Sunteți pe pagina 1din 19

1.what is the spacing between two carriers in gsm?

GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks operating in the 900 MHz or 1800 MHz bands. Where these bands were already allocated, the 850 MHz and 1900 MHz bands were used instead (for example in Canada and the United States). In rare cases the 400 and 450 MHz frequency bands are assigned in some countries because they were previously used for first-generation systems. RF carriers are spaced every 200 kHz Most 3G networks in Europe operate in the 2100 MHz frequency band. Regardless of the frequency selected by an operator, it is divided into timeslots for individual phones to use. This allows eight full-rate or sixteen half-rate speech channels per radio frequency. These eight radio timeslots (or eight burst periods) are grouped into a TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel data rate for all 8 channels is 270.833 kbit/s, and the frame duration is 4.615 ms. The transmission power in the handset is limited to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900.

2.what are the various parameter used in handover?

3.what is BER and FER?

In digital transmission, the number of bit errors is the number of received bits of a data stream over a communication channel that have been altered due to noise, interference, distortion or bit synchronization errors. The bit error rate or bit error ratio (BER) is the number of bit errors divided by the total number of transferred bits during a studied time interval. BER is a unitless performance measure, often expressed as a percentage. The bit error probability pe is the expectation value of the BER. The BER can be considered as an approximate estimate of the bit error probability. This estimate is accurate for a long time interval and a high number of bit errors.

As an example, assume this transmitted bit sequence: 0 1 1 0 0 0 1 0 1 1, and the following received bit sequence: 0 0 1 0 1 0 1 0 0 1, The number of bit errors (the underlined bits) is in this case 3. The BER is 3 incorrect bits divided by 10 transferred bits, resulting in a BER of 0.3 or 30%. it is the calculation depicting how many frames after coding (using CRC cyclic redundancy check are bad) if ang bit if found bad the whole frame is rejected fer is calculated in full and sub mode in full it ranges from 0 to 100percent while sin sub it has only three values 0 50 and 100,

FER= Number of erased blocks\ total no of blocks *100 It is the right measure of voice quality. FER is performed on speech& signaling frames FER------- 0 to 4%, GOOD. 2 to 15% , slightly degraded Greater than 15%, useless

4.what is MOC AND MTC? MOC


1. The MS sends a Channel Request (CHAN_REQ) message on the RACH. 2. The BSS responds with a radio resource assignment (IMM_ASS_CMD) on the AGCH. 3. The MS sends a Service Request (CM_SERV_REQ) message to the BSS on the SDCCH. 4. Before the network will provide any services to the MS, the network will require the MS to authenticate itself. The BSS sends an Authentication Request (AUTH_REQ) message to the MS. The RAND serves as the "challenge" for

authentication. 5. The MS calulates the proper SRES based on the RAND that was given and sends the SRES to the BSS in an Authentication Response (AUTH_RESP) message. 6. The BSS verifies the SRES. If the SRES is correct then the MS is authenticated and allowed access to the network. The BSS will send a Service Accept (CM_SERV_ACC) message letting the MS know that the service request was received and processed. 7. Once authenticated, the BSS orders the MS to switch to cipher mode with the CIPH_MOD_CMD message.8. The MS will immediately switch to cipher mode and send a Cipher Mode Complete (CIPH_MOD_COM) message. 9. The MS then sends a Call Setup (SETUP) message to the BSS. The message includes the address information (MSISDN) of the called party. 10. The BSS assigns a TCH to the MS by sending an Assignment Command (ASS_CMD) message. This message includes which Transceiver (TRX) and which Time Slot (TS) to use.
*The BSS does not actually assign a TCH to the MS until the MSC sends a Call Proceeding (CALL_PROC) message to the BSS indicating that the IAM has been sent.

11. The MS imemdiately switches to the assigned TCH. The MS sends an Assignment Complete (ASS_COM) message back to the BTS on the FACCH.12. The MSC sends an Initial Address Message (IAM) to the GMSC. The IAM contains the MSISDN of the called party as the MS dialed it.
The MSC will also send a Call Proceeding (CALL_PROC) message down to the BSS and this is when the BSS would assign a TCH to the MS, as described in step 10 above.

13. Based on the dialed number, the GMSC decides where to route the IAM within the PSTN. 14. The PSTN will continue to route the IAM until it reaches the correct Switching Center and the call routing is complete. The PSTN will then establish the call circuit and send an Address Complete Message (ACM) back to the GMSC. 15. The GMSC then forwards the ACM back to the responsible MSC indicating that the call circuit has been established16. Once the MSC receives the ACM, it sends an ALERT message to the MS indicating that the call is going through. The BSS sends the ALERT message on the FACCH. Once the MS receives the ALERT, it will generate the ringing sound in the earpiece. The BSS sends an alerting message the subscriber will hear the line ringing. 17. Once the called party answers the phone, the PSTN will send an Answer message to the MSC. The MSC forwards this to the MS in a Connection (CON) message. 18. Once the MS receives the CON message, it switches over to voice and begins the call. All voice traffic occurs on the assigned TCH19. When either the caller or the called party hangs up, the call will be disconnected. Either party can initiate the disconnect. In this example, the MS initiates the disconnect. The MS sends a Disconnect (DISC) message to the BTS on the FACCH. 20. The BSS forwards the DISC to the MSC. Once the MSC receives the DISC message, it sends a Release (REL) message through the GMSC to the PSTN as well as down through the BSS to the MS. 21. The MS responds by sending a Release Complete (REL_COM) message to the BSS on the FACCH. The BSS forwards the REL_COM message up to the MSC. Once the MSC receives the REL_COM message the call is considered ended from the call control perspective. 21. Although the call has ended, the BSS still has a TCH allocated to the MS. The MSC sends a Channel Release (CHAN_REL) message to the BSS. The BSS forwards

the CHAN_REL message to the MS. 22. The MS responds with a DISC (LAPDm) message and returns to an idle mode. The BSS deallocates the channel and releases the TRX. MTC The calling party dials the MSISDN for the mobile subscriber. The PSTN identifies the network (PLMN) that the dialed MSISDN belongs to and will locate a GMSC for that network. The PSTN sends an Initial Address message to the GMSC. 2. The GMSC forwards the MSISDN to the HLR and requests routing information for it. The HLR looks up the MSISDN and determines the IMSI and the SS7 address for the MSC/VLR that is servicing the MS. 3. The HLR then contacts the servicing MSC/VLR and asks it to assign a Mobile Station Routing Number (MSRN) to the call. 4. The MSC/VLR allocates the MSRN and forwards it to the HLR.
*Note: It is important to remember that the MSC/VLR assigns a MSRN to the call not to the MS itself.

5. The HLR forwards the MSRN as well as routing information for the servicing MSC/VLR to the GMSC. 6. The GMSC sends an Initial Addressing message to the servicing MSC/VLR and uses the MSRN to route the call to the MSC/VLR. Once the servicing MSC/VLR receives the call, the MSRN can be released and may be made available for reassignment. 7.The MSC/VLR then orders all of its BSCs and BTSs to page the MS. Since the MSC/VLR does not know exactly which BSC and BTS the MS is monitoring, the page will be sent out across the entire Location Area. 8. The MS receives the Page Request (PAG_REQ) on the PCH. The MS recognizes that the page is intended for it, based on a TMSI or an IMSI. 9. The MS sends a Channel Request (CHAN_REQ) message on the RACH. 10. The BSS responds on the AGCH by sending an Immediate Assignment (IMM ASS) message which assigns an SDCCH to the MS. At this point, the network does not know that the MS is the one that it is paging, it only knows that this MS wants access to the network. 11. The MS immediately switches to the assigned SDCCH and sends a Paging Response (PAG_RES) message on the SDCCH. This lets the network know that the MS is responding to its page 12. Before the network will provide any services to the MS, the network will require the MS to authenticate itself. The BSS sends an Authentication Request (AUTH_REQ) message to the MS. The RAND serves as the "challenge" for authentication. 13. The MS calulates the proper SRES based on the RAND that was given and sends the SRES to the BSS in an Authentication Response (AUTH_RESP) message. 14. The BSS verifies the SRES. If the SRES is correct then the MS is authenticated and allowed access to the network. 15. Once the MSC/VLR has authenticated the MS, it will order the BSS and MS to switch to cipher mode using the CIPH_MOD_CMD message. Once the MS in in encryption mode, the VLR will normally assign a new TMSI to the MS. 16. Once the MS is authenticated and in encryption mode, The MSC sends a Setup Message to the BSS, the BSS forwards the SETUP message to the MS on the assigned SDCCH.the assigned SDCCH. The SETUP message may include the Calling Line Identification Presentation (CLIP),

which is essentially caller ID. 17. The MS responds by sending a Call Confirmed (CALL_CON) message; which indicates that the MS is able to establish the requested connection. The BSS relays the message up to the MSC. 18. The BSS then sends an Assignment Command (ASS_CMD) message to the MS on the assigned SDCCH. The ASS_CMD message assigns a Traffic Channel (TCH) to the MS. 19. The MS immediately switches to the TCH and responds with an Assignment Complete (ASS_COM) message on the FACCH. The MS begins ringing once it has established the TCH.
*Remember that all signaling that occurs on the traffic channel actually occurs on a FACCH, which is a time slot that is stolen from the TCH and used for signaling.

20. The MS sends an ALERT message to the MSC on the FACCH. The BSS forwards the ALERT message through the PSTN to the calling party and the caller hears the line ringing. 21. Once the user answers the call (by pressing the send button), the MS will send a Connect CON message to the MSC. The Connect message is forwarded back to the caller's switch to activate the call. 22. The MSC sends a Connect Acknowledge CON_ACK message to the MS and the call is established. 23. A disconnect happens the same way as for any other call. In this example, the calling party initiates the disconnect.
*Only the Air Interface is shown here.

24. When the calling party hangs up, the calling party's switch initiates a Release (REL) message. The message is forwarded to the serving MSC, which is then forwarded to the BSS. 25. The BSS will send a Disconnect (DISC) message to the MS on the FACCH. 26. The MS confirms release of the call by sending a Release (REL) message on the FACCH, which is forwarded to the MSC. 27. The MSC sends e Release Complete (REL_COM) message through the BSS to the MS. As far as call control (CC) is concerned, the connection has been terminated. 28. The MS still has a TCH assigned to it, so the BSS sends a Channel Release (CHAN_REL) message to the MS. This releases the radio resource on the Air Interface. 29. The MS responds be sending a final Disconnect message and returns to idle

5 what is swaping and its type?


Swapping means that interchange of cable . there are four type of swaping 1 diversity swapping 2 main diversity swaping 3 sector swapping 4 cyclic swapping

6. explain common control channel?


The Common Control Channel (CCCH) is responsible for transferring control information between all mobiles and the BTS. This is necessary for the implementation of call origination and call paging functions. It consists of the following: a. Random Access Channel (RACH) Used by the mobile when it requires gaining access to the system. This occurs when the mobile initiates a call or responds to a page. b. Paging Channel (PCH) Used by the BTS to page MS, (paging can be performed by an IMSI, TMSI or IMEI). c. Access Grant Control Channel (AGCH) Used by the BTS to assign a dedicated control channel to a MS in response to an access message received on the Random Access Channel. The MS will move to the dedicated channel in order to proceed with either a call setup, response to a paging message, Location Area Update or Short Message Service. d. Cell Broadcast Channel (CBCH) This channel is used to transmit messages to be broadcast to all MSs within a cell. The CBCH uses a dedicated control channel to send its messages, however it is considered a common channel because all mobiles in the cell can receive the messages. Active MSs must frequently monitor both BCCH and CCCH. The CCCH will be transmitted on the RF carrier with the BCCH.

7. name different interfaces of the gsm?

The network structure is defined within the GSM standards. Additionally each interface between the different elements of the GSM network is also defined. This facilitates the information interchanges can take place. It also enables to a large degree that network elements from different manufacturers can be used. However as many of these interfaces were not fully defined until after many networks had been deployed, the level of standardisation may not be quite as high as many people might like.
1. Um interface The "air" or radio interface standard that is used for exchanges between a

mobile (ME) and a base station (BTS / BSC). For signalling, a modified version of the ISDN LAPD, known as LAPDm is used.
2. Abis interface This is a BSS internal interface linking the BSC and a BTS, and it has not

been totally standardised. The Abis interface allows control of the radio equipment and radio frequency allocation in the BTS.
3. A interface The A interface is used to provide communication between the BSS and the

MSC. The interface carries information to enable the channels, timeslots and the like to be allocated to the mobile equipments being serviced by the BSSs. The messaging required within the network to enable handover etc to be undertaken is carried over the interface.
4. B interface The B interface exists between the MSC and the VLR . It uses a protocol

known as the MAP/B protocol. As most VLRs are collocated with an MSC, this makes the interface purely an "internal" interface. The interface is used whenever the MSC needs access to data regarding a MS located in its area.
5. C interface The C interface is located between the HLR and a GMSC or a SMS-G.

When a call originates from outside the network, i.e. from the PSTN or another mobile network it ahs to pass through the gateway so that routing information required to complete the call may be gained.. In addition to this, the MSC may optionally forward billing information to the HLR after the call is completed and cleared down.
6. D interface The D interface is situated between the VLR and HLR. It uses the MAP/D

protocol to exchange the data related to the location of the ME and to the management of the subscriber.
7. E interface The E interface provides communication between two MSCs. The E

interface exchanges data related to handover between the anchor and relay MSCs using the MAP/E protocol.
8. F interface The F interface is used between an MSC and EIR. It uses the MAP/F

protocol. The communications along this interface are used to confirm the status of the IMEI of the ME gaining access to the network.
9. G interface The G interface interconnects two VLRs of different MSCs and uses the

MAP/G protocol to transfer subscriber information, during e.g. a location update procedure.
10. H interface The H interface exists between the MSC the SMS-G. It transfers short

messages and uses the MAP/H protocol.


11. I interface The I interface can be found between the MSC and the ME. Messages

exchanged over the I interface are relayed transparently through the BSS.

9. what are the advantage of gsm?


GSM is mature; this maturity means a more stable network with robust features. * Less signal deterioration inside buildings. * Ability to use repeaters. * Talktime is generally higher in GSM phones due to the pulse nature of transmission. * The availability of Subscriber Identity Modules allows users to switch networks and handsets at will. * GSM covers virtually all parts of the world so international roaming is not a problem.

10.explain the tool used in drive test in gsm?


1 laptop 2 mobile (it should be tems software compatible) 3 dongle (it is key ) 4 data cable 5 gps 6 gps cable 7 measuring tape 8 tilt meter 9 magnetic compass 10 tems parameter

11.explain rx level, dtx and sqi?


RX LEVEL RX level can be taken as receive signal strength report seen by DSP and referenced at antenna terminal. Any interference/incorrect loss or gain will make RX level unmatched to sensitivity number. So, it's an information for debugging. DTX

Discontinuous Transmission is one of the methods which is based on the advantage of the fact that a person speak less Nearly 40% of time in general conversation, the transmitter is turned off during silence periods Mobile phone power conservation is an added benefit of DTX Voice Activity Detection is the most important component of DTX DT X distinguishes between voice and noise inputs. The transmitter is turned off when a voice signal is misinterpreted as noise. This causes annoying effect known as clipping is heard at the receivers end Comfort noise is created at the receiving end, in order to ensure the non-connection.

SQI

SQI (Speech Quality Index)---This is not a GSM standard metric, and is only specific to the TEMS test equipments. It is expressed in the range of 0 to 30 dB (30 meaning best quality).

1.

what is location update and handover ?


A GSM or UMTS network, like all cellular networks, is a radio network of individual cells, known as base stations. Each base station covers a small geographical area which is part of a uniquely identified location area. By integrating the coverage of each of these base stations, a cellular network provides a radio coverage over a much wider area. A group of base stations is named a location area, or a routing area. The location update procedure allows a mobile device to inform the cellular network, whenever it moves from one location area to the next. Mobiles are responsible for detecting location area codes. When a mobile finds that the location area code is different from its last update, it performs another update by sending to the network, a location update request, together with its previous location, and its Temporary Mobile Subscriber Identity (TMSI). There are several reasons why a mobile may provide updated location information to the network. Whenever a mobile is switched on or off, the network may require it to perform an IMSI attach or IMSI detach location update procedure. Also, each mobile is required to regularly report its location at a set time interval using a periodic location update procedure. Whenever a mobile moves from one location area to the next while not on a call, a random location update is required. This is also required of a stationary mobile that reselects coverage from a cell in a different location area, because of signal fade. Thus a subscriber has reliable access to the network and may be reached with a call, while enjoying the freedom of mobility within the whole coverage area.

When a subscriber is paged in an attempt to deliver a call or SMS and the subscriber does not reply to that page then the subscriber is marked as absent in both the Mobile Switching Center / Visitor Location Register (MSC/VLR) and the Home Location Register (HLR) (Mobile not reachable flag MNRF is set). The next time the mobile performs a location update the HLR is updated and the mobile not reachable flag is cleared.
In cellular telecommunications, the term handover or handoff refers to the process of transferring an ongoing call or data session from one channel connected to the core network to another. In satellite communications it is the process of transferring satellite control responsibility from one earth station to another without loss or interruption of service.

13.what is frequency hopping and name its two type and its advantages?
You know that the number of frequencies for GSM is 124 and it is not much. The range is divided for some operators. What happen when the sites configuration is high? They do not have enough frequencies. One way, they expand their range to use CDS 1800. So, they have to spend more money. From the time they discovered that the spread spectrum for the frequencies in their range is not used equally, some are used more, some are less. It makes high interference for the frequencies used more. Then frequency hopping is used. This technique is used to equanlized interference for the frequencies used in their range. There are two types of frequency hopping: baseband and syntherizer.
Added after 5 minutes:

The main technique for frequency hopping is that 1 carrier does not work with one frequency, but some and at least two. - In baseband hopping, the transmitter will change its frequency on frame basis. - In syntherizer hopping, the transmitter will change its frequency on time slot basis. That is why they also said it is fast hopping. Note: hopping can use for traffic channel only, not for signalling channel

15.explain the function of AUC, EIR, BTS, MSC ? MSC


The Mobile services Switching Centre (MSC) co-ordinates the setting up of calls to and from GSM users. It is the telephone switching office for MS originated or terminated traffic and provides the appropriate bearer services, teleservices and supplementary services. It controls a number of Base Station Sites (BSSs) within a specified geographical coverage area and gives the radio subsystem access to the subscriber and equipment databases. The MSC carries out several different functions depending on its position in the network. When the MSC provides the interface between PSTN and the BSS in the GSM network it is called the Gateway MSC.

Some important functions carried out by MSC are Call processing including control of data/voice call setup, inter BSS & inter MSC handovers, control of mobility management, Operation & maintenance support including database management,

traffic metering and man machine interface & managing the interface between GSM & PSTN N/W

EIR
The Equipment Identity Register (EIR) contains a centralized database for validating the international mobile station equipment identity, the IMEI. The database contains three lists: The white list contains the number series of equipment identities that have been allocated in the different participating countries. This list does not contain individual numbers but but a range of numbers by identifying the beginning and end of the series. The grey list contains IMEIs of equipment to be monitored and observed for location and correct function. The black list contains IMEIs of MSs which have been reported stolen or are to be denied service.

The EIR database is remotely accessed by the MSCs in the Network and can also be accessed by an MSC in a different PLMN

AUC
The AUC is a processor system that perform authentication function. It is normally co-located with the HLR. The authentication process usually takes place each time the subscriber initialises on the system. Each subscriber is assigned an authentication key (Ki) which is stored in the SIM and at the AUC. A random number of 128 bits is generated by the AUC & sent to the MS. The authentication algorithm A3 uses this random number and authentication key Ki to produce a signed response SRES( Signed Response ). At the same time the AUC uses the random number and Authentication algoritm A3 along with the Ki key to produce a SRES.

If the SRES produced by AUC matches the one produced by MS is the same, the subscriber is permitted to use the network

BTS

The BTS network element consists of the hardware components, such as radios, interface modules and antenna systems that provide the Air Interface between the BSS and the MSs. The BTS provides radio channels (RF carriers) for a specific RF coverage area. The radio channel is the communication link between the MSs within an RF coverage area and the BSS.

The BTS also has a limited amount of control functionality which reduces the amount of traffic between the BTS and BSC

16.WHAT IS BSIC?
BSIC menas base station identity code .it is in colour code form . it is a unique numberfor every bts Its formula is BSIC= NCC + BCC Where NCC stands for NETWORK COLOUR CODE BCC stands for BASE STATION COLOUR CODE

17.write the holding time for MOC and MTC?


Holding time for MOC=2.7 sec And holding time for MTC=2.9

18.difference between idle mode and dedicated mode?

In GSM Idle Mode for mobile phone is time during which no dedicated resources are consumed,the handset will listen to BCCH and the PCH channels on the currently selected cell. It will also monitor neighboring BCCH and select a new cell depending in the signal quality of the other BCCHS. Mobiles in dedicated mode monitor the surrounding Base Stations for handover and other information.

19.wha is MA and TA?


MA List: set of frequencies (channels) assigned to a particular sector, ie are those channels that can be used to attend calls from users. Timing advance value corresponds to the length of time a signal takes to reach the base station from a mobile phone A continually adjusted TA value avoids interference to and from other users in adjacent timeslots, thereby minimizing data loss and maintaining Mobile QoS (call quality-of-service).Timing Advance is significant for privacy and communications security, as its combination with other variables can allow GSM localization to find the device's position and tracking the mobile phone user. TA is also used to adjust transmission power in Space-division multiple access systems.

20.WHAT ARE DIFFERENT NAME OF SOFTWARE USED IN DRIVE TEST?


NIM XCAL TEMS

21.WHAT IS FREQUNCY REUSE AND ITS ADVANTAGES?

Frequency reuse is a technique of reusing frequencies and channels within a communications system to improve capacity and spectralefficiency. Frequency reuse is one of the fundamental concepts on which commercial wireless systems are based that involves the partitioning of an RF radiating area (cell) into segments of a cell. One segment of the cell uses a frequency that is far enough away from the frequency in the bordering segment that it does not provide interference problems. Frequency re-use in mobile cellular systems means that each cell has a frequency that is far enough away from the frequency in the bordering cell that it does not provide interference problems. The same frequency is used at least two cells apart from each other. This practice enables cellular providers to have many times more customers for a given site license.

he reuse distance, D is calculated as

where R is the cell radius and N is the number of cells per cluster. Cells may vary in radius in the ranges (1 km to 30 km). The boundaries of the cells can also overlap between adjacent cells and large cells can be divided into smaller cells [1] The frequency reuse factor is the rate at which the same frequency can be used in the network. It is 1/K (or K according to some books) where K is the number of cells which cannot use the same frequencies for transmission. Common values for the frequency reuse factor are 1/3, 1/4, 1/7, 1/9 and 1/12 (or 3, 4, 7, 9 and 12 depending on notation
The advantages or frequency reuse are the technical and/or social improvements to make better use in what is a limited resource. The disadvantage is the social, commercial and financial impact of rendering equipment and services obsolete when vacating a frequency.

S-ar putea să vă placă și