Understand IP addressing and subnet masking! Understand IP addressing – IPv4 vs. IPv6! Examine IP network components – DNS, DHCP! Understand the demand for QoS and the protocols

required to deliver various levels of QoS

Page 27: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-3

History of the Internet

ArpanetDemonstrated

NSF-netInitiated

ArpanetTransitionto TCP/IP

InternetSociety

Founded

TCP/IPInvented

World WideWeb

FirstGateway

(IMP)

Milnet /Arpanet

split

Arpanetwidely used

Multi-protocolEnvironment

Arpanet Internet

1968 1980 1986 1993 1996Number

of Networks 1 3 20 60 300 500 900 16K 50K 150K 300KNumberof Nodes 1K 10K 100K 1M 10M 50M 100M

2000

Mosaiclaunched

InterNICcreated

IETFformed

The Internet is a network of networks that link schools, universities, libraries, businesses, hospitals, government agencies, and other entities into a single, large communication network that spans the globe. Even though the Internet today is used more and more by businesses and consumers, it all started with the intent to connect several research and educational institutions.The Internet grew out of an earlier U.S. Department of Defense project called, ARPANET (Advanced Research Projects Agency Network), that was put into place in 1969 as a pioneering project to test packet switching networks. In 1983, the military portion of the ARPANET was split off into Milnet (Military Network), and then in 1986, NSF-net was initiated, which subsequently became what is called Internet today. ARPANET was officially dismantled in 1990.The Internet is based on TCP/IP protocol, an open internetwork communication protocol; it was first defined in the early 1970s and has been modified and refined several times since.No person, government or entity owns or control the Internet. The Internet Society (ISOC) was formed in 1989 to promote global cooperation and coordination for the Internet and its internetworking technologies and applications. The Internet Engineering Task Force (IETF) was formed in 1986 to study the evolution of Internet architecture. Today IETF is the most important “standardization” organization related to Internet and IP technologies.World Wide Web (WWW) was first defined / created by Tim Berners-Lee at CERN in 1990, and became the reason for the popular growth of the Internet; WWW uses hypertext transfer protocol (HTTP) and hypertext links, changing the way information can be organized, presented and accessed on the Internet. Mosaic was the first graphical browser defined in 1993, and it took the Internet by storm! Netscape Navigator browser was later defined as a commercial package following the foot steps of Mosaic.

Page 28: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-4

Ethernet

A drawing of the first Ethernet system by Bob Metcalfe

! Ethernet is the most common medium over which TCP/IP systems operate

! It is a coaxial-based bus cabling system

! Most Ethernet transmissions are broadcast, not routed, to the appropriate Data Terminal Equipment (DTE)

! Each station listens to the message to determine whom the message belongs to

Ethernet is the de-facto hardware standard for local area networks. Ethernet (Version 2) and the very similar IEEE 802.3 standard define the physical and link layers of carrier sense multiple access/collision detection (CSMA/CD)LANs. In CSMA/CD LANs, all stations can access the network at any time. Before sending data, each station must "listen" to the network to see if it is already in use. Data is sent only if the station doesn't "hear" any data being sent. Collision, is a situation where two stations detect silence on the network and send data at the same time. To overcome collision problems, Ethernet hardware is equipped with collision detection sensors. Whenever a collision is detected, the colliding data is ignored. The stations that originally sent the data will resend it.

Page 29: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-5

Internet Backbone (vBNS)

National ISP

NAP NAPNAP

RegionalISPs

RegionalISPs

OtherNetworksOther

Networks

ISPs must connect to multiple NAPs

Global NAPs are called Global Internet Exchanges (GIX)! New York ! San Francisco ! Hong Kong ! Tokyo! Singapore! Seoul! Sydney

Chicago NAP

PSINet

UUNetNetcom

Peering Relations! Peering agreements to

exchange traffic! Controversy over free

peering! Border Gateway Protocol

(BGP) used for routing! Congestion major issue! Private peering sites

National Service Providers (NSPs)

must connect to 3 NAPs

In 1995, NSF-net’s backbone was replaced by a new network architecture called Very high speed Backbone Network System (VBNS) with 155 Mbps facilities.

Originally, 4 regional Network Access Points (NAPs) were defined as a connection point and traffic exchange facility. National Service Providers (NSPs) are expected to be connected to 3 such NAPs. Regional ISPs are expected to be connected to at least 2 NAPs.

NSF awarded the original contracts to various carriers in 1994. Since then, more Metropolitan Area Exchanges (MAEs) as well as Global Internet Exchanges (GIX) were established.

NAPs exchange traffic between ISPs, which is called Peering; this is level 2 switching, with no filtering, no tampering as traffic flows between ISPs.

NAPs and MAEs are at the top of the Internet hierarchy; they don’t provide routing functionality, but the routers connected to NAPs/MAEs from the ISPs do use Border Gateway Protocol (BGP) to route traffic through these peering points.

Page 30: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-6

OSI Reference Model

Open System Interconnection Model

! Internationally accepted framework for data networks

! Essential to understand data communication principles

! Allows different systems to interconnect! Protocols are used at different levels for

communication

Physical

Data Link

Network

Transport

Session

Presentation

Application

The seven layer Open System Interconnection (OSI) model is the reference structure for all data communication systems. All exiting data communication systems are compared to OSI model, in one way or another.Each layer of the OSI reference model has a specific set of functions it performs. It expects a set of services / functions from the layer below, and provides a set of services / functions to the layer immediately above it.There are protocols operating at each layer, communicating with similar OSI stacks at the other end.Physical Layer: Defines the physical characteristics of the interface, such as mechanical components and connectors, electrical aspects, and functional aspects.Data Link Layer: Defines the rules for sending and receiving information across a physical connection between two systems. Its main function is to divide the data stream into frames and send them across the physical link. The data link layer is concerned with getting the information to the next node.Network Layer: Ensures that packet of information reaches its destination when traveling across multiple point-to-point links. Layer 3 manages multiple data link connections.Transport Layer: Provides a high level of control for moving information between end-systems in a communication session. Layer 4 is concerned with end-to-end transport.Session Layer: Coordinates the exchange of information between systems by using conversational techniques or dialogs. Layer 5 manages the session.Presentation Layer: Defines how to present the information.Application Layer: Used for a range of applications that employ the underlying layers.

Page 31: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-7

Internet Protocol Suite

Point-to-Point Protocol (PPP): A protocol for creating a TCP/IP connection over both synchronous and asynchronous systems. PPP provides connections for host to network or between two routers. It also has a security mechanism. PPP is well known as a protocol for connections over regular telephone lines using modems on both ends. This protocol is widely used for connecting personal computers to the internet.

Serial Line Internet Protocol (SLIP): A point-to-point protocol to use over a serial connection, a predecessor ofPPP. There is also an advanced version of this protocol known as CSLIP (compressed serial line internet protocol) which reduces overhead on a SLIP connection by sending just header information when possible, thus increasing packet throughput.

File Transfer Protocol (FTP): FTP enables transferring of text and binary files over a TCP connection. FTP allows file transfers according to a strict mechanism of ownership and access restrictions. It is one of the most commonly used protocols over the internet today.

Page 32: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-8

Internet Protocol Suite cont.

Telnet:Telnet is a terminal emulation protocol, defined in RFC854, for use over a TCP connection. It enables users to login to remote hosts and use their resources from the local host.

Simple Mail Transfer Protocol(SMTP): This protocol is dedicated for sending EMail messages originating on a local host, over a TCP connection, to a remote server. SMTP defines a set of rules which allows two programs to send and receive mail over the network. The protocol defines the data structure that would be delivered with information regarding the sender, the recipient (or several recipients) and, of course, the mail's body.

Hyper Text Transport Protocol (HTTP): A protocol used to transfer hypertext pages across the world wide web.

Simple Network Management Protocol (SNMP): A simple protocol that defines messages related to network management. Through the use of SNMP network devices such as routers can be configured by any host on the LAN.

User Datagram Protocol (UDP): A simple protocol that transfers datagrams (packets of data) to a remote computer. UDP doesn't guarantee that packets will be received in the same order they were sent. In fact it doesn't guarantee delivery at all.

Page 33: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-9

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-9

TCP/IP (Transmission Control Protocol/Internet Protocol)

Physical

Data Link

Network

Transport

Session

Presentation

Application TCP! Connection establishment! Reliable message transmission ! Error detection and packet re-transmission

algorithms to ensure integrity of data! Packet sequencing/ordering! Flow control

IP! Transmits packets known as datagrams! Provides best-effort or connectionless delivery service! Responsible for network addressing - IP addresses! Current version is called version 4 - IPv4! Network information is distributed via routing protocols

Transmission Control Protocol (TCP): Like UDP, a protocol that enables a computer to send data to a remote computer. Unlike UDP, TCP is reliable i.e. packets are guaranteed to wind up at their target, in the correct order.

Internet Protocol (IP): IP is the underlying protocol for all the other protocols in the TCP/IP protocol suite. IP defines the means to identify and reach a target computer on the network. Computers in the IP world are identified by unique numbers which are known as IP addresses.

Address Resolution Protocol (ARP): In order to map an IP address into a hardware address the computer uses the ARP protocol which broadcasts a request message that contains an IP address. The target computer replies with both the original IP address and the hardware address.

Network News Transport Protocol (NNTP): A protocol used to carry USENET posting between News clients andUSENET servers.

Page 34: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-10

IP at the Center

! Communication protocols are divided into multiple layers! At the network layer, IP (Internet Protocol) has become a widely used standard! Multiple protocols are still widely used in all the other layers! IP has become the glue of all data devices

IPIP

TCPTCP UDPUDP

HTTPHTTP FTPFTP SMTPSMTP TelnetTelnet SNMPSNMP H.323/SIPH.323/SIP

10 / 100 Base T10 / 100 Base T PSTNPSTN ATMATM Frame RelayFrame Relay RFRF

EthernetEthernet PPPPPP FDDIFDDI Wireless MACWireless MACAAL5AAL5

HTMLHTML File Transfer

File Transfer EmailEmail Terminal

EmulationTerminal

EmulationNetwork

ManagementNetwork

Management VoIPVoIP

WebWeb

Appl. / Pres. Layers

Transport Layer

Session Layer

Network Layer

Link Layer

Physical Layer

Here we see a comparison of the popular data communications protocols as they relate to the OSI reference model.

IP is the common network layer protocol, as the glue for all the other layers and protocols. You can see how some of the other popular protocols are positioned in terms of the protocol layers.

Applications running on computers could implement all 7 layers of the OSI stack, while routers are up to layer 3, or network layer.

Page 35: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-11

Dial up Connection to Internet -PPP (Point-to-Point Protocol)

PPPPPP

Host(End User)

ISPDial-upconnection

InternetPoint of

Presence(POP)

PPPPPP

! PPP is anchored at the user client and the ISP’s RAS

! PPP allows the end user to become a fully participating member of the network

! PPP is a layer 2 protocol and IP rides over it

Point-to-Point Protocol (PPP) is the most important protocol used for dial up connections for Internet access. For example, home users dial-up into their local ISP. After the modems establish a connection, a PPP session is set up between the end user’s system and the ISP’s POP. This may include user authentication, assignment of IP address, etc. In essence, the end user’s computer becomes an extension of the ISP’s IP network, or a fully participating member of the network.

PPP is a Data Link Layer (or layer 2) protocol.

Since wireless Internet access is very similar to the dial-up ISP access scenario, PPP protocol is being used for wireless access as well.

Page 36: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-12

Routing vs Switching

Routing! Connectionless! Each packet contains destination

address! No reserved resources! Congestion delays! IP Address 207.69.243.215! Domain name www.gtcpro.com! DNS translates domain name to IP

address

DNS

001011..001011..001011..

101100..

101100..

101100..

IP Router

IP Router IP Router

IP Router

Switching! Connection based! Reserved circuit! Quality of Service

(QoS)

Routing, in the case of packets, takes the packet and by using the header information and the address of the packet, it sends the packet to the next appropriate router.

Switching, on the other hand, establishes a virtual connection, and the information is switched through the connection for the life of the call.

Circuit switching opens a direct, end-to-end connection through the network from the transmitter to the receiver. An example of circuit switching would be CSD or HSCSD.

Packet switching does not require an end-to-end connection. The data is sliced up, sent through the network, and reassembled at the other end. The packets may take different routes through the network. Error checking may take place at each node or at the final destination. This varies based on the packet technology. CDPD is one example of packet switching.

Page 37: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-13

Packet Switching Protocols

! X.25" First packet switching technology defined in 1970’s" Highly reliable protocol, with error checking, etc." Has lots of overhead, and thus lower throughput

! Frame Relay" Defined in 1980’s; originally for inter-LAN communications" Less error checking, passes responsibility to higher layers" Uses variable length frames; operates at Data Link layer" Delivers much higher speeds than X.25

! ATM" Defined in late 1980’s; designed for high speed data, voice and video" Uses fixed size “cells”; allows simultaneous transmission of data, voice and

video" Offers high quality of service (QoS) for delay-intolerant applications

There are several WAN packet switching protocols that have been developed in the last 20+ years.

X.25 is an ITU (previously called CCITT) protocol, developed in mid 1970’s; it is a highly reliable protocol, with error checking, flow control, etc. As a result, it has a significant amount of overhead, and thus lower throughput.

Frame Relay standards were defined in the 1980’s as an outgrown activity from ISDN. Originally it was intended to interconnect LANs. It provides less error checking and passes responsibility for error-free communication to higher layers. It uses variable length frames. Frame Relay can deliver higher speeds than X.25.

ATM is a high-speed, packet-switching technique that uses short fixed length packets called cells. Fixed length cells simplify the design of an ATM switch at the high switching speeds involved. The selection of a short fixed length cell reduces the delay and most significantly the jitter (variance of delay) for delay-sensitive services such as voice and video. ATM is capable of supporting a wide range of traffic types such as voice, video, image and various data traffic. ATM has various features that deliver high Quality of Service (QoS), especially for delay intolerant applications. AAL-5 is part of the ATM protocols operating at the data link layer.

Page 38: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-14

How IP Routing Works

IPTCP

Network Access

Presentation

IPTCP

Network Access

Presentation

IPNetwork Access

IPNetwork Access

Routing Table

Routing Table

Router Router

Data

! Create TCP/IP packet with 4 headers

Data

Data

Data

! Strip 2 layers of headers ! Routing

table lookup! Add 2 layers

of header

! Strip all headers

! Deliver data

Data

! Strip 2 layers of headers

Data! Routing

table lookup! Add 2 layers

of header

This chart shows on a step by step basis, how packets would be routed from point A to point B, using TCP/IP.

Each router would have a routing table for determining how to route or forward the packets. These routing tables would be populated based on the routing protocols used.

When a TCP/IP packet is created at the originating host, it would have 4 headers, one for each layer of the TCP/IP stack; the lowest layer header would be the left-most header (inserted last).

Originating host forwards the packet with these 4 headers to the first router; This router strips the left most 2 headers, does a routing table look up, and insert two new headers and forward it to the next router.

Second router would strip the left most 2 headers as well, does a routing table look up and insert 2 new headers, and forward it to the next node, in this case to the destination host.

Destination host would strip all the headers and deliver the data in the packet to the application layer.

Page 39: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-15

IP Routing Protocols

! Routing Information Protocol (RIP)" Oldest Interior Gateway routing Protocol (IGP), within a domain" Uses # of hops as the criteria - distance vector" Share info between routers periodically

! Open Shortest Path First (OSPF)" Uses several factors such as # of hops, QoS, data rates, etc." Uses network wide data base; floods all routers with same info" Faster network recovery

! Border Gateway Protocol (BGP)" Performs inter-domain (inter-network) routing; it is an Exterior

Gateway Protocol (EGP)OSPF RIPBGP

TCP UDPInternet Protocol (IP)

Routing Protocols

Transport ProtocolsNetwork Protocols

A protocol defined by RFC 1058 that specifies how routers exchange routing table information. With RIP, routers periodically exchange entire tables. Because this is inefficient, RIP is gradually being replaced by a newer protocol called Open Shortest Path First (OSPF).

Open Shortest Path First is a routing protocol developed for IP networks based on the shortest path first or link-state algorithm. Routers use link-state algorithms to send routing information to all nodes in an internetwork by calculating the shortest path to each node based on a topography of the Internet constructed by each node. Each router sends that portion of the routing table (keeps track of routes to particular network destinations) that describes the state of its own links, and it also sends the complete routing structure (topography). The advantage of shortest path first algorithms is that they result in smaller more frequent updates everywhere. The disadvantage of shortest path first algorithms is that they require a lot of CPU power and memory. In the end, the advantages out weigh the disadvantages. OSPF Version 2 is defined in RFC 1583. It is rapidly replacing RIP on the Internet.

Border Gateway Protocol is an internet protocol that enables groups of routers (called autonomous systems) to share routing information so that efficient, loop-free routes can be established. BGP is commonly used within and between Internet Service Providers (ISPs) The BGP protocol is defined in RFC 1771.

Page 40: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-16

Multiplexing

! Time Division Multiplexing (TDM) divides the channel by time

! Frequency Division Multiplexing (FDM) divides the channel into smaller frequencies

! Statistical Multiplexing divides the channel based on the requirements of the devices

! Code Division Multiplexing(CDM) transmits bits as coded channel-specific sequences of pulses.

! Wave Division Multiplexing (WDM) transmits several baseband-modulated channels along a single fiber but with each channel located at a different wavelength

Multiplexing allows two or more signals to be sent out simultaneously over the same channel. Some of the popular techniques used for multiplexing are:

TDM - TDM can be accomplished in the electrical or optical domain, with each lower-speed channel transmitting a bit (or allocation of bits known as a packet) in a given time slot and then waiting its turn to transmit another bit (or packet) after all the other channels have had their opportunity to transmit.

FDM - Frequency division multiplexing divides the channel into smaller frequencies. Each message is specially formatted so that it can travel within the boundaries of a specific preconceived range.

Statistical Multiplexing - Statistical multiplexing provides bandwidth or space on the channel only as needed.

CDM - Each channel transmits its bits as a coded channel-specific sequence of pulses. This coded transmission typically is accomplished by transmitting a unique time-dependent series of short pulses. These short pulses are placed within chip times within the larger bit time. All channels, each with a different code, can be transmitted on the same fiber and asynchronously de-multiplexed.

WDM - WDM enables the utilization of a significant portion of the available fiber bandwidth by allowing many independent signals to be transmitted simultaneously on one fiber, with each signal located at a different wavelength.

Page 41: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-17

Tunneling

!Transfers data packets over the Internet or other public network, providing security and features typical of private networks

!Encapsulates the data packet in a header that provides routing information to enable the encapsulated payload to securely traverse the network

Tunneling is a method for transferring data packets over the Internet or other public network, providing the security and features formerly available only on private networks. A tunneling protocol encapsulates the data packet in a header that provides routing information to enable the encapsulated payload to securely traverse the network. The entire process of encapsulation and transmission of packets is called tunneling, and the logical connection through which the packets travel is known as a tunnel.

Although tunneling technologies have been around awhile (e.g., SNA tunneling over IP networks, and IPX tunneling for Novell NetWare® over IP internetworks), there are several recently introduced tunneling technologies:

!Point-to-Point Tunneling Protocol (PPTP)!Layer 2 Forwarding (L2F) Protocol!Layer 2 Tunneling Protocol (L2TP)!GTP (GPRS Tunneling Protocol)!IPSec (Internet Protocol Security)

Page 42: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-18

Firewalls

!Regulates access from one network to another !Allows access to Intranet services, e-mail, FTP, etc.,

without allowing anyone (without authorization) on the Internet to access a company's internal network

! Two main types of firewalls "Filtering

#Decides to forward or drop a packet based on its IP header"Proxy (includes application gateways and circuit-level

gateways)#Explicitly acts on behalf of the machine on either internal or

external net

Corporate LAN

Firewall

Internet Public ISP

A Firewall is a computer system that regulates access from one network to another. It will allow a company to access Internet Services, e-mail, FTP, etc, without allowing just anyone on the Internet to access a company's internal machines.

There are two main types of firewalls: filtering and proxy (includes application gateways and circuit-level gateways). A filtering firewall will decide to forward or drop a packet based on its IP header. A proxy firewall is one that explicitly acts on behalf of the machine on either internal or external net.

In the beginning, it was believed that the usage of application gateways was disadvantageous due to the potential of reduced performance and incompatibility with true end-to-end encryption. It was thought that packet-filtering gateways were a better security methodology.

Lately, this has been proven to be unjustified since packet filtering is insecure and prone to errors.

Therefore, the current method of choice for many of contemporary firewall designers is a combination of the two.

Page 43: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-19

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-19

Medium Access Control (MAC) Address

!A MAC address is a hardware address that is located in the Network Interface Card (NIC)

!The MAC address is 48 bits long and is fixed

! It is referred to as the physical address

The MAC addresses are 48 bits long and are configured into the hardware of network cards at the manufacturers, usually on Programmable Read Only Memory (PROM). The MAC addresses are labeled source and destination to identify the network cards that the frame is travelling between.

Network cards that are attached to a LAN cable decode all frames that are transmitted on that cable, but the hardware will only accept and process frames with three kinds of MAC addresses: the network card’s unicast address, a broadcast address, or a multicast address. The unicast address is the MAC address that was defined by the manufacturer. The broadcast address is represented by hex FF FF FF FF FF FF, and the multicast address refers to a group of LAN cards that are associated in some way.

Page 44: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-20

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-20

IP Addresses - IPv4

0 311 232-Bit Field. . .

" Divided into four fields

207.69.243.215

! Class A Address (*)" 126 networks" Up to 17M hosts each

! Class B Address (*)" 16K networks" Up to 65K hosts each

! Class C Address" 2M networks" Up to 254 hosts each

57. 69.243.215NetworkAddress

HostAddress

176.69. 243.215NetworkAddress

HostAddress

207.69.243. 215NetworkAddress

HostAddress

. . .

IPv4 uses a 32-bit address to identify the host computer and the network to which the host is attached. The structure is basically Network address + Host Address. The 32-bit address is divided into 4 fields. Each field, or octet, is represented in decimal format from 0 to 255.

IP addresses are classified according to their format. Class A, Class B and Class C are shown in this chart. There are also Class D and E. The first few bits of the address indicate the rest of the address format.

Class A addresses are intended for networks with a very large number of hosts. A Class A address allows up to 126 networks, with each network supporting up to 17 million hosts.

Class B addresses are intended for networks with intermediate size. In a Class B network 16 bits are used for network id and 16 bits are used for host id.

Class C networks contain fewer than 256 hosts, with 24 bits being used for network id.

Class D addresses are used for multicasting and Class E addresses are used for experimental purposes . Currently, there are no more Class A addresses to be issued.

Page 45: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-21

Subnetting can be used for better allocation of addresses. Classes A, B, and C networks can be subnetted. Subnetting is simply borrowing addressing space from host address space to create “mini-networks”.

In the above example, the resulting Class C address is 210.56.21.240 using a subnet mask of 4.

The following rules apply for subnet masking:

Class A - subnet mask size 0 to 22.Class B - subnet mask size 0 to 13.Class C - subnet mask size 0 to 6.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-21

Subnet Masks

0000 0000

Network Subnet + Host

00000000 = 0Subnet mask of 4 isapplied to the mostsignificant bits of the

1111 0000 = 240giving the subnet of240 and ......

0000 … the user space from241 to 254

(1111 0001 to 1111 1110)

210.56.21

subnet byte.....

a

1111

1101 0010. 0011 1000. 0001 0101

Page 46: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-22

0 bits 31

Ver IHL Total Length

Identifier Flags Fragment Offset

32 bit Source Address

32 bit Destination Address

4 8 2416

Service Type

Options and Padding

Time to Live Header ChecksumProtocol

RemovedChanged

IPv4 Header

20 octets + options: 13 fields, including 3 flag bits

The IP datagram shown above is the standard format for TCP/IP based systems. It is 32 bits wide and transmission is from top left to bottom right.Version – IP protocol version.IHL – Internet Header Length. Length of the header in 32 bit words.Service Type – Flags for Type Of Service and precedence to indicate priority.Total Length – Length of the IP datagram in octets including header and data.Identifier – Unique integer value used to identify datagram fragments.Flags – Specifies whether fragmentation is allowed or not.Fragment Offset – Indicates position that the fragmented data occupies in the original message.Time to Live – Decremented as routers relay the datagram. When field reaches 0, the datagram is discarded. Used to prevent circular loops.Protocol – Indicates the transport layer protocol carried by the datagram.Header Checksum – Used for header only and not data to speed up calculation at each router.Source Address – The source IP address.Destination Address – The destination IP address.Options and Padding – Padding of 0s so the header falls on a 32 bit word boundary. Also supports debugging, measurement and security facilities.

Page 47: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-23

0 31

Version Class Flow Label

Payload Length Next Header Hop Limit

128 bit Source Address

128 bit Destination Address

4 12 2416

IPv6 Header

40 Octets, 8 fields

As with IPv4 on the previous slide, most of the same information is included in the IPv6 header as well. The version, class and length work the same way.

The flow label is basically the identifier. The hop limit is the same as the TTL in version 4 and used to prevent circular routing.

The one big difference with IPv6 over IPv4 is the size of the addressing fields. In IPv6, the source and destination addresses can be 128 bits long, as compared to 32 in IPv4. This is a huge increase.

Basically, IPv4 could support around 4.3 billion addresses (232). With IPv6, you can have 2128. That’s a whole lot of 0’s……

Page 48: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-24

IPv6 Performance Wins

! Fixed size IPv6 header" Unlike IPv4 - options not limited to 40 bytes

! Fewer fields in basic header " Faster processing of basic packets" No checksum

! 64 bit alignment header/options! Efficient option processing

" Option fields processed only when the option present" Processing of most options limited - performed only at destination

! No fragmentation in the network" More router cycles available for forwarding packets " Easier to implement in Silicon

IPv6 has been designed to enable high performance, scalable inter-networks that should operate as needed for decades. Part of the design process involved correcting the inadequacies of IPv4.

IPv6 offers a number of enhanced features, such as a larger address space and improved packet formats. Scalable networking requires careful utilization of human resources as well as network resources; so, a great deal of attention has been given to creating auto configuration protocols for IPv6, minimizing the need for human intervention when assigning IP addresses and relevant network parameters such as link MTU.

Other benefits relate to the fresh start that IPv6 gives to those who build and administer networks.

Page 49: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-25

Domain Names - User Friendly Alternatives

Domain Name Server (DNS)MapsDomain names to IP address

Routers

route on IP addresses

SuffixDomainServer/Computer Name

+ sub domains

www. gtcpro. comwww. fcc. gov

IP Address = Domain Name

207.69.243.215 = www.gtcpro.com

World Wide Web.Federal Communications Commission.Government

Domain Name System (or Service) is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet, however, is really based on IP addresses. Every time you use a domain name,a DNS server must translate the name into the corresponding IP address. For example, the domain name www.gtcpro.com translates to 207.69.243.215.

The top-level domain (called the suffix in the diagram above) is the first division of names in the hierarchy. The original five domains and purpose were: .com, for commercial, .org, for non-profit organizations, .net, for networks and network providers, .gov, for governmental agencies, and .mil, for the military.

With the expansion of the Internet beyond U.S. borders, two-character country designations were adopted as well.

The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

Page 50: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-26

DNS Resolvers and Name Servers

! Resolver software on PC’s and workstations sends queries - what is the IP address of www.gtcpro.com?

! Resolvers are configured with the IP address of the name server! Name servers are responsible for portions of the DNS tree and contact

other name servers for names for which they are not responsible ! Name servers are distributed throughout the network

ISPdial-up InternetPOPHost

DNS ResolverClient

DNSName Server

Domain Name

IP Address

Domain Name System (or Service) is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet, however, is really based on IP addresses. Every time you use a domain name,a DNS server must translate the name into the corresponding IP address. For example, the domain name www.gtcpro.com translates to 207.69.243.215.

The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

Page 51: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-27

Dynamic Host Configuration Protocol (DHCP)

! A protocol for automatically configuring hosts in the network

! DHCP clients in a host obtain an IP address and configuration from a DHCP server

! Enables mobile users to connect anywhere

! Efficiently reuses IP addresses

ISPdial-up InternetPOPHost

DHCP Client DHCP Server

DHCP Benefits

! Without DHCP, administrators must rely on distributed methods ofaddress allocation. They must also physically visit each PC to configure it for network use and then manually update the DNS.

! To assign an address to a mobile host, an administrator must reserve an address on each subnet where a mobile host may attach to the network. With DHCP they can connect anywhere.

! Most organizations have access to a limited number of addresses for allocation. To make the most efficient use of address space, organizations need to be able to reclaim and reuse addresses. They can do this with DHCP.

Page 52: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-28

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-28

Network QoS:IP Precedence & DiffServ

VER HL TOS Total Length

Identification Flags Frag Offset

TTL Protocol Hdr Checksum

Source IP Address

Destination IP Address

TOS

DiffServ

PrecedenceBits (3 bits)

D T R 0 0

DiffServ Code Points(8 bits) 64 points

Rsvd

Ver

QoS is a the ability of a service provider network to guarantee a throughput level to meet a customer’s application requirements.

QoS can be divided into four areas:

Data IntegrityPrecedence

DelayThroughput

Short for Quality of Service, QoS is a networking term that specifies a guaranteed throughput level. One of the biggest advantages of ATM over competing technologies such as Frame Relay and Fast Ethernet, is that it supports QoS levels. This allows ATM providers to guarantee to their customers that end-to-end latency will not exceed a specified level.

The second byte in the IP header is known as the Type of Service (TOS) byte. It was part of the original specification, but was rarely used in implementations.IP Precedence is 3 bits in length which allows for 8 different bit patterns or levels of prioritization.DiffServ uses 6 bits as what it calls DiffServ Code Points. 6 bits will support up to 64 different code points.This field is carried with the packet, therefore any intermediate router that supports IP Precedence or DiffServ can prioritize this packet. DiffServ and IP Precedence provide the capability for end-to-end QoS.

Page 53: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-29

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-29

Resource Reservation Protocol (RSVP)

!RSVP is simplex, i.e., it makes reservations for unidirectional data flows

!RSVP is receiver-oriented, i.e., the receiver of a data flow initiates and maintains the resource reservation used for that flow

!RSVP maintains a "soft" state in routers and hosts, providing graceful support for dynamic membership changes and automatic adaptation to routing changes

!RSVP is not a routing protocol but depends upon present and future routing protocols

!RSVP transports and maintains traffic control and policy control parameters that are opaque to RSVP

A host uses RSVP to request a specific Quality of Service (QoS) from the network, on behalf of an application data stream. RSVP carries the request through the network, visiting each node the network uses to carry the stream. At each node, RSVP attempts to make a resource reservation for the stream.

To make a resource reservation at a node, the RSVP daemon communicates with two local decision modules, admission control and policy control. Admission control determines whether the node has sufficient available resources to supply the requested QoS. Policy control determines whether the user has administrative permission to make the reservation. If either check fails, the RSVP program returns an error notification to the application process that originated the request. If both checks succeed, the RSVP daemon sets parameters in a packet classifier and packet scheduler to obtain the desired QoS. The packet classifier determines theQoS class for each packet and the scheduler orders packet transmission to achieve the promised QoS for each stream.

RSVP is also designed to utilize the robustness of current Internet routing algorithms. RSVP does not perform its own routing; instead it uses underlying routing protocols to determine where it should carry reservation requests. As routing changes paths to adapt to topology changes, RSVP adapts its reservation to the new paths wherever reservations are in place. This modularity does not rule out RSVP from using other routing services. Current research within the RSVP project is focusing on designing RSVP to use routing services that provide alternate paths and fixed paths.

RSVP runs over IP, both IPv4 and IPv6. Among RSVP's other features, it provides opaque transport of traffic control and policy control messages, and provides transparent operation through non-supporting regions.

Page 54: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-30

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-30

Policy-Based Networking

VANGUARD34

VANGUARD34

Voice

Telnet,Email,FTP,Web

SNABest Effort

ISP

QoSNetwork

PBXPBX

ISP (Platinum, Gold),Intranet, Frame Relay

Policy based networking determines how a network handles a customer’s traffic

In a typical network environment, resources are granted without any regard for an application's or user's importance to the corporate objective. Mission critical database traffic is viewed no differently than users looking at stock quotes or sports scores. As a corporate network becomes congested, every user experiences inconsistent and unpredictable network performance.

Policy based networking solutions allow network managers to define a relationship between organizational needs and network actions. Awareness of users coupled with awareness of the state of the network allow network managers to optimize end to end network services according to need, revenue generated, or other business requirements.

Policy-based routing assumed I have two or more paths that I can route my IP packets over. In this example I have a best-effort ISP, for a fixed monthly cost, that I use for Email and FTP. My second network would carry traffic that needed some Quality of Service guarantees. It could be the company Intranet running over Frame Relay, or it could be a Network Service Provider (NSP), where I am paying extra for some latency guarantees.Policy-based routing is also known as layer 4 switching and it supports all types of non-broadcast IP traffic. Voice would also need to be encapsulated in IP to be transported over this network. This type of routing uses network administrator defined policies to override routing based on dynamic routing protocols (RIP, RIP2, OSPF).Traffic is categorized by Flow, then predefined policies or actions can be applied to the Flow as well as Time of Week profiles can be applied.Also, it can be used to screen which IP traffic uses backup links.

Page 55: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-31

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-31

Integrated Services

! Today’s Internet provides Best Effort class of Service! Integrated Services proposes two additional classes

of service: Guaranteed Service and Predictive Service

! Differentiated Services (DiffServ) were introduced because of the problems associated with deploying Integrated Services

! Differentiated Service is a relative-priority scheme! For a customer to receive differentiated services from

an ISP, he must have a Service Level Agreement (SLA) with his ISP

With Best Effort service, traffic is processed as quickly as possible, but there is no guarantee as to timeliness or actual delivery. With the exponential growth of the internet into a commercial infrastructure, demands for service quality have been pushed to the forefront. Companies that do offer services on the web will be willing to pay for a reliable class of service. There may be Gold Service, Silver Service, or Bronze Service, with decreasing quality.

Another service class will provide low delay and low jitter to applications such as Internet Telephony and Video Conferencing.

Guaranteed Service will be used for applications that require fixed delay bound. Applications requiring Guaranteed Service must set up paths and reserve resources before transmitting their data. Predictive Service will be used for applications that require probabilistic delay bound.

The problem with Integrated Services is that they place huge storage and processing requirements on the routers. In order for a customer to receive differentiated services from an ISP, he must have a Service Level Agreement (SLA) with his ISP. An SLA basically specifies the service classes supported and the amount of traffic allowed in each class. An SLA can be static or dynamic. Static SLAs are negotiated on a on a monthly or yearly basis. Dynamic SLAs must use a signaling protocol, like RSVP to request a level of service.

Page 56: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-32

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-32

Multiprotocol Label Switching

! Multiprotocol Label Switching (MPLS) provides for the efficient designation, routing, forwarding, and switching of traffic flows through the network.

! MPLS remains independent of Layer 2 and Layer 3 protocols

! MPLS supports IP, ATM, and Frame-Relay Layer 2 protocols

Multiprotocol Label Switching (MPLS) is a versatile solution that addresses the problems faced by present-day networks-- speed, scalability, quality-of-service (QoS) management, and traffic engineering. MPLS can exist over existing Asynchronous Transfer Mode (ATM) and frame-relay networks.

MPLS provides a means to map IP addresses to fixed-length labels used by different packet-forwarding and packet-switching technologies.

Data transmission occurs on LSPs (Label Switched Paths) which are a sequence of labels at each node along the path between the source and the destination.

MPLS is a forwarding scheme. In the OSI seven-layer model, it lies between Layer 2 and Layer 3. MPLS can be used together with DiffServ to provide QoS.

Page 57: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-33

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-33

SIP vs H.323

! SIP and H.323 are call signaling protocols for services over IP

! SIP and H.323 are competing to be the protocol of choice for VoIP

! The main difference between these two protocols is how the call signaling and control is achieved

SIP is an application layer control protocol that can establish, modify, and terminate multimedia sessions or calls. SIP message format is based on on Hyper Text Transport Protocol (HTTP) message format, which uses a human-readable, text based encoding. SIP was developed by the IETF, the Internet Engineering Task Force.

H.323 is a standard that specifies the components, protocols, and procedures that provide multimedia communication services - real time audio, video, and data communications over packet networks, including IP based networks. H.323 was developed by the ITU, the International Telecommunications Union.

Page 58: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-34

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 2-34

IP-Sec

! Most complete security implementation"Tunneling"Encryption"Data Integrity"Authentication

! Included in Windows 2000! Mandatory in IPv6

IP Sec is a security architecture to which any encryption or authentication algorithms can be easily added, as new ones come along. IP Sec will replace the other tunneling protocols currently available.

It provides the most complete network security and supports both remote access and site to site applications.

It is entirely standards based and is mandatory in IPv6. It will also be included in Windows 2000.

Page 59: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 2-35

Lesson 2: Self-Check

1. Describe the 7 layers of the OSI Reference Model.

2. What are the major functions of the TCP and IP protocol layers?

3. Explain the major differences between routing and switching.

4. What benefits will IPv6 provide over and above IPv4?

5. What does a Domain Name Server do and why is it needed?

6. What is a policy-based network and why would you want one?

Page 60: GTCICourse 221
Page 61: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-1

Wireless Intelligent NetworksLesson 3

Page 62: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-2

Objectives

! Define the wireless intelligent network! Examine the evolution of services! Define location-based services! Define prepaid wireless

Page 63: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-3

What is the Wireless Intelligent Network (WIN)?

! The extension of wireline IN concepts to the ANSI-41D based wireless network

! Separates service logic and/or feature functionality from the wireless network switch and distributes that functionality

! Specifications of the Telecommunications Industry Associations (TIA) WIN Task Group (TR 45.2.2.4)

The Wireless Intelligent Network (WIN) is a concept developed by the Telecommunications Industry Association (TIA) Standards Committee TR45.2.

As the wireless industry has grown, so has the demand for multiple services that allow subscribers to handle or select incoming calls in a variety of ways. Cellular subscribers have come to expect services such as caller ID and voice messaging bundled into the package when they buy and activate a cellular or PCS phone.

IN solutions have revolutionized wireline networks. Rapid creation and deployment of services has become the hallmark of a wireline network based on IN concepts. WIN brings those same successful strategies into the wireless networks.

Page 64: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-4

Driving Forces for WIN

! Greater control of wireless network functionality! Faster feature introduction! Flexibility to choose which features are developed! Customized services for subscribers! Competitive solutions from multiple vendors

Because WIN capabilities are located on an off-board server, service creation and customization is a greatly accelerated process. Enhanced services are increasing in popularity. Enhanced services will entice potential customers and drive up airtime through increased usage of personal communications services.

Obviously, the reasons behind WIN are to provide the means for greater control over the services provided by the network. They are implemented and administered in a central location as opposed to individually in each switch.

This allows for faster introduction of the services and makes customization of the services possible for each and every subscriber.

Not only does this provide a competitive advantage but it can also help to lower churn and retain the customer base in addition to providing additional revenue streams.

Page 65: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-5

WIN Requirements

! Flexible distribution of service logic supporting functions"Wireless service provider can choose a WIN

architecture to match network topology! New WIN-based services must coexist with

existing wireless services" “Switch”-based services (e.g., call waiting)"Existing “HLR” based services (e.g., call forwarding)

The main requirements of the WIN architecture are to provide a means for flexible distribution of the service logic. This allows network operators to deploy an architecture that fits their network structure.

In addition, it is important that any new WIN-based services must be able to work with any existing wireless services, regardless of whether they are switch-based or HLR-based.

The goal is to provide a seamless collection of services.

Page 66: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-6

WIN Concepts

! Based on wireline IN concepts"During call processing, switch can detect events

(triggers) at various points where call processing can be interrupted to request IN processing (e.g., at origination or completion of dialing)

"The switch then queries IN service logic for further instructions

"Service logic can be programmed to provide new services

The wireless version of the Intelligent Network is based on the wireline version using the same concepts of trigger detection points (TDPs). The TDPs can be in several different places within the call processing stream, i.e. at origination, at termination or during mid-call.

Page 67: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-7

What is Driving the Evolution of Wireless Services?

! Global mobility and Internet growth: two exploding phenomena

! Untapped opportunity to offer Internet and IP services to a growing base of advanced wireless subscribers and mobile workers

Sources: Strategis, Yankee Group

US Wireless106M+ subscribers in

200043 million mobile workers

in the U.S.Data today: less than 2%

of all wireless traffic; by 2002: 23% of traffic

13 years to achieve 25% penetration

InternetApproaching 150 million

users39% of US Internet users

want wireless access75% of laptop users

have wireless phones7 years to achieve 25%

penetration

The phenomenal growth in wireline Internet subscribers points to the possibility of wireless operators capturing some of this market, provided they can offer comparable price-performance.

The two technologies are rapidly merging as wireless subscribers who have been educated to the wonders of data through their wireline Internet experience now desire to make it mobile. On the flip side, wireline Internet subscribers who also tend to have mobile phones now wish to have data on their phone.

The common underlying characteristic by both is the drive to take their world with them, wherever they go.

Page 68: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-8

WIN Architecture Elements

I P

SSP SCP

SSP

SN

ServiceSubscriber

ServiceSubscriber

IS-41 Signaling

Voice Channel

Service Switching Point (SSP)Major function of the SSP is to detect events during call processing, called triggers, that indicate an IN call eventAfter triggering, the SSP suspends call processing and starts a series of transactions with the SCP to determine the handling of the call

Service Control Point (SCP)Real-time database and transaction processing system that provides service control and service data functionsPerforms subscriber or application specific service logic in response to a query from SSP and then sends back instructions to perform specified functions and how to continue call processingProvides mechanisms for introducing new services and customizing services and features

Intelligent Peripheral (IP)Performs specialized resource functions such as:

Playing announcementsCollecting digitsSpeech recognitionRecording and storing voice messagesFacsimile services...

Under the control of service logicService Node (SN)

A programmable network node that allows the service provider to create new circuit related servicesProvides both service logic processing and call terminations for specialized resource functionsCombines capabilities of SCP and IP

Page 69: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-9

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-9

A Simple Intelligent Network Service

313-456-6789 RingsDials 1-800-333-4444

12

3

4

56

7

SSP SSP

STP

SCP

Uses Global Title Routing to reach

the SCP

Uses Global Title Routing to reach

the SCP

Translates the 800 number to a DID

Translates the 800 number to a DID

Triggers the SCP for routing

instructions

Triggers the SCP for routing

instructions

A simple example of an intelligent network-based service is when a subscriber dials an 800 number. The originating SSP is triggered off of the 800 number to send a signaling message (TCAP) to the SCP. The message is routed through one (or more) STPs before it reaches the SCP.

Once the SCP receives the message, it decodes it and follows the service logic for that particular number. In this case, the logic is a simple number translation that provides the real direct dial number. That number is returned to the originating SSP.

At that point, the originating SSP then proceeds to setup the call with the terminating SSP.

Page 70: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-10

! Network Roaming Gateways are interworking nodes between ANSI-41 and GSM MAP networks

! They can receive ANSI-41 messages from an ANSI-41 network and invoke the corresponding GSM MAP operations towards GSM-based networks

! They can receive GSM MAP messages from a GSM network and invoke the corresponding ANSI-41 operations towards ANSI-41 based networks

! Eventually, they will evolve to support SIP, H.323

Network Roaming Gateways

Due to the widespread deployment of GSM and IS-41 networks, the need for interworking between them has become more prevalent than ever. Roaming gateways and conversion nodes provide a translation function between the networks allowing subscribers to roam from one network to the other and vice versa.

The contain the message sets of both networks and map corresponding messages prior to transmission within the network.

Today, most of these nodes provide GSM to IS-41 translation but they are evolving to include support for SIP and H.323 translation functions as well. This will be a critical element in the all IP network.

Page 71: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-11

STP 1 STP 2

ANSI-41 HLR

!Appears as an ANSI-41 HLR to the ANSI-41 MSC!Appears as a GSM HLR to the GSM MSC

!Appears as an ANSI-41 MSC to the ANSI-41 HLR!Appears as a GSM MSC to the GSM HLR

!Appears as an ANSI-41 HLR to the ANSI-41 MSC!Appears as a GSM HLR to the GSM MSC

!Appears as an ANSI-41 MSC to the ANSI-41 HLR!Appears as a GSM MSC to the GSM HLR

GSM HLR

GSM MSC/VLR ANSI-41 MSC/VLR

STPSTP

VLR MSC VLR MSC

Network Roaming Gateway

The network roaming gateway sits in between the two networks but gives the appearance as though it is a regular part of the network. It is transparent in nature and only exists to provide conversions of messages.

Page 72: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-12

A New WIN Architecture

Universal Access

Transport (packet-based

switching & routing)

Call Control Layer

Service Application Layer

Next Generation Network is Focused on Services

Network-Independent service layerNetwork-Independent service layer

Next Generation Network

Interconnection ofvarious technologiesand networks based on open interfaces

Next Generation Network

Interconnection ofvarious technologiesand networks based on open interfaces

The next generation WIN architecture will look quite different from its current form. The networks themselves are evolving to a distinct separation into independent layers.

The access network will provide universal access from any medium or device, wireless access or otherwise.

The transport layer will be a packet-based network of switches and routers communicating via IP over ATM or some other medium.

The call control will be separated from the transport with features being provided from server-based platforms.

And the services and applications layer will be separated from the rest of the network connected via standard open interfaces. These services will be network independent and may be part of the operators network or they belong to a third party independent provider.

Page 73: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-13

Next Generation WIN Objective

Internet

HubRtr

Device independence:User Addressability

user@domain

Device independence:User Addressability

user@domainDevice independence:

RF access providedby wireless NIC

Device independence:RF access provided

by wireless NIC

Access independence:2G, 3G, 802.11,xDSL, cable, ...

Access independence:2G, 3G, 802.11,xDSL, cable, ...

Network independence:Intranet, extranet,

mobile, SOHO

Network independence:Intranet, extranet,

mobile, SOHO

! Mobility based on the User, not the terminal ! Leverage IP/Internet to provide services across:

" Multiple devices" Multiple access technologies" Multiple networks

The next generation of the Wireless Intelligent Network architecture is coupled with the evolution of the network to high speed packet capabilities along with the influences of the Internet.

The services will provide the user with the same look and feel regardless of location (the Virtual Home Environment).

The objective is to deliver personal communications based on:!the user, not the device!supporting multiple forms of access!supporting multiple forms of media!communicate seamlessly with the rest of the world via whatever means

suits the user vs. the user adapting to the means available.

Page 74: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-14

Devices Will be a Key to the Future

!PDA (Personal Digital Assistant)" Wireless connectivity/desktop integration

# Infrared# Bluetooth# PCMCIA devices

$ Sub-laptop / palmtops!Thin browsers

" WAP" Phone.Com " Java 2 micro edition

!Smartphones / Communicators" Symbian (Psion-epoc32)" Microsoft pocket PC" Palm VII; Web clipping" Handspring" Qualcomm PDQ, thin phone

# Wireless knowledge" Neopoint" HP: Jornada - GPRS

!Development environments" Java, J2ME, downloadable applets

Today, the power is in the network. Tomorrow, the power will be shared between the devices (downloadable applets and applications) and the network (personal information manager (PIM) functions stored on the network).

These are some examples of devices that contain the power for future services:

Infrared exists today. Bluetooth will be available in 2000. It is a short distance RF link.

Thin browser: reduced browser functionality.

J2ME: mini Java virtual machine, that will reside in low power devices, like cell phones, credit cards.

Java: Most development of applications is moving towards Java in order to be platform independent.

Page 75: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-15

E-911

Location-Based Services

Information Services

! Location-based news

! Traffic alerts

! Weather alerts

! Traffic on route

! Navigation information

! People finder

! Bargain finder

! Safety

! Roadside assistance

The Wireless location-based services market potential covers all of the current US customer base, and much of the international as well.

The location services market will emerge as follows:!Small, niche market up to year 2001!Europe / North America split $1B market in 2001!US market gated by introduction of E-911!Mass-market from 2001 and beyond

The consumer market for location services will be driven by:!E-911/safety products - highly attractive to mobile subscribers !Strong consumer interest in location-based billing to provide wireline rates

The FCC has mandated that Wireless subscribers be located on 911 calls by 10/1/2001 (handsets begin deployment 3/1/2001).

Page 76: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-16

! FCC E-911 Phase I"April ‘98 deployment"Multiple solutions are available, yet only 3% penetration"Barriers to deployment have been identified by

the FCC, CTIA, Public Safety and the industry as#Lack of Liability Protection for the Wireless Carrier#Complicated Cost Recovery

! Widespread concern that Phase II will see even lower penetration rates

! FCC has addressed the cost recovery mechanism "Bill & Keep

! Federal bills passed to provide Wireless Liability Protection

US Federal Regulations

The FCC is making the industry locate mobiles accurately, specifically for 911 calls. Phase II rules have changed to allow for a handset based location solution. Multiple solutions have been available for Phase I since it began deployment on April 1, 1998. Yet, there has been only a 3% penetration of the Phase 1 cell/sector based location service.Reasons for this have been identified as:

The PSAPs (Public Safety Answering Points) did not want cell/sector location accuracy. Lack of liability protection for wireless carriers.Complicated cost recovery.

The secret service and public safety personnel are anxious to get this service.

The FCC ruled for “Bill & Keep” for Wireless & Wireline carriers in the US. PSAPs will continue to have to demonstrate that they have adequate cost recovery & can technically receive the location information before they can request service of the Wireless Carriers. Wireless/Wireline carriers will have to bill for their own revenue/cost recovery separately in those states/legislatures that have not already provided for their cost recovery.Everyone is trying to figure out how to pay for the location capability, what consumers want and are willing to pay for.

Page 77: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-17

Changed E-911 Phase II Rules

ServingCell

NeighborCell # 2

PDE

PDE

PDE

NeighborCell # 1

Accuracy requirements:" 100 meters, 67% of calls" 300 meters, 95% of calls

Penetration allowed over an 18 month period and must begin by October 1, 2001, following a PSAP request:" 50% within 6 months" 100% within 18 months

Accuracy requirements:" 100 meters, 67% of calls" 300 meters, 95% of calls

Penetration allowed over an 18 month period and must begin by October 1, 2001, following a PSAP request:" 50% within 6 months" 100% within 18 months

Network-based Solution Requirements

Lets look at the new FCC rules, which were published in September of last year, as they represent the industry adopted location requirements.

The FCC has revised it’s original ruling on Phase 2 of the 911 bill to allow for a handset based location determination solution in addition to the originally specified network-based solution. A handset solution can take advantage of the extremely popular, widely available and highly accurate Global Positioning System (GPS).

For a network-based solution, the requirements did not change much from their original specifications. The accuracy requirements have remained 100 meters for 67% of the calls and 300 meters for 95% of the calls.

What was added to the original requirements is the timeframe for when the capability must be available. Deployment must still begin by October 1, 2001 but the coverage rate will depend on when (and/or if) a PSAP makes a request to support the phase II requirements.

The only technology that is widely deployed in wireless networks today is cell & sector information. This scheme is used to meet Phase 1 E-911 emergency service requirements in the USA, wireless office location specific billing applications and some location-specific information request services.

Page 78: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-18

Changed E-911 Phase II Rules

Accuracy requirements:" 50 meters, 67% of calls" 150 meters, 95% of calls

Penetration allowed over a 4 year period, but must begin by March 1, 2001:" 50% activated handsets Oct. 2001" 95% activated handsets Oct. 2002

If PSAP requests, 100% of new activated handsets must be location capable within 6 months

Fall back is Phase I accuracy for roamers and non-location capable mobiles

Accuracy requirements:" 50 meters, 67% of calls" 150 meters, 95% of calls

Penetration allowed over a 4 year period, but must begin by March 1, 2001:" 50% activated handsets Oct. 2001" 95% activated handsets Oct. 2002

If PSAP requests, 100% of new activated handsets must be location capable within 6 months

Fall back is Phase I accuracy for roamers and non-location capable mobiles

ServingCell

NeighborCell # 2

PDE

PDE

PDENeighborCell # 1

Handset-based Solution Requirements

The revised ruling for E-911 Phase II requirements expanded the options of possible methods that an operator can choose to deploy location capabilities. By allowing handset-based solutions, the FCC has provided the springboard for generating the location accuracies needed for commercial services to be viable. But the requirements are more stringent than for the network-based solution.

Handset deployment must begin in the US on March 1, 2001, regardless of PSAP requesting the service. Penetration is allowed over a 4 year period, initially only on “activated” handsets, then eventually covering the entire subscriber base, with a clause phrased, “available best practices,” are used to convert all subscribers to be location capable handsets. This frees the wireless carrier of concern for roamers and legacy mobiles.

Handset-centric technology solutions include the Global Positioning System (GPS), overlay triangulation technologies based on timing or angle of signal transmission and reception at the handset (E-OTD, TOA) and Cell & Sector information.

The location accuracy requirements mandated for handset deployments imply the use of differential GPS technology.

Page 79: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-19

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-19

Location Determination Requirements

! Locating a mobile has three basic requirements:" Measuring the Time of Arrival (TOA) or Angle

of Arrival (AOA) between some fixed point and the mobile" Triangulating the TOA from a minimum of three points

of reference (more points of reference provide a higherdegree of accuracy)

" Clear Line of Sight and a strong signal

! Wireless (Cellular & PCS) RF Networks are built anddeployed based on voice & data mobile requirements:" Reduce co-channel interference using such things as power

control and antenna down-tilting" Capacity coverage to deliver the voice & data to those

areas that require it (but not always 3 cells all the time)

What are the requirements of locating a mobile unit:!A way to measure either the time difference of arrival or angle of arrival between some

fixed point and the mobile is needed.!Then, a minimum of three points of reference in order to triangulate the TDOA in order

to determine the mobile’s location is needed. !More points of reference will provide a higher degree of accuracy, while less points of

reference will degrade location accuracy. A strong signal will facilitate increasing the available points of reference.

!A Clear Line of Sight will facilitate higher accuracy's by reducing error which may be introduced by signal bounce and interference.

Cellular and PCS networks have been built with very different Voice & Data requirements like:!Reduce cellular interference levels among adjacent cells by using various techniques

such as power control, antenna down tilting, and frequency use planning.!In order to provide coverage designed to deliver just enough capacity for consumers

communications requirements, not to provide hear-ability to 3 or more cells from everywhere in the network..

Page 80: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-20

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-20

Time of Arrival Method

!Each Location Measurement Unit (LMU) measures time-of-arrival of handover access bursts from mobile, sends data to SMLC. LMU’s must be synchronized (GPS receiver integrated).

!SMLC performs position calculation by triangulation, given LMU coordinates!MS has no new functions to perform

WirelessNetwork

GMLC/SMLC

Time stamped TOA information transmitted to the network

LMU LMU

Absolute time information provided by the LMU

Time of Arrival information collected by the LMU

GPS Sync

LMU11

22

33

NetworkBased

NetworkBased

In the Time Of Arrival (TOA) method of positioning, a Location Measurement Unit (LMU) resides next to each base station. It is the job of the LMU to perform the measurement of the mobile based on a forced handover.

This measurement data is then sent to a Serving Mobile Location Center (SMLC). The SMLC receives all of the measurements from the various LMUs and calculates the position based on a triangulation of themeasurements.

The mobile does not have to do anything new or different. Therefore, this method will work with any legacy handset currently used in the network.

The advantage to this solution is that it will support any and all legacy handsets since it is a pure network overlay.

The disadvantages are that it is expensive (a lot of equipment must be deployed), the accuracy is questionable for commercial services and the signaling load generated on the network could get very high.

Page 81: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-21

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-21

Enhanced-Observed Time Difference

!MS measures difference in time-of-arrival of signals from BTS’s, calculates position by triangulation (given BTS coordinates)

!Function of LMU is to measure clock drift between BTS’s, report them to SMLC!Function of SMLC is to coordinate location request, send assistance info to MS (timing delta’s

from LMU, BTS coordinates)

WirelessNetwork

GMLC/SMLC

Real Time Difference information collected by the LMU

TOA and RTD information transmitted to the network

Time of Arrival information collected by the MS

LMU

LMU

HandsetBased

HandsetBased

11

22

33

The Enhanced Observed Time Difference (E-OTD) method of location is somewhat different than TOA. With E-OTD, the mobile must actually perform some of the calculation. It is the mobile’s job to measure the difference in the time of arrival of the signals from the base stations.

The LMU in this case, measures clock drift between the base stations and provides this information to the SMLC. Here, the LMUs must be synchronized.

The SMLC handles the coordination requests and sends the information to the mobile to assist with the measurements.

The advantage to this solution is that it will be cheaper to deploy than TOA (less equipment) and has been shown to have slightly higher accuracy.

The disadvantages are that it requires modifications to the handset so it will not support legacy handsets already deployed in the network. Also, the accuracy remains in question and may not meet the FCC guidelines.

Page 82: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-22

GPS (Standard Version)

!MS measures signals from 3 satellites to align itself in x,y,z coordinates. MS measures 4th satellite to get accurate time info

!Function of LMU is to measure delta in time between BTS clock, satellite clock. Data is sent to SMLC

!GPS reference receiver (DGPS) provides ephemeris data, satellite navigation data and differential correction data (SA, ionospheric) to SMLC

!Function of SMLC is to provide assistance data to MS (DGPS correction data, satellite ephemeris, timing delta from LMU)

B T SG P S L M U

A S S IS T A N C E

M S + G P S R x

G P S S a t

S M L C

G P S R e f e r e n c eR e c e iv e r

HandsetBased

HandsetBased

In the standardized version of the GPS method of location, the mobile measures the signals from 3 different GPS satellites to determine its coordinates. A 4th signal is used for timing.

The LMU, again synchronized with the network, determines any time shifts between the base stations and sends the information to the SMLC.

A GPS reference receiver is used to provide dynamic data such as any signal correction information to the SMLC.

The obvious advantage to this solution is the degree of accuracy attainable which makes it very well suited for commercial services.

The disadvantages are the requirements on the handset. There is a higher cost and bulky technology (as well as power usage) required to implement a GPS receiver in the handset. Also, GPS does not do well (if at all) inside buildings or in high-rise (multi-floor) buildings.

Page 83: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-23

GPS (Non-Standard Version)

!MS measures signals from 3 satellites to align itself in x,y,z coordinates. MS takes ‘snapshot’ of RF spectrum, performs initial post-processing and provides raw ‘pseudorange’ to SMLC. This requires extra memory, processing power in MS

!GPS reference receiver (DGPS) provides ephemeris data, satellite navigation data and differential correction data (SA, ionospheric) to SMLC

!Function of SMLC is to provide a subset of assistance data to MS (satellite ephemeris, extensive navigation data) and perform final position calculation, given uncorrected ‘pseudoranges’ from MS and differential correction data from the GPS ref. receiver.

B T S

A s s is ta n c e d a tato M S ,p s e u d o ra n g e s toS M L C

M S + G P S R x

G P S S a t

S M L C

G P S R e f e r e n c eR e c e i v e r

No LMU’s RequiredNo LMU’s Required

HandsetBased

HandsetBased

There is also a non-standardized (at least as of today) version of GPS. This version was developed by SnapTrack and is currently being tested and deployed by a number of operators around the world.

The main difference between this version of GPS and the previously discussed version is where the actual calculation is performed.

In the standard version, the mobile performs the calculation based on assistance data provided by the SMLC. In this version, the SMLC ultimately performs the calculation.

As with the standard version, the obvious advantage to this solution is the degree of accuracy attainable which also makes it very well suited for commercial services. Additionally, no LMUs are required in the network which simplifies deployment and lowers the overall cost.

The disadvantages again, are the requirements on the handset. There is a higher cost and bulky technology (as well as power usage) required to implement a GPS receiver in the handset. Also, GPS does not do well (if at all) inside buildings or in high-rise (multi-floor) buildings.

Page 84: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-24

Location Network Configuration

BTS

BTS

LocationCapableHandset

LocationCapableHandset

BSC

Gateway Mobile Location Center (GMLC)

MSC

HLRSS7

Lg

A-Interface

PSAP

SS7

LMU

Serving Mobile Location Center (SMLC)

CommercialServices

Lh

Lb

Ls

Lc

External Client

Just as there are a number of location technology alternatives available for providing location services to mobile subscribers, there are also different network architecture alternatives as well.

There is a network-centric or NSS approach and there is a base station centric or BSS approach. The difference mainly is whether the Location Server (SMLC) is connected to the MSC or to the BSC. There are obvious implications to these network elements but from an architecture standpoint, the deployment of location-enabling components is the same.

The new entities are the Location Measurement Unit (LMU), the Serving Mobile Location Center (SMLC) and the Gateway Mobile Location Center (GMLC).

Page 85: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-25

Wireless Prepaid

Subscriber benefits! Looks and feels like

traditional service! Can use existing handset

and phone number! Flexibility to switch between prepaid

and traditional service! Voucher or credit card payment

options available through customer care or self-serve IVR (Interactive Voice Response)

Operator benefits! Trunkless and switchless! WIN based! Real-time rated network

solution! Lowers subscriber

acquisition cost! Rate plan flexibility

Wireless Prepaid gives subscribers the option of paying for a specified number of airtime minutes, prior to using the serviceWireless Prepaid gives subscribers the option of paying for a specified number of airtime minutes, prior to using the service

Prepaid Wireless is an IN-based solution which lowers operating costs due to removing switch and voice ports. A mid-call trigger allows a call to be taken down when the account balance reaches zero. The prepaidwireless solution also enables roaming, originations, terminations, and vertical services.

Prepaid is expected to be very big in the wireless data world as well. Many subscribers are likely to prepay their data usage.

Page 86: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-26

Prepaid - Who is it for?

! Not just for the credit challenged! Individuals seeking choice, flexibility and control

"Students/teens"Generation Y"Entrepreneurs"Families on a budget"Retirees"Small, medium and large business

! Operators with a multi-segment strategy reaping greatest benefits of prepaid

! Prepaid applications and high speed packet data will have a major influence on 3G networks

Prepaid has been extremely successful in Europe and has been around in GSM networks for a long time.

It has only recently, begun to take off in the US. A lot of the reason for the slow acceptance was the stigma that Prepaid had as a service that was best suited for and only used by those people that could not afford regular cellular service.

This image has changed as more and more people now see prepaid as an alternative plan for managing their spending. Prepaid works well for parents who want to provide a fixed level of cellular service for their teenagers or for anyone that wants to better control their budget for wireless service but still receive all of the benefits that wireless brings.

Page 87: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 3-27

Wireless subscriptions are being dominated by prepaid cards. The phenomenal success of prepaid started in 1996 and will account for half of the worlds’ total wireless subscriptions by 2005

Wireless subscriptions are being dominated by prepaid cards. The phenomenal success of prepaid started in 1996 and will account for half of the worlds’ total wireless subscriptions by 2005

Wireless Subscribers (World): 1996-2005

Source: Ovum, Strategis

0

100000

200000

300000

400000

500000

600000

700000

1996 1997 1998 1999 2000 2001 2002 2003 2004 2005

C ontra ct P re pa id

CAGR Prepaid: 34%

CAGR Prepaid: 34%

CAGR Contract: 10%

CAGR Contract: 10%

Some Interesting World Forecasts

Subs

crib

ers

(000

s)

Much has been publicized about the tremendous growth of Prepaid services around the world. The uptake has been phenomenal in Europe as well as other parts of the world and recently, it has taken off in the US. Although in the US, GSM accounts for a relatively small amount of the wireless subscribers, those same subscribers account for about 60% of the total Prepaid subscribers.

This trend does not appear to be slowing. It is estimated that by 2005, just over half of all new wireless subscriptions will be Prepaid.

Page 88: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 3-28

Lesson 3: Self-Check

1. What is WIN?

2. List some of the WIN requirements.

3. What is the function of a Network Roaming Gateway?

4. What are the two kinds of solutions possible for phase 2 of the E-911 law?

5. List some of the possible applications for commercial location-based services.

6. List some of the different markets for prepaid wireless.

Page 89: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-1

2G Wireless Networks and Services

Lesson 4

Page 90: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-2

Objectives

! Examine the path for the evolution of data! Define the different technology access methods ! Define CSD and HSCSD and differentiate between

the AMPS, TDMA and GSM deployments! Define CDPD and its network elements! Define SMS and its network architecture! Review ESMR

Page 91: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-3

Simple user interfaces, always on, packet service leveraging Internet growthSimple user interfaces, always on, packet service leveraging Internet growth1998 1999 2000 2001 2002

Network EvolutionUbiquitous packetcoverage

CDPD Packet ServiceCircuit Switched Data Interactive Messaging!Low bandwidth (9.6-19.2 kbps)!Delivers variety of data services

GPRS/EDGE/UMTS!Always available packet service!Performance for evolving market!Seamless coverage!144 kbps - 384 kbps – 2Mbps

Data Evolution Path

User AppliancesVoice/Data convergence

WAP, Palm O/S, Win CE, Java

ApplicationsVerticals markets now moving horizontal

Vertical MarketsBusiness Market

Mass Consumer

Market

The evolution of wireless data can be followed along parallel paths. From the network evolution perspective, circuit-switched data, SMS and CDPD have been predominant. This is giving way to high speed packet data such as GPRS. Always available. Eventually, this will lead to even higher speeds through EDGE and W-CDMA.

From the user terminal perspective, voice and data are converging into a single device. Gone will be the days of having to carry separate pagers, mobile phones, PDAs and laptops.

And none of this would matter without applications. There is a spread of vertical markets towards more horizontal that will work with leveraging the growth of the Internet.

CSD can create greater market penetration by enabling expansion beyond vertical markets addressed by previous wireless data services (e.g. CDPD), with the ability to fulfill a broad range of business and consumer needs.

Page 92: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-4

Revenue Generation Options

! Roaming agreements (with competitors)! Creation of partnerships for advertisement offerings! Bundling of services (voice and data)! Leveraging the Internet hype ! Using today’s 2G products as an introduction to

tomorrow’s 3G products (for example, 14.4 kbps for CSD data today, but 144kbps for data tomorrow)

Carriers who institute data services with their subscribers today will create the basis for future data services by initiating familiarization and usage of services and providing sales and support organizations and processes that align with data users’ expectations for quality service. With this foundation, the services, sales, and support will be established and ready to progress as network evolutions enable higher speed access, broader use of existing applications, and new data applications for services expansion.

This also means that, once established, the data application platforms established today (intranet access, client/server, web browsing, messaging), will endure and grow as network capabilities and traffic demands increase. Being established as a data provider in 2G circuit switched networks can provide a competitive edge to leverage investments and expertise for a smooth migration of service delivery via 3G technology through the re-use of existing service application platforms.

Data subscribers are more loyal than voice. Once they have personalized their access terminal interface, and are familiar with using the service, they are less likely to churn to another service provider. During migration, these loyal subscribers may retain revenue production from existing data services, ultimately transitioning to the same or enhanced application services delivered via a 3G network. Concurrently, new subscribers may be sold directly onto the initial 3G carrier bandwidth. The combination of the existing and new subscribers to data services can help realize the true cost savings beyond initial 3G deployment.

Page 93: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-5

Multiple Access Schemes - FDMA

User 1User 2

User 3User 4

User 5

30 KHz

Frequency

Time

Power

Frequency Division Multiple Access

A channel is identified by a carrier frequency

!A channel corresponds to a frequency band and individual channels are assigned to individual users

!The entire bandwidth is divided into different frequency bands or channels which are allowed (on request) to each user

!No user can share the same frequency band at the same time

!Guard bands are maintained between adjacent channels to minimize cross talk between channels

In FDMA, a channel corresponds to a frequency band and we assign individual channels to individual users. So in FDMA, all of the entire bandwidth is divided into different frequency bands or channels which are allowed (on request) to each user.

No user can share the same frequency band at the same time and guard bands are maintained between adjacent channels to minimize cross talk between channels.

In digital wireless systems, users can communicate through channels in full duplex (transmit and receive simultaneously).

There are two categories of full duplex :

1. FDD: Frequency division duplexing which provides two distinct bands of frequencies for every user. The forward band provides traffic from the base station to the mobile, and the reverse provides traffic from the mobile to the base.

2. TDD: Time division duplexing uses time instead of frequency to provide both a forward and reverse link. If the time split between the forward and reverse time slots is small, the transmission and reception of data appears simultaneously to the user.

Page 94: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-6

Multiple Access Schemes - TDMA

!One user (mobile user) takes all the frequency bandwidth but during a precise interval of time

!Different users can transmit or receive messages, one after the other in the same frequency bandwidth but at different time slots.

!Each user occupies a cyclically repeating time slot and a TDMA channel can be thought as a particular time slot that reoccurs every frame

!Provides 3 timeslots using 30 KHz wide channels

Time Division Multiple Access

Frequency

Time

Power

User 1User 2

User 3

User 1User 2

User 3

30 KHz

A channel is identified by a carrier frequency anda Time Slot assignment. The channel is the set of TS intervals used by the communication

TDMA (Time Division Multiple Access) makes better utilization of the radio spectrum than AMPS by allowing multiple users to share the same physical channel. More than one person can carry on a conversation on the same frequency without causing interference.

TDMA accomplishes this by chopping up the channel into sequentially accessed time slices. Each user of the channel takes turns transmitting and receiving in a round-robin arrangement. In reality, only one person is actually using the channel at any given moment, but he only uses it for short bursts. He then gives up the channel momentarily to allow the other users to have their turn.

Channel capacity in a TDMA system is fixed. Each channel carries a finite number of timeslots. Spectral efficiencies vary from one technology to another, but IS-136 provides 3 slots in a channel only 30 kHz wide which means that IS-136 consumes only 10 kHz per user.

Page 95: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-7

Multiple Access Schemes - GSM

!Before GSM, most all public mobile radio networks used analog technologies, which varied from country to country and between manufacturers

!Based on TDMA technology with some differences

!Can use frequency hopping to minimize co-channel interference, multipath and fading

!Provides 8 timeslots using 200 KHz wide channels

Frequency

Time

Power

Global System for Mobile Communications

200 KHz

Since radio spectrum is a limited resource shared by all users, methods were devised to divide the bandwidth among as many users as possible. The method chosen by GSM is a combination of time- and frequency-division multiple access (TDMA/FDMA).

The FDMA part involves the division by frequency of the (maximum) 25 MHz allocated bandwidth into 124 carrier frequencies spaced 200 kHz apart. One or more carrier frequencies are assigned to each base station. Each of these carrier frequencies is then divided in time, using a TDMA scheme.

The fundamental unit of time in this TDMA scheme is called a burst period and it lasts approx. 0.577 ms. Eight burst periods are grouped into a TDMA frame (approx. 4.615 ms), which forms the basic unit for the definition of logical channels. One physical channel is one burst period per TDMA frame.

Page 96: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-8

Multiple Access Schemes - CDMA

Code Division Multiple AccessPower

FrequencyTime

User 1 & 2 & 3 & ...

A channel is identified by a carrier frequency anda code per user

!All CDMA users can share the same frequency channel because their conversations are distinguished only by digital code

!Uses a special type of digital modulation called Spread Spectrum

!Takes the user's stream of bits and splatters them across a very wide channel in a pseudo-random fashion.

!The receiver must be able to undo the randomization in order to collect the bits together in a coherent order

CDMA (Code Division Multiple Access) uses codes rather than timedivision. A CDMA channel is 1.25 MHz in width and all users use this same channel but they are distinguished by codes.

CDMA is a form of spread-spectrum transmission techniques. Instead of using frequencies or time slots, it uses mathematical codes to transmit and distinguish between multiple wireless conversations. Its bandwidth is much wider than that required for simple point-to-point communications at the same data rate because it uses noise-like carrier waves to spread the information contained in a signal of interest over a much greater bandwidth. However, because the conversations taking place are distinguished by digital codes, many users can share the same bandwidth simultaneously.

Old-fashioned radio receivers separate stations and channels by filtering in the frequency domain. CDMA receivers, conversely, separate communication channels by a pseudo-random modulation that is applied and removed in the digital domain. Multiple users can therefore occupy the same frequency band.

Page 97: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-9

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-9

InteractiveMessaging

Voice Gateway

Air Interface Core Network IP Networking & Connectivity

Circuit DataEmail/Web

Caching

Web Browsing (WAP)

MSC

IWFO

ptic

al R

ing:

OC

-3O

C-3

Exp

ress

CX

SMSC

Circuit Switched Data allows dial-up

applications to the Internet and

connectivity to back office enablers such

as WAP

Circuit Switched Data allows dial-up

applications to the Internet and

connectivity to back office enablers such

as WAP

Today’s Data Solutions - CSD

Packet CoreNetwork

PDN

Back OfficeEnablers

WAPServer

E-mailServer

FaxServer

HLR

Circuit switched data is supported by AMPS technology, TDMA technology, CDMA technology, and GSM technology.

Applications and services vary depending on the network but all offer some form of circuit switched data capabilities providing anywhere between 9.6 kbps and 14.4 kbps speeds.

An Interworking Function (IWF), basically a bank of modems, is used to connect the wireless subscriber to the data network.

Page 98: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-10

Market Applications for CSD

CSD Data Services

E-mail

Fax Over IP

Remote Data Base Access

Corporate Intranet Access

Wireless Internet

Smart Phones

Telemetry

Field Service / Sales

In today’s digital mobile networks, data is delivered via circuit switching capabilities, inherent to the current network architecture. Circuit switched data is a dialed up dedicated connection for transfer of data between two points (i.e. server/client, LAN or application host/PC). As proven by the market success of AT&T’s Digital PocketNet service and Sprint PCS’ Wireless Web, access to the Internet from mobile devices is not only available, but highly desirable without waiting for higher bandwidth solutions of 3G wireless networks.Operators can offer subscribers the ability to send digital data across their digital network. Key applications that can be used by CSD functionality include the following:

! Wireless Email Access

! Wireless Internet/Intranet Access

! Wireless Fax (non-analog)

! Wireless Database Access

! Wireless File Transfer

! Other Wireless Office applications

Page 99: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-11

The growth in the number devices available for use with wireless data applications and networks is expected to continue. This will likely move beyond typical phones and PDA devices to include wearable communications devices, household systems and appliances, bundled combinations of familiar items in new use, some of them voice activated.

Additionally, CSD may be enhanced through deployment with VPNs for security, and other server-based applications, such as:

! WAP gateways – thin client/server applications that enable text presentation (in WML, Wireless Markup Language) of HDML and/or XML Web sites

! information portals – personalized/customized information access (pull)! E-mail messaging services – Internet and server-based email access! FAX servers – transfer of fax messages to email, delivered via wireless device

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-11

Circuit Switched Data Services

! Digital dial up connection" Dedicated rates of 9.6 & 14.4

kbps" Available on as-needed basis" Connection remains

established during the complete duration of the call

" Same usage increments as voice# Traffic billing (per minute)

! Fax connection" Dedicated rates of 9.6 & 14.4

kbps" Analog and digital fax

capabilities

! Ability to access a variety of services" Transfer large files, faxes " e-mail: complete send and receive " Internet, corporate intranet sites " e-commerce services

! Adds Interworking Function (IWF)" Technology-specific platform" Network Call anchor during wireless

handoffs" Modem/PSTN or LAN/PDN connection

! Server-based service enhancements" VPN and WAP

Page 100: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-12

What is AMPS CSD?

T1/E1

MTX

Cell Site

Circuit Data

In AMPs technology, one user is allocated a duplex 30 kHz traffic channel for voice or data.In AMPs technology, one user is allocated a duplex 30 kHz traffic channel for voice or data.

PSTN

AMPS circuit switched data is relatively easy to implement. One 30 kHz channel is required for the data transmission. The modem is located within the mobile station, and it converts the digital output to analog before the information is transmitted over the analog channel.

Page 101: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-13

What is TDMA CSD?

IWF

T1/E1

MTX

Cell Site

T1/E1 Async. Data/Fax

TDMA Circuit Switched Data provides Asynchronous Data and Fax data services to digital mobile users. Current speeds range between 4.8 and 14.4 kbps.

TDMA Circuit Switched Data provides Asynchronous Data and Fax data services to digital mobile users. Current speeds range between 4.8 and 14.4 kbps.

PSTN

Currently, TDMA data supports data rates between 4.8 and 14.4 kbps for CSD and fax. TDMA CSD requires a new element be added to the network, the Interworking Function or IWF.

A CSD session is initialized through call set-up by the end user. Once established the call creates a dedicated circuit for the duration of the call. This means the connection will remain established whether or not there is traffic on the circuit, unless one of the systems in the connection disconnects based on some mode of time-out parameters.

Page 102: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-14

Functional Architecture

Data HandlingRadio Link Protocol 1 (RLP1)

Call ControlIS41

IWF SignalingMobilityBilling

PSTN Support

Data HandlingData Network Interface

MobileData Path

PSTN PATH

IS41+

Signaling Path

CellSite

MTX IWF

PSTNHLR

MTXCall Control

Provides the call processing necessary to set up a data call, allocate resources, and monitor the status of the call for error or termination situations.

IS41Protocol which allows inter-MSC roaming.

IWF SignalingProvides the messaging interface necessary to set up a data call on the IWF, allocate IWF resources, and monitor the status of the call for error or termination situations.

MobilityProvides mobility to the data user w/o knowledge of the mobility occurring on the IWF. This includes inter and intra system handoff.

BillingCollects information to be stored in the CDR record that indicates the service capabilities given to this call.

PSTN SupportProvides all the signaling and interfacing required to deliver and receive calls from the PSTN.

Page 103: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-15

Functional Architecture (cont.)

Data HandlingRadio Link

Protocol 1 (RLP1)

Call ControlIS41

IWF SignalingMobilityBilling

PSTN Support

Data HandlingData Network

Interface

MobileData Path

PSTN PATH

IS41+

Signaling Path

CellSite

MTX IWF

PSTNHLR

IWFData Handling and Data Network Interface

Terminates protocol stacks which ensure data integrity between the mobile and the IWF. For circuit-switched calls, data is exchanged between the terminated protocol stack and a modem which is connected through the MTX to a PSTN trunk.

BSCData Handling and Radio Link Protocol

Terminates the over-the-air portions of the protocol stacks, and packages the data in ISLP frames for delivery to the IWF.

HLRStores subscriber usage privileges and IS-41+ profile used to screen and control data service and access characteristics on call originations and terminations, e.g. 9600 bps access only.

Page 104: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-16

CSD IWF (Internetworking Function)

! The main function of the IWF is to provide an interface between the digital traffic in the cellular network and the traffic in the connecting landline network (PSTN)

! It translates the protocols, signals, and data for these dissimilar networks so they can communicate with each other IWF

All wireless CSD implementations use an Interworking Function. The data is carried digitally to the IWF and then converted to digital Pulse Code Modulation (PCM) before transmission into the PSTN. The IWF is used to:

! Serve as the protocol translator from the digital airlink format to the landline fax and data modem pool protocol;

! Interface directly with the mobile switch for all IWF inbound and outbound traffic;

! Provide synchronization and buffering so that the user terminalsappear to have a single seamless connection between them;

! Anchor a PSTN call for the duration of the call and is unaware of mobility for a circuit switched call, ensuring service continuity.

To communicate with the PSTN, the IWF contains its own modem pool that uses V.Series modem protocols.

The IWF is a peer of the MTX. It is not integrated with the MTX, but rather is anchored to it.

Page 105: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-17

What is GSM CSD?

Mobile

GSM Circuit Switched Data provides 9.6 kbps Asynchronous Data and Fax data services to digital mobile users.

GSM Circuit Switched Data provides 9.6 kbps Asynchronous Data and Fax data services to digital mobile users.

PSTN

HLR

GatewayMSC/VLR

VisitedMSC/VLR

BTS

IWE

E1

CSD in GSM works the same way as it does in TDMA. In order to interface to the PSTN, GSM CSD also requires a new element be added to thenetwork, the Interworking Element or IWE.

A CSD session is initialized through call set-up by the end user. Once established the call creates a dedicated circuit for the duration of the call. This means the connection will remain established whether or not there is traffic on the circuit, unless one of the systems in the connection disconnects based on some mode of time-out parameters.

Current data communication services over GSM generally allows transferring files or data and sending faxes at 9.6 kbps.

Page 106: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-18

High Speed Circuit Switched Data

AbisUm A

!16 kbit/s channel

!Full rate channels or timeslots per TRX

!1 circuit, maximum 64 kbit/s

New frame coding & channel combining

IWF

PSTN

Internet

PDN

PLMN

Supports up to 56 kbps data rates by combining multiple timeslots.Supports up to 56 kbps data rates by combining multiple timeslots.

High Speed Circuit Switched Data (HSCSD) is a new high speed implementation of GSM data techniques.

It will enable users to access the Internet and other data communication services via the GSM network at considerably higher data rates than at present.

With HSCSD the user will find wireless connection to the Internet much faster at 56 kbps (effective rate), which is up to four times faster than today's standard usage. This is accomplished by allocating up to eight time slots to a single user.

This is comparable to the transmission rates of usual modems via fixed telephone networks today.

Page 107: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-19

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-19

HSCSD Characteristics

!Providing higher bandwidth to subscriber"Up to 56 kbps by channel combining"14.4 kbps per channel by new channel coding scheme

!Efficient and flexible use of higher bandwidth possible!Basis for new services and applications!Supporting transparent and non transparent

transmission mode!Data compression in non transparent case!Supplementary services available

For the end-user, HSCSD facilitates a number of new applications for wireless communications. It will speed up web browsing and file transfer. HSCSD also makes it possible to access the Internet and view pages with heavy graphic contents. In addition, users can also take advantage of the higher speeds in accessing corporate LANs and corporate Internets/Intranets.

Since HSCSD has very good real-time capabilities, video conferencing is possible and an efficient way to hold meetings.

Page 108: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-20

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-20

GSM Data

E-mail downloadFax(Internet access)

GSM Data

E-mail downloadFax(Internet access)

SmartMessaging

BankingTraffic info & guidanceNewsWeatherTicket orderingInfo- & Entertainment-

ServicesFleet management

SmartMessaging

BankingTraffic info & guidanceNewsWeatherTicket orderingInfo- & Entertainment-

ServicesFleet management

HSCSD

File transferCorporate accessOnline e-mailReal-time applicationsE-cash & paymentsAudio & video on demandVideo surveillance services

(e.g. taxi, money transport)Remote healthcare

GPRS

InternetIntranetE-mailScheduler AccessRemote controlMonitoring

GPRS

InternetIntranetE-mailScheduler AccessRemote controlMonitoring

UMTS - 3rdGenerationpersonal, wirelessmultimedia

UMTS - 3rdGenerationpersonal, wirelessmultimedia

WAP / WMLHTTP / HTML

HSCSD Positioning

HSCSD provides a large middle ground of service capability. With close to 56 kbps data speeds, most of today’s applications can be supported. Couple that with the relative ease to deploy HSCSD and makes it an attractive alternative for wireless data.

Page 109: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-21

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-21

Operator Consequences

!Network Elements"No new network elements required

!Network Planning"Higher resource consumption per subscriber requires

higher capacity"New channel coding 14.4 kbps requires higher coverage

!Network Features"Support higher user rates"Reduce administration effort by integrating general

bearer service

For a mobile operator HSCSD is very easy to implement and rollout as it is designed for the existing GSM infrastructure. Since HSCSD mainly requires software upgrades, it requires limited investment.

This makes HSCSD an ideal preparation tool for future wireless data communications services by educating the operators and the end users on the advantages of higher speed data services.

Page 110: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-22

$ Available today and offers approximately four times higher bandwidth than other circuit switched data services. It is comparable to the standard wireline network connection

$ Requires minor network upgrades. No new network elements are required.

$ Billing principles are already implemented in the network and well accepted by customers

$ Well defined QoS and can thus be used to address the high end user market segment

HSCSD: Pros and Cons

% Still circuit switched (the network load is not as efficiently handled as with GPRS), therefore always on service is difficult

% Not the best service to address the mass market with

As is evident, HSCSD has more positives than negatives when it comes to network implementation. It is a technology that is available today and is simple to implement. This can provide a quick competitive advantage to begin offering higher speed data services.

The down side to HSCSD is that it is still circuit-switched technology and as the world is moving toward packet-based, subscribers (and operators) are hesitant to invest in it. Due to the uncertainty of HSCSD, terminals that support the technology have not been available either.

These issues coupled with the close proximity to GPRS will make it difficult for HSCSD to gain any mass acceptance other than with specific markets.

Page 111: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-23

CDPD Coverage Map

CDPD has been deployed in over one hundred U.S. cities. Today, it is available to 55% of the US population. There has been a cumulative industry capital investment of over $500 million. Internationally, CDPD has been deployed in: Canada, New Zealand, South America, and Asia.

CDPD has been used for telemetry, wireless credit card validation, wireless ATM, intelligent farming, remote monitoring of inmates, dispatch, and many other applications. The challenge has been finding end-to-end solutions.

Page 112: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-24

CDPD Characteristics

! Throughput - up to 19.2 Kbps! Low Cost - Overlay to existing voice network! Shares channels with AMPS! High Quality Data Transmission! Market Penetration - 55% of the U.S. population! Supports existing protocols (IP, CLNP,TCP)

CDPD offers data rates of 19.2 Kbps in an ideal situation. In reality, you will see about 12 Kbps on the forward channel and 8 Kbps on the reverse. The throughput is less on the reverse channel because you have multiple Mobile End Systems (M-ESs) competing for the same RF channel.

CDPD is an overlay to the existing voice network; therefore, it is a low cost solution. CDPD has been implemented in AMPS/TDMA and AMPS/CDMA systems.

Page 113: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-25

Air InterfaceCore Network IP Networking &

Connectivity

Circuit DataEmail/Web

Caching

InteractiveMessaging

Web Browsing (WAP)

MSC

IWFO

ptic

al R

ing:

OC

-3

SMSC

CDPD is an “always on” 2-way

connectionless pipe allowing utilization of existing back office

applications

CDPD is an “always on” 2-way

connectionless pipe allowing utilization of existing back office

applications

Today’s Data Solutions - CDPD

Voice Gateway Packet Core

Network

PDN

Back OfficeEnablers

WAPServer

E-mailServer

FaxServer

HLR

MDBS

MDIS

IS

CDPD

CDPD provides additional services and applications. CDPD overlays the existing voice network; therefore, it is a low cost implementation.

Since it is an overlay network, CDPD requires different infrastructure as well as different terminals but can provide data services as fast as 19.2 kbps.

Nationwide networks have been deployed and offer a number of services. Some of the more popular uses of CDPD are for law enforcement communication between patrol cars, remote meter reading for utility companies and point-of-sale (POS) terminals like credit card readers at department stores.

Page 114: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-26

CDPD Network Overlay

MTX

Voice

M-ES

Cell Site

Voice transceivers

MDBS

MDIS

Voice

CDPD is designed to overlay the existing voice network so that the data network doesn’t interfere with the voice networkCDPD is designed to overlay the existing voice network so that the data network doesn’t interfere with the voice network

PSTN

PDN

ISIS

F-ESShared

Facilities

CDPD is an overlay to the existing voice network. CDPD radios are housed in the existing radio frame. The Mobile Data Intermediate System (MD-IS) functionality is housed in the MTX and its peripherals. The CDPD system was designed to operate harmoniously with the existing voice network.

The Mobile End System (M-ES) is used to gain access to the CDPD network. An M-ES could be a laptop with a CDPD modem, or it could be a Personal Digital Assistant (PDA), credit card reader, mobile phone, etc. Basically, any wireless device that contains a CDPD modem.

A Fixed End System (F-ES) is usually a host computing platform. For example, in a dispatch application, when a police officer pulls someone over for a traffic violation, the officer is able to communicate with a database to determine if the detainee has a prior record or if the vehicle has been stolen. The database that the officer is communicating with would be considered the F-ES.

The MDBS is the radio. It provides the airlink interface to the CDPD modem.

The MD-IS provides mobility management. It also provides accounting functionality, and access to the “outside world”.

The Intermediate Systems (IS) are routers.

Page 115: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-27

Short Message Service

! Collection of services that provides the capability to receive and send limited-size data messages to your cellular phone

! The terminating end of the network can be a mobile subscriber

! Messages are transmitted using IS-41C standardized encoding

! SMS uses the applicable interface standard to encode messages sent over the air

! Provides the capability to deliver data messaging services over digital and analog interfaces

! Text messaging, numeric paging, alerting or notification information

In North America, SMS was initially made available on digital wireless networks built by early pioneers. In 1998, when the buildout of personal communications service (PCS) networks based on GSM, code division multiple access (CDMA), and time division multiple access (TDMA) methods was completed, SMS enjoyed full-fledged deployment. The point-to-point SMS provides a mechanism for transmitting short messages to and from wireless handsets. The service makes use of a Short Message Service Center (SMSC), which acts as a store-and-forward system for short messages. The wireless network provides for the transport of short messages between the SMSC and wireless handsets. In contrast to existing text message transmission services such as alphanumeric paging, the service elements are designed to provide guaranteed delivery of text messages to the destination. A distinguishing characteristic of the service is that an active mobile handset is able to receive or submit a short message at any time, independent of whether or not a voice or data call is in progress. SMS also guarantees delivery of the short message by the network. Temporary failures are identified, and the short message is stored in the network until the destination becomes available. SMS is characterized by out-of-band packet delivery and low-bandwidth message transfer. Initial applications of SMS focused on eliminating alphanumeric pagers by permitting two-way general-purpose messaging and notification services, primarily for voice mail. As technology and networks matured, a variety of services were introduced, including electronic mail and fax integration, paging integration, interactive banking, and information services such as stock quotes. Wireless data applications include downloading of Subscriber Identity Module (SIM) cards for activation, debit, and profile-editing purposes.

Page 116: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-28

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-28

HLR

Today’s Data Solutions - SMS

Air Interface Core Network IP Networking & Connectivity

InteractiveMessaging

MSC

Opt

ical

Rin

g: O

C-3

OC

-3 E

xpre

ss C

X

SMSC

SMS allows interactive messaging with digital

handsets and is the first step towards the

wireless Internet

Packet CoreNetwork

PDN

Voice Gateway

Short message service (SMS) is a globally accepted wireless service that enables the transmission of alphanumeric messages between mobilesubscribers and external systems such as electronic mail, paging, and voice mail systems.

SMS appeared on the wireless scene in 1991 in Europe, where digital wireless technology first took root. The European standard for digital wireless, now known as the Global Standard for Mobile communication (GSM), included short messaging services from the outset.

SMS has enjoyed huge success in Europe due to this early availability and is still extremely popular with teenagers as a form of communication with friends.

Page 117: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-29

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-29

SMS System View

TAPI/F

TerminalEntry I/F

SMPPI/F

DTMFI/F

TNPPI/F

SMSC

SS7 Link

MSC

Pla

tform

SMSC

Pla

tform

SMS

Appl

icat

ions

PC

Modem Operator Fax

VMS/IVR

Paging

SMS

Syst

emAp

plic

atio

n Sy

stem

T1/E1

MTX

V.35 Link

SS7 Network

MMGWEB /Internet

E-mail

E-mail

WEB /Internet VMS/IVR

TCP/IP Connection

BTSMS

MSC platformThis provides the networking and the mobility functions for delivering an SMS message.

SMS Message CenterThis provides the interfaces to several messaging specific applications.

SMS ApplicationsThis provides different messaging applications such as e-mail inter-working, Web page text entry, and Voice Mail System inter-working (third party software).

Page 118: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-30

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-30

Enhanced Specialized Mobile Radio

1.5 3.0 1.5 3.0

816 MHz

0.5 0.5

866 MHz

A AB BC CUnlicensed

40

Up Link Down Link

175 EAs3 licenses per EA (525 total SMR licenses)

Block A is 1 MHz (Uplink + Downlink) Block B is 3 MHz (Uplink + Downlink) Block C is 6 MHz (Uplink + Downlink)

SMR Spectrum Licenses

The radio frequency spectrum that is used for ESMR is split into paired bands of 10 MHz for the uplink and 10 MHz for the downlink.3 blocks of licenses were issued across 175 Economic Areas (EAs).

SMR was introduced in the USA in 1979 and is designed for closed user group voice services with support for overlay packet data. It operates in the 800 MHz and 900 MHz spectrum and the radio equipment for the two bands are incompatible. There are many local and regional operators but there is only one national operator.

Digital services with data services as a common feature are being used either as proprietary technology from the leading suppliers or following the USA APCO25 standard. ESMR service providers offer both circuit-switched and packet-switched data services.

Another key element of an ESMR network is the time-proven technology of Time Division Multiple Access (TDMA). In the ESMR system, each radio channel uses approximately 25 KHz of radio spectrum and can support 6 separate simultaneous calls.

Page 119: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-31

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 4-31

Major Elements of an ESMR System

Simplified Interconnect and Dispatch Traffic Paths

DAPThe Dispatch Application Processor (DAP) is responsible for the overall coordination and control of dispatch communications. When a subscriber unit is turned on, its identification and location are automatically registered at the DAP and tracked until the unit is turned off. The DAP provides dynamic site allocation which intelligently illuminates only those sites which are required to complete dispatch calls, minimizing precious RF channel usage.MSCThe Mobile Switching Center (MSC) provides the interface between the PSTN and the iDEN network. The MSC is the telephone switching office for all calls that are sent or received by subscriber units. The MSC controls the call set-up and routing procedures by functioning much like a land network switching office. To protect against fraud, the MSC supports advanced security procedures which control access to the radio channels, ensuring that critical identification parameters are never transmitted over the air.MMSMessage Mail Service (MMS) encompasses all the software and hardware required to store and deliver alphanumeric text messages. The MMS is a form of paging that is displayed on the subscriber unit. The subscriber units can store up to 16 messages of 140 characters each.

Page 120: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 4-32

Lesson 4: Self-Check

1. Circuit Switched Data (CSD) is supported by which technologies?

2. Which technology uses High Speed Circuit Switched Data (HSCSD) and how is it different from CSD?

3. Define some applications that can be supported by HSCSD.

4. What applications has CDPD been used for?

5. What is SMS?

6. What is Enhanced Specialized Mobile Radio (ESMR)?

Page 121: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-1

Wireless Applications and Enablers

Lesson 5

Page 122: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-2

Objectives

! Identify current and future wireless data applications! Understand the role of WAP! Understand the role of Bluetooth! Understand XML! Understand the role of Wireless LANs

Page 123: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-3

E-commerce Applications

Top E-Commerce SitesSite '99 visitors* Nov. 00 buyers* Nov. 00 Users*

1. Amazon.com 7,045 3,019 26,3022. eBay 4,674 - 23,7003. eToys.com 2,256 487 5,6344. buy.com 1,907 460 5,9855. Barnesandnoble.com 1,868 554 7,0146. Toysrus.com 1,746 N/A Defunct7. CDNow.com 1,492 466 8,2418. Ticketmaster.com N/A 568 5,1599. walmart.com N/A 313 6,713

10. half.com - 642 10,742* visitors in thousands as of Nov. 30, 2000; Source: PC Data Online

Top E-Commerce SitesSite '99 visitors* Nov. 00 buyers* Nov. 00 Users*

1. Amazon.com 7,045 3,019 26,3022. eBay 4,674 - 23,7003. eToys.com 2,256 487 5,6344. buy.com 1,907 460 5,9855. Barnesandnoble.com 1,868 554 7,0146. Toysrus.com 1,746 N/A Defunct7. CDNow.com 1,492 466 8,2418. Ticketmaster.com N/A 568 5,1599. walmart.com N/A 313 6,713

10. half.com - 642 10,742* visitors in thousands as of Nov. 30, 2000; Source: PC Data Online

Current hurdles:!American e-commerce stores lose $4B revenue per year due to interrupted

downloads or excessive transmission time.The psychological hurdle is about 8 sec. per pageSource: Zona Research ‘99

!Payment security!No interactivity with sales agent

Current hurdles:!American e-commerce stores lose $4B revenue per year due to interrupted

downloads or excessive transmission time.The psychological hurdle is about 8 sec. per pageSource: Zona Research ‘99

!Payment security!No interactivity with sales agent

Somewhere between $12M and $19M spent online during the 2000 holiday season alone Source: eMarketer 2001

Somewhere between $12M and $19M spent online during the 2000 holiday season alone Source: eMarketer 2001

Average annual growth

Average annual growth

Electronic commerce and e-commerce web sites are growing at an enormous rate. The top e-commerce sites are averaging more than 1000% annual growth. This is an astounding figure when you consider that they literally burst onto the scene only a couple of years ago.

IDC Research predicts that the number of people using e-commerce in some form will grow from 60 million today to nearly 200 million within 2 years.

But that doesn’t mean it will be an easy growth. These same businesses are losing tremendous amounts of money at the same. The unpredictability and instability of the Internet disrupts communication transactions adding to the skepticism of the general population. This directly impacts companies bottom line as they fight for the customers.

Although people are still untrusting of these types of purchase and payment systems, more and more of them are accepting the idea as they strive to make their world more mobile.

This is creating the m-commerce world based on e-commerce expectations.

Page 124: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-4

Entertainment and Information

Web TV“AOL and Time Warner are merging the virtual and the real world to AOL Time Warner. TV will vanish in the Web”. Steve Case, President of AOL Time Warner

Web TV“AOL and Time Warner are merging the virtual and the real world to AOL Time Warner. TV will vanish in the Web”. Steve Case, President of AOL Time Warner

Interactive TV with related information

TV broadcast window

Related Web information

Interactive Web TV increases the demand for high speed access

In the future, it is likely that virtually all Internet capable terminals, fixed or mobile, (e.g. PCs, TVs, mobile radios), will support streaming signals. In the long run there may no longer be any TV programs in today’s sense. Instead, the user will gain access to content consisting of a variety of information including streaming broadband multimedia as well as interactive components based on IP.

Already today more than 3,500 Web-based radio stations are active with some providing interactive multimedia content. Because of the low available throughput (e.g. by modems or ISDN) and the lack of QoS, video quality is still fairly limited with regard to picture size and resolution.

The streaming solutions are generally proprietary (RealNetworks, Microsoft, Apple Quicktime...) and, although the decoding SW is normally available for free, this is not the case for the encoding SW.

Every day, new products and ventures are appearing on the market and Web-TV will likely blossom, once most of the shortcomings that are currently limiting the quality over the Internet have been addressed.

Page 125: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-5

Emergency Call

Potential Applications

Remote Control

Stock NewsWeather

Phonebook,Dictionaries

Traffic Tourist Information

Sports ResultsInformation Access

“Pizza” ServiceShopping,Mail Order

Order and Booking ServicesTicket Reservation & Booking

Timetables,Appointments

Unified

Teleworking

Messaging

Entertainment,Games

Phone Services

Teen Messaging

Banking, Brokerage, Payment

Prepaid

The potential applications are virtually endless. Ending with a multimedia device supporting all types of media, they run the gamut covering almost everything we do today.

Basic voice services. Remote control of household devices and Internet-connected appliances. A huge array of information access services such as traffic, weather and stocks.

Emergency services, on-line banking and brokering as well as e-payments. Teleworking and telelearning.

On-line ordering and booking services such as ticket reservations, shopping and restaurant delivery service.

And finally, entertainment. Games such as Trivial Pursuit as well as gambling.

Page 126: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-6

Mobile Information Services

! Interactive services"Fetch information from Internet or Intranet

anywhere, anytime, personalized and scaleable(Pre-trip, On-Trip planning and booking, Weather Info, Stock, News, …)

"Share corporate data (phonebook)! Synchronization Services

"Calendar, common data! Incident Warning

"Traffic alerts, stock alerts

The applications will not only be accessible through new types of media devices such as videophones and personal communicators but through modifications to non-telecom devices.One example of the merging of different conveniences via common applications will be in automobiles, commonly referred to as telematics. Two forms of mobility are coming together that will result in a greatly enhanced lifestyle when on the go.Many of the mobile information services that will be available are well suited for use while driving (or on a boat, for that matter). Location-based information that provides up-to-the-minute status of traffic situations as well as navigation and advertising will be common.One big aspect of these automobile applications will be for comfort, convenience and entertainment. Integrated communication devices will allow for downloading of information (such as games and movies) to the car so that the kids can entertain themselves while traveling. Interactive gaming through keyboards and other input devices will enhance the experience.The first hint at the kinds of applications came from General Motor’s OnStar which provides assistance through customer service, immediately based on your present location. Most other automobile manufacturers are working on integrating telematics capabilities into their cars.

Page 127: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-7

Performance Rating of Applicationsvs Next Generation Standards

Source: KPMG, UMTS Forum

Technology

Data Rates (Kbps) 9.6 14.4 32 64 128 384 2000

Technology Transmit Speed Capability3 G

EDGE

GPRS

2G

= Excellent = Fair = Poor

HSCSD

1XRTT

Voice, SMS

E-CommerceLocation ServicesStill Image Transfer

Video High QualityVideo Lower Quality

Internet Web Database AccessOn-Line Banking

E-mail

Applications Application Performance Rating+-----0---

+ 0 -

+0--0-+00-

++0000++0-

++0++++++0

+++++++++0

++++++++++

++++++++++

So, we have a number of competing technologies and each with an evolution path towards 3G. Let’s look at how they compare for various applications requiring different levels of data rates.

Today’s rates are only sufficient for simple voice and SMS. Some levels of other applications are possible, but not efficient. When we introduce GPRS, we immediately see that most of these applications can be easily supported with sufficient quality to provide commercial services.

In order to support Internet Web browsing and true multimedia services, EDGE and 3G, i.e. W-CDMA will be required in order to provide the necessary high speed bandwidth.

As you can see, many of these applications will not require 3G speeds but in order to offer the real “3G experience”, anywhere, anytime, any media services, all of these applications will need to be supported.

Page 128: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-8

Security/Public Key Infrastructure Services/IN PlatformsSecurity/Public Key Infrastructure Services/IN Platforms

Location PlatformLocation Platform

Payment PlatformPayment Platform

Portal PlatformPortal Platform

Shopping, Gaming & Advertisement PlatformsShopping, Gaming & Advertisement Platforms

Value Added Services, Platforms and Applications

Application Plane

Value Added ServicesPlane

Online/Mobile own/3rd party applications

Any Device

CoreServices

CoreServices

Voice, WAP, WWW, IVR, UM, Fax, SMS AccessServicesAccess

Services

CSD

SMS

GPR

S

EDG

E

UM

TS IP

PSTN

Prepaid/walletrecharge

Prepaid/walletrecharge Restaurant

FinderRestaurant

Finder DirectoryServices

DirectoryServices Mobile

CommerceMobile

Commerce AuctioningAuctioning BankingBrokerageBanking

Brokerage

The value-added services empowered through the next generation wireless network will be the key to its success.

The applications and services will be accessible via any type of device: mobile phone, computer, PDA, etc. Likewise, the bearer used for the access will be independent of the application as well. It could be GSM, TDMA or CDMA. Circuit-switched data, GPRS, EDGE, W-CDMA, IP, etc.

Existing access and core services, such as voice, security, intelligence, will form the base for the new platforms. Portals for location-based services, entertainment, payment, e-commerce will run these applications.

Another key to this new architecture is the open APIs to 3rd party applications and services which may reside within the operators domain or could exist virtually anywhere in this new Internet-connected world.

Page 129: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-9

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-9

Key Functions of a Portal

AccessControlAccessControl ProfilingProfiling Information

ProcessingInformationProcessing ChargingCharging

!AAA Server!RADIUS Server!Firewall!Load control

!Operator specific!User specific

!Filtering!Branding!Personalizing!Presenting

!Prepaid!Postpaid!Payment Broker!3rd Party Transaction

PortalPortal

So, with all of these discussions on platforms, applications and portals, what exactly does a portal do?

In essence,a portal is a doorway to the applications/services. It provides the necessary functions to enable the application.

Access control determines availability to the user through authentication and protects the user as well as the operator from outside effects.

Profiling allows for operators as well as subscribers to set up specific profiles that describe their needs and characteristics.

Information processing handles the content of the services, based on the profiles to filter, personalize and present the info.

And, what good would a service be without the ability to bill it.

Page 130: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-10

Requirements for Legally Binding Communications

IP Network

3. IntegrityGuarantees that information is not tampered with or altered

(3)

1. AuthenticationVerifies the identity of communicating parties Joe

Mary

(1)

(1)

2. PrivacyProtects sensitive information from being viewed indiscriminately

(2)

4. Non-RepudiationInability to deny a transaction

(4)

Hacker

5. Access Control Determines who may have access to information within a system

(5)

In order for transactions to be secure and legally binding over the Internet or other IP-based network, including wireless, certain requirements must be met:

Authentication must be performed to verify the user.

The users privacy must be maintained.

The integrity of the information must be guaranteed.

It must be guaranteed that transactions can be legally enforced.

Access to the information must be controlled.

Page 131: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-11

Secure Communications - Public and Private Keys

! Trusted Third Party (TTP) needs to vouch for individuals’ identities

Private Key(Smart Card, e.g.)

Digital Certificate! Owner Identity! Access Control! Signature Authorization! Public Key Data! Expiry Date! CA Signature

For digital signatures, there are 2 types of keys, public and private.

Public keys are are known on a wide basis and are issued and controlled by the Certification Authority (CA).

Private keys are known only to the operators and users and are in the form of smart cards such as SIM, WIM or USIM.

Need for a Trusted Third Party (TTP) to vouch for individuals’ identities, and their relationship to their public keys. In a Public Key Infrastructure (PKI), this entity is called a Certification Authority (CA).

Page 132: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-12

Wireless Public Key Infrastructure Process Flow

Mobile Subscriber with SIM/WIM (A)

Reliable Party (B)(Subscriber/Application)

CA 3

A

Trusted Center

6 Certificate ok

Certification Authority

Validation System

WTLS Certificate

Binds mobile devices to their certificates

Certificate retrieval and validationOptimized for minimal bandwidth and storage requirements

4Pickup URL:

“da#*+s§$%7?fdga&”

1Pickup URL or Cert ID applicationand proveidentity

WPKI Portal

2 Pickup URL:“da#*+s§$%7?fdga&”

Registration System

Check status and validity A certificate

Pickup URL:“da#*+s§$%7?fdga&”5

CRLX.509

LookupTable

PKI Process Flow:

Step 1. - Subscriber applies to Certification Authority for Digital Certificate.

Step 2. - CA verifies identity of Subscriber and issues Digital Certificate.

Step 3. - CA publishes Certificate to Repository.

Step 4. - Subscriber digitally signs electronic message with Private Key to ensure Sender Authenticity, Message Integrity and Non-Repudiation and sends to Reliant Party.

Step 5. - Reliant Party receives message, verifies Digital Signature withSubscriber's Public Key, and goes to Repository to check status and validity of Subscriber's Certificate.

Step 6. - Repository returns results of status check on Subscriber's Certificate to Reliant Party.

Page 133: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-13

Wireless Networking Landscape

Overall Range

3GVision

Cellular

Packet Data

Latency

LAN(inside-out)

WAN(outside-in)

Real-timeVoice

StreamingMedia

TCP/IPData

PAN(between)

HomeRFVision

Cordless

WLAN

Cable-less WPANBluetooth Vision

Just as applications are enablers for wireless data, so are the myriad of wireless access technologies. Each has its own purpose.

This slide compares different technologies and how they are suited for voice and data compared to their range.

Bluetooth is suited for small, local areas (the so-called Personal Area Network) but it supports the entire range of media applications.

Wireless LAN and Home RF cover a broader physical distance over the same applications but are still limited in coverage.

The Wide Area Network (WAN) is the mobile network operator’s domain.

Each of these areas will be discussed in more detail.

Page 134: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-14

Technology Positioning

! HomeRF "Networking mobile data and voice devices to PCs

anywhere in the home! Home PNA & Power Line

"Networking fixed PCs/devices in the home! Bluetooth

"Wireless data and voice cable replacement for mobile business devices

! 802.11 & OpenAir"Wireless enterprise networking in the office

These technologies will be explored in more detail throughout the course of this chapter.

Each on is positioned to enable wireless data applications through various access techniques and methodologies.

In the end, we will see how our ability to connect and communicate without the aid of wires will fundamentally change our lives.

Page 135: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-15

WAP Definition

“WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat”

Source: WAP Forum

The Wireless Application Protocol (WAP) is an open, global specification that empowers mobile users with wireless devices to easily access and interact with information and services instantly.

WAP services and applications include:

Customer care, call management, unified messaging, weather and traffic alerts, news, sports and information services, electronic commerce transactions and banking services, online address book and directory services, as well as corporate intranet applications.

Page 136: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-16

WAP Beginnings

! In 1996 mobile phone vendors rushing to sell wireless information" Smart Messaging for GSM SMS" HDML & HDTP

! Carriers had split personality" Looking to find added value services

#Bring in more money# Increase customer loyalty

" Ultraconservative#Very concerned about use of bandwidth and network resources#Concerned about investment cost#The Internet is alien and even a scary thing

! Terminal technology very constrained" Low cost critical particularly in the US market" Available spare processing and battery power rather marginal

WAP provides a medium to connect in a secure fast, nimble, online, interactive way with services, information and other users.

WAP, with the wireless industry behind it, provides necessary technology for developers to develop, deploy and support applications for users of wireless devices, which by the end of 2000 will exceed 100 million worldwide. This will result in significant revenue gains for developers.

Content providers can extend their business model to include a huge untapped market of mobile customers.

End users benefit through easy, secure access to relevant Internet/intranet information and other services through mobile phones, pagers or other wireless devices.

With minimal risk & investment, WAP enables operators to decrease churn, cut costs, and increase revenues by improving existing value-added services and offering exciting new information services.

Being a global open specification suite, WAP has generated the critical mass for manufacturers that is opening up new product and marketing opportunities in the wireless industry, providing new revenue to participating companies.

Page 137: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-17

Common New Specification

! Proprietary solutions had limited success in some areas" Being tied to a single vendor unacceptable to carriers and users" User base not large enough to attract 3rd party content and services

! A common specification looked like the solution! What would be the common ground?

" Use of an existing proprietary solution unacceptable to competitors#None of them addressed the all of the possible uses

" True Internet not feasible#Research said that TCP was bad for the envisioned major application#Some carriers not ready to go IP at that point#Terminal manufacturers could not do features using standard Internet

protocols! Necessary to create something new

The WAP architecture was designed to enable standard off-the-shelf Internet servers to provide services to wireless devices. In addition, when communicating with wireless devices, WAP uses many Internet standards such as XML, UDP and IP. The WAP wireless protocols are based onInternet standards such as HTTP and TLS but have been optimized for the unique constraints of the wireless environment.

Internet standards such as HTML, HTTP, TLS and TCP are inefficient over mobile networks, requiring large amounts of mainly text based data to be sent. Standard HTML web content generally cannot be displayed in an effective way on the small size screens of pocket-sized mobile phones and pagers, and navigation around and between screens is not easy in one-handed mode. HTTP and TCP are not optimized for the intermittentcoverage, long latencies and limited bandwidth associated with wireless networks.

WAP has been optimized to solve all these problems, utilizing binary transmission for greater compression of data, and is optimized for long latency and low to medium bandwidth. WAP sessions cope with intermittent coverage and can operate over a wide variety of wireless transports using IP where possible and other optimized protocols where IP is impossible.

Page 138: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-18

Objectives for the Design of WAP

! Only a single new box for operators => WAP gateway" Minimal initial investment" Minimal disruption to existing network infrastructure

! Do not force all the protocol stacks on the Internet to change! Do not force IP on carriers at that point in time (1997)

" WDP & WTP! Keep IP as an option

" Escape hatch for the future! Make sure carriers are willing to run it on existing networks

" Incredible paranoia about protocol overhead! Provide security compatible with limited devices! Make the content work on one-handed devices! Integrate telephony functions

The goals of WAP are:

!Independent of wireless network standard

!Open to all

!Proposed to the appropriate standards bodies

!Scalable across transport options

!Scalable across device types

!Extensible over time to new networks and transports

WAP will also be accessible to (but not limited to) the following:

!GSM-900, GSM-1800, GSM-1900

!CDMA IS-95

!TDMA IS-136

!3G systems - IMT-2000, UMTS, W-CDMA, Wideband IS-95

Page 139: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-19

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-19

Wired InternetWired InternetWired InternetWired Internet

HTMLHTMLHTMLHTMLJ avaScriptJ avaScriptJ avaScriptJ avaScript

HTTPHTTPHTTPHTTP

TLS - SSLTLS - SSLTLS - SSLTLS - SSL

TCPTCPTCPTCP

Wire les s S es sion Wire les s S es sion Wire les s S es sion Wire les s S es sion P rotocol (WS P)P rotocol (WS P)P rotocol (WS P)P rotocol (WS P)

Wire les s S es sion Wire les s S es sion Wire les s S es sion Wire les s S es sion P rotocol (WS P)P rotocol (WS P)P rotocol (WS P)P rotocol (WS P)

Wire les s T ransport Wire les s T ransport Wire les s T ransport Wire les s T ransport L ayer S ecurity (W TLS)L ayer S ecurity (W TLS)L ayer S ecurity (W TLS)L ayer S ecurity (W TLS)

Wire les s T ransport Wire les s T ransport Wire les s T ransport Wire les s T ransport L ayer S ecurity (W TLS)L ayer S ecurity (W TLS)L ayer S ecurity (W TLS)L ayer S ecurity (W TLS)

SMSSMSSMSSMS USSDUSSDUSSDUSSD CSDCSDCSDCSD IS -136IS -136IS -136IS -136 CD MACD MACD MACD MA CD PDCD PDCD PDCD PD PDC -PPDC -PPDC -PPDC -P E tc..E tc..E tc..E tc..

Wireless B earers :Wireless B earers :Wireless B earers :Wireless B earers :

Wire less NetworkWire less NetworkWire less NetworkWire less Network

Internet and WA P ProtocolsInternet and WA P ProtocolsInternet and WA P ProtocolsInternet and WA P Protocols

WML (XML Language)WML S cript

WML (XML Language)WML S cript

IPIPIPIP

Phys icalPhys icalPhys icalPhys ical

Wire les s T ransactio n Wire les s T ransactio n Wire les s T ransactio n Wire les s T ransactio n P rotocol (WTP )P rotocol (WTP )P rotocol (WTP )P rotocol (WTP )

Wire les s T ransactio n Wire les s T ransactio n Wire les s T ransactio n Wire les s T ransactio n P rotocol (WTP )P rotocol (WTP )P rotocol (WTP )P rotocol (WTP )

iD ENiD ENiD ENiD EN

UDP / IPUDP / IPUDP / IPUDP / IPUDP / IPUDP / IPUDP / IPUDP / IP WD PWD PWD PWD PWD PWD PWD PWD P

DynamicDynamicDynamicDynamicProtocolProtocolProtocolProtocol

T ran s lationTran s lationTran s lationTran s lation

Wireless Optimized Protocols

! Runs only on the wireless portion

! Runs on all networks, including IP networks

! Works over SMS! Protocol stack is

optimized for wireless

WAP enables easy fast delivery of relevant information and services to mobile users.

Almost any device can use WAP. Handheld digital wireless devices such as mobile phones, pagers, two-way radios, smart phones and communicators --from low-end to high-end.

WAP is designed to work with most wireless networks such as CDPD, CDMA, GSM, PDC, PHS, TDMA, FLEX, ReFLEX, iDEN, TETRA, DECT, DataTAC, Mobitex.

WAP is a communications protocol and an application environment. It can be built on any operating system including PalmOS, EPOC, Windows CE, FLEXOS, OS/9, JavaOS etc. It provides service interoperability even between different device families.

Page 140: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-20

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-20

WAP Adopts IP to Requirements of Wireless Networks

Internet

Wireless Networks and Phones have specific needs and requirements! Expensive and limited radio capacity! Small displays$ WAP brings Internet applications efficiently to the mobile subscriber

Wireless Networks and Phones have specific needs and requirements! Expensive and limited radio capacity! Small displays$ WAP brings Internet applications efficiently to the mobile subscriber

Wireless Networks and Phones have specific needs and requirements

Wireless Networks and Phones have specific needs and requirements

Copper, fiberCopper, fiber

TCP/IPTCP/IP

HTTPHTTP

HTMLHTML

Internet Protocol

WTLS Wireless Transport Layer SecurityWSP Wireless Session ProtocolWDP Wireless Datagram ProtocolHTML Hyper Text Mark-up LanguageHTTP Hyper Text Transfer ProtocolTCP Transport Control ProtocolIP Internet Protocol WAP Wireless Application ProtocolWML Wireless Mark-up LanguageWTP Wireless Transaction Protocol

Wireless BearersWireless BearersWDPWDPWSP, WTP, WTLSWSP, WTP, WTLSWMLWML

WAP Protocol

WAP Gateway

The WAP Protocol Stack is implemented via a layered approach (similar to the OSI network model). These layers consist (from top to bottom) of:

!Wireless Application Environment (WAE)

The WAE defines the user interface on the phone.

!Wireless Session Protocol (WSP)

A sandwich layer that links the WAE to two session services

!Wireless Transaction Protocol (WTP)

Part of the standard suite of TCP/IP protocols, to provide a simplified protocol suitable for low bandwidth mobile stations.

!Wireless Transport Layer Security (WTLS)

WTLS incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard.

!Wireless Datagram Protocol (WDP)

Allows WAP to be bearer independent by adapting the transport layer of the underlying bearer.

!Bearers (GSM, IS-136, CDMA, GPRS, CDPD, etc.)

Page 141: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-21

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-21

WAP Client:! Supports WAP protocol stack! Provides encoding/decoding! Enables browsing of WAP contents! Enables user interaction with SIM

WAP Client:! Supports WAP protocol stack! Provides encoding/decoding! Enables browsing of WAP contents! Enables user interaction with SIM

WAP Gateway:! Serves as Proxy! Provides Protocol mapping

between standard and WAP protocol! Provides encoding/decoding for efficient transfer of data! Provides access to mobile data bearers

WAP Gateway:! Serves as Proxy! Provides Protocol mapping

between standard and WAP protocol! Provides encoding/decoding for efficient transfer of data! Provides access to mobile data bearers

WAP Server:! Supports standard Internet

protocols! Provides application contents

and scripts in WAP-specific or standard Internet formats

WAP Server:! Supports standard Internet

protocols! Provides application contents

and scripts in WAP-specific or standard Internet formats

WAP Functional Components

WTAServer

WTAServer

WAPGateway

WAPGateway

WAP Server

WAP Server

Wireless Network Infrastructure

Wireless Network Infrastructure

WAP Client

WAP Client

WTA Server:! Located within secure network operator domain! Communicates with client via gateway! Able to 'Push' WAP contents to WAP client

WTA Server:! Located within secure network operator domain! Communicates with client via gateway! Able to 'Push' WAP contents to WAP client

The WAP Gateway provides the bridge between Wireless Networks and the Internet:!Serves as Proxy which fetches the requested data from Internet sites!Provides Protocol mapping between standard Internet and WAP protocol!Provides encoding/decoding for efficient transfer of data bearers!Provides filtering/converting of non-WAP content formats

WAP Servers make the whole world of information and services of the Internet accessible for subscribers using mobile phones equipped with a WAP browser.WAP Clients have to include a WAP browser in order to support WAP based Mobile Services. These Terminals:

!Support the WAP protocol stack!Provide encoding/decoding!Enable browsing of WAP contents!Provide execution environment!Enable user interaction!Support interaction with SIM

The WTA Server hosts specific WAP applications provided by the mobile operator. The Mobile Data Applications Server:

!Is located within secure network operator domain,!Communicates with client via gateway,!Is able to ‘Push’ WAP contents to WAP client,

Page 142: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-22

Microbrowser Optimized for Handsets

! Requires minimal RAM, ROM, display, CPU and keys

! Provides carrier with consistent service user interface across devices

! Provides Internet compatibility! Enables wide array of available

content and applications

Client software designed to overcome challenges of mobile handheld devices that enables wireless access to services such as Internet information in combination with a suitable network server.

WAP was designed specifically with the wireless environment in mind. Limited RAM and CPU in mobile phones was a hard constraint in the development of the protocol.

WAP incorporates no compression techniques for the textual content, although the WML markup commands are compressed. Additionally, the "deck"- the smallest unit of downloadable information in Wireless Markup Language- is limited to a maximum of 1400 bytes. This means that applications need to be specifically designed to be very code efficient by using templates and variables and keeping information on the server and using the cache on the phone.

WAP is compatible with today’s Internet standards enabling a wide array of applications.

Page 143: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-23

WAP Pipe Optimization

Wireless Network<HTML><HEAD><TITLE>NNN Interactive</TITLE><META HTTP-EQUIV="Refresh" CONTENT="1800, URL=/index.html"></HEAD><BODY BGCOLOR="#FFFFFF" BACKGROUND="/images/9607/bgbar5.gif" LINK="#0A3990" ALINK="#FF0000" VLINK="#FF0000" TEXT="000000" ONLOAD="if(parent.frames.length!=0)top.location='http://nnn.com';"> <A NAME="#top"></A><TABLE WIDTH=599 BORDER="0"><TR ALIGN=LEFT><TD WIDTH=117 VALIGN=TOP ALIGN=LEFT>

<HTML><HEAD><TITLE>NNN Interactive</TITLE><META HTTP-EQUIV="Refresh" CONTENT="1800, URL=/index.html">

Internet<WML><CARD><DO TYPE="ACCEPT"><GO URL="/submit?Name=$N"/></DO>Enter name:<INPUT TYPE="TEXT" KEY="N"/></CARD></WML>

010011010011110110010011011011011101010010011010

Content Encoding

HTTP/HTMLWAP

HTTP sends its headers and commands in an inefficient text format instead of compressed binary. Wireless services using these protocols are often slow, costly and difficult to use. The TLS security standard requires many messages to be exchanged between client and server which, with wireless transmission latencies, results in a very slow response for the user.

The WML language used for WAP content makes optimum use of smallscreens and allows easy navigation with one hand without a full keyboard, and has built-in scalability from two-line text displays through to the full graphic screens on smart phones and communicators.

Page 144: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-24

WAP Forum Activities

! More than 500 companies have joined the WAP forum" The first worldwide forum in wireless telephony

! Smart card integration endorsed as major evolution of WAP specifications" Creation of WIM subgroup within WAP Security Group (WSG)" Creation of a Smart Card Expert Group (SCEG)

! WAP specification releases" June 1999 : WAP 1.1

#WTLS layer (transport security layer)" December 1999 : WAP 1.2

#WAP identity module (WIM) # Integration of smart card within WTLS and application security layers

" WML Script Crypto library (application security layer)#Access to cryptographic functions through WML Script

" July 2000: WAP 1.2.1#End-to-end security and support for PKI

The initial Wireless Application Protocol partner companies - Nokia, Ericsson, Motorola and Phone.com (formerly Unwired Planet)- formed a limited company called WAP Forum Limited to administer the global Wireless Application Protocol specification process and get new companies involved in developing the protocol. By April 2000, the WAP Forum had over 250 member companies comprising of phone manufacturers, network operators, SMS Center suppliers and SMS software suppliers, amongst others.

Page 145: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-25

Security Within WAP 1.2

WirelessNetwork

Web ServerWeb

Server SSL

WTLS

WTLS

Web ServerWeb

ServerWAP ProxyWAP Proxy

WAP ProxyWAP Proxy

Wireless Transport Layer Security (WTLS) incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks, privacy on the WAP Gateway to client leg and authentication.

The Wireless Transport Layer Security defines encryption between the Mobile Station and the WAP Gateway. The "endpoint" of the encrypted WTLS data is the WAP Gateway proxy server. To have a secure connection to a content host (e.g. banking server) the Gateway proxy server has to establish secure (https) connections to this host. In this case the proxy server has access to the decrypted data received via WTLS from the mobile station or from the content host via https.

Page 146: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-26

WIM Security Capabilities

! WIM means WAP Identity Module! WIM plays 2 strategic roles for security in WAP 1.2

" Supports client authentication and session management within WTLS layer# Authentication of WAP client

% Storage of private key% Execution of associated public key algorithm% PIN protection

# Storage of CA and user certificates# Generation of session keys

% Secure long-living WTLS sessions" Generation of true random numbers supports digital signature function within

the application security layer# Digital signature of a text string

% Storage of private key% Execution of public key algorithm% PIN protection

# Storage of user certificates

Security is a major concern with WAP due to the fact that some of the key applications and services are e-commerce, e-transactions, e-payments as well as remote services such as access to corporate data and access to corporate networks.

WIM is on the client side and provides protection of private keys.

SIM and WIM functions are on the same smart card.

SIM is the subscriber ID only trusted in the domain of the GSM operator (secret key authentication).

WIM is the subscriber ID trusted in a more wider domain regulated by Certification Authorities (PKI).

Page 147: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-27

XML Objectives

! Extensible Markup Language (XML) describes a class of data objects called XML documents which are stored on computers, and partially describes the behavior of programs that process these objects

! XML is a subset or restricted form of SGML, the Standard Generalized Markup Language (ISO 8879)

! The goal of XML is to enable generic SGML to be served, received, and processed on the Web in the way that is now possible with HTML

! Designed for ease of implementation and for interoperability with both SGML and HTML

XML is a markup language for documents containing structured information.

Structured information contains both content (words, pictures, etc.) and some indication of what role that content plays (for example, content in a section heading has a different meaning from content in a footnote, which means something different than content in a figure caption or content in a database table, etc.). Almost all documents have some structure.

A markup language is a mechanism to identify structures in a document. The XML specification defines a standard way to add markup to documents

Page 148: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-28

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-28

Why XML?

! XML was created so that richly structured documents could be used over the web

! HTML and SGML are not practical for this purpose! HTML comes bound with a set of semantics and does not

provide arbitrary structure! SGML provides arbitrary structure, but is too difficult to

implement just for a web browser! XML isn’t expected to completely replace SGML ! Some of the features XML lacks, make SGML a more

satisfactory solution for the creation and long-time storage of complex documents

XML is designed to make it easy and straightforward to use SGML on the Web: easy to define document types, easy to author and manage SGML-defined documents, and easy to transmit and share them across the Web.

It defines an extremely simple dialect of SGML which is completely described in the XML specification. The goal is to enable generic SGML to be served, received, and processed on the Web in the way that is now possible with HTML.

For this reason, XML has been designed for ease of implementation, and for interoperability with both SGML and HTML.

XML removes two constraints which are holding back Web developments:

!Dependence on a single, inflexible document type (HTML)

!The complexity of full SGML, whose syntax allows many powerful but hard-to-program options

XML simplifies the levels of optionality in SGML, and allows the development of user-defined document types on the Web

Page 149: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-29

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-29

What is XML?

! Developed by the SGML Editorial Board formed under the auspices of the World Wide Web Consortium (W3C) beginning in 1996

! XML customizes SGML in a number of significant ways" First, a specific choice of syntax characters was made so that

everyone using XML will use the same concrete syntax. For example all start tags must begin with "<" and end with ">"

" Second, a new empty-element tag may be used to indicate that this is an empty element and that an end tag is not expected. This new empty-element tag is like a start tag with a slash character just before the closing greater-than angle bracket

" Third, tag omission is not allowed as it is in SGML. This means that each non-empty element will have both a start tag and an end tag

" Finally XML does not require that a Document Type Definition be present

XML is defined as an application profile of SGML. SGML is the Standard Generalized Markup Language defined by ISO 8879. SGML has been the standard, vendor-independent way to maintain repositories of structured documentation for more than a decade, but it is not well suited to serving documents over the web (for a number of technical reasons beyond the scope of this article).

Defining XML as an application profile of SGML means that any fully conformant SGML system will be able to read XML documents. However, using and understanding XML documents does not require a system that is capable of understanding the full generality of SGML. XML is, roughly speaking, a restricted form of SGML.

Page 150: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-30

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-30

Simple XML Document

<?xml version="1.0"?>

<oldjoke>

<burns>Say <quote>goodnight</quote>,Gracie.</burns>

<allen><quote>Goodnight, Gracie.</quote></allen>

<applause/>

</oldjoke>

XML declarationXML declaration

XML contentXML content

XML documents are composed of markup and content. There are six kinds of markup that can occur in an XML document: elements, entity references, comments, processing instructions, marked sections, and document type declarations.

The basic structure is very similar to most other applications of SGML, including HTML. XML documents can be very simple, with no document type declaration, and straightforward nested markup of your own design.

Or they can be more complicated, with a DTD specified, and maybe an internal subset, and a more complex structure. A DTD is a file (or several files to be used together), written in XML, which contains a formal definition of a particular type of document. It sets out what names can be used for element types, where they may occur, and how they all fit together.

Or they can be anywhere between: a lot will depend on how you want to define your document type (or whose you use) and what it will be used for.

Page 151: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-31

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-31

HTML vs. XML

<h1>Byte</h1><h2>March 1998Vol. 23 No.3</h2><h3>ISSN: 0360-5280Publisher:The McGraw-Hill Companies</h3><p>TITLE:Weaving a Better WebAUTHOR(S): Mace, Scott;

Flohr, UdoPAGES: 58-68

<h1>Byte</h1><h2>March 1998Vol. 23 No.3</h2><h3>ISSN: 0360-5280Publisher:The McGraw-Hill Companies</h3><p>TITLE:Weaving a Better WebAUTHOR(S): Mace, Scott;

Flohr, UdoPAGES: 58-68

HTML<SerialInfo><SerialTitle>Byte</SerialTitle><Issue><IssueDate>March 1998</IssueDate><IssueVol>23</IssueVol><IssueNo>3</IssueNo>

</Issue><PubInfo><ISSN>0360-5280</ISSN><Publisher>The McGraw-Hill Companies</Publisher>

</PubInfo></SerialInfo>

<TOC><ID value="5"><ArticleTitle>Weaving a Better Web</ArticleTitle><ArticleAuthor order="1"><Last>Mace</Last><First>Scott</First>

<ArticleAuthor order="2"><Last>Flohr</Last><First>Udo</First>

<PageNo>58-68</PageNo></ID>

</TOC>

<SerialInfo><SerialTitle>Byte</SerialTitle><Issue><IssueDate>March 1998</IssueDate><IssueVol>23</IssueVol><IssueNo>3</IssueNo>

</Issue><PubInfo><ISSN>0360-5280</ISSN><Publisher>The McGraw-Hill Companies</Publisher>

</PubInfo></SerialInfo>

<TOC><ID value="5"><ArticleTitle>Weaving a Better Web</ArticleTitle><ArticleAuthor order="1"><Last>Mace</Last><First>Scott</First>

<ArticleAuthor order="2"><Last>Flohr</Last><First>Udo</First>

<PageNo>58-68</PageNo></ID>

</TOC>

XML

In this example, you can see that HTML and XML are cousins. They draw off the same inspiration, SGML, they both identify elements in a page and they both use a very similar syntax.

The big difference between HTML and XML is that HMTL has evolved into a markup language that describes the look, feel and action of a web page. An <H1> is a headline that is displayed in a certain size, for example.

In contrast, XML doesn't describe how a page looks, how it acts or what it does. XML describes what the words in a document ARE. This is a critical distinction. While HTML combines structure and display, XML separates them. This means that XML documents are more portable and can be used in many different types of applications.

In the near future, there will be both XML and HTML documents used widely. Eventually, XML may even replace HTML, or HTML will become an application of XML.

Page 152: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-32

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-32

What is WML?

! WML is a standard based on the Handheld Device Markup Language (HDML), which in turn is a subset of HTML

! XML allows the document creator to define any set of tags. This set of tags is then grouped into a set of grammar "rules" known as the Document Type Definition, or DTD

! WML follows this convention! If a phone or other communications device is said to be WAP-

capable, this means that it has a piece of software loaded onto it (known as a microbrowser) that fully understands how to handle all entities in the WML 1.1 DTD

! WML predefines a set of elements that can be combined together to create a WML document. These elements can be broken down into two groups: the Deck/Card elements and the Event elements

WML is based on XML, a markup language that has garnered enormous support due its ability to describe data (HTML, meanwhile, is used to describe the display of data...a big difference).

XML is a meta-language defined by the W3C. This means that it is a series of rules for how to create other languages for specific applications. Content is not directly encoded in XML, but in a specific markup language defined using XML. WML is an example of a specific language for wirelessapplications that is fully compliant with XML's rules. WML is thus an XML application.

Page 153: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-33

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-33

WML-Based Applications

! WML was designed for low-bandwidth, small-display devices

! A single WML document (i.e. the elements contained within the <wml> document element) is known as a deck

! A single interaction between a user agent and a user is known as a card

! WML has the ability to dynamically connect to remote servers which opens up every WAP device to the world of Internet messaging, enterprise data, and e-commerce

The applications available for WML are virtually endless. Almost any application written in HTML or similar markup language can be converted to WML.

In addition, any application that can be thought up as a web-based application can also be written in WML in order to format and display on WAP-capable phones.

The possibilities are limited only by one’s imagination.

Page 154: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-34

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-34

Who Was Bluetooth?

Harald Blaatand “Bluetooth” II! King of Denmark 940-981

" Son of Gorm the Old (King of Denmark) and Thyra Danebod (daughter of King Ethelred of England)

This is one of two Runic stones erected in his capitol city of Jelling (central Jutland)

! This is the front of the stone depicting the chivalry of Harald

! The stone’s inscription (“runes”) says:" Harald christianized the Danes" Harald controlled Denmark and Norway" Harald thinks notebooks and cellular phones

should seamlessly communicate (wirelessly)Source: Bluetooth SIG

In 908, King Gorm, the old ruler all of Jutland, the main peninsula of Denmark and his wife Thyre give birth to a son, Harald.

Harald Bluetooth - probably taken from two old Danish words, 'blå' (blue) meaning dark skinned and 'tan' meaning great man.

When Harald was at the height of his rule he created a monument that read:"King Harald raised this monument to the memory of Gorm his father and Thyre his mother. Harald conquered all of Denmark and Norway and made the Danes Christian.”.

These words were carved in stone as rune symbols. Such symbols were also carved onto weapons and jewelry. The Vikings believed they were protected by secret magical symbols on objects kept close to them. During the later Viking age, memorial stones were raised providing a permanent record of rune inscriptions.

Page 155: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-35

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-35

Bluetooth Working Group History

! February 1998: The Bluetooth SIG is formed! May 1998: The Bluetooth SIG goes “public”! July 1999: 1.0A spec (>1,500 pages) is published! December 1999: version 1.0B is released! December 1999: The promoter group increased to 9! August 2000: There are 1,900+ adopters

"Adopters "enjoy" royalty free use of the Bluetooth technology#Products must pass Bluetooth certification

The Bluetooth SIG is a group of companies, led by telecommunications and computing industry leaders, working together to define and promote an open, royalty-free specification for seamless wireless connectivity and cable replacement for a wide variety of mobility-enhancing devices.

The Bluetooth Special Interest Group (SIG), is comprised of companies from the telecommunications, computing, and network industries and is driving development of the technology and bringing it to market.

Page 156: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-36

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-36

Bluetooth Goals

! One of the best low-cost radio link technologies

! Perfect for mobile devices "Small, low power and low cost, but good performance

! Open, royalty free specification

! IEEE Standard (via the 802.15.1 working group)

Bluetooth was designed to be a low cost radio link technology that provides connectivity without cables or wires.

It was designed with mobile devices in mind such as mobile phones, laptop computers, PDAs, etc.

The Bluetooth specifications are open and free to the public to be used for designing products and applications.

The number of members of the Bluetooth Special Interest Group grows larger everyday as more and more companies join the list of developers.

Page 157: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-37

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-37

Bluetooth Vision

! Open specification for wireless data and voice communication

! Technology will be used for short range connections"Transmission of voice and data"Cable replacement between devices"Establishing ad hoc networks

! Specification describes a solution considering requirements for hardware and software interoperability

! Global Standard due to the use of the world-wide available 2.4 GHz band

The vision behind Bluetooth is to develop an open specification for a technology that supports voice and data for short range, I.e. less than 10 meters connections. This allows for the creation of ad-hoc networks as any Bluetooth enabled device can connect to any other like enabled device.

Both hardware and software are considered within the specification to ensure interoperability problems are minimized.

By default, Bluetooth is a global standard since the 2400 MHz frequency range that it uses is available world wide.

Page 158: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-38

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-38

Bluetooth - Integrated Cable Replacement Technology

! Technology targeted at mobile users" Goes where users go (global use, 2.4GHz ISM band, airline safe)" Highly secure (business data)" High capacity (High interference immunity to itself and others)" Integrated feature in notebooks, cell-phones and handhelds (low cost,

very small, low power) " Replace the cables common to mobile devices (short range)

25 mm dia 17x33mm 36x43mm

CompactFLASHCard

First and foremost, Bluetooth acts as a short-range replacement for wired cable connections. But this is much more than infrared capability.

It uses a frequency that is applicable anywhere.

It is secure making it acceptable for business applications.

It has higher capacity than other alternatives and can be easily and cheaply integrated into virtually any device.

Page 159: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-39

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-39

Cable Replacement

! Need for (mostly proprietary and incompatible) cables is obviated

! Linkage to device carried out immediately and maintained even if one of the devices leaves the transmission range

! Transmission range will be at least 10 meters and potentially up to 100 meters

TelephoneNetwork(PSTN)

Data Network (LAN)

Other Devices

Cellular Network(GSM)

TelephoneNetwork(PSTN)

Cellular Network(GSM)

Data Network (LAN)

Bluetooth

Other Devices

CableReplacement

The transmission range between Bluetooth devices is short (less than 10 meters). But with this short range, interference is minimal and the link connections are maintained as devices enter and leave the transmission range.

Not only does this free up the user from being tied to and dealing with physical cabling, but it also eliminates the need for many different types of proprietary cables that are not compatible with each other.

Page 160: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-40

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-40

Ad Hoc Networks

!When one Bluetooth device reaches the transmission range of another, the user is asked for his permission for transmitting or receiving data. Only if he accepts will a connection between thedevices be established. A so called “pico-network” is created.

!Allows point-to-point and point-to-multipoint connections" Enables connections between pico-networks

Personal Ad-hoc Networks

This allows for the creation of ad-hoc networks. As Bluetooth devices come within range of each other, the user is asked if they want the connection to be set up. If it is accepted, then devices begin networking in a pico network.

It is possible to have point-to-point or point-to-multipoint connections thereby providing the capability to join networks together in a network of networks configuration.

The user has total control of what devices should be allowed to connect to the network.

Since any Bluetooth enabled device can be a member of the pico network, users can create their own private and personal network. The sharing of information between devices is made simple.

Page 161: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-41

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-41

Base Station “Access Points” for Voice and Data

!Allows easy and automatic connection of mobile and stationary communication terminals

" In the office, laptop connects automatically (prior authorization assumed) to the installed infrastructure, i.e. LAN or PBX, via a Bluetooth Access Point

" At home, the laptop connects automatically to the Public Network via cellular phone or a PSTN/ISDN Access-Point

" On the move, the laptop can be connected to the Network via cellular phone

!Provides convenient and efficient access to the Internet for surfing, email, etc.

Landline

Another benefit/function of Bluetooth is the establishment of base station access points. The access point is a fixed device connected to the fixed infrastructure but has Bluetooth capability. When a mobile Bluetooth-enabled device comes within range, a connection is automatically established.

This works well for office environments and LAN connections and could be true for cordless phones as well.

Any type of communication, voice or data can be utilized.

Page 162: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-42

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-42

Bluetooth Comparison

Topology Supports up to 7 simultaneous links Each link requires another cableFlexibility Goes through walls, bodies,

clothing, etc.Line of sight or modified environment

Data rate 720 Kbps Varies with use and costPower 0.1 watt active power 0.05 watts active power or higherSize/Weight 25 mm x 13 mm x 2 mm, several

gramsSize equal to range. Typically 1-2meters. Weight varies with length.

Cost Ultimately $5 endpoints ~ $3-$100/meter (end user cost)

Range 10 meters or lessUp to 100 meters with PA

Range equal to size. Typically 1-2meters

Universal Intended to work anywhere in theworld

Cables vary with local customs

Security High, link layer security, SS radio Highly secure (its a cable)

Bluetooth Cable

Bluetooth can support up to 7 simultaneous connections without any cables. The transmission can penetrate through walls and doors without a direct line of sight.

The throughput can be as high as 720 kbps while requiring minimal power.

The technology can be implemented in a very small space and with very low cost.

It can be used anywhere and is highly secure.

Page 163: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-43

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-43

Bluetooth-Enabled Products

! Mobile (and other) PCs! Mobile phones! Handheld PCs! Peripherals products

"Headsets, cameras..."Pointing devices, printers...

! Network access points"A universal bridge to other networks

Virtually any electronic device can be Bluetooth enabled thus providing a connection to other devices. A vast array of companies and products have plans for or have already included Bluetooth connectivity in their products.

In the beginning, mobile phones, laptops and handheld devices (computers, PDAs, etc) will be the first to be Bluetooth enabled.

Following that, other peripheral equipment will follow. Things like printers, digital cameras, headsets, mice, scanners, and backup devices.

Ultimately, computers in appliances and automobiles will join the list creating the possibility to like virtually all of the household devices.

Page 164: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-44

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-44

Wireless LANs.

A flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus.

A flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus.

WLAN radio technology is capable of being used as a complement to a public access network (e.g. UMTS).

WLAN radio technology is capable of being used as a complement to a public access network (e.g. UMTS).

Corporate LAN

WLAN

Public Fixed and/or Mobile

NetworkWLAN

WLAN products are currently used in addition to classical (wired) LANs.

WLAN products are currently used in addition to classical (wired) LANs.

A wireless local area network (LAN) is a flexible data communications system implemented as an extension to, or as an alternative for, a wired LAN. Using radio frequency (RF) technology, wireless LANs transmit and receive data over the air, minimizing the need for wired connections. Thus, wireless LANs combine data connectivity with user mobility.

While most of the wireless LAN networks currently implemented are extensions to existing wired LANs, more and more installations are going completely wireless. Florida Atlantic University in Boca Raton, Florida recently turned on a 100% wireless LAN network for their campus and all professors have laptops with wireless NICs in them.

In the future, WLANs will likely play a complementary role with public Wide Area Cellular Networks. UMTS services will support the mobility for high speed data while WLANs will offer the high speed data for fixed and low mobility environments.

Wireless LANs have gained strong popularity in a number of vertical markets, including the health-care, retail, manufacturing, warehousing, and academia. These industries have profited from the productivity gains of using hand-held terminals and notebook computers to transmit real-time information to centralized hosts for processing. Today wireless LANs are becoming more widely recognized as a general-purpose connectivity alternative for a broad range of business customers.

Page 165: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-45

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-45

WLAN Standards Evolution

IEEE 802.11 FH1, 2 Mb/s

ETSI BRAN H123 Mb/s

ETSI BRAN H29-54 Mb/s

IEEE802.11a9-54 Mb/s

IEEE 802.11 DS1, 2 Mb/s

IEEE 802.11b HR1, 2, 5.5, 11 Mb/s

Proxim OpenAir FH1.6 Mb/s

HomeRF FH1.6 Mb/s

1996

2000

1997

1998

1999

2.4 GHz (BW 80 MHz) 5 GHz (BW 450 MHz)

ETSI BRAN H29-54 Mb/s

IEEE 802.11b HR1, 2, 5.5, 11 Mb/s

IEEE 802.11standard

extensions - tbd

WLAN products

Wireless LAN standardization began in the mid ‘90s on two fronts. Proxim developed their OpenAir frequency hopping standards to be used in the 2400 MHz frequency range. At the same time, ETSI began work on HiperLAN/1 which is a Broadband Radio Access Network specification.

The next year, IEEE came out with their 802.11 specification with two variants, one for frequency hopping spread spectrum and one for direct sequence spread spectrum.

HomeRF joined the fray later with their SWAP protocol.

ETSI is now in the process of standardizing HiperLAN/2 which is the evolution of HiperLAN/1.

Page 166: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-46

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-46

Complementing Wireless Data Communication Solutions

Mbps1 10 1000,1

Out

door

Fixed

Walk

Vehicle

Indo

or

Fixed/Desktop

Walk

Mobility

Wideband Cellular

W-LAN

User Bitrate, Datacom services

BluetoothGSM

, IS-

95, D

-AM

PS

BRAN

Wide Area Network (WAN)- Coverage

Local Area Network (LAN)- Hot spots, high speed

Personal Area Network (PAN)- Connectivity, cable replacement

This slide shows the positioning of the different wireless LAN technologies and shows them in relation to area coverage and applicability. The different systems and technologies complement each other, resulting in a complete system solution for wireless connectivity for tomorrow’s applications and its flexibility of use.

Personal Area Networks (PAN), with very low mobility, point-to-point, and short distance: Bluetooth.

Local Area Networks (LAN), with short range (local) mobility, any point, serving virtually any application needs for connectivity, bandwidth, and QoS: HiperLAN.

Wide Area Networks (WAN), with long range mobility, global roaming, supporting most applications, especially voice but also data communications: UMTS.

Page 167: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-47

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-47

The Wireless LAN Solution

COMMON AREASMEETING ROOMS

TRAINING CENTERSTEMPORARY

OFFICES

CORPORATE CAMPUS

AIRPORTS, HOTELSCONVENTION CENTERS

BUSINESS TOWERS

HOT SPOTS

BRANCH OFFICES

CONNECTIVITY TO CORPFACILITIES, ACCESS FOR

ROAD WARRIORSHOME OFFICE

QUICK CONNECTIONPORTABLE

EASY START-UP

Horizontal Applications:! High speed Internet / Intranet access! Temporary offices, meetings! Fairs, exhibitions

Horizontal Applications:! High speed Internet / Intranet access! Temporary offices, meetings! Fairs, exhibitions

Vertical Applications:! Warehousing and retailing! Industrial applications ! Health care, education

Vertical Applications:! Warehousing and retailing! Industrial applications ! Health care, education

Wireless LAN applications have mainly been used in environments where using conventional PCs and wired LANs have been impractical or almost impossible. These environments include for example warehousing, retail stores, car rental agencies, and other special vertical solutions. The wireless LAN has provided a solution for many administrational problems in hospitals and a flexible connection method to schools and colleges.The following list describes some of the many applications made possible through the power and flexibility of wireless LANs:

! Doctors and nurses in hospitals are more productive because hand-held or notebook computers with wireless LAN capability deliver patient information instantly.

! Network managers in dynamic environments minimize the overhead of moves, adds, and changes with wireless LANs, thereby reducing the cost of LAN ownership.

! Training sites at corporations and students at universities use wireless connectivity to facilitate access to information, information exchanges, and learning.

! Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning.

! Senior executives in meetings make quicker decisions because they have real-time information at their fingertips.

Page 168: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-48

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-48

Wireless LAN PC Card! Each wireless station and access point has a wireless LAN card! Provides an interface between an end-user device and radio waves

Wireless LAN Access Point! Connected to the wired network! Acts as bridge between wireless

and wired network! Enables high-performance

network access

Internet

E-mail server

WWWserver

Radio signal

Security solution

+

FirewallFirewall

How Does a Wireless LAN Work?

Wireless LANs use electromagnetic airwaves (radio and infrared) to transfer information from one point to another without relying on any physical connection. Radio waves are often referred to as radio carriers, because they simply perform the function of delivering energy to a remote receiver. The data being transmitted is superimposed on the radio carrier so that it can be accurately extracted at the receiving end. This is generally referred to as modulation of the carrier by the information being transmitted. Once data is superimposed (modulated) onto the radio carrier, the radio signal occupies more than a single frequency, since the frequency or bit rate of the modulating information adds to the carrier.

Multiple radio carriers can exist in the same space at the same time without interfering each other if the radio waves are transmitted on different radio frequencies. Wireless LANs tune to (or select) one radio frequency while rejecting all other radio signals on different frequencies.

Page 169: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-49

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-49

ISO Model Applied to the LAN World

Physical

Datalink

Network

Transport

Session

Presentation

Application

Medium Access Control (MAC)

Logical Link Control(LLC)

!MAC controls access to the physical channel according to a predetermined set of rules

!LLC provides traditional HDLC type protocol

Main differences:! Radio link unreliable! Higher error rate! Eavesdropping risk! All traffic goes via

access point

Main differences:! Radio link unreliable! Higher error rate! Eavesdropping risk! All traffic goes via

access point

Data Link Control Layer

The Data Link Control (DLC) layer constitutes the logical link between an access point (AP) and the mobile terminals (MTs). The DLC includes functions for both medium access and transmission (user plane) as well as terminal/user and connection handling (control plane). Thus, the DLC layer consists of a set of sublayers:

!Medium Access Control (MAC) protocol.!Error Control (EC) protocol.!Radio Link Control (RLC) protocol with the associated signaling entities

DLC Connection Control (DCC), the Radio Resource Control (RRC) and the Association Control Function (ACF).

Page 170: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-50

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-50

IEEE802.11 MAC Overview

PHY SAP

CSMA/CAChannel Access

Framing

Radio Mgmte.g. Scanning

Shared-keyAuthentication

Addressing

AssociationManagement

Power Management

WEP (RC4) Encryption

Fragmentation& ARQ

MAC DSAPMAC Layer Management Entity (MLME)

IP Packets

ManagementInfo Base (MIB)

!48 bit MAC address!Ethernet compliant!Unique identifier!Multicast &

broadcast support

!48 bit MAC address!Ethernet compliant!Unique identifier!Multicast &

broadcast support

! Radio link QoS! Dedicated real-

time support

! Radio link QoS! Dedicated real-

time support

! Radio link security! Data authentication! Data encryption! Simple scrambling! Peer-to-peer

! Radio link security! Data authentication! Data encryption! Simple scrambling! Peer-to-peer

! Retransmission, error correction

! Retransmission, error correction

The MAC protocol is the protocol used for access to the medium (the radio link) with the resulting transmission of data onto that medium. The control is centralized to the AP which informs the MTs at which point in time in the MAC frame they are allowed to transmit their data, which adapts according to the request for resources from each of the MTs.

The air interface is based on time-division duplex (TDD) and dynamic time-division multiple access (TDMA). Time slots for downlink and uplink communication are allocated dynamically depending on the need for transmission resources. The basic MAC frame structure on the air interface has a fixed duration of 2 ms and comprises transport channels for broadcast control, frame control, access control, downlink (DL) and uplink (UL) data transmission and random access.

Page 171: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-51

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-51

Wireless Ethernet Extension

802.11WLANradio

802.11WLANradio

Bridge controlBridge control

802.11WLANradio

802.11WLANradio

EthernetEthernetOtherLAN

interface

OtherLAN

interfaceEthernetEthernet EthernetEthernet

ApplicationsApplications ApplicationApplicationApplication Level DataApplication Level Data

TCP/IPstack

TCP/IPstack

IP routingIP routingTCP/IPTCP/IP

Network addressing, routingNetwork addressing, routing

Seamless support for fixed IPfeatures

Seamless support for fixed IPfeatures

Most wireless LANs provide for industry-standard interconnection with wired networks such as Ethernet or Token Ring. Wireless LAN nodes are supported by network operating systems in the same fashion as any other LAN only the access points of wireless LANs require cabling, network managers are freed from pulling cables for wireless LAN end users. Lack of cabling also makes moves, adds, and changes trivial operations on wireless LANs. Finally, the portable nature of wireless LANs lets network managers pre-configure and troubleshoot entire networks before installing them at remote locations. Once configured, wireless LANs can be moved from place to place with little or no modification.

Page 172: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-52

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-52

Corporate LAN

Firewall

Internet

Public ISP

RoamingWLANUser

IT manager

Typical Obstacles for IP Roaming

How can I have a secure connection?

How to authenticate the user?

How to protect corporate data?

How can I getan IP address

How to findservices, printers?

How to bill the user?

Wireless communication is limited by how far signals carry for a given power output. WLANs use cells, called microcells, similar to the cellular telephone system to extend the range of wireless connectivity. At any point in time, a mobile PC equipped with a WLAN adapter is associated with a single access point and its microcell, or area of coverage. Individual microcells overlap to allow continuous communication within wired network. They handle low-power signals and “hand off” users as they roam through a given geographic area.

As one can imagine, there are a number of issues that have to be addressed in order to provide the ability to move IP addresses with users who are roaming around.

Page 173: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-53

In a typical wireless LAN configuration, a transmitter/receiver (transceiver) device, called an access point, connects to the wired network from a fixed location using standard cabling. At a minimum, the access point receives, buffers, and transmits data between the wireless LAN and the wired network infrastructure. A single access point can support a small group of users and can function within a range of less than one hundred to several hundred feet.

The ability of users to move seamlessly among a cluster of access points is called roaming. Access points hand the user off from one to another in a way that is invisible to the user, ensuring unbroken connectivity.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-53

WLAN Mobility Support

Access Point A Access Point B

DHCP server (Xx.x) Sub-network A

Access Point C

DHCP server (Yy.y)Sub-network B

WLAN terminalIP = X.x.x) WLAN terminal

IP = X.x.x)

! IEEE 802.11 defines LAN ! level (AP-2-AP) mobility

! Forward handover! Same IP address stays

! IEEE 802.11 defines LAN ! level (AP-2-AP) mobility

! Forward handover! Same IP address stays

WLAN terminalIP = Y.y.y)

MOBILE IP complementsWLAN mobility functions and enables full WLAN

mobility with minimum latency

Page 174: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-54

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-54

WLAN Security ComponentsClientapp.

Clientapp.

APAP

AccessControllerAccess

Controller

WLANWLAN

Host Host

WLANWLAN

WLAN encryptionWLAN encryption

TCP/IPstack

IP packet encryption / authenticationIP packet encryption / authentication

Optional end-to-end data encryption -> privacyOptional end-to-end data encryption -> privacy

802.11 WLAN supportsradio link packet

authentication anddata encryption

802.11 WLAN supportsradio link packet

authentication anddata encryption

! IPsec and IKEused for security critical access

! IPsec policy mgmtdefined

! AAA needed for global roaming

! Remote accessIPsec needed

! IPsec and IKEused for security critical access

! IPsec policy mgmtdefined

! AAA needed for global roaming

! Remote accessIPsec needed

! Key management and PKI neededfor secure ad-hocnetworking

! IPsec aware QoS

! Key management and PKI neededfor secure ad-hocnetworking

! IPsec aware QoS

Because the wireless technology has roots in military applications, security has long been a design criterion for wireless devices. Security provisions are typically built into wireless LANs, making them more secure than most wired LANs. Complex encryption techniques make it impossible for all but the most sophisticated systems to gain unauthorized access to network traffic. In general, individual nodes must be security-enabled before they are allowed to participate in network traffic.

Page 175: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-55

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-55

ISP Network

Multiple Authentication Needed

WLANnetwork

Internet

LocalAAA

serverServiceprovider

authentication

Banks etc.

AAA server

! Authentication done in company/ISP AAA server

! Smart cards supported! Standards to support

several AAA mechanisms

WLAN terminals with integrated

smart card reader

WLAN terminals with integrated

smart card reader

Global AAA & PKIarchitecture for

roaming

Global AAA & PKIarchitecture for

roaming

ISP serviceauthentication

Just as is the case with cellular mobile operators and their subscribers, WLAN users require multiple forms of authentication to protect themselves and their corporate network. This is especially true while roaming.

WLAN terminals can have integrated smart card readers in them and in conjunction with AAA servers at the local ISP and the global roaming points, authentication can be performed and secured.

Page 176: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-56

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-56

Quality of Service in WLANs

! Current WLAN devices mostly used for best effort data transmission, but in the future…

! WLANs will support wireless voice"Radio link QoS is essential

! Operators would like to apply traffic based Billing"QoS support needed

Wireless data technologies have been proven through more than fifty years of wireless application in both commercial and military systems. While radio interference can cause degradation in throughput, such interference is rare in the workplace. Robust designs of proven wireless LAN technology and the limited distance over which signals travel result in connections that are far more robust than cellular phone connections and provide data integrity performance equal to or better than wired networking.

The connection-oriented nature of WLAN makes it straightforward to implement support for QoS. Each connection can be assigned a specific QoS, for instance in terms of bandwidth, delay, jitter, bit error rate, etc. It is also possible to use a more simplistic approach, where each connection can be assigned a priority level relative to other connections. This QoS support in combination with the high transmission rate facilitates the simultaneous transmission of many different types of data streams, e.g. video, voice, and data.

Page 177: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-57

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-57

Mapping IP QoS onto Radio Link

RSVP DifferentiatedServices

PacketFilters

Application Data

Wireless link

Real-timequeue

Best-effortdata

DS-field (or TOS-octet)(8 bits)

Ethernet priority(3 bits)

Real-time

Best Effort

Radio queues

VoIP

All the rest

IP Packet

Ethernet Frame

!Separate radio link queues and priority scheduling!IP packet filters and Diffs bits define the queue!Separate radio link queues and priority scheduling!IP packet filters and Diffs bits define the queue

The connection-oriented nature of WLAN makes it straightforward to implement support for QoS. Each connection can be assigned a specific QoS, for instance in terms of bandwidth, delay, jitter, bit error rate, etc.

It is also possible to use a more simplistic approach, where each connection can be assigned a priority level relative to other connections.

This QoS support in combination with the high transmission rate facilitates the simultaneous transmission of many different types of data streams, e.g. video, voice, and data.

Page 178: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-58

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-58

3G & WLAN Integration

3G/GPRSRAN

SGSN

BTS

WLANRAN

WLANAP

Access Router

Gateway"WLAN GGSN"

3G/"HLR"

GGSN

Internet

Multimode terminalwith 3G user identity

!Integrated authentication and billing

!WLAN security and mobility with IP terms

!AAA interworking

!Integrated authentication and billing

!WLAN security and mobility with IP terms

!AAA interworking

Wireless LANs can be used as an alternative access technology to a 3rd generation cellular network. One may think of the possibility to cover hot spots and city areas with WLAN and the wide area with W-CDMA technology. In this way, a user can benefit from a high-performance network wherever it is feasible to deploy WLAN and use W-CDMA elsewhere. The core network sees to that the user is automatically and seamlessly handed over between the two types of access networks as the user moves between them.

Page 179: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-59

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 5-59

UTRAN TDD HiperLAN/2 IEEE 802.11aIEEE 802.11b Bluetooth

ProductAvailability

2002(Infrastructure)

2001 2000

SpectrumAvailability

Licensedoperation

455 MHz unlicensed available in 5 GHz range

Unlicensed (80+ MHz)(ISM band - 2.5 GHz range)

Mobility Cellular(UTRAN)

Limited velocity and area(100 m)

Local(10 m)

QoS Control Yes Partially (voice)

Price Medium Low Very low

Partially

Data Rates < 2 Mbps ≈20 Mbps < 1 Mbps

Available

WLAN Technology Comparison

MarketPenetration

Supplement toUTRAN FDD

Medium(high end mobile data market) Ubiquitous

This slide provides a comparison between different wireless radio technologies and looks at key characteristics of each.

Page 180: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 5-60

Lesson 5: Self-Check

1. What are some potential wireless data applications?

2. What platforms make up the Value Added Services plane?

3. List 3 of the technologies that will provide the necessary data rates for the high-speed wireless data applications.

4. What is Wireless Application Protocol (WAP)?

5. What is XML?

6. What is the vision of Bluetooth?

7. List some applications made possible through the power and flexibility of the wireless LAN.

Page 181: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-1

2.5G Wireless Networks and Services

Lesson 6

Page 182: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-2

Objectives

! Examine the wireless network evolution impacts! Understand General Packet Radio Service (GPRS)! Understand GPRS-136! Define the GPRS network components! Describe the classes of GPRS terminals

Page 183: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-3

2G2G Next GenerationNext Generation

3G Standards Evolution

384kbps GPRS based packet data

EDGE-136IS-136

9.6kbps fax/circuit/

CDPD

Network

Evolutio

n EDGE/3G.IPVoice over EDGE

45kbps: packet data over8PSK 30 kHz channel

GPRS-136

384kbps

cdma2000 3xRTTIS-9514.4kbps fax/circuit cdma2000 1xRTT

144kbps packet data“Mobile IP”

115kbps: packetcdmaOne

114kbps: packetGPRS

384kbps GPRS-based packet data

EDGEGSM9.6kbps

fax/circuit

EDGE/3G.IP

W-CDMA/3G.IP

Voice over EDGE or W-CDMA

Data convergence with EDGE and GPRS, Voice Inter-working via GAIT, 3G.IP

provides complete voice/data convergence

Data convergence with EDGE and GPRS, Voice Inter-working via GAIT, 3G.IP

provides complete voice/data convergence

ConvergenceW-CDMA vs

cdma2000 3X

Single Evolved 3G.IP Multimedia

Network

From a standards point of view, this shows how TDMA, CDMA and GSM networks are evolving. Essentially all have Circuit Switch, SMS (1 and 2 way messaging capabilities).

TDMA had GPRS 136 in it’s original evolution plans, however, the TDMA industry decided to skip this and go directly to EDGE. GPRS will initially provide 45 kbps for data, however, by the time the networks are ready, some believe that vendors will have equipment compatible with EDGE and will have rolled it out. Therefore, the demand will be for higher bandwidths.

EDGE GPRS will deliver 384kbps over GPRS based packet data in 2001. This will evolve to packetized voice over the same channel in 2003. GSM will deliver this capability in 2000.

Page 184: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-41999 2000 2001 2002 2003

RealReal--TimeTimeIP Core IP Core NetworkNetwork

VoIPEDGE

VoIPW-CDMA

Core NetworkRadio Access Network

GPRSGPRS

GSM

144kbps

EDGE

W-CDMA

GPRSGPRS

384kbps

EDGECompact

EDGE

GPRSGPRS

384kbps

3G Data Evolution Impacts

1xRTT

Simple IPSimple IP

144kbps

Global3G

Enhanced1xRTT

When looking at the network impacts to introduce the new packet data technologies, the changes can be categorized as either to the core network or to the radio access network.

Since TDMA and GSM are joining the same path through EDGE, they will experience the same impacts.

The introduction of GPRS affects mainly the core network due to the introduction of new packet nodes. EDGE follows on by building on top of the GPRS infrastructure. Therefore, EDGE is mainly a radio access network impact. Likewise, W-CDMA is also a radio access impact, again utilizing the currently deployed core network.

By the time we get to voice over IP or real-time multimedia, we will have impacts to both the core network and the radio access.

For CDMA, most of the impacts fall in the radio access as these new packet data services have little impact to the core network.

Page 185: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-5

2G to 3G Data Evolution Forecast

2004

75%

22% 3%

2G2.5G3G

2010

15%

43%

42%

Wireless Data Users by Technology

!In 2000, almost 100% of data users are on 2G systems!2.5G includes HSCSD and GPRS/EDGE!In 2000, almost 100% of data users are on 2G systems!2.5G includes HSCSD and GPRS/EDGE

110M 3GData Users

Source: StrategyAnalytics

According to Strategy Analytics, the number of users of wireless data services is growing to row dramatically over the next 10 years. This seems to be the general view of most of the research firms that periodically present forecasts for the industry.

The trend is also to revise the forecast and increase the numbers every few months. But the message remains the same. High speed wireless data will explode over the coming few years.

Most users will migrate their existing data service (if any) to a 2.5G technology like GPRS or 1xRTT. As W-CDMA and 3xRTT (or its equivalent) get deployed, some will users will upgrade depending on their needs.

Most new users will sign up for the newest services available, bringing them into 3G more quickly.

Page 186: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-6

Which Data Applications will be Successful?

! Low bandwidth data services already in demand (SMS-based messaging, consumer-oriented novelty applications)

! Messaging (from short-message to full e-mail) will continue to offer greatest short-medium term opportunity (business & consumer)

! Growing Internet penetration will drive portal-related content delivery" “Push services” (customized, regular delivery) e.g. sports scores" “Pull services” (irregular, e.g. flight schedules, gates)" Location-based services (local restaurants, in-car navigation)" Advertiser sponsorship will be key for consumer market

! High-end “interactive multimedia” will ultimately succeed (some limiting factors are network evolution, terminals, tariffs)

Source: Strategy Analytics

There is an obvious progression to the types of data services that will be successful and when they will achieve mass-market acceptance. Judging by the success of SMS and the hype around WAP, the low-bandwidth consuming services will fare the best.

Messaging will continue to be the most prominent but there will be a rapid increase in other types of services as the networks evolve and the terminals become available to support them.

Push services are those services that are sent to the user without having immediately requested them. They may subscribe to the service but they don’t request the information each time.

Pull services are those services that the user requests on demand.

Location-based services can be a combination of either push or pull and provide information to the user that is relevant to his or her current location.

The true multimedia services have a number of hurdles to overcome but in the end they will succeed .

Page 187: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-7

What is GPRS?

! GPRS = General Packet Radio Service! A high speed, IP based, data packet network which

overlays a GSM network and connects to the Internet and Intranets"GPRS can theoretically transport packets at up to 160

kbps "Actual throughput will be much lower, especially at

launch at around 28.8 kbps"GPRS is a bearer service and must have applications

in order to do something useful! Service offerings include:

"Direct IP connectivity"Point-to-Point or Point-to-Multipoint

General Packet Radio Service (GPRS) is the GSM equivalent to sending packet data in a GSM network.

It is a high speed, IP-based packet network that is overlayed on top of the existing GSM network.

Theoretically, GPRS can handle 170 kbps data rates but the actual throughput will be much lower due to the overhead and the fact that, in the beginning, the new coding schemes used will only support a limited number of channels.

The basic benefit of GPRS is the direct IP connectivity to packet data networks (Internet, Intranets, etc.). This can be in a point-to-point fashion such as direct Internet connections or as point-to-multipoint, such as for broadcast purposes.

Page 188: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-8

Up to 8 channels

can be used by one MS

New coding schemes

CS1 .. CS4

More than one MS can use

one TS simultaneouslyIncrease of

radio resource efficiency

Packet switchedtransmission

Reduction of administration effort

Higher transmission

rates

Channelcombining

Channelcoding

General BearerService

Goals of Data Usage - GPRS Benefits

The major goals behind GRPS are to increase radio resource efficiency and to provide higher speed transmission rates.

The radio efficiency comes from packet-based transmission and the reduction in administration. It is a general bearer service where more than one mobile can use the same Time Slot at the same time.

The transmission increase comes from new channel combining and new channel encoding schemes. Up to 8 channels (ultimately) can be used by a single mobile. New coding schemes will increase the amount of data that can be carried on the same time slot over the same period of time.

Page 189: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-9

For the different GPRS coding schemes, the actual and realized data throughput is highly dependent on the Carrier to Interference ratio (signal to noise).

Only near the antenna (27 dB) will the coverage be good enough to reach the theoretical data rates. The coding schemes have different dependencies on the C/I ratio because of the possibility to calculate back the data/header through a number of Block Check Sequences.

As coding schemes go up, the impact on C/I causes some data packet loss and requires retransmission resulting in lower throughput.

Only with excellent coverage or signal to noise ratio can CS3 and CS4 provide the highest data rates. This will be acceptable for indoor applications.

To realize these speeds outdoors requires about 9 dB higher reception. In this region only CS1 and CS2 can guaranty a high quality data transfer.

Only CS1 can guaranty a successful call setup.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-9

!CS1 guarantees connectivity under all conditions (signaling and start of data)!CS2 enhances the capacity and may be utilized during the data transfer phase !CS3/CS4 will bring the highest speed but only under the best RF conditions

Enhanced Coding Schemes Optimize the GPRS Channel Capacity

3dB7dB11dB15dB19dB23dB27dB C/I0

4

8

12

16

20

Through-put per GPRS

channel(kbps)

CS: Coding Scheme

CS 4

CS 3

CS 2

CS 1

Page 190: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-10

GPRS Implementation Today

! Operators are currently implementing GPRS networks around the world

! The first GPRS networks will commercially launch as “islands” in a sea of GSM

! Operators may offer customers voice over GSM and packet data services over GPRS"Operators may continue to offer HSCSD over their

GSM networks to compliment GPRS! The GSM and GPRS networks will co-exist as

separate, but integrated networks

GPRS is currently being deployed in networks all around the world. It has been in trials for the last year or so and it is expected that most deployments will be in islands within the GSM networks.

GPRS will offer a complementary solution to HSCSD in order to allow operators to provide their customers with choices for higher data speeds.

Page 191: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-11

Current GSM Network Architecture

MSC/VLR GMSC

PLMN

Other PLMNSS7 Links

Trunks carrying circuit switched data and voice

HLREIRACSMS

BS

BSC

TRAU

PSTN

SS7 Network (Links) SCP

This is the view of the current GSM network. The MSC, BSC and BTS as well as the Gateway MSC provide today’s circuit switching. The ancillary components such as SMS, AC, EIR and HLR provide the supporting mobility and authentication capabilities.

Page 192: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-12

Architectural view of GPRS Network -Voice and Data

BS

SS7 Links

GMSCBSC

TRAU

PLMN

Trunks carrying circuit switched dataand voice

MSC/VLR

Packet Data SGSN

Global IP NetworkGlobal IP Network

GGSN

IP Network

HLREIRACSMS

Other PLMN

PSTN

SS7 Network (Links) SCP

The first step in the evolution towards the 3rd generation architecture is the introduction of General Packet Radio Service (GPRS). Based on the current network architecture, 2 new network elements are added. The SGSN and the GGSN.

The SGSNs connect the base stations to a local IP network and perform the routing of packets as well as querying the GR (HLR equivalent) for mobility purposes.

The GGSN connects to the external IP world (the Internet). A newfunction is added in the BSCs called the PCU (packet Control Unit). Voice follows the traditional path and data is packetized and goes through the IP world. This will provide up to 115 kbps data access eventually.

Page 193: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-13

BSC

PDN

HLR

MSC

A MAP-D

PSTN/ISDN

Gr, Gr ’

Gs, Gs ’

SGSN

Gc

Gn Gi

GGSN

Gb, Gb ’

A

BTS

GPRS Protocol Interfaces

MC

Gd, Gd ’

Gp

SGSN of other PLMNNew Components

Abis

TRAU

The GPRS backbone network will permit point-to-point GPRS calls, interworking with the BSS, HLR, MSC, SMSC, and the Internet.

These services will be supported via the following interfaces:! Gb, between PCU and SGSN, using Frame Relay,! Gr, between SGSN and HLR, extension of MAP,! Gn, between SGSN and GGSN using GTP protocol (tunnel),! Gi, between GGSN and PDNs (IP and X25),! Gs, between SGSN and MSC/VLR, for some simultaneous GPRS and GSM operation,

(same as BSSMAP but optional),! Gd, to deliver SMS messages via GPRS (same as MAP),! Gc, between GGSN and HLR (same as MAP but optional).

The TRAU frames going out of the BTS are transparently conveyed by the BSC to the PCU, which handles the GPRS specific packet processing (Frame Relay).

Page 194: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-14

GPRS - Protocol Stacks

Fixed DTE

BSSMobile DTE

PDN

ServingGSN

GatewayGSN

GSM RF

MS BSS SGSN GGSN

RLCMAC

T1

GPRS Backbone

FrameRelay

IP(X.25)

Application

T1 T1

FrameRelay

FrameRelay

IP

UDP / TCP

GTP

IP(X.25)

IP(X.25)

Relay

Um Gb

Gn

Gi

T1

FrameRelay

T1

FrameRelay

BSSGP

LLC

SNDCP

IP

UDP/TCP

GTP

Relay

LLC

SNDCP

IP(X.25)

Application

Gb

Gn

GiUm

GSM RF

RLCMAC

T1

FrameRelay

BSSGP

Relay

The new protocols used in the stack for GPRS network elements.

MAC (Medium Access Control) provides access to RF

RLC (Radio Link Control) handles error detection and correction.

LLC (Logical Link Control) provides an encrypted link to the SGSN.

SNDCP (Subnetwork Dependent Convergence Protocol) handles headercompression for network layer.

Relay functions relay the packets across the interfaces.

BSSGP (BSS GPRS Protocol) handles routing between the BSS and SGSN. It also takes care of QoS.

GTP (GPRS Tunneling Protocol) provides a tunnel between the GPRSnodes to handle the mobility of the end terminal.

Page 195: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-15

IPor

X.25

SGSNs

GGSN

IP Backbone

BSCs

Gi

The Different Backbones Used

Gn

Gn

Gb, Gb’

Gb, Gb’

Frame Relay Network

Ethernet, Token-Ring, FDDI, ISDN or ATM

Each SGSN is linked to PCU in the BSC via a Frame Relay network:!The only protocol possible in the ETSI specifications!Simpler than X25!Data rates up to 2 Mbps

The SGSN and GGSN are linked together within the GPRS backbone, based on IP routing; the GPRS tunnels the PDU using the GPRS Tunnel Protocol (GTP). GTP IPv4 is used as a GPRS backbone network-layer protocol. The GTP header contains a tunnel end-point identifier for point-to-point and multicast packets as well as a group identity for point-to-multipoint packets. Additionally, a type field in which the PDU type is specified and QoS parameter are included. Three routing protocols are available: static, RIP2 and OSPF.Network architectures may be used below IP: Ethernet, Token-Ring, FDDI, ISDN links, or ATM.GPRS will support interworking of MSs with IP first and X.25 later, and transmit the corresponding Packet Data Units (PDUs) transparently by encapsulation and decapsulation.If the Gi interface between the PLMN/GPRS and the Intranet/ISP is carried out via public network, then IP Security (IPsec) protocol may be used to provide authentication and encryption of the link; this will allow confidential transport of the Gi interface over public domains such as Internet.

Page 196: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-16

BSC

Intranet

HLR

MSC

A MAP-D

PSTN/ISDN

Gr, Gr ’

Gs, Gs ’

SGSN

Gc

Gn Gi

GGSN

Gb, Gb ’

A

BTS

Typical GPRS Implementation

MC

Gd, Gd ’

Gp

SGSN of other PLMN

Abis

TRAU

Internet

Gi

OMCNetIDDHCP& DNS

ChargingGateway/Radius Server

Private IPBackbone

The first GPRS product releases will support IP and interworking with Internet/Intranet.

Only one SGSN will likely be required initially due to the relatively low number of users.

A NetID server will manage IP address by performing these two functions:

! Domain Name Server (DNS) to translate Domain Names to IP addresses and vice versa

! Dynamic Host Configuration Protocol (DHCP) to allow automatic re-addressing for mobile hosts.

Page 197: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-17

RLC#Segmentation/Re-assembly#ARQ

MAC#Multiplexing (different mobiles)#Contention resolution (u/l) - QoS#Scheduling/queuing (d/l) - QoS

SGSNBTS

Abis Gb

RLCMAC Packet

SwitchingGPRS

FunctionGPRS

Function

The Packet Control Unit (PCU)

BSC

PCU

The Packet Control Unit (PCU) in the BSC is the packet assembler and disassembler.

For the Radio Link Control (RLC) layer, it handles the segmentation of the user data into packets and vice versa.

For the Media Access Control (MAC) layer, it performs multiplexing of different mobile’s data traffic onto the Gb interface. It also supports the QoS parameters for contention resolution and scheduling.

Page 198: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-18

IP Addressing in GPRS

! GPRS backbones and GPRS subscriber terminals use different IP addresses"Operator’s GPRS intranet backbone network

addresses are invisible and inaccessible"Operators determine and assign intranet and GPRS

terminal addresses! GGSN, SGSN, DNS require public IP addresses from

Regional Internet Registries (RIPE, ARIN, APNIC) -operators must apply for these public IP addresses

IP addressing is a new and major change to the mobile operators network. The GPRS terminals and the backbone network elements will use different IP addresses. The operators addresses will be hidden from the general population but they will be responsible for assigning IP addresses for the GPRS terminals in their network.

The public IP addresses for the backbone will have to be requested and applied for through the public Internet registries.

Page 199: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-19

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-19

Domain Name Systems in GPRS

! DNS is used to map logical names to IP addresses in the GPRS backbone networks (both Intra and Inter)

! Each SGSN has access to DNS functionality through a local DNS server"DNS servers may talk to each other directly or through

“Root DNS”! Root DNS holds IP mapping addresses for all GPRS

operators! Root DNS operation/management will likely be done

by a controlling body (like the GSM Association)

The Domain Name System is for mapping IP addresses in the backbone. A DNS server will maintain the access and control the mapping for all of the IP addresses in the network.

The main issue is the root DNS function. This will have to maintain all IP addresses for all of the operators and will likely have to be controlled by some higher controlling body.

Page 200: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-20

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-20

Domain Name System Architecture

BTSBTS BSCBSC

SGSNSGSN

GGSNGGSN

VisitedOperator

PLMN

FW

BTSBTS BSCBSCSGSNSGSN

HomeOperator

PLMN

BGBG

BGBG

RootDNS

RootDNS

DNSDNS

Inter-PLMNBackbone

DNSDNS

GGSNGGSN

HPLMN

VPLMN

FW

Border Gatewayconnects autonomousIP networks together

Border Gatewayconnects autonomousIP networks together

Domain Name System(DNS) used by SGSN tofind the correct GGSN

Domain Name System(DNS) used by SGSN tofind the correct GGSN

Root DNS server location and management is currently under study

Root DNS server location and management is currently under study

Internet

This is a graphical representation of the DNS architecture showing how the different mobile operators will connect together, one to allow for GPRS roaming and two for access to the root DNS server.

Border Gateways will connect the different IP PLMN networks together across the inter-backbone network.

Page 201: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-21

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-21

SGSN Functions

GnGb, Gb’

Gs, Gs’

Gi

GPRSHLR

SGSN

GatewayMSC/VLR

MCGSM/ANSI-41HLR

Base Station

GGSN

Um PacketData Network

Gd, Gd’

DNS,DHCP,RADIUS

Gr, Gr’

!Session and Mobility Management"Subscriber attachment and session activation processing including GGSN selection"Subscriber state and location tracking"Intra-System hand-over processing"Support for compression and ciphering of GPRS messaging

! Gateway to the serving GPRS MSC supporting tunneling of signaling messages! Interfaces supported

"Gb and Gb’ - Interface to BSC"Gs and Gs’ - Allowing GPRS support of circuit network services: voice, SMS, etc."Gr - Interface to GPRS HLR"Gn - Interface to GGSN"Gp - Interface supporting inter-PLMN roaming

Can becombined

These are the major functions performed by the SGSN.

In the GPRS world, the SGSN provides the mobility management for a GPRS subscriber. It is the hub that connects and controls all packet data functions towards the wireless subscriber.

Page 202: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-22

GGSN Functions

GnGb, Gb’

Gs, Gs’

Gi

GPRSHLR

SGSN

GatewayMSC/VLR

MCGSM/ANSI-41HLR

Base Station

GGSN

Um PacketData Network

Gd, Gd’

DNS,DHCP,RADIUS

Gr, Gr’

!Responsible for termination of tunnels to the SGSN and to the data network"Supports user ID and password via Radius authentication capability"Support for GSM 1215 Accounting

!Open Interface support for Gi and Gn!Virtual Private Networking Features

"Packet data tunneling: L2TP, PPTP, IPsec "LDAP directory based policy management"Firewall, multiple GTP to IPsec mappings

!Tunnel termination and management!DHCP (IP allocation) functionality as a client

Can becombined

These are the major functions performed by the GGSN.

The GGSN provides the access to other (outside) packet networks including the Internet. It provides basic routing procedures and supports standard authentication procedures as defined by IETF.

Page 203: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-23

GPRS HLR Functions

GnGb, Gb’

Gs, Gs’

Gi

GPRSHLR

SGSN

GatewayMSC/VLR

MCGSM/ANSI-41HLR

Base Station

GGSN

Um PacketData Network

Gd, Gd’

DNS,DHCP,RADIUS

Gr, Gr’

! Supported on the HLR via Gr interface to the SGSN! Supports GPRS subscriber profile! Supports GSM-based GPRS subscriber authentication and encryption functionality

Can becombined

These are the major functions performed by the GLR.

The GLR provides the subscription information for a GPRS subscriber and functions exactly as the HLR. In many cases, the GLR and HLR functionality can be combined in the same platform.

Page 204: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-24

MS 1

MS 2

MS 3

MS 4

MS 5

MS 6

MS 7

MS 8

One MS occupies complete TSOnly 8 MS can be supported simultaneously

Current GSM Radio Resource Usage

Timeslots1 2 3 4 5 6 7 8

Mobile

BTS

Visited MSC/VLR

GatewayMSC/VLR

HLR

InternetIntranetPSPDN

PSTN

The way that radio resources are used in the current GSM network, each mobile user occupies one time slot in the GSM channel. Therefore, only 8 mobiles can be supported simultaneously. This provides 9.6 kbps data rates.

Page 205: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-25

! Shared use of radio resources"100 or 1,000 MS can share a physical radio channel" Subscriber does not need to occupy a complete TS

! Channels are used only during data transfer" Packets are queued and then transferred through the network" The resource is free after data transfer

! Higher efficiency of radio resources! Direct connections to other packet data networks

" Data services are no longer routed through PSTN or ISDN! Four different coding schemes

" Allows rates from 9.05 to 21.4 kbit/s

! Shared use of radio resources"100 or 1,000 MS can share a physical radio channel" Subscriber does not need to occupy a complete TS

! Channels are used only during data transfer" Packets are queued and then transferred through the network" The resource is free after data transfer

! Higher efficiency of radio resources! Direct connections to other packet data networks

" Data services are no longer routed through PSTN or ISDN! Four different coding schemes

" Allows rates from 9.05 to 21.4 kbit/s

GPRS Radio Resource Usage

As explained earlier, GPRS shares radio resources among a number of different mobile users. The channels are used only during data transfer thereby more efficiently using the resources.

There are four different coding schemes defined ranging from 9.05 to 21.4 kbps per timeslot thus providing the higher data rates.

Page 206: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-26

Mobile

MS 1-10

MS 11-20

MS 21-35

MS 36-50

MS 51-55

MS 56-80

MS 81-100

MS 101-133

GPRS Radio Resource Usage

Timeslots1 2 3 4 5 6 7 8

Coding Scheme 1

Coding Scheme 1

InternetIntranet

PDN

PSTN

BTS

Visited MSC/VLR

GatewayMSC/VLR

HLR

ServingGSN

GatewayGSN

GR

Using coding scheme 1, multiple users are sharing the same timeslots for their data transfer but the effective data rate is 9.05 kbps.

Page 207: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-27

Timeslots1 2 3 4 5 6 7 8

Mobile DTE

GPRS Radio Resource Usage with Channel Combining

Coding Schemes 1 and 2

Coding Schemes 1 and 2

MS 1-10

MS 11-20

MS 21-35

MS 36

MS 37-55

MS 56-80

MS 81-100

MS 101-133

InternetIntranet

PDN

PSTN

BTS

Visited MSC/VLR

GatewayMSC/VLR

HLR

ServingGSN

GatewayGSN

GR

Using coding scheme 2, users are still sharing timeslots but now, a single user can occupy as many as 4 timeslots which provides a throughput of 40 kbps.

Page 208: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-28

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-28

Timeslots1 2 3 4 5 6 7 8

Mobile DTE

! Max. data rate (theoretical) of~ 170 kbit/s for one subscriberduring data transmission

! The resource will be free after data transmission

GPRS Radio Resource Usage with Channel Combining

Coding Scheme 4

Coding Scheme 4

InternetIntranetPSPDN

PSTN

BTS

Visited MSC/VLR

GatewayMSC/VLR

HLR

ServingGSN

GatewayGSN

GR

Coding scheme 4 is the last and biggest of the 4 schemes. With it, one user can occupy all 8 timeslots at once providing him with effective data rates of 144 kbps (170 kbps is the theoretical maximum).

These rates would only occur for a single user in a perfect radio environment, therefore real data rates are likely to be much lower,

Terminals supporting this coding scheme will not be available initially.

Page 209: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-29

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-29

! Type A: GSM attached AND GPRS attached" Simultaneous voice and packet data" Two radio chains required

! Type B: GSM attached AND GPRS attached" Alternate voice and packet data" Required for mass market applications" Complex implementation

! Type C: GSM attached OR GPRS attached" Manually switched" Simple to implement

GPRS Terminals

GPRS terminals can be grouped in three Mobile Station classes, each having different capabilities to fulfill the different market needs:

! Class A: MS that is allowed to make and/or receive calls on bothGSM and GPRS simultaneously.

! Class B: MS can make and/or receive calls on either of the two services sequentially but not simultaneously.

! Class C: MS can be either in GPRS or in GSM mode (manually selected).

Class A mobiles are the most complex and will not be available initially.

Page 210: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-30

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 6-30

What is After GPRS?

! GSM EDGE Implementation ! EDGE (E-GPRS) specified by ETSI in GSM Release 99

"Preservation of GPRS architecture / features"Re-use of GSM / GPRS Core Network"New 8 Phase radio modulation (multi-standard GSM /

GPRS / EDGE radio transceivers)"Software upgrades of BTS / BSC

! EDGE allows higher packet speeds"Up to 384 kbps effective rate (8 timeslots @ 59.2 kbps)

What lies beyond GPRS? The next step is EDGE which will provide 384 kbps packet data capabilities. We will examine EDGE in more detail in the next chapter.

Page 211: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 6-31

Lesson 6: Self-Check

1. What are the different evolution paths for the three major competing wireless access technologies?

2. What is GPRS?

3. What are the major goals behind GPRS?

4. What new components are needed for the GPRS network architecture?

5. Describe the three different classes of GPRS terminals.

Page 212: GTCICourse 221
Page 213: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-1

3G Wireless Networks and Services

Lesson 7

Page 214: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-2

Objectives

! Examine the evolution towards the third generation network and the all IP solution

! Define IS-2000! Define EDGE! Define GERAN (Voice over EDGE)! Define Universal Mobile Telecommunications Service

(UMTS)! Define Mobile IP! Examine what 4G technology might bring

Page 215: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-3

Voice

Low speedDataCircuit

switching2G

NarrowbandPacketswitching2.5G

SMSWAP

BroadbandMultimedia3G

MSCVLR

GMSC

HLR

BSC

BTS

BTS

BTS

IP Network

RNCNode B

ALL-IP

MPLSIPSec

LSP GTPtunnel

The Move of Mobility to All-IP Solutions

PSTN/ISDNPSTN/ISDN

INTERNETINTERNET

SGSN GGSNDNS

UMTS/3G

The evolution of mobility networks begins with its roots in the circuit switching days of the past. Today’s 2G mobile networks were designed around the notion of offering simple mobility with some level of low speed data services.

This was fine. For awhile. Now, with the explosion and mania surrounding the Internet, people desire more information at their fingertips, regardless of where they are located at the time. This was the genesis for the so-called 2.5G networks which are beginning deployment now. Focusing on higher speed data rate connections that are packet-oriented so as to allow for access to the wonders of the Internet.

But it doesn’t stop there. True 3G promises real-time multimedia services over broadband wireless pipes. The all-IP packet network that is access technology independent.

Page 216: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-4

Packet Data

InteractiveMessaging

Circuit DataEmail/Web

Caching

Web Browsing (WAP)

IWF

Opt

ical

Rin

g: O

C-3

SMSC

Circuit Switched

Mobility Management Provisioning &

Subscriber Management

OA&MNetwork

Management

Video StreamingInteractive Web

Music Media

Video ChatInteractive Purchasing

Multi-Media Access

The Networks Direction

Packet CoreNetwork

PDN

PortalProviders

CorporateNetwork

Back OfficeEnablers

WAPServer

E-mailServer

FaxServer

MDBS

MDIS

IS

MSC

We begin where we left off in the previous chapter. The migration towards voice over IP.

Throughout the course of this chapter, we will examine the different technologies and networks and look at how each will evolve to not only support voice over IP, but how they become true all-IP networks.

Page 217: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-5

Telecommuting

Internet/IntranetTelephony

Mobile Travel Services

Mobile MultimediaCommunication

Mobile Banking

E-CommerceOnline Trading

Mobile Entertainment

The NewMobile Office

Convergence

Any timeAny placeAny thing

ComputerIndustry

Entertainment and MediaIndustry

TelecommunicationsIndustry

What Does the Network Evolution Really Mean?

It is clear that the two mass market trends of mobile and Internet communication will converge. Simultaneously the more sophisticated capabilities of these networks will highlight the importance of content providers such as the entertainment and media industries.

The main 2nd generation services, in particular voice, will remain very important – based on circuit oriented as well as IP-based transmission. In addition, the 3G user will have access to packet based networks without the GPRS disadvantage of limited bandwidth for the masses.

Currently, Internet browsing for the mass market and Intranet access for the business market segment are envisioned as key applications for the initial launch of 3G. It is also expected that most of the 3G suppliers will have applications based on Internet technology by the start of commercial operation. Furthermore, multimedia services like content streaming from the Internet will emerge during this time.

All the wonders of the Internet combined with the mobility of wireless to offer the true multimedia experience.

Page 218: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-6

Some Interesting World Forecasts

Wired vs. wireless subscriptions and Internet users

0

200

400

600

800

1,000

1,200

1,400

1,600

1999 2000 2001 2002 2003 2004 2005

Subs

crib

ers

(M)

Wireless Internet Users

Wired Internet Users

Total Wireless Subscribers(including analog & 3G)

Wired Subscribers

Source: Strategis, Yankee Group

By 2004, there will be more wireless subscriptions than wired subscriptions. Shortly thereafter, wireless Internet users will pass wired Internet users.

By 2004, there will be more wireless subscriptions than wired subscriptions. Shortly thereafter, wireless Internet users will pass wired Internet users.

There are literally dozens of forecasts made all the time covering the explosive growth of wireless subscribers and now wireless Internet users as well. These forecasts tend to be taken somewhat lightly since every few months, a new forecast comes out greatly exceeding the previous one.

But they all tend to show the same general trend. Wireless usage around the world is booming and it won’t be long before wireless users pass their wired counterparts everywhere. The same is true with Internet users and it is expected that soon after total wireless users, wireless Internet users will also pass their wired counterparts.

Page 219: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-7

0

400,000

800,000

1,200,000

1,600,000

2,000,000

1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

W-CDMA will dominate 3G starting in 2001 in Japan and in 2002 in Europe

W-CDMA will dominate 3G starting in 2001 in Japan and in 2002 in Europe

W-CDMA64.3 %

cdma200023.4 %

EDGE-13612.4 %

Source: KPMG, Cahners In-Stat, Ovum

Western Europe

28%

Asia/ Pacific

33%

Latin America

9%

North America

20%

Africa 3%

Mideast 2%

Eastern Europe

5%

Eastern

Europe

1%

Mideast

1%

Africa

1%

North

America

20%

Latin

America

2%

Asia/

Pacific

33%

Western

Europe

42%

2005(3G Total: 200 M)

2010(3G Total: 1,100 M)

Some Interesting World Forecasts

Subs

crib

ers

(000

s)

When it comes to forecasting subscribers using 3rd generation technologies, it can take a real crystal ball to be accurate. What is more important to look at than the numbers themselves are the general trends.

For 3rd generation technologies (W-CDMA, cdma2000 and EDGE), the trends are pretty consistent. Since GSM is the predominant technology worldwide, W-CDMA will lead the way in 3G. The first to deploy it will be Japan, followed by Europe. The US will likely come later. Cdma2000 and it’s variants (3xRTT, HDR, 1xEV, etc.) will be second with a sizable portion coming from North America. EDGE and EDGE-136 will garner a sizable share in North America and likely Latin America.

Page 220: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-8

Accessing the Internet wirelessly will grow as higher data rates are provided.By 2006, one half of all subscribers will access the Internet through wireless means

Accessing the Internet wirelessly will grow as higher data rates are provided.By 2006, one half of all subscribers will access the Internet through wireless means

Source: Strategis Group, Ovum

0

500 000

1 000 000

1 500 000

2 000 000

1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

T ota l Wire les s

Wire les s Inte rnet

Sub

scrib

ers

(000

s)

CAGR Wireless Internet: 31%

CAGR Wireless Internet: 31%

CAGR Total Wireless: 11%CAGR Total

Wireless: 11%

Some Interesting World Forecasts

Another very interesting set of numbers comes from the comparison between total wireless subscribers and wireless Internet subscribers. A wireless Internet subscriber is defined as a subscriber who access the Internet through wireless means (excluding WLANs).

Wireless Internet growth is growing almost three times as fast as wireless itself and within the next 10 years, close to half of all subscribers will access the Internet through a wireless device.

Page 221: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-9

The last few charts and forecasts have obviously painted a bright future for wireless growth around the world. And a lot has been said about how and when it is expected that wireless penetration will pass wireline penetration in various countries.

Finland was the first country in the world where this occurred and that was several years ago. Today they have passed 70% wireless penetration. And many other countries are quickly following suit.

The US will be one of the countries that takes a little longer for this to occur mainly due to the large population and the fact that most people already have or have access to a wireline phone. But wireless will cross this threshold here to. It will just take a while longer.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-9

Wireless Penetration Wireline Penetration Source: Ovum, Cahners In-Stat

USAFinland

Germany

China

Portugal MalaysiaTurkey

Philippines

0%

20%

40%

60%

80%

1997 1998 1999 2000 2001 2002 2003 2004 2005

Pen

etra

tion

Wireless penetration will have passed wireline penetration in most countries by 2005*. There is, however, no clear pattern concerning when, which country or at what level.

* Exceptions are e.g. India, China, Russia, USA

Wireless penetration will have passed wireline penetration in most countries by 2005*. There is, however, no clear pattern concerning when, which country or at what level.

* Exceptions are e.g. India, China, Russia, USA

Selected Wireline and Wireless Penetration Rates

Some Interesting World Forecasts

Page 222: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-10

What is IS-2000?

! IS-2000 is the evolution of IS-95B! Sometimes referred to as:

" IS-95C"3G1x and 3G3x"1xRTT and 3xRTT

! “cdma2000” refers to the air interface specified by the IS-2000 standard, plus all of the relevant ancillary standards" IS-707 packet data" IS-127 enhanced variable-rate codec

IS-2000 is the standard evolution of IS-95B. It is referred to by many different names but all mean the same thing. The evolution of CDMA to support the UMTS requirements for the third generation network.

Page 223: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-11

Why Does IS-2000 Exist?

! cdma2000 3xRTT was the alternate proposal to the wideband CDMA (W-CDMA) proposal from the ARIB group in Japan

! After months of development (and intense operator push) IS-2000 emerged"Totally different than ARIB’s 4.096 MHz W-CDMA

system" IS-2000/cdma2000 was not accepted by ARIB

IS-2000 cdma2000 3xRTT came about as an alternate proposal to W-CDMA.

It is quite different than W-CDMA although the OHG (Operator’s Harmonization Group) is working to bring the two together.

Page 224: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-12

What’s the Difference Between IS-2000 and W-CDMA/UMTS/G3G?

! cdma2000 is evolved IS-95 which supports ANSI-41 core networks"Signal sets and spectrum compatible with IS-95

! G3G refers to the wideband CDMA standard derived from ARIB’s W-CDMA and UMTS standards"Signal sets support GSM features, but new spectrum,

base stations and BSCs are required"Essentially IS-95/IS-2000 with different numerology &

nomenclature due to political and competitive issues

Some fundamental differences between the competing standards of CDMA and GSM/TDMA when they reach UMTS services.

Page 225: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-13

What is EDGE?

! EDGE"New modulation scheme (8PSK)

! EGPRS (Enhanced GPRS)"GPRS with the EDGE modulation"Scheme data rate per time slot: 22.8 up to 69.2 kbps"Peak Rate 384 kbps

! ECSD (Enhanced Circuit Switched Data)"HSCSD with EDGE modulation"Data rate per timeslot: 28.8 or 32 kbps"Peak rate: 64 kbps

EDGE will provide data rates up to 384 kbps by using new modulation schemes to greatly increase the data carries in the timeslot.

It builds off of the existing GPRS infrastructure and does not require any new hardware except for the EDGE radio. New software is required in the BTS only.

Page 226: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-14

Providedservice

10 kbps 100 kbps 1 Mbps 10 Mbps

! EDGE covers almost the same data services as UMTS

Database accessInformation services

E-mail

Voice

e-shopping

Electronic newspaperImages / sound files

Video conferencing

Video telephony

UMTS

e-bankingFinancial servicesGPRS

EDGE

Services Covered with GPRS, EDGE and UMTS

When looking at the basic services and applications to be considered over the mobile environment, due to the required bandwidth speeds for the services, most of them can be accommodated by EDGE.

Therefore, most of the UMTS capabilities can be covered with EDGE. Only true, real-time multimedia may require higher sustained speeds.

Page 227: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-15

EDGE Network Architecture

BS

SS7 Links

GMSC

BSC

TCU

PLMN

Trunks carrying circuit switched data and voice.

MSC/VLR

Packet Data

HLREIRACSMS

PSTN

SGSN

Global IP NetworkGlobal IP Network

GGSN

IP Network

Other PLMNSame GPRS Core Network

SS7 Network (Links) SCPEVEN HIGHER USER RATES

via Air-IF usingTRAFFIC CHANNEL

COMBINING and NEW CODING SCHEMES

and MODULATION(384 Kbps)

When EDGE is added to the network, this will affect the radio portion of the network. EDGE builds off of and utilizes the existing GPRS infrastructure for the routing of data. To implement EDGE, all that will be needed is a software download to the BTSs and new carrier units will be needed in place of the GSM carriers. They can be mixed and matched to offer both in the same BTS. With EDGE, it will be possible to get 384 kbps packet data access. Again, voice follows the traditional path and the data goes through the IP world.

Page 228: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-16

ServingMSC/VLR

MSC - Mobile Switching CenterHLR - Home Location RegisterMC - Message CenterSGSN - Serving GPRS

Support NodeGGSN - Gateway GPRS

Support NodeEIR - Equipment Identity

Register

EDGE Network Reference Model

OtherPLMN

C-DC-D

Gn

Gb, Gb’

Gs, Gs'

Gi

Gr, Gr’

Gc

EIR

GfGn Gp

Signaling

Signaling and Data

GPRSHLR

SGSN

GatewayMSC/VLR

Voice

EDGEData

MC GSM/ANSI-41HLR

Base Station

GGSNSGSN

GGSN

Um* PacketData Network

Gd, Gd'

A view of the EDGE network reference model shows the various standard interfaces.

The only change from the GPRS reference model is the Gs’ interface between the SGSN and the MSC. This is to support the EDGE radio interface but these are minor modifications.

All other functions and services work as they did with GPRS.

Page 229: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-17

! A new modulation scheme" 8-PSK

! 200 KHz channel spacing" Unchanged

! Symbol rate unchanged" 270k symbols/s

BUT" 3 bits/symbol

! A new modulation scheme" 8-PSK

! 200 KHz channel spacing" Unchanged

! Symbol rate unchanged" 270k symbols/s

BUT" 3 bits/symbol

Rate Code CS1 9.05kb/s 0.5CS2 13.4kb/s 0.66CS3 15.6kb/s 0.75CS4 21.4kb/s 1.0GMSK (1 bit/symbol)

GPRSGPRS

EDGE = GMSK + PSKEDGE = GMSK + PSK

GMSK (1 bit/symbol)

Rate CodeMCS1 8.8 kb/s 0.53MCS2 11.2 kb/s 0.66MCS3 14.8 kb/s 0.80MCS4 17.6 kb/s 1.00

EDGEEDGE

EDGE - Key AspectsEDGE - Key Aspects

Coding Rates for GPRS & EDGE

Rate CodeMCS5 22.4 kb/s 0.37MCS6 29.6 kb/s 0.49MCS7 44.8 kb/s 0.76MCS8 59.2 kb/s 1.00

8-PSK (3 bits/symbol)

EDGEEDGE

The new coding schemes for EDGE are the key to offering the higher data speeds. In GSM and GPRS, GMSK is used for coding. With EDGE, PSK is combined with the GMSK.

The channel spacing is still 200 KHz.

The real difference is in the number of bits per symbol. Whereas with GPRS it was 1, it’s now 3 bits per symbol with EDGE.

In effect, what that means is that it is now possible to send more information within the same timeslot thus providing the higher data rates.

Page 230: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-18

!Minimal spectrum requirement of 2.4 MHz (+ guard band)

!EDGE Classic = ETSI EDGE

!Constant power on BCCH carrier

!Minimal spectrum requirement of 2.4 MHz (+ guard band)

!EDGE Classic = ETSI EDGE

!Constant power on BCCH carrier

EDGE ClassicEDGE Classic

EDGE Classic

!4/12 Reuse on 1st Carrier (BCCH)" Additional carriers may

use Lower reuse

!TN0 for BCCH/CCCH" 51 multiframe structure

!TN1-7 for DTCH/PTCCH/PACCH" 52 multiframe structure

!4/12 Reuse on 1st Carrier (BCCH)" Additional carriers may

use Lower reuse

!TN0 for BCCH/CCCH" 51 multiframe structure

!TN1-7 for DTCH/PTCCH/PACCH" 52 multiframe structure

The main highlights of EDGE Classic which is also known as ETSI EDGE.

EDGE Classic is defined by using continuous BCCH carriers that are typically in a 4/12 or 3/9 reuse pattern and which requires at least 2.4 MHz bandwidth in each direction.

Time slot 0 is used for the Broadcast Control Channel and Common Control Channel following a 51 multiframe structure.

Time slots 1 through 7 are used for the traffic channels for the packet data and these are based on a 52 multiframe structure.

Page 231: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-1915

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-19

How Do EDGE Carriers Compare to TDMA Carriers?

EDGE Classic(200 KHz RF carrier)

TDMA(30 KHz RF carrier)

E1 E2 E3 D1 D2

Guard BandD3 D5D4 D6 D7

Guard band = 100 KHz

A TDMA RF carrier uses a 30 KHz wide channel.

Since EDGE is based on GSM technology, it uses a 200 KHz carrier.

The guardband is 100 KHz wide.

Page 232: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-20

As stated earlier, EDGE requires 0.1 MHz spacing between TDMA voice carriers and EDGE carriers.

In order to deploy EDGE Classic in a 4/12 reuse pattern within an existing 1900 PCS TDMA operator’s spectrum, roughly 85 TDMA voice carriers would have to be cleared to provide EDGE services.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-20

!If an operator has 15 MHz spectrum (1900 MHz) where 497+3 TDMA 30 KHz carriers are possible

!How much spectrum needs to be cleared for a minimal EDGE Classic allocation?

~85 TDMA carriers are cleared~85 TDMA carriers are cleared

EDGE Classic (4/12)

2.4 MHz 12.4 MHz, 412+3 carriers

15 MHz Band A

0.1 MHz

TDMA

Fitting EDGE Classic into PCS 1900MHz

0.1 MHz

Page 233: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-21

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-21

Packet Data

InteractiveMessaging

Circuit DataEmail/Web

Caching

Web Browsing (WAP)

IWF

SMSC

Circuit Switched

Mobility Management Provisioning &

Subscriber Management

OA&MNetwork

Management

Video StreamingInteractive Web

Music Media

Video ChatInteractive Purchasing

Multi-Media Access

EDGE Enables High Speed Data

Packet CoreNetwork

PDN

PortalProviders

CorporateNetwork

Back OfficeEnablers

WAPServer

E-mailServer

FaxServer

EDGE radios -overlay or

upgrade existing

EDGE radios -overlay or

upgrade existing SGSN provides mobility

SGSN provides mobility

Subscriber profile

management

Subscriber profile

management

Policy management

Policy management

MDBS

MDIS

IS

MSC

The big picture for the EDGE network.…

Having built on top of the GPRS network infrastructure, EDGE takes advantage of the IP-based packet network to offer higher speed data services.

Once the EDGE radios are deployed, numerous data services can beoffered including multimedia video. Even UMTS services will only offer 384 kbps when moving (the 2 Mbps is for stationary access). Thus, EDGE is truly a 3G solution and it does not require near the network impacts that UMTS does.

Page 234: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-22

Wireless Internet Evolution

2G Circuit Switched

(1999)

GSM1999 - 239M Subs2004 - 909M Subs

CAGR - 31%

GSM1999 - 239M Subs2004 - 909M Subs

CAGR - 31%

TDMA IS-1361999 - 36M Subs

2004 - 190M SubsCAGR - 39%

TDMA IS-1361999 - 36M Subs

2004 - 190M SubsCAGR - 39%

CDMA IS-951999 - 39M Subs

2004 - 265M SubsCAGR - 47%

CDMA IS-951999 - 39M Subs

2004 - 265M SubsCAGR - 47%

2.5G Packet Data

Overlay(2000-01)

1xRTTCircuit/ATM

GPRSCircuit/Packet

GPRS/EDGECircuit/Packet

3GIntegratedMultimedia(2001-02)

3xRTTIP

UMTSATM/IP

EDGE Multimedia

EndGame

(2003+)

• Software DefinedBTS

• Core IPNetwork

Application PortfolioApplication Portfolio

As we have seen, the wireless Internet evolution has many forms due to the complexity and propensity of different wireless technologies, particularly in the US.

Each has its own evolution plan but, in the end, they all are working towards a common goal; a network that supports real-time mobile multimedia.

This will be accomplished through packet networks with software defined products. No more proprietary technologies and protocols. A universal language of mobile communications.

Page 235: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-23

Introduction of EDGE - Phase 0

G-MSC

Transit layer

GGSN

SGSN SGSN

SGSN

Common HLR

EDGE Data

! Voice Services! Dedicated Infrastructure! Limited Flexibility

Traditional TDM Core Network

Parallel Packet Network! Build out data infrastructure

! IP applications via GPRS/EDGE

! Internet and Corporate Intranet services

MSC

MSC

EDGECell sites

Common GPRS Access Network

Packet Backbone

Intranets

Internet

Voice Services

PSTN

As has been discussed earlier, the introduction of EDGE into the network is laying the foundation for the evolution to the all-IP network.

The first step has voice following the traditional route through the circuit-switched MSCs. The EDGE packet data follows the packet backbone network utilizing the existing GPRS infrastructure.

Page 236: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-24

PSTNSGSN SGSN

SGSN

Common HLR

GGSN

EDGECell sites

VG

New

Transit Applications2G CS Domain

Services

New

MSC

VG

New

! Compressed Voice! IP and ATM Protocols

Voice Gateway

Call Server! MGCP Protocol! 2G Circuit Switched Voice

ServicesCommon GPRS Access Network

Packet BackboneIntranets

Internet

CallServer

EDGE - Phase 1Transition Backbone Traffic to Packet

The second phase of the evolution of the EDGE network is likely to bring end-to-end QoS-enabled real time IP services.

This will come about through the introduction of call servers initially supporting MGCP protocols. These will be used to support the legacy 2G circuit switched services.

The packet backbone network will be expanded to include Voice Gateways that provide VoIP translation from circuit to packet services.

All of the network traffic will eventually be carried over the backbone packet network.

Page 237: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-25

Packet Backbone

SGSN SGSN

SGSN

Common HLR

GGSN

EDGECell sites

VG

Add SIP Capability to Call Server

VG

EDGE - Phase 2 (GERAN)VoIP and Multimedia

Enhanced

Enhanced

! Iu-ps interface to SGSN for supporting voice over packet

EDGE Phase 3

Highlighted Enhancements! Migrate voice to VoIP over EDGE! Higher voice capacity! SIP capability added to call server

SIP MGCP

SS7GW

SIGTRAN

SIP

Legacy CircuitAccess Network

Common All IP Core Network

Migrate to VoIP

Voice

MSC

Internet

Intranets

Cable/DSL

PSTN

SS7

CallServer

The third and final phase is where we get to voice over EDGE (GERAN). This is true VoIP and multimedia capabilities over the EDGE interface. The traditional circuit switched voice will be migrated to the packet network using the call and mobility servers for switching.

The SGSN will be updated to include the new Iu-ps interface based on UMTS Release 200 standards for supporting voice over packet.

At the same time SIP protocols will be added to the call servers and GSNs to support real-time voice over IP.

Page 238: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-26

All IP CoreNetwork

EDGE Phase 2 - 3G.IP Enhancements

E-SGSN E-GGSN

GnIu-ps’

!Software Upgrade to Radio

Distributed ERAN

! Extension of GTP tunnel to BTS

! Ciphering and compression

! MAC/RLC Phase 2 Enhancements

! QoS Enhancements

! GSN software enhancements

! ERAN RF management server (e.g. HO)

! QoS Enhancements

BTS Core NetworkDistributed ERAN Architecture MGCCall Server

SIP

MG

SS7/IP

Mobility &IP Services

New for Voice

New for Voice

!GSN Software Upgrades!Additional Hardware Capacity

Future

GrPDN

AlternateAccess

Networks(cable, xDSL)

PSTN

Now we have a new interface between the BTS and the SGSN, known as the Iu-ps’ which is the Iu (UMTS) interface for ps’ (packet) services which will support voice as well as data.

This will be accomplished through software updates to the base station in order to provide an extension of the GTP protocol from the SGSN to the base station.

These updates will also include QoS enhancements as well as support for ciphering and compression.

Page 239: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-27

R00 EDGE/UMTS Reference Diagram

E-SGSNE-SGSN E-GGSNE-GGSN

CSCFCSCF

MRFMRF

MGCFMGCF

ERANERAN

URANURAN

HSS HSS

PSTN/Legacy/External

Multimedia IP Network

MGWMGW

SGWSGW

Applications& Services

Signaling Signaling/Data

Gn

Iu-ps’

Iu

Gi

Gi

GiMSMS

MSMS

Um

Um

Gr

IP Core NetworkAccess Independent

GSN Access NetworkCommon for EDGE/UMTS

Radio Access Network50% Common for EDGE/UMTS

This slide shows the new interfaces between the Release 00 basednetwork components and how EDGE and UMTS compare.

For the radio access network, EDGE and UMTS share about 50% commonality, at least in the initial phases. The packet access network (the GPRS support nodes) are the same for both EDGE and UMTS. Likewise, the backbone network is all-IP and is common for both EDGE and UMTS (as well as any other type of access).

Page 240: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-28

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-28

What is UMTS?

! UMTS stands for Universal Mobile Telecommunications System ! UMTS is a part of the International Telecommunications Union’s IMT-

2000 vision of a global family of third-generation (3G) mobile communications systems

! UMTS will play a key role in creating the future mass market for high-quality wireless multimedia communications that will approach 2 billion users worldwide by the year 2010

! UMTS will enable tomorrow’s wireless information society, delivering high-value broadband information, commerce and entertainment services to mobile users via fixed, wireless and satellite networks

! UMTS will speed convergence between telecommunications, IT, media and content industries to deliver new services and create fresh revenue-generating opportunities

! UMTS will deliver low-cost, high-capacity mobile communications offering data rates up to 2Mbit/sec with global roaming and other advanced capabilities

UMTS is all about the future third generation wireless network. It is the set of standards defined to provide high speeds packet data services combined with mobility to be used anywhere in the world.

Page 241: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-29

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-29

Architectural view of UMTS Network

PLMN

GMSCBS

BSC

TCU

SS7 LinksTrunks carrying circuit switched data and voice.

HLREIRACSMS

Circuit switched voice/data and packet data in the ATM packet form

Packet Data

NODE B

Global IP NetworkGlobal IP Network

RNC

GGSN

IP Network

SGSN Other PLMN

PSTN

SS7 Network (Links) SCP

IWF

MSC/VLR

The final step in the initial introduction of 3G technology will be the deployment of UMTS based systems. In this picture, we introduce the 3rd generation radio components. The UTRAN (Universal Terrestrial Radio Access Network) consists of the Nodeb and the RNC (Radio Network Controller). The Nodeb is the new W-CDMA radio that will offer 2Mbps speeds. The RNC is the equivalent of the BSC and will control the radios.

Also introduced is an Interworking function between the SGSN and the MSC. Functionally, this new entity is known as the U-MSC and will provide both MSC and SGSN functions. This will be a UMTS-based system with new interfaces and full interworking between GSM and UMTS services such as roaming and handovers. It will be backwards compatible to support 2G subscribers as well as UMTS subscribers.

The new interface will be ATM-based and transport both voice and data to the U-MSC. The data will go through the SGSN packet portion and the voice will be transported via the IWF to the MSC portion.

Page 242: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-30

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-30

UTRAN ACCESS NETWORK (ATM Based)

UTRAN: UMTS Terrestrial Radio Access Network OMC BOMC B

RNCRadioSite

Node B

RadioSite

Iub

RadioNetwork

Controller

RNC

ATM

ATM

Iur

ATMConcentrator

Node B Iub

RadioSite

Node B

Iub

Node B Iub

Uu

UMTS Network Interfaces - Phase 1Release 99

Iu, Iub, Iur and Uu are open interfacesIu, Iub, Iur and Uu are open interfaces

Iu

Iu

OMC R Core Network(GSM/GPRS NSS Based)

Iu

MAP

HLRHLR

MAP

CAP

CamelService

Environment

A

MAPMAP

SGSNGGSN

CAP

GnGb

(G)MSC

Phase 1 of the UMTS deployment includes a number of new interfaces.

The Iu interfaces will connect the new Radio Access Network (RAN) to the MSC. The Iub interface connects the base stations to the Radio Network Controller (RNC). The Iur interface connects the RNCs together.

According to the standards, these interfaces will be transported over ATM so the use of concentrators may be included in the network to connect several base stations to the RNC (this is optional, though).

The Node B is the new UMTS W-CDMA base station.

Page 243: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-31

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-31

Optimized Packet Core NetworkOptimized Packet Core Network

UMTS Network Architecture - Phase 2Release 2000

UTRAN ACCESS NETWORK (ATM Based)

UTRAN: UMTS Terrestrial Radio Access Network

Iu

Iu

Iu

OMC BOMC B

RNCRNCRadioSite

Node B

RadioSite

Iub

RadioNetwork

Controller

RNCRNC

ATM

ATM

Iur

ATMConcentrator

Node B Iub

RadioSite

Node B

Iub

Node B Iub

Uu

OMC ROMC R

UTRANGateway

ApplicationServers/Services

GGSN/Packet Gateway

OAMPBilling

VHEServer

INHLR Mobility

ManagerPSTN/TDM Gateway

UMTSCall Server

Core Network(Packet Network)

The second phase of the introduction of UMTS completely removes the circuit switching components. All network elements are server based connected to the IP backbone network. All voice is now carried over the packet network.

Page 244: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-32

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-32

Multiple Access IMT-2000 Spectrum

1850 1900 1950 2000 2050 2100 2150 2200 2250

ITU

USA MSSPCS

A D B F D E FBC CAReservedBroadcast auxiliary

2160 MHz1990 MHz

1850 1900 1950 2000 2050 2100 2150 2200 2250

1885 MHz

2025 MHz

2010 MHz

IMT 2000 IMT 2000 MSS

2110 MHz 2170 MHz

Europe1880 MHz 1980 MHz

GSM 1800 DECT UMTSFDD

MSS UMTSFDD

MSS

1805 MHz

1920 MHz

TDD

MSS

TDD

E

Unpaired Spectrum

Paired Spectrum

The IMT-2000 spectrum that was designated for UMTS services in Europe is split into 2 sections of spectrum. A paired band and an unpaired band. As we will see, different W-CDMA technology variants have been designated for each.

What is also evident and quite well known is the fact that the US does not have the same frequencies available for UMTS services since thatportion of the spectrum is already occupied by PCS. There is debate and talk about releasing the 2100 MHz range through auctions in a year or two as well as the current plan for the 700 MHz range but this too will take time to emerge.

Page 245: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-33

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-33

W-CDMAFDD

Time

Frequency

Power

Uplink Spectrum Downlink Spectrum1920 MHz 1980 MHz 2110 MHz 2170 MHz

Duplex Spacing : 190MHz

5 MHz 5 MHz

Cch15

UMTS USER 1Cch31

Code MultiplexCch76

Cch15

UMTS USER 2

Time

Frequency

Power

TD-CDMATDD

5 MHz1900 MHz or 2010 MHz 1920 MHz or 2025 MHz

DLUL

DL

Cch25Cch91

UMTS USER 2

Code Multiplex&

Time DivisionDL

Cch38

625 msUMTS USER 1

UL

Cch61

UMTS Physical Channels - FDD and TDD

This slide depicts how the physical channels look between FDD and TDD mode.

Both modes use a wideband CDMA 5 MHz channel for transmission. FDD uses paired spectrum so that one 5 MHz slice is used for the uplink path and the other 5 MHz slice is used for the downlink path.

For the TDD mode, it takes the same 5 MHz channel and segments it into slices over time so that different slots can be used for uplink or downlink.

Page 246: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-34

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-34

LCD And UDD Services For FDD Bearers

W-CDMAFDD

Time

Frequency

Power

UL DL

! LCD: Long Constrained Delay" Circuit connection emulation (for speech services also)" Code(s) allocated for the unique use of one user communication" Fixed services: LCD64, LCD144, LCD384 and LCD2048

User 1LCD service

C11C25

C15

User 3UDD service

C100C74

User 2UDD service

C32

C100

! UDD: Unconstrained Delay Data" Packet connection (shared codes like GPRS has shared channels)" Code(s) can be re-allocated to an another user during a communication" Flexible data services: UDD64, UDD144, UDD384 and UDD2048

There are two sets of bearer types for W-CDMA in the FDD mode. LCD and UDD depending on whether the connection required is for services that can handle delay or not.

Long Constrained Delay bearer services are defined for services that are intolerant to delay. Unconstrained Delay Data bearer services are for those services that can tolerate delay.

LCD is for voice and UDD is for packet, basically.

Page 247: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-35

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-35

Timeslot pair for Duplex connection

Timeslot pairs for 2 Duplex connection

Asymmetric ServicesTDD structure like in cordless systems

Asymmetric data connection

TX timeslots

TX timeslots

RX timeslots

RX timeslots

Symmetric Services

The Principle Behind TDD

In TDD mode the sender and receiver can operate on the same frequency like in DECT. The difference between uplink and downlike is just done by timeslots. Therefore it is not neccessary to have a duplex frequency pair for the TDD Mode.

The assignment of timeslots can be done with a great deal of flexibility according to the demanded data service and even for assymetric services e.g. internet surfing.

TDD provides high data rate downlinks and relatively low data rate uplinks.

Page 248: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-36

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-36

Applications for UTRAN's Modes

!FDD mode (using W-CDMA)"In public macro and micro cell environment"For data rates up to 384 kbps

!TDD mode (using TD-CDMA) "In public micro and pico cell environment"For unlicensed cordless and public wireless local loop"For data rates up to 2 Mbps and asymmetric traffic

!Multimode terminals: GSM and UTRA in FDD and TDD mode

The applications targeted for the different modes of UTRA mean that they complement each other well.

FDD is good for wide areas, high mobility but lower data rates.

TDD is good for smaller areas with less mobility but much higher data rates.

Page 249: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-37

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-37

!W-CDMA distinguishes users by codes, the same channel can be deployed in adjacent cells."Preferred configuration for

initial deployments!Every UMTS cell site can use

the same 5 MHz band" N = 1 reuse

!Channel reuse problem encountered in GSM is eliminated

!Greatly simplifies frequency planning in a fully W-CDMA environment

1

11

1

1 11

1

1

1

1

1

1

UMTS: N=1 Means Minimal Frequency

Planning is Required

UMTS: N=1 Means Minimal Frequency

Planning is Required

4

3

2

7

6

CELL1

5

4

3

2

7

6

5

CELL1 GSM N=7

Reuse PatternGSM N=7

Reuse Pattern

Code Planning (UMTS) vs Frequency Planning (GSM)

RF planning is much easier with UMTS since every cell uses the same 5 MHz band. There is no longer any channel reuse problems. This is how current CDMA networks are planned but W-CDMA is based on CDMA technology so the concept is the same.

Page 250: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-38

The capabilities promised to be provided by the future UMTS network is not just about packet networks alone. There are a number of advances in radio technology that, combined with UMTS will greatly enhance the services and bring to life the next generation of wireless communication.

Smart or adaptive antenna arrays will enable much more efficient usage of the radio spectrum which will be extremely important for UMTS services as higher bandwidths will require higher spectrum usage. Beam forming to focus the radio signal on a particular subscriber is just one example.

The usage of hierarchical cell structures will also be key. The radio network planning isn’t just about providing blanket coverage across the region. It is also about covering hot spots and high usage areas that demand more resources.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-38

Enabling Radio Network Technologies

!Capacity enhancementBy deploying micro and pico cells

!Universal coverageIndoor, urban, rural, satellite

!Support of all mobility typesFrom high mobility vehicular to pedestrian speeds

Smart Adaptive Antennas!Quantum leap in capacity

By interference reduction and extremely tight spectrum reuseespecially in macrocells

!Increased coverage (quality)Indoor penetration and high rangewith respect to distance / data rates

Satellite

Hierarchical Cell StructuresPico

MacroMicro

Page 251: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-39

With more and more information being transmitted over the same space and time, effective usage of the space is critical. New coding schemes help this problem but likely won‘t be enough by itself. Compression of the information is also a viable alternative. Just as we have seen with the explosive growth of the Internet, compression using “zip“ mechanisms for speedingtransmission and storage space savings will also benefit wireless data.

MPEG2/4 can compress the code for video data to less then 50 kbps.

Finally, multi-mode, multi-band radios and terminals will be fundamental to enable global roaming in this world of mixed frequencies. To speed the introduction and ease the problems, software definable radios will make this more realistic in a fast growing environment.

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-39

Enabling Radio Network Technologies

UMTS

TDMA

Multi-mode, -band / Software Radios!Common hardware

platformsSmooth migration

!GSM/UMTS dual modeEnables hotspot introduction of UMTS

!Global roaming with one terminal

GSM

Base

sta

tion

RF hardware

Digital signal

processor 1900 MHz2 GHz

Information Compression !Save precious radio capacity

Improved voice coding

!Enabling new servicese.g. video transmission (MPEG 2/4)

Page 252: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-40

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-40

3G (UMTS) Release 00 Unified Network

Iub

Packet Network

Intranets Internet

HLR SCP

Iu

Gb A

Iur

SS7GW

PSTN

PacketGateway

PSTNGateway

VoiceGateway

CallServer

WirelessGateway

MSCMSC

BSC

GSM BTS

UMTS BTSUMTS RNC

The release 2000 based UMTS 3G network. Much the same as we saw with the EDGE network (which is also part of Release 2000), the UMTS network also is packet based.

All traffic, voice and data are carried via the backbone and all network elements connect to the backbone. The UMTS BTS and RNC connect directly. The legacy GSM BTS connect via the SGSN (wireless gateway) and through the voice gateways.

Call servers support both UMTS based features as well as some legacy GSM services although the 2G MSCs are still supported in the network as well.

Page 253: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-41

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-41

Voice & Data(CS)

GSM

2G 2.5G

US

WORLD

Packet Data (2 Mbps)

UMTS

Voice & Data (CS)

R99

Packet Data (384 Kbps)

EDGE

Voice & Data (CS)

R99

Packet Data (100+ Kbps)

Voice & Data (CS)

GPRSPacket Data (115 Kbps)

R98

3G

ALL

IP

A Summary of Network Evolution

Converged Wireless Network

R00

Voice and Data over

Packet

GERAN/UMTS

So, to summarize how we got to UMTS in the GSM network…

The first step was the introduction of GPRS, based on Release 98 standards that gave us 115 kbps packet data as well as circuit-switched voice and data.

The next step along the path diverges depending on the country and the availability of new 3G spectrum. In the US, it is envisioned that EDGE will be the likely path due to no spectrum currently allocated. With EDGE, based on Release 99, we get 384 kbps packet data in addition to circuit switched voice and data.

The other path, likely to be followed in Europe will lead to UMTS, again based on Release 99. With UMTS, we get circuit switched voice and data as well as 2Mbps packet data.

What comes next? Based on Release 00, we end up with the converged wireless network with voice over packet. In UMTS, this is UMTS. In EDGE, this is known as GERAN.

Beyond that, we have the all-IP network.

Page 254: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-42

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-42

UMTS R99, 3G.IP and UMTS R00

H.323H.323 SIPSIP R99Speech(DTAP)

R99Speech(DTAP)

IPIP

UnspecifiedBest-EffortServices

UnspecifiedBest-EffortServices

GPRSGPRS

UnspecifiedReal-TimeServices

UnspecifiedReal-TimeServices

UMTS Lower Layers

UMTS R99 Standard3GIP Focus

UMTS R00 Standard

PS-Domain

CS-Domain

! R99 delivers:" PS-domain Real-Time & Best-Effort data services " CS-domain DTAP based voice services

! 3G.IP focus is PS-domain VoIP services based on SIP and/or H.323! 3G.IP provides two options for operators and vendors:

" Option 1: PS-domain voice and data services only" Option 2: PS-domain voice & data services and CS-domain voice services

! R00 encompasses 3G.IP output

Two organizations have been focusing on different aspects of themultimedia network.

UMTS has covered the circuit domain for voice and the packet domain for data.

3G.IP has focused on the packet domain for voice.

Release 00 of the standards encompasses both together.

Page 255: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-43

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-43

What is Mobile IP?

! A technology that allows mobile computing devices to exchange packet data as they change their physical location

! A suite of standards that adapt the existing Internet infrastructure to support mobility

RFC2002 The basic mobile IP protocol

RFC2003 IP-in-IP encapsulation

RFC2004 Minimal encapsulation in IP

RFC1701 Generic routing encapsulation

RFC2344 Reverse tunneling

Mobile IP is a solution for the Internet mobility problem that re-uses the existing infrastructure and protocols of the Internet.Mobile IP is defined in a series of proposals, or Request for Comments (RFC) prepared by the mobile IP working group, which is part of the routing area of the Internet Engineering Task Force (IETF). The following RFCs are published:

RFC2002: defines mobile IP protocolRFC2003: IP encapsulation within IPRFC2004: minimal encapsulation within IPRFC1701: generic routing encapsulation (GRE) protocol

GRE is a generic protocol that allows the encapsulation of packets of any protocol within any other protocol. It is very flexible but adds additional overhead compared with IP-in-IP encapsulation.

RFC2006: management information base (MIB) for mobile IPRFC2344: reverse tunneling for mobile IPRFC2005: applicability statement for mobile IP support

Page 256: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-44

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-44

Mobile IP: High Level View

! Confirm a change in location" This is a non-standard process

! Discover a foreign agent on the new network" Agent discovery (agent advertisements and/or agent

solicitations)! Obtain a temporary “care-of address” (COA)

" Obtained from the foreign agent! Inform home agent of new location and care-of

address" Registration procedures

! Send and receive IP packets" Packet tunneling and de-tunneling

This slide is a high-level summary of how mobile IP works.

Invocation of the mobile IP protocol begins when a mobile discovers that it has moved. RFC 2002 does not mandate a specific technique for this step. Typically one of two things happen. One is that the mobile node goes for a pre-determined time without receiving an agent advertisement message from an agent it was previously in communication with. The other is that it receives an agent advertisement message with a different network prefix from the network that it last connected to.

The mobile locates the foreign agent on the new network, and by exchanging messages with the FA, it obtains a new care-of address for the visited network.

The mobile node must then tell its home network what care-of address it is using on the foreign network. Mobile IP defines a registration process for this step. The home agent then can reroute packets destined for the mobile to its new location

The mobile node can send packets from the foreign network exactly the same as it would from its home network. However, for it to receive packets, the home agent that forwards its packets must create an IP tunnel that lets the IP network treat these packets as if they had originally been directed to the visited network.

Page 257: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-45

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-45

The Mobility Problem of Simple IP

Network C

Network ANetwork B

65.123.6.18

65.123.6.18

10.0.0.165.123.6.15 65.123.6.12

In the traditional implementation of IP, IP addresses are dependent on the network topology.

In this example, the mobile user with IP address 65.123.6.18 moves from Network A to Network B. Another user, on Network C, sends packet data to Network A. Routers look at the mobile’s IP address and deliver the packets to Network A. When the packets arrive at Network A, they find the mobile gone.

This situation causes a problem for a user who takes a lap top on a trip and plugs into a land-line network connection in a distant facility. In order to receive packets, the visitor must register for a new IP address specific to the new location, and then forward this address to any correspondent that might want to send him or her a packet.

The situation is even more complicated for a roaming wireless user. To continue to receive packet data, the subscriber must get a new IP address for every MTA he or she registers with. Each provider of data services that he or she subscribes to must register a new destination IP with each change of service area. What’s more, packet data sessions would get dropped each time the roamer handed-off across an MTA border.

Page 258: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-46

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-46

Mobile IP in 3G: An Example

VisitedRadio Network

HomeRadio Network

Foreign AgentHome Agent

In the new network I use a care-of-address assigned to me by the visited network’s Agent

I subscribe to a “push” service, for example, stock quotes

As I drive from one MTA to another, the stock quotes follow me

Internet

A server delivers content to my “home” IP address. I don’t need to tell it that I’ve moved to a new radio network.

I can subscribe to a service that continuously pushes packets at my mobile computing device. The content could be stock quotes, traffic information, etc. Or coworkers could be using a file transfer protocol to drop files into a shared folder on my mobile computer. Regardless of the type of service I am receiving, I don’t have to tell the source of my incoming packets that I am moving to another IP address on another radio network.

My mobile detects that I am being served by a different PDSN/SGSN.I get a “care-of” IP address from the foreign agent running on the PDSN/SGSN.The PDSN/SGSN notifies my home agent (which could be on another PDSN/SGSN) that I have a “care-of” address on its network.Until further notice, my home agent takes my incoming packets, wraps them in a larger packet, applies to the encapsulating packet my care-of address and sends the packet to the visited network.

The home network can be another radio network (as in this example), or it could be a corporate network (either wireline or wireless). In the latter case, any radio network becomes the visited network, and the wireless carrier provides the mobile user with secured corporate access – in other words, it becomes a virtual extension of a corporate Intranet.

Page 259: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-47

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-47

0000

200200200200

400400400400

600600600600

800800800800

1000100010001000

1200120012001200

1400140014001400

1600160016001600

90909090 91919191 92929292 93939393 94949494 95959595 96969696 97979797 98989898 99999999

Sing

le F

iber

Cap

acity

(Gbp

s)Si

ngle

Fib

er C

apac

ity (G

bps)

OC-768 (40 Gbps)16 Channels = 640 Gbps

40 Channels = 1600 Gbps

OC-768 (40 Gbps)16 Channels = 640 Gbps

40 Channels = 1600 Gbps

OC-192 (10 Gbps)16 Channels = 160 Gbps40 Channels = 400 Gbps80 Channels = 800 Gbps

128 Channels = 1280 Gbps

OC-192 (10 Gbps)16 Channels = 160 Gbps40 Channels = 400 Gbps80 Channels = 800 Gbps

128 Channels = 1280 Gbps

OC-48 (2.4 Gbps)40 Channels = 100 Gbps96 Channels = 240 Gbps

OC-48 (2.4 Gbps)40 Channels = 100 Gbps96 Channels = 240 Gbps

Increase in Capacity of a Single Fiber

Approaching 25 Million telephone calls or 200,000 typical web pages/second on a single fiber

Growth in Bandwidth Capacity: Transmission Revolution

US network capacity explodes by more than 8,000%

Fortune Magazine, 3/15/99

This chart depicts how rapidly the capacity of a single fiber is escalating. This capacity will increase approximately 8 fold just within the next 12 months.

A large part of this is due to the Internet but the wireless (and other wireline networks as well) will benefit from this growth. The backbone network was once a source of major congestion as the capacity was far outweighed by the demand. That trend has changed 180 degrees.

For the wireless networks, the last mile, or the air interface to the mobile devices will be the source of congestion and the focus of future bandwidth demand.

Page 260: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-48

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-48

Core Networking Evolution

B-ISDNIP Over

ATMIP Over

SONET/SDH

IPIP

OpticalOptical

IP Over Optical

Multiplexing, Protection andManagement at Every Layer

IPIP

SONET/SDHSONET/SDH

OpticalOptical

IPIP

ATMATM

OpticalOptical

ATMATM

SONET/SDHSONET/SDH

IPIP

OpticalOptical

Lower Equipment Cost and Operational CostLower Equipment Cost and Operational Cost

The evolution of the core network can take many forms. Regardless of which form, the outcome is lower equipment and operational costs.

IP can run over almost any medium and which is chosen is up to the operator.

Page 261: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-49

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-49

Services

Core Network Internet

PSTN

Common Open & Standard IP Architecture

Access layer Independence

Core IPCore IPCall Agent

MobilityMobilityManagementManagement

Access Network(s)

CDMA iDEN/TETRA3GFixed

WirelessTDMA GSM

AccessControl

UnifiedCommunications Voice

Features E-Commerce WebHosting

LocationServices

Other FeatureServers

The vision is to see access networks, such as cellular, wireless local loop, DSL and cable are all operated independently from the core network and the service layers.

There are many advantages to this.

Leveraging the same core network and service architecture for more than one access network.

Increase network deployment flexibility - pay as you grow investment.

Simplify control and management.

The service provider can start to use this IP core network and service architecture to differentiate their services. One example includes putting all message boxes (voice mail, fax, e-mail) in to an all-IP network.

Page 262: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-50

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-50

The Converged IP Network

IP Based Security & Authentication

IP Based Mobility Management

IP Based Call Control

ONE NETWORKONE NETWORK

VoiceVoice

DataData

VideoVideo

ImageImage

New Call ModelNew Call Model

Bearer TransportBearer

TransportCall

ControlCall

Control

ApplicationsApplications

ScopeScope

IP Based Bearer Transport

BackboneBackboneCore Network (may be up to BSS)

Core Network (may be up to BSS)RadioRadio

Voice/Data Convergence: “All IP” Network

What is the all IP network? It is the convergence of voice and data into a single network providing traditional voice services as well as data, imaging and full motion video.

This implies that a new call model will be required. Whereas in the past, the network was unified, we now have a separation of the call control from the bearer transport and the applications.

The scope of this separation implies an IP-based transportation of the bearer services, an IP-based transportation of the call control as well as the mobilitymanagement functions and security and authentication.

This migration towards IP will (has already) begin in the backbone network. This will be followed by its migration into the core network, perhaps as far as the radio.

The final step will be within the radio network itself.

Page 263: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-51

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-51

2G

IntegratedTransport

Control

Separated

3G+ (ATM/IP)

Applications

ISUP, BICC, MGC, SG in the form of

soft-switches

Packet based withATM or IP as thebackbone network

MG provides TDM to packet conversion

Server based applications

Separation of Transport, Control and Applications

2.5G/3G

Separated networks,but still integrated

The first generation networks were completely integrated with all signaling and bearer information transported along the same path.

The second generation separated the signaling and call control information but the network was/is still integrated.

In the next generation, we will have 3 distinct network layers. The transport layer will be packet-based ATM or IP serving as the backbone network. Media Gateways will provide TDM (Time Division Multiplexing) conversion to packets.

The call control layer will include Media Gateway Controllers and Signaling Gateways in the form of soft switches. These elements will handle the signaling information such as ISUP or BICC.

In the upper layer will reside the applications based on server platforms.

Page 264: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-52

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-52

Media Gateway Controller (MGC)/Signaling Gateway (SG) : Softswitch" Provides call control" Provides feature control" Provides digit translation and routing" Performs billing related timings" Performs the selection and release of Media Gateway trunks" Maintains the busy/idle status of Media Gateway Trunks" Provides call control related signaling functions

Media Gateway (MG):" Performs bearer conversion from TDM to packet (IP or ATM)" For ATM: Provides the user-side of UNI signaling protocol to set up the SVC

# Provides DS0 to VPI/VCI mapping# Provides AAL1 or AAL2 functions

" For IP: Provides the RTP/RTCP functionalities

New Network Entities

This slide is pretty self-explanatory. As has already been briefly described, the function of the Media Gateway Controller will be to provide the call control independently of the bearer information. This also includes feature control and routing information as well as billing. The selection of the trunks/paths to be used is also performed here.

The Media Gateway handles the bearer conversion from TDM to packet (either IP or ATM). In the case of ATM, it will be the user side of UNI protocol for establishing the SVCs. Mapping will be performed between DS0 and VPI/VCI and will provide AAL1 and AAL2 layer functions. In the case of IP, it will provide RTP/RTCP functions.

Page 265: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-53

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-53

ATM

IP

Introducing Soft Switches

Control

ISUPISUP

BICC (Bearer Independent Call Control)

MGCP/MEGACO

MGCP/MEGACO

Control

ISUPISUP

BICC

MGCP/MEGACO

MG MG

TDM(DS0)

TDM(DS0)

RTP/RTCPRTP/RTCPIP based Core

Network

CELLULAR

RTP: Real Time ProtocolRTCP: Real Time Control ProtocolMEGACO: Media Gateway Controller

CELLULAR

MG: Media GatewayMGCP: Media Gateway Control Protocol

MGCP/MEGACO

MG MG

TDM(DS0)

TDM(DS0)

ATM(VPI/VCI)

ATM(VPI/VCI) ATM Edge

Switch

ATM(VPI/VCI)

ATM(VPI/VCI)

ATM Core Network

UNI UNINNINNI

ATM Edge

Switch

VPI: Virtual Path IdentifierVCI: Virtual Channel Identifier

CELLULAR

CELLULAR

As mentioned, in this new network we introduce the concept of soft switches. There is no traditional MSC as we know it anymore.

In the case of an all-IP network, the Media Gateway converts TDM to RTP/RTCP for transmission of the bearer information via an IP-based core network.

The call control is handled by the Media Gateway Controllers that take ISUP from the TDM world and convert it to BICC.

In the ATM world, the Media Gateway converts TDM to User-to-Network Interface for establishing the SVCs for transmitting the bearer information via the ATM core network.

Again, the call control is handled by the Media Gateway Controllers converting ISUP to BICC.

Page 266: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-54

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-54

ISUP

ISUP

Call Scenario Using Traditional Switching

Home

VisitingMSC

GMSC TodayToday

Let’s take a look at a simple example of how a Mobile terminated call is made today.

A wireline subscriber calls a wireless subscriber somewhere in the country. The call is set up using ISUP signaling through the PSTN where it is routed to a Gateway MSC. The G-MSC sends the call set-up to the Visiting MSC where the subscriber is currently located.

The bearer information (the voice) is then established through the PSTN via the G-MSC. In this case, it criss-crosses the country.

Not the most elegant use of network resources.

Page 267: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-55

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-55

Home

Visiting MSC Server

GMSC Server

MGC

Voice over PacketVoice over Packet

ISUP

BICCBICC

Actual Voice Transport (Voice over Packet)

Call Scenario Using Soft Switches

Now, let’s take a look at an example using soft switches. Again, we have a wireline subscriber calling a mobile subscriber somewhere in the country.

Instead of a G-MSC, we have a G-MSC server acting as the Media Gateway Controller. The call set up is sent using BICC signaling to the MGC. The MGC then routes it to the Visiting MGC currently serving the subscriber.

The bearer information (voice) is then sent over the packet network using Media Gateways. The call control information has no idea that the bearer information is being transported over the packet network nor does it care.

This is a much more efficient use of network resources.

Page 268: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-56

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-56

Seamless Services Across IP-based Networks

IP/ATM Network

Service plane

IN Servers 3rd Party Applications

xDSL

OpticalWireless

POTS/ISDN

SG & Call Feature ServersMobility Servers

The network of the future being aggressively pursued by the standardization bodies as well as the equipment manufacturers and the operators too.

It is a simple transport network with intelligence at the periphery.This intelligence residing at the edges of the network come in the form of mobility management, application services, operations, administration andprovisioning.

Such a simple transport based on IP and/or ATM and optimized for all services.

The anywhere, anytime, any media service network.

Page 269: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-57

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-57

From 3G Cellular to Ad-Hoc Networks – 4G?

Adaptive multi-hop ad-hoc networkAdaptive multi-hop ad-hoc network

Relaying by other mobiles used to routepackets to an access point

Relaying by other mobiles used to routepackets to an access point

One example of an ad-hoc network is one where the network sort of creates itself as needed, hence the term ad-hoc. It adapts to its environment and changes as the requirements change.

In this example, the network is composed of the wireless terminals that currently are within a given area. When one wants to send packets of information to the network, it might “relay” them through other terminals that are within the are until the information reaches an access point.

As the terminals enter and leave the area, the network re-organizes itself so that it is constantly changing.

Page 270: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-58

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-58

Reasons for Ad-hoc Networking

! Today, the PC world requires literacy to use remote services based on an IP connection" A wireless notebook user wants to use the nearest wireless LAN

services" He needs to look for the nearest printer" He needs to identify the printer (e.g. printer LaserJet01 at

PRD70345)" He has to install the printer drivers (e.g. for HP LaserJet 4) using a

CD-ROM or by download from the Internet! If he isn’t PC literate, he won’t be able to do it! Ad-hoc Networking solves these problems

" To get offered the best service (a print service selected by location, availability and resolution)

" To use this service with a simple plug and play (without any administration or installation of printer drivers)

The world of personal computers and all of the devices associated with these networks can be intimidating at best. As sophisticated and as intelligent as these devices have become, they still require a rather detailed understanding of how to set up and administer them. Loading the proper device drivers, for example, is critical to making them work but can be very confusing and even dangerous if you don’t know what you are doing.

An ad-hoc network maintains this information for the user so that he doesn’t have to know or understand it. The network maintains the information for the user. As devices enter and leave, the “profile” of information required to use the device is stored in the network. When a user requests a service, the network provides the profile to the user device which automatically configures according to the profile.

Page 271: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-59

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-59

Plug and Play of an Ad-hoc Network

I need to use a color printer Sorry, I support

only black and white

Sorry, I am busyHere, I am available

plug and playAd-hoc Network of

Printer Services

plug and play

plug and play

plug and play

In this example, a device needs to access a color printer. The ad-hoc network as a number of printers registered to it and has the necessary driver and address information stored. It may also know the status of the different printers so that it can direct the device to the one that is best suited for it.

This can be especially essential for wireless LANs where devices are moving in and out. With an ad-hoc network, the need for pre-defined knowledge and set up of the devices is eliminated since the network maintains the information.

Page 272: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-60

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. 7-60

Ad-Hoc Networking Scenarios

! Smart Home" Plug and play" Support different end devices (mobile phone, microwave,

etc.)" Zero network administration

! Small Office / Home Office (SOHO)" Remote use of company services" Zero service installation and software upgrade

! Large Enterprises" Spontaneous use of projectors and printer services by

different internal and external participants" Location dependent ad-hoc access of campus services

for mobile terminals (mobile phone, PDA, notebook)! Others like airports, hospitals, shops, museums

There are many potential uses and applications for ad-hoc networks and they cover just about any possible location. The network and the devices continue to get more intelligent thus relieving the user from having to know, understand and practice the art of device administration within a network.

Whether this is a step in the evolution towards a fourth generation network or whether it is the fourth generation network remains to be seen. In any event, it is certain that networks and devices will get smarter, people will have less to worry about and the quality of the mobility of their lives will continue to be enhanced.

Page 273: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. 7-61

Lesson 7: Self-Check

1. What is IS-2000?

2. What is the difference between IS-2000 and WCDMA/UMTS/G3G?

3. Define EDGE and explain its three phases.

4. Explain how many TDMA carriers need to be cleared for EDGE.

5. What is UMTS?

6. What is Mobile IP?

Page 274: GTCICourse 221
Page 275: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-1

Appendix A - Acronyms 1G First-generation analog cellular telephone systems 1xRTT One times Radio Transmission Technology 2G Second-generation cellular telephone systems (today’s digital

cellular technologies) 2.5G Interim cellular telephone technologies appearing during the

evolution from 2G to 3G 3G Third-generation cellular phone service 3xRTT Three times Radio Transmission Technology AAA Authentication, Authorization, and Accounting AAL ATM Adaptation Layer AC Authentication Center AC Alternating Current ACF Association Control Function ACL Asynchronous Connectionless AMPS Advanced Mobile Phone Service ANSI American National Standards Institute AOA Angle of Arrival AP Access Point API Application Programming Interface APNIC Asian-Pacific Network Information Center ARIB Association of Radio Industries & Businesses ARIN American Registry for Internet Numbers ARP Address Resolution Protocol ARPANET Advanced Research Projects Agency Network ARQ Automatic Request for Retransmission ATM Asynchronous Transfer Mode BCCH Broadcast Control Channel BG Border Gateway BGP Border Gateway Protocol BHCA Busy Hour Call Attempt BICC Bearer Independent Call Control BRAN Broadband Radio Access Network BS Base Station BSC Base Station Controller BSM Base Station Manager BSS Base Station Subsystem BTA Basic Trading Area BTS Base Transceiver System CA Certification Authority CAMA Centralized Automated Message Accounting CAMEL Customized Applications for Mobile Network Enhanced Logic CCCH Common Control Channel CDM Code Division Multiplexing CDMA Code Division Multiple Access

Page 276: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-2

CDPD Cellular Digital Packet Data CIA Central Intelligence Agency CLNP Connectionless Network Protocol CORBA Common Object Request Broker Architecture CPE Customer Premise Equipment CPU Central Processing Unit CPCI Compact PCI CS Coding Scheme or Capability Set CSD Circuit Switched Data CSMA/CD Carrier Sense Multiple Access with Collision Detection CTIA Cellular Telecommunications Industry Association DC Direct Current DCC DLC Connection Control DECT Digital European Cordless Telecommunication DHCP Dynamic Host Control Protocol DL Down Link DLC Data Link Control DNS Domain Name Server DSL Digital Subscriber Line DTAP Direct Transfer Application Part DTCH Dedicated Traffic Channel DTE Data Terminal Equipment DTMF Dual Tone Multi Frequency DTX Discontinuous Transmission EA Economic Area EC Error Control ECSD Enhanced Circuit Switched Data EDGE Enhanced Data Rates for Global Evolution EGP Exterior Gateway Protocol EGPRS Enhanced GPRS EIR Equipment Identity Register E-OTD Enhanced Observed Time Difference ERAN EDGE Radio Access Network ESMR Enhanced Specialized Mobile Radio ESN Electronic Serial Number ETSI European Telecommunication Standards Institute FBI Federal Bureau of Investigations FCC Federal Communications Commission FDD Frequency Division Duplex FDDI Fiber Distributed Data Interconnect FDM Frequency Division Multiplexing FDMA Frequency Division Multiple Access FES Fixed End System FH Frequency Hopping FHSS Frequency Hopping Spread Spectrum FR Frame Relay

Page 277: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-3

FTP File Transfer Protocol GGSN Gateway GPRS Support Node GHz Gigahertz GIX Global Internet Exchange GMSC Gateway Mobile Switching Center GMSK Gaussian Minimum Shift Keying GPRS General Packet Radio Service GPS Global Positioning System GR GPRS Register GSM Groupe Spéciale Mobile or Global System for Mobile

Communications GTP GPRS Tunneling Protocol HCI Host Controller Interface HDLC High Level Data Link Control HDML Handheld Devices Markup Language HDTP Handheld Device Transport Protocol HLR Home Location Register HPLMN Home Public Land Mobile Network HSCSD High Speed Circuit Switched Data HTML Hyper Text Markup Language HTTP Hyper Text Transfer Protocol ID Identification IEC International Electrotechnical Committee IEEE Institute for Electrical and Electronics Engineers IETF Internet Engineering Task Force IGP Interior Gateway Protocol IMEI International Mobile Equipment Identifier IMSI International Mobile Stations Identifier IMT2000 International Mobile Telecommunication 2000 – Standards IN Intelligent Network INAP Intelligent Network Application Protocol IP Internet Protocol or Intelligent Peripheral IPsec Internet Protocol Security ISDN Integrated Services Digital Network ISM Industrial, Scientific & Medical ISO International Standards Organization ISOC Internet Society ISP Internet Service Provider ISUP ISDN User Part IS-2000 Interim Standard 2000 IS-95 Interim Standard 95 IT Information Technology ITU International Telecommunications Union IVR Interactive Voice Response IWF Interworking Function L2CAP Link Layer Control & Adaptation

Page 278: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-4

L2TP Level 2 Tunneling Protocol LAC Link Access Control LAES Lawfully Authorized Electronic Surveillance LAN Local Area Network LCD Long Constrained Delay LCS Location Services LDAP Lightweight Directory Access Protocol LLC Logical Link Control LMU Location Measurement Unit Kbps Kilobits per second MAC Media Access Control MAE Metropolitan Area Exchange MAN Metropolitan Area Network MAP Mobile Application Part MC Message Center MCPA Multi-Carrier Power Amplifier MDBS Mobile Data Base Station MD-IS Mobile Data Intermediate System M-ES Mobile End System MG Media Gateway MGC Media Gateway Controller MGCP Media Gateway Control Protocol MHz Megahertz mA Milli-Ampere µA Micro-ampere µs Micro-second MIB Management Information Base MIP Mobile IP MIPS Micro Instructions per Second MOC Mobile Originated Call MPEG Moving Picture Experts Group MPLS Multi-Protocol Label Switching MS Mobile Station ms Milli-Second MSC Mobile Switching Center MT Mobile Terminal MTA Major Trading Area MTC Mobile Terminated Call MTX Mobile Telephone Exchange NAP Network Access Point NEBS Network Equipment Building System NIC Network Information Center or Network Interface Card NMS Network Management System NNI Network-to-Network Interface NNTP Network News Transfer Protocol NOC Network Operation Center

Page 279: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-5

NPDB Number Portability Database NSF National Science Foundation NSP Network Service Provider NSS Network Switching Subsystem OA&M Operation Administration & Maintenance OHG Operator’s Harmonization Group OMC Operation Maintenance Center ONC Optical Network Controller OSI Open Systems Interface OSPF Open Shortest Path First PA Power Amplifier PAN Personal Area Network PACCH Packet Associated Control Channel PBCCH Packet Broadcast Control Channel PBX Private Branch Exchange PC Personal Computer PCS Personal Communications Service PCU Packet Control Unit PDA Personal Digital Assistant PDC Personal Digital Cellular PDE Position Determining Equipment PDN Packet Data Network PDTCH Packet Data Traffic Channel PDU Packet Data Unit PHS Personal Handyphone System PIN Personal Identification Number PKI Public Key Infrastructure PLMN Public Land Mobile Network PMA Parked Member Address PoP Point-of-Presence POTS Plain Old Telephone Service PPP Point-to-Point Protocol PPTP Point-to-Point Tunneling Protocol PRI Primary Rate Interface PROM Programmable Read Only Memory PSAP Public Safety Answering Point PSK Phase Shift Keying PSPDN Packet Switched Public Data Network PSTN Public Switched Telephony Network PTCCH Packet Timing advance Control Channel QAM Quad Amplitude Modulation QoS Quality of Service RADIUS Remote Authentication Dial-in User Service RAM Random Access Memory RAN Radio Access Network RARP Reverse Address Resolution Protocol

Page 280: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-6

RAS Remote Access Server RF Radio Frequency RIP Routing Information Protocol RIPE Réseaux IP Européens RLC Radio Link Control RLP Radio Link Protocol RMI Remote Method Invocation RNC Radio Network Controller ROM Read Only Memory RRC Radio Resource Control RSVP Resource Reservation Protocol RT Real Time RTCP Real Time Control Protocol RTP Real Time Protocol RTT Radio Transmission Technology SCF Service Control Function SCO Synchronous Connection Oriented SCP Service Control Point SCS Service Creation System SDH Synchronous Digital Hierarchy SDP Service Discovery Protocol SG Signaling Gateway SGSN Serving GPRS Support Node SIG Special Interest Group SIM Subscriber Identity Module SIP Session Initiation Protocol SLA Service Level Agreement SLIP Serial Line Internet Protocol SMA Smart Mobile Access SMLC Serving Mobile Location Center SMS Short Message Service SMSC Short Message Service Center SMTP Simple Mail Transfer Protocol SN Service Node SNMP Simple Network Management Protocol SOHO Small Office Home Office SONET Synchronous Optical Network SS7 Signaling System 7 SSF Service Switching Function SSL Secure Socket Layer SSP Service Switching Point STP Signaling Transfer Point SVC Switched Virtual Circuit SW Software TA Technical Advisors TAG Technical Advisory Group

Page 281: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-7

TB TeraByte TCAP Transaction Capabilities Application Part TCP Transmission Control Protocol TCS Telephony Control Protocol TCU TransCoding Unit TDOA Time Difference of Arrival TDD Time Division Duplex TDM Time Division Multiplexing TDMA Time Division Multiple Access TDP Trigger Detection Point TETRA Terrestrial Trunked Radio Access TIA Telecommunications Industry Association TLS Transport Layer Security TOA Time of Arrival TOS Type of Service TRU Transceiver Radio Unit TS Time Slot TTP Trusted Third Party UDD Unconstrained Delay Data UDP User Datagram Protocol UDS Unified Directory Server UM Unified Messaging UMTS Universal Mobile Telecommunication System UNI User-to-Network Interface URL Uniform Resource Locator USB Universal Serial Bus USIM UMTS SIM USNC United States National Committee UTRA UMTS Terrestrial Radio Access UTRAN UMTS Terrestrial Radio Access Network UUID Universally Unique Identifier VBNS Very high speed Backbone Network System VCI Virtual Channel Identifier VHE Virtual Home Environment VLR Visitor Location Register VoIP Voice over IP VPI Virtual Path Identifier VPLMN Visited Public Land Mobile Network VSELP Vector Sum Excited Linear Prediction WAE Wireless Application Environment WAN Wide Area Network WAP Wireless Application Protocol W-CDMA Wideband Code Division Multiple Access WDM Wave Division Multiplexing WDP Wireless Datagram Protocol WIM Wireless/WAP Identity Module

Page 282: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology January 4, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. A-8

WIN Wireless Intelligent Network WLAN Wireless LAN WML Wireless Markup Language WPKI Wireless Public Key Infrastructure WSP Wireless Session Protocol WTA Wireless Telephony Application WTLS Wireless Transport Layer Security WTP Wireless Transaction Protocol WWW World Wide Web XML Extensible Markup Language

Page 283: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-1

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-1

StandardizationAppendix B

Page 284: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-2

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-2

Objectives

! Define the standardization process! Review major standards bodies! Define the roles these bodies play in the

development of future wireless data networks

Page 285: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-3

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-3

Definition of a Standard

ISO/IEC Guide 2:1996 defines a standard as adocument, established by consensus and approved by a recognized body, that provides, for common and repeated use, rules, guidelines or characteristics for activities or their results, aimed at the achievement of the optimum degree of order in a given context.

Page 286: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-4

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-4

!Represent a level of know-how and technology which is indispensable to the industry

Roles Filled by Standards

!A reference document used in particular in the context of public contracts or in that of international trade and on which the majority of commercial contracts rely

"A factor for rationalization of production"A factor for clarification of transactions"A factor for innovating and developing products"A factor for transferal of new technologies"A factor for strategic choice for companies

Page 287: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-5

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-5

Characteristics of Standards

!Cover several disciplines!Are coherent and consistent!Result from participation!Are a living process!Are up to date!Have a reference status!Have national or international recognition!Are available to everyone

"As a general rule, standards are voluntary not mandatory but in certain cases, implementation may be obligatory

Page 288: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-6

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-6

Major Phases of a Standard

! Identification of the needs of the partners!Collective programming!Drawing up of the draft standard by the interested parties!Consensus !Validation!Approval !Review

Page 289: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-7

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-7

Factors Affecting Standardization

!Recognized as being an essential discipline"European economic integration - the free movement of goods

and services within the Union"Quality increasing importance asserts itself more and more as a

determining factor of competitiveness"Emergence of new techniques and technologies - common rules

which facilitate interoperability

!Drawn up at international (e.g ISO), regional (e.g. ETSI) and national level (e.g. ANSI)

!Generic management system standards"Standards’ requirements can be applied to any organization,

regardless of the product it makes"ISO 9000 series for managing quality systems"ISO 14000 series for environmental management systems

Page 290: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-8

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-8

Certification of Conformity to StandardsCertification is a procedure by which a third party gives written assurance that a product, process or service conforms to specified requirements. (Definition: ISO/IEC Guide 2:1996)! Certification is an asset and an advantage, both for

the producer and for the purchaser! Product certification attests that a product complies

with the safety, fitness for use and/or interchangeability characteristics defined in standard(s)

! Organization certification demonstrates the conformity of an organization's management system to the relevant model (e.g. ISO 9000)

Page 291: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-9

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-9

Standards Bodies and Fora

Page 292: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-10

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-10

Standards Bodies Relationships

Page 293: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-11

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-11

! Administrator and coordinator of the United States private sector voluntary standardization system for more than 80 years

! Public/Private sector partnership since 1918 ! 1000+ Member Companies! Revenues of $1.2+ trillion ! 280+ Professional, Trade, Educational, Consumer,

and Labor institutions ! 30+ Government agencies

American National Standards Institute

Page 294: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-12

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-12

ANSI

! Does not develop standards! Facilitates development by establishing consensus

among qualified groups! More than 175 distinct entities currently accredited

under one of the Federation’s three methods of accreditation (organization, committee or canvas)

! In 1999, the number of American National Standards increased by nearly 5.5% to 14,650

Page 295: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-13

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-13

ANSI

! Promotes the use of US standards internationally! Advocates US policy and technical positions in

international and regional standards organizations! Encourages the adoption of international standards

as national standards where these meet the needs of the user community

! Sole US representative and dues-paying member of the two major non-treaty international standards organizations, the International Organization for Standardization (ISO), and, via the US National Committee (USNC), the International ElectrotechnicalCommission (IEC)

Page 296: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-14

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-14

ANSI

! Accredits US Technical Advisory Groups (TAGs) or USNC Technical Advisors (TAs)

! The US TAG’s (or TA’s) primary purpose is to develop and transmit, via ANSI, US positions on activities and ballots of the international technical committee

! Promote US Standardization Policies Globally" GOAL: Global standards that reflect US that reflect US interests" US standards used abroad " US positions (policy and technical) accepted in international and

regional standards organizations" International standards adopted as national standards where these

meet the needs of the user community

Page 297: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-15

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-15

ANSI Organization

Page 298: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-16

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-16

Alliance for Telecommunications Industry Solutions

! North American standards body leading the development of telecommunications standards, operating procedures and guidelines through its sponsored committees and forums

! Member companies are North American and World Zone 1 Caribbean providers of telecommunications services, and include: " Telecommunications service providers " Competitive local carriers, Cellular carriers" Inter-exchange companies, local exchange companies " Manufacturers, software developers " Resellers, enhanced service providers, and providers of

operations support

Page 299: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-17

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-17

Alliance for Telecommunications Industry Solutions

! Established at the divestiture of the Bell System in 1984! Mission

" Actively promote the timely resolution of national and international issues involving telecommunications standards and the development of operational guidelines

" Initiate and maintain flexible, open industry forums to address technical and operational issues affecting the nation's telecommunications facilities and services and the development of innovative technologies

" Promote industry process and harmony with minimal regulatory or legislative intervention

Page 300: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-18

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-18

Alliance for Telecommunications Industry Solutions

! Over 3,000 industry company representatives ! Focus on solutions to numerous new challenges

" Y2K interoperability testing " Global wireless communications " Number portability " Improved data transmission " Toll fraud " Convergence of new technologies

Page 301: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-19

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-19

Alliance for Telecommunications Industry Solutions

! Carrier Liaison Committee (CLC)Executive oversight for the Network Interconnection Interoperability Forum, the Ordering and Billing Forum, the Industry Numbering Committee and the Toll Fraud Prevention Committee" Network Interconnection Interoperability Forum (NIIF)

Provides an open forum to encourage the discussion and resolution, on a voluntary basis, of industry-wide issues associated with telecommunications network interconnection and interoperability which involve network architecture, management, testing and operations and facilitates the exchange of information

" Ordering and Billing Forum (OBF)Provides a venue for customers and providers in the telecommunications industry to identify, discuss and resolve national issues that affect ordering, billing, provisioning and exchange of information about access services and other connectivity and related matters

Page 302: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-20

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-20

Alliance for Telecommunications Industry Solutions

! Carrier Liaison Committee (CLC) (continued)

" Industry Numbering Committee (INC)Provides an open forum to address and resolve industry-wide issues associated with the planning, administration, allocation, assignment and use of resources and related dialing considerations for public telecommunications within the North American Numbering Plan (NANP) area

" Toll Fraud Prevention Committee (TFPC)Dedicated to the identification and prevention of toll fraud vulnerabilities in our national public switched network, and resolves issues involving fraud pertinent to the telecommunications industry.

! Committee T1-Telecommunications (T1)Accredited by the American National Standards Institute (ANSI). Develops technical standards for telecommunications network interconnection, interoperability and performance. More than 1,500 scientists and engineers

Page 303: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-21

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-21

Alliance for Telecommunications Industry Solutions

! Committee O5 - Wood Poles (O5)Develops standards and specifications for industry use in areas dealing with wood poles, crossarms and other wood products

! Data-Aware Transport Activity (DATA)Addresses multi-vendor interoperability focusing on interface compatibility, service, interworking and end-to-end management

! Generic Requirements Users GroupA consensus-based industry committee that seeks improvements in the generic requirements process. The group identifies and recommends solutions to improving task definition in the front-end planning of generic requirements, minimizing unwarranted duplication betweengeneric requirements and other related documents, and improving the technical content of generic requirements and their quality

Page 304: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-22

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-22

Alliance for Telecommunications Industry Solutions

! Internetwork Interoperability Test Coordination (IITC) CommitteeProvides strategic planning, industry funding, and management mechanisms for test coordination as well as a forward-looking test coordination program in recognition of the expanding issues of increased network interconnection. Oversees the Network Testing Committee

! Network Reliability Steering Committee (NRSC)Performs analyses of network outages and provides recommendations for corrective actions. NRSC issues quarterly and annual reports to the industry and the Federal Communications Commission (FCC), in liaison with the FCC's Network Reliability Council

! Network and Services Integration Forum (NSIF)Resolves interoperability issues to promote wide deployment of SONET, including IP over SONET, ATM over SONET, and ATM over optical networks

Page 305: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-23

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-23

Alliance for Telecommunications Industry Solutions

! Protection Engineers Group (PEG)Provides guidance in efforts to improve the safety and reliability of telecommunications networks. Recommends standards for electricalprotection of communications facilities, including broadband service architectures and cellular systems

! Telecommunications Industry Forum (TCIF)Promotes electronic commerce, electronic data interchange, improvements in bar coding of telecommunications products for inventory control, and electronic bonding

Page 306: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-24

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-24

Standards Committee T1 -Telecommunications

! Established in February 1984! Develops technical standards and reports regarding

interconnection and interoperability of telecommunications networks at interfaces with end-user systems, carriers, information and enhanced-service providers, and customer premises equipment (CPE)

! Membership and participation open to all parties with a direct and material interest in the T1 process and activities

Page 307: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-25

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-25

Standards Committee T1 -Telecommunications

! Responsibilities" Developing proposed American National Standards " Voting on approval of such proposed standards " Maintaining and updating the standards developed by the

Committee " Interpreting the standards developed by the Committee " Adopting and revising Committee polices and procedures " Other matters requiring Committee action as provided in the

Bylaws

Page 308: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-26

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-26

Standards Committee T1 -Telecommunications

! Six technical subcommittees that are advised and managed by the T1 Advisory Group (T1AG) " T1A1 - Performance and Signal Processing

#Performance and Signal Processing; Network Survivability; Multimedia Communications

" T1E1 - Interfaces, Power and Protection of Networks#Power Systems/Interfaces; Analog Access; Wideband Access;

Electrical and Physical Protection DSL Access

" T1M1- Inter-network Operations, Administration, Maintenance & Provisioning#Testing and Operations, Systems and Protocols; Internetwork

Planning and Engineering; OAM&P

Page 309: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-27

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-27

Standards Committee T1 -Telecommunications

! Six technical subcommittees that are advised and managed by the T1 Advisory Group (T1AG) " T1P1 - Wireless/Mobile Services and Systems

#Personal Communications; Wireless Access and Terminal Mobility; Wireless/Mobile Services & Systems

" T1S1 - Services, Architectures and Signaling#Architecture, Services and Control; Switching and Signaling

Protocols; Number Portability

" T1X1 - Digital Hierarchy and Synchronization#Synchronization Interfaces; Metallic and Optical Hierarchical

Interfaces

Page 310: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-28

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-28

Telecommunications Industry Association

! Trade Association representing US Suppliers and Manufacturers of communications and information technology products

! Over 1,000 members, large and small! Normal Trade Association Activities

" Public Policy to Congress, Regulators" Education (Seminars, Conferences)" International trade support" Represent industry on FCC’s North American Numbering

Council (NANC), Network Reliability and Interoperability Council (NRIC), Public Safety National Coordinating Committee (NCC)

Page 311: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-29

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-29

Telecommunications Industry Association

! Standards Developer - activities open to participation worldwide, not only North America

! Accredited by ANSI! Over 1,300 experts participate! 12 Engineering Committees, about 70 Formulating Groups! Over 400 companies/organizations participate! Active in CITEL, NAFTA Consultative Committee Telecommunications

(CCT), ITU, APEC! Recognized by ITU-T under Recommendations A.5 and A.6! TIA standards form part of ITU-R IMT-2000 Recommendation! Participant in Global Standards Collaboration/RAdio STandardization

(GSC/RAST) meetings

Page 312: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-30

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-30

Telecommunications Industry Association

! TIA Engineering Committees" TR-8

Mobile and Personal Private Radio Standards

" TR-14Point-to-Point Communications Systems

" TR-29Facsimile Systems and Equipment

" TR-30Data Transmission Systems and Equipment

" TR-32Personal Radio Equipment

" TR-34Satellite Equipment and Systems

" TR-41User Premises Telephone Equipment Requirements

" TR-42Telecom. Cabling Infrastructure

" TR-45Mobile and Personal Communications Systems

" TR-46Mobile and Personal Communications 1800 Standards

" FO-2Optical Communications Systems

" FO-6Fiber Optics

Page 313: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-31

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-31

Telecommunications Industry Association

! TIA Engineering Committees" TR-8 Mobile and Personal Private Radio Standards

Responsible for private radio communications systems, services and equipment including voice and data applications# TR-8.1 Equipment Measurement Procedures# WG-8.3 Encryption# WG-8.4 Vocoder# TR-8.5 Signaling and Data Transmission# TR-8.6 Equipment Performance Recommendations# TR-8.10 Trunking and Conventional Control# TR-8.11 Antennas# TR-8.15 Common Air Interface# TG-8.16 EDACS System and Standards Definition# TR-8.17 RF Exposure# TR-8.18 Wireless Systems Coverage & Compatibility# TR-8.19 Wireline Systems Interfaces

Page 314: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-32

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-32

Telecommunications Industry Association

! TIA Engineering Committees" TR-45 Mobile and Personal Communications Systems

Performance, compatibility, inter-operability, and service standards for mobile and personal communications systems. These standards pertain to, but are not restricted to, service information, wireless terminal equipment, wireless base station equipment, wireless switching office equipment, ancillary apparatus, auxiliary applications, inter-network and inter-system operations and interfaces

# TR-45.1 Analog Technology - Mobile and Personal Communications Standards

# TR-45.2 Wireless Intersystem Technology - Mobile and Personal Communications Standards

# TR-45.3 Time Division Digital Technology # TR-45.4 Radio to Switching Technology

# TR-45.5 Spread Spectrum Digital Technology

# TR-45.6 Adjunct Wireless Packet Data Technology

Page 315: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-33

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-33

Telecommunications Industry Association

! TIA Engineering Committees" TR-46 Mobile and Personal Communications 1800 Standards

Performance, compatibility, inter-operability, and service standards for mobile and personal communications systems. These standards pertain to, but are not restricted to, service information, wireless terminal equipment, wireless base station equipment, wireless switching office equipment, ancillary apparatus, auxiliary applications, inter-network and inter-system operations and interfaces

# TR-46.1 Wireless Multimedia and Messaging Services (WIMS)$ TR-46.1.1 Working Group User Requirements/Performance Specifications Wireless

Multimedia and Messaging Services$ TR-46.1.2 Working Group Common Air Interface - Baseband Wireless Multimedia and

Messaging Services$ TR-46.1.3 WIMS WG III - Common Air Interface - RF$ TR-46.1.4 Working Group Link and Network Control/Interfaces Wireless Multimedia

and Messaging Services

# TR-46.2 Network Interfaces# TR-46.5 PCS 1900 # TR-46.6 Composite CDMA/TDMA

Page 316: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-34

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-34

Telecommunications Industry Association

! Standards for Cellular and for Personal Communications Services (PCS) at 1900 MHz" TIA developed, AMPS, NAMPS, CDMA and TDMA, ANSI-41

" Related standards for local number portability, location, emergency services, etc.! Original Joint Technical Committee (JTC) PCS Standards

" J-STD-007: Personal Communications Services - PCS1900 - Air Interface Specification

" J-STD-008: Personal Station-Base Station Compatibility Requirements for 1.8 to 2.0 GHz Code Division Multiple Access (CDMA) Personal Communications Systems

" J-STD-011: PCS IS-136 Based Air Interface Compatibility 1900 MHz Standard" J-STD-014: Personal Access Communications System Air Interface Standard

" J-STD-017: Composite CDMA/TDMA Air Interface Compatibility Standard for Personal Communications in 1.85 - 1.99 GHz for Licensed Applications

" J-STD-015: W-CDMA (Wideband Code Division Multiple Access) Air Interface Compatibility Standard for 1.85 to 1.99 GHz PCS Applications

" J-STD-025: LAES (Lawfully Authorized Electronic Surveillance) Standard

Page 317: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-35

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-35

3G.IP

! A group of Operators and Vendors that share a common 3G Network architecture strategy

! Operator-lead initiative! Objectives:

" Define a 3G network architecture based on packet technologies and IP telephony for simultaneous real and non-real time services

" Common core network for EDGE and UTRA - based on evolved GPRS

" Seamless service support between EDGE and UTRA networks" Personal mobility and interoperability between Mobile and

Fixed networks

Page 318: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-36

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-36

3G.IP Mission

! Develop the technical direction for an all IP-based wireless network architecture

! To actively promote a common IP-based wireless system for third generation mobile communications technology

! Develop services requirements, priorities, and implementation direction

! To have an all IP-based architecture standardized by end of year 2000

! To define the high level direction and evolution of future releases of the all IP network beyond year 2000

! Promote alignment between wireless and fixed IP architectures

Page 319: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-37

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-37

3G.IP Organization

Brian Daly, AWS

Peter Musgrove, AWS

Fred Harrison, BT Peter Musgrove, AWS

Page 320: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-38

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-38

3G.IP Group Descriptions

Standards Strategy Expert Group! Standardization work plan and schedule

! 3G.IP schedule alignment with SDO work plans

! Monitor 3GPP and SDOs as required

! Develop plans for coordination and interaction with technical SDOs3GPP, SMG, IETF, ETSI TIPHON, ITU, Packet Cable…

! Address standardization issues within and between SDOs

! Transfer of EDGE and related SMG matters into 3GPP

! Identify key contributions required into SDOs, submitted by participating companies

Carrier Requirements Expert Group! Develop agreements between carriers for

specific topics (e.g. network requirements, service requirements)

! Service and network interoperability such as roaming and legacy support with 2G networks and handover

! Terminal requirements

! Base line terminal configurations

! Prioritization of requirements

Page 321: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-39

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-39

3G.IP Group Descriptions

Call Control Protocol Selection AdHoc Group

! SIP versus H.323

Post-2000 AdHoc Group! Evolution from the 3GPP release 00

starting point

! Alignment between IP solutions being adopted by fixed networks and mobile networks

! Harmonization with 3GPP2 IP architecture

! Further development of alternative access means

Charging/Billing AdHoc Group! Define high level charging and billing

requirements

! Define role model scenarios

! Develop contributions to appropriate SDO

Home Control of Services AdHoc Group! Analyze options and alternatives for the home

control of services for the all-IP based 3G.IP architecture

Page 322: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-40

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-40

Mobile Wireless Internet Forum (MWIF) Mission

! Drive a single open mobile wireless internet architecture that:" Enables seamless integration of mobile telephony and internet-based

services (voice, data, video, web, etc.)" Meets the needs of network operators and Internet service providers" Is independent of the wireless access technology

! Influence & align standards with target architecture! Promote interoperability of IP equipment, services,

subsystems, client & service systems with target mobile architecture

! Promote development & investment in target architecture! Optimize applications available to customers

Page 323: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-41

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-41

Mobile Wireless Internet Forum (MWIF) Mission

! Open to all operators, service providers and suppliers who have a desire to produce a global, common vision for an Internet-based mobile wireless network and related service capabilities

! Act as a driver that is complementary to the existing standards working groups and will provide a common voice of global operators

! Ensure that key regional and global standards groups address requirements that global operators see critical to early and economic deployment of IP-based mobile wireless network

! Mobile technology neutral and not biased towards any particular standards

Page 324: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-42

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-42

MWIF Working Groups

! Operator and ISP Requirements" Specify operator and ISP requirements" Include subscriber, regulatory requirements

! Wireless Internet Architecture" Develop MWIF reference architecture

#To meet Architecture Principles#Catalyst for consolidation of existing architectures#Produce gap analysis# ‘Benchmark’ existing architectures against principles#Adopt best in class#Submit to 3GPP and 3GPP2

Page 325: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-43

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-43

MWIF Working Groups (continued)

! Influencing Standards" Define mechanism for contributing to relevant standards groups

#Focus on 3GPP, 3GPP2 and IETF initially for IP to the BTS

! IP to the BTS" Develop the technical solution to support “IP to the BTS”

#To support plug and play base stations#To support software definable core network#To support single IP based “backhaul” network

Page 326: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-44

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-44

European Telecommunications Standards Institute

! Non-profit organization whose mission is to produce the telecommunications standards that will be used for decades to come throughout Europe and beyond

! Based in Sophia Antipolis, France! 773 members from 52 countries inside and outside

Europe representing administrations, network operators, manufacturers, service providers, research bodies and users

! Any European organization proving an interest in promoting European telecommunications standards has the right to represent that interest in ETSI

Page 327: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-45

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-45

European Telecommunications Standards Institute

! Work Program based on and coordinated with the activities of international standardization bodies, mainly the ITU-T and the ITU-R

! Consists of a General Assembly, a Board, a Technical Organization and a Secretariat. The Technical Organization produces and approves technical standards. It encompasses ETSI Projects (EPs), Technical Committees (TCs) and Special Committees

! More than 3500 experts working for ETSI in over 200 groups

Page 328: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-46

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-46

European Telecommunications Standards Institute

TC EEEnvironmental Engineering

EP BRANBroadband Radio Access Networks

TC ERMEMC and Radio Spectrum Matters

ETSAGEuropean TelecommunicationsStandards Awareness Group

Finance Committee

TC HFHuman Factors

JTC BroadcastEBU/CENELEC/ETSI

Joint Technical Committee

TC TMNTelecommunications

Management Networks

ECMA TC32Communication, Networks & Systems Interconnection

TC STQSpeech processing

Transmission & Quality

TC TMTransmission and Multiplexing

TC SESSatellite Earth Stations & Systems

TC SPANServices and Protocol for

Advanced Networks

TC MTSMethods for Testing &

Specification

TC SECSecurity

User Group

SAGESecurity Algorithms

Group of Experts

JEECJoint ETSI/ECMA committee

OCGOperational Co-ordination Group

EP TIPHONTelecommunications and Internet

Protocol Harmonization Over Networks

SMGSpecial Mobile Group

EP TETRATerrestrial Trunked RAdio

EP DECTDigital Enhanced Cordless

Telecommunication

ETSI ProjectsTechnical Committees

BOARDGeneral Assembly

TC SafetyTelecommunications

Equipment Safety

Special Committees

TSG-CNCore Network

EP PLTPowerLine Telecommunications

UMTSUniversal Mobile

Telecommunications System

TC ATAccess andTerminals

ETSI Partnership Projects - 3GPP

TC MSGMobile Standards Group

TSG-RANRadio Access Networks

TSG-SAServices and System

Aspects

TSG-TTerminals

Page 329: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-47

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-47

ETSI

! STANDARDIZATION STRATEGY" Shape future of Mobile/Radio communications

# 3 GPP - IPV4/V6 in Release 2000# EPPs - Bluetooth/WAP/IPV6/APCO

# Satellite - partner with VSAT Forum

# Spectrum management ETSI/ERO/ERC

# UMTSF frequency extension - support at WARC

" Be a driver in fixed networks" Target INTERNET contribution

# Access - xDSL, BRAN, 3GPP,CATV, etc.# VOIP / MessagingOIP / FaxOIP# IP over existing networks# IPv6 Forum# Internet Governance - ICANN# SDLs for IETF RFCs# Global peering arrangements for ISPs# IP Phone numbers

Page 330: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-48

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-48

ETSI

! STANDARDIZATION STRATEGY" Bridge Fixed/Mobile/Internet Convergence

# Electronic Signatures# Addressing# Wireless e-commerce - ICC partnership# Bridging / Interoperability

" Partner for global success# Optimize member resource in fora/SDOs# Way forward with IETF# ITU MOU finalization# EPPs - use the tool more# Simplify PAS procedures# Focused MOUs & External Relations

Page 331: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-49

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-49

International Telecommunications Union

! Headquartered in Geneva, Switzerland ! International organization within which governments and the

private sector coordinate global telecom networks and services! Three sectors: ITU-T, ITU-R, ITU-D! The ITU Telecommunication Standardization Sector (ITU-T) was

created on 1 March 1993 within the framework of the "new" ITU, replacing the former International Telephone and Telegraph Consultative Committee (CCITT) whose origins are over 100 years old

! At present, more than 2500 recommendations (ITU-T alone)! Three priorities:

" IP-based networks" IMT-2000 (3rd generation mobile systems)" Accounting rates

Page 332: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-50

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-50

ITU Landmarks

! 1837 Invention of the first electric telegraph! 1844 Samuel Morse sent his first public message over a telegraph line

between Washington and Baltimore! 1865 Foundation of the International Telegraph Union by twenty States

with the adoption of the first Convention. First Telegraph Regulations.! 1876 Alexander Graham Bell patents his invention of the telephone! 1924 Paris - Creation of CCIF (International Telephone Consultative Committee)! 1925 Paris - Creation of CCIT (International Telegraph Consultative Committee)! 1927 Washington - Creation of the CCIR (Intl. Radio Consultative Committee)! 1932 Madrid - Plenipotentiary Conference. Telegraph Union changes name to

International Telecommunication Union! 1947 ITU becomes a Specialized Agency of the United Nations! 1956 Geneva - CCIF and CCIT merged into CCITT (International

Telegraph and Telephone Consultative Committee)! 1992 Geneva - Plenipotentiary Conference. Creation of 3 Sectors:

ITU-T replaces CCITT, ITU-R replaces IFRB, CCIR, and ITU-D replaces TCD

Page 333: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-51

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-51

ITU Structure

PlenipotentiaryConference

RadiocommunicationSector

TelecommunicationStandardization Sector Development Sector

World Conferenceson International

Telecommunications

WorldTelecommunication

StandardizationAssembly (WTSA)

Council

Radio RegulationsBoard

StudyGroups

DirectorSecretary-GeneralDeputy Secretary-General

CoordinationCommittee

General Secretariat

StudyGroups

StudyGroups

AdvisoryGroup

Bureau

Director

Bureau

AdvisoryGroup Director

Bureau

AdvisoryGroup

World/RegionalConferences

RadiocommunicationAssembly

World/RegionalConferences

Page 334: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-52

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-52

ITU Study Groups

! Study Group 2 Network and service operation! Study Group 3 Tariff and accounting principles including related

to telecommunications economic and policy issues! Study Group 4 TMN and network maintenance! Study Group 5 Protection against electromagnetic environment effects! Study Group 6 Outside plant! Study Group 7 Data networks and open system communications! Study Group 8 Characteristics of telematic systems! Study Group 9 Television and sound transmission! Study Group 10 Languages and general software aspects for

telecommunication systems! Study Group 11 Signaling requirements and protocols! Study Group 12 End-to-end transmission performance of networks

and terminals! Study Group 13 General network aspects! Study Group 15 Transport networks, systems and equipment! Study Group 16 Multimedia services and systems! TSAG Telecommunication Standardization Advisory Group

Page 335: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-53

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-53

Third Generation Partnership Project

!Standards organizations and other related bodies have agreed to co-operate for the production of a complete set of globally applicable Technical Specifications for a 3rd Generation Mobile System based on the evolved GSM core network and radio access technologies supported by 3GPP partners (i.e., UTRA both FDD and TDD modes)

!Established for the preparation and maintenance of the above mentioned Technical Specifications

!It is not a legal entity

Page 336: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-546774

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-54

Scope and Objectives

!Technical Specifications (TS’s) developed in view of global roaming and circulation of terminals

!The 3G Mobile System and its capabilities will be developed in aphased approach, initially to elaborate, approve and maintain the necessary set of TS’s for the first phase of a 3rd Generation Mobile System including:

" UTRAN (including UTRA, W-CDMA in Frequency DivisionDuplex (FDD) mode and TD-CDMA in Time Division Duplex (TDD) mode)

" 3GPP core network (3rd Generation networking capabilitiesevolved from GSM including mobility management and global roaming

" Terminals for access to the above (including specifications for a UIM)" System and service aspects

Page 337: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-557885

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-55

! The set of global specifications for the first phase of the 3GPP core network and the specifications for the GSM core network should be common to the largest extent possible

! The results of the 3GPP work will form the basis of member contributions to the ITU in accordance with existing procedures

! 3GPP will take into account any emerging ITU recommendations on interworking between IMT-2000 family members

! In the framework of agreed relationships, 3GPP will elaborate TS’s that will form the basis of standards, or parts of standards, of the Organizational Partners

Scope and Objectives

Page 338: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-5610996

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-56

Partnership and Membership

!Partners

"Organizational Partners

$ 3GPP is open to all standards organizations irrespective of the geographic location

"Market Representation Partners

"Individual Members

Page 339: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-57

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-57

Organizational Partner

!An open standards organization with a national, regional or other officially recognized status (in their country or region)

" Has the capability and authority to define, publishand set standards nationally or regionally and

" Has signed (or whose sponsor has signed) thePartnership Project Agreement

!Organizational Partners will meet as appropriate and make decisions by consensus

" ARIB, CWTS, ETSI, T1, TTA, TTC

!3GPP will not contribute directly to the ITU

!Formal contributions to ITU Study Groups are made by ITU members following existing national/regional processes

Page 340: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-58

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-58

Market Representation Partner

! A Market Representation Partner is an organization invited to participate by the Organizational Partners to offer market advice to 3GPP and to bring into 3GPP a consensus view of market requirements (e.g. services, features and functionality) falling within the 3GPP scope

! A Market Representation Partner:

" Does not have the capability or authority to define, publish or set standards nationally or regionally

" Has signed (or whose sponsor has signed) the PartnershipProject Agreement

" Has committed itself to the 3GPP scope

" Global Mobile Suppliers Association - GSA, GSM Association, UMTS Forum, Universal Wireless Communications Consortium (UWCC), IPv6Forum

Page 341: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-59

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-59

! Membership in an Organizational Partner is a pre-requisite for Individual Membership

! Individual Membership is open to legal entities (e.g. companies) committed to support 3GPP and to:

" Contribute technically or otherwise to one or more of the Technical Specification Groups within 3GPP

" Use the 3GPP results to the extent feasible

! Individual Membership in 3GPP will be terminated by dissolution, abolition, resignation or expulsion from the related Organizational Partner

Individual Member

Page 342: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-60

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-60

Observers

! In order to ensure globally applicable Technical Specifications,the status of “Observer” may be granted by the Organizational Partners to an entity which has the qualifications to become a future Organizational Partner

! The status of “Observer” includes obligations to:" Identify as early as possible any regulatory requirements that may

lead to options within Technical Specifications

" Make their IPR policy available for consideration

" Contribute to the common objective of 3GPP and avoid duplicationof work related to 3GPP

! The participation rights of an Observer will be decided on a case by case basis

Page 343: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-6129282821

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-61

External Interfaces

Project Co-ordination Group

Technical Specification Groups

Support Functions

3GPPPARTNERS

OrganizationalPartners

MarketRepresentationPartners

Organizational Partners’ Standardization Process

Organizational Partners’ deliverables

TechnicalSpecifications

INDIVIDUALMEMBERS

TechnicalContributions

ITU

InternationalRecommendations

IMT 2000Contributions

via existing processes

Regulators/Governments

Mandates

Page 344: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-623130

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-62

Internal Structure

TSG

3GPPProject Coordination Group

Radio Access Network

TSG

Core Network

TSG

Terminals

Technical SpecificationsTechnical Specifications

TSGService andSystemAspects

Page 345: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-63

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-63

! Mobility management, call connection control signaling between the user equipment and the core network

! Core network signaling between the core network nodes. the signaling supports functionality such as user location information, subscription information and control of network services

! Definition of interworking functions between the core network and external networks

! Packet related questions such as mapping of QoS ( e.g. transparency for IP domain applications, general for bearer types, special for optimized applications such as Voice over IP)

! Core network aspects of the lu interface

! Core network O&M requirements

Work Areas Covered by the Core Network TSG

Page 346: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-64

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-64

! Radio Layer 1 specification! Radio Layer 2 specification! Radio Layer 3 RR specification! lub specification! Iur Interface! Iu Interface! UTRAN O&M requirements! Base station radio performance specification! Conformance test specification for testing of radio aspects of base

stations! Specifications for radio performance aspects from the system point

of view

Work Areas Covered by the Radio Access Network TSG

Page 347: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-65

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-65

Work Areas Covered by the Terminal TSG

! Service capability protocols! Messaging! Services end-to-end interworking! USIM to Mobile Terminal interface! Model/framework for terminal interfaces and services

(application) execution! Conformance test specifications of terminals, including

radio aspects

Page 348: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-66

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-66

Work Areas Covered by the Service and System Aspects TSG

" Service capabilities" Definition of services and feature requirements" Development of service capabilities and a service architecture for cellular, fixed (and cordless)

applications! Stage one and two descriptions for

" Charging and accounting" Network Management" Security Aspects

! Architecture" Definition, evolution, and maintenance of overall architecture, including assignment of

functions to particular sub-systems and identification of key information flows" In co-operation with other TSGs, define required services, service capabilities and bearer

capabilities offered by the different sub-systems! Codec aspects

" Principles for definition of end-to-end transmission" Definition, evolution and maintenance of relevant specifications

! Project co-ordination" High level co-ordination of the work performed in other TSGs and monitoring of progress

Page 349: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-67

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-67

3GPP2

! Spearheaded by the International Committee of the American National Standards Institute (ANSI)

! Establish a 3G Partnership Project (3GPP) for evolved ANSI/TIA/EIA-41

! ANSI was concerned that the ETSI proposal was too limiting, and as a result, established a 3G ad hoc committee

! The original ETSI proposal (3GPP) focused on global system for mobile (GSM) communications technology

! ETSI was unwilling to include other "non-GSM" technologies in its proposal (3GPP)

Page 350: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-68

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-68

3GPP2

! Multilateral collaboration among national and regional Standards Development Organizations (SDOs) " To facilitate the development of globally applicable technical

specifications for 3G mobile systems " Based on the evolution of the two globally deployed mobile

architectures: GSM/Mobile Application Part (GSM/MAP) and ANSI/TIA/EIA-41

! 3GPP1: Global specifications for GSM/MAP network evolution to 3G and the UTRA Radio Transmission Technology (RTT)

! 3GPP2: Global specifications for ANSI/TIA/EIA-41 network evolution to 3G and global specifications for the RTTs supported by ANSI/TIA/EIA-41

Page 351: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-69

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-69

3GPP2 Organization

Page 352: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-70

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-70

IMT-2000! International Mobile Telecommunications-2000 also known as the Third

Generation Mobile System aims to fulfill one's dream of anywhere, anytime communications

! A flexible standard for wireless access to the global telecommunications infrastructure which will serve both mobile and fixed users in both public and private networks" Linking the diverse systems of terrestrial and/or satellite based networks to

exploit the potential synergy between the digital mobile telecommunications technologies and those systems for Fixed Wireless Access (FWA)

! The primary ITU objectives for IMT-2000 are:" Flexible/seamless global service provision" Improved operational efficiencies, particularly for data and multimedia

services" Suitable technology for reducing the telecommunications "gap", i.e. offers

cost effective access for the more than 4 billion people who do not presently have a phone

Page 353: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-71

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-71

IMT-2000

Global Collaboration

3GPPGSMM AP

AN SI-41

3GPP2

OHG

(ITU R ecom m endations))

IT U M em bership

3GP artnership

P rojects

O peratorsH arm onization

G roup

Industry Fora :Networks:

UWC C

WP-CDM A

cdm a2000

DECT

EP

DECT

TD-SCDM A

3G.IPIP

UW C-136TCP/IP

Satellites IM T-2000

Page 354: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-72

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-72

IMT-2000

IMT-2000 Harmonization

CDMA FDD TDMA (HYBRID

TDMA/CDMA

WP-CDMACDMA

2000

UWC-136

DECTTD-CDMATD-SCDMA

W-CDMA/NA CDMA II, W-CDMA

UTRA, WIMS

CDMA2000

CDMA ITD-SCDMA

UWC-136

DECT

UnpairedTDD

TDD)

JUNE’98

PairedDS/MC/SC

MARCH’99

2000 and beyond

Page 355: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-73

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-73

IMT-2000

IMT-2000 TerrestrialRadio Standards

FDD-DS(Direct Sequence)

FDD-MC(Multi-Carrier)

TDD(Hybrid)

FDD-SC(Single Carrier)

TD/CDMACDMA TDMA

Page 356: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-74

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-74

IMT-2000

Modular IMT-2000 Harmonization(Terrestrial Component)

FDD-DS(Direct Sequence)

FDD-MC(Multi-Carrier)

TDD(TD/CDMA)

Flexible connection between RTT modes &Core Networks based on operator’s needs

EvolvedGSM (MAP)

EvolvedANSI-41Core Networks

Flexible connection between Radio modules& Core Networks based on operator needs

Network-to-NetworkInterfaces

Inter-Network Roaming

TDDTD/CDMAFDD-SC(TDMA)

IP-basedNetworks

Page 357: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-75

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-75

IMT-2000 Organization

Page 358: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-76

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-76

Universal Mobile Telecommunications System (UMTS)

! International and independent body, uniquely committed through the building of cross-industry consensus to the successful introduction and development of UMTS/IMT-2000 ’’third generation’’ mobile communications systems

! Established in 1996! Non-profit global organization that currently has over 200

member organizations drawn from the mobile operator, supplier, regulatory, IT and media/content communities

! Works as a catalyst with other specialist organizations to examine issues such as technical standards, spectrum, market demand, business opportunities, terminal equipment circulation and convergence between the mobile communications and computing industries

Page 359: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-77

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-77

Universal Mobile Telecommunications System (UMTS)

! UMTS is one of the major new third generation mobile communications systems being developed within the framework which has been defined by the ITU and known as IMT-2000

! UMTS is part of the ITU’s IMT-2000 vision of a global family of third-generation (3G) mobile communications systems standards

! UMTS builds on today’s significant investments in second generation mobile systems

! UMTS is a global system comprised of both national terrestrial and global satellite components

Page 360: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-78

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-78

W@PFW@PF

GMCFGMCF

UMTS Spheres of Influence

3GPP / 3GPP2

GSA

GSMA

IPv6F 3G.IP UMTSF MWIF JIMM

UMTS/3GUMTS/3G

Page 361: GTCICourse 221

Course 221 - Introduction to Wireless Data for 3G Technology January 8, 2001

Copyright© 2001 by Gordon Technical Consultants, Inc. B-79

January 8, 2001 Copyright© 2001 by Gordon Technical Consultants, Inc. B-79

Terminal Radio/CoreRadio/Core

ITU

UTRACDMA2000 EDGEUWC-136

InternetInternet

3GPPETSI, ANSI-TA, ARIB,

TTA etc..

IETF1

W3C2

P3P3

MAPIS-41GPRSATM

WAP IP, Mobile IPSMTP, HTTP, FTP,

NMTP, CHAT,H.323, HTML,

XML

WindowsWindows-

CEEPOC etc.

Proprietary

DefactoStandards

Content

StandardsProprietary

ITU-related addressingIP-related addressing

1IETF = Internet Engineering Task Force 2W3C = World Wide Web Consortium 3P3P = Platform of Privacy Preferences

UMTS Standardization Scenario

Page 362: GTCICourse 221
Page 363: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology

Course Evaluation

Copyright© 2001 by Gordon Technical Consultants, Inc. 1

Customer Satisfaction Survey Thank you for attending the Introduction to Wireless Data for 3G Technology Course. Please take a moment to complete this survey so that GTCI may use the information to continue to meet the highest expectations of our customers. Course Content

1. List one or two expectations that you had for this course. ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

2. Describe how well the course met the expectations listed above. _________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

3. Which of the modules did you find to be the most informative? Why?

____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

4. Did you find any of the modules to be unnecessary? If so, which sections do you feel

could be removed from the course and why? ____________________________________________________________________ ____________________________________________________________________

5. Was there any material not covered in the course that should have been included? Please explain. ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

6. Which of the concepts presented in this course could you expect to use in your job? ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

Page 364: GTCICourse 221

Course 221 – Introduction to Wireless Data for 3G Technology

Course Evaluation

Copyright© 2001 by Gordon Technical Consultants, Inc. 2

Instructor

1. Was the amount of content appropriate for the time allowed? ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

2. How well did the instructors respond to questions from the participants? ____________________________________________________________________ ____________________________________________________________________

3. Did the instructors explain key concepts in a clear and concise manner? If not, please enumerate those areas that may need further explanation. ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________

If you have any comments to help us improve this course, please add them below.

____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________