Sei sulla pagina 1di 88

GSM SYSTEM Part 2 PREPARED BY

SANJAY BHATTACHARYA ITX 5

GSM RADIO INTERFACES

For the connection of the different nodes in the GSM network, different interfaces are defined in the GSM specifications GSM has the following Radio Interfaces: Um Interface, Abis Interface, A Interface

U m interface is also called as Air interface. The Air Interface is the interface between the BTS and the MS The air interface is required for supporting Universal use of any compatible mobile station in a GSM network.

Maximum spectral efficiency

A bis -interface is the interface between the BSC and the BTS. The interface comprises traffic and control channels.

Functions implemented at the A bis -interface are Voice-data traffic exchange, Signaling exchange between the BSC and the BTS
Transporting synchronization information from the BSC to the BTS

A-interface is the interface between the BSC and the MSC. The Physical Layer is a 2 Mb/s Digital Connection. The Signaling uses MTP (Message transfer Part) and SCCP (Signalling Connection Control Part) of Signaling System 7. ---- BSS Management Application Part looks after Radio Resource handling in BSS and ---- BSS Operation and Maintenance Application Part supports all Operation and Maintenance works of BSS

GSM CHANNEL STRUCTURE

Every base station sends on at least one frequency in 8 timeslots. It has become common practice to refer to physical channels that are defined by frequency and timeslot. Several "types" of data are sent on these physical channels, e.g. speech, test reports, instructions, etc. For these data types the term "logical channel" is used.

GSM CHANNEL STRUCTURE


One or more logical channels can be transmitted on a physical channel. The type of logical channel is determined by the function of the information transmitted over it. The following are the logical channels:Traffic channels Control channels (signaling channels)

BCC H

The Traffic Channels are used to send Speech or User Data in both MS to BTS and BTS to MS directions.
They are distinguished by their transmission rates The Traffic Channels can work in Full Rate or Half Rate.

A TCF/F or a TCH/H may also be used to send signalling information (eg. Call forwarding & SMS)

-Traffic channel using full-rate transmission a full-rate channel operating at 22.8 kbit/s. 13 kbit/s are used for speech transmission, the rest is basically used for error protection. For data transmission, 12, 6 or 3.6 kbps is used. These are compatible respectively to the existing 9.6, 4.8 and 2.4 kbps PSTN and ISDN services

-Traffic channel using half-rate transmission a half-rate channel operating at 11.4 kbit/s. 6.5 kbit/s are available for speech transmission. For data transmission, 6 or 3.6 kbps is used

The main function of the control channels is to transfer signaling information. They are sub divided into three categories
Broadcast channels Common control channels

Dedicated control channels

BROADCAST CHANNELS
Broadcast Channels are point to multipoint channels defined for down link direction i.e. BTS to MS (Downlink). The information distributed over the broadcast channels helps the mobile stations to orient themselves in the mobile radio network. These are further classified into four

Broadcast Control Channel (BCCH),


Frequency Correction Channel (FCCH) Synchronization Channel (SCH). Cell broadcast channel (CBCH)

BCCH: Through this channel, the MS is informed about the system configuration parameters(eg. Location Area Identification, Cell Identity, and neighbor cells). Using this information, the MS can choose the best cell to be attached to. FCCH: To communicate with the BTS, the MS must tune to the BTS. The FCCH transmits a constant frequency shift of the radio frequency that can be used by MS for frequency correction.

SCH is used to time synchronize the mobile stations. The data on this channel carries the TDMA frame number (TDMA Matching) and the base station identity code (BSIC). CBCH: is used for the transmission of the generally accessible information in a cell (SMS), which can be polled by MS.

COMMON CONTROL CHANNELS (CCCH)

Point to Multi-point Control Channels


operated in one direction of transmission, either in up link or in down link direction. Used to carry Management Function Signalling Information (access management).

There is one CCCH between MS to BTS (Up link ). Random Access Channel (RACH) : When MS is switched ON, RACH is used to search network, i.e., used for requesting access to an exclusive control channel (DCCH).

There are two CCCH between BTS to MS (down link ).


Paging Channel (PCH) : used for paging the Mobile stations during an Incoming Call (Alert Message).

Access Grant Channel (AGCH) : used for assigning an MS to a Dedicated Control Channel, i.e., gives acknowledgement to RACH

DEDICATED CONTROL CHANNELS (DCCH)


Full duplex point-to-point channels
Used for Signalling between BTS and certain MS These are of three types Slow associated control channel (SACCH) Fast associated control channel (FACCH)

Stand alone dedicated control channel (SDCCH)

SACCH is used

for transmission of --- signaling data, --- radio link supervision measurements(receive field strength and quality), --- transmit power control and --- timing advance data.
Always allocated to a TCH or SDCCH.

Only used for non-urgent procedures

FACCH is used as a main signaling link for the transmission of signaling data which cannot be postponed (eg. handover commands) required for call setup and release. SDCCH is used For signaling in higher layer.

Carries all signalling between the BTS and MS when no TCH is allocated (i.e., when no call is in progress).
Used for service requests (like SMS), location updates, subscriber authentication, ciphering initiation, equipment validation and assignment to a TCH (Dialled digits are processed through SDCCH)

MULTIPLEXING LOGICAL CHANNELS INTO PHYSICAL CHANNELS

Several of the logical channels can be transmitted over one single physical channel (timeslot). The GSM specifications 05.02 specify several combinations of channel types (the sequence of logical channels is fixed).
The order of the logical channels depends on the channel combination.

The channel combinations are: 1.TCH/F + FACCH/F + SACCH/F 2. TCH/H + FACCH/H + SACCH/H 3. (TCH/F + FACCH/F + SACCH/F) or (TCH/H + FACCH/H + SACCH/H) 4. FCCH + SCH + BCCH + CCCH 5. FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/4 6. BCCH + CCCH 7. SDCCH/8 + SACCH/8
NOTE: The CCCH carries both the PCH and the AGCH on the downlink, and the RACH on the uplink.

The extensions /4 and /8 that four and eight logical channels are mapped onto one physical channel (timeslot).

If we use normal PCM concept the output data rate will be 64Kbps. Digital cellular radio cannot handle the high bit rate used for PCM. For reduction of bit rates Vocoders are used Vocoder is a digital hardware block, which will do the speech analysis and Synthesis They use complex algorithms to analyze the speech

The full rate channel operates with a protected bit rate of 22.8kbps where in the speech itself only uses 13 kbps. The speech quality is comparable to the fixed PSTN quality. GSM speech coding scheme at 13 kbps uses a technique called linear prediction coding with regular pulse excitation (LPC RPE)

Three classes of speech coding: i. Wave Form Coding Speech signal is transmitted as good as possible eg. PCM. Good Quality (B/W= 300-3400Hz & S/N > 30dB) Bit rate range---- 24-64kbps

ii. Parameter Coding Limited quantity of information (parameter) are sent 1-3 kbps required for speech transmission Regenerated speech is intelligible but suffers from noise and speaker cannot be recognized
iii. Hybrid Coding Mix of wave form and parameter coding Used in GSM

STEPS: The 64 kbps PCM is transcoded from the standard A-Law( quantised 8-bit/sample stream into a linearly quantised 13bits/sample stream, giving rise to a 104kbps bit rate) The 104kbps stream is fed into the RPE-LTP full-rate speech encoder, which takes the 13-bit samples in blocks of 160 samples (every 20ms) The RPE-LTP encoder produces 260 bits in every 20ms.

The classification of the bits are as Class Ia 50 bits Most important and sensitive to bit errors. Class Ib 132 bits Moderately sensitive to bit errors Class II 78 bits Least sensitive to bit errors.

Class -I

The 182 class-I bits need protection over the radio link. Transmission errors in this class would have an extremely serious effect The 78 class-II bits are sent without protection

The data to be transmitted over the interface must be protected against corruption due to the effects of fading and co-channel interference.
The channel coding increases the bit rate from 13kbps to 22.8 kbps through protection to the Class I bits

Class 1a bits are given a 3-bit CRC so that errors can be detected.

Total length becomes 53 bits .


If there are any errors; the frame will not be used and discarded. In its place a version of previous correctly received frame is used. 53 bits + 132 bits + a 4-bit tail sequence (total length 189 bits)are entered into a half rate convulsion encoder. The encoder encodes each of the bits that enter as two bits. Thus, output of encoder is 378 bits

The remaining 78 bits are simply added to data to get a total of 456 bits

In a nut shell:
50+3+132+4=189, 189X2=378, 378+78=456 bits Thus, every 20ms speech sample generates a total number of 456 bits. Accordingly the overall bit rate is 22.8Kbps.

The aim of interleaving is to distribute sub blocks of data obtained by channel coding in such a way that one data block is distributed over several TDMA frames. The sub blocks are rearranged for this purpose and transmitted in a different order. 1. The 456 bit blocks from the channel encoder are fed to the bit interleaver where they are split into eight sub blocks of 57 bits. 2. 57 bits at a time will be interleaved with 57 bits from an adjacent speech block to form a data burst of 114 data bits 3. These data burst are transmitted in one timeslot The sub blocks interleaved in time are reassembled in the correct order upon reception to form complete data blocks. The data are then checked for errors and corrected as necessary.

TDMA FRAMES STRUCTURE IN GSM

GSM timing is based on transmission time of one bit (approx. 3.69 ms)

A certain number of these bits is combined to form a burst and is transmitted in one timeslot.
Eight timeslots form a frame. A certain number of these frames is combined to give a multiframe. Since there are several types of multiframe, certain numbers are grouped together to form standard hyperframes and superframes.

TDMA FRAME

TDMA frame: A TDMA frame consists of eight timeslots (physical channels). The length of a timeslot is 0.577 ms. The length of a TDMA frame is therefore 4.615 ms. The data on a timeslot is transmitted in bursts, the length of a timeslot is often expressed in BP (Burst Period); 1 BP represents the length of 1 timeslot. 26-TDMA multiframe: This multiframe is defined as a succession of 26 TDMA frames, and corresponds to the 26 x 8 BP or 120 ms (26x4.615) also called a Traffic Multiframe

51-TDMA multiframe This multiframe is defined as a succession of 51 TDMA frames, and corresponds to the 51 x 8 BP cycle used in the definition of the TCH/F, TCH/H and of the common channels (also called a Control Multiframe) Super frame: The super frame is a succession of 51 x 26 TDMA frames (6.12 sec), and corresponds to the smallest cycle for which the organization of all channels is repeated. (51 traffic Multiframes or 26 Control Multiframes) Hyper frame: The hyper frame is the numbering period. It is 2048 Super Frames (2048 x 51 x 26 x 8 BP long), or 3 hours, 28 minutes, 53 seconds and 760 milliseconds. It is a multiple of all previously cited cycles, and determines all the cycles in the transmission of the radio path. It is in particular the smallest cycle for frequency hopping and for ciphering.

BURST

GSM radio transmission is accomplished by sending data in bursts. Burst is the physical content of a time slot. Information is exchanged between the base station and mobile station in the timeslots. 1 time slot(0.577 msec)

Depending on the task to be performed, different types of burst can be used. It is used for signalling as well as for speech and data transmission. Each part of the burst serves a specific purpose :

TAIL BITS
Tail bits (flag bits) at the beginning define the start of a burst, and at the end define the end of a burst

INFORMATION (ENCRYPTED) BITS


The normal burst is able to transmit a total of 114 bits so that a maximum data rate of approx. 24.8 kbit/s is obtained by 2nd generation GSM.

The transmission rate within the system can only be increased when more than one timeslot is used (General Packet Radio Service GPRS, High-Speed Circuit-Switched Data HSCSD) Or another modulation method (8PSK modulation with EDGE, Enhanced Data Rate for GSM Evolution).

TRAINING SEQUENCE
In the middle of the normal burst, a 26-bit training sequence is sent, the bit sequence being known to the receiver.

There are eight different sequences which are referred to as the training sequence code (TSC).
The eight sequences must be stored in all receivers and at the beginning of a transmission the base station decides on the TSC to be used. The training sequence performs two main tasks: bit synchronization and estimating the channel impulse response (instantaneous response of the radio channel). Using this estimate, the channel equalizers in the receivers can be set for optimum data stream decoding.

BIT SYNCHRONIZATION
The GSM training sequence is used for fine bit synchronization and for block synchronization. Since the training sequence is not sent at the beginning of a burst, the received data stream must be buffered in the receiver and decoded later on. Synchronization itself makes use of cross-correlation, i.e. the stored data stream is compared bit-by-bit with the expected training sequence.

When the position of the training sequence is known, the timing of the information bits is also known and fine tuning of the bit-clock is performed.
A burst that does not contain the expected training sequence cannot be synchronized and decoded.

COMPENSATION OF MULTIPATH RECEPTION


In addition to RF level fading, there is another annoying effect which, without compensation, would make correct signal decoding rather difficult. Because of the extra length of the indirect paths, the signals at the receiving antenna not only have different phases but the modulated information arrives at different times. With delays greater than 15 s, identification of the received signal components and echoes becomes more and more difficult. This problem can also be solved with training sequences. The echoes on the indirect paths also contain the echoes of the training sequence. The cross-correlation method used to find the original training sequence may also be used to find the training sequence echoes as well as their delay and attenuation. With the aid of this information, the received signal can be corrected by a channel equalizer.

GUARD PERIOD
Transmission in each time slot is terminated with a guard time of 8.25 bit periods (8.25 x 3.69 s 30 s) during which no information bits can be sent.
During this time, the burst level must be reduced by up to 70 dB to avoid the next timeslot being affected. The "owner" of the subsequent timeslot uses this time to increase his transmitter power to nominal. This means that the guard time is used twice for power ramping (the transmitter power must be increased and reduced within narrow tolerances).

GP is also used for Timing Advance

TOGGLE/STEALING FLAG BITS


The network has the option to use the information bits in the normal burst to send signaling data as needed. By setting a flag, using the stealing flag bits, the receiver can distinguish between user data or signaling information. The two stealing flag bits are located just before and after the TSC . The stealing flag bits indicate whether the adjacent 57 bits in the associated data field contain speech/data information or are stolen from the traffic channel for carrying pre-emptive FACCH signalling information.

TYPES OF BURSTS
Normal burst Dummy burst Access burst Synchronization burst Frequency correction burst

Normal burst is the most frequently used burst used for transmission of user data/signaling data (on TCH).

Two packets of 58 encrypted bits (57 data bits + 1 stealing flag bit) are carried for the TCH, or for the control channels (BCCH and CCCH) but not for RACH

DUMMY BURST
The dummy burst has the same structure as that of normal burst. It is transmitted in idle time slots on the BCCH, which ensures that BCCH is always present This makes it easier for the MS to find the BCCH carrier and permits assesment of neighboring cells.

ACCESS BURST
The access burst is sent when the mobile station calls the base station for the first time. The base station uses this burst for a delay measurement, determines the associated timing advance and informs the mobile station accordingly. It provides a 41-bit TSC that is longer than the normal 26 bits in order to make the initial demodulation for the BTS more successful

SYNCHRONIZATION BURSTS
Synchronization bursts are used to synchronize MS with BTS in time.
It is the first burst in the downlink direction, used on the SCH.

It provides a unique 64-bit TSC in order to facilitate the initial demodulation for the MS.
The encrypted bit fields contain the BSIC and the TDMA frame no.

FREQUENCY CORRECTION BURST


Frequency correction burst is sent by the base station only and used by the mobiles for initial synchronization to the carrier frequency ,i.e.,to correct its transmit and receive frequencies. It is sent in the downlink direction as the FCCH. It consists of a bit string of all logical 0s It is sent by the base station every 10 frames (i.e. approx. every 46 ms) but only in timeslot 0

NETWORK ATTACHMENT PROCESS


It is the process of selecting an appropriate cell (radio frequency) by the MS to provide the available services, and making its location known to the network. The process starts when the mobile is switched on, and ends when the MS enters the idle mode.
Consists of the following tasks: Cell Identification PLMN Selection Cell Selection

CELL IDENTIFICATION
When MS is switched on, it attempts to make contact with a GSM PLMN by performing following actions Measure the BCCH channel Search for a suitable cell The MS measures the signal strength of the BCCH channels received. It stores a list of information about 30 of these BCCH channels, such as signal strength and the frequency corresponding.

PLMN SELECTION
Particular PLMN can be selected in either of the two modes AUTOMATIC MODE MS will choose which PLMN to try by itself, based on the existence of the preferred list, which is stored in a non-volatile memory in the SIM. This list includes a no. of PLMN identities in order of preference and is under control of the user. The most preferred is usually the Home PLMN. This mode is normally used when the MS is operating on its home PLMN. MANUAL MODE The user is presented a list containing all found PLMNs. The user chooses one of the PLMNs from the list

CELL SELECTION
The MS attempts to find a suitable cell by passing through the list in descending order of received signal strength. The requirement that a cell must satisfy before a MS can be provided service from it are It should be a cell from the selected PLMN. It should not be barred.
The PLMN operator may decide not to allow MS to access certain cells. These cells may, for example, only be used for handover traffic. Barred cell information is broadcast on the BCCH to instruct MSs not to access these cells.

The radio path loss between the MS and the selected BTS must be below a threshold set by the PLMN operator It should not be in a LA which is in list of forbidden LAs for roaming

If the MS is unable to find a suitable cell to access, it attempts to access a cell irrespective of the PLMN identity, and enters a limited service state in which it can only make emergency calls.

LOCATION UPDATE PROCESS


STAGE
1 Request for service

DESCRIPTION
The MS detects that it has entered a new location area and requests to update its location. The new MSC/VLR identifies the MS The new MSC/VLR requests to the AUC for authentication parameters. Using these parameters, the MS is authenticated. Using the parameters which were made available earlier during the authentication, the uplink and the downlink are ciphered The new MSC/VLR requests to update the MS location in the HLR. The MS is deregistered in the old VLR The MS is assigned a new

Authentication

Ciphering

4 5

Update HLR/VLR TMSI re-allocation

Um

MS

BSS

New MSC/VLR

Old MSC/VLR

HLR

Channel Request RACH


SDCCH Assignment

AGCH Location Update Request (TMSI & old LAI) SDCCH Request IMSI (TMSI)

Send IMSI

Authentication Ciphering Update HLR/VLR TMSI re-allocation

CALL MANAGEMENT MOBILE TO LAND LINE

CALL MANAGEMENT:
Phases of MS to PSTN call (Mobile to land line)
1. Request for service: MS request to setup a call

2. Authentication: MSC/VLR requests the AUC for authentication parameters.


3. Ciphering: Using the above parameters, the uplink and down link are ciphered. 4. Equipment validation: MSC/VLR requests the EIR to check the IMEI for validity. 5. Call setup MSC establishes a connection to MS.

Call process
The user presses the send key after all digits have been entered.
1. MS transmits a channel request message over RACH.

2. Once the BSS receives the channel request, it allocates a SDCCH and forwards this channel assignment information to the MS over AGCH. It is over the SDCCH that MS will communicate with the BSS and MSC until a traffic channel is assigned.
3. MS transmits a service request to BSS over SDCCH. In this message it informs TMSI and location area identification (LAI). The BSS forwards the service request message to MSC.

4.The Authentication and ciphering phases are then performed by Ki and Kc keys 5.The MSC transmits a request to the MS requesting it to respond with its IMEI 6.Upon receiving this request, MS reads its equipment serial number and returns this value to MSC 7.MSC then requests the EIR to check the validity of IMEI 8.The EIR returns the results of the IMEI validation to MSC

9. After receiving the call setup request transmitted by the MS, the MSC

will ask the VLR to supply subscriber parameters necessary for handling the call. 10. VLR returns a message to MSC containing service parameters for the particular subscriber. 11. MSC informs to MS that the call is proceeding.

12. MSC allocates a trunk to BSS to current MS and requests BSS to allocate TCH for MS. 13. BSS allocates a radio traffic channel and transmits this assignment to MS over SDCCH.

14. The MS tuned to the assigned traffic channel and transmits an acknowledgement to BSS. 15. At this time a voice path is established between MS and MSC. 16. MSC establishes a voice path from MSC to PSTN by sending a request including dialed digits and details specifying the trunk should be used for.

17. After this process MSC will inform to MS and it will get the ringing tone.

Call release process:


Under normal conditions, the termination of a call is MS initiated or network initiated. In this scenario we will assume MS initiated the release of a call. 1. The mobile user initiated the release of the call by pressing end button on the MS. The MS sends a disconnect message to MSC. 2. The other party is notified of the termination of the call by a release message from the MSC. The end-toend connection is terminated.

STEPS IN REQUEST FOR SERVICE PHASE


Um

MS

BSS

New MSC/VLR

Channel Request RACH


SDCCH Assignment

AGCH Service Request (MS,LAI) SDCCH Authentication Ciphering Equipment Validation Call Setup Handover Call Release

Back

STEPS IN EQUIPMENT VALIDATION PHASE


Um

MS

BSS

MSC/VLR

HLR
Request for service Authentication Ciphering

IMEI Request SDCCH IMEI Response(IMEI) SDCCH

Check IMEI

IMEI Check Results Call Setup Hand Over Call Release

STEPS IN CALL SETUP PHASE--WITH MS


Um

MS

BSS

MSC/VLR

Request for service Authentication Ciphering Equipment Validation

Call Set Up Request SDCCH

Call Proceeding

SDCCH

Back

VOICE PATH ESTABLISHMENT


Um

MS

BSS

MSC/VLR

Assign Trunk & Radio (TN) Assign TCH SDCCH Radio Assignment Complete SDCCH
Trunk & Radio Assignment Complete

Back

Hand Over Call Release

STEPS IN CALL SET UP PHASEWITH LAND NETWORK


Um

MS

BSS

MSC/VLR

PSTN
Request for service Authentication Ciphering Equipment Validation

Network Set Up (DD)

Network Alerting
Alerting FACCH Connect (Answer) Start Billing Connect FACCH Connect Acknowledgement

FACCH

Hand Over Call Release

STEPS IN RELEASE PHASE MS INITIATED


Um

MS

BSS

MSC/VLR

PSTN
Request for service Authentication Ciphering Equipment Validation Hand Over

Disconnect FACCH Stop Billing Release FACCH Release Complete FACCH Clear Command Channel Release FACCH Network Release

Clear Complete

STAGE 1 Routing Analysis

DESCRIPTION The MS terminated call is routed to the visited MSC using information from the HLR and VLR The MSC initiates a communication with the MS The MSC/VLR requests the AUC for authentication parameters. Using these parameters the MSC is authenticated. Using the parameters which were made available earlier during the authentication, the uplink and the downlink are ciphered The MSC/VLR requests the EIR to check the IMEI validity

2 3

Paging Authentication

Ciphering

Equipment Validation

6
7 8

Call Setup
Handover Call Release

The MSC establishes a connection to the MS

The speech path is released

ASSUME: Mobile is already registered with the system TMSI allocated


Land subscriber dials the number of mobile subscriber Call enters the GSM network via a GMSC

STEPS IN ROUTING ANALYSIS PHASE

Based on the MSISDN, the PSTN routes the call to the GMSC of the number GMSC , not knowing whether this MS is in its own service area or not, sends a message, with the MSISDN in it, to the HLR HLR requests MSC/VLR to provide routing information about the MS MSC/VLR returns to the GMSC, via HLR, a number where the MS can be reached (MSRN)

MSC/VL R

HL R

GMS C

PSTN
Incoming Call (MSISDN)

Get Route (MSISDN) Get Route (IMSI)

Routing Info (MSRN) Routing Info (MSRN)

Incoming Call (MSISDN) Paging Authentication Ciphering Equipment Validation Call Setup Handover, Call Release

Call is routed from the GMSC to the visited MSC

Um

MS

BSS

MSC/VLR

Perform Page (TMSI)

Routing Analysis

Page
PCH Channel Request RACH SDCCH Assignment AGCH Page Response (TMSI,LAI)

SDCCH

Page Response

Authentication Ciphering Equipment Validation Call Setup Handover, Call Release

STEPS IN CALL SETUP PHASEWITH MS


Um

MS

BSS

MSC/VLR
Routing Analysis Paging Authentication Ciphering Equipment Validation

Call Setup SDCCH Call Setup Confirm SDCCH Assign Radio Channel SDCCH

Assign Trunk & Radio Channel

Radio Assignment Complete

SDCCH

Trunk & Radio Assignment Complete

Handover, Call Release

STEPS IN CALL SETUP PHASE---WITH LAND NETWORK


Um

MS

BSS

MSC/VLR

HL R

GMSC

PSTN

Mobile Alerting FACCH

Routing Analysis Paging Authentication Ciphering Equipment Validation

Network Alerting

Connect (Off Hook) FACCH Connect

Connect Acknowledge FACCH Handover, Call Release

STEPS IN RELEASE PHASE---NETWORK INITIATED


Um

MS

BSS

MSC/VLR

HL R

GMSC

PSTN

Network Release Disconnect FACCH Release FACCH Release Complete FACCH Clear Command Channel Release Clear Complete

Routing Analysis Paging Authentication Ciphering Equipment Validation Call Setup Handover

Release Complete

Potrebbero piacerti anche