Scalable voip mobility intedration and deployment- P30 docx

10 223 0
Scalable voip mobility intedration and deployment- P30 docx

Đang tải... (xem toàn văn)

Thông tin tài liệu

290 Chapter 7 www.newnespress.com Gateway Switch Base Station Base Station Controller Phone Public Switched Telephony Network (PSTN) Telephone Lines Dedicated Lines Voice Codec Extensions Telephony Application Wireless Radio Figure 7.1: The Anatomy of a Cellular Call Voice over Cellular and Licensed Spectrum 291 www.newnespress.com The base station is the antenna tower and network radio itself. These are located, with overlapping coverage, everywhere the network needs to provide service. Usually, these towers are on poles next to highways, on billboards, or on the sides or tops of buildings. The mobile operator leases the sites that the towers are placed, and runs cables from the tower to the shed, where the base station is located. The base station takes care of generating the signals that run the cell, and making sure that each of the phones are properly connected to the network, just as an access point does with Wi-Fi. Located in a more central area is the base station controller. The base station controller provides the intelligence behind the cell. A base station controller can have multiple base stations attached to it, with dedicated digital links. The controller manages the base stations, and controls the mobile phones associated to each base station. The radio behavior of each of the base stations is determined and enforced by the controller, including channel assignments coding operation. The compressed audio from the telephones also terminates at the base station controller, which decompresses the audio, converting it into streams of PCM. The base station controller aggregates these audio lines, only some of which will have phone calls active on them, onto trunks and sends the calls to the centralized gateway switch. The gateway switch is the first true telephone switch, and straddles the border between the public switched telephone network (PSTN) and the private network of the mobile operator in the area. Gateway switches usually serve a geographic region, and serve the purpose of bridging the call from the wireless portion of the network directly into the standard telephone system. The gateway switch is the mobile operator’s “PBX,” not surprisingly, and owns and manages the devices registered to it. The gateway switch connects, through a trunk large enough to carry the voice load coming in from the network, as the one point of contact to the PSTN. Cellular uses the three-level architecture of gateway switch, base station controller, and base station to separate out the functions related to telephones from those related to operating a wireless service. The three-level architecture is, not by coincidence, very similar to the one we have already seen for a Wi-Fi voice mobility network in the enterprise, with an access point, wireless controller, and PBX mapping pretty closely. But the mobile operator’s network is tightly integrated for the purpose of carrying voice calls. But in a general sense, the gateway switch signals the calls “directly” to the mobile phone, with the base station controller and base station proxying as needed to steer calls in the right direction. You may notice that the description in these sections is intentionally kept to a high level, to apply to the different underlying cellular technologies and not draw too much from each architecture’s specific terms and roles. In this way, the descriptions apply to all of the major second-, third-, and fourth-generation cellular networks. 292 Chapter 7 www.newnespress.com 7.1.1 Mobility in Cellular Probably the most interesting feature of the cellular architecture is the notion of portability beyond the geographic region. It is fairly easy to see how mobility works within the geographic region served by the gateway switch. A phone could simply show up on a different base station another day, and the public telephone network would still interface directly with the gateway controller and not be aware of the change. There is tremendous value to this architecture, of course, in providing mobility within the geographic region, as that is where most phones will spend their time. However, the question still remains of what happens when the user takes his phone out of the geographic area and travels to another one, with another gateway. This intergateway scenario is known as a roaming scenario, because the phone is no longer in the network operated by its gateway switch. Just as with PBX connections and enterprise private telephone networks, the mobile network anchored by the gateway switch is assigned the phone numbers for the phones that belong to that geographic region. When a phone call is placed, from the public network to the mobile phone, the public network routes the call to the gateway switch in the same way as when a phone call is placed to an enterprise extension. Once the call arrives at the gateway switch, the public phone network no longer needs to know where the call goes. When the mobile phone is not in the network, however, the call must go somewhere. The gateway switch usually provides, through another piece of equipment attached to it, voicemail service. That works for when the mobile phone is off or its location is not known. But the feature we are looking for here is roaming. To make roaming work, when the mobile phone shows up in a geographic area not belonging to its mobile gateway, it needs to have its location updated. The roaming mobile phone first connects to the base station, and through to the base station controller and gateway switch. The gateway switch knows the phone numbers that belong to it, and therefore knows that this mobile phone does not belong locally. However, the phone also reports information that lets the visited gateway switch determine where the home gateway switch must be on the network. Then, the visited gateway sends a message over the signaling system of the public network, SS7, to the home gateway, letting the home know that the phone has relocated. The home gateway maintains a database, commonly called a home location register (HLR), of all of the extensions that are owned by the home gateway. This database includes all phones that are operated by that carrier in that geographic region, wherever the phones actually are. In addition, the visiting gateway maintains a separate database, called a visitor location register (VLR), which maintains the list of phones currently associated to the gateway, regardless of whether they are managed by that operator in that geographic region. The roaming phone registers with the gateway, which updates the VLR with the phone’s information and the PSTN address of the home Voice over Cellular and Licensed Spectrum 293 www.newnespress.com Home Gateway Switch Landline (650) 222-2222 Base Station Base Station Controller Visiting Phone (408) 111-1111 Public Switched Telephony Network (PSTN) 1) Call for (408) 111-1111 2) Call is routed by PSTN to home ga teway switch 3) Home gateway sees that (408) 111-1111 is not in this network, but is visiting another gateway. This switch looks up the location of the other switch and creates a call to that one, forwarding the call on. 4) Call for visitor gateway originally for (408) 111-1111 5) PSTN routes call to visitor gateway, not aware that this part is forwarded 5) Visitor gateway accepts the call, pushing the audio down to the mobile phone Dedicated Lines Home Location Register Visitor Gateway Switch Visitor Location Register Figure 7.2: Cellular Roaming gateway. The gateway then sends the message to the home gateway, which marks the HLR to indicate that the phone has roamed and records the PSTN address of the visited gateway. Figure 7.2 shows the process for roaming. Now, when a call comes in for the mobile phone at the home gateway, the gateway looks up its HLR and finds that the phone is located at the visited gateway instead. The home gateway needs to forward the call over to the visited gateway. To route the call, it places another call directly to the phone number of the visited 294 Chapter 7 www.newnespress.com gateway, but when doing so, it attaches in the PSTN signaling a message saying which phone the call is for. The visited gateway takes the call, looks up the VLR and finds that the phone is local, and then directs the call through its network to the phone. It is as if the phone had never left. The reverse, a roaming phone calling a landline number, does not require forwarding through the home gateway, because the public telephone network is capable of carrying the outbound call with the caller’s phone number represented, even though the call itself is coming from an area where that phone number cannot possibly be routed to. The public network is trusting the operators to not put wrong information in the caller ID, and thus lets equipment place whatever digits are desired to represent the caller. One thing about roaming is that the dialing plan of the gateway the phone is currently connected to may matter. This comes into play with international dialing and seven-digit (no area code) dialing. If both gateways belong to the same mobile operator, there is a reasonable chance that the visited gateway will use the dialing rules that belong to the roaming phone. If the mobile phone in the figure dialed “333-3333” using this example, it could connect with “(408) 333-3333”. But it is just as likely, and more so for international roaming, that the visited gateway will enforce the local dialing plan. In this case, the phone dialing “333-3333” may be forced to connect to “(XXX) 333-3333”, where “XXX” is the area code that the visited gateway is in. When phones are roaming between systems of different mobile operators, it is up to each operator to decide whether the visiting phone should be accepted into the network, and whether it will be able to place or receive calls. Roaming agreements between different operators are written to keep track of when these phones roam and what they do on the roamed networks, and the technology of both networks will monitor the operation and bill the home network, and thus the user, accordingly. The fact that cellular roaming works over international legs, where the visited gateway is an ocean away, is quite remarkable. 7.1.2 Mobile Call Setup We have now looked at how roaming works. But within the domain of the gateway, the phone must still register to the network, identify itself, and be able to both place and receive calls. At an abstract level, the concepts are not different from what we have seen earlier. The base stations send out beacons, advertising their presence and what network they belong to. The phone is built in with a preference for the network of the mobile operator who sold the phone, and the phone will scan the various frequencies that may be employed for the technology it uses, until it locates a beacon. At that point, the phone associates itself to the base station and registers itself with the network directly to the gateway it is visiting. Voice over Cellular and Licensed Spectrum 295 www.newnespress.com The gateway authenticates the phone to make sure it is not a spoof and then updates its VLR and the appropriate HLR, either its own or another. When the phone wishes to place a call, it must gain access to the signaling channel. In cellular technologies, as we will see for each of them, signaling and bearer are generally kept separate, unlike with packet-based technologies. The signaling channel is packet-based, however, and allows the phone to send out the call setup request. This signaling goes to the switches, gets translated into a format the PSTN understands, and is routed to the final destination. This continues for the remainder of the call setup. Once the call is established, the signaling protocols ensure that there is a bearer channel—the specific form of which we will leave for the specific discussion of architectures—and the call flows. For incoming calls, things are slightly different. The phone does not have its radio constantly powered on, waiting for an incoming call. Rather, the phone turns the radio off to save power. When a call comes in, the gateway routes it through to the base station anyway, which introduces a message into the paging channel. The paging channel is a broadcast channel where all messages go for phones that may or may not be awake at the moment. The paging channel repeatedly sends information informing the phone that it has an incoming call. Once the phone wakes up for the moment and sees that there is a call incoming, it comes out of power save and fully reconnects to the network. At this point, it is now able to communicate back and forth, participating in the signaling activities. If the call is accepted, the phone is granted a bearer channel, which it uses to encode the voice upstream and decode the voice downstream. 7.1.2.1 Handoff Of course, mobile phones move. The caller typically has no idea where the coverage cell of one base station’s radio ends and another one’s begins, and so calls need to be able to be carried, seamlessly, across cell boundaries. The handoff mechanisms in cellular networks are designed to do just that. The three-level hierarchy (Figure 7.3) of the mobile network allows for a small variety of handoff scenarios. When a phone is moving around the area of a base station, it may come in and out of coverage of the multiple radios that the base station has. This is one type of handoff that is very local. As the phone changes locations by significant amounts, however, it might go out of strong coverage of one cell, and become parked between multiple other cells, where it must then hand off across base stations. If the new base station is under the same base station controller, than this can be a second type of handoff. If the phone crosses to a new base station controller, however, the handoff occurs higher up the hierarchy. As mentioned before, handoffs within one gateway switch can be handled without involving the public network. The three types of handoffs beneath the gateway can usually take place in the highest-level device in common on both paths. This is because the bearer channel 296 Chapter 7 www.newnespress.com need only swivel, or pivot, from one line to another, and as long as the pivot device can get the new leg allocated without breaking the old one—a make-before-break scenario—the handoff can occur cleanly and without major changes. When the handoff is between gateways, however, there is no central pivot point. One might notice that the calling party always stays put, and so it could be conceivable that the calling Base Station Radios and Sectors a) Between Sectors b) Between Base Stations c) Between Base Station Controllers d) Between Gateways Base Station Controller Phone Public Switched Telephony Network (PSTN) Gateway Switch Figure 7.3: Handoffs at Every Level Voice over Cellular and Licensed Spectrum 297 www.newnespress.com party, or some public network switch, could just request a new line to the new gateway. But the public network, by design, is not built for mobility and does not participate in the handoff process at all. Therefore, the home gateway is required to follow the same steps as in the previous section. It places a new call out to the new gateway, which then dedicates lines down to the base station the phone is handing off to. Once everything is set up, the phone drops its connection to the old base station, which frees up the lines up to the gateway. The home gateway then immediately transfers the call from the old lines in its domain to the call going across the PSTN, thus completing the circuit. The major unknown factor in this process, for the mobile network’s point of view, is whether the line connecting the two gateways will be available. Sometimes, it is not. When that happens, the call will be dropped on the handoff, and the user will be forced to redial. This transfer procedure is where the most can go wrong, but it is also supposedly a less common event, considering that gateways are planned out to encompass areas of population. When a call that has already been anchored in the above way moves to yet another gateway, the first visited gateway does not forward the call to the second. That would lead to a rather pointless daisy-chaining of calls. Instead, the home gateway sets up the all directly over the network to the new visited gateway and drops the call from the old visited one. 7.2 Cellular Technologies Having covered the basic concepts of cellular networking, we can now look at the specific forms that the technologies take on. Cellular technology ranked in terms of generations. There are three well-defined generations, and a nebulous, not well agreed-upon designation for the fourth generation. The first generation of cellular technology was that of analog cellular phones. These phones started people to be interested in the market for mobility, and provided the convenience of wireless coverage, although with the possibility of getting static and noise in the call as the caller left the range of the network. These have been surpassed by the next generation. 7.2.1 2G Technologies The second generation, or 2G, of cellular technologies embarked upon use of digital phones and signals to ensure that good quality was possible along a wider range of coverage. Furthermore, the transition to digital allowed the introduction of security into the network, with encryption to prevent eavesdropping. There are two types of 2G technologies, and these two make up the basis for the cellular networks worldwide today. 298 Chapter 7 www.newnespress.com 7.2.1.1 GSM One digital 2G technology is known as the Global System for Mobile Communications (GSM). GSM is the basis for most of the cellular systems worldwide, and introduced a new concept into the world of cellular. Each GSM phone requires a SIM (Subscriber Identity Module) card, which is provided by the mobile operator and includes the cryptographic identity tied to the telephone number and user account. The SIM card also provides for limited storage, intended originally to hold the address book that the caller can use for dialing others. The advantage the SIM card holds for the user is clear: the user can pull the card out of one phone, insert it into another GSM phone, and immediately, the second phone picks up the phone number for the user and can be used to send and receive calls. (The address book function is far less useful today, as address books are more sophisticated now and the phone cannot convert all of the information to the SIM card without loss.) For the network, the advantage of the SIM card is that it stores the user’s identity. Each SIM card is given a unique International Mobile Subscriber Identity (IMSI, pronounced “im-zee”). This number represents the subscriber uniquely, in every country and in every location. The IMSI is a 15-digit number. The first six digits name the mobile operator who supplies the SIM and provides service. The first three of these digits specifies the Mobile Country Code, and the second three specifies the Mobile Network Code. With these six digits, a gateway that has a roaming phone connecting to it can find the home network. For example, the first six digits of 310 170 would refer a phone to the former Pacific Bell Wireless system in California, now the AT&T network. GSM provides names for the three levels of architecture we looked at earlier. The gateway switch is called the Mobile Switching Center (MSC). The base station controller keeps its name, and is referred to as the BSC. The base station itself gets a new word, and becomes the Base Transceiver Station (BTS). The phones themselves are given a unique number as well, called an International Mobile Equipment Identity (IMEI). This number identifies the phone to the network. Between each of the devices in the network, GSM defines and labels each link. We will not need to go into the names of these links here, but the concept is that each interface is well-defined, so that mobile operators can (in theory) substitute one vendor’s equipment for another. The most important interface for which this is true is the air interface (called Um, for the detail-oriented). This is where multivendor interoperability comes into play. MSCs communicate over the public signaling network using a protocol called Mobile Application Part (MAP). This protocol takes advantage of the extensibility of the public signaling network’s protocols to add, to the messages that travel from MSC to MSC, the information necessary to run the mobile network. Voice over Cellular and Licensed Spectrum 299 www.newnespress.com 7.2.1.2 GSM Radio The GSM radio itself is based on the concept of time division multiple access (TDMA). The idea is that the cell’s airtime is divided up into strict slots, or periods of dedicated access. Devices using a bearer channel are assigned a particular, repeating sequence of slots, one for each direction of the voice call. While the call is in progress, the phone is required to send its traffic in one slot and receive in the other. The times in between allow the phone to power down its radios in a predictable way to save power. The overall repeating pattern of slots is called a frame. Each frame repeats nearly every five milliseconds, which means that voice samples have to be packaged up into these short units. The strict time sharing that GSM requires adds some complexity to the radios. The system is not forgiving if a device gets the time slot wrong, because of the precise, periodic nature of the system. Much of GSM’s complexity comes into play ensuring that every device is synchronized so that they do not step on each other, even though the devices may at different, long distances from the base station, and so the speed of light and propagation delay impact the timing. Each GSM channel provides only about 270kbps of total capacity, in which each frame asks for the traffic from eight full-rate voice streams (and thus, phones in calls). Each full-rate direction of a voice call encodes to 13kbps. This is the GSM codec that was referred to in previous chapters, and is used by some IP-based telephone equipment as well. GSM is defined in a few licensed bands. There are four bands available worldwide. The United States and Canada use the 850MHz and the 1900MHz bands. The 850MHz band has 25MHz (barely wider than one Wi-Fi channel) for each direction: uplink is sent starting a 824MHz, and downlink is sent starting at 869MHz. These channels are spaced every 200kHz, and so there are 124 channel numbers, representing a pair of uplink and downlink narrowband slices. Voice over cellular networks is incredibly efficient in terms of spectrum, compared to voice over packet-based networks, although it must be pointed out that a link to a phone provides enough bandwidth for only one voice call, and sending data packets on that system is more complicated. The rest of the modern world uses the 900MHz and 1900MHz bands, which provide for more channels in total. Phones that are built to work worldwide on GSM must be quad-band; that is, they must support both the North American and international pair of bands. 7.2.1.3 GSM Data GSM data services are provided by allowing the phone to allocate air resources that would be used for other bearer channels, and instead is used to drive a different radio and protocol for sending packet data. The first method is called General Packet Radio Service (GPRS). GPRS uses an uplink and a downlink GSM channel, but drives a packet radio over those bands. This provides . well. GSM is defined in a few licensed bands. There are four bands available worldwide. The United States and Canada use the 850MHz and the 1900MHz bands. The 850MHz band has 25MHz (barely wider than. another, and as long as the pivot device can get the new leg allocated without breaking the old one—a make-before-break scenario—the handoff can occur cleanly and without major changes. When the handoff. type of handoff. If the phone crosses to a new base station controller, however, the handoff occurs higher up the hierarchy. As mentioned before, handoffs within one gateway switch can be handled

Ngày đăng: 03/07/2014, 19:20

Mục lục

    NewNes Publishing - Scalable VoIP Mobility (2009) (ATTiCA)

    Introduction to Voice Mobility

    Introduction to Voice Mobility

    Audience and Expected Background

    How to Read This Book (Chapter Layout)

    The Anatomy of a Voice Call

    The People and Their Devices: Phones

    The Separate Channels: Signaling and Bearer

    Dialing Plans and Digits: The Difference Between Five- and Ten-Digit Dialing

    Why PBXs: PBX Features

Tài liệu cùng người dùng

Tài liệu liên quan