年10月21日 3G SYSTRA 3G System Training Service Description CTXX Issue en Nokia Networks Oy 错误！使用“开始” 应用于要在此处显示的文字. 3G SYSTRA. Introduction to 3G & UMTS Identify what is meant by the term 3G and briefly outline the work completed by the specification bodies. Furthermore. Directory: 3G/4G develop. Plat: PDF Size: KB Downloads: 4. Upload time: Uploader: joyraj. Description: This book on 3G system.
|Published (Last):||2 October 2009|
|PDF File Size:||16.13 Mb|
|ePub File Size:||9.65 Mb|
|Price:||Free* [*Free Regsitration Required]|
The subscriber always has to pay extra for the additional network operation required to maintain his call. Whether the equipment owned by the user is capable of supporting the service or not? The topics to be covered in this module include understanding the key concepts of the radio path and basic WCDMA terminology.
In this case, the BSC systrz the cell makes the decision to perform handover. With the help of the authentication procedure the operator prevents the use of false SIMs in the network.
IMSI and last location update time. There are a number of solutions that have been designed to overcome these problems: It is necessary to define the network performance level, for instance the intended capacity of the switching network.
TDMA frames with common and dedicated channels As seen in the figure above, different logical channels sytsra placed systga different timeslots depending on whether they are common channels used by several mobile stations blue above or if they are dedicated to a certain mobile station in connection with a call yellow above. Charging information must be collected from the Billing Centres BC of all the networks that subscribers have been visited, and passed to shstra Billing Centre of the home network.
The need to supervise a call. All these three elements are basically databases that hold various types of information. It is also necessary to define the capacity requirements. Connection establishment between the MS and the NSS, mobility management, statistical raw data collection as well as Air and A interface signalling support. Various factors that affect the demand for network services must also be considered. This will be discussed later in this chapter.
By using the tools located sywtra the NMS, the operator is able to create statistical “views” and thus observe the network quality. The following list covers most of the common services, as well as the essential supplementary services.
The methods adopted to overcome these problems are viterbi equalisation, channel coding, frequency hopping, interleaving, antenna receiver diversity, adaptive power control and adaptive frame alignment.
A mobile station has to know what the cells surrounding the present cell are and what frequencies are being broadcast on them. The SIM and the mobile equipment have to be identified and authorised before accessing the network.
If the time slots of the TDMA frame represent the physical channels, what about the contents? By December there were 13 networks operating in 7 areas. GSM — Global System for Mobile communications Systrs the beginning of the s, the lack of a common mobile system was seen to be a general, worldwide problem.
Different signalling standards were developed in different parts of the world. Both the mobile station and base transceiver station know these bits and by analysing how the radio propagation affects these training bits, the air interface is mathematically modelled as a filter.
The simultaneous use of separate uplink and downlink frequencies enables communication in both the transmit TX and the receive RX directions. This is carried out in the case of both mobile originating transactions such as channel request and network originating transactions such as paging. It is also possible to tailor what kind of information to gather, and what kind of reports to produce for operation and maintenance purposes, for executive reports, etc. Call control This identifies the subscriber, establishes a call and clears the connection after the conversation is over.
The SIM card can be taken out of one mobile equipment and inserted into another. Since the tasks are distributed among different computer units, it makes it easier and faster to track down and solve problems. Voice and signalling traffic matrixes must be defined, as well as the equipment to be used.
The DCN is normally implemented using an X. This means that if the mobile station or base station transmits a burst only when the time slot appears, then when the burst arrives at the other end, it will cross onto the time domain of the next timeslot, thereby corrupting data from both sources. It can be used for both indoor and outdoor purposes.
A3 is used in authentication, A8 is used in generating a ciphering key and A5 is used in ciphering. It selects the frequency with the best quality and tunes to it.
How the transmission is carried out plays a major role, too. It means that the potential cell coverage in GSM is larger than for and networks. The traffic connection with cell 1 is released when the connection with cell 2 is set up successfully.
Traffic channels can transmit both speech and data and are bi-directional channels. There are three options available: The BSS consists of the following network elements: