Digital Mobile - .e-bookshelf.de

1y ago
22 Views
3 Downloads
2.57 MB
30 Pages
Last View : Today
Last Download : 13d ago
Upload by : Callan Shouse
Transcription

Digital MobileCommunicationsand theTETRA System

Digital MobileCommunicationsand theTETRA SystemJohn DunlopDemessie GirmaJames IrvineUniversity of Strathclyde, Glasgow, Scot/andJOHN WILEY & SONS, LTDChichester · New York · Weinheim . Brisbane · Singapore · Toronto

19 19 by John Wiley & Sons LId.Baffins lane. Chichester.Wesl Sussell POl9 IUD. EnglandNd/iullul01243779777IlIIerliatiOllll1 ( 44) 1243779777e-ma il (for ordeh and customer servicc enquiries): es-books@.wiky.oo.ukVisit our Home Page on hnp: /Jwww.wiley.eo.ukOf"hlll' ://www.wilcy.comCopynght. Rcpri med. with correcllOns. February :WOO. May 20001\11 Rights Rcscn:cd. No pan of this publicat ion may be reproduccd. stored III a rctri val systCJT1 . o r lransmlned.in a ny foml or by an)' means. elec tronic. mechanical. phOlocopying. rceording. scanmng Of" otherwise. ell.:eptunder the terms of the Copyright. Designs and Patents Act 1988 o r under the terms o ( a licence issued by theCopynght licensing Age·ney. 90 TOllenham Coun Road. London. UK WIP 9 HE. without the p.:rmission 11\wri ting ofllie Publisher. wnh the ellception orallY m. tcrial supplied elfical1y for Ihe purpos.: o fbcmg enteredand ,,-,ccuted on a computer sys tem. rOf" exclusive usc by the purchaser or Ill.: publicationDcslgnal100s used by compames 10 distlllguish thei r products arc often clamlCd a., tmdcmarh. In all IIIstanecswhere John Wiley & Sons IS aware ora claim. the product name appears In IIHtial capital or all capuallcners.Readers. however. shou ld contac t the appropriate compani.-s for moro:- complete tnfOmlalion regardingtrndemarks and registrntiooO/ill'r Wilel' c,li/or",' Offi("(: 'John Wik)' & Son .lne . 605 Tlurd Avenue.Nc\\ York. NY 10158-0012. USAW l lEY VC H Verlag Gmb H. Pappcl allee 3.D-h9469 WcinhclIll. GermanyJacarnnda Wiley lid. 33 Park Road. Miltoo.Qucensland 4064. AustrnliaLibra ry o/CO"Crt'H Ca/ulog;IIC-in-Pllbficu/ion DumDunlop. JohnDigual mobite commumca! ion and thc TETRA SySKOYl f John Dunlop,Dcmcssle Girma. hlTlCl Irvine.p. cm.IncludCli bibllogr.tphlcMI rc rerenco:-s.IS Il N0-47 1-98792- \ (al . paper)I . TETRA \sIandard)Z. Iobil c Cl. Illmumcal,on sys tems Standards.3. Digi tal communication systo:-ms- Stnnd3rds.I. Girma. D.:mcssle.II. Irv1lle. James. 111. Tillo:TK5103.-188. D86 199962 1.3ll4S'02 I8---dcZ I99-324611CIr8 rit;sh Libra,)' Ca/alogui ng in Pllblicu/ioll DamA catalogue record ( 01" this book is 8\"lIilable from the Bntish LibraryISBN 0-47 1·98792-1

ContentsPrefaceList of Abbreviations and SymbolsAbbreviationsSymbolsChapter I Principles of Digital Mobile RadioLJ1.21.31.41.51.61.7Introduction IModulation Methods IFrequency and Time Di vision Multiplexing 4Analogue to Digital Conversion 7Spectral Properties of Digilal Signals 8Pulse Shaping 10Digital Modulation 121.7.1 AmplilUde Shift Keying (AS K) 121.7.2 Binary Phase Shift Keying (BPSK) 131.81.91.101. 111.121.1 31.141. 151. 161.171.181. 191.7.3 Differential Phase Shlft Ke ying (DPSK) 131.7.4 Quaternary Phase Shift Keying (QPSK) 151.7.5 Offset QPSK (OQPSK) 161.7.6 Differential QPSK (DQPSK) 171.7.7 7tl4-DQPSK [81. 7.8 Linear Amplifiers 201.7.9 Frequency Shift Keying (FSK) 211.7.10 Minimum Shift Keying (MSK) 221.7. 11 MSK considered in tenns o f Phase Modulation 231.7. 12 Bandwidth of GMSK 261.7. 13 III-ary Modulalion 27Pulse Shaping in Carrier Modulated Systems 27Bandwidth Efficiency 28The Radio En vironment 29Plane Earth Propagation Model 3 1Fast Fading 34SlowFading 37Pathloss Models 39Link Budgets 40Fading in Digital Mobile Communications 4 1The Cellular Concept 42Typical Cell Operation 43Capacity of a Cellular System 44xvxixxixXXI';

viCQntents1.201. 211.221.231.24Frequency Re-use Distance 45Cellular Coverage 47Sectoring 5 1Statistical Issues 53Conclusions 55C hapter 2 Public Digital Mobile Radio Systems and Environment2.12.22.32.42.52.62.72.82.92. 102. II2.1 22. 132. 142.1 52. 16Digital Cellular Radio 56The Global System for Mobile Communications (GSM) 56T he GSM Network Architecture 57The GSM Radio Interface 58Logical Channels in GSM 582.5. 1 Burst Structure for GSM 6 12.5.2 Mapping of Logical Channels in GSM 622.5.3 Mapping of Traffic Channels and Associaled Control Channels 652.5.4 Mapping of the BCCl-VCCCH 652.5.5 Mapping of the SDCCHISACCH 662.5.6 Mapping of Logical Channels in Low Capacity Systems 67Security in GSM 672.6. 1 Authentication 682.6.2 Encryption 682.6.3 User Identity Protection 692.6.4 Sequence of Events 69Operation of the GSM System 702.7. 1 Location Updating 7 12.7.2 Call Establishment from a Mobile 732.7.3 Call Establishment to a Mobile 762.7.4 Call Release 76Voice Coding in GSM 76Non Voice Services 772.9. 1 Data Transmission Transparent Mode 782.9.2 Data Transmission (Non Transparent Mode) 782.9.3 The GSM Short Message Service 79Error Protection 802. 10. 1 Channel Coding in GSM 802.1 0.2 Interleaving 82Handover in GSM 83GSM Handover Measurements 84Features of the GSM System 862. 13. 1 Adaptive Frame Alignment 862.13.2 Adaptive Power Control 862.13.3 Slow Frequency Hopping 872.1 3.4 Discontinuous Transmission and Reception (DTX) 882.13.5 GSM Evolution 88Cordless Communication Systems 89T he Digital Enhanced Cordless Telecommurucalions System (DEer) 89Voice Coding in DECf 9056

COlllelllS2.172.182. 192.202.212.222.232.242.252.262.272.282.29The DECT Physical Layer 91DECf Medium Access Control 92Call Management in DECf 92Handover in DECT 94Dynamic Channel Selection (DCS) 94Spread Spectrum Systems 96Code Division Multiple Access 962.23.1 Power Control in CDMA 972.23.2 Di versity in COMA 972.23.3 Frequency Diversity 972.23.4 Spatial Diversity 982.23.5 Time Di versity 98The Forward (Base to Mobile) Link in cdmaOne 992.24. 1 Synchronisation Channel 1002.24.2 Pagi ng Channels 1002.24.3 Quad Cover 100The cdmaOne Reverse Link 10 I2.25. 1 Access Channel 1012.25.2 Payload Data 1012.25.3 Signalling 102The Rake Receiver 102Power Control Loops in cdmaOne 1032.27. 1 Open Loop Power Control 1042.27.2 Closed Loop Power Control 1042.27.3 Base Station Transmi ssion Power Control 104Mobile Access in cdmaOne 105Conclusion 105C hapter 3 The Private Mobile Radio Environment3. 13.23.33.43.53. 63.7I'i iIntroductio n 107The PMR User Community 1083.2. 1 Emergency Services I JO3.2.2 Utilities III3.2.3 National Government III3.2.4 Local Government III3.2.5 On-site III3.2.6 PAMR Operators II I3.2.7 Transpon 11 2Requirements of PMR Services 11 3PMR Configurations 116Compari son Between PMR and Cellular 11 9PMR standards 1223.6.1 The Need for and Development of Standards 1223.6.2 Analogue PMR 1223.6.3 Digital PMR 123PMR Market Evolution 126107

"iiiCOllletltsC hapter 4 An O\'er\'iew of the TETRA System4. 14.24.34.44.54.64.74.84.94.104. 114. 124.13Introduction 129The Basic Services of the Tetra System 130TETRA Network Architecture 13 1TETRA Circuit Mode (V D) 1324.4.1 Burst Structure 134Logical Channels Hierarchy 1354.5. 1 Broadcast Control CHannel (BCCH) 1374.5.2 Common Control CHannel (CCCH) 1374.5.3 Associated Control CHannel (ACCH) 1384.5.4 Access Assignment CHannel (AACH) 1384.5.5 Common Linearisation CHannel (CLCH) 1394.5.6 Traffic CHannels (TCH) 1394.5.7 Signall.ing CHannel (SCH) 139Mapping of Logical Channels in TETRA 140Operation of the TETRA V D Mode 1414.7. 1 Location Regisu:uion 14 14.7.2 Random Access 1424.7.3 Call set-up Procedure 144Special Features of me V D Mode 146Voice Coding in TETRA 1474.9. 1 Algebraic Code Excited Liner Predicti ve Coding (ACELP) 1484.9.2 Error Concealment 150DATA Services in V D Mode 151Direct Mode 1524. 11 . 1 The Direct Mode Channel 1544. 11.2 Call Set-up in Direc t Mode 1554. 11 .3 Control Channels in Direct Mode Operation 157Summary 157Spectral Efficiency 157Chapter 5 TETRA System Architecture, Components and Services5.15.25.3129Introduction 161The TETRA User Groups 1625.2. 1 Pote ntial User Groups 1625.2.2 The TETRA MoU 163System Architecture and Components 1645.3.1 TETRA System Architecture 1645.3.2 System Components 1655.3.3 TETRA Network 1655.3.4 Mobile Station 1655.3.5 Classes of MS 1655.3.6 Line Station 1685.3.7 Direct Mode Mobile Stalion 1685.3.8 Gateway 1695.3.9 Network Management Unit 170161

Colltell ts5.45.55.65.75.85.95. 105.115. 125. 135. 145. 15System Imerfaces 170TETRA Reference Configuration 1715.5. 1 Basic Concepts 1715.5.2 Refc rence Points in TETRA 172Subscriber Access Imerfaces 1725.6. 1 The ISDN Reference Confi guration 1735.6.2 Circuit Mode TETRA Reference Configurations 1745.6.3 Packet Mode Reference Configurations 176Pcripheral Equipment Interface 1785.7. 1 Overview 1785.7.2 The TETRA PEl 1785.7.3 PEl Componems 179Addressing and Identities 18 15.8. 1 TETRA Equipment Idemity (TEl) 1815.8.2 Mobile Network Identity (MNI) 1825.8.3 TETRA Managemenlldentilies (TMI) 1835.8.4 TETRA Subscriber Identity (TSJ) 1835.8.5 Network-Layer SAP Addresses (NS AP) 184TETRA Network Services 1855.9. 1 Overview 1855.9.2 Circuit Mode Data 1865.9.3 Packet Mode Data 1865.9.4 Short Data Service 1865.9.5 Teleservices 1875.9.6 Supplementary Services 188Mobility Management 19 15.10. 1 Basic Principles 19 15.10.2 Basic Mobility Procedures 194TETRA Inter-Syste m Interface 1955. 11.1 lSI Overview 1955. 11 .2 PISN Architecture 1965.11.3 TETRA 15 1 Signalling 197TETRA Comparisons with GSM 1985.12. 1 System Level Comparison 1985.12.2 System Parameters and Others 199Summary of TETRA Parameters 200TETRA Confommnce Testing 2015.14. 1 Scope of Conformance Testing 2015. 14.2 Conformance Statement 202Conclusions 203Cbapter 6 The Physical Layer6.16.26.3ixOverview. Function and Requirements 205Frequency allocation 206Choice of Multiplexing Method 2076.3.1 COMA Operation of PMR Systems 2086.3.2 FDM Operation of PMR Systems 208205

xCOlllelllS6.46.56.66.76. 86.96. 106.1 16. 126. 136.146. 156.3.3 TOM Operation for PMR Systems 209Choice of TDMA Parameters 212Modulation 2 15Frame. Slot and Burst Structures 2206.6. 1 TETRA Frame Structure 2 206.6.2 TETRA Burst Structure 22 16.6.3 Types of Burst of the Physical Layer 2246.6.4 Logical Physical Layer Logical Burst Types 227Synchronisation 227Transmission Delays 229Scrambling 233Transmission Power and Power Control 2356. 10.1 Power Classes 2356. 10.2 Power Control 236Channel Quality Measurement 2376. 11 .1 Received Signal Strength Measurement 2376. 11 .2 Signal Quality Measurement 2376. 11 .3 Ro und-trip MS-BS Path Delay 238Physical Layer Perfonnance 2386.12.1 TETR A Receiver Sensiti vity 2386.12 .2 TETRA Reference Channels 2396.12.3 TETRA Receiver Classes 2406. 12.4 Link Budget 24 J6. 12.5 Area Coverage 2436. 12.6 Area Coverage in the Noise Limited Case 2456. 12.7 Area Coverage in Ihe Interference Limited Case 247Intelference to Other Systems 2486. 13. 1 Limits on Adjacent Canier Interference 2496. 13.2 Limits on Emissions Far from the CanierWithin the TETRA Band 2506. 13.3 Li mits on Emissions OUlside the TETRA Band 250Area Coverage Techniques 2506.1 4 .1 Si ngle site wide area coverage 2516. 14.2 Cell ular Channel Re-use 2516. 14.3 Quasi-synchronous Transmission 2516. 14.4 Time-sharing Transmi ssion 2536. 14.5 Ante nna Di ve rsity 2546. 14.6 Site Di versity 2546.14.7 On-Frequency Repeaters 2556.14.8 Direct Mode f Trunked Gateway 256Conclusions 257Chapter 77. 17.27.37.4The Data Link LayerIntroduction 259Organi sation of the D3ta Link Layer 259Organisation of the MAC 26 JCoding and Interleaving 2647.4. 1 Error Co ntro l Strategies 265259

Comel/IS7.57.67.77.87.97.107.117. 127.137.4.2 Forward Error Correctio n and Detection 2667.4.3 TETRA Data and Signalling Channel Coding Schemes 2807.4.4 Coding Parameters for Data and Control Channels 2857.4 .5 TETRA Speech Coding Scheme 2867.4.6 Mapping on the Physical Layer Channels 2897.4.7 Example of Coding Steps 2897.4.8 Coding Perfoml:mce 290Ste aling 2917.5.1 Use of Stealing on the Uplink 2927.5.2 Use of Steali ng on the Downlink 293Trunking Methods 2937.6.1 Message Trunking 2947.6.2 Transmission Trunking 2947.6.3 Quasi-transmission Trunking 295Random Access 2957.7.1 Random Access for Direct Mode Operation 2977.7.2 Random Access fo r V D Mode Operatio n 2977.7.3 Access Frames 2997.7.4 Access Control Channels 30 J7.7.5 Reserved Access Procedures 3037.7.6 Independent Allocation of Slots o n the Uplink and Downl ink 303Logical Channel Routing 3047.8.1 Introduction 3047.8.2 Logica l Channe ls Passed to the Upper MAC 3047.8.3 Logical Channels Generated W ithin the Upper MAC 3087.8.4 Logical Channel Routing to the Lower MAC 3097.8.5 Channel Mapping in the Lower MAC 3 117.8.6 Inter-working Between MAC Layers 3DAir Interface Encryption 3 15Logical Link Control 3177. 10. 1 lmroduction 3 177. 10.2 ARQ3187. 10.3 LLC Operation 321Syste m Modes of Operation 3257. 11 . 1 Normal Mode 3267. 11 .2 Extended Mode 3267. 11 .3 Minimum Mode 3277. J 1.4 Discontinuous Transmission - Time. Carrier and MCCH S haring 328Mobile Statio n Modes of Operation 3297. 12.1 Idle Mode 3297. 12.2 Signalling and Pac ket Mode Data 3297.12.3 Traffic Mode 3307. 12.4 Energy Economy Mode 330Concl usions 331Chapter 8 TETRA Network Layer Protocols8.1xiIntrod uctio n 333333

xiiCo"te"tsNetwork Layer Concepts 3338.2.1 Generic Functions of the Network Layer 3338. 2.2 Control and User Plane Separation 3358.2.3 User.; View of the Network Layer 3368.3 Overview of TETRA Network Layer 3368.3. 1 Types of Information Transported 3368.3.2 TETRA Protocol Stacks 3378.3.3 V D Protocol Stack 3388.3.4 PDO Protocol Stack 3398.3.5 DMO Protocol Stack 3408.3.6 Remarks on Air Interface Protocols 3428.' Mobile to Base Link Entity 3428.4. 1 Overview 3428.4.2 MLE Functions 3428.4.3 Attachment Management 3458.4.4 MLE Services and Access Points 3538.4.5 MLE PDU Descriptions 3548.4.6 Concluding Remarks on MLE 3598.5 Mobility Management Protocols 3608.5. 1 Mobility Management Functions 3608.5.2 MM Subsystem Elements 3618.5.3 Functional Organisation of the MS-MM 3618.5.4 MM at the LMM-SAP 3628.5.5 MM at the TNMM-SAP 3648.5.6 MM with Network-MM Peer 3648.5.7 Overview of MM Procedures 3658.5.8 Description of Selected MM PDUs 3658.5.9 Concluding Remarking on MM Protocols 37 18.6 Circuit Mode Connection Entity 3728.6.1 Overview 3728.6.2 MLE functions al CMCE SAP 3728.7 Packet Mode Data Services 3758.7. 1 InlToduction 3758.7.2 Overview of X.25 Data Services 3768.7.3 Overview of TETRA Data Services 3788.7.4 Specific Connectionless Network Protocol (SCLNP) 3798.7.5 TETRA Inter-network Protocols 3798.8 Layers 4 to 7 3808.8. 1 Transport Layer Protocol 3808.8 .2 Session Layer Prolocol38 18.8.3 Presentation Layer Protocol 3818.8.4 Application Layer Protocol 38 18.9 Conclusion 3818.2Chapter 9 Operational Aspects of the TETRA Network9.19.2Introduction 383Network Security Management 383383

COI/UI/IS9.39.49.59.2. 1 Overview of TETRA Network Security 3839.2.2 Principles of Encryption and Authentication 3859.2.3 Types of Encryption 3879.2.4 Principles of Authenti cation 3889.2.5 TETRA Encryption Algorithms 3899.2.6 Protection Differences in TETRA Systems 3899.2.7 Authentication in TETRA 3909.2.8 Authentication POU Examples 3939.2.9 Encryption Keys 3949.2.10 Over The Air Re-keying 3959.2.1 1 OTAR POU Examples 3979.2. 12 Transfer of Authentication Information 3989.2. 13 Overview of Air Interface Encryption 3989.2. 14 Overview of End-to-End Encryption 3999.2.15 L.'1 wfullnterception 400TETRA Inter-System Signalling 4009.3. 1 The TETRA lSI Reference Configuration 4009.3.2 Q and C Reference Points 4019.3.3 Private Signalling System 1 for TETRA 4029.3.4 PSS I Protocol Stack 403TETRA Network Management 4059.4. 1 Overview 4059.4. 2 Principles of Networl:: Management 4069.4.3 Network Management Protocols 4089.4.4 The SNMP Model 4089.4.5 TETRA Network Management Methodology4 10Conclusions 411AppendicesAIA.2A.3AAIndexxiii413The TETRA Technical Specifications 414TETRA MoU Members 4 15A.2. 1 Manufacturers 4 15A.2.2 Users 4 18A.2.3 Regulators 420A2.4 Accredi ted lest houses 420Erlang B Table (for Blocked-Calis-Cleared) 421A.3 1 Overview of Basic Concepts 421A3.2 Erlang B Table 422Erlang C Table (for Blocked-Calls- Delayed) 424A4.1 Overview of Basic Concepts . 24A4.2 Erlang C Table 425427

PrefaceThe digital mobile telephone is now a ubiquitous object but it is still predominantly voicebased. This will change radically in the near future. with a huge emphasis being placedon wireless access to the Intcrnct and the provision of wire less multimedia services by a llmobile telephone networks. This movement is bei ng accommodated in the private mobileradio environmem by the introduction of the Terrestrial Trunked Radio Standard(TETRA) which has been expressly designed to accommodate voice and data services.This book has been written 10 specifically explain the capabilities of the TETRAspecifications and 10 give some insight into the wide range of services which digitaltechnology can support in private mobile radio networks. The book is based on courseswhich the authors have presented 10 engineers engaged in the design and procurement ofTETRA based networks and emphasises the relationship between the TETRAspecifications and the layered structure of the open systems interconnectio n (05 1) model .The book assumes a basic understanding of the concepts of analogue modulation systemsbut begins by introducing some of the fundamental concepts of digital signaltransmission. Therefore the non-TETRA specialist will find this text a useful introductionto digital mobile communications systems.Chapter I begins with the principles of digital mobile radio and introduces conceptswhich are essential to the understanding of digital systems. It considers, in detail . theproperties of amplitude. phase and frequency modulation of a carrier with digital signalswith particular emphasis on bandwidth requirements. This is followed by an introductionto the properties of radio channels which is essential to the understanding of thecompromises which are part of the design of all radio systems. This chapter also presentsan overview of cellular topics with examples of the design constraints which cellularsystems must address.Chapter 2 considers the public digital radio environment and describes examples of timedivision cellular radio (GSM). and cordless telephone systems (DECf). The emphasis inthis chapter is on the demands of public systems and the way in which these demandsinfluence design choices. Thi s chapter also considers the basics of spread spectrummobile communications systems with respe :t to cdmaOnem. which is essentially asecond generation system. Direct sequence COMA systems will be the basis of 3«1generation mobile systems with which TETRA will have to co-exist and therefore it isimportant that specialists in TETRA have some understanding of the differences betweenCDMA and TDMA systems.

XI';Pr faceChapter 3 deals with the pri vate mobile environme nt and highlights the differentrequi rements of private network mobile users and operators compared with the publicequ ivalents. The different types of pri vate mo bile network are described. and a review ofaltc111ati ves to TETRA is presented. This includes a brief descriptio n of the other digitalPMR systems which are available. as well as a discussion of other mo bile and cord lessradio solutions.Chapter 4 is an overview of the TETRA system and conce ntrates o n the explanation oflogical c hannels and how these relate to the OS I model. Panicular attention is given 10tmnked and direct mode operation which emphasises the way in which TETRA meets thedemands of the private mobi le radio e nvironme nt as o utlined in Chapter 3. This chapteralso introduces the co ncepts of lhe layered OSI model which is explored in mo re detail insubsequent c hapters.Chapte r 5 describes TETRA system architecture and components in mo re detail. T ETRAreference configuratio ns are introduced with the identification of imponant inte rfaces.which are considered in subsequent c hapters. in the context of interfaces and protocols.The descri ption of syste m components and network services in this chapter is inte nded toprovide a high-leve l o \'erview of T ETRA as a background 10 the more technica l c haplersthat follow. First time readers will therefore fi nd browsing this chapter usefu l before theT ETRA specific tcchnical descri ptions in later chapters.Chapter 6 descri bes the TETRA physical layer. and the choices m(lde for modulation andtransmi ssion. The nature of the PMR requireme rns makes these choices significantlydifferent fro m those made fo r public cellular systems. and the chapter describes thejustificatio n the design parameters used in the TETRA physical layer. Other functio nsand features of the physical layer are descri bed. such as the delays introduced to thetransmitted bit stream. synchro nisation. power control and coverage techniques.Chapler 7 is concerned with Layer 2 of the TETRA syste m. the data link layer. u )'cr 2.and in particular the MAC sub-layer. contains key functionality for the effi cie nt andsuccessful o peratio n of the system. The chapter covers the o peratio n of the MAC.including coding. random access. logical channcl routing and stealing. as we ll as anumber of support func tio ns the MAC undertakes for upper layers in respect ofencryptio n and channe l quality me asureme nt. This chapter al! O details the logical linkcontrol sub-laye r. whic h is responsible for ensuring that the info1111alion transmitted o nbehalf of the upper layers is received without error. and arranging for its retransmissio n ifnecessary.Chapter 8 deals with network layer functio ns of TETRA as a follo w o n from the physica land data link layers di scussed in Chapter 6 and Chapter 7. It illlroduces general networklayer co ncepts at the o utset and develops into more detailed treat ment of TETRA specificnetwork layer protocols. Radio link management and mo bility manage ment co nstitute themajor palt of the TETRA network layer functions. and thi s c hapter atte mpts to presentthese two important to pics (and o ther network layer protocols) in a clear and an orderlymanner. Where appropriate. p rolOeo' data llllirs are used to ill ustrate network control

Pre/acexliiiprocedures and at the same time highlight important parameters associated with thenetwork protocols. This chapter also presents an overview of packet mode data servicesthat are supported by TETRA.Chapter 9 collects together additional topics that are essential to the operation of TETRAover and above the network functi ons addressed in Chapters 6 to 8. Three importanttopics are identified for this chapter. namely. network security manage ment. inter-systeminterface signalling. and network management . each described under a separate section.Network security management is an important feature of TETRA and particular atte ntionis given to this topic for clear descriptions of the protocol mechanisms which arespecified for authentication and encryption key manageme nt.There is very significant potential for TETRA based systems to introduce widespread useof information technology into what has been a voice conmlllnicati ons basedenvironment. Whilst this text has nOI dealt in depth with these new IT-base services itdcres provide sufficient coverage. in a single volume. to stimulate e ngineers and serviceproviders to expand the potential of TETRA into a range of exciting new applicationareas.

List of Abbreviations andSymbolsABB REVIATIONSAACACCHauthentication code. authentication celltreAssociated Control C HannelACELPAlgebraic CELPADCanalogue to digital conversionadaptive differential pulse code modulationAccess Grant C Hannelair interfaceamplitude modulationAdvanced Mobile Phone Systemadditional network featureAssociation of Public-safety Communications OfficersAutom:lIic Repeat reQuestAdvanced Speech Call Items (GSM)am plitude shifl keyingabstract syntax notationATtention (conunand set for modems)asynchronous time d ivision multiplexi ngasynchronous transfer modealias TETRA subscriber identityauthentication centre (also AC)A DPCMAGCHAIAMAM PSANFAPCaARQASCIASKASNATATDMATMATSIA uCBBBKBCCHBCCHBERBLCHBNCHBPSKBSBSCBSCHBroadcast BlocKBroadcast Control C HannelBroadcast Control CHannelbit error rateBase station Linearisatio n C HannelBroadcast Network Conlrol C Hannelbinary phase shift keyingbase stationbase station controllerBroadcast Synchronisation C Hannel

xxLisl of Abbrerialions Qlld SymbolsSSSSSTBTBTSCCBCCCCCHCC HCCKCOMACDPDCEPTCFPCIRCKCLCHCMCECM IPCNLSCNMCON PCPPCRCCSM REPDPSKDQPSKOSB·AMDSRRDTEbase station subsystembase station transceivertime bandwidth product of pulse shaping filterbase transceiver stationControl Burstcall controlCommon Control CHannelControl CHannelcommon cipher keycode division multiple accessCellular Digital Packet DataConference Europ6enne Postes des et TelecommunicationCordless Fixed Partcarrier to interference ratiocipher keyCommon Linearisation CHannelCircuit Mode Control Entitycommon management information protocolconnectionless (packet data service)central networi.: managementconnection-oriented network protocolCordless Portable Pancyclic redundancy checkcarrier sense multiple access with collision detectionDigital Advanced Wireless Systemdecibeldecibel with reference to a milli·watt powerDedicated Control CHanneldata communication equipmentderi ved cipher keydistributed databaseDigital Enhanced Cordless Telecommunicationdata encryption standardDirect Modedirect mode call controlDirect Mode Mobile StationDirect Mode OperationDirect Mode Repeaterdifferential phase shift keyingdifferential quaternary phase shift keyingdouble sideband amplitude modulationDigital ShO.1 Range Radio systemdata terminal equipment

List of AbbrevwtiQIIS alld SymbolsDTMFDW-MSdual tone multi frequencyDual Watch-Mobile StationEECCHECMAEDACSEIRPEKSOEMCERPESNETSIExtended Common Control CHannelEuropean Computer Manufacturers AssociationEnhanced Digital Access Communication Systemeffective isotropic radiated powerEnd-to-end Ke y Stream GeneratorElectroMagnetic Compatibilityeffective radiated powere lectronic serial numberEuropean Telecommunicatio ns Standards InstituteFFACFACCHFCCHFCSFDMFDMAFECFHMAFMFSKfinal assembly codeFast Associated Control C HannelFrequency Correction CHannelframe check sequencefreq uency division multiplexfrequency division multiple accessForward Error Correctionfrequency hopping multiple accessfrequency modulationfrequency shift keyingGGCKOFPOMSKOoSGPRSOSMGSM-ROTSIgroup cipher keygeneric functional prolOcolGaussian minimum shift keyinggrade o f serviceGeneral Packet Radio ServiceGlobal System for Mobile communicationsGlobal System for Mobile communications for Railwaysgroup TETRA subscriber identityHHACHOBHLRHSCSDHT200home authentication centrehome databasehome location registerHigh Speed Circuit Switched DataHilly Terrain environment at 200kphIIDEAiDEN10FTInternational Data Encryption AlgorithmIntegrated Digital Enhanced Tec hnologyinverse discrete Fourier transformxxi

x:diIFIMEIIMSIINIPISDNlS IISOISS IITSIIVIVNKkH,KSGList of Abbrel'ialiolls Gild Symbolsintennediale frequencyInternational Mobile Equipme nt IdentityInternational Mobile Subscriber Ide ntityIntellige ru Networkinternet Protocolintegrated services digital networkinter-system interfaceIntcrnational Standards Organisatio nindi vidual short subscriber identityindividual TETRA subscriber identityinitial value (authentication algorithm)InterVening Networkkilo Hertz (10 3 cycles/s)Key Stream Gene ratorLLALACLAceLANLANCLAPLAP-BLA P-DLSLCHLC HLLCLMNLMRLNMLSLTRLTViocalion arealocation area codelocation area country codelocal area networklocation area network codelink access protocol (or procedure)link access pro tocol for B channel (or - balanced)loca l access protocol for 0 ChannelLinem;sation BurstLineari satio n ChannelLinearisation CHan nellogical link controlland mobile networkIond mobile radiolocal network managementline (-conncctcd) stationlogic Inlnked radioline termination unitMMACMAFMANMCCMCC HMERMFAMHzMISmedium access controlmutual authentication flagmetropolitan area networkMobile Country CodeMain Co ntrol CHannelMessage Error Ratemanagement functi onal areaMega hertz ( 106 cyclesls)management infotmation base

Ust of Abbrel'iatiolls alld e Link Entitymobility managememman machine interfaceMobile Network CodeMobile Network IdentityMemorandum of UnderstandingMinis!!)' of Post and Telecommunications (standards. e.g . MPT1327)mobile stationmobile switching centreminimum shift keyingmobile temunationmobi le tennination unitNNDBNMUNSAPNTNUBoOMCOQPSKOSlOTARNomlal Downlink Burstnetwork management unitNetwork-layer Service Access Pointnetwork lemlinationNormal Uplink Burstoperations & management centreoffset quaternary phase shift keyingopen systems interconnectionOver The Air NPINXPISNPLMNPLPPMPMRxxiiipower amplifierpacket assembler/disassemblerpublic access mobile radioprivate business radiopersonal compUler; prOiocol conlJ'OlPaging CHanne lpulse code modulationpacket datapublic data networkpacket data optimisedprotocol daLa unitperipheral equipment interfaceprotocol implementation confonnance statementpersonal identity numberPrivale Integrated Network eXchangeprivate integrated services networkpublic land mobile networkpacket level protocolphase modulationprivate mobile radio

xxivPNPOTSPPPPSKPSTNPTTPVCQQoSQPSKQSIGList of Abbrel'ialwns alld SymbolsPseudo raNdomPlain Old Telephone Syste mpoint-to-point protocolphase shift keyingpublic switched telephone networkpress to talk: post, telegraphy & telecommunicationspermanent virtual circuitquality of servicequaternary phase shift keyingQ-reference point MSSNAFSNMPSNRSRBRSSSS-CRandom Access CHannelRANDom challenge (on authentication)Radio Equipment and System: RESponse value (authentication)radio frequencyremote operations service e ntityrandom seedreceived signal str

2.2 The Global System for Mobile Communications (GSM) 56 2.3 The GSM Network Architecture 57 2.4 The GSM Radio Interface 58 2.5 Logical Channels in GSM 58 2.5. 1 Burst Structure for GSM 61 2.5.2 Mapping of Logical Channels in GSM 62 2.5.3 Mapping of Traffic Channels and Associaled Control Channels 65 2.5.4 Mapping of the BCCl-VCCCH 65

Related Documents:

download to: 1. For instructions for installing your CoursePoint Bookshelf on a PC: click here. 2. For instructions for installing your CoursePoint Bookshelf on a Mac: click here. 3. To download the free Bookshelf app to your iPhone or iPad, go to the App Store and search: VitalSource Bookshelf. Or click here. 4.

Bookshelf Online 5 Bookshelf Online With Bookshelf Online and an Internet-connected computer, you have full access to your complete collection of books, notes and highlights. With an active Internet connection, Bookshelf Online will remember the reading you do, plus the notes and highlights you make, so everything stays in sync.

C opy righ t(c) 2 09 b yR eE. d All Right sR erv d Book Shelf Plans Attach F ac er m Page 12 Step 2. Secure it to the sides with 1 1/2" finishing nails asFile Size: 824KBPage Count: 19Explore further16 Free DIY Bookshelf Plans You Can Build Right Nowwww.thesprucecrafts.com57 DIY Free Bookshelf Plans Learn How To Build A .homesthetics.netDIY Bookshelf Plans BLACK DECKERwww.blackanddecker.com40 Easy DIY Bookshelf Plans Guide Patternswww.guidepatterns.comBookcase Plan Combo Pack - Popular Woodworkingcdn.popularwoodworking.comRecommended to you b

VitalSource Bookshelf Download your digital textbook to your personal computer and access them in the VitalSource Bookshelf. They are completely portable; use them whether you are connected to the Internet or not. Bookshelf is free for download and available for: Both Mac OS X and Windows operating systems iPad, iPhone, and iPod touch

Bookshelf platforms (i.e. Online, Download, Mobile) Once an account has been configured the user no longer needs to click the book from Blackboard. The user now has access to his/her books on the associated Bookshelf account. For offline access, click on the follow link and select the Download Bookshelf: https://support.vitalsource.com.

Murphy Door DIY Bookshelf & Hardware Installation Manual The Murphy Door Bi-Folding Bookshelf was designed to install IN FRONT of existing door, replacing the door or doors while concealing the door way. In MOST cases no retrofitting of existing door jambs, base moldings or c

WILEY Bookshelf Guide Page 2 Redeem a Code 1. Sign into Bookshelf Online using your account. 2. Click Redeem in the menu bar along the top of the page. 3. Add your redemption code to the code box and click Redeem.To redeem multiple codes, click the Add more button and redeem up to 100 codes. 4. Your library will update with your new book(s) and may take a few minutes.

Strategy 6: Mobile Workload Mobile devices are increasingly driving mainframe workloads April 2014: Mobile Workload Pricing – 60% reduction in mobile workload CPU to R4HA peak MUST be from mobile device MUST show connection to mobile device – Mobile Safari good – Desktop Safari not good Mobile to mainframe is .