Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
For the connection of the different nodes in the GSM network, different interfaces are defined in the GSM specifications GSM has the following Radio Interfaces: Um Interface, Abis Interface, A Interface
U m interface is also called as Air interface. The Air Interface is the interface between the BTS and the MS The air interface is required for supporting Universal use of any compatible mobile station in a GSM network.
A bis -interface is the interface between the BSC and the BTS. The interface comprises traffic and control channels.
Functions implemented at the A bis -interface are Voice-data traffic exchange, Signaling exchange between the BSC and the BTS
Transporting synchronization information from the BSC to the BTS
A-interface is the interface between the BSC and the MSC. The Physical Layer is a 2 Mb/s Digital Connection. The Signaling uses MTP (Message transfer Part) and SCCP (Signalling Connection Control Part) of Signaling System 7. ---- BSS Management Application Part looks after Radio Resource handling in BSS and ---- BSS Operation and Maintenance Application Part supports all Operation and Maintenance works of BSS
Every base station sends on at least one frequency in 8 timeslots. It has become common practice to refer to physical channels that are defined by frequency and timeslot. Several "types" of data are sent on these physical channels, e.g. speech, test reports, instructions, etc. For these data types the term "logical channel" is used.
BCC H
The Traffic Channels are used to send Speech or User Data in both MS to BTS and BTS to MS directions.
They are distinguished by their transmission rates The Traffic Channels can work in Full Rate or Half Rate.
A TCF/F or a TCH/H may also be used to send signalling information (eg. Call forwarding & SMS)
-Traffic channel using full-rate transmission a full-rate channel operating at 22.8 kbit/s. 13 kbit/s are used for speech transmission, the rest is basically used for error protection. For data transmission, 12, 6 or 3.6 kbps is used. These are compatible respectively to the existing 9.6, 4.8 and 2.4 kbps PSTN and ISDN services
-Traffic channel using half-rate transmission a half-rate channel operating at 11.4 kbit/s. 6.5 kbit/s are available for speech transmission. For data transmission, 6 or 3.6 kbps is used
The main function of the control channels is to transfer signaling information. They are sub divided into three categories
Broadcast channels Common control channels
BROADCAST CHANNELS
Broadcast Channels are point to multipoint channels defined for down link direction i.e. BTS to MS (Downlink). The information distributed over the broadcast channels helps the mobile stations to orient themselves in the mobile radio network. These are further classified into four
BCCH: Through this channel, the MS is informed about the system configuration parameters(eg. Location Area Identification, Cell Identity, and neighbor cells). Using this information, the MS can choose the best cell to be attached to. FCCH: To communicate with the BTS, the MS must tune to the BTS. The FCCH transmits a constant frequency shift of the radio frequency that can be used by MS for frequency correction.
SCH is used to time synchronize the mobile stations. The data on this channel carries the TDMA frame number (TDMA Matching) and the base station identity code (BSIC). CBCH: is used for the transmission of the generally accessible information in a cell (SMS), which can be polled by MS.
There is one CCCH between MS to BTS (Up link ). Random Access Channel (RACH) : When MS is switched ON, RACH is used to search network, i.e., used for requesting access to an exclusive control channel (DCCH).
Access Grant Channel (AGCH) : used for assigning an MS to a Dedicated Control Channel, i.e., gives acknowledgement to RACH
SACCH is used
for transmission of --- signaling data, --- radio link supervision measurements(receive field strength and quality), --- transmit power control and --- timing advance data.
Always allocated to a TCH or SDCCH.
FACCH is used as a main signaling link for the transmission of signaling data which cannot be postponed (eg. handover commands) required for call setup and release. SDCCH is used For signaling in higher layer.
Carries all signalling between the BTS and MS when no TCH is allocated (i.e., when no call is in progress).
Used for service requests (like SMS), location updates, subscriber authentication, ciphering initiation, equipment validation and assignment to a TCH (Dialled digits are processed through SDCCH)
Several of the logical channels can be transmitted over one single physical channel (timeslot). The GSM specifications 05.02 specify several combinations of channel types (the sequence of logical channels is fixed).
The order of the logical channels depends on the channel combination.
The channel combinations are: 1.TCH/F + FACCH/F + SACCH/F 2. TCH/H + FACCH/H + SACCH/H 3. (TCH/F + FACCH/F + SACCH/F) or (TCH/H + FACCH/H + SACCH/H) 4. FCCH + SCH + BCCH + CCCH 5. FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/4 6. BCCH + CCCH 7. SDCCH/8 + SACCH/8
NOTE: The CCCH carries both the PCH and the AGCH on the downlink, and the RACH on the uplink.
The extensions /4 and /8 that four and eight logical channels are mapped onto one physical channel (timeslot).
If we use normal PCM concept the output data rate will be 64Kbps. Digital cellular radio cannot handle the high bit rate used for PCM. For reduction of bit rates Vocoders are used Vocoder is a digital hardware block, which will do the speech analysis and Synthesis They use complex algorithms to analyze the speech
The full rate channel operates with a protected bit rate of 22.8kbps where in the speech itself only uses 13 kbps. The speech quality is comparable to the fixed PSTN quality. GSM speech coding scheme at 13 kbps uses a technique called linear prediction coding with regular pulse excitation (LPC RPE)
Three classes of speech coding: i. Wave Form Coding Speech signal is transmitted as good as possible eg. PCM. Good Quality (B/W= 300-3400Hz & S/N > 30dB) Bit rate range---- 24-64kbps
ii. Parameter Coding Limited quantity of information (parameter) are sent 1-3 kbps required for speech transmission Regenerated speech is intelligible but suffers from noise and speaker cannot be recognized
iii. Hybrid Coding Mix of wave form and parameter coding Used in GSM
STEPS: The 64 kbps PCM is transcoded from the standard A-Law( quantised 8-bit/sample stream into a linearly quantised 13bits/sample stream, giving rise to a 104kbps bit rate) The 104kbps stream is fed into the RPE-LTP full-rate speech encoder, which takes the 13-bit samples in blocks of 160 samples (every 20ms) The RPE-LTP encoder produces 260 bits in every 20ms.
The classification of the bits are as Class Ia 50 bits Most important and sensitive to bit errors. Class Ib 132 bits Moderately sensitive to bit errors Class II 78 bits Least sensitive to bit errors.
Class -I
The 182 class-I bits need protection over the radio link. Transmission errors in this class would have an extremely serious effect The 78 class-II bits are sent without protection
The data to be transmitted over the interface must be protected against corruption due to the effects of fading and co-channel interference.
The channel coding increases the bit rate from 13kbps to 22.8 kbps through protection to the Class I bits
Class 1a bits are given a 3-bit CRC so that errors can be detected.
The remaining 78 bits are simply added to data to get a total of 456 bits
In a nut shell:
50+3+132+4=189, 189X2=378, 378+78=456 bits Thus, every 20ms speech sample generates a total number of 456 bits. Accordingly the overall bit rate is 22.8Kbps.
The aim of interleaving is to distribute sub blocks of data obtained by channel coding in such a way that one data block is distributed over several TDMA frames. The sub blocks are rearranged for this purpose and transmitted in a different order. 1. The 456 bit blocks from the channel encoder are fed to the bit interleaver where they are split into eight sub blocks of 57 bits. 2. 57 bits at a time will be interleaved with 57 bits from an adjacent speech block to form a data burst of 114 data bits 3. These data burst are transmitted in one timeslot The sub blocks interleaved in time are reassembled in the correct order upon reception to form complete data blocks. The data are then checked for errors and corrected as necessary.
GSM timing is based on transmission time of one bit (approx. 3.69 ms)
A certain number of these bits is combined to form a burst and is transmitted in one timeslot.
Eight timeslots form a frame. A certain number of these frames is combined to give a multiframe. Since there are several types of multiframe, certain numbers are grouped together to form standard hyperframes and superframes.
TDMA FRAME
TDMA frame: A TDMA frame consists of eight timeslots (physical channels). The length of a timeslot is 0.577 ms. The length of a TDMA frame is therefore 4.615 ms. The data on a timeslot is transmitted in bursts, the length of a timeslot is often expressed in BP (Burst Period); 1 BP represents the length of 1 timeslot. 26-TDMA multiframe: This multiframe is defined as a succession of 26 TDMA frames, and corresponds to the 26 x 8 BP or 120 ms (26x4.615) also called a Traffic Multiframe
51-TDMA multiframe This multiframe is defined as a succession of 51 TDMA frames, and corresponds to the 51 x 8 BP cycle used in the definition of the TCH/F, TCH/H and of the common channels (also called a Control Multiframe) Super frame: The super frame is a succession of 51 x 26 TDMA frames (6.12 sec), and corresponds to the smallest cycle for which the organization of all channels is repeated. (51 traffic Multiframes or 26 Control Multiframes) Hyper frame: The hyper frame is the numbering period. It is 2048 Super Frames (2048 x 51 x 26 x 8 BP long), or 3 hours, 28 minutes, 53 seconds and 760 milliseconds. It is a multiple of all previously cited cycles, and determines all the cycles in the transmission of the radio path. It is in particular the smallest cycle for frequency hopping and for ciphering.
BURST
GSM radio transmission is accomplished by sending data in bursts. Burst is the physical content of a time slot. Information is exchanged between the base station and mobile station in the timeslots. 1 time slot(0.577 msec)
Depending on the task to be performed, different types of burst can be used. It is used for signalling as well as for speech and data transmission. Each part of the burst serves a specific purpose :
TAIL BITS
Tail bits (flag bits) at the beginning define the start of a burst, and at the end define the end of a burst
The transmission rate within the system can only be increased when more than one timeslot is used (General Packet Radio Service GPRS, High-Speed Circuit-Switched Data HSCSD) Or another modulation method (8PSK modulation with EDGE, Enhanced Data Rate for GSM Evolution).
TRAINING SEQUENCE
In the middle of the normal burst, a 26-bit training sequence is sent, the bit sequence being known to the receiver.
There are eight different sequences which are referred to as the training sequence code (TSC).
The eight sequences must be stored in all receivers and at the beginning of a transmission the base station decides on the TSC to be used. The training sequence performs two main tasks: bit synchronization and estimating the channel impulse response (instantaneous response of the radio channel). Using this estimate, the channel equalizers in the receivers can be set for optimum data stream decoding.
BIT SYNCHRONIZATION
The GSM training sequence is used for fine bit synchronization and for block synchronization. Since the training sequence is not sent at the beginning of a burst, the received data stream must be buffered in the receiver and decoded later on. Synchronization itself makes use of cross-correlation, i.e. the stored data stream is compared bit-by-bit with the expected training sequence.
When the position of the training sequence is known, the timing of the information bits is also known and fine tuning of the bit-clock is performed.
A burst that does not contain the expected training sequence cannot be synchronized and decoded.
GUARD PERIOD
Transmission in each time slot is terminated with a guard time of 8.25 bit periods (8.25 x 3.69 s 30 s) during which no information bits can be sent.
During this time, the burst level must be reduced by up to 70 dB to avoid the next timeslot being affected. The "owner" of the subsequent timeslot uses this time to increase his transmitter power to nominal. This means that the guard time is used twice for power ramping (the transmitter power must be increased and reduced within narrow tolerances).
TYPES OF BURSTS
Normal burst Dummy burst Access burst Synchronization burst Frequency correction burst
Normal burst is the most frequently used burst used for transmission of user data/signaling data (on TCH).
Two packets of 58 encrypted bits (57 data bits + 1 stealing flag bit) are carried for the TCH, or for the control channels (BCCH and CCCH) but not for RACH
DUMMY BURST
The dummy burst has the same structure as that of normal burst. It is transmitted in idle time slots on the BCCH, which ensures that BCCH is always present This makes it easier for the MS to find the BCCH carrier and permits assesment of neighboring cells.
ACCESS BURST
The access burst is sent when the mobile station calls the base station for the first time. The base station uses this burst for a delay measurement, determines the associated timing advance and informs the mobile station accordingly. It provides a 41-bit TSC that is longer than the normal 26 bits in order to make the initial demodulation for the BTS more successful
SYNCHRONIZATION BURSTS
Synchronization bursts are used to synchronize MS with BTS in time.
It is the first burst in the downlink direction, used on the SCH.
It provides a unique 64-bit TSC in order to facilitate the initial demodulation for the MS.
The encrypted bit fields contain the BSIC and the TDMA frame no.
CELL IDENTIFICATION
When MS is switched on, it attempts to make contact with a GSM PLMN by performing following actions Measure the BCCH channel Search for a suitable cell The MS measures the signal strength of the BCCH channels received. It stores a list of information about 30 of these BCCH channels, such as signal strength and the frequency corresponding.
PLMN SELECTION
Particular PLMN can be selected in either of the two modes AUTOMATIC MODE MS will choose which PLMN to try by itself, based on the existence of the preferred list, which is stored in a non-volatile memory in the SIM. This list includes a no. of PLMN identities in order of preference and is under control of the user. The most preferred is usually the Home PLMN. This mode is normally used when the MS is operating on its home PLMN. MANUAL MODE The user is presented a list containing all found PLMNs. The user chooses one of the PLMNs from the list
CELL SELECTION
The MS attempts to find a suitable cell by passing through the list in descending order of received signal strength. The requirement that a cell must satisfy before a MS can be provided service from it are It should be a cell from the selected PLMN. It should not be barred.
The PLMN operator may decide not to allow MS to access certain cells. These cells may, for example, only be used for handover traffic. Barred cell information is broadcast on the BCCH to instruct MSs not to access these cells.
The radio path loss between the MS and the selected BTS must be below a threshold set by the PLMN operator It should not be in a LA which is in list of forbidden LAs for roaming
If the MS is unable to find a suitable cell to access, it attempts to access a cell irrespective of the PLMN identity, and enters a limited service state in which it can only make emergency calls.
DESCRIPTION
The MS detects that it has entered a new location area and requests to update its location. The new MSC/VLR identifies the MS The new MSC/VLR requests to the AUC for authentication parameters. Using these parameters, the MS is authenticated. Using the parameters which were made available earlier during the authentication, the uplink and the downlink are ciphered The new MSC/VLR requests to update the MS location in the HLR. The MS is deregistered in the old VLR The MS is assigned a new
Authentication
Ciphering
4 5
Um
MS
BSS
New MSC/VLR
Old MSC/VLR
HLR
AGCH Location Update Request (TMSI & old LAI) SDCCH Request IMSI (TMSI)
Send IMSI
CALL MANAGEMENT:
Phases of MS to PSTN call (Mobile to land line)
1. Request for service: MS request to setup a call
Call process
The user presses the send key after all digits have been entered.
1. MS transmits a channel request message over RACH.
2. Once the BSS receives the channel request, it allocates a SDCCH and forwards this channel assignment information to the MS over AGCH. It is over the SDCCH that MS will communicate with the BSS and MSC until a traffic channel is assigned.
3. MS transmits a service request to BSS over SDCCH. In this message it informs TMSI and location area identification (LAI). The BSS forwards the service request message to MSC.
4.The Authentication and ciphering phases are then performed by Ki and Kc keys 5.The MSC transmits a request to the MS requesting it to respond with its IMEI 6.Upon receiving this request, MS reads its equipment serial number and returns this value to MSC 7.MSC then requests the EIR to check the validity of IMEI 8.The EIR returns the results of the IMEI validation to MSC
9. After receiving the call setup request transmitted by the MS, the MSC
will ask the VLR to supply subscriber parameters necessary for handling the call. 10. VLR returns a message to MSC containing service parameters for the particular subscriber. 11. MSC informs to MS that the call is proceeding.
12. MSC allocates a trunk to BSS to current MS and requests BSS to allocate TCH for MS. 13. BSS allocates a radio traffic channel and transmits this assignment to MS over SDCCH.
14. The MS tuned to the assigned traffic channel and transmits an acknowledgement to BSS. 15. At this time a voice path is established between MS and MSC. 16. MSC establishes a voice path from MSC to PSTN by sending a request including dialed digits and details specifying the trunk should be used for.
17. After this process MSC will inform to MS and it will get the ringing tone.
MS
BSS
New MSC/VLR
AGCH Service Request (MS,LAI) SDCCH Authentication Ciphering Equipment Validation Call Setup Handover Call Release
Back
MS
BSS
MSC/VLR
HLR
Request for service Authentication Ciphering
Check IMEI
MS
BSS
MSC/VLR
Call Proceeding
SDCCH
Back
MS
BSS
MSC/VLR
Assign Trunk & Radio (TN) Assign TCH SDCCH Radio Assignment Complete SDCCH
Trunk & Radio Assignment Complete
Back
MS
BSS
MSC/VLR
PSTN
Request for service Authentication Ciphering Equipment Validation
Network Alerting
Alerting FACCH Connect (Answer) Start Billing Connect FACCH Connect Acknowledgement
FACCH
MS
BSS
MSC/VLR
PSTN
Request for service Authentication Ciphering Equipment Validation Hand Over
Disconnect FACCH Stop Billing Release FACCH Release Complete FACCH Clear Command Channel Release FACCH Network Release
Clear Complete
DESCRIPTION The MS terminated call is routed to the visited MSC using information from the HLR and VLR The MSC initiates a communication with the MS The MSC/VLR requests the AUC for authentication parameters. Using these parameters the MSC is authenticated. Using the parameters which were made available earlier during the authentication, the uplink and the downlink are ciphered The MSC/VLR requests the EIR to check the IMEI validity
2 3
Paging Authentication
Ciphering
Equipment Validation
6
7 8
Call Setup
Handover Call Release
Based on the MSISDN, the PSTN routes the call to the GMSC of the number GMSC , not knowing whether this MS is in its own service area or not, sends a message, with the MSISDN in it, to the HLR HLR requests MSC/VLR to provide routing information about the MS MSC/VLR returns to the GMSC, via HLR, a number where the MS can be reached (MSRN)
MSC/VL R
HL R
GMS C
PSTN
Incoming Call (MSISDN)
Incoming Call (MSISDN) Paging Authentication Ciphering Equipment Validation Call Setup Handover, Call Release
Um
MS
BSS
MSC/VLR
Routing Analysis
Page
PCH Channel Request RACH SDCCH Assignment AGCH Page Response (TMSI,LAI)
SDCCH
Page Response
MS
BSS
MSC/VLR
Routing Analysis Paging Authentication Ciphering Equipment Validation
Call Setup SDCCH Call Setup Confirm SDCCH Assign Radio Channel SDCCH
SDCCH
MS
BSS
MSC/VLR
HL R
GMSC
PSTN
Network Alerting
MS
BSS
MSC/VLR
HL R
GMSC
PSTN
Network Release Disconnect FACCH Release FACCH Release Complete FACCH Clear Command Channel Release Clear Complete
Routing Analysis Paging Authentication Ciphering Equipment Validation Call Setup Handover
Release Complete