iBTS Presentation

advertisement
iBTS Overview
0
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 0
iBTS description
 The term iBTS stands for e-mobility Internet BTS.
 The following types of iBTS are available:
• Indoor version (600 or 700)
• Outdoor version
 The main function of iBTS are:
• provide the means of communication between a UE and a network
 A Node B is a logical node responsible for radio transmission/reception in one or
more cells to/from the User Equipment.
 A Node B may consist of one or several iBTS ?
1
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 1
Physical interfaces(1/2)
The NodeB provides 2 interfaces: Iub -> with the RNC
Uu -> with the mobile
The Iub interface consists of E1 Link connected to the CCM card.
 The Uu also called (air or radio interface) consists of RF ports
corresponding to main and diversity antenna(s) for one or several sectors.
2
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 2
Physical interfaces(2/2)
 Several configurations are supported regarding the release and the number of
cards.
The current configuration in V1 is called STSR-1, which means Sectorized Transmitted,
Sectorized Received with 1 carrier frequency. For one sector only, we call it O1.
We use FDD (Frequency Division Duplex) mode,
i.e the uplink and downlink signals are not carried by the same frequency.
 The frequency range in FDD mode is :
• 2110-2170 MHz for Downlink
• 1920-1980 MHz for Uplink
3
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 3
Outdoor & Indoor iBTS views
4
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 4
iBTS Cards
C
C
E
E
M
M
5
4
1
2
T T C
R R C
M M M
1 2 1
R
E
C C C C T
S
E E E E E R
R
M M M M M
V
E 1 2 3 6 3
D
F
G
P
S
A
M
P
A
1
I
L
L
F
F
P
I
P
I
A
L
A
L
3
L
5
L
E
E
E
R
R
R
3 4 5 6 7 8 9 10 11 12
DDM 1
DDM 2
DDM 3
Configuration for V1.1
Additionnal cards for inventory purposes (V1.2 and higher)
5
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 5
Configuration Evolution (1/2)
V1.1
V1.2
1 CCM, 1 CEM, 1 TRM
1 carrier
1 to 3 PAs
no Tx diversity
1 to 3 DDMs
no redundancy
Configurations supported:
O1, STSR1
1 CCM, 1 to 2 CEMs
1 carrier
Configurations supported:
1 to 2 TRMs
no Tx diversity
O1, STSR1
1 to 3 PAs
no redundancy
1 to 3 DDMs
1 CCM, 1 to 2 CEMs
V2
1 to 2 TRMs
Multi carriers (up to 2)
1 to 3 PAs
no Tx diversity
1 to 3 DDMs
no redundancy
Configurations supported:
O1, OTSR1, OTBR1,O2,STSR2
1 Tx Splitter
6
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 6
Configuration Evolution (2/2)
2A
4A
6A
TRM
PA
DDM
Tx
Splitter
Nb Cells
Carrier/
Cell
Nb
Carriers
O1
1
1
1
0
1
1
1
O1-D
1
2
1
0
1
1
1
O2
2
1
1
0
1
2
2
OTSR1
1
1
2
1
1
1
1
STSR1
1
2
2
0
2
1
2
STSR1-D
1
4
2
0
2
1
2
STSR2
2
2
2
0
2
2
4
STSR3
3
2
2
0
2
3
6
OTSR1
1
1
3
1
1
1
1
STSR1
1
3
3
0
3
1
3
STSR1-D
1
6
3
0
3
1
3
STSR2
2
3
3
0
3
2
6
STSR2-D
2
6
3
0
3
2
6
7
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 7
DIGITAL SHELF(1/4)
CCM (Core Control Module)
 Functions:
• Iub interface
• Call Processing
• Data switching and routing
• OAM Management
• iBTS frequency and timing reference
Serial port
Ethernet port
 The CCM consists of 3 boards
E1 links
• BRIC
• AXE
• CCMIC
8
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 8
DIGITAL SHELF(2/4)
CEM (Channel Element Module)
 Function:
• digital signal processing for both Tx and Rx paths.
 The functionnal block of the CEM can be divided into 2 units:
• The BBU (Base Band Unit) function
• The ICU (Interface and Control Unit) function
9
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 9
DIGITAL SHELF(3/4)
TRM (Transceiver Receiver Module)
 Functions:
Towards the PAs
• modulation & demodulation
• digital-analog & analog-digital conversion
Downlink Path
• up and down frequency conversion
 The TRM consists of 2 boards:
• 1 dTRM board
• 1 rTRM board
To the Interco
From the DDMs
Uplink Path
10
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 10
DIGITAL SHELF(4/4)
GPSAM (GPS & Alarm Module)
Towards the
Dallas
modules
 Functions:
• collection of the alarms, inventory and commissioning
information
• supply of timing information
 The GPSAM is connected to the CCM through the backplane
 The GPSAM has no debug port.
11
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 11
RF Block(1/2)
PA (Power Amplifier)
From the TRM
 Functions:
• downlink signal amplification
 The MCPA is connected to the antenna through the DDM
 It can handle up to 4 carriers.
Towards the DDM
12
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 12
RF Block(2/2)
DDM (Dual Duplexer Module)
 Functions:
• separate the downlink and uplink paths
• low noise amplifier
From the PAs
To the antennas
Uplink path
13
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 13
Data architecture(1/2)
 The CCM, CEM and TRM cards contain FFS (Flash File System)
in which data are stored.
CCM
CEM
TRM
/ffs0 -> Software version N
/ffs0
/ffs0
/ffs1 -> Software version N+1
/ffs1
/ffs1
/data ->info. about the
software versions
/data ->info. about the
software versions
/ram
/ram
/ffs2 -> for GSM only
/data -> info. put
after the reboot
/ram
14
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 14
Data architecture(2/2)
• These ffs can be seen as directories, mounted at each reboot.
• There is only one active ffs at a given time.
• It is forbidden to write or delete files in the active ffs.
• The ffs are accessible through a ftp session.
 Information about card types and software references are stored in the
MIM (Memory Information Module) of each digital card.
 The MIM is accessible through a telnet session.
15
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 15
TIL (Terminal d’ Installation Locale)
 The TIL is a tool used to configure some parameters inside the iBTS.
 It consists of 2 elements:
• a TIL Server present on the CCM card
• a TIL Applet downloadable on a PC from the CCM
 Using the TIL, you can:
• download new software,
• display the current alarms,
• display the BISTS results,
• display and change I&C parameters.
16
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 16
Connecting to the iBTS with TIL
A laptop with:
 The TIL is used locally on
•A browser(IE or
Netscape)
site for first commissioning.
•Java 1.3.0 plugin
Direct Connection through
a crossed cable on the
Ethernet port of the CCM
(2nd one)
CCM
17
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 17
I&C Parameters(1/3)
 The I&C (Installation & Commissioning) parameters need to be set once, with the
TIL, after the iBTS is installed.
They consist, among other things, in OAM parameters such as:
•Vcc for the OAM path
•IP/ATM address for the iBTS,
•IP address for the Main Server
•…
 The OAM parameters are used to establish a remote connection to the iBTS from
an OMC-B and thus performing operations such as: Open Link, Software
Downloading and Build.
18
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 18
I&C Parameters(2/3)
Some of I&C parameters can be
displayed
and changed using the TIL:
19
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 19
I&C Parameters(3/3)
The I&C parameters are stored in 3 Memory modules (type Dallas DS2433) called SIM,
IC1 and IC2.
 The content of these modules is retrieved by the GPSAM card and sent to the CCM at
each reboot.
 The SIM contains manufactury information.
 The IC1 contains the commissioning parameters.
20
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 20
Connecting to the iBTS with OMC-B
OAM
Main Server
Once the I&C parameters are correctly set inside the BTS,
the latter sends a request to the OMC-B in order to establish
a connection. If the OMC-B responds to this request, the link
LAN
is said to be open.
The OMC-B can then retrieve the alarms from the iBTS
and perform management operations.
Remote Connection
through E1 link
CCM
21
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 21
OAM & Data Paths
CN
Access Node
(AN)
Towards the Core
Network
E1 link
IN
Optical Fiber
Ethernet link
iBTS
E1 link
LAN
Signalling & Data Path
OAM Path
Main Server
22
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 22
iBTS Upgrade
 The Upgrade can be done using the Upgrade Manager,
if the iBTS is connected to the OMC-B.
 If not, it is also possible to use the TIL on a laptop directly connected to the CCM card.
 The software is downloaded into the CCM card and then, distributed to the other cards
of the iBTS through HSSL (High Speed Serial Links) on the backplane.
23
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 23
BTS Build(1/3)
 The Build is an operation performed from the OMC-B and intended for giving
the iBTS the parameters needed to communicate with the RNC.
 The result of the Build is a file named DLU.TXT. It is downloaded to the iBTS
and contains:
• The VC for AAL5 and AAL2
• The ATM profiles
• The BTS serialisation number
•…
 Despite its extension, the DLU.TXT file is in binary format and can not be
read directly with a text editor.
24
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 24
BTS Build(2/3)
3
steps:
1 The OMC-B checks the software version present in the passive ffs.
If it is not the same as the one present in the active ffs, the files are copied
from active ffs into passive ffs.
Active ffs
Passive ffs
Version X
Version Y
If Version X
Version X
Version Y
Version X
25
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 25
BTS Build(3/3)
2 The OMC-B downloads the DLU file inside the passive ffs.
3 The passive ffs is activated and the BTS restarts.
26
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 26
Cell Setup (1/2)
 Once the iBTS is built:
iBTS
RNC
SSCOP link
NBAP:NodeB restart indication
NBAP:NodeB resource notification
NBAP:Cell Setup Request
NBAP:Cell Setup Response
27
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 27
Cell Setup (2/2)
iBTS
RNC
NBAP:CTCH Setup Request (FACH)
NBAP:CTCH Setup Response (FACH)
NBAP:CTCH Setup Request (RACH)
NBAP:CTCH Setup Response (RACH)
NBAP:SysInfo Update Request
NBAP:SysInfo Update Response
28
NORTEL NETWORKS CONFIDENTIAL
Presentation name - Date - 28
Download