6. gprs protocol structure for data transfer and 7. gprs...

43
GPRS – Transmission Planes Page 63 Rohde & Schwarz Trainingscenter, V 2.0 6. GPRS Protocol Structure for Data Transfer and 7. GPRS-Protocol Structure for Signalling Signalling is the expression used in the telecommunication area for the comprehension between machines and the inter-computer communication. Signalling is not part of the communication, rather it supports and controls the traffic flow. Sometimes, the signalling of one network element has to be transferred into another format and has to be conveyed over a long distance. This is also the task of the signalling part in the network. GSM as well as GPRS uses a certain structure of protocols for signalling. But in GPRS a second protocol structure is now necessary, that covers the tasks of data transfer. As we can see, GSM only consists of a protocol structure for signalling, the so-called signalling planes, but GPRS consists of both, signalling planes and transmission planes for data transport. In GSM these transmission planes were not necessary, because we had circuit switched traffic, comparable to an electrical circuit, which closes an physical connection between two endpoints using a switch at the beginning and keeps it established for the length of the communication. Picture: GSM Signalling Planes, GPRS Signalling and Transmission Planes Control Communication Control packet data transport Transport packet data GSM GPRS GPRS Transmission Planes MAC GSM RF RLC LLC SND CP IP/ X.25 MAC GSM RF RLC FR L1bis BSS GP Relay FR L1bis BSS GP LLC SND CP L1 L2 L2 IP IP UDP / TCP UDP / TCP GTP GTP Relay IP/ X.25 MS BSS SGSN GGSN Um Gb Gn Gi L1 L2‘ IP/ X.25 L1‘ Relay L2‘ IP/ X.25 L1‘ L2‘ IP/ X.25 L1‘ Relay Application/ Higher level protocols Rou- ter GSM-Signalling LAPDm TDMA FDMA LAPDm G.703 G.705 G.732 LAPD G.703 G.705 G.732 LAPD MTP’ RR MM CM BTSM SCCP MTP’ MTP SCCP SCCP DTAP MM CM TCAP ISDN UP TDMA FDMA RR’ DTAP RR BSS MAP BSS MAP BTSM MAP Um Abis A B,C,E,F GSM specific sigalling ISDN specific signalling MS BTS BSC MSC BSSGP GMM/SM LLC RLC MAC GSM RF GMM/SM LLC BSSGP L1bis Um Gb MS BSS SGSN Network Service RLC MAC GSM RF L1bis Network Service Relay GPRS Signalling Planes between MS and SGSN Communication between network elements (machines) Transport packet data between network elements Communication between network elements (machines)

Upload: duonglien

Post on 07-Feb-2018

251 views

Category:

Documents


2 download

TRANSCRIPT

GPRS – Transmission Planes Page 63

Rohde & Schwarz Trainingscenter, V 2.0

6. GPRS Protocol Structure for Data Transfer and7. GPRS-Protocol Structure for Signalling

Signalling is the expression used in the telecommunication area for thecomprehension between machines and the inter-computer communication. Signallingis not part of the communication, rather it supports and controls the traffic flow.Sometimes, the signalling of one network element has to be transferred into anotherformat and has to be conveyed over a long distance. This is also the task of thesignalling part in the network. GSM as well as GPRS uses a certain structure ofprotocols for signalling. But in GPRS a second protocol structure is now necessary,that covers the tasks of data transfer. As we can see, GSM only consists of aprotocol structure for signalling, the so-called signalling planes, but GPRS consists ofboth, signalling planes and transmission planes for data transport. In GSM thesetransmission planes were not necessary, because we had circuit switched traffic,comparable to an electrical circuit, which closes an physical connection between twoendpoints using a switch at the beginning and keeps it established for the length ofthe communication.

Picture: GSM Signalling Planes, GPRS Signalling and Transmission Planes

•Control Communication •Control packet data transport •Transport packet data

GSM GPRS

GPRS Transmission Planes

MAC

GSMRF

RLC

LLC

SNDCP

IP/X.25

MAC

GSMR F

RLC

FR

L1bis

BSSG P

Relay

FR

L1bis

BSSGP

LLC

S N DCP

L1

L2 L2

IP IP

UDP /TCP

UDP /TCP

GTP GTPRelay

IP/X.25

MS BSS SGSN GGSNUm Gb Gn Gi

L1

L2‘

IP/ X.25

L1‘

Relay

L2 ‘

IP/ X.25

L1 ‘

L2‘

IP/ X.25

L1‘

Relay

Application/ Higher level protocols

Rou-ter

GSM-Signalling

LAPDm

TDMAFDMA

LAPDm

G.703G.705G.732

LAPD

G.703G.705G.732

LAPDMTP’

RR

M M

CM

BTSM SCCP

MTP’ MTP

SCCPSCCP

DTAP

MM

CM

TCAP

ISDNUP

TDMAFDMA

RR’

DTAPRRBSSMAP

BSSMAP

BTSM

MAP

Um Abis A

B,C,E,FGSM specific sigallingISDN specific

signalling

MSBTS BSC

MSC

BSSGP

GMM/SM

LLC

RLC

MAC

GSM RF

GMM/SM

LLC

BSSGP

L1bis

Um Gb MS BSS SGSN

Network Service

RLC

MAC

GSM RF L1bis

Network Service

Relay

GPRS Signalling Planes between MS and SGSN

•Communication between network elements (machines)

•Transport packet databetween network elements

•Communication between network elements (machines)

GPRS – Transmission Planes Page 64

Rohde & Schwarz Trainingscenter, V 2.0

6. GPRS-Transmission Planes

In contrast to the circuit switched GSM, GPRS deals with packet data. This requires acomplete new protocol structure that is able to convey packet data units. Some ofthese protocols are also used in existing packet data networks.GPRS carries out the connection between internet and mobile communication, itprovides a direct link between the mobile communication network and an externalpacket data network. Now there is the task to transfer the packet data networkprotocols and to adapt them to the transport over a radio communication network. Inpractice, this means, the mobile communication network has to learn the internetprotocol, IP.

The first picture clarifies this aspect further. The user of the GPRS network only seesthe interface or connection points between Mobile Station and the packet datanetwork. In the first step, we consider the complete transmission plane structure,without any details. The complete GPRS network is seen as a black box thatconnects the mobile station to the packet data network.

Picture: Connection of a Mobile Station to an external packet data network

Gi -Interface

Air-Interface

GPRS-Network

Mobile Station

Packet Data Network

GPRS – Transmission Planes Page 65

Rohde & Schwarz Trainingscenter, V 2.0

The next contemplation step illuminates the GPRS-network a little bit more in detail.Some protocols have to be defined for the communication between networkelements. GPRS distinguishes between the use of transmission protocols betweennetwork nodes and transmission protocols between network nodes over the airinterface. Also we can see a clear separation between lower layer protocols for theair interface and protocols between network elements, which are independent of thelower layers, e.g. the air interface protocols. The presented picture shows this effect,the higher layer protocols are not influenced by the lower layer Base StationSubsystem BSS.

Picture: Symbolic Protocol Structure in GPRS

Protocol Groups of the symbolic protocol structure:

1. Node to node protocols between 2 network nodes. Defined for the datatransport and signalling between 2 network nodes.

2. Network transmitting protocols form the interface below the application aswell as the interface between the external network and the MobileStation.

3. Application based protocols defining the interface between the applicationat the subscriber side and the external network. This could be forexample the Internet Protocol used between a network browser on amobile desktop and the database on an internet server. These protocolsare out of the scope of the GPRS Specifications.

4. Switching system protocols between the mobile station and the switchingnode control the data transfer between the network switching node andthe user terminal. This layer is the lowest switching layer in the switchingsubsystem.

5. Protocols for the air interface. These protocols ensure the data transportover the air interface and through this the mobility of the subscriber.

Application based protocol

Network transmitting protocol

Switching System protocols

Node to node protocols

GGSNSGSNBSSMS

GPRS – Transmission Planes Page 66

Rohde & Schwarz Trainingscenter, V 2.0

This symbolic protocol structure can be regained in the next picture, describing thewhole transmission planes used in GPRS:

Picture: GPRS Transmission Planes

GPRS Transmission Planes

MAC

GSMRF

RLC

LLC

SNDCP

IP/X.25

MAC

GSMRF

RLC

FR

L1bis

BSSGP

Relay

FR

L1bis

BSSGP

LLC

SNDCP

L1

L2 L2

IP IP

UDP /TCP

UDP /TCP

GTP GTPRelay

IP/ X.25

MS BSS SGSN GGSNUm Gb Gn Gi

L1

BSSGP: BSS GPRS Protocol LLC: Logical Link Control SNDCP : SubNetwork DependentFR: Frame Relayl MAC: Medium Access Control Convergence ProtocolGTP: GPRS Tunnelling Protocol RLC: Radio Link Control TCP: Transmission Control Protocol IP: Internet Protocol UDP: User Datagram Protocol

L2‘

IP/ X.25

L1‘

Relay

L2‘

IP/ X.25

L1‘

L2‘

IP/ X.25

L1‘

Relay

Application/ Higher level protocols

Rou-ter

GPRS – Transmission Planes Page 67

Rohde & Schwarz Trainingscenter, V 2.0

6.1. General Tasks of Protocols

Before the detailed contemplation of protocols, some general tasks shall bepresented.

Protocols are ensuring the interoperability between certain protocol layer in the OSI-Modell and between some switching nodes in the NSS. Below some of the generaltasks of protocols are described, though for the moment not concerning the concreterealisation:

• Ciphering is the establishment of a secure point-to-point connection that protectsagainst eavesdropping. One possibility to realise this feature is the ciphering orcombination of the raw data with a secret key, at the sending and receiving side.

• Segmentation refers to the segmentation of data in smaller units to be adapted tothe size of the transportation way.

• Concatenation is the opposite of segmentation at the receiver side. The data isconcatenated to the original size. Concatenation means reassemble in the rightorder.

• Error Correction: This feature protects data against possible errors on thetransmitting channel. The receiver detects errors and corrects them. Hereby wehave to distinguish between error detection and error correction.

• Flow Control establishes a communication between transmitting peer andreceiving peer. This enables the receiver to notify the sending side how manydata packets can be transmitted until the next message. Due to this feature thedata flow between receiver and transmitter can be controlled.

• Multiplexing means the distributing of the data on to different physical channels.

• Routing is the combination of the transmitting data with an address information ofthe destination.

• Encapsulation is the combination of the transported data with the information oflower layer protocols.

• Connection oriented is the referencing of the transmitted packets with asequence number. Thus they can be delivered in the right order.

GPRS – Transmission Planes Page 68

Rohde & Schwarz Trainingscenter, V 2.0

6.2. Transmission Planes GGSN-SGSN

The following picture shows the transmission planes, used for data transfer betweentwo GPRS Support Nodes GSN.

G S N Transmission and Signalling Planes

L 1

L 2 L 2

IP IP

U D P /TCP

U D P /T C P

GTP GTP

IP / X.25

SGSN G G S NG n G i

L 1

GTP: GPRS Tunnel l ing Protocol T C P : Transmission Control Protocol

IP : Internet Protocol

U D P: User Datagram Protocol

L2‘

IP / X .25

L1‘

Relay

L 2 ‘

IP / X.25

L 1 ‘

Rou-ter

Relay

L1: Physical layer

L2: Data Link Layer

L1‘ : Physical layer

L2‘ : Data Link Layer

IP / X.25: Protocol between the application-side, i.e. the protocol used for datatransfer in the external PDN and the GGSN, that forms the gateway into the GPRSnetwork. The external protocols supported by the GPRS network are the 2 protocolsIP and X.25. Other protocols can be adapted by negotiation between the operators ofGPRS and the PDN. The data handed out from the PDN is conveyed through theGPRS in a way, that they appear unmodified at the output. The application above thisprotocol is on the application side and lies out of the scope of GPRS.

GTP, GPRS Tunnelling Protocol: This protocol tunnels user data and signallingbetween GPRS Support Nodes in the GPRS backbone network. Tunnelling meansthat the data is not influenced by lower layer protocols. All PDP PDUs areencapsulated by the GPRS Tunnelling Protocol. GTP is used for data transport andfor signalling information between two GSN’s. At this part of the documentation, werefer only to the data transfer feature of GTP. How signalling is transferred isexplained in the block about signalling.

GPRS – Transmission Planes Page 69

Rohde & Schwarz Trainingscenter, V 2.0

In the case of data transport, GTP makes use of the tunnelling mechanism, whichtransports data between two endpoints. Which way the data packets are conveyed isdepending from the application. This determines for example reliable data transfer ornot.

Picture: Transmission Plane – Protocol structure

The GTP protocol is embedded between the protocol at the application side and thepath-protocol at the transport side. Incoming data units are encapsulated into the 20octets long protocol header as presented in the picture below. The different fieldshave different contents, depending if the tunnel, built with the GTP conveys data orsignalling information. The GTP header structure is the following:

Bits

Octets 8 7 6 5 4 3 2 1

1 Version PT Spare ‘ 1 1 1 ‘ SNN

2 Message Type

3-4 Length

5-6 Sequence Number

7-8 Flow Label

9 SNDCP N-PDULLC Number

10 Spare ‘ 1 1 1 1 1 1 1 1 ‘

11 Spare ‘ 1 1 1 1 1 1 1 1 ‘

12 Spare ‘ 1 1 1 1 1 1 1 1 ‘

13-20 TID

Picture: GTP-Header Structure

GSN Gn, Gp GSN

End user prot.

GTP

Path Protocol

End user prot.

GTP

Path Protocol

GPRS – Transmission Planes Page 70

Rohde & Schwarz Trainingscenter, V 2.0

Important for data transfer are the following fields in the protocol header:

Message Type: Indicates the type of the GTP message. In our case at the moment,we do not transmit signalling commands from one GSN to the other, we wantto convey user data. Message Type = 255 (decimal) indicates, that thecontent of the data unit is no command but user data.

Sequence number: The sequence number is a transaction identity to reference thetunnelled data unit. This is an increasing sequence number.

TID: Tunnel Identifier, points out the used tunnel for data transport. It is used todistinguish for example between MM messages and PDP context data. TheTID consists of the IMSI-number and the NSAPI, pointing out the accesspoint of the current application. Furthermore, it describes the two points ofthe communication: Subscriber and access point to the PDN.

Transmission Control Protocol, TCP and User Datagram Protocol, UDP:

The two protocols, Transmission Control Protocol and User Datagram Protocol areused to convey data between 2 network nodes. TCP guarantees a reliable link, UDPdoes not. Features of TCP are the in-order-delivery of the transmitted data and theprovision of a reliable link due to acknowledged data transfer. Errors during thetransmission are corrected.

Picture: Use of TCP or UDP

TCP TCP

UDP UDP

GSN

GSN GSN

GSN

Transmitting GSN Receiving GSN

Reliable Link•In-order delivery•Acknowledged transfer

Non-Reliable Link•No In-order delivery guaranteed•No Acknowledged transfer

GPRS – Transmission Planes Page 71

Rohde & Schwarz Trainingscenter, V 2.0

Transmission Control Protocol, TCP:The Transmission Control Protocol, TCP delivers the transmitted data packets in theright order to the receiver and guarantees a reliable link due to acknowledged datatransfer. Errors are corrected with retransmission.

Features of TCP:

• Layered hierarchy: TCP is defined for the use in a Layer-Model, it providesinterfaces to lower as well as higher protocol layers to communicate to them.

• Connection-oriented: TCP is connection-oriented. The incoming data units arecombined with a reference or sequence number before transmitting. In advance ofthe data transmission, a connection to the receiver side is established.

• Basic Data Transfer: TCP provides data transfer, is able to segment a continuousdata stream and to hand it out to lower layer protocols. These lower layerprotocols, e.g. the Internet Protocol, IP are ordered to transmit the received datato the IP-address peer of the receiver.

• Reliability: The TCP must recover data that is damaged, lost, duplicated ordelivered out of order by the internet communication system. This is achieved byassigning a sequence number to each octet transmitted, and requiring a positiveacknowledgement (ACK) from the receiving TCP. If the ACK is not receivedwithin a timeout interval, the data is retransmitted. At the receiver, the sequencenumbers are used to correctly order segments that may be received out of orderand to eliminate duplicates. Damage is handled by adding a checksum to eachsegment transmitted, checking it at the receiver, and discarding damagedsegments. This requires the buffering of the outgoing data until the receipt isconfirmed.

• Flow Control: TCP provides a means for the receiver to govern the amount ofdata sent by the sender. This is achieved by returning a "window" with every ACKindicating a range of acceptable sequence numbers beyond the last segmentsuccessfully received. The window indicates an allowed number of octets that thesender may transmit before receiving further permission.

• Multiplexing, To allow for many processes within a single Host to use TCPcommunication facilities simultaneously, the TCP provides a set of addresses orports within each host.

• Connections: The reliability and flow control mechanisms described above requirethat TCPs initialize and maintain certain status information for each data stream.The combination of this information, including sockets, sequence numbers, andwindow sizes, is called a connection. Each connection is uniquely specified by apair of sockets identifying its two sides.

• Precedence and Security: The users of TCP may indicate the security andprecedence of their communication.

GPRS – Transmission Planes Page 72

Rohde & Schwarz Trainingscenter, V 2.0

The basic model of operation:

Processes transmit data by calling on the TCP and passing buffers of data asarguments. The TCP packages the data from these buffers into segments and callson the internet module to transmit each segment to the destination TCP. Thereceiving TCP places the data from a segment into the receiving user's buffer andnotifies the receiving user. The TCPs include control information in the segmentsthat they use to ensure reliable ordered data transmission. The connection isterminated after command of the initiating side. The structure of such a TCP headeris the following:

Picture: TCP-Header Format

Description of the individual fields in the TCP-Header format:

Source Port (16 Bits): Identifies the source port number of the application

Destination Port (16 Bits): The destination port number of the receiving peer

Sequence Number (32 Bit): The sequence number of the first data octet in thissegment to ensure a in-order-delivery.

Acknowledgement number (32 Bit): If the ACK control bit is set this field contains thevalue of the next sequence number the sender of the segment is expecting toreceive. Once a connection is established this is always sent. If a datasegment has been received correctly, the receiver indicates with this numbera higher value to order the next segment. The transmitter side considers therequest of a higher sequence number as confirmation of the lower sequencenumbers.

Data Offset (4Bit): The number of 32 words in the TCP Header. This indicates wheredata begins. Please note that the option field can have a various length.

Reserved (6Bits): Reserved for future use. Must be zero.

Source Port Destination Port

Sequence Number

Acknowledgement Number

Checksum Urgent Pointer

Window SizeDataoffse

Reserved

Data

Options / PaddingU

RG

AC

KPSHR

STSY

N

FIN

GPRS – Transmission Planes Page 73

Rohde & Schwarz Trainingscenter, V 2.0

Control Bits:

URG: Urgent Pointer field significant

ACK: Acknowledgement Flag significant

PSH: Push-Function to obtain the immediate delivery of the received segment

to the higher layer, without buffering.

RST: Reset, to terminate the connection due to an error.

SYN: Synchronization. To synchronise sequence numbers. The initiating side

informs the receiving side about the establishment of a connection.

FIN: Final Flag, no more data. The receiver acknowledges also with the set

FIN-bit and terminates the connection.

Window Size (16Bit): The number of data octets beginning with the one indicated inthe acknowledgment field which the sender of this segment is willing to accept.Avoids an overflow of the incoming-buffer.

Checksum (16Bit): Value of the calculated checksum. Necessary for error detection.

Urgent Pointer (16 Bit): This field communicates the current value of the urgentpointer as a positive offset from the sequence number in this segment. The urgentpointer points to the sequence number of the octet following the urgent data. Thisfield is only interpreted in segments with the URG control bit set.

Options: Variable length to enable further options. Padding is the process of filling-upwith zero’s until the total length of 32 bits is reached.

User Datagram Protocol, UDP:

This protocol provides a procedure for application programs to send messages toother programs with a minimum of protocol mechanism. The protocol is transactionoriented, and delivery and duplicate protection are not guaranteed. Applicationsrequiring ordered reliable delivery of streams of data should use the TransmissionControl Protocol (TCP). Advantage is the higher speed in data transfer, becausethere will be no acknowledgement. At first glance it seems peculiar that the layer 4uses a connectionless, non-reliable protocol. The Internet Protocol at layer 3 hasexactly the same features. The reason can be found in the ability to hand out, ordeliver received data to various application layers. IP is not able to hand out receiveddata segments to such corresponding higher layers. This is the main task. Due tomultiplexing, various application layers can use the services of UDP and access thesame physical transmitting channel.

GPRS – Transmission Planes Page 74

Rohde & Schwarz Trainingscenter, V 2.0

Picture: UDP-Datagramm Format

Source Port (16 Bit): Identifies the source port, or the initiating peer.

Destination Port (16 Bit): Identifies the receiver and has a meaning within the context

of a particular internet destination address.

Length (16Bit): Is the length in octets of this user datagram including this header and

the data

Checksum (16 Bit): Checksum of the data field and the protocol-header.

UDP uses the transportation abilities of IP. There must be an interface between UDPand IP. The UDP module must be able to determine the source and destinationinternet address and the protocol field from the internet header. Also vice versa, theUDP-Pseudo-Header, prefixed to the UDP header contains the necessaryinformations and has the following structure:

Picture: UDP-Pseudo-Header Format

This UDP-Pseudo-Header has a total length of 11 octets and consists of somefragments of the IP-Header. It is used for the communication between these 2 layers,but it is not transported over the transportation channel.

Source IP-address

Destination IP-address

UDP lengthzero protocol

Data

Length Checksum

Source Port Destination Port

GPRS – Transmission Planes Page 75

Rohde & Schwarz Trainingscenter, V 2.0

Internet Protocol, IP:

The Internet Protocol, IP is the GPRS-Backbone-Protocol used to convey bothsignalling information and user data. In general, IP fragments and addresses the dataand transports it from transmitter to receiver side, but does not provide a reliable link.In GPRS we find a transportation IP over IP, user data, identified with an IP addressis conveyed with the IP protocol to the correct GSN, identified by the lower layer IPaddress. Signalling between original-GSN and destination-GSN is also transportedwith the Internet Protocol.

Characteristics of the Internet Protocol:

• Addressing: We have to distinguish between name, address and route: „A nameindicates what we seek. An address indicates where it is. A route indicates how toget there“ [RFC791]. IP needs addresses, but the translation of names intoaddresses has to be performed by higher layer protocols. Each packet data unit iscombined with a header field that contains the destination address and is thebasis for routing. The routing table is a list of all network nodes that have to bepassed between transmitter and receiver. IPv4 has an address field length of 32bit, in a further step of realisation, GPRS will use the Internet Protocol IPv6, withan address field length of 128 bit. There is no restriction concerning the amount ofInterfaces to the IP layer and to the amount of several logical addresses.

• Fragmentation

Fragmentation of an internet datagram is necessary when it originates in a localnet that allows a large packet size and must traverse a local net that limitspackets to a smaller size to reach its destination. Fragmentation, transmissionand reassembly across a local network which is invisible to the internet protocolmodule is called intranet fragmentation and may be used. The following picturegives a short example of such a fragmentation procedure:

• Error protection: Internet Protocol only provides an check sum field that protectsthe header field. There is no acknowledgement or retransmission of data. Thishas to be guaranteed by higher protocol layers, e.g. TCP.

• Options-field: Due to the option field, some optional information, supporting thefunctions of routing, diagnosting and statistic counts can be exchanged.

I P -H e a d e r

I P -H e a d e r

I P -H e a d e r

D a t a

D a t a D a t a

L a r g e p a c k e t s i z e

S m a l l p a c k e t s i z e S m a l l p a c k e t s i z e

r e s t

GPRS – Transmission Planes Page 76

Rohde & Schwarz Trainingscenter, V 2.0

IP-Datagram

The data transportation unit in IP is the so-called Datagram. Its structure is normallydepicted in 32-bit-blocks, including a header field of 20 octets and an option-field, upto 40 octets. The data is added to the header field up to a total length of 64 Kbyte.The data field contains the protocol headers of the higher layer protocols that areencapsulated in the IP field.

Picture: IP-Header Structure: IPv4-Header

The meaning of the single fields is:

Version (4Bit): This is the actual version number of the Internet Protocol. Currently itis IPv4 but in the future this field will indicate IPv6.

IHL, Internet Header Lenght (4Bit): Indicates the total header length, including thevariable option field.

Type of Service (8Bit): Description of the service parameters of the requested qualityof service, e.g. priority level, throughput, reliability and delay.

Packet Lenght (16 Bit): Total length of the datagram, including header and data field.

Identification (16 Bit): This field is used for identification and numbering of fragmentedpacket data units. This is not the same meaning then the sequence numberin the TCP layer, but it is used if the IP-layer has to segment thetransportation data into smaller units on request from an intermediatenetwork. The receiver side can reassemble or concatenate the units in theright order.

version IHL Type of Service Packet Length

Identification Flags Fragment Offset

Time to Live Protocol Header Checksum

Source IP Address

Destination IP Address

Options / Padding

Data

GPRS – Transmission Planes Page 77

Rohde & Schwarz Trainingscenter, V 2.0

Flags (3Bit): Controlling of the fragmentation, e.g. if a packet data unit is not to besegmented.

Fragment Offset (13 Bit): Indicates the position of the datagram before thefragmentation. Is needed at the concatenation.

Time to Live (8Bit): To avoid data units that could not be delivered, running forever inthe network, each packet header has a countdown field, that is decrementedat each hop. If the countdown field is 0, the packet data unit is discarded.

Protocol (8 Bit): Identifies the higher layer protocol. In GPRS the identifier 17 for UDPor 6 for TCP are used.

Header Checksum: A checksum on the header only. Since some header fieldschange (e.g., time to live), this is recomputed and verified at each point that theinternet header is processed.

Source IP-Address (32Bit): The IP-Adress of the sending network element. In future,there will be the transition of IPv4 to IPv6 and many more networkcomponents can be identified.

Destination IP-Address (32Bit): IP-Adress of the receiver element, or the destination.

Options: This optional field allows the communication of additional controlinformation, for example security information or additional routing informaiton.

Padding: With the aid of this padding-field, consisting of only filling bits, the IP-headeris replenished up to a 32-Bit Block.

The IP Protocol Layer contains during the transportation some information about thenext hop or the next switching node, if the absolute destination is not achieved.

GPRS – Transmission Planes Page 78

Rohde & Schwarz Trainingscenter, V 2.0

Picture: Comparison between Pv6 Header (above) and IPv4 – Header (below)

GPRS uses in the first step the Internet Protocol IPv4 and will move in a furtherdevelopment step to the IPv6 or IPnG (IP next Generation). Advantage of the IPv6 isthe much longer address field and additional possibilities to transmit someinformation about quality of service profiles, due to the „traffic class“ field.

L2:Data Link Layer Protocols, e.g. Frame Relay or ATM.

L1:Physical Layer Protocols, e.g. PCM30 or STM 1-4 connections.

The two Layers, L2 and L1 are not specified in GPRS. It is the scope of the operator-realisation.

L2‘:Data Link Layer Protocol between 2 GPRS-PLMN‘s.

L1‘:Physical Layer Protocol between 2 GPRS-PLMN‘s.

Same as L1 and L2, the two layers L1‘ and L2‘ are not specified and aer underlyingthe discussion between two network operators.

GPRS – Transmission Planes Page 79

Rohde & Schwarz Trainingscenter, V 2.0

Data transport between two GSN‘s

After the overall description of the used data transport protocols, the next picturegives an overview of how the user data unit is encapsulated into the different protocolheaders and how it is conveyed over the physical interface.

Picture: Encapsulation between GGSN and SGSN

6.3. Transmission Planes SGSN-MS

The following protocol structure guarantees the data transport between the MS andthe Switching node SGSN:

MAC

GSM

RF

RLC

LLC

SND

CP

IP/

X.25

FR

L1 bis

BSS

GP

LLC

SNDCP

Relay

MS BSS SGSNUm Gb

BSSGP : BSS GPRS Protocol LLC : Logical Link Control

SNDCP

SubNetwork Dependent Convergence Protocol

FR : Frame Relayl MAC : Medium Access Control RLC: Radio Link Control

IP : Internet Protocol

BSS +Radio-interface

Application

Picture: Transmission Planes between SGSN and MS

Header User DataGTP-

Header

UDP /

TCP-

Header

L1 IP-Header

Layer 2-Header

GPRS – Transmission Planes Page 80

Rohde & Schwarz Trainingscenter, V 2.0

SNDCP, Subnetwork Dependent Convergence Protocol:

The SNDCP-Protocol maps the characteristics of the network onto the characteristicsof the underlying network layers. Its main task is the transparent data transport ofpacket data unit, independent from the radio subsystem, BSS. Application data (inthat case, the application is the switching network) has to be conveyed independentfrom the lower layer protocols, they have to be tunnelled through the network. Theconsequence will be an easy change in the protocol structure. The SNDCP forms theinterface between the backbone-network, the NSS and the Base Station Subsystem,BSS. The result will be a gateway between protocols of the BSS-side and the NSS-side.

RLC

MAC

Relay

NetworkService

GTP

Application

IP / X.25

SNDCP

LLC

RLC

MAC

GSM RF

SNDCP

LLC

BSSGP

L1bisGSM RF

BSSGP

L1bis

Relay

L2

L1

IP

Um GbMS BSS SGSN

NetworkService

UDP /TCP

Picture: GPRS-Protokollstructure, Position of the SNDCP

The SNDCP-Protocol has its position above the LLC-layer, the data transport layerand above the Session Management Layer, that is responsible for the distribution ofidentifiers and names, e.g. the allocation of the TLLI. Above the SNDCP-Layer wefind the Packet Data Protocol on the MS side and the relay function on the SGSNside, which converts the data into the GPRS Tunnelling Protocol, GTP. The followingpicture explains the service primitives used for communication between the SNDCPlayer and other layers. It illustrates the service access points through which theprimitives are carried out.

GPRS – Transmission Planes Page 81

Rohde & Schwarz Trainingscenter, V 2.0

SessionManagement entity

LL5 LL9LL3 LL11

5 6

PDPor

Relay

SNDCP entity

LLC layer

SNDCP users

SNDCPmanagement

entity

PDPor

Relay

15 NSAPI

SAPI

. . .

SNDCP layer

SNSM

ControlEntity

Picture: Service Access Points between SNDCP and surrounding protocol layers

Functions of the SNDCP-Protocol:

Compression: For reasons of increased efficiency of the transmitting of data overthe air interface, which forms the bottleneck in GPRS, the data is compressedbefore transmitting. Thereby an algorithm is used which compresses theredundant blocks of the data. This kind of compression is reversible. It can beundone at the receiver side. We have to distinguish between the compressionof protocol header information and compression of user data units. Themethod of compression depends on the used transmission and networkprotocols and does not depend on the PDP-context. Parameters of thecompression function are negotiated between the SGSN and the MS.

GPRS – Transmission Planes Page 82

Rohde & Schwarz Trainingscenter, V 2.0

LL 5 LL 9LL 3 LL 11

5 6

PDPor

Relay

LLC layer entity

PDPor

Relay

15NSAPI

SAPI

. . .

SNDCP layer

Protocolcompr.

7

PDPor

Relay

Datacompr.

Datacompr.

8

PDPor

Relay

Protocolcompr.

Datacompr.

Protocolcompr.

SNDCP users

Picture: An example for the usage of NSAPIs, SNDCP functions, and SAPIs

Segmentation and Concatenation: The SNDCP-Layer segments the data units insmaller units which size can be handled by the lower layer protocols. Thereceiver side concatenates or reassembles them in the right order to result inthe original unit.

Multiplexing: Multiplexing is the simultaneous use of one single transmitting channelby different N-PDU’s containing different PDP’s. Example: If a user hasactivated more PDP-contextes, i.e. more applications are active, e.g.transmitting electronic mail and downloading of a website. Each of theseapplications is combined with a PDP-context, an identifier of the certainapplication. But as transmission channel, we have only the transmissionplanes given by the protocol layer LLC. Now it is task of the SNDCP-layer tomultiplex the N-PDU’s of these different applications to only one transmittingchannel, the LLC-layer.

GPRS – Transmission Planes Page 83

Rohde & Schwarz Trainingscenter, V 2.0

SNDCP

Packet DataProtocol

LLC

NSAPI

N-PDU

SAPISN-PDU

Packet DataProtocol

Packet DataProtocol

. . .

Picture: Multiplexing by the SNDCP-Layer

SNDCP uses the transmitting services of the LLC-layer. The SNDCP-layer itselfsdoes not perform any error correction or error detection. There does not exist a fixedstructure of the primitives, exchanged between SNDCP and LLC. The formatdepends on the chosen frame format of the LLC-layer.

LLC: Logical Link Control:

The LLC-Layer provides a reliable link between two endpoints in ciphered mode. Thedata transfer is absolutely independent from the protocol layers below, in our casethere will be a data transport between the MS and the SGSN absolutely independetfrom the air interface. This enables in future the introduction of other transmittingsolutions on the air interface, for example the step from GSM/GPRS to UMTS.

Belonging to the OSI-Modell, the LLC forms a subblock of the layer 2, the data linklayer. LLC provides to transfer modes:

Unacknowledge peer-to-peer operation:Unacknowledged mode means, that the receiver side does not confirm the receiveddata units. There is no error correction due to retransmission. Erroneous data unitsare discarded. In addition, there is no guarantee of in-order-delivery of the data units.

Acknowledged peer-to-peer operation:In the case of acknowledged data transfer mode, receiver and transmitter side are inthe so-called „Asynchronous Balanced Mode“, ABM, that means that both sides,receiver and transmitter are responsible for data flow and error correction. Each sidecan send commands to the peer-side. Every transported data packet will beconfirmed by the receiver side. In that case, we can provide an in-order-delivery ofthe data units.

GPRS – Transmission Planes Page 84

Rohde & Schwarz Trainingscenter, V 2.0

Characteristics and requirements of the LLC-protocol:• LLC shall provide a highly reliable logical link between the MS and the SGSN.

• LLC shall be independent of the underlying radio interface protocols in order toallow introduction of alternative GPRS radio solutions with minimal change to theNSS.

• LLC shall support variable-length information frames.

• LLC shall support peer-to-peer data transfers.

• LLC shall support both acknowledged and unacknowledged data transfers.

• LLC shall permit information transfer between the SGSN and one or more MSsusing the same physical (e.g., radio) resources. Thus each LLC frame shalluniquely identify the MS sending (uplink) or receiving (downlink) the information.

• LLC shall allow information transfer with different service criteria, such that high-priority data transfers may take precedence over lower-priority transfers to thesame MS.

• LLC shall provide user data confidentiality by means of a ciphering function.

• LLC shall support user identity confidentiality.

Position of LLC in the protocol structure:

Um GbMS BSS SGSN

SNDC SMSGMM

LLC

RLC

MAC

GSM RF

Relay

RLC

MAC

GSM RF

BSSGP

NetworkService

L1

SNDC SMSGMM

LLC

BSSGP

NetworkService

L1

TOM TOM

Protocol structure in GPRS: Protocols above and below the LLC-layer

In the presented picture we can see the GPRS-protocol structure with a special focuson the position of the LLC-layer. The independance of the underlying protocolstructure can clearly be seen, the link between MS and SGSN is independent fromthe solution and methods of the air interface.

GPRS – Transmission Planes Page 85

Rohde & Schwarz Trainingscenter, V 2.0

The layers above the LLC-Layer are:

SNDC, SubNetwork Dependent Convergence that controls the transport of user databetween MS and SGSN.

GMM, GPRS Mobility Management that is responsible for the mobility management,i.e. the management of the subscriber’s location information.

SMS, Short Message Service

TOM, Tunnelling of Messages Protocol. This protocol stack is used to conveysignalling information between the MS and not-GSM-MSC’s, for example if GPRSnetwork elements are inserted in non-GSM-networks.

The interfaces between the LLC-Layer and the superior layers are identified bydifferent, so-called Service Access Points, SAP.The following picture gives a functional modell of the protocol stack. We can see thedifferent SAP’s between the LLC Layer and the Layers above and below.

LogicalLink

EntitySAPI=7

LogicalLink

EntitySAPI=8

SGSNMS

GPRS Mobility Management

LogicalLink

ManagementEntity

Multiplex Procedure

LL5 LL9LL3 LL11

SNDCP

LLGMM

SMS

LogicalLink

EntitySAPI=2

RLC/MAC

LogicalLink

EntitySAPI=11

LogicalLink

EntitySAPI=9

LogicalLinkEntity

SAPI=5

LogicalLink

EntitySAPI=3

LogicalLink

EntitySAPI=1

GRR

LLGMM

RLC/MAC layer

LLC layer

Layer 3

LLC layer

BSSGP

BSSGP

BSSGP layer

SignallingSignalling and data transfer

TOM

TOM8 LLSMSTOM2

Picture: Functional modell of the LLC-layer. Interfaces between protocol layers.

GPRS – Transmission Planes Page 86

Rohde & Schwarz Trainingscenter, V 2.0

Identification of a LLC-connection

A connection between two LLC-endpoints is identified with the so-called DLCI, theData Link Connection Identifier. The DLCI consist of the SAP and the TLLI. Thismeans the respective Service Access Point of the corresponding data unit and theTemporary Logical Link Identifier that identifies a MS are unambiguous.

LLC-Frame Format:

A LLC-frame has the following structure:

Picture: LLC-frame format

D L C I = S A P + T L L I

T e m p o r a r y L o g i c a l L i n k I d e n t i f i e r

I d e n t i f i e s L L Cp e e r - t o - p e e r -c o n n e c t i o n

S e r v i c e A c c e s s P o i n tD a t a L i n k C o n n e c t i o n I d e n t i f i e r

I d e n t i f i e s u p p e r o r l o w e r l a y e r , i . e . :G M M , S N D C P , T O M ,S M S , R L C / M A C , B S S G P

I n c l u d e d i n L L C - H e a d e r

I d e n t i f i e s a s p e c i f i c M S

I n c l u d e d i n t h e R L C / M A C -H e a d e r

8 7 6 5 4 3 2 1Bit

Address Field

Control Field

InformationField

Frame Check Sequence

1 octet

Max. 36 octets

Max N201octets

3 octets

Contains SAP

Identifies U, S, Iand UI-Frames

Contains data of upperlayer protocols

Used for Error detection

GPRS – Transmission Planes Page 87

Rohde & Schwarz Trainingscenter, V 2.0

The LLC-Frame consists of the following 4 fields:

Addressfield:The 1 octet (=8Bit) long addressfield contains the SAP, i.e. the ServiceAccess Point to identify the interface point by which the data unit has to behanded over to the superior protocol layer.

Control field :Similar to the layer 2 protocols LAPD and LAPDm in GSM, the LLC layer usesdifferent frame formats for various transportation opportunities and occasions.The length of the control field varies between 1 and 36 octets. The control fielddistinguishes between 4 different frame formats:

Information transfer format I: This frame format is used for the transportof Layer-3 data units.

Supervisory format S: The S format shall be used to perform logical linksupervisory control functions such as acknowledge I frames andrequest a temporary suspension of I-frame transmission.

Unconfirmed information format UI: Same task as the I-frame, though inNonacknowledged – Mode, i.e. unconfirmed data transfer.

Unumbered format, U: The U format shall be used to provide additionallogical link control functions.

Information Field:This field is optional. It contains data of higher layer protocols. It’s length isvarious, up to a maximum of N201 octets. This constant N201 has differentsignifications, depending on the corresponding frame format. The intervallranges from 400 octets up to 1520 octets.

Frame Check Sequence Field, FCS:This 3 octet long field is used to identify transportation errors.

GPRS – Transmission Planes Page 88

Rohde & Schwarz Trainingscenter, V 2.0

Details to different LLC-frame formats:

In the following pages will be given some additional detailed information about thedifferent frame structures of the LLC-layer. The frame just presented formats:address field and control field are contemplated concerning structure and content in afurther detailed way.

The address field and it‘s structure:

The structure of the address field is given by the 3 elements:

• Protocol Discriminator bit PD

• Command/Response bit C/R

• The SAPI.

Octet

1

8 7 6 5 4 3 2 1

SAPI

Bit

PD C/R X X

Picture: Addressfield- Format

Protocol Discriminator Bit, PD

The PD bit indicates whether a frame is an LLC frame or belongs to a differentprotocol. LLC frames shall have the PD bit set to 0. If a frame with the PD bitset to 1 is received, then it shall be treated as an invalid frame. This variant isreserved for future enhancements.

Command/Response Bit, C/R

The C/R bit identifies a frame as either a command or a response. The MSside shall send commands with the C/R bit set to 0, and responses with theC/R bit set to 1. The SGSN side shall do the opposite; i.e., commands are sentwith C/R set to 1, and responses are sent with C/R set to 0. The combinationsfor the SGSN side and MS side are shown in the table.

Type Direction C/R valueCommand SGSN side to MS side 1Command MS side to SGSN side 0Response SGSN side to MS side 0Response MS side to SGSN side 1

Table: Usage of the C/R Bits

GPRS – Transmission Planes Page 89

Rohde & Schwarz Trainingscenter, V 2.0

Service Access Point Identifier, SAPI:

SAPI identifies a point at which LLC services are provided by an LLE to alayer-3 entity. Consequently, SAPI identifies an LLE that should process anLLC frame and also a layer-3 entity that is to receive information carried by theLLC frame.SAPI allows 16 service access points to be specified. The SAPI values areallocated as shown in the following table. Please note that the related-servicename „user data“ refers to the superior protocol SNDCP.

SAPI Related Service SAP Name0000 Reserved -0001 GPRS Mobility Management LLGMM0010 Tunnelling of messages 2 TOM20011 User data 3 LL30100 Reserved -0101 User data 5 LL50110 Reserved -0111 SMS LLSMS1000 Tunnelling of messages 8 TOM81001 User data 9 LL91010 Reserved -1011 User data 11 LL111100 Reserved -1101 Reserved -1110 Reserved -1111 Reserved -

Table: Specified interfaces between LLC and layer 3 identified by the SAPI

GPRS – Transmission Planes Page 90

Rohde & Schwarz Trainingscenter, V 2.0

The control field and its structure:

The control field identifies the type of frame. Four types of control field formats arespecified: I, UI, S and U frame.

The I-Format, Information-Format:A possible frame format of the control field is the I-Format that transports data oflayer 3 protocol entities. This means, that the information field, following the controlfield contains layer 3 protocol information. The structure of the I-format consists of thefollowing bits:

Picture: Control-Field-Format in case of I-Format

I-format N(S) X

A

N(R) S1 S2

0 N(S)X

N(R)

1

2

3

Control Field Bits2 14 3568 7 Octet

1 A

N(R)

0

S2S1

X X N(R) 1

2S-format

Control Field Bits2 14 3568 7 Octet

1 0

N(U)

1

PME

X X N(U) 1

2UI-format

Control Field Bits2 14 3568 7 Octet

1 11 M1M2P/F M4 1U-format

Control Field Bits2 14 3568 7 Octet

M3

I-format N(S) X

A

N(R) S1 S2

0 N(S)X

N(R)

1

2

3

Control Field Bits

2 14 3568 7 Octet

GPRS – Transmission Planes Page 91

Rohde & Schwarz Trainingscenter, V 2.0

Thereby, the bits signify:

Acknowledge- request bit, A:The A bit set to 1 is used by an LLE to solicit an acknowledgement (i.e., an I+S orS frame) from the peer LLE. The A bit set to 0 is used by an LLE to indicate that thepeer LLE is not requested to send an acknowledgement.

Send sequence number N(S):In Asynchronous Balanced Mode, only I frames contain N(S), the send sequencenumber of transmitted I frames. This guarantees the in-order-delivery of data units.The value N(S) is derived from the Send-State-counter V(S).

Receive sequence number N(R):In Asynchronous Balanced Mode, all I frames and supervisory frames contain N(R),the expected send sequence number of the next in-sequence received I frame. At thetime that a frame of the above types is designated for transmission, the value of N(R)is set equal to the value of the receive state variable V(R). N(R) indicates that theLLE transmitting the N(R) has correctly received all I frames numbered up to andincluding N(R) - 1.

Supervisory function bit Sn:Due to the two function bits, S1 and S2 it is possible to transfer some commands. Indetail 4 possible combinations exist:

Format Commands Responses S1 S2RR RR 0 0

Information + ACK ACK 0 1Supervisory RNR RNR 1 0

SACK SACK 1 1

The corresponding significations of the commands are:

Receive Ready command / response, RR:The receive ready (RR) supervisory frame is used by an LLE to indicate that it isready to receive an I frame and acknowledge previously received I frames numberedup to and including N(R) - 1.In addition to indicate the status of an LLE, the RR frame with the A bit set to 1 maybe used by the LLE to request an acknowledgement from its peer LLE.The transmission of a RR frame shall also indicate the clearance of any busycondition within the sending LLE that was reported by the earlier transmission of anRNR frame by the same LLE.

Acknowledgement command / response, ACK:The ACK supervisory frame shall be used by an LLE to acknowledge a single ormultiple I frames. Frames up to and including N(R) - 1, and frame N(R) + 1, havebeen received correctly.

GPRS – Transmission Planes Page 92

Rohde & Schwarz Trainingscenter, V 2.0

Receive Not Ready command / response, RNR:The receive not ready (RNR) supervisory frame shall be used by an LLE to indicate abusy condition; that is, a temporary inability to accept additional incoming I frames.The value of N(R) in the RNR frame acknowledges I frames numbered up to andincluding N(R) - 1. Subsequent frames, if any, shall not be considered confirmed.

Selective Acknowledgement command / response, SACK:

With the definition of the SACK command, the process of acknowledgement can berun through in a new way. Up to now, all received frames were confirmed by thecounter N(R). This value forms a barrier and all received frames up to this value areconsidered as confirmed. All frames received later have to be retransmitted. Now thiscan be done in a bitmap structured way. The SACK supervisory frame shall be usedby an LLE to acknowledge a single or multiple I frames. Frames up to and includingN(R) - 1, and frames indicated by the SACK bitmap, have been received correctly.The format of the SACK control field is shown in the figure.

Picture: I- and S-Frame Format in the case of SACK-Format

The S-Format, Supervisory-Format:This format provides a control frame structure, enabling to transmit commands andsignalling information, e.g. acknowledgement of previously received frames. Theknown structure is given as:

Picture: Structure of the control field in case of S-Format

R(249) R(250) R(251) R(252) R(253) R(254) R(255) X

R(16)

R(8)

R(9) R(10) R(11) R(12) R(13) R(14) R(15)

R(1) R(2) R(3) R(4) R(5) R(6) R(7)

FormatControl Field Bits

S frameSACKformat

I frameSACKformat

1 X

2 10

4 3568 7N(S)A

N(R)

A

N(R)

0

11

11

X

X

X

X

R(249) R(250) R(251) R(252) R(253) R(254) R(255) X

R(16)

R(8)

R(9) R(10) R(11) R(12) R(13) R(14) R(15)

R(1) R(2) R(3) R(4) R(5) R(6) R(7)

N(S) N(R)

KXX

N(R)

Octet

1

2

:

34 (max)

:

3

4

36 (max)

5

6

1

2

3

4

K Bitmap length indicatorR(n) Bitmap bit

Sn-BitsindicatingSACK-Frameformat

Bitmap,acknowledgingsingle I-frames

1 A

N(R)

0

S2S1

X X N(R) 1

2S-format

Control Field Bits2 14 3568 7 Octet

GPRS – Transmission Planes Page 93

Rohde & Schwarz Trainingscenter, V 2.0

The signification of the different bit – fields is already described in the block,presenting the I-Format. It is referred to this passage.

The UI-Format, Unnumbered Information:In principle, the task of the UI-frame is the same as the already presented I-Frame. Itis indicating, that the LLC-frame contains a Information-field, transporting all thehigher layer data. The difference to the I-frame is that transmitted UI-frames do nothave to be acknowledged by the receiving peer. The structure of the UI-frame is asfollows:

Picture: Control-field-structure in the case of UI-Format

Thereby signifies:

Encryption mode bit, E-Bit:The E bit is used to indicate whether the information and FCS fields of the UI frameare encrypted (ciphered) to provide user data confidentiality. The E bit is set to 1 toindicate an encrypted frame. The E bit is set to 0 to indicate a frame sent withoutencryption. Please note that this case refers to the non-acknowledged data transfer.In case of acknowledged data transfer, ciphering is always activated.

Protected Mode bit, PM-Bit:The PM bit is used to indicate whether the FCS field shall be calculated using boththe frame header and information fields.The PM bit is set to 1 to indicate that the FCS covers the frame header andinformation fields.The PM bit is set to 0 to indicate that the FCS covers only the frame header field andthe first N202 octets of the information field. If the length of the information field isless than N202 octets then the FCS shall cover the complete information field. Thispermits UI frames to transport "unprotected" information, so that errors beyond thefirst N202 octets of the information field do not result in the frame being discarded.

PM E UI frame information field0 0 unprotected, non-ciphered information0 1 unprotected, ciphered information1 0 protected, non-ciphered information1 1 protected, ciphered information

Table: Usage of the PM- and E-Bits in the UI-frame

Unconfirmed sequence number, N(U):Only UI frames contain N(U), the unconfirmed sequence number of transmittedUI frames. At the time that a UI frame is designated for transmission, the value ofN(U) is set equal to the value of the unconfirmed send state variable V(U). This is acounter of all transmitted frames, not covering if it concerns a „new“ frame or aretransmitted frame. It does not form an acknowledgement-value like the counterN(R) in the case of being I-Format.

1 0

N(U)

1

PME

X X N(U) 1

2UI-format

Control Field Bits2 14 3568 7 Octet

GPRS – Transmission Planes Page 94

Rohde & Schwarz Trainingscenter, V 2.0

The U-Format, Unnumbered-Format:The control field U-format allows the transport of additional control- and signallingmessages. The structure is given by:

Picture: Structure of the control field in case of U-Format

Thereby signifies:

The Poll/Final-Bit, P/F-Bit:

All U frames contain the Poll/Final (P/F) bit. The P/F bit serves a function in bothcommand frames and response frames. In command frames the P/F bit is referred toas the P bit. In response frames it is referred to as the F bit.The P bit set to 1 is used by an LLE to solicit (poll) a response frame from the peerLLE. The F bit set to 1 is used by an LLE to indicate the response frame transmittedas a result of a soliciting (poll) command.

The Unnumbered Function Bits, Mn-Bits:Similar to the Supervisory and Information Frame the Unnumbered-Frame providesthe possibility to send additional command-messages. They are described with theaid of the 4 Bits Mn. Possible combinations are:

Format Commands Responses M4 M3 M2 M1- DM 0 0 0 1

DISC - 0 1 0 0Unnumbered - UA 0 1 1 0

SABM - 0 1 1 1- FRMR 1 0 0 0

XID XID 1 0 1 1Table: Commands in case of Unnumbered Format identified by Mn-Bits

Set Asynchronous Balanced Mode command, SABM:The SABM unnumbered command shall be used to place the addressed MS orSGSN side into ABM acknowledged operation.An LLE shall confirm acceptance of a SABM command by the transmission at thefirst opportunity of a UA response. Asynchronous Balanced Mode describes the casethat both communication peer-entities know of each other and have equal rights totransmit commands to the corresponding opposite peer.

Disconnect command, DISC:The DISC unnumbered command shall be transmitted in order to terminate the ABMoperation.No information field is permitted with the DISC command. Prior to executing thecommand, the LLE receiving the DISC command shall confirm the acceptance of a

1 11 M1M2P/F M4 1U-format

Control Field Bits2 14 3568 7 Octet

M3

GPRS – Transmission Planes Page 95

Rohde & Schwarz Trainingscenter, V 2.0

DISC command by the transmission of a UA response. The LLE sending the DISCcommand shall terminate the ABM operation when it receives the acknowledging UAor DM response. This is the regular process to terminate a communication.

Unnumbered Acknowledgement response, UA:The UA unnumbered response shall be used by an LLE to acknowledge the receiptand acceptance of the mode-setting commands (SABM or DISC). Received mode-setting commands are not initiated until the UA response is transmitted.An information field is only permitted when UA is the response to a SABM command.The UA response shall in this case contain signalling parameters of thecommunication establishment.

Disconnected Mode response, DM:The DM unnumbered response shall be used by an LLE to report to its peer that theLLE is in a state such that ABM operation cannot be performed. An LLE shalltransmit a DM response to any valid command received that it cannot action.No information field is permitted with the DM response.

Frame Reject response, FRMR:The FRMR unnumbered response may be received by an LLE as a report of a framerejection condition not recoverable by retransmission of the identical frame:

1) receipt of a command or response control field that is undefined or notimplemented

2) receipt of a supervisory or unnumbered frame with incorrect length; or3) receipt of an I frame with an information field that exceeds the maximum

established length.

An undefined control field is any of the control field encodings that are not identifiedin the figures describing the control field structure.An information field that immediately follows the control field and that consists of 10octets shall be returned with this response to provide the reason for the FRMRresponse. Only the first 6 octets of the control field of the rejected frame shall besent. If the control field of the rejected frame is fewer than 6 octets, then the unusedoctets shall be set to 0.

Exchange Identification command/response, XID:This frame shall be used to negotiate and re-negotiate LLC layer parameters andlayer-3 parameters. XID frames can be transmitted in ADM and ABM.The negotiation procedure is one-step, i.e., one side shall start the process bysending an XID command, offering a certain set of parameters from the applicableparameter repertoire the sending entity wants to negotiate, proposing values withinthe allowed range. There are only mentioned the parameters being matter ofnegotiation. In return, the other side shall send an XID response, either confirmingthese parameter values by returning the requested values, or offering higher or lowerones in their place. As an optimisation, parameters confirming the requested valuesmay be omitted from the XID response. There is a long list of possible layer 3parameters to be negotiated that can be found in the specifications. For furtherinformation it is referred to GSM Spec. 04.64.

GPRS – Transmission Planes Page 96

Rohde & Schwarz Trainingscenter, V 2.0

6.4. Transmission Planes SGSN - BSS

FR

L1 bis

BSS

GP

Relay

FR

L1 bis

BSS

GP

LLC

SND

CP

Relay

BSS SGSN

Gb

BSSGP : BSS GPRS Protocol LLC : Logical Link Control

SNDCP : SubNetwork DependentFR : Frame Relayl

Convergence Protocol

Data transfer between the SGSN and BSS runs via the Gb-Interface. In GSM wecould find at this position the A-Interface between MSC and BSC. Some fundamentaldifferences, respectively characteristics of the Gb-interface are:Different to the A-Interface where every subscriber has been assigned a dedicatedchannel ressource for the length of the communication, independent of the datatransfer being active or not, the Gb-Interface performs a packet data transport. Usingthis method, it allows the Multiplexing of several subscribers onto one commonphysical channel.Due to this, the data throughput for one subscriber can vary between Zero andmaximum throughput.

GPRS – Transmission Planes Page 97

Rohde & Schwarz Trainingscenter, V 2.0

BSSGP, Base Station System GPRS Protocol:

This protocol layer represents the transmission plane for the Gb-interface as ittransports the higher layer data from the SGSN to the BSS. LLC PDU’s areencapsulated and tunnelled through the Gb-interface. The main task of this protocollayer can be found considering the signalling side. The BSSGP is conveying routing-and QoS-relevant information between the BSS and the SGSN. BSSGP does notperform any error correction. It forms the relay function between the RLC/MAC-informationen and the switching system SGSN. The position of the BSSGP in thegeneral plane is below the LLC-Layers and above the Network-Service-Layers and itforms the relay interface to the RLC/MAC-Layer in the BSS.

GbBSS

LLC

BSSGP

L1

SGSN

NS

L1

MAC

BSSGPRLC

RELAY

NS

Picture: Postion of BSSGP in the GPRS-protocol structure

The BSSGP-Protocol provides a lot of surveying and control functions to managedifferent instances and services. It provides the presented interfaces:

Picture: BSSGP Service Modell: Interfaces to surrounding layers

Network Service

BSSGP

LLC

BSSGP

GMM

GMM

PFM

PFM

NM

NM

GSM 08.16

Service model in an SGSN

Network Service

BSSGP

GMM NMRELAY

GSM 03.64 GMM

PFM

PFM NM

GSM 08.16

Service model in an BSS

RL

RLC/MAC

GPRS – Transmission Planes Page 98

Rohde & Schwarz Trainingscenter, V 2.0

The BSGP-layer provides the following Service Access Points:

• BSSGP: For functions controlling the transfer of LLC frames passed between anSGSN and an MS across the Gb interface.

• RL, Radio Link Relay: For functions controlling the transfer of LLC framesbetween the RLC/MAC function and BSSGP.

• GMM, GPRS Mobility Management: For functions associated with mobilitymanagement between an SGSN and a BSS.

• NM, Network Management: For functions associated with Gb-interface andBSS—SGSN node management.

• PFM, Packet Flow Management: For functions associated with the managementof BSS Packet Flow Contexts (PFCs).

The BSSGP-layer communicates with its environment via defined messages, so-called primitives that are transported via the corresponding interface to thedetermined layer-entitiy. These primitives are provided as certain packets with acertain format to the corresponding layer. Data of the LLC-layer are packed into sucha primitive and are provided to the corresponding layer via the SAP. Before handingthem out, the data is combined with an Information Element Identifier. Due to theseprimitives, containing the Information Elements, signalling information can betransported via the Gb-interface.

Network Services, NS:

The lower layer network services, NS provides the means for data transport betweenBSS and SGSN. The used mechanisms are based on a Frame-Relay-network-concept.

Picture: Position of the Network Services

GbBSS

LLC

BSSGP

L1

SGSN

NS

L1

MAC

BSSGPRLC

RELAY

NS

GPRS – Transmission Planes Page 99

Rohde & Schwarz Trainingscenter, V 2.0

The NS-layer has the following tasks that are described in more detail in the passageabout the characteristics of the Frame Relay network:

• Transfer of BSSGP-Paket Data Units over the Gb-Interface

• Congestion Detection and indication on the Gb-Interface

• Status-Indic ation of the connection, e.g. information if any transfer

characteristics have been modified.

The Network Services work on the principle that this layer provides primitives tohigher layers used for data transport. The higher layers become external users of thenetwork services. The really transport of data units is established and maintainedwith the aid of so called Virtual Connections, VC. A Virtual Connection means, incontrary to a physical connection, that due to an address identification, a logical pathbetween two endpoints can be maintained. Each physical or logical channel of apeer-to-peer connection between two endpoints has to be identified. Addressing of allconnected endpoints occurs. This addressing can be reduced in the case of a Point-to-point, PtP-connection, i.e. one SGSN is connected to one BSS.

The Layer Network Services, NS is subdivided into 2 Sub-Layers:

Sub-Network Service /Sub-Network Service protocol

Network Service Control /Network Service Control protocol

Network Service

Picture: Internal architecture of the layer Network Service

The Network Service Control entity is responsible for the following functions:- NS SDU transmission: The Network Service SDUs shall be transmitted

on the Network Service-Virtual Connections. The NS SDUs areencapsulated into Network Service Control PDUs that in turn areencapsulated into Sub-Network Service PDUs.

- Load sharing: The load sharing function distributes the NS SDU trafficamongst the available (i.e. unblocked) NS-VCs of a group.

- NS-VC management: A blocking procedure is used by an NS entity toinform an NS peer entity when an NS-VC becomes unavailable for NSuser traffic. An unblocking procedure is used for the reverse operation.A reset procedure is used between peer NS entities in order to set anNS-VC to a determined state, after events resulting in possiblyinconsistent states of the NS-VC at both sides of the Gb interface. A

GPRS – Transmission Planes Page 100

Rohde & Schwarz Trainingscenter, V 2.0

test procedure is used to check that an NS-VC is operating properlybetween peer NS entities.

The Sub-Network Service is responsible for:

The Sub-Network Service entity provides a communication service to NetworkService Control peer entities. The Network Service Control peer entities usethe Sub-Network Service for communication with each other. The peer-to-peercommunication accross the Gb interface between remote Network ServiceControl entities is performed over Network Service Virtual Connections (NS-VCs). An NS-VC is a virtual communication path between Network ServiceControl peer entities.

The data transfer over the Gb-Interface is performed with the use of a Frame RelayNetwork.This Frame Relay Network can be realized as Point-to-point connection or can berealized as a Frame Relay Network, using an Intermediate Frame Relay Network.

Frame Relay:

Similar to X.25, Frame Relay is a packet switched data communication network, withthe advantage of being much faster. This is due to the renounciation of signalling andadministration data. All the signalling and administration has to be performed byhigher protocol layerers. Also, Frame Relay does not provide a reliable link and soerror correction and protection mechanisms have to be implemented in the higherlayers. This results in all the data overhead being greatly reduced and the speedbeing accelerated.

Data transfer:

The data units in a Frame Relay network are conveyed with the assistance of socalled Frames. A big advantage of this communication principle is the variable size ofthese frames and by this, the adaptive variation of the data throughput. The maintask of the network elements is to transport or to route to frame through the networkto the determined destination endpoint. The switching does not run through physicalchannels, furthermore it is conveyed due to logical connections. We remember theidentification of such a logical channel as virtual connection, VC. As long as data hasto be transferred, the physical resource on the transmitting channel is allocated in therequired bandwidth. Frame Relay, in duty in a GPRS-network uses permanentassigned virtual connections. Each of these connections is identified with a Data LinkConnection Identifier, DLCI. Such a DLCI identifies the node that represents thetransfer point to the user layer. In other words, the DLCI gives the address of thedestination endpoint to which the frames, containing the higher protocol data, have tobe routed.

GPRS – Transmission Planes Page 101

Rohde & Schwarz Trainingscenter, V 2.0

Picture: Structure of a Frame

Picture: Addressing of a virtual connection with different DLCIs

GPRS – Transmission Planes Page 102

Rohde & Schwarz Trainingscenter, V 2.0

Congestion Identification:

A Frame Relay Network provides different means and strategies to protect and avoidcongestion on the transmitting channel. If a network-switching node detects overload,it will send a notice or indication to all successing and predecessing nodes, so thatthey can reduce the amount of data. In case of congestion or transmitting errors, theframes will be deleted, according to order of their importance. There is a flag,indicating the importance or precedence of the data unit. The data units with thelowest precedence class will be deleted the first. Please notice, that all data units,SDU’s are protected by higher protocols against transmitting errors, such aserroneous data, discarded data or twice-delivered data units.

Picture: Congestion in a Frame Relay Network. Notification of neighborhood nodes.

Status of a PVC, Permanent Virtual Connection

With the assistance of a additional, optional signalling mechanism it can be defined inwhich way the two sides of the communication in a Frame Relay Network (e.g.network and router) communicate with each other concerning the state of theinterface or concerning the different PVCs, connected to the network. This means,that Frame Relay interfaces can be implemented and data units can be transferredwithout the introduction of such a signalling mechanism. But otherwise, it is quiteeasy to implement a signalling process for status information due to the definition ofadditional Management Frames. These management frames, with their own DLCI-addresses provide the transfer of the status information to be exchanged betweenthe network and the access-system.

GPRS – Transmission Planes Page 103

Rohde & Schwarz Trainingscenter, V 2.0

Management-Frames survey the connection state and deliver the followinginformation:

• Activity of the interface, i.e. "Keep-alive" or "Heartbeat"-signal

• Valid DLCIs, defined for the corresponding interface

• State of the separate virtual connections, e.g. notification in case of

congestion.

Picture: Status information with the aid of Management-Frames

Layer 1 bis, L1:The concrete realisation of the physical layer is not being implemented in the GPRS-Specifications. It is only defined in some conditions, the real implementation beingtask of the separate network operator and of the system manufacturer.One condition is the conformity to Frame Relay, the method used in the NetworkService Layer. Frame Relay network – frames should be depicted onto the usedphysical connection.For example, the physical realisation of the data transfer on the Gb-interface is madewith PCM30/PCM24-techniques. Multiplexing with the A-interface of a GSM-networkon a common physical channel is possible.

GPRS – Transmission Planes Page 104

Rohde & Schwarz Trainingscenter, V 2.0

6.5. Transmission Planes MS - BSS

GPRS Transmission Planes

MAC

GSMRF

RLC

LLC

SNDCP

IP/X.25

MAC

GSMRF

RLC

Relay

MS BSSUm

LLC : Logical Link Control MAC : Medium Access Control RLC : Radio Link Control

GSM RF: GSM Air interface

IncludingCCU and PCU

Radio Link Control / Medium Access Control, RLC / MAC:

This layer contains 2 functional units: The Radio Link Control represents a linkdepending on the used radio link-methods. The Medium Access Control layercontrols the access to the physical channel and distributes the LLC-data units on theair interface. It assigns the physical resources on the air interface. Both layers arecombined strongly, thus their functions and characteristics are explained in acombined way.The RLC/MAC-Protocol layer offers the two data transfer methods:Acknowledged Mode and Non-acknowledged Mode.

RLC-Functions:• The RLC-Layer offers Primitives that enable the handling of LLC-PDU’s

between MAC-Layer and LLC-Layer.• Segmentation and concatenation of LLC PDU’s.• Backward Error Correction, BEC as error correction, this means the request of

retransmission of erroneous data units. This can be performed with the aid ofa bitmap-structure, the erroneous data units are retransmitted.

GPRS – Transmission Planes Page 105

Rohde & Schwarz Trainingscenter, V 2.0

MAC-Functions:The MAC-layer controls the access to the resources of the air interface. It hasprocedures to coordinate and control the common access and the sharing ofmultiple mobile stations on one common physical channel. The sharing ofmultiple mobile phones can be done in parallel way. We have to coordinate amultiple access on the physical resource in Up- and Downlink.Tools, respective means of the Mre the identifier TBF, or TFI to identify aphysical ressource and the USF to indicate the correct physical channel areused.

Further details and description of the RLC/MAC-Layer are given in the chapter aboutthe air interface.

Physical Layer, GSM-RF:

This Layer contains the two sub-layer, Physical RF-Layer and Physical Link Layer.Their tasks are:

• Modulation and Demodulation, i.e. transfer of the digital information with the

aid of a high frequency radio wave signal.

• Generation of Bursts: Segmentation of the binary bitstream in blocks to be

placed into the single bursts and on the receiver side the concatenation and

reassembling of the bit-sequence.

• Channel coding, depending on the radio link quality, the mapping of data and

error correction, using the 4 different coding schemes, CS1 – 4.

• Error Protection mechanisms, for example: Interleaving and Convolutional

Coding.

This layer does not differ in a big way from the layer 1 we know from GSM, i.e. thereal data transfer is run through with the use of the GSM-principles, TDMA+FDMAaccess methods and the burst types we know in GSM. The only difference will be inthe content of the information part in the normal burst. What this looks like, isdescribed in the chapter on the air interface.