Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
GSM Bursts
In addition,
Frequency Correction Burst Synchronization Burst Random Access burst
GSM Channels
Traffic Channels (TCH) Control Channels (CCH) Common Control Channels (CCCH) Paging Channel (PCH): Used by the BTS to inform the MS about an incoming call. Broadcast channel. Random Access Channel (RACH): Used by the MS for call establishment. Shared by all MS in cell. Slotted-ALOHA random access. Access Grant Channel (AGCH): Used to indicate the slot assignment.
GSM Channels
Control Channels (CCH) Dedicated Control Channels (DCCH): Used to control individual MS Standalone Dedicated Control Channel (SDCCH) : Two-way channel assigned to each MS for keeping track of movement and call establishment. Certain slots periodically. About 2Kbps per MS. Slow Associated Control Channel (SACCH): Two-way channel assigned to a TCH or SDCCH. Used to report parameters, such as signal power, to maintain the link. Fast Associated Control Channel (FACCH) : Two-way channel used to support fast transitions when SACCH is not adequate. FACCH steals the TCH.
GSM Channels
Control Channels (CCH) Broadcast Channels (BCH). Used to broadcast information to the MSs in the cell Frequency Correction Channel (FCCH) and Synchronization Channel (SCH): Keep the MS synchronized Broadcast Control Channel (BCCH): provides information such as cell ID, available services, Can also be used to keep track of signal strength for handoff
http://elm.eeng.dcu.ie/~kaszubow/Biography/Lecture5.pdf
Management of GSM
Mobile System (MS)
Mobile Equipment (ME) Subscriber Identity Module (SIM)
Visitors Location Register (VLR) Home Location Register (HLR). Authentication Center (AuC). Holds different algorithms for authentication and encryption. Operations and maintenance center (OMC)
ME and SIM
ME, has the IMEI (International Mobile Equipment Identity) SIM card, has Ki: Subscriber Authentication Key. 128 bit key shared by the subscriber and the operator. Stored in the SIM card and the HLR PIN: to protect the SIM card IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity. To prevent eavesdropping, TMSI is used instead of IMSI. IMSI is used as rarely as possible. TMSI is randomly generated by the VLR. MSISDN: Mobile Station International Service Digital Network LAI: Location Area Identification
GSM Security
When a mobile station needs to be authenticated,
1.
2.
3.
4.
5.
The operator generates a random number, RAND (128 bit), and sends to the MS. The MS and the operator both runs an algorithm, called the A3 algorithm, with Ki as the key, to produce SRES (32 bit) from RAND The MS sends the SRES to the operator, and if SRES matches the operators SRES, consider passed authentication RAND is passed to an algorithm called A8 as input with Ki as the key, to produce Kc (64 bit). Done by both the MS and the operator Kc becomes the key for the A5 algorithm. A5 is a stream cipher for encrypting the data.
3. 4. 5. 6. 7.
8. 9.
2
home MSC consults HLR, gets roaming number of mobile in visited network
correspondent
1 3
VLR
Mobile Switching Center
4
mobile user visited network
14
home MSC sets up 2nd leg of call to MSC in visited network MSC in visited network completes call through base station to mobile
stronger signal to/from new BSS (continuing connectivity, less battery drain) load balance: free up channel in current BSS GSM doesnt mandate why to perform handoff (policy), only how (mechanism)
15
VLR
1 8
old BSS
7 3 6
new BSS
16
GRPS
Multiple Access
Users are assigned frequency channels and time slots. Packets are constant length, determined by the GSM slot. Downlink: first come first served Uplink: Slotted ALOHA for reserving, dynamic TDMA for data transmission
Reading
http://liny.csie.nctu.edu.tw/ch09A4.pdf http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html http://www.eventhelix.com/realtimemantra/Telecom/GSM_Originating_Call_Flow.pdf
3G Overview
Use CDMA. Generally, 3G will have a much better support for data services. The numbers are different depending on the versions, but it will be about at least one order of magnitude higher than GRPS. Defines an air interface and maybe combined with the GSM/GRPS core network There are competing standards: W-CDMA CDMA2000
CDMA Review
Users assigned different code, also called chip sequence A data bit is multiplied with the chip sequence, to spread the baseband bandwidth to a much larger bandwidth The codes for different users are orthogonal
W-CDMA
Key features include
Radio channels 5MHz wide, both uplink and downlink Chip rate 3.84Mcps Frame length 10ms Adaptive power control updated 1500 times per second Cells not synchronized (synchronized in CDMA2000)
OVSF
Generation of OVSF code based on a simple binary tree Start with the root node {1}. A node has two children. The upper and lower. If the node as code C, the upper child is assigned code CC, and the lower child is assigned CC (C means inverting every bit in C). Repeat. Two codes are orthogonal as long as no one is the prefix of the other A major issue is how to assign codes
HSDPA
Adaptive modulation and coding (AMC)
Depending on the channel state, send at different data rates. Use lower data rate if channel is weak In wireless LAN, the rate adaptation
HSDPA
Fast packet scheduling
Each user transmits to the base station the signal quality The base station determines which user to send to for the next 2ms
Send to users with stronger channels May send to multiple users simultaneously with the channelization code Must also ensure fairness
Readings
http://www.ericsson.com/technology/whitepapers/innovations_in_wcdma.pdf