You are on page 1of 48

MONITORING OF UM LAYER THROUGH DEDICATED BATCH

HARDWARE 2011

CHAPTER 1
INTRODUCTION OF PROJECT:

The task means to Monitor the execution and robotize the troubleshooting; of a cell system. The developing size of
cell systems, together with the expanding many-sided quality of the system components, makes an evident
requirement for a proficient computerized observing and Problem distinguishing proof device.
Versatile cell telecom systems are perplexing element frameworks the observing and issue ID of which in the occasion
of a flaw, presents impressive difficulties. Commonly, the system execution investigation is completed on a system on
cell premise and it is focused around the activity data got from different sensors, for example, the quantity of asked for
calls, number of dropped calls, number of handovers, and so forth. The mechanized observing and issue distinguishing
proof framework gives probability of distinctive client defined main drivers of execution corruption focused around
the watched tactile data gathered as composed information extricated from real time information. It utilizes these data
to further examine the measurable information for proficient checking of the system execution.

1.1 OVERVIEW OF THE PROJECT

1.1.1 EXECUTION ESTIMATION IN A CELLULAR NETWORK

In a cellular system, system observing is an extremely significant term to utilize. This "execution estimation" of a
system is conceivably partitioned in cell wording into two unique areas; where one arrangement with investigation of
real time information while alternate handles the dissection of factual information got from dumbs.
Consequently unequivocally, Performance estimation of a system is done in two ways:
Drive testing— Incorporates On-field investigation of information through live perception of locales introduced
Statistical Analysis— Investigation of the composed sheets of information concentrated from dumbs sheets. These
contain the important system parameters to be specific KPI's (Key Performance Indicators) that help gage system
execution either pictorially or systematically.

1.2 HOW IS PERFORMANCE MEASUREMENT ACHIEVED THROUGH OUR SOFTWARE?

By viable use of the real time data, the system execution can be streamlined further into one different spaces/client
interfaces as done through our software. gather transferred logs from sent Android phones - it produces reports
furthermore a dashboard and guide of issue focuses like call drop and call squares. It can likewise be utilized to make
test scripts, timetable tests and in addition screen each one sent phone's status.
Into one distinct domains/user interfaces as done through our software:

Each of these User Interfaces highlights network performance in one ways:


 KPI MONITOR
 Pictorially through colored thematic-KPI Monitor

1|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

1.3 THEORETICAL SUMMATION TO EXECUTION MEASUREMENT


We can focus the ordinary and anomalous conduct of GSM system on the premise of emulating parameters

KEY PERFORMANCE INDICATOR (KPI)

KPIs are established by the operator as to judge the performance of a network. KPIs which are decided by the

operator to use depend upon:

 Nature of the network

 Operator assessment of priorities for their business

 Counter implemented by vendors

KPIs are generally based on THREE sets of data:

 Network statistics from the OMC

 Drive Test (DT) statistics using test mobile equipment

The most commonly used KPIs used by BSS are:

 Call Setup Success Rate (CSSR)

 Drop Call Rate (DCR)

 Handover Success Rate (HOSR)

These KPIs decide how our system is to be evaluated on the execution scale. Consequently viable checking of

KPIs is fundamental. On the other hand, addition these, other system execution estimation apparatuses are further

utilized for affirmation of sound operation. These are picked on the premise of the quantity of locales/cells in the

system and gage the overshooting of cells, screen their recurrence task through Interference checks and guarantee

right Neighbor assignments to each one site [1]

Problem Identification (PI) in cellular systems

The recognizable proof of the main driver of issues in the system is a fundamental piece of the continuous system

operation and checking procedure. As a cell framework comprises of a few thousand components, even with very

solid Hardware not these components are continually performing in an ideal way. Moreover, in a developing
2|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
system, off and on again it is hard to control that all components interface as they are required to or that the setup

is the right one. To guarantee that the system is giving greatest execution, ceaseless Problem Identification ought

to be connected to help discover essential causes because of which the proficient execution of a system may be

hampered

3|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

CHAPTER 2
THEORETICAL BACKGROUND

GSM

2.1 THE GSM HISTORY


The establishment of GSM was laid in 1978 and the name GSM was created in 1982 around then GSM remains for
the Group Special Mobile however in 1989 GSM's name was changed to Global System for Mobile Communications.
In 1987, 13 nations were consented to situated up GSM organizes before the end of 1991. In 1990 the first GSM
frameworks are brought into test operation. Around then Gsm900 Standard and Dcs1800 Standard were received.
Before the end of 1996 there were 120gsm systems in operation and 150million clients were recorded everywhere
throughout the world with in the year2000.

The framework must take after the accompanying conditions for GSM Standard:

o provide a high discourse quality


o use of recurrence productively
o provide ISDN administration attributes
o compatibility with different methods for information transmission
o secured correspondence for clients

2.2 GSM TODAY

The conditions for GSM Standard have been transformed into points of interest:
o the normal discourse quality is more prominent than that of simple cell systems
o available frequencies are proficiently utilized
o speech encryption ensures the security models
o possibility of global wandering
o tough rivalry lessens the cost

The cell structure in GSM is situated in such a route, to the point that it gives a very nearly finish scope. It can serves
up to 35km from the base station to the versatile station in this way add up to land territory is partitioned into more
diminutive territories which are known as Cell.[2]

2.3 THE GSM-PLMN SUBSYSTEM

The worldwide GSM administration territory is subdivided into national GSM administration zones with one or a few
GSM- Plmns (Public Land Mobile Networks). A GSM-PLMN is further subdivided into a few capacities

4|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

GSM- PLMN NETWORK TO PSTN [Figure 2.1(A)]

GSM-PLMN NETWORK TO OTHER NETWORKS [Figure 2.1(B)]

2.3.1 RADIO SUBSYSTEM

Radio subsystem comprises of Base Station Subsystem (BSS) and Mobile Station (MS). BSS and MS made out of
taking after units:

5|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
o base Station Controller (BSC)
o base Transceiver Station (BTS)
o transcoding and Rate Adaption Unit (TRAU)
o local Maintenance Terminal (LMT)

RADIO SUB-SYSTEM [FIGURE 2.2]

2.3.1.1 MOBILE STATION:


The MS speaks to the versatile system segment. It comprises of the Mobile Equipment and the SIM card. The MS
comprises of the physical gear, for example, the radio handset, showcase and digital signal processors, and the SIM
card. It gives the air interface to the client in GSM systems. In that capacity, different administrations are likewise
given, which include:
 Voice teleservices
 Information bearer administrations
 The characteristics' supplementary administrations

MOBILE STATION [FIGURE 2.3]

6|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
The MS Functions:

The MS likewise gives the receptor to SMS messages, empowering the client to flip between the voice and data
utilization. Also, the versatile encourages access to voice informing frameworks. The MS likewise gives access to the
different data services accessible in a GSM system. These data services include:

 X.25 packet switching through a synchronous or nonconcurring dial-up association with the PAD at velocities
commonly at 9.6 Kbps.
 General Packet Radio Services (Gprss) utilizing either a X.25 or IP based data exchange system at velocities
up to 115 Kbps
 Rapid, circuit switch data at velocities up to 64 Kbps

What is SIM?

The SIM provides personal mobility so that the user can have access to all subscribed services irrespective of both the
location of the terminal and the use of a specific terminal. You need to insert the SIM card into another GSM cellular
phone to receive calls at that phone, make calls from that phone, or receive other subscribed services.

2.3.2 BASE STATION SUBSYSTEM:


The structural planning of BSS is intended to attain most extreme adaptability. All the segments of BSS are introduced
at an area where the transmission ways can be utilized from open systems.
The BSS has two parts:
 The Base Transceiver Station (BTS)
 The Base Station Controller (BSC)
The BTS and the BSC impart over the tagged Abis interface, empowering operations between parts that are made by
distinctive suppliers. The radio parts of a BSS may comprise of four to seven or nine cells. A BSS may have one or
more base stations. The BSS utilizes the Abis interface between the BTS and the BSC. A different rapid line (T1 or
E1) is then associated from the BSS to the Mobile MSC.

7|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

BASE STATION SUBSYSTEM [FIGURE 2.4]

2.3.2.1 The Base Transceiver Station (BTS):

The BTS houses the radio handsets that characterize a cell and handles the radio connection conventions with the MS.
In a substantial urban zone, countless may be sent.

GSM BTS [FIGURE 2.4(a)]


The BTS relates to the handsets and radio wires utilized as a part of each one cell of the system. A BTS is normally
put in the focal point of a cell. Its transmitting force characterizes the span of a cell. Every BTS has somewhere
around 1 and 16 handsets, contingent upon the thickness of clients in the cell. Every BTS serves as a solitary cell. It
likewise incorporates the accompanying capacities:

 Encoding, scrambling, multiplexing, balancing, and bolstering the RF signs to the reception apparatus
 Transcoding and rate adjustment
 Time and recurrence synchronizing
 Voice through full- or half-rate services

8|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 Interpreting, decoding, and leveling got signals
 Arbitrary access location
 Timing advances
 Uplink channel estimations

2.3.2.2 The Base Station Controller (BSC):

The BSC deals with the radio assets for one or more Btss. It handles radio channel setup, recurrence bouncing, and
handovers. The BSC is the association between the portable and the MSC. The BSC additionally deciphers the 13
Kbps voice station utilized over the radio connection to the standard 64 Kbps station utilized by the Public Switched
Telephone Network (PSDN) or ISDN. [3]

It doles out and discharges frequencies and time spaces for the MS. The BSC additionally handles intercell handover.
It controls the force transmission of the BSS and MS in its region. The capacity of the BSC is to designate the
important time spaces between the BTS and the MSC. It is a switching gadget that handles the radio assets. Extra
capacities include:

 Control of recurrence bouncing


 Performing activity focus to diminish the quantity of lines from the MSC
 Giving an interface to the Operations and Maintenance Center for the BSS
 Reallocation of frequencies among Btss
 Time and recurrence synchronization
 Power administration
 Time-delay estimations of got signs from the MS

2.3.3 NETWORK SWITCHING SUBSYSTEM:

NSS of GSM comprises of taking after practical units:


 mobile administration Switching Center (MSC)
 visitor Location Register (VLR)
 home Location Register (HLR)
 authentication Center (AC)
 equipment Identity Register (EIR)

2.3.3.1 MOBILE SERVICE SWITCHING CENTER:

MSCs unite alternate systems with the BSS and different NSS' units (VLR, HLR, ACC and EIR) with
The BSS with the assistance of a flagging interstate. It is essentially an exchanging focus that
Completes all exchanging for the versatile stations which are really placed in the MSC's territory.
9|Page SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
2.3.3.3 VISITOR LOCATION REGISTER (VLR):

VLR gives steady redesigns about the area of the MS in its controlled region. It likewise gives the client's data which
is needed by the MSC. Stores exceedingly paramount data required for the MS clients presently in the LA that is
related to the MSC. On the off chance that another MS comes into the LA then the VLR is in charge of it. The VLR
duplicates all the significant data for the MS from the HLR.

2.3.3.3 HOME LOCATION REGISTER (HLR):

It is the fundamental information base of a client. Client is just apportioned to a solitary HLR which stores the
important information. This information is send to VLR when required.
 For all clients enrolled with the system, HLR keeps client profile
 MSCs trade data with HLR
 At the point when MS registers with another GMSC, the HLR sends the client profile to the new MSC

2.3.3.4 AUTHENTICATION CENTER (AUC):

AC contains keys and calculations for a security parameter for approval, this parameter is known as Triple. Triple is
made on VLR's solicitation then it is made available to VLR. Frequently it is likewise connected with HLR.
 is gotten to by HLR to confirm a client for administration
 Contains confirmation and encryption keys for endorsers

2.3.3.5 EQUIPMENT IDENTITY REGISTER (EIR):

IMEI (International Mobile Equipment Identity), semi perpetual information base in a manifestation of code is spared
in EIR. An IMEI distinguishes the versatile gear and has the data about the spot of production, gadget sort ground
dwelling insect the serial number. EIR is utilized for checking and debilitating the cell phones if there should arise an
occurrence of robbery.

2.3.4 OPERATING SUBSYSTEM:

OSS performs operation and support errands. OMC (Operation and Maintenance Center) is mindful to perform the
capacities of OSS.

OPERATION & MAINTENANCE

 Dynamic checking and controlling of system.


 Operation and upkeep information capacity.
 Configuration administration.
10 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 Fault report and caution taking care of.
 Performance supervision

OMC SYSTEM COVERS ALL THE GSM ELEMENT [FIGURE 2.5]

The OSS is the useful element from which the system administrator screens and controls the framework. The
motivation behind OSS is to offer the client savvy help for incorporated, provincial, and nearby operational and
upkeep exercises that are needed for a GSM system. A vital capacity of OSS is to give a system outline and backing
the support exercises of distinctive operation and upkeep associations

2.4 INTERFACES AND Protocols IN GSM:

Giving voice or information transmission quality over the radio connection is just some piece of the capacity of a cell
portable system. A GSM portable can flawlessly wander broadly and universally, obliging institutionalized call
directing and area redesigning capacities in GSM systems. An open correspondences framework likewise needs robust
security systems to anticipate abuse by outsiders. Security capacities, for example, validation, encryption and the
utilization of Temporary Mobile Subscriber Identities (Tmsis) are an outright must.
Inside a GSM system, distinctive protocol is required to empower the stream of information and motioning between
distinctive GSM subsystems. [4]

11 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

INTERFACES AND PROTOCOLS OF GSM [FIGURE 2.6]

This figure shows the interfaces that link the different GSM subsystems and the protocols used to communicate on
each interface. The layers of GSM roughly follow the OSI model.

Layer 1: Physical layer


 Enables physical transmission (TDMA, FDMA, etc.)
 Assessment of channel quality
 Except on the air interface (GSM Rec. 04.04), PCM 30 or ISDN links are used (GSM Rec. 08.54 on Abis
interface and 08.04 on A to F interfaces).

Layer 2: Data link layer


 Multiplexing of one or more layer 2 connections on control/signaling channels
 Error detection (based on HDLC)
 Flow control
 Transmission quality assurance
 Routing

Layer 3: Network layer


 Connection management (air interface)
 Management of location data
 Subscriber identification
 Management of added services (SMS, call forwarding, conference calls, etc.)

12 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
2.5 ABIS INTERFACE:

The Abis interface exists in the base station subsystem (BSS) and speaks to the partitioning line between the BSC
capacity and the BTS. The BSC and BTS can be associated utilizing rented lines, radio connections or
metropolitan zone systems (Mans). Primary functions are traffic channel transmission, terrestrial channel
management, and radio channel management. Interface, Abis (most Abis interfaces are merchant particular). The
essential capacities extended this interface are activity channel transmission, physical channel administration, and
radio channel administration. This interface upholds two sorts of interchanges connections: activity channels at 64
kbps convey speech or client data for a full- or half-rate radio movement channel and signaling channels at 16
kbps convey data for BSC-BTS and BSC-MSC signaling. The BSC handles the LAPD channel signaling for each
BTS transporter. The initial three layers are focused around the accompanying OSI/ITU-T suggestions:

 Physical layer: ITU-T Recommendation G.703 and GSM Recommendation 0-8.54


 Data link layer: GSM Recommendation 08.56 (LAPD)
 Network layer: GSM Recommendation 08.58 [2.2.1]

ABIS INTERFACE TIME SLOT [FIGURE 2.7]

GSM ABIS INTERFACE PCM TIMESLOT LAYOUT

There are two sorts of messages took care of by the movement administration method a piece of the signaling
interface—straightforward and nontransparent. Straightforward messages are between the MS and BSC-MSC and
don't require investigation by the BTS. Nontransparent messages do oblige BTS examination.
The protocol utilized on the Abis interface is LAPD, which is adjusted from ISDN. LAPD gives the accompanying
frame sorts that can be isolated into three gatherings:

 The unnumbered frames (SABM, DISC, UA, DM, UI),


13 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 The information transfer frame (I)
 The supervisory frames (RR, RNR, REJ, FRMR) [2.2.2]

2.6 A INTERFACE:

The interface lies between the BSC and MSC. On the off chance that the BSC contains the transcoder supplies
(TCE), an activity channel (TCH) involves a complete 64 kbit/s timeslot in the 2 Mbit/s or 1.544 Mbit/s PCM join
(layer 1, GSM Rec. 08.04). Out of 32 accessible timeslots on the PCM join, a greatest of 30 activity channels can
be worked all the while, since no less than 2 timeslots are required for control and flagging purposes (Ts0 for
FAS/NFAS and an alternate TS for flagging, typically Ts16) on PCM offices. One flagging channel helps
numerous 64 kbit/s PCM offices between one BSC and the MSC. Ordinarily two dynamic 64 kbit/s timeslots are
utilized for this reason. The interconnection between the BTS and the BSC is through a standard.
The protocol of layer 2 and layer 3 between the BSC and MSC is focused around the Ss7 standard, however is
transmitted alongside the client data inside the PCM office. Regularly timeslot 16 (Ts16) of the 64 kbit/s frame
issued.

The accompanying protocols are utilized.

Layer 1
(GSM Rec. 08.04): 2.048 Mbit/s (ITU-T: E1) or 1.544 Mbit/s(ANSI: T1) PCM link.

Layer 2
(GSM Rec. 08.06): Here, SS7-based protocols are used for layer 2; the message transfer part
(MTP) protocol (responsible for transmission security between the BCS and MSC) and the signaling connection
control part(SCCP)protocol (allows global addressing of network elements and thus offers a service corresponding
to the ex-change layer). MTP and SCCP also perform layer 3 functions. SCCPis used to transport DTAP and base
station management application part (BSSMAP) messages on the A interface, ensuring both connection less and
connection-oriented message flows. The connections can be related to a specific MS or radio channel.

An SCCP connection can be initiated by a mobile station (MS) or an MSC. An SCCP connection can involve the
following protocols:
 .From the MS:
 MM: CM service request
 RR: Paging response
 MM: Location updating request
 MM: CM re-establishment request.
 From the MSC: Initiation of an external handover (BSSMAP: handover request).
The MSC always manages an SCCP connection.
.
Layer 3
(GSM Rec. 08.08): Contains the base station system application part (BSSAP) protocol. This layer has multiple
parts on theMSC end:

14 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 The base station management application part (BSSMAP) protocolis the counterpart to the RR protocol on
the air interface.
 The direct transfer application part (DTAP) protocol transmits CC and MM messages and is transmitted
transparently through the BTS and BSC. [3.3.1]

2.7 B INTERFACE:

The B interface exists between the MSC and the VLR. It utilizes a protocol known as the MAP/B protocol. As
most Vlrs are gathered with a MSC, this makes the interface absolutely an "inside" interface. The interface is
utilized at whatever point the MSC needs get to data in regards to a MS placed in its range.

2.8 C INTERFACE:

The C interface is found between the HLR and a GMSC or a SMS-G. At the point when a call starts from outside
the system, i.e. from the PSTN or an alternate portable system it ahs to pass through the entryway so that steering
data needed to finish the call may be picked up. The protocol utilized for correspondence is MAP/C, the letter "C"
demonstrating that the protocol is utilized for the "C" interface. Notwithstanding this, the MSC might alternatively
forward charging data to the HLR after the call is finished and cleared down.

2.9 D INTERFACE:

The D interface is arranged between the VLR and HLR. It utilizes the MAP/D protocol to trade the data identified
with the area of the ME and to the administration of the supporter.

2.10 E INTERFACE:

The E interface gives correspondence between two Mscs. The E interface trades data identified with handover
between the stay and transfer Mscs utilizing the MAP/E protocol.

2.11 F INTERFACE:

The F interface is utilized between a MSC and EIR. It utilizes the MAP/F protocol. The interchanges along this
interface are utilized to affirm the status of the IMEI of the ME getting access to the system.

2.12 G INTERFACE:

The G interface interconnects two Vlrs of distinctive Mscs and uses the MAP/G convention to exchange endorser
data, amid e.g. an area overhaul strategy.
2.13 H INTERFACE:

The H interface exists between the MSC the SMS-G. It exchanges short messages and uses the MAP/H
convention.

2.14 I INTERFACE:

The I interface can be found between the MSC and the ME. Messages traded over the I interface are transferred
straightforwardly through the BSS.

15 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

2.15 UM INTERFACE

The Radio Interface (MS to BTS) The Um radio interface (in the middle of MS and base transceiver stations [bts])
is the most critical in any portable radio framework, in that it addresses the requesting qualities of the nature's
domain.
Um is characterized in the bring down three layers of the model. The physical layer interfaces to the data link
layer and radio asset administration sublayer in the MS and BS and to other useful units in the MS and system
subsystem (which incorporates the BSS and MSC) for supporting traffic channels. The physical interface involves
a set of physical channels open through FDMA and TDMA. Every physical channel backs various intelligent
channels utilized for client traffic and flagging. The physical layer (or layer 1) backings the capacities needed for
the transmission of bit streams broadcasting live interface. Layer 1 additionally gives access capacities to upper
layers. At the physical level, most flagging messages carried on the radio way are in 23-octet squares. The data
link layer capacities are multiplexing, mistake identification and redress, flow control, and division to consider
long messages on the upper layers. The radio interface utilizes the Link Access Protocol on Dm channel.

2.15.1 FREQUENCY BANDS

International telecommunication union assigns different frequency bands for gsm providers
GSM900:
Uplink 815 – 900 MHz
Downlink 935 – 960 MHz

GSM1800:
Uplink: 1710 - 1785 MHz
Downlink: 1805 -1880 MHz

GSM1900:
Uplink: 1850 - 1910 MHz
Downlink: 1930 - 1990 MHz [2.15.1]

2.15.2 FRAMES OF UM INTERFACE

The GSM framework has a characterized GSM frame structure to empower the methodical entry of data. The
GSM frame structure secures plans for the foreordained utilization of timeslots. By building these timetables
by the utilization of a frame structure, both the versatile and the base station have the capacity convey the
voice information, as well as flagging data without the different sorts of information getting to be intermixed
and both finishes of the transmission knowing precisely what sorts of data are, no doubt transmitted.
Since radio spectrum is a restricted asset imparted by all clients, a strategy was formulated to separation the
data transfer capacity among the same number of clients as conceivable. The strategy picked by GSM is a
blending of time- and frequency division multiple accesses (TDMA/FDMA).

16 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

TIME FRAME OF UM LAYER [FIGURE 2.7]

In GSM frequency band of 25 MHz is divided into 200 KHz of smaller bands, each carry one RF carrier, this gives
125 carriers. As one carrier is used as guard channel between GSM and other frequency bands 124 carriers are useful
RF channels. This division of frequency pool is called FDMA. Now each RF carrier will have eight time slots. This
division time wise is called TDMA. Here each RF carrier frequency is shared between 8 users hence in GSM system,
the basic radio resource is a time slot with duration of about 577 microsec. As mentioned each time slot has 15/26 or
0.577ms of time duration. This time slot carries 156.25 bits which leads to bit rate of 270.833 kbps. This is explained
below in TDMA gsm frame structure. For E-GSM number of ARFCNs are 174, for DCS 1800 ARFNCs are 374.

2.15.3 Basic GSM frame structure

The fundamental component in the GSM frame structure is the frame itself. This contains the eight spaces,
each one utilized for distinctive clients inside the TDMA framework. The openings for transmission and
gathering for a given portable are balanced in time so that the versatile does not transmit and get in the
meantime.

17 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

EIGHT SLOT OF GSM FRAME STRUCTURE [FIGURE 2.8]

Frame structure is the division of characterized length of advanced data into diverse fields (data parts). A GSM
frame is 4.615 msec and it is made out of 8 time openings (numbered 0 through 7). Amid voice
correspondence, one client is commonly allocated to each one time opening inside a frame. The GSM
framework likewise consolidates frames to structure Multiframes.

BASIC FRAME OF GSM [FIGURE 2.9]

18 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
2.15.3.1 GSM MULTI FRAME:

The GSM frames are gathered together to structure multiframes and thusly it is conceivable to make a time
plan for their operation and the system can be synchronized. There are a few GSM multiframe structures:

2.15.3.1.1 TRAFFIC MULTI FRAME:

The Traffic Channel frames are composed into multiframes comprising of 26 blasts and taking 120 ms. in a
movement multiframe, 24 blasts are utilized for activity. These are numbered 0 to 11 and 13 to 24. One of
the remaining blasts is then used to oblige the SACCH, the remaining frame staying free. The real position
utilized interchanges between position 12 and 25.

2.15.3.1.2 CONTROL MULTI FRAME:

The Control Channel multi frame that contains 51 Burts and involves 235.4 ms. this dependably happens
on the signal frequency in time opening zero and it might likewise happen inside openings 2, 4 and 6 of the
guide frequency also. This multi frame is subdivided into consistent channels which are time-booked.
These legitimate channels and capacities incorporate the accompanying

 Frequency correction burst


 Synchronization burst
 Broadcast channel (BCH)
 Paging and Access Grant Channel (PACCH)
 Stand Alone Dedicated Control Channel (SDCCH)

2.15.3.2 GSM SUPER FRAME

The Control Channel multi frame that includes 51 bursts and involves 235.4 ms. this dependably happens on
the reference point frequency in time opening zero and it might likewise happen inside spaces 2, 4 and 6 of the
signal frequency too. This multi frame is subdivided into sensible channels which are time-planned. These
coherent channels and capacities incorporate the accompanying

2.15.3.3 GSM HYPER FRAME

Over this 2048 super frames (i.e. 2 to the force 11) are assembled to structure one hyper frame which rehashes
like clockwork 28 minutes 53.76 seconds. It is the biggest time interim inside the GSM frame structure.

Inside the GSM hyper frame there is a counter and each time opening has an exceptional consecutive number
including the frame number and time space number. This is utilized to keep up synchronization of the diverse
booked operations with the GSM frame structure.

19 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
2.15.4 CHANNELS IN GSM:

With a specific end goal to transmit data, we obliged the channels. Channels utilized as a part of GSM are of
two sorts: Physical Channels and Logical Channels. The physical channel is the medium over which the data is
conveyed; on account of a physical interface this would be a link. Other Channel by Physical is Logical
Channel which comprises of the data extended the physical channel. Control Channel and Traffic Channel are
further of two sorts of Logical Channel.

CHANNELS

PHYSICAL LOGICAL

GSM CHANNEL [FIGURE 2.10]

2.15.4.1 PHYSICAL CHANNELS

At the point when a MS and a BTS impart, they do so on a particular pair of radio recurrence (RF)
transporters, one for the up-connection and the other for the down join transmissions, and inside a given time
opening. This consolidation of time opening and bearer recurrence structures what is termed a physical
channel One RF channel will help eight physical channels in time spaces zero through seven. The MS on the
other hand Base Station must transmit the data identified with one call at precisely the right minute, or the
timeslot will be remembered fondly. The data conveyed in one timeslot is known as a "burst". Each
information burst, involving its assigned timeslot inside progressive TDMA casings, gives a solitary GSM
physical channel convey a differing number of logical channels between the MS and BTS.

2.15.4.2 LOGICAL CHANNELS:

The information, whether client traffic or signaling data, are mapped onto the physical channels by
characterizing various logical channels A logical channel will convey data of a particular sort and various
these channels may be consolidated before being mapped onto the same physical channel. For instance
discourse is sent on the logical channel "Traffic channel" which amid the transmission is allotted a certain
physical channel, say TS 6 on bearer 0 .The logical channels are separated into two gatherings control channels
and traffic Chanels.

There are two types of Logical Channels.


 Traffic Channel
 Control Channel
20 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

LOGICAL CHANNELS

Control Traffic Channels


Channels

BCH CCCH DCCH Half Rate Full Rate

FCCH PCH SDCCH

SCH AGCH SACCH

BCCH RACH FACCH

LOGICAL CHANNELS IN GSM [FIGURE 2.11]

 BROADCAST CHANNELS (BCCH)


 COMMON CONTROL CHANNELS (CCCH)
 DEDICATED CONTROL CHANNELS (DCCH)
 FREQUENCY CONTROL CHANNEL (FCCH)
 SYNCHRONIZATION CHANNEL (SCH)
 PAGING CHANNEL (PCH)
 ACCESS GRANT CHANNEL (AGCH)
 RANDOM ACCESS CHANNEL (RACH)
 STANDALONE DEDICATED CONROL CHANNEL (SDCCH)
 SLOW ASSOCIATED CHANNEL (SACCH)
 FAST ASSOCIATED CONROL CHANNEL (FACCH)

21 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

2.15.4.2.1 TRAFIC CHANEL:

A traffic channel (TCH) is utilized to convey speech and data traffic. Traffic channels are characterized
utilizing a 26-frame multi frame, or gathering of 26 TDMA frames. The length of a 26-frame multiframe is
120 ms, which is the way the length of a burst period is characterized (120 ms partitioned by 26 frames
partitioned by 8 burst periods for every frame). Out of the 26 frames, 24 are utilized for traffic, 1 is utilized for
the moderate related control channel (SACCH) and 1 is as of now unused (see Fig. 5). Tchs for the uplink and
downlink are divided in time by 3 burst periods, so that the portable station does not need to transmit and get
all the while, accordingly improving the electronic hardware. This system grants complex reception apparatus
duplex channels to be kept away from and in this way serves to cut force utilization. Notwithstanding these
full-rate Tchs (TCH/F, 22.8 kbit/s), half-rate Tchs (TCH/H, 11.4 kbit/s) are additionally characterized. Half-
rate Tchs twofold the limit of a framework adequately by making it conceivable to transmit two calls in a
solitary channel. In the event that a TCH/F is utilized for data correspondences, the usable data rate drops to
9.6 kbit/s (in TCH/H: max. 4.8 kbit/s) because of the upgraded security calculations. Eighth-rate Tchs are
additionally pointed out, furthermore are utilized for flagging. In the GSM Recommendations, they are called
stand-alone committed control channels (SDCCH).

2.15.4.2.2 CONTROL CHANNELS

2.15.4.2.2.1 BROADCAST CHANNELS (BCCH)

BCCH (Broadcast Control Channels)

 Downlink Only.

 Broadcast information of the serving cell (System Information).

 Transmitted on timeslot zero of BCCH carrier.

 Read only by idle mobile at least once every 30 secs.

SCH (Synchronization Channels)

 Downlink Only

 Carries information for frame synchronization.

 Contains frame number and BSIC (Base Station Identity Code).

FCCH (Frequency Correction Channels)

 Downlink Only.

 Enable MS to synchronize to the frequency


22 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

2.15.4.2.2.2 COMMON CONTROL CHANNELS (CCCH)

RACH (Random Access Channel)

 Uplink only.
 Used by the MS when making its first access to the Network.
 The reason for access could be initiation of a call or a page response.

AGCH (Access Grant Channel)

 Downlink only.
 Used for acknowledgement of the access attempt sent on RACH.
 Used by the network to assign a signaling channel upon successful decoding of access bursts.

PCH (Paging Channel)

 Downlink only.
 The network will page the MS, if there is an incoming call or a short Message.
 It contains the MS identity number, the IMSI or TMSI.

2.15.4.2.2.3 DEDICATED CONTROL CHANNELS

SDCCH (Stand-alone Dedicated Control Channel)

 Uplink and Downlink.

 Used for call setup, authentication, ciphering location update and SMS.

SACCH (Slow Associated Control Channel)

 Downlink and Uplink.

 Used to transfer signal while MS have ongoing conversation on traffic or while SDCCH is being used.

 On the forward link, the SACCH is used to send slow but regularly changing control information to each

mobile on that ARFCN, such as power control instructions and specific timing advance instructions

 The reverse SACCH carries information about the received signal strength and quality of the TCH, as well as

BCH measurement results from neighboring cells.

23 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
FACCH (Fast Associated Control Channel)

 Downlink and uplink.

 Associate with TCH only.

 It is used to send fast message like hand over message.

 Work by stealing traffic bursts.

24 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
CHAPTER 3

METHOD OF INVESTIGATION:

3.1 MYTHOLOGY

To maintain the performance of network with air interface within the threshold value, we have to monitor or to dealt

with multiple parameters like neighbor BCCH clash with the source cell to improve access procedure, proper neighbor

assignment analysis to improve quality and performance of DCR (Call drop rate) A broadcast control channel

(BCCH) is a point to multipoint, unidirectional (downlink) direct utilized as a part of the Um interface of the GSM

cell standard. The BCCH conveys a rehashing example of framework data messages that depict the identity, setup and

accessible characteristics of the base transceiver station (BTS). These messages additionally give a rundown of

absolute radio-frequency channel numbers (Arfcns) utilized by neighboring Btss. this message example is

synchronized to the BTS frame clock.

Now we are going to design and do monitoring of the key main factors that is very essential to maintain during the

call and will show all this on a screen like neighbor cell and its BSIC (Base station identification code). Information

we will monitor includes the Mobile Network Code (MNC), the Location Area Code (LAC) and a list of frequencies

used by the neighboring cells (BA: BCCH Allocation List). BCCH - Broad Cast Control Channel Hopping, BER - Bit

Error Rate, FER - Frame Error Rate, MAL - Mobile Allocate List, BSIC - Base Station Identification Code.

For this

3.2 PROCEDURE

In a cellular system, system observing is an extremely significant term to utilize. This "execution estimation" of a

system is conceivably partitioned in cell wording into two unique areas; where one arrangement with investigation

of real time information while alternate handles the dissection of factual information got from dumbs.

Procedure for the project is that a prototype will be developed to display the analysis of neighbor cell along with

the distinct values of measured parameters. In which we use different type of level sensors for calculating the

different parameters like neighbor BSIC (Base Station Identity Code),

25 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
BCCH(Broadcast Control Channel) and the Quality of the call and then we have to interface our device by using

serial interfacing circuit and then it passes through gsm modem and last but not the least we have to make the

software which will be android based for the monitoring our live stats between MS to BTS

Consequently unequivocally, Performance estimation of a system is done in two ways:

Drive testing— Incorporates On-field investigation of information through live perception of locales introduced

Statistical Analysis— Investigation of the composed sheets of information concentrated from dumbs sheets.

These contain the important system parameters to be specific KPI's (Key Performance Indicators) that help gage

system execution either pictorially or systematically.

3.3 PROJECT HIERARCHY

The Figure. 3.1 And figure 3.1 indicates our project flow chart and block diagram in an organized fashion.

PROJECT FLOW CHART [FIGURE 3.1]

KPI MONITORING

26 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

BLOCK DIAGRAM OF PROJECT [FIGURE 3.2]

3.2.1 KEY PERFORMANCE INDICATORS (KPIs)

KPIs are established by the operator as to judge the performance of a network. KPIs which are decided by the operator
to use depend upon:
 Nature of the network

27 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 Operator assessment of priorities for their business

 Counter implemented by vendors

KPIs are generally based on THREE sets of data:


 Network statistics from the OMC

 Drive Test (DT) statistics using test mobile equipment

The most commonly used KPIs used by BSS are:


 Call Setup Success Rate (CSSR)

 Drop Call Rate (DCR)

 Handover Success Rate (HOSR)

3.2.2 GEOGRAPHICAL BOUNDARIES

GEOGRAPHICAL BOUNDARIES [FIGURE 3.3]

3.2.2.1 MOBILE SWITCHING CENTER:

The MSC performs the switching capacities and directions the calls and steering methods inside GSM. All in

all, a MSC controls a few Bsss. Hence, it is in charge of activity administration and the radio scope of a

given geographic territory, the MSC zone. A GSM system may have one or more Mscs, contingent upon the

movement to be controlled. A MSC is in charge of a few capacities, for example, paging, coordination of call

setup, designation of assets, interworking with different systems, handover administration, charging,

28 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
encryption, reverberation scratching off, control, synchronization with Bsss, and others. It interfaces the

GSM PLMN with the outer systems, for example, PSTN, ISDN, CSPDN, and PSPDN. Such interfacing may

be brought out through a passage MSC joined with a serving MSC. The capacities of a MSC incorporate the

accompanying

 Paging;

• Coordination of call setup from all MSs in the MSC’s jurisdiction;

• Dynamic allocation of resources;

• Location registration;

• Handover management (especially the complex inter-MSC handovers);

• Billing of subscribers (not the actual billing, but collecting the data for the billing center);

• Encryption parameter management;

• Signaling exchange between different interfaces;

• Frequency allocation management in the whole MSC area.

3.2.2.2 BASE STATION CONTROLLER:

The BSC manages all the radio‐related functions of a GSM network. It is a high capacity switch that

provides functions such as MS handover, radio channel assignment and the collection of cell configuration

data. A number of BSCs may be controlled by each MSC.

3.2.2.3 Location Area Code (LAC):

The maximum length of LAC is 16 bits, enabling 65,536 different location areas to be defined in one PLMN

3.2.2.4 Routing Area Code(RAC):

Routing Area Code is a fixed length of 1 octet and identifies a routing area within a location area. The RAC

is part of the RAI (Routing Area Identity).

29 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
3.3 CELLULAR INTERFERENCE

INTERFERENCE IN GSM [FIGURE 3.4]

Two major cellular interference:

 Co-Channel Interference

 Adjacent Channel Interference

3.3.1 Co-Channel Interference:

Frequency reuse - there are several cells that use the same set of frequencies

– co-channel cells

– co-channel interference

To reduce co-channel interference, co-channel cell must be separated by a minimum distance.

When the size of the cell is approximately the same

– co-channel interference is independent of the transmitted power

– Co-channel interference is a function of Increasing the ratio Q=D/R, the interference is reduced.

Q is called the co-channel reuse ratio

R: Radius of the cell

D: distance to the center of the nearest co-channel cell

30 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
In cell TDMA systems co-channel obstruction is created in encompassing cells utilizing the same bearer

recurrence. Hence a watchful arranging of sectors and encompassing layers permitted to reuse the same

recurrence is needed. Notwithstanding sectorization (3 sectors every cell), narrower receiving wire flaps can be

utilized to further diminish the rakish sectors of the accepting radio wires so that the impedance can be spatially

separated. 2 Generally none of these measures are productive enough so that an extra activity ought to be

brought to manage the obstruction by utilizing diverse abrogation methods either as a part of time, recurrence or

spatial area.

3.3.2 Adjacent Interference:

Interference from adjacent in frequency to the desired signal.

 Imperfect receiver filters allow nearby frequencies to leak into the pass band

Performance degrades seriously due to near-far effect.

SIGNALS OF ADJACENT CHANNEL INTERFERENCE [FIGURE 3.5]

 Adjacent channel interference can be minimized through careful filtering and channel assignment.

 Keep the frequency separation between each channel in a given cell as large as possible
31 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 A channel separation greater than six is needed to bring the adjacent channel interference to an acceptable

level.

INTERFERENCE REDUCTION [FIGURE 3.6]

CHAPTER 4:
HARDWARE

32 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

HARDWARE BLOCK DIAGRAM [FIGURE 4.1]


4.1 MODULE:

1. GSM MODULE SIM 900


2. TEMS

4.1.1. GSM MODULE SIM 900:

Sim900 is a complete Quad band GSM/GPRS module planned by Simcom. Offering an industry standard interface,
the Sim900 conveys GSM/GPRS 850/900/1800/1900MHz execution for voice, SMS, Data and Fax in a little form
variable and with low power utilization. Sim900 is planned as a DCE (Data Communication Equipment). It gives a
full modem serial port, which is utilized for information transmission and for sending AT commands.

 Sim900 is outlined with an effective single-chip processor incorporating AMR926EJ-S core.


 Quad - band GSM/GPRS module with a size of 24mmx24mmx3mm.
 SMT sort suit for client application.
 An implanted Powerful TCP/IP convention stack.

33 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 Based upon full grown and field-demonstrated stage, went down by our backing administration, from definition
to plan and generation.

The SIM900 is integrated with the TCP/IP protocol; extended TCP/IP AT


Commands are developed for customers to use the TCP/IP protocol easily, which is very useful for those data transfer
applications.

The following demonstration projects are developed based on SIM900 module:

1) Sending and receiving SMS.


2) Voice calls.
3) TCP/IP communication over GPRS.

4.1.1.1. TCP/IP communication over GPRS:

The proposed project demonstrates TCP/IP communication over GPRS. It allows to connect a SIM900 based device
that is configured as client with a PC application program that acts as server.
Block diagram of the TCP client and TCP server is shown in fig:

BLOCK DIAGRAM OF TCP CLIENT AND TCP SERVER [FIGURE 4.2]

4.1.1.2. Specifications for SMS via GSM / GPRS:

 Point-to-point MO and MT

 SMS cell broadcast

 Text and PDU mode


34 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

4.1.1.3. Drivers

 MUX Driver

4.1.1.4. Specifications for voice

 Tricodec
 Half rate (HR)
 Full rate (FR)
 Enhanced Full rate (EFR)

4.1.1.5. PIN DIAGRAM:

PIN DIAGRAM OF GSM MODULE [FIGURE


4.3]

35 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

4.1.2. TEMS:

TEMS Investigation is the business standard instrument for troubleshooting, confirmation, advancement and upkeep
of remote systems. TEMS Investigation backs all real advances, making it the perfect testing instrument at each phase
of the system's life cycle. TEMS Investigation has been the main originator of drive-testing gimmicks and capacities
for two decades. It utilizes shrewd and select usefulness that tackles particular issues, advances cost-productive work
techniques, minimizes human lapses and enhances benefit, permitting administrators to concentrate on guaranteeing
system quality, and in addition pick up knowledge into the supporter point of view by performing administration
testing straightforwardly on the end terminal. TEMS Investigation is a complete, savvy and advantageously minimal
answer for the dynamic field engineer. Architect for system streamlining and inconvenience shooting yet can likewise
be utilized for benchmarking and Qos check. Adaptable apparatus that is not difficult to receive to the working
methodology. Robotized information preparing User characterized Kpis Inbuilt reporting. Great post transforming
answer for TEMS Investigation and TEMS Pocket.

 Highly customizable.
 Includes integrated Google earth.
 Allows definition of your own KPIs.
 Provides more extensive processing and reporting.

4.1.2.1. TEMS DISCOVERY DIFFERENTIATORS

 Flexible user interface


 Multiple sub-views for easy side-by-side comparison
 Metric correlation

4.1.2.1(A) completely customizable:

 Report templates
 Key Information
 Sets of Point Detail configuration
 Documents
 Analysis Sets
 View layouts

4.1.2.2. DATA ORGANIZATION AND MANAGEMENT

 Each raw test file only needs to be processed once


 Processed data provides highly organized information
 Data is instantly accessible
 Unlimited number of composite data sets
 Incremental merging of new data with existing data
36 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
 Data can be shared across the organization
 Old data can be easily archived (and restored if needed).
 Projects organized in Private and Public folders
 Each project may contain Datasets, Composite datasets, and Archives
 Each Dataset contains log file data easily organized by operator, device, IMSI, processing date, etc

4.1.2.3. VERSATILE DATA BINNING:-

 Time binning during data import


 Frame level resolution
 Smart selection - No binning for event-triggered messages - Binning for periodical messages
 Geo-binning
 Distance binning
 Grid binning
 Per-region mixed resolution (for example, fine resolution in dense urban areas and coarse resolution in rural
area)
 Holes within regions

4.2. COMPONENTS:

4.2.1. MAX 232:

The MAX 232 device is a dual driver/reciever that incorporates a capacitive voltage generator to supply EIA-232
voltage levels from a solitary 5v supply. The voltage level in the Rs232 transport is around 30v. Every beneficiary
proselytes EIA-232 inputs to 5v TTL/CMOS levels. These collectors have an average limit of 1.3v and a
commonplace hysteresis of 0.5 V, and can acknowledge ±30v inputs. Every driver changes over TTL/CMOS
information levels into EIA-232 levels. It is utilized as a part of battery-fueled frameworks, Terminals, modems,
computer and numerous different applications. One and only of the driver and beneficiary is used here.

4.2.1.1. DIAGRAM:

37 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

PIN DIAGRAM OF MAX 232 [FIGURE 4.4]

4.2.1.2. FEATURES:

 In line with all the specialized standard RS-232c.


 Just obliges a solitary 5v force supply.
 Chip accuse pump of a boost, voltage, polarity inversion capacity to create 10v and-10v voltage V.
 Low power utilization, the run of the mill supply present of 5ma.
 The internal integration of two RS-232c drivers.
 The internal integration of the two RS-232c receivers.

4.2.2. ADC 0804:

Adc0804 can be interfaced with any microcontroller. You require at least 11 pins to interface Adc0804, eight for
information pins and 3 for control pins. As indicated in the common circuit the chip select pin can be made low on the
off chance that you are not utilizing the microcontroller port for some other fringe (multiplexing).
There is a universal standard to figure out how to utilize an IC. Everything you need is the datasheet of the IC you are
working with and examine the timing diagram of the IC which demonstrates to send the data, which signal to state and
at what time the signal ought to be made high or low and so forth.

ADC [FIGURE4.5]

38 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

4.2.2.2. PIN DIAGRAM:

PIN CONFIGURATION OF ADC 0804 [FIGURE 4.6]

START CONVERSATION OF ADC [FIGURE 4.7]

OUTPUT ENABLE AND RESET INTR [FIGURE 4.8]

The above timing diagrams are from Adc0804 datasheet. The primary outline demonstrates to begin a conversion.
Likewise you can see which signals are to be attested and at what time to begin a conversion. So investigating the
timing outline FIG 4.2.2(c). We note down the steps or say the request in which signals are to be declared to begin a
conversion of ADC. As we have chosen to make Chip select stick as low so we require not to fret over the CS motion
in the timing chart. Beneath steps are for beginning an ADC conversion. I am additionally including CS sign to
provide for you an agreeable picture. While programming we won't utilize this sign.

39 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

1. Make chip select (CS) flag low.


2. Make write (WR) flag low.
3. Make chip select (CS) high.
4. Sit tight for INTR pin to go low (means conversion closes).

Once the conversion in ADC is carried out, the information is accessible in the yield lock of the ADC. Taking a
gander at the FIGURE 10b which demonstrates to the timing graph of best practices to peruse the changed over
quality from the yield hook of the ADC. Information of the new conversion is available for perusing after Adc0804
made INTR stick low or say when the conversion is over. The following are the steps to peruse yield from the
Adc0804.

1. Make chip select (CS) stick low.


2. Make read (RD) flag low.
3. Perused the information from port where ADC is joined.
4. Make read (RD) flag high.
5. Make chip select (CS) high.

4.2.2.3. FEATURES:

 Perfect with 8080 µp subsidiaries no interfacing logic required - access time - 135 ns
 Simple interface to all microchips, or works "remain solitary"
 Differential analog voltage inputs
 Logic inputs and outputs meet both MOS and TTL voltage level determinations
 Meets expectations with 2.5v (Lm336) voltage reference
 On-chip clock generator
 0v to 5v analog input voltage range with single 5v supply
 No zero change needed
 0.3[prime] standard width 20-pin DIP bundle
 20-pin formed chip bearer or little blueprint bundle
 Works ratiometrically or with 5 VDC, 2.5 VDC, or analog compass balanced voltage reference.

4.2.3. AVR mega AT-132:-

The AVR is an adjusted Harvard structural engineering 8-bit RISC single-chip microcontroller, which was created by
Atmel in 1996. The AVR was one of the first microcontroller families to use on-chip streak memory for project
stockpiling, rather than one-time programmable ROM, EPROM, or EEPROM utilized by different microcontrollers at
the time.

Mega avr chips got to be well known after they were composed into the 8-bit Arduino stage.

The Enhanced Watchdog Timer (WDT) runs autonomous of whatever is left of the system, causing framework resets
at whatever point it times out. Notwithstanding, the application programming ought to guarantee that the timeout
never happens by resetting the WDT occasionally the length of the product is in a known sound state. In the event that
40 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
the framework hangs or system execution is adulterated, the WDT won't get its intermittent reset, and will in the end
time out and cause a framework reset. The WDT in all new AVR gadgets additionally can create hinders as opposed
to resetting the gadget. Since the WDT runs from its own autonomous clock, it can be utilized to awaken AVR from
all slumber modes. This makes it a perfect wakeup clock, effortlessly consolidated with customary operation as a
framework reset source. The hinder can likewise be utilized to get an early cautioning of a promising new Watchdog
System Reset, so that fundamental parameters can be went down to non-unstable memory.

The WDT in all new AVR gadgets additionally can produce hinders of resetting the gadget. Since the WDT runs from
its own particular autonomous clock, it can be utilized to awaken AVR from all slumber modes. This makes it a
perfect wakeup clock, effectively joined with normal operation as a framework reset source. The hinder can likewise
be utilized to get an early cautioning of a promising new Watchdog System Reset, so that imperative parameters can
be went down to non-unpredictable memory.

4.2.3.1. FEATURES:

 Watchdog System Reset Source


 parameter Backup Prior to
 Watchdog System Reset
 wakeup Timer from all Sleep Modes
 using the Watchdog for Both Wakeup and System Reset
 handling the Watchdog Reset Flag
 changing the Watchdog Configuration
 flowcharts for Watchdog Operation
 example Source Code

4.2.4. DB 9 CONNECTOR:

The expression "Db9" alludes to a typical connector sort, one of the D-Subminiature or D-Sub sorts of connectors.
Db9 has the littlest "footprint" of the D-Subminiature connectors, and houses 9 pins (for the male connector) or 9 gaps
(for the female connector).

Db9 connectors were once exceptionally regular on Pcs and servers. Db9 connectors are intended to work with the
EIA/TIA 232 serial interface standard, which decided the capacity of every one of the nine pins as a standard, so that
numerous organizations could outline them into their items. Db9 connectors were usually utilized for serial fringe
gadgets like consoles, mice, joysticks, and so on. Likewise they are utilized on Db9 link congregations for information
network.

4.2.4.1. DIAGRAM:-

41 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

DB-9 CONNECTOR [FIGURE 4.9]

CHAPTER 5
SOFTWARE

START

KPI (ON REAL


TIME)
CSSR, HOSR & DCR,
BCCH, ARFCN, BER,
FER, MAL, BSIC

Android SOFTWARE

Calculate Values of Parameters:


CSSR = Call Successful * 100
Call Attempts
DCR = Dropped call * 100
Call Successful
HOSR= Successful Handovers * 100
Handover failure + Handover
Successful

42 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

Criteria of
Real Time
Data Ranges

BAD GOOD AVERAGE

RESULT

SOFTWARE FLOW DIAGRAM [FIGURE 5.1]

5.1. PARAMETERS

The most regularly utilized Kpis utilized by BSS are:


o call Setup Success Rate (CSSR)
o drop Call Rate (DCR)
o handover Success rate (HOSR)
o
5.1.1. CALL SETUP SUCCESS RATE:

The call setup achievement rate is one of the key performance markers (KPI) utilized by the system administrators to
survey the performance of their systems. It is expected to have immediate impact on the consumer loyalty with the
administration gave by the system and its administrator. The call setup achievement rate is generally included,
together with other

Specialized parameters of the system, in a key performance marker known as service accessibility.

CSSR measures the proportion of call setup attempts resulting in a successful TCH.

Call Setup Success Rate = Call successful x100%


Call attempt
Reasons for low call setup success rate could be:

 TCH congestion
 Interference and poor coverage
43 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

5.1.2. DROP CALL RATE:

DCR measures the proportion of successfully established calls that are terminated abnormally.

DCR = Call drop x 100


Call successful

Possible reasons for TCH Drop Call Rate could be:

 Low signal strength on down or uplink


 Lack of best server
 Congestion in neighboring cells
 Battery flaw
 Poor quality on down or uplink
 Too high timing advance
 Antenna problems
 Low BTS output power
 Missing neighboring cell definitions
 Unsuccessful outgoing handover
 Unsuccessful incoming handover

5.1.3. HANDOVER SUCCESS RATE:

HOSR measures the proportion of total handover attempts resulting in a successfully completed handover. The
handover success rate demonstrates the rate of success handovers of all handover endeavors. A handover endeavor is
the point at which a handover charge is sent to the portable
HOSR = HO successful x 100%
(HO successes + HO failures)

Possible reasons for the poor handover success rate could be:

 Congestion
 Link connection
 Bad antenna installation
 The MS measures signal strength of another co-or adjacent cell than presumed
 Incorrect handover relations
 Incorrect locating parameter setting
 Bad radio coverage
 High interference, co-channel or adjacent

5.2. ECLIPSE ANDROID:


44 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

5.2.1. The Android system:

 An open source stage for portable, implanted and wearable gadgets


 Google is the guideline maintainer
 Different organizations help the framework.
 Every gadget producer can tweak Android to suit their needs.

5.2.2. Android versioning

Pla form version


 KitKat
 Jellybean MR2
Framework API level
 SDK compatibility
 Each platform version has an API level
NDK API level
 API level for native headers

In Eclipse

File -> New -> Android Application project

NEW ANDROID APPLICATION WINDOW [FIGURE 5.2]


45 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY
MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

NEW ANDROID APPLICATION WINDOW 2 [FIGURE 5.3]

JAVA ECLIPSE WINDOW [FIGURE 5.4]

46 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011

IMPORT PROJECT WINDOW [FIGURE 5.5]

REFERENCES:
[1] Wu Jing, Yang Lu, Song Jun De Case Based Knowledge Management and Case Mining in Optimization of
GSM Network

[2]Overview of the GSM system and protocol architecture M Rahnema - Communications Magazine, IEEE, 1993 -
ieeexplore.ieee.org

[3]J Eberspächer, HJ Vögel, C Bettstetter, C Hartmann - 2001 - GSM Switching, Services and Protocols,
Second Edition

[4]A Jamalipour - John Wiely & Sons Ltd, 2003 - sutlib2.sut.ac.th The wireless mobile internet

47 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY


MONITORING OF UM LAYER THROUGH DEDICATED BATCH
HARDWARE 2011
[5]A secure communication architecture for GSM networks CC Lo, YJ Chen - … and Signal Processing, 1999 IEEE
Pacific …, 1999 - ieeexplore.ieee.org

[6] Deng Yuren. Wireless cover and network optimization. Shanxi Electronics Technology, 2005

[7] De Pasquale A, Magnani N P, Zanini P. Optimizing frequency planning in the GSM system. In: IEEE Trans. On
ICUPC’98. Florence, Italy, 1998: 293-297.

[8] Tsai V J D. Delaunay triangulations in TIN creation: An overview and a linear-time algorithm. International
Journal of Geographical Information Systems, 1993, 7(6):501-524.

[9] GSM Recommendation, 1988, (Group Speciale Mobile or Global System of Mobile Communication) European
Telecommunications Standardisation Institue.

[10] L. Hanzo, F.C.A. Somerville, J.P. Woodard: Voice and Audio Compression for Wireless Communications, John
Wiley and IEEE Press, 2007 http://wwwmobile.ecs.soton.ac.uk/newcomms/?q=research_pub_books

[11] L. Hanzo, T.H. Liew, B.L. Yeap: Turbo Coding, Turbo Equalisation and Space-Time Coding, John Wiley,
August 2002,ISBN 0-470-84726-3, 766 pages http://www-
mobile.ecs.soton.ac.uk/newcomms/?q=research_pub_books

[12] W.T. Webb, L.Hanzo : Modern Quadrature Amplitude Modulation - Principles and Applications for Fixed and
Wireless Channels (1st Ed.) ISBN: 0-7273-1701-6, 557 pages, 1994
[2.2.1]
http://www.pearsonhighered.com/samplechapter/0139491244.pdf
[2.2.2]
https://www.scribd.com/doc/5299137/jai-gsm
[2.3.1]
https://www.scribd.com/doc/5299137/jai-gsm
[2.15.1]
http://atra.gov.af/en/page/6976

48 | P a g e SIR SYED UNIVERSITY OF ENGINEERING AND TECHNOLOGY

You might also like