Professional Documents
Culture Documents
HARDWARE 2011
CHAPTER 1
INTRODUCTION OF PROJECT:
The task means to Monitor the execution and robotize the troubleshooting; of a cell system. The developing size of
cell systems, together with the expanding many-sided quality of the system components, makes an evident
requirement for a proficient computerized observing and Problem distinguishing proof device.
Versatile cell telecom systems are perplexing element frameworks the observing and issue ID of which in the occasion
of a flaw, presents impressive difficulties. Commonly, the system execution investigation is completed on a system on
cell premise and it is focused around the activity data got from different sensors, for example, the quantity of asked for
calls, number of dropped calls, number of handovers, and so forth. The mechanized observing and issue distinguishing
proof framework gives probability of distinctive client defined main drivers of execution corruption focused around
the watched tactile data gathered as composed information extricated from real time information. It utilizes these data
to further examine the measurable information for proficient checking of the system execution.
In a cellular system, system observing is an extremely significant term to utilize. This "execution estimation" of a
system is conceivably partitioned in cell wording into two unique areas; where one arrangement with investigation of
real time information while alternate handles the dissection of factual information got from dumbs.
Consequently unequivocally, Performance estimation of a system is done in two ways:
Drive testing— Incorporates On-field investigation of information through live perception of locales introduced
Statistical Analysis— Investigation of the composed sheets of information concentrated from dumbs sheets. These
contain the important system parameters to be specific KPI's (Key Performance Indicators) that help gage system
execution either pictorially or systematically.
By viable use of the real time data, the system execution can be streamlined further into one different spaces/client
interfaces as done through our software. gather transferred logs from sent Android phones - it produces reports
furthermore a dashboard and guide of issue focuses like call drop and call squares. It can likewise be utilized to make
test scripts, timetable tests and in addition screen each one sent phone's status.
Into one distinct domains/user interfaces as done through our software:
KPIs are established by the operator as to judge the performance of a network. KPIs which are decided by the
These KPIs decide how our system is to be evaluated on the execution scale. Consequently viable checking of
KPIs is fundamental. On the other hand, addition these, other system execution estimation apparatuses are further
utilized for affirmation of sound operation. These are picked on the premise of the quantity of locales/cells in the
system and gage the overshooting of cells, screen their recurrence task through Interference checks and guarantee
The recognizable proof of the main driver of issues in the system is a fundamental piece of the continuous system
operation and checking procedure. As a cell framework comprises of a few thousand components, even with very
solid Hardware not these components are continually performing in an ideal way. Moreover, in a developing
2|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
system, off and on again it is hard to control that all components interface as they are required to or that the setup
is the right one. To guarantee that the system is giving greatest execution, ceaseless Problem Identification ought
to be connected to help discover essential causes because of which the proficient execution of a system may be
hampered
CHAPTER 2
THEORETICAL BACKGROUND
GSM
The framework must take after the accompanying conditions for GSM Standard:
The conditions for GSM Standard have been transformed into points of interest:
o the normal discourse quality is more prominent than that of simple cell systems
o available frequencies are proficiently utilized
o speech encryption ensures the security models
o possibility of global wandering
o tough rivalry lessens the cost
The cell structure in GSM is situated in such a route, to the point that it gives a very nearly finish scope. It can serves
up to 35km from the base station to the versatile station in this way add up to land territory is partitioned into more
diminutive territories which are known as Cell.[2]
The worldwide GSM administration territory is subdivided into national GSM administration zones with one or a few
GSM- Plmns (Public Land Mobile Networks). A GSM-PLMN is further subdivided into a few capacities
Radio subsystem comprises of Base Station Subsystem (BSS) and Mobile Station (MS). BSS and MS made out of
taking after units:
The MS likewise gives the receptor to SMS messages, empowering the client to flip between the voice and data
utilization. Also, the versatile encourages access to voice informing frameworks. The MS likewise gives access to the
different data services accessible in a GSM system. These data services include:
X.25 packet switching through a synchronous or nonconcurring dial-up association with the PAD at velocities
commonly at 9.6 Kbps.
General Packet Radio Services (Gprss) utilizing either a X.25 or IP based data exchange system at velocities
up to 115 Kbps
Rapid, circuit switch data at velocities up to 64 Kbps
What is SIM?
The SIM provides personal mobility so that the user can have access to all subscribed services irrespective of both the
location of the terminal and the use of a specific terminal. You need to insert the SIM card into another GSM cellular
phone to receive calls at that phone, make calls from that phone, or receive other subscribed services.
The BTS houses the radio handsets that characterize a cell and handles the radio connection conventions with the MS.
In a substantial urban zone, countless may be sent.
Encoding, scrambling, multiplexing, balancing, and bolstering the RF signs to the reception apparatus
Transcoding and rate adjustment
Time and recurrence synchronizing
Voice through full- or half-rate services
The BSC deals with the radio assets for one or more Btss. It handles radio channel setup, recurrence bouncing, and
handovers. The BSC is the association between the portable and the MSC. The BSC additionally deciphers the 13
Kbps voice station utilized over the radio connection to the standard 64 Kbps station utilized by the Public Switched
Telephone Network (PSDN) or ISDN. [3]
It doles out and discharges frequencies and time spaces for the MS. The BSC additionally handles intercell handover.
It controls the force transmission of the BSS and MS in its region. The capacity of the BSC is to designate the
important time spaces between the BTS and the MSC. It is a switching gadget that handles the radio assets. Extra
capacities include:
MSCs unite alternate systems with the BSS and different NSS' units (VLR, HLR, ACC and EIR) with
The BSS with the assistance of a flagging interstate. It is essentially an exchanging focus that
Completes all exchanging for the versatile stations which are really placed in the MSC's territory.
9|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
2.3.3.3 VISITOR LOCATION REGISTER (VLR):
VLR gives steady redesigns about the area of the MS in its controlled region. It likewise gives the client's data which
is needed by the MSC. Stores exceedingly paramount data required for the MS clients presently in the LA that is
related to the MSC. On the off chance that another MS comes into the LA then the VLR is in charge of it. The VLR
duplicates all the significant data for the MS from the HLR.
It is the fundamental information base of a client. Client is just apportioned to a solitary HLR which stores the
important information. This information is send to VLR when required.
For all clients enrolled with the system, HLR keeps client profile
MSCs trade data with HLR
At the point when MS registers with another GMSC, the HLR sends the client profile to the new MSC
AC contains keys and calculations for a security parameter for approval, this parameter is known as Triple. Triple is
made on VLR's solicitation then it is made available to VLR. Frequently it is likewise connected with HLR.
is gotten to by HLR to confirm a client for administration
Contains confirmation and encryption keys for endorsers
IMEI (International Mobile Equipment Identity), semi perpetual information base in a manifestation of code is spared
in EIR. An IMEI distinguishes the versatile gear and has the data about the spot of production, gadget sort ground
dwelling insect the serial number. EIR is utilized for checking and debilitating the cell phones if there should arise an
occurrence of robbery.
OSS performs operation and support errands. OMC (Operation and Maintenance Center) is mindful to perform the
capacities of OSS.
The OSS is the useful element from which the system administrator screens and controls the framework. The
motivation behind OSS is to offer the client savvy help for incorporated, provincial, and nearby operational and
upkeep exercises that are needed for a GSM system. A vital capacity of OSS is to give a system outline and backing
the support exercises of distinctive operation and upkeep associations
Giving voice or information transmission quality over the radio connection is just some piece of the capacity of a cell
portable system. A GSM portable can flawlessly wander broadly and universally, obliging institutionalized call
directing and area redesigning capacities in GSM systems. An open correspondences framework likewise needs robust
security systems to anticipate abuse by outsiders. Security capacities, for example, validation, encryption and the
utilization of Temporary Mobile Subscriber Identities (Tmsis) are an outright must.
Inside a GSM system, distinctive protocol is required to empower the stream of information and motioning between
distinctive GSM subsystems. [4]
This figure shows the interfaces that link the different GSM subsystems and the protocols used to communicate on
each interface. The layers of GSM roughly follow the OSI model.
The Abis interface exists in the base station subsystem (BSS) and speaks to the partitioning line between the BSC
capacity and the BTS. The BSC and BTS can be associated utilizing rented lines, radio connections or
metropolitan zone systems (Mans). Primary functions are traffic channel transmission, terrestrial channel
management, and radio channel management. Interface, Abis (most Abis interfaces are merchant particular). The
essential capacities extended this interface are activity channel transmission, physical channel administration, and
radio channel administration. This interface upholds two sorts of interchanges connections: activity channels at 64
kbps convey speech or client data for a full- or half-rate radio movement channel and signaling channels at 16
kbps convey data for BSC-BTS and BSC-MSC signaling. The BSC handles the LAPD channel signaling for each
BTS transporter. The initial three layers are focused around the accompanying OSI/ITU-T suggestions:
There are two sorts of messages took care of by the movement administration method a piece of the signaling
interface—straightforward and nontransparent. Straightforward messages are between the MS and BSC-MSC and
don't require investigation by the BTS. Nontransparent messages do oblige BTS examination.
The protocol utilized on the Abis interface is LAPD, which is adjusted from ISDN. LAPD gives the accompanying
frame sorts that can be isolated into three gatherings:
2.6 A INTERFACE:
The interface lies between the BSC and MSC. On the off chance that the BSC contains the transcoder supplies
(TCE), an activity channel (TCH) involves a complete 64 kbit/s timeslot in the 2 Mbit/s or 1.544 Mbit/s PCM join
(layer 1, GSM Rec. 08.04). Out of 32 accessible timeslots on the PCM join, a greatest of 30 activity channels can
be worked all the while, since no less than 2 timeslots are required for control and flagging purposes (Ts0 for
FAS/NFAS and an alternate TS for flagging, typically Ts16) on PCM offices. One flagging channel helps
numerous 64 kbit/s PCM offices between one BSC and the MSC. Ordinarily two dynamic 64 kbit/s timeslots are
utilized for this reason. The interconnection between the BTS and the BSC is through a standard.
The protocol of layer 2 and layer 3 between the BSC and MSC is focused around the Ss7 standard, however is
transmitted alongside the client data inside the PCM office. Regularly timeslot 16 (Ts16) of the 64 kbit/s frame
issued.
Layer 1
(GSM Rec. 08.04): 2.048 Mbit/s (ITU-T: E1) or 1.544 Mbit/s(ANSI: T1) PCM link.
Layer 2
(GSM Rec. 08.06): Here, SS7-based protocols are used for layer 2; the message transfer part
(MTP) protocol (responsible for transmission security between the BCS and MSC) and the signaling connection
control part(SCCP)protocol (allows global addressing of network elements and thus offers a service corresponding
to the ex-change layer). MTP and SCCP also perform layer 3 functions. SCCPis used to transport DTAP and base
station management application part (BSSMAP) messages on the A interface, ensuring both connection less and
connection-oriented message flows. The connections can be related to a specific MS or radio channel.
An SCCP connection can be initiated by a mobile station (MS) or an MSC. An SCCP connection can involve the
following protocols:
.From the MS:
MM: CM service request
RR: Paging response
MM: Location updating request
MM: CM re-establishment request.
From the MSC: Initiation of an external handover (BSSMAP: handover request).
The MSC always manages an SCCP connection.
.
Layer 3
(GSM Rec. 08.08): Contains the base station system application part (BSSAP) protocol. This layer has multiple
parts on theMSC end:
2.7 B INTERFACE:
The B interface exists between the MSC and the VLR. It utilizes a protocol known as the MAP/B protocol. As
most Vlrs are gathered with a MSC, this makes the interface absolutely an "inside" interface. The interface is
utilized at whatever point the MSC needs get to data in regards to a MS placed in its range.
2.8 C INTERFACE:
The C interface is found between the HLR and a GMSC or a SMS-G. At the point when a call starts from outside
the system, i.e. from the PSTN or an alternate portable system it ahs to pass through the entryway so that steering
data needed to finish the call may be picked up. The protocol utilized for correspondence is MAP/C, the letter "C"
demonstrating that the protocol is utilized for the "C" interface. Notwithstanding this, the MSC might alternatively
forward charging data to the HLR after the call is finished and cleared down.
2.9 D INTERFACE:
The D interface is arranged between the VLR and HLR. It utilizes the MAP/D protocol to trade the data identified
with the area of the ME and to the administration of the supporter.
2.10 E INTERFACE:
The E interface gives correspondence between two Mscs. The E interface trades data identified with handover
between the stay and transfer Mscs utilizing the MAP/E protocol.
2.11 F INTERFACE:
The F interface is utilized between a MSC and EIR. It utilizes the MAP/F protocol. The interchanges along this
interface are utilized to affirm the status of the IMEI of the ME getting access to the system.
2.12 G INTERFACE:
The G interface interconnects two Vlrs of distinctive Mscs and uses the MAP/G convention to exchange endorser
data, amid e.g. an area overhaul strategy.
2.13 H INTERFACE:
The H interface exists between the MSC the SMS-G. It exchanges short messages and uses the MAP/H
convention.
2.14 I INTERFACE:
The I interface can be found between the MSC and the ME. Messages traded over the I interface are transferred
straightforwardly through the BSS.
2.15 UM INTERFACE
The Radio Interface (MS to BTS) The Um radio interface (in the middle of MS and base transceiver stations [bts])
is the most critical in any portable radio framework, in that it addresses the requesting qualities of the nature's
domain.
Um is characterized in the bring down three layers of the model. The physical layer interfaces to the data link
layer and radio asset administration sublayer in the MS and BS and to other useful units in the MS and system
subsystem (which incorporates the BSS and MSC) for supporting traffic channels. The physical interface involves
a set of physical channels open through FDMA and TDMA. Every physical channel backs various intelligent
channels utilized for client traffic and flagging. The physical layer (or layer 1) backings the capacities needed for
the transmission of bit streams broadcasting live interface. Layer 1 additionally gives access capacities to upper
layers. At the physical level, most flagging messages carried on the radio way are in 23-octet squares. The data
link layer capacities are multiplexing, mistake identification and redress, flow control, and division to consider
long messages on the upper layers. The radio interface utilizes the Link Access Protocol on Dm channel.
International telecommunication union assigns different frequency bands for gsm providers
GSM900:
Uplink 815 – 900 MHz
Downlink 935 – 960 MHz
GSM1800:
Uplink: 1710 - 1785 MHz
Downlink: 1805 -1880 MHz
GSM1900:
Uplink: 1850 - 1910 MHz
Downlink: 1930 - 1990 MHz [2.15.1]
The GSM framework has a characterized GSM frame structure to empower the methodical entry of data. The
GSM frame structure secures plans for the foreordained utilization of timeslots. By building these timetables
by the utilization of a frame structure, both the versatile and the base station have the capacity convey the
voice information, as well as flagging data without the different sorts of information getting to be intermixed
and both finishes of the transmission knowing precisely what sorts of data are, no doubt transmitted.
Since radio spectrum is a restricted asset imparted by all clients, a strategy was formulated to separation the
data transfer capacity among the same number of clients as conceivable. The strategy picked by GSM is a
blending of time- and frequency division multiple accesses (TDMA/FDMA).
In GSM frequency band of 25 MHz is divided into 200 KHz of smaller bands, each carry one RF carrier, this gives
125 carriers. As one carrier is used as guard channel between GSM and other frequency bands 124 carriers are useful
RF channels. This division of frequency pool is called FDMA. Now each RF carrier will have eight time slots. This
division time wise is called TDMA. Here each RF carrier frequency is shared between 8 users hence in GSM system,
the basic radio resource is a time slot with duration of about 577 microsec. As mentioned each time slot has 15/26 or
0.577ms of time duration. This time slot carries 156.25 bits which leads to bit rate of 270.833 kbps. This is explained
below in TDMA gsm frame structure. For E-GSM number of ARFCNs are 174, for DCS 1800 ARFNCs are 374.
The fundamental component in the GSM frame structure is the frame itself. This contains the eight spaces,
each one utilized for distinctive clients inside the TDMA framework. The openings for transmission and
gathering for a given portable are balanced in time so that the versatile does not transmit and get in the
meantime.
Frame structure is the division of characterized length of advanced data into diverse fields (data parts). A GSM
frame is 4.615 msec and it is made out of 8 time openings (numbered 0 through 7). Amid voice
correspondence, one client is commonly allocated to each one time opening inside a frame. The GSM
framework likewise consolidates frames to structure Multiframes.
The GSM frames are gathered together to structure multiframes and thusly it is conceivable to make a time
plan for their operation and the system can be synchronized. There are a few GSM multiframe structures:
The Traffic Channel frames are composed into multiframes comprising of 26 blasts and taking 120 ms. in a
movement multiframe, 24 blasts are utilized for activity. These are numbered 0 to 11 and 13 to 24. One of
the remaining blasts is then used to oblige the SACCH, the remaining frame staying free. The real position
utilized interchanges between position 12 and 25.
The Control Channel multi frame that contains 51 Burts and involves 235.4 ms. this dependably happens
on the signal frequency in time opening zero and it might likewise happen inside openings 2, 4 and 6 of the
guide frequency also. This multi frame is subdivided into consistent channels which are time-booked.
These legitimate channels and capacities incorporate the accompanying
The Control Channel multi frame that includes 51 bursts and involves 235.4 ms. this dependably happens on
the reference point frequency in time opening zero and it might likewise happen inside spaces 2, 4 and 6 of the
signal frequency too. This multi frame is subdivided into sensible channels which are time-planned. These
coherent channels and capacities incorporate the accompanying
Over this 2048 super frames (i.e. 2 to the force 11) are assembled to structure one hyper frame which rehashes
like clockwork 28 minutes 53.76 seconds. It is the biggest time interim inside the GSM frame structure.
Inside the GSM hyper frame there is a counter and each time opening has an exceptional consecutive number
including the frame number and time space number. This is utilized to keep up synchronization of the diverse
booked operations with the GSM frame structure.
With a specific end goal to transmit data, we obliged the channels. Channels utilized as a part of GSM are of
two sorts: Physical Channels and Logical Channels. The physical channel is the medium over which the data is
conveyed; on account of a physical interface this would be a link. Other Channel by Physical is Logical
Channel which comprises of the data extended the physical channel. Control Channel and Traffic Channel are
further of two sorts of Logical Channel.
CHANNELS
PHYSICAL LOGICAL
At the point when a MS and a BTS impart, they do so on a particular pair of radio recurrence (RF)
transporters, one for the up-connection and the other for the down join transmissions, and inside a given time
opening. This consolidation of time opening and bearer recurrence structures what is termed a physical
channel One RF channel will help eight physical channels in time spaces zero through seven. The MS on the
other hand Base Station must transmit the data identified with one call at precisely the right minute, or the
timeslot will be remembered fondly. The data conveyed in one timeslot is known as a "burst". Each
information burst, involving its assigned timeslot inside progressive TDMA casings, gives a solitary GSM
physical channel convey a differing number of logical channels between the MS and BTS.
The information, whether client traffic or signaling data, are mapped onto the physical channels by
characterizing various logical channels A logical channel will convey data of a particular sort and various
these channels may be consolidated before being mapped onto the same physical channel. For instance
discourse is sent on the logical channel "Traffic channel" which amid the transmission is allotted a certain
physical channel, say TS 6 on bearer 0 .The logical channels are separated into two gatherings control channels
and traffic Chanels.
LOGICAL CHANNELS
A traffic channel (TCH) is utilized to convey speech and data traffic. Traffic channels are characterized
utilizing a 26-frame multi frame, or gathering of 26 TDMA frames. The length of a 26-frame multiframe is
120 ms, which is the way the length of a burst period is characterized (120 ms partitioned by 26 frames
partitioned by 8 burst periods for every frame). Out of the 26 frames, 24 are utilized for traffic, 1 is utilized for
the moderate related control channel (SACCH) and 1 is as of now unused (see Fig. 5). Tchs for the uplink and
downlink are divided in time by 3 burst periods, so that the portable station does not need to transmit and get
all the while, accordingly improving the electronic hardware. This system grants complex reception apparatus
duplex channels to be kept away from and in this way serves to cut force utilization. Notwithstanding these
full-rate Tchs (TCH/F, 22.8 kbit/s), half-rate Tchs (TCH/H, 11.4 kbit/s) are additionally characterized. Half-
rate Tchs twofold the limit of a framework adequately by making it conceivable to transmit two calls in a
solitary channel. In the event that a TCH/F is utilized for data correspondences, the usable data rate drops to
9.6 kbit/s (in TCH/H: max. 4.8 kbit/s) because of the upgraded security calculations. Eighth-rate Tchs are
additionally pointed out, furthermore are utilized for flagging. In the GSM Recommendations, they are called
stand-alone committed control channels (SDCCH).
Downlink Only.
Downlink Only
Downlink Only.
Uplink only.
Used by the MS when making its first access to the Network.
The reason for access could be initiation of a call or a page response.
Downlink only.
Used for acknowledgement of the access attempt sent on RACH.
Used by the network to assign a signaling channel upon successful decoding of access bursts.
Downlink only.
The network will page the MS, if there is an incoming call or a short Message.
It contains the MS identity number, the IMSI or TMSI.
Used for call setup, authentication, ciphering location update and SMS.
Used to transfer signal while MS have ongoing conversation on traffic or while SDCCH is being used.
On the forward link, the SACCH is used to send slow but regularly changing control information to each
mobile on that ARFCN, such as power control instructions and specific timing advance instructions
The reverse SACCH carries information about the received signal strength and quality of the TCH, as well as
METHOD OF INVESTIGATION:
3.1 MYTHOLOGY
To maintain the performance of network with air interface within the threshold value, we have to monitor or to dealt
with multiple parameters like neighbor BCCH clash with the source cell to improve access procedure, proper neighbor
assignment analysis to improve quality and performance of DCR (Call drop rate) A broadcast control channel
(BCCH) is a point to multipoint, unidirectional (downlink) direct utilized as a part of the Um interface of the GSM
cell standard. The BCCH conveys a rehashing example of framework data messages that depict the identity, setup and
accessible characteristics of the base transceiver station (BTS). These messages additionally give a rundown of
absolute radio-frequency channel numbers (Arfcns) utilized by neighboring Btss. this message example is
Now we are going to design and do monitoring of the key main factors that is very essential to maintain during the
call and will show all this on a screen like neighbor cell and its BSIC (Base station identification code). Information
we will monitor includes the Mobile Network Code (MNC), the Location Area Code (LAC) and a list of frequencies
used by the neighboring cells (BA: BCCH Allocation List). BCCH - Broad Cast Control Channel Hopping, BER - Bit
Error Rate, FER - Frame Error Rate, MAL - Mobile Allocate List, BSIC - Base Station Identification Code.
For this
3.2 PROCEDURE
In a cellular system, system observing is an extremely significant term to utilize. This "execution estimation" of a
system is conceivably partitioned in cell wording into two unique areas; where one arrangement with investigation
of real time information while alternate handles the dissection of factual information got from dumbs.
Procedure for the project is that a prototype will be developed to display the analysis of neighbor cell along with
the distinct values of measured parameters. In which we use different type of level sensors for calculating the
serial interfacing circuit and then it passes through gsm modem and last but not the least we have to make the
software which will be android based for the monitoring our live stats between MS to BTS
Drive testing— Incorporates On-field investigation of information through live perception of locales introduced
Statistical Analysis— Investigation of the composed sheets of information concentrated from dumbs sheets.
These contain the important system parameters to be specific KPI's (Key Performance Indicators) that help gage
The Figure. 3.1 And figure 3.1 indicates our project flow chart and block diagram in an organized fashion.
KPI MONITORING
KPIs are established by the operator as to judge the performance of a network. KPIs which are decided by the operator
to use depend upon:
Nature of the network
The MSC performs the switching capacities and directions the calls and steering methods inside GSM. All in
all, a MSC controls a few Bsss. Hence, it is in charge of activity administration and the radio scope of a
given geographic territory, the MSC zone. A GSM system may have one or more Mscs, contingent upon the
movement to be controlled. A MSC is in charge of a few capacities, for example, paging, coordination of call
setup, designation of assets, interworking with different systems, handover administration, charging,
GSM PLMN with the outer systems, for example, PSTN, ISDN, CSPDN, and PSPDN. Such interfacing may
be brought out through a passage MSC joined with a serving MSC. The capacities of a MSC incorporate the
accompanying
Paging;
• Location registration;
• Billing of subscribers (not the actual billing, but collecting the data for the billing center);
The BSC manages all the radio‐related functions of a GSM network. It is a high capacity switch that
provides functions such as MS handover, radio channel assignment and the collection of cell configuration
The maximum length of LAC is 16 bits, enabling 65,536 different location areas to be defined in one PLMN
Routing Area Code is a fixed length of 1 octet and identifies a routing area within a location area. The RAC
Co-Channel Interference
Frequency reuse - there are several cells that use the same set of frequencies
– co-channel cells
– co-channel interference
– Co-channel interference is a function of Increasing the ratio Q=D/R, the interference is reduced.
recurrence. Hence a watchful arranging of sectors and encompassing layers permitted to reuse the same
recurrence is needed. Notwithstanding sectorization (3 sectors every cell), narrower receiving wire flaps can be
utilized to further diminish the rakish sectors of the accepting radio wires so that the impedance can be spatially
separated. 2 Generally none of these measures are productive enough so that an extra activity ought to be
brought to manage the obstruction by utilizing diverse abrogation methods either as a part of time, recurrence or
spatial area.
Imperfect receiver filters allow nearby frequencies to leak into the pass band
Adjacent channel interference can be minimized through careful filtering and channel assignment.
Keep the frequency separation between each channel in a given cell as large as possible
31 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
A channel separation greater than six is needed to bring the adjacent channel interference to an acceptable
level.
CHAPTER 4:
HARDWARE
Sim900 is a complete Quad band GSM/GPRS module planned by Simcom. Offering an industry standard interface,
the Sim900 conveys GSM/GPRS 850/900/1800/1900MHz execution for voice, SMS, Data and Fax in a little form
variable and with low power utilization. Sim900 is planned as a DCE (Data Communication Equipment). It gives a
full modem serial port, which is utilized for information transmission and for sending AT commands.
The proposed project demonstrates TCP/IP communication over GPRS. It allows to connect a SIM900 based device
that is configured as client with a PC application program that acts as server.
Block diagram of the TCP client and TCP server is shown in fig:
Point-to-point MO and MT
4.1.1.3. Drivers
MUX Driver
Tricodec
Half rate (HR)
Full rate (FR)
Enhanced Full rate (EFR)
4.1.2. TEMS:
TEMS Investigation is the business standard instrument for troubleshooting, confirmation, advancement and upkeep
of remote systems. TEMS Investigation backs all real advances, making it the perfect testing instrument at each phase
of the system's life cycle. TEMS Investigation has been the main originator of drive-testing gimmicks and capacities
for two decades. It utilizes shrewd and select usefulness that tackles particular issues, advances cost-productive work
techniques, minimizes human lapses and enhances benefit, permitting administrators to concentrate on guaranteeing
system quality, and in addition pick up knowledge into the supporter point of view by performing administration
testing straightforwardly on the end terminal. TEMS Investigation is a complete, savvy and advantageously minimal
answer for the dynamic field engineer. Architect for system streamlining and inconvenience shooting yet can likewise
be utilized for benchmarking and Qos check. Adaptable apparatus that is not difficult to receive to the working
methodology. Robotized information preparing User characterized Kpis Inbuilt reporting. Great post transforming
answer for TEMS Investigation and TEMS Pocket.
Highly customizable.
Includes integrated Google earth.
Allows definition of your own KPIs.
Provides more extensive processing and reporting.
Report templates
Key Information
Sets of Point Detail configuration
Documents
Analysis Sets
View layouts
4.2. COMPONENTS:
The MAX 232 device is a dual driver/reciever that incorporates a capacitive voltage generator to supply EIA-232
voltage levels from a solitary 5v supply. The voltage level in the Rs232 transport is around 30v. Every beneficiary
proselytes EIA-232 inputs to 5v TTL/CMOS levels. These collectors have an average limit of 1.3v and a
commonplace hysteresis of 0.5 V, and can acknowledge ±30v inputs. Every driver changes over TTL/CMOS
information levels into EIA-232 levels. It is utilized as a part of battery-fueled frameworks, Terminals, modems,
computer and numerous different applications. One and only of the driver and beneficiary is used here.
4.2.1.1. DIAGRAM:
4.2.1.2. FEATURES:
Adc0804 can be interfaced with any microcontroller. You require at least 11 pins to interface Adc0804, eight for
information pins and 3 for control pins. As indicated in the common circuit the chip select pin can be made low on the
off chance that you are not utilizing the microcontroller port for some other fringe (multiplexing).
There is a universal standard to figure out how to utilize an IC. Everything you need is the datasheet of the IC you are
working with and examine the timing diagram of the IC which demonstrates to send the data, which signal to state and
at what time the signal ought to be made high or low and so forth.
ADC [FIGURE4.5]
The above timing diagrams are from Adc0804 datasheet. The primary outline demonstrates to begin a conversion.
Likewise you can see which signals are to be attested and at what time to begin a conversion. So investigating the
timing outline FIG 4.2.2(c). We note down the steps or say the request in which signals are to be declared to begin a
conversion of ADC. As we have chosen to make Chip select stick as low so we require not to fret over the CS motion
in the timing chart. Beneath steps are for beginning an ADC conversion. I am additionally including CS sign to
provide for you an agreeable picture. While programming we won't utilize this sign.
Once the conversion in ADC is carried out, the information is accessible in the yield lock of the ADC. Taking a
gander at the FIGURE 10b which demonstrates to the timing graph of best practices to peruse the changed over
quality from the yield hook of the ADC. Information of the new conversion is available for perusing after Adc0804
made INTR stick low or say when the conversion is over. The following are the steps to peruse yield from the
Adc0804.
4.2.2.3. FEATURES:
Perfect with 8080 µp subsidiaries no interfacing logic required - access time - 135 ns
Simple interface to all microchips, or works "remain solitary"
Differential analog voltage inputs
Logic inputs and outputs meet both MOS and TTL voltage level determinations
Meets expectations with 2.5v (Lm336) voltage reference
On-chip clock generator
0v to 5v analog input voltage range with single 5v supply
No zero change needed
0.3[prime] standard width 20-pin DIP bundle
20-pin formed chip bearer or little blueprint bundle
Works ratiometrically or with 5 VDC, 2.5 VDC, or analog compass balanced voltage reference.
The AVR is an adjusted Harvard structural engineering 8-bit RISC single-chip microcontroller, which was created by
Atmel in 1996. The AVR was one of the first microcontroller families to use on-chip streak memory for project
stockpiling, rather than one-time programmable ROM, EPROM, or EEPROM utilized by different microcontrollers at
the time.
Mega avr chips got to be well known after they were composed into the 8-bit Arduino stage.
The Enhanced Watchdog Timer (WDT) runs autonomous of whatever is left of the system, causing framework resets
at whatever point it times out. Notwithstanding, the application programming ought to guarantee that the timeout
never happens by resetting the WDT occasionally the length of the product is in a known sound state. In the event that
40 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
the framework hangs or system execution is adulterated, the WDT won't get its intermittent reset, and will in the end
time out and cause a framework reset. The WDT in all new AVR gadgets additionally can create hinders as opposed
to resetting the gadget. Since the WDT runs from its own autonomous clock, it can be utilized to awaken AVR from
all slumber modes. This makes it a perfect wakeup clock, effortlessly consolidated with customary operation as a
framework reset source. The hinder can likewise be utilized to get an early cautioning of a promising new Watchdog
System Reset, so that fundamental parameters can be went down to non-unstable memory.
The WDT in all new AVR gadgets additionally can produce hinders of resetting the gadget. Since the WDT runs from
its own particular autonomous clock, it can be utilized to awaken AVR from all slumber modes. This makes it a
perfect wakeup clock, effectively joined with normal operation as a framework reset source. The hinder can likewise
be utilized to get an early cautioning of a promising new Watchdog System Reset, so that imperative parameters can
be went down to non-unpredictable memory.
4.2.3.1. FEATURES:
4.2.4. DB 9 CONNECTOR:
The expression "Db9" alludes to a typical connector sort, one of the D-Subminiature or D-Sub sorts of connectors.
Db9 has the littlest "footprint" of the D-Subminiature connectors, and houses 9 pins (for the male connector) or 9 gaps
(for the female connector).
Db9 connectors were once exceptionally regular on Pcs and servers. Db9 connectors are intended to work with the
EIA/TIA 232 serial interface standard, which decided the capacity of every one of the nine pins as a standard, so that
numerous organizations could outline them into their items. Db9 connectors were usually utilized for serial fringe
gadgets like consoles, mice, joysticks, and so on. Likewise they are utilized on Db9 link congregations for information
network.
4.2.4.1. DIAGRAM:-
CHAPTER 5
SOFTWARE
START
Android SOFTWARE
Criteria of
Real Time
Data Ranges
RESULT
5.1. PARAMETERS
The call setup achievement rate is one of the key performance markers (KPI) utilized by the system administrators to
survey the performance of their systems. It is expected to have immediate impact on the consumer loyalty with the
administration gave by the system and its administrator. The call setup achievement rate is generally included,
together with other
Specialized parameters of the system, in a key performance marker known as service accessibility.
CSSR measures the proportion of call setup attempts resulting in a successful TCH.
TCH congestion
Interference and poor coverage
43 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
DCR measures the proportion of successfully established calls that are terminated abnormally.
HOSR measures the proportion of total handover attempts resulting in a successfully completed handover. The
handover success rate demonstrates the rate of success handovers of all handover endeavors. A handover endeavor is
the point at which a handover charge is sent to the portable
HOSR = HO successful x 100%
(HO successes + HO failures)
Possible reasons for the poor handover success rate could be:
Congestion
Link connection
Bad antenna installation
The MS measures signal strength of another co-or adjacent cell than presumed
Incorrect handover relations
Incorrect locating parameter setting
Bad radio coverage
High interference, co-channel or adjacent
In Eclipse
REFERENCES:
[1] Wu Jing, Yang Lu, Song Jun De Case Based Knowledge Management and Case Mining in Optimization of
GSM Network
[2]Overview of the GSM system and protocol architecture M Rahnema - Communications Magazine, IEEE, 1993 -
ieeexplore.ieee.org
[3]J Eberspächer, HJ Vögel, C Bettstetter, C Hartmann - 2001 - GSM Switching, Services and Protocols,
Second Edition
[4]A Jamalipour - John Wiely & Sons Ltd, 2003 - sutlib2.sut.ac.th The wireless mobile internet
[6] Deng Yuren. Wireless cover and network optimization. Shanxi Electronics Technology, 2005
[7] De Pasquale A, Magnani N P, Zanini P. Optimizing frequency planning in the GSM system. In: IEEE Trans. On
ICUPC’98. Florence, Italy, 1998: 293-297.
[8] Tsai V J D. Delaunay triangulations in TIN creation: An overview and a linear-time algorithm. International
Journal of Geographical Information Systems, 1993, 7(6):501-524.
[9] GSM Recommendation, 1988, (Group Speciale Mobile or Global System of Mobile Communication) European
Telecommunications Standardisation Institue.
[10] L. Hanzo, F.C.A. Somerville, J.P. Woodard: Voice and Audio Compression for Wireless Communications, John
Wiley and IEEE Press, 2007 http://wwwmobile.ecs.soton.ac.uk/newcomms/?q=research_pub_books
[11] L. Hanzo, T.H. Liew, B.L. Yeap: Turbo Coding, Turbo Equalisation and Space-Time Coding, John Wiley,
August 2002,ISBN 0-470-84726-3, 766 pages http://www-
mobile.ecs.soton.ac.uk/newcomms/?q=research_pub_books
[12] W.T. Webb, L.Hanzo : Modern Quadrature Amplitude Modulation - Principles and Applications for Fixed and
Wireless Channels (1st Ed.) ISBN: 0-7273-1701-6, 557 pages, 1994
[2.2.1]
http://www.pearsonhighered.com/samplechapter/0139491244.pdf
[2.2.2]
https://www.scribd.com/doc/5299137/jai-gsm
[2.3.1]
https://www.scribd.com/doc/5299137/jai-gsm
[2.15.1]
http://atra.gov.af/en/page/6976