Sei sulla pagina 1di 212

INFINITE SOFTCOMM SOLUTIONS

701,UDYOG VIHAR, PHASE -V GURGAON, INDIA TEL NO. 0124- 4005655, 4362150-52 FAX NO. 0124-4362151

Telecom Scenario

Mobile

Telecommunication is one of the fastest growing & most demanding of all telecommunication technologies. In many cases ,cellular solutions successfully compete with traditional wire line N\W and cordless telephones. In future ,cellular systems employing Digital technology will become the universal method of telecommunication.

Object of training

What

is GSM. Evolution of GSM. Fundamental of GSM Architecture of GSM Establishment of Network Fundamental of Radio Propagation Call flow

History of Wireless Communication

1906Human voice was successfully transmitted over RADIO. 1921Detroit police dept. used 2 Mhz frequency in vehicular mobile radio. 1930Amplitude Modulation was invented 1935---Frequency Modulation was invented (improved audio quality). 1947Bell labs. Envisions the cellular concepts. 1991first digital cellular standard (GSM) is launched 1998No. of subscriber world wide has grown to over 200 million.

GSM

GSM carriers are spaced 200 kHz. Apart In the BTS downlink signal, Different timeslots belong to different users - a mobile listens only to its recurring timeslots . During unused timeslots, a mobile can measure the signal strength of surrounding BTSs to guide the handover process The mobile on its uplink transmits only during its assigned timeslots . Mobiles transmit only during their own timeslots . Mobile transmit timeslots occur three timeslots after the corresponding BTS transmit Timeslot . This avoids simultaneous mobile TX/RX and the need for duplexer at the mobile

Performance characteristics of GSM


Communication
mobile, wireless communication; support for voice and data services

Total mobility
international access, Worldwide connectivity

High capacity
better frequency efficiency, smaller cells, more customers per cell

High transmission quality


high audio quality and reliability for wireless, uninterrupted phone calls at higher speeds (e.g., from cars, trains)

Security functions
access control, authentication

GENERATION OF GSM

1st generation:- Analog mobile technologies :- AMPS , TACS & NMT. 2nd generation:- digital mobile technologies :- GSM , CDMA 2.5generation:- Enhancement of GSM:- GPRS 3rd generation:- Technologies coursed by ITU-IMT

The following table lists the key events in the GSM evolution

YEAR 1982

EVENT TOOK PLACE CEPT adopts WARC 79 recommendation allocating 890-915 MHz and 935-960 MHz for land mobile GSM created to set standard

1985 1987

EEC supports GSM standards throughout community Digital Technology standards set for TDMA, speech coding, channel: and modulation method. Telecommunication carriers from 14 European countries sign Memorandum of Understanding (MOU) and agree to install system in 1991

1988 1989 1991 1992 1993 1995

Industrial development started Acceptance of GSM-1800 system, with GSM as standard First system deployed (July) First GSM terminals receive interim type approval First GSM-1800 network launched First GSM-1900 network in US & Canada

GSM STANDARDS
GSM-900 Standard
The GSM-900 standard is a standard for digital voice transmission in the 900 MHz band. This so called primary band" includes two sub bands of 25 MHz

GSM-1800 Standard
In GSM-1800, 1800 MHz band was allocated for digital mobile telephone services which has frequency of 75 MHz. This was three times the bandwidth allocated for GSM-900.

GSM-1900 Standard
GSM-1900 is the standard for the 1900MHz band. It includes the same network component as the GSM-900 or GSM-1800. The band width of this standard is 60 MHz.

GSM Channels/Carriers
The following table will show the channels and carriers of different GSM models

GSM 900 Vs GSM 1800


ADVANTAGES OF GSM 900
Double the coverage as compared to GSM1800. Low propogation losses. Better Solution for Highway and surrounding village coverage. MS power output of 2W compared to 0.8W of GSM1800. Hence better Uplink quality in fringe areas.

ADVANTAGES OF GSM1800
Small Cell radius makes it an ideal capacity solution. However, due to higher propogation losses, more number of sites are required (approx. 1.5~2 times that of GSM900)

GSM 900 Vs GSM 1800

Area type High Traffic area Medium Traffic area Low Traffic area Highways Small Towns (upto 10 sq. Kms)

GSM 1800 Sites 1.2~1.5 x GSM 900 sites 1.5~2 x GSM 900 sites 2~2.5 x GSM 900 sites 2~3 x GSM 900 sites Equal to GSM900 sites

GPRS-Wireless

Data Services . EDGEProvides 3 times the data capacity of GPRS. 3G---Uses WCDMA technologies Over Air interface (5MHz).

P-GSM 900 Uplink frequency 890-915 MHz 935-960 MHz 200 kHz

E-GSM 900 880-915 MHz 925-960 MHz 200 kHz

R-GSM 900 886-915 MHz 931-960 MHz 200 kHz

GSM 1800 17101785 MHz 18051880 MHz

GSM 1900 1850-1910 MHz 1930-1990 MHz

Down link frequency Channel spacing

200 kHz 200 kHz

Carrier Frequency 124

174

144

374

299

Duplex spacing

45 MHZ

45 MHZ

45 MHZ

95 MHZ 80 MHZ

Spectrum

GSM uses paired radio channels


NK PLI U

K LIN N OW D
890MHz

915MHz

935MHz

960MHz

124

124

Technology

FDMA

(Frequency division Multiple Access)

TDMA

(Time division Multiple Access)

DIFFERENT TYPE OF TECHNOLOGIES USED IN GSM FDMA (Frequency division Multiple Access) In FDMA, signals from various users are assigned different frequencies. Frequency guard bands are maintained between adjacent signal spectra to minimize crosstalk between channels. Advantages of FDMA
1. 2.

Capacity increase can be obtained by reducing the information bit rate and using efficient digital codes. Technological advances required for implementation are simple. A system can be configured so that improvement in terms of speech code bit rate reduction could be readily incorporated. Disadvantages of FDMA The maximum bit rate per channel is fixed and low, inhibiting the flexibility in bit-rate capability that is needed for computer file transfers

Frequency multiplex

Separation of the whole spectrum into smaller frequency bands A channel gets a certain band of the k1 k2 k3 k4 k5 spectrum for the whole time c Advantages:
no dynamic coordination necessary works also for analog signals

k6

Disadvantages:
waste of bandwidth if the traffic is distributed unevenly inflexible t guard spaces

TDMA (TIME DIVISION MULTIPLE ACCESS)


In a TDMA system, data from each user is conveyed in time intervals called Time slots. Several slots make up a frame . Each slot is made up of a preamble plus information bits addressed to various stations .the functions of the preamble are to provide identification and incidental information and to allow synchronization of the slot at the intended receiver .Guard times are used between each users transmission to minimize crosstalk between channels. Advantage of TDMA 1) TDMA permits a flexible bit rate. 2) TDMA offers the opportunity for frame-by-frame monitoring of the signal strength and bit error rates. 3) TDMA transmits each signal with sufficient guard time between time slots.

A channel gets the whole spectrum for a certain amount of time Advantages:
only one carrier in the medium at any time throughput high even for many users

Time multiplex

k1 c

k2

k3

k4

k5

k6

Disadvantages:
precise synchronization necessary

Time and Frequency Multiplex


Combination of both methods A channel gets a certain frequency band for a certain amount of time k k k k
1 2 3 4

k5

k6

c f

Example:

GSM Advantages:

Time and Frequency Multiplex

Better protection against tapping Protection against frequency k selective interference Higher data rates compared to c code multiplex
But:

k2

k3

k4

k5

k6

precise coordination required


t

Various Access Method

Cells

Capacity & Spectrum Utilization Solution


The need: Optimum spectrum usage More capacity High quality of service Low cost
Network capacity at required QoS with conventional frequency plan Out of Capacity!!! Subscriber growth Time

I wish I could

increase capacity without adding NEW BTS!


What can I do?

Representation of Cells

Ideal cells

Fictitious cells

Cell size and capacity


Cell

size determines number of cells available to cover geographic area and (with frequency reuse) the total capacity available to all users Capacity within cell limited by available bandwidth and operational requirements Each network operator has to size cells to handle expected traffic demand

Cell structure

Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Advantages of cell structures: higher capacity, higher number of users less transmission power needed more robust, decentralized base station deals with interference, transmission area etc. locally Problems: fixed network needed for the base stations handover (changing from one cell to another) necessary interference with other cells Cell sizes from some 100 m in cities to, e.g., 35 km on the country side (GSM) - even less for higher frequencies

Sectorization

The problem with employing omni-directional cells (Radiate waves to 360 degrees) is that as the number of MSs increases in the same geographical region, we have to increase the number of cells to meet the demand. To gain a further increase in capacity within the geographic area we can employ a technique called sectorization. Sectorization splits a single site into a number of cells, each cell has transmit and receive antennas and behaves as an independent cell. This has a number of advantages: firstly, as we are now concentrating all the energy from the cell in a smaller area 60, 120, 180 degrees instead of 360 degrees, we get a much stronger signal, which is beneficial in locations such as inbuilding coverage. Secondly, we can now use the same frequencies in a much closer re-use pattern, thus allowing more cells in our geographic region which allows us to support more MSs.

Antenna types
Directional antennas are useful for covering long streets and have the following advantages: -Extra gain in the forward direction. -Suppressed signal in the reverse direction, this is a useful characteristic if the cell is a potential interferer with another cell located behind it. -It is also worth noting that a directional antenna could be used to improve in-building coverage, in specific buildings, within the micro cell area. Omni antennas are useful for covering open areas (for example squares, plazas). In these areas, it is desirable to have a clearly designated best server cell to avoid excessive handovers and their attendant problems

Frequency Reuse

The spectrum allocated for a cellular network is limited. As a result there is a limit to the number of channels or frequencies that can be used. For this reason each frequency is used simultaneously by multiple basemobile pairs. This frequency reuse allows a much higher subscriber density per MHz of spectrum than other system. System capacity can be further increased by reducing the cell size down to radii as small as 200m

Frequency Reuse
7 cell re-use pattern f7 f6 f1 f5 f4 f3 f5 f4 f2 f6 f1 f3 f7 f2

GSM Architecture

Component groups of a GSM network


The principle component groups of a GSM network are: The Mobile Station (MS) The MS consists of two parts, the Mobile Equipment (ME) and an electronic smart card called a Subscriber Identity module (SIM). The ME is the hardware used by the subscriber to access the network. The hardware has an identity number associated with it, which is unique for that particular device and permanently stored in it. This identity number is called the International Mobile Equipment Identity (IMEI) and enables the network operator to identify mobile equipment which may be causing problems on the system. The SIM is a card which plugs into the ME. This card identifies the MS subscriber and also provides other information regarding the service that subscriber should receive. The subscriber is identified by an identity number called the International Mobile Subscriber Identity (IMSI).

The Base Station System (BSS)

This is the part of the network which provides the radio interconnection from the MS to the land-based switching equipment.

Types of MS

NoteGSM 3W & CDMA 800mW

Mobile Station
MOBILE STATION (MS) :station (MS) represents the terminal equipment used by the wireless subscriber supported by the GSM Wireless system. The SIM may be a removable module, while the equipment identity is not linked to a particular subscriber. Functions of a Mobile Station :Radio transmission termination. Radio Channel Management. Speech Encoding/Decoding Radio Link error Protection. Flow control of data. Mobility Management. The mobile

The SIM contains several pieces of information:

SIM

International Mobile Subscriber Identity (IMSI) This number identifies the MS subscriber. It is only transmitted over the air during initialization. The IMSI identifies the subscriber within the GSM network while the MS ISDN is the actual telephone number a caller (possibly in another network) uses to reach that person. Security is provided by the use of an authentication key (explained later in this section) and by the transmission of a temporary subscriber identity (TMSI) across the radio interface where possible to avoid using the permanent IMSI identity. Temporary Mobile Subscriber Identity (TMSI) This number identifies the subscriber, it is periodically changed by the system management to protect the subscriber from being identified by someone attempting to monitor the radio interface. Location Area Identity (LAI) Identifies the current location of the subscriber. Subscriber Authentication Key (Ki) This is used to authenticate the SIM card. Mobile Station International Services Digital Network (MSISDN) This is the telephone number of the mobile subscriber. It is comprised of a country code, a network code and a subscriber number.

BASE STATION SYSTEM (BSS) :- (BSC+BTS)


The BSS consists of three major hardware components: 1) The Base Transceiver Station BTS The BTS contains the RF components that provide the air interface for a particular cell .This is the part of the GSM network which communicates with the MS. The antenna is included as part of the BTS.
2)

The Base Station Controller BSC

The BSC as its name implies provides the control for the BSS. The BSC communicates directly with the MSC. The BSC may control single or multiple BTS. The BSC switching matrix also allows the BSC to perform handovers between radio channels on BTSs, under its control, without involving the MSC.

3)

The Transcoder XCDR

The Transcoder (XCDR) is required to convert the speech or data output from the MSC (64 kbit/s PCM), into the form specified by GSM specifications for transmission over the air interface, that is, between the BSS and MS (64 kbit/s to 16 kbit/s and vice versa)

BSC

Characteristics of the Base Station System (BSS) are : The BSS is responsible for communicating with mobile stations in cell areas. One BSC controls one or more BTSs and can perform inter-BTS and intra-BTS handover. As we have mentioned, a BSC may control several BTSs, the maximum number of BTSs which may be controlled by one BSC is not specified by GSM.

- Each PLMN Should have at least one HLR - One VLR is connected to several MSC ,but one MSC has one VLR Characteristics of the Base Station System (BSS) are : The BSS is responsible for communicating with mobile stations in cell areas. One BSC controls one or more BTSs and can perform inter-BTS and intra-BTS handover. The Transcoder XCDR The Transcoder is used to compact the signals from the MS so that they are more efficiently sent over the terrestrial interfaces.

BSS

TRX (Trans receive module)


One

BTS can host 16 TRXs where one TRX handles one RF carrier (8 time slots). one BTS may have one to four TRXs corresponding to the no. of carriers used in the cell.

Practically

Slow

frequency hopping Interleaving and ordering again Channel coding and decoding Creation and transmission of the broadcast common control channel on channel 0 of the BCCH-TRX. GMSK Modulation & Demodulation on uplink and downlink

IWF (Inter working function)


Is added to MSC for no-speech that is data connections to external N/W,it also do rate adaption for data services.

GMSC (Gateway MSC)


An MSC which has an interface to other N/W is called Gateway MSC. Any MSC which does not have a gateway functionality will have to route calls to external N/W via a gateway MSC.

BSIC (Base station identity code)


BSIC is an identifier for a BTS .BSIC ay not be unique in a PLMN because BSIC code is reused. BSIC(6 digit)- Network colour code 3 bits+BCC (Base station colour code) NCC identifies PLMN BCC is used to distinguish b/w neighbour BTS

Does

TRAU

Transcoding i.e. convert 64kbps

PCM voice fromtransmission to a mobile station. And also convert received 13 kbps or 8 kbps from mobile back to 64kbps required for MSC. TRAU is not used for data connections (used only for voice connections). Used b/w BSC & MSC or BTS & BSC.

Transcoder
The 64 kbit/s Pulse Code Modulation (PCM) circuits from the MSC, if transmitted on the air interface without modification, would occupy an excessive amount of radio bandwidth. This would use the available radio spectrum inefficiently. The required bandwidth is therefore reduced by processing the 64 kbit/s circuits so that the amount of information required to transmit digitized voice falls to a gross rate of 16 kbit/s. The transcoding function may be located at the MSC, BSC, or BTS.

TRANSCODER

MOBILE SWITCHING CENTER (MSC) :Mobile services switching center (MSC) performs the switching functions for all mobile stations located in the geographical area covered by its assigned BSSs. Each MSC provides service to MSs located within a defined geographic coverage area,the network typically contains more than one MSC. One MSC is capable of supporting a regional capital with approximately one million inhabitants. An MSC of this size will be contained in about half a dozen racks. The functions carried out by the MSC are listed below: Call Processing Includes control of data/voice call setup, inter-BSS and inter-MSC handovers and control of mobility management (subscriber validation and location). Operations and Maintenance Support Includes database management, traffic metering and measurement, and a manmachine interface. Internetwork Interworking Manages the interface between the GSM network and the PSTN. Billing Collects call billing data.

HLR
HOME LOCATION REGISTER (HLR) :The Home Location Register (HLR) Contains the identities of mobile subscribers, their service parameters, and their location information.HLR deals with tasks that are independent of Subscriber location. Function of the HLR include:Identity of mobile subscriber Location information for call routing. HLR stores Ki parameter (for each subscriber) which is also stored in SIM. HLR contains IMSI,MSISDN,VLR add.,Subscriber data.

VISITOR LOCATION REGISTER (VLR) :The Visitor Location Register (VLR) contains the subscriber parameters and location information for all mobile subscribers currently located in the geographical area controlled by that VLR. Functions of the VLR include :

Identity of mobile subscriber. Any temporary mobile subscriber identity (TMSI) allocation. Location area where the mobile station is registered Copy of the subscriber data from the HLR.

VLR

AUTHENTICATION CENTER (AUC) :Contains

subscriber authentication data called authentication

key (Ki) Generates security related parameters needed to authorize service using Ki. Generates unique data pattern called a cipher key (Kc) needed for encrypting user speech and data. AUC sends RAND to MS .AUC & MS do some calculation based on RAND ,secret key of SIM & A3 algorithm & generate a number. If result sent by MS is same as AUC Then MS is authenticated. 1. Triples (Kc, SRES and RAND) are stored at the VLR. 2. The VLR sends RAND via the MSC and BSS, to the MS (unencrypted). 3. The MS, using the A3 and A8 algorithms and the parameter Ki stored on the MS SIM card, together with the received RAND from the VLR, calculates the values of SRES and Kc. 4. The MS sends SRES unencrypted to the VLR 5. Within the VLR the value of SRES is compared with the SRES received from the mobile. If the two values match, then the authentication is successful. 6. If cyphering is to be used, Kc from the assigned triple is passed to the BTS. 7. The mobile calculates Kc from the RAND and A8 and Ki on the SIM. 8. Using Kc, A5 and the GSM hyperframe number, encryption between the MS and the BSS can now occur over the air interface.

EIR
EQUIPMENT IDENTITY REGISTER (EIR) :
The Equipment Identity Register (EIR) is accessed during the equipment validation procedure when a mobile station accesses the system .It contains the identity of mobile station equipment which may be valid, suspect, or known to be fraudulent. This contains :

White or Valid list list of valid MS equipment identities. Grey or Monitored list list of suspected mobiles under observation. Black or prohibited list list of mobiles for which service is barred

OPERATION AND MAINTENANCE CENTER (OMC) :-

The Operation and maintenance Center (OMC) is the centralized maintenance and diagnostic heart of the base station system (BSS). It allows the network provider to operate, administer , and monitor the functioning of the BSS. This enables the network provider to configure and maintain the network from a central location. Includes database management, traffic metering and measurement, manmachine interface.

The Network Switching System

This consists of the Mobile services Switching Centre (MSC) and its associated system-control databases and processors together with the required interfaces. This is the part which provides for interconnection between the GSM network and the Public Switched Telephone Network (PSTN). The components of the Network Switching System are listed below: Mobile Services Switching Centre MSC Home Location Register HLR Visitor Location Register VLR Equipment Identity Register EIR Authentication Centre AUC InterWorking Function IWF Echo Canceller EC

Mobility Management

OTHER NETWORK ELEMENTS

Other optional network elements that the MSC can interface include:

Internetwork Interworking The IWF provides the function to enable the GSM system to interface with the various forms of public and private data networks currently available. Echo Cancellor An EC is used on the PSTN side of the MSC for all voice circuits. Echo control is required at the switch because the inherent GSM system delay can cause an unacceptable echo condition, even on short distance PSTN circuit connections. During a normal PSTN land to land call, no echo is apparent because the delay is too short and the user is unable to distinguish between the echo and the normal telephone side tone. However, without the EC and with the GSM round trip delay added, the effect would be very irritating to the MS subscriber, disrupting speech and concentration. Gateway MSC The GMSC routes calls out of the network and is the point of access for calls entering the network from outside. GMSC--------PSTN+ISDN (other N/W).

LAI--Cells within the Public Land Mobile Network (PLMN) are grouped together into geographical areas. Each area is assigned a Location Area Identity (LAI), a location area may typically contain 30 cells. Each VLR controls several LAIs and as a subscriber moves from one LAI to another, the LAI is updated in the VLR. As the subscriber moves from one VLR to another, the VLR address is updated at the HLR.

TMSI--The VLR controls the allocation of new Temporary Mobile Subscriber Identity (TMSI) numbers and notifies them to the HLR. The TMSI will be updated frequently, this makes it very difficult for the call to be traced and therefore provides a high degree of security for the subscriber. The TMSI may be updated in any of the following situations: Call setup. On entry to a new LAI. On entry to a new VLR.

MSRNAs a subscriber may wish to operate outside its home system at some time, the VLR can also allocate a Mobile Station Roaming Number (MSRN). This number is assigned from a list of numbers held at the VLR (MSC). The MSRN is then used to route the call to the MSC which controls the base station in the MSs current location.

Network Management Centre

NMC

Sample Question

GSM Identifiers
IMEI International MobileStation Equipment Identity(80 Bit). The IMEI is an internationally-unique serial number allocated to the MS hardware at the time of manufacture. It is registered by the network operator and (optionally) stored in the AuC for validation purposes. IMSI International Mobile Subscriber Identifier (15 Bits) When a subscriber registers with a network operator, a unique subscriber IMSI identifier is issued and stored in the SIM of the MS. An MS can only function fully if it is operated with a valid SIM inserted into an <MS with a valid IMEI. TMSI Temporary Mobile Subscriber Identity (32 bits) A TMSI is used to protect the true identity (IMSI) of a subscriber. It is issued by and stored within a VLR (not in the HLR) when an IMSI attach takes place or a Location Area (LA) update takes place. At the MS it is stored in the MSs SIM (Issued by VLR) . The issued TMSI only has validity within a specific LA. MSISDN Mobile Subscriber ISDN number The MSISDN represents the true or dialled number associated with the subscriber. It is assigned to the subscriber by the network operator at

MSRN Mobile Station Roaming Number It is assigned by VLR of called subscriber.MSRN is required to route call from GMSC to Serving MSC/VLR (Where subscriber currently roams. LAI Location Area Identity Each Location Area within the PLMN has an associated internationally unique identifier (LAI). The LAI is broadcast regularly by BTSs on the Broadcast Control Channel (BCCH), thus uniquely identifying each cell with an associated LA. CI Cell Identifier The CI an identifier assigned to each cell within a network. However, the CI is only unique within a specific Location Area. When combined with the internationally unique LAI for its associated LA, the Global Cell Identity (GCI) is produced which is also internationally unique. BSIC Base Station Identity Code Each BTS is issued with a unique identity, the BSIC and is used to distinguish neighbouring BTSs. (6 Bits)

INTERFACE

Layer 1 Services The Physical Layer (Layer 1) contains all the functions necessary for the transmission of bit streams over the physical medium. It provides a transport service for the GSM logical channels. Services offered at Layer 1 include: Access Capabilities. Layer 1 carries out the cell selection functions for MSs in idle mode, in cooperation with the Layer 3 Radio Resource (RR) functions. Error Detection. Forward and backward error correction is implemented at layer 1 (see section on speech coding for details). Errored frames are not passed to Level 2 for processing. Encryption. Data encryption is also implemented at Layer 1 (see section on GSM security for details).

Layer 2 Services Here, the LAPDm protocol is used (similar to ISDN LAPD). LAPDm has the following functions: Connectionless transfer on point-to-point and point-to-multipoint signalling channels, Setup and take-down of layer 2 connections on point-to-point signalling channels, Connection-oriented transfer with retention of the transmission sequence, error detection and error correction.

Layer 3 Services Layer 3 contains the following sublayers which control signalling channel functions (BCH, CCCH and DCCH): Radio resource management (RR). The role of the RR management layer is to establish and release stable connection between mobile stations (MS) and an MSC for the duration of a call, and to maintain it despite user movements. The following functions are performed by the MSC: Cell selection, Handover, Allocation and take-down of point-to-point channels, Monitoring and forwarding of radio connections, Introduction of encryption, Change in transmission mode. Mobility management (MM). Mobility Management handles the control functions required for mobility including: Authentication Assignment of TMSI Management of subscriber location. Connection management (CM) is used to set up, maintain and clear call connections. It comprises three subgroups: Call control (CC) - manages call connections, Supplementary service support (SS) - handles special services, Short message service support (SMS) - transfers brief texts.

Neither the BTS nor the BSC interpret CM and MM messages. They are simply exchanged between the MSC and the MS using the Direct Transfer Application Part (DTAP) protocol on the A interface (see below). RR messages are mapped to or from the Base Station System Application Part (BSSAP) for exchange with the MS.

Um INTERFACE (MS- BTS) Air Interface between the MS and the BSS .It consist of protocol layer which help in -Radio resource management -Mobility management -Call management A-BIS INTERFACE (BSC - BTS) When the BSS consists of a Base Station Controller (BSC) and one or more Base Transceiver Stations (BTS), this interface is used between the BSC and BTS to support the services offered to the GSM users and subscribers. The interface also allows control of the radio equipment and radio frequency allocation in the BTS.In short it is used to exchange control information B/W BSC & BTS. A interface (BSC MSC) A interface carry 64kbps speech data B/W BSC & MSC

B INTERFACE (MSC - VLR) The VLR is the location and management data base for the mobile subscribers roaming in the area controlled by the associated MSC(s). Whenever the MSC needs data related to a given mobile station currently located in its area, it interrogates the VLR. When a mobile station initiates a location updating procedure with an MSC, the MSC informs its VLR which stores the relevant information. This procedure occurs whenever an MS roams to another location area. Also, when a subscriber activates a specific supplementary service or modifies some data attached to a service, the MSC informs (via the VLR) the HLR which stores these modifications and updates the VLR if required.

C INTERFACE (HLR and the MSC) The MSC must interrogate the HLR of the required subscriber to obtain routing information for a call or a short message directed to that subscriber.

D INTERFACE (HLR - VLR) This interface is used to exchange the data related to the location of the mobile station and to the management of the subscriber. The main service provided to the mobile subscriber is the capability to set up or to receive calls within the whole service area. To support this, the location registers have to exchange data. The VLR informs the HLR of the location of a mobile station managed by the latter and provides it (either at location updating or at call set-up) with the roaming number of that station. The HLR sends to the VLR all the data needed to support the service to the mobile subscriber. The HLR then instructs the previous VLR to cancel the location registration of this subscriber. Exchanges of data may occur when the mobile subscriber requires a particular service, when he wants to change some data attached to his subscription or when some parameters of the subscription are modified by administrative means.

E INTERFACE (MSC MSC)

When a mobile station moves from one MSC area to another during a call, a handover procedure has to be performed in order to continue the communication. For that purpose the MSCs have to exchange data to initiate and then to realize the operation. After the handover operation has been completed, the MSCs will exchange information to transfer A-interface signalling as necessary.

F INTERFACE (MSC and EIR)

This interface is used between MSC and EIR to exchange data, in order that the EIR can verify the status of the IMEI retrieved from the Mobile Station. G INTERFACE (VLR VLR) When a mobile subscriber moves from a VLR area to another Location Registration procedure will happen. This procedure may include the retrieval of the IMSI and authentication parameters from the old VLR. H INTERFACE (HLR - AuC) When an HLR receives a request for authentication and ciphering data for a Mobile Subscriber and it does not hold the requested data, the HLR requests the data from the AuC.

CHANNELS

Logical channel
One

or more logical channel can be transmitted on a physical channel. Different types of logical channel are Traffic Channels (Speech & Data) Broad cast channel (Signalling) Common control channel (Signalling) Dedicated control channel (Signalling)

TRAFFIC CHANNEL

Traffic Channels (TCH)


One physical channel (1 timeslot) can support: Traffic channels are used to send Speech or Data services. 1 TCH/F or 2 TCH/H TCH/F: 13 kb/s voice or 9.6 kb/s data (22.8 Kbps after channel coding) TCH/H: 6.5 kb/s voice or 4.8 kb/s data (11.4 kbps after channel coding) Both can be used to carry signalling information. Uplink / Downlink Synchronisation The MS transmit burst is delayed by 3 timeslots after the BTS burst.. This delay allows enables: Use of the same UL and DL timeslot number in TDMA frame Avoids simultaneous Tx/Rx requirement

Speech channels are supported by two different methods of coding known as Full Rate (FR) and Enhanced Full Rate (EFR). Enhanced Full Rate coding provides a speech service that has improved voice quality from the original Full Rate speech coding, whilst using the same air interface bandwidth. EFR employs a new speech coding algorithm and additions to the full rate channel coding algorithm to accomplish this improved speech service,

CONTROL CHANNEL

These control channels are used by the MS to establish communication with the network in the idle mode and also in initiating calls to enter the dedicated mode. Timeslot 0 is grouped into structures of 51 frames referred to as Control Channel Multiframes The control channels are grouped as Broadcast Control Channels (BCCH) Common Control Channels (CCCH) and Dedicated Control Channel (DCCH).

Broadcast Channels (BCCH)

The Broadcast Control Channel is transmitted by the BTS at all times. The RF carrier used to transmit the BCCH is referred to as the BCCH carrier. The information carried on the BCCH is monitored by the MS periodically (at least every 30 secs), when it is switched on and not in a call. Each cell has one carrier designated as a BCH carrier. The BCH carrier has all 8 timeslots continuously on, either with traffic or dummy bursts. Timeslot 0 of the BCH carrier contains logical control channels. Broadcast Control Channel (BCCH) Carries the following information (this is only a partial list): Location Area Identity (LAI). List of neighbouring cells which should be monitored by the MS. List of frequencies used in the cell. Cell identity. Power control indicator. DTX permitted. Access control (for example, emergency calls, call barring).

Information distributed over Broadcast channel helps the MS to orient themselves in the mobile radio N/W .BCH channels are all downlink Pt. to Multi pt. and are allocated to timeslot zero. FCCH: Frequency correction channel This is transmitted frequently on the BCCH timeslot and allows the mobile to synchronize its own frequency to that of the transmitting base site. The FCCH may only be sent during timeslot 0 on the BCCH carrier frequency and therefore it acts as a flag to the mobile to identify Timeslot 0. SCH: (Synchronisation channel ) The SCH carries the information to enable the MS to synchronize to the TDMA frame structure and know the timing of the individual timeslots. The following parameters are sent: Frame number. Base Site Identity Code (BSIC). The MS will monitor BCCH information from surrounding cells and store the information from the best six cells. The SCH information on these cells is also stored so that the MS may quickly resynchronize when it enters a new cell.

Common Control Channels (CCCH)

Common Control Channels (CCCH)


CCCH contains all point to multi-point downlink channels (BTS to several MSs) and the uplink Random Access Channel: RACH: (UL) Random Access Channel is sent by the MS to request a resources from the network e.g. an SDCCH channel for call setup. AGCH (DL) Access Grant Channel is used to allocate a dedicated channel (SDCCH) to the mobile. PCH (DL) Paging Channel sends paging signal to inform mobile of a call. Active MSs must frequently monitor both BCCH and CCCH. The CCCH will be transmitted on the RF carrier with the BCCH.

Dedicated Control Channels (DCCH)


DCCH comprise the following bi-directional (uplink / downlink) point to point control channels .Used for signalling between MS & BTS: SDCCH: Standalone Dedicated control Channel is used for call set up, location updating and also SMS.It carries all signalling B/W BTS & MS when no TCH is allocated. Which supports the transfer of Data to and from the MS during call setup and validation. SummaryUsed for services request, SMS,Location update ,subscriber Authentication,Equipment validation. (Afterwards TCH Comes into picture) SACCH: Slow Associated Control Channel is used for link measurements and signalling during a call .Used for non urgent procedures. Summarytransmission of Signalling Data ,Radio Link Supervision measurement ,Transmit power control & Timing advance data

FACCH
FACCH: Fast Associated Control CHannel is used (when needed) for signalling during a call, mainly for delivering handover messages and for acknowledgement when a TCH is assigned.Used mainly during handovers when SACCH Signalling is not fast enough.FACCH data is transmitted over TCH, this is marked by Flag called Stealling Flag

Dedicated Control Channels (DCCH) The DCCH is a single timeslot on an RF carrier which is used to convey eight Stand-alone Dedicated Control Channels (SDCCH). A SDCCH is used by a single MS for call setup, authentication, location updating and SMS point to point. As we will see later, SDCCH can also be found on a BCCH/CCCH timeslot, this configuration only allows four SDCCHs. Associated Control Channels (ACCH) These channels can be associated with either an SDCCH or a TCH. They are used for carrying information associated with the process being carried out on either the SDCCH or the TCH.

CONTINUE
Slow Associated Control Channel (SACCH) Conveys power control and timing information in the downlink direction (towards the MS) and Receive Signal Strength Indicator (RSSI), and link quality reports in the uplink direction. Fast Associated Control Channel (FACCH) The FACCH is transmitted instead of a TCH. The FACCH steals the TCH burst\ and inserts its own information. The FACCH is used to carry out user authentication, handovers and immediate assignment. All of the control channels are required for system operation, however, in the same way that we allow different users to share the radio channel by using different timeslots to carry the conversation data, the control channels share timeslots on the radio channel at different times. This allows efficient passing of control information without wasting capacity which could be used for call traffic. To do this we must organize the timeslots between those which will be used for traffic and those which will carry control signalling.

TIME SLOT

MULTIFRAME & TIMING


There are eight timeslots within each TDMA frame, enabling eight physical channels to share a single physical resource the RF carrier. In turn, each physical channel may be shared by a number of logical channels. In order to understand how a single physical channel is shared by various logical channels, it is necessary to introduce the GSM multiframe structures that make it possible.

The 26-frame Traffic Channel Multiframe


The 12th frame (no. 13) in the 26-frame traffic channel multiframe is used by the Slow Associated Control Channel (SACCH) which carries link control information to and from the MSBTS. Each timeslot in a cell allocated to traffic channel usage will follow this format, that is, 12 bursts of traffic, 1 burst of SACCH, 12 bursts of traffic and 1 idle. The duration of a 26-frame traffic channel multiframe is 120 ms (26 TDMA frames) .When half rate is used, each frame of the 26-frame traffic channel multiframe allocated for traffic will now carry two MS subscriber calls (the data rate for each MS is halved over the air interface). Although the data rate for traffic is halved, each MS still requires the same amount of SACCH information to be transmitted, therefore frame 12 WILL BE USED as SACCH for one half of the MSs and the others will use it as their IDLE frame, and the same applies for frame 25, this will be used by the MSs for SACCH (those who used frame 12 as IDLE) and the other half will use it as their IDLE frame.

The 51-frame Control Channel Multiframe


The 51-frame structure used for control channels is considerably more complex than the 26-frame structure used for the traffic channels. The 51-frame structure occurs in several forms, depending on the type of control channel and the network providers requirements.

The 51-frame Control Channel Multiframe (BCCH/CCCH)


The BCCH/CCCH 51-frame structure illustrated on the opposite page will apply to timeslot 0 of each TDMA frame on the BCCH carrier (the RF carrier frequency to which BCCH is assigned on a per cell basis). In the diagram, each vertical step represents one repetition of the timeslot (= one TDMA frame), with the first repetition (numbered 0) at the bottom. Looking at the uplink (MSBSS) direction, all timeslot 0s are allocated to RACH. This is fairly obvious because RACH is the only control channel in the BCCH/CCCH group which works in the uplink direction. In the downlink direction (BSSMS), the arrangement is more interesting. Starting at frame 0 of the 51-frame structure, the first timeslot 0 is occupied by a frequency burst (F in the diagram), the second by a synchronizing burst (S) and then the following four repetitions of timeslot 0 by BCCH data (B) in frames 25. The following four repetitions of timeslot 0 in frames 69 are allocated to CCCH traffic (C), that is, to either PCH (mobile paging channel) or AGCH (access grant channel). Then follows, in timeslot 0 of frames 10 and 11, a repeat of the frequency and synchronizing bursts (F and S), four further CCCH bursts (C) and so on. Note that the last timeslot 0 in the sequence (the fifty-first frame frame 50) is idle.

The 51-frame Control Channel Multiframe DCCH/8 (SDCCH and SACCH)


The diagram opposite shows the 51-frame structure used to accommodate eight SDCCHs, although, as it takes two repetitions of the multiframe to complete the entire sequence, it may be more logical to think of it as a 102-frame structure. This structure may be transmitted on any timeslot. Note that the SACCHs (shaded) are associated with the SDCCHs. It is important to remember that each SDCCH has an SACCH just like a traffic channel. i.e. D0 associated with A0 D1 associated with A1 .. .. .. .. .. D7 associated with A7 Note: The downlink and uplink channels are staggered in order to give the mobile time to process the received message and formulate a response.

The 51-frame Control Channel Multiframe DCCH/8 (SDCCH and SACCH)

The 51-frame Control Channel Multiframe Combined Structure

As we can see in the diagram opposite, each of the control channel types are present on a single timeslot. The number of MSs which can effectively use this cell is therefore reduced, as we now only have 3 CCCH groups and 4 SDCCHs, which translates into fewer pages and simultaneous cell setups. A typical use of this type of control channel timeslot is in rural areas, where the subscriber density is low.

Superframes and Hyperframes

It is not by accident that the control channel multiframe is not a direct multiple of the traffic channel multiframe. From the diagram, it can be seen that any given frame number will only occur simultaneously in both multiframes every 1326 TDMA frames (26x 51). This number of TDMA frames is termed a superframe and it takes 6.12 s to transmit. This arrangement means that the timing of the traffic channel multiframe is always moving in relation to that of the control channel multiframe and this enables a MS to receive and decode BCCH information from surrounding cells.If the two multiframes were exact multiples of each other, then control channel timeslots would be permanently masked by traffic channel timeslot activity. This changing relationship between the two multiframes is particularly important, for example, to a MS which needs to be able to monitor and report the RSSIs of neighbour cells (it needs to be able to see all the BCCHs of those cells in order to do this). The hyperframe consists of 2048 superframes, this is used in connection with ciphering and frequency hopping. The hyperframe lasts for over three hours, after this time the ciphering and frequency hopping algorithms are restarted.

Mobile Activity Transmit and Receive Timeslots

As the MS only transmits or receives its own physical channel (normally containing TCH and SACCH) for one-eighth of the time, it uses the remaining time to monitor the BCCHs of adjacent target cells. It completes the process every 480 ms, or four 26-TCH multiframes. The message that it sends to the BSS (on SACCH, uplink) contains the Receive Signal Strength Indication (RSSI) of the adjacent cells, plus that of the link to the BSS itself, plus an indication of the quality of the current connection. This quality measurement is somewhat similar to a bit error rate test. Just as the mobile completes one series of measurements, it completes sending the previous series to the BSS and starts to send the latest series; thus the processes of compilation and transmission form a continuous cycle.

GSM Voice & Channel Coding

Here we will consider two forms of coding techniques used within the GSM system. Firstly the process used to convert human speech into a digital equivalent and Secondly the coding processes for compressing and protecting the data for transmission over the air interface.

GSM Voice & Channel Coding Sequence

Speech Coding GSM transmits using digital modulation - speech must Be converted to binary digits Coder and decoder must work to the same standard Simplest coding scheme is Pulse Code Modulation (PCM) Sampling every 125 s Requires data rate of 64 kbps

Sampling rate- 8 Khz Quantization8192 levels (in GSM) Coding13 bits (2 ^ 13 =8192) We get bit rate=104 kbps If 8 subscriber uses 104 kbps we get 832 kbps 200khz cant fit it,So we go for speech coding & Segmenation. Speech is coded at 20 msec.this is same as sampling at 50/sec instead at 8000/sec. Instead of 13 bits 260 bits are used =50 * 260=13kbps 8 users are in 1 RF carrier =13*8=104 kbs (200khz) Channel coding I/p is 260 bits & O/p 456 bits.Which are then interleaved.(22.8 kbps).

Coding is added to the information bits (redundancy) which enable the original to be reconstructed given a small number of random errors.

Convolution Coding

Rate of coding describes the amount of redundancy in the coded data: 1/2 rate code transmits twice as many bits as actual data Data rate is halved Convolutional codes cannot detect errors The efficiency of the convolutional coding described above is based on An assumption that errors will be randomly distributed. However, radio transmission paths tend to be prone to frequency-dependent bursty type errors due primarily to fading. Inter leaving So the data bursts are not sent in their natural order, but are interleaved among a set of timeslots within the multiframe.

HANDOFF

Procedure

in which an MS releases a connection with a BTS, and establishes a connection with a new BTS, while ensuring that the ongoing call is maintained Needs two mechanisms

Handover preparation: detection of cellborder crossing . Based on radio link quality measurements Handover execution: setup of a new channel in a cell, and tear-down of a previous channel

Types of Handoff

Hard & Soft handover

GSM Power Control Functions Prevent unnecessary power emissions to: Increase life of battery-powered devices Reduce network interference Equalise power levels received at BTSs Adjustments to cell coverage Methods Include: Adaptive Power Control Discontinuous Transmission (DTX) Discontinuous Reception (DRX)

Power control within a GSM system has four main purposes: Reduce power outputs to the minimum required for effective communications in order to reduce interference Limit unnecessary power emissions in order to increase the longevity of battery-power equipments Prevent MSs closer to BTS de-sensitising those more distant Enable the network controller to adjust cell coverage by adjusting BTS output power. GSM power control is achieved by a number of methods. These include: Adaptive Power Control. This automatically adjusts power outputs up or down to ensure to the minimum required to meet the prescribed service quality level. Discontinuous Transmission (DTX). This is a procedure whereby transmissions are only made when information is to be passed. Discontinuous Reception (DRX). This procedure enables batterypowered MSs to minimise power consumption by only listening out on specific control channels.

When a call is established, the MS remains in transmit mode for the duration of the call. However, in speech mode, it has been shown that information (encoded speech) is actually being transmitted for less than half the time. DTX is a technique that reduces emissions from the MS by only transmitting when information is to be sent.

Reasons for Frequency Hopping (1) GSM radio signals are affected by multi-path interference, causing fading Changing frequency (wavelength) moves the position of the fade Frequency hopping cycles through many fade positions This reduces the effect of the fades when the mobile is moving slowly Cells are subject to interference from other cells using the same carriers at the re-use distance If the cells hop through a set of frequencies in different sequences, the effect of this interference is reduced C/I ratio is increased

Received signal quality Received signal strength Distance of MS from BTS Drops below power budget margin Each parameter has a operator-defined threshold and handover decisions can be based on one or a combination of the parameters During its idle time slots of a multiframe, the MS scans the BCCH of up to 32 neighbouring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, at least once per second, and is used by the handover algorithm.

Timing Advance

Contd
Timing Advance is needed to compensate for different time delays in the transmission of radio signals from different mobiles. The TA value to use is found initially from the position of the received RACH burst in the guard period and is adjusted during the call in response to subsequent normal burst positions. The TA value to use is found initially from the position of the received RACH burst in the guard period and is adjusted during the call in response to subsequent normal burst positions.

Call Flow

MS Mobility States A Mobile Station (MS) can be in one of three mobility states: MS turned off MS turned on in idle mode MS turned on in dedicated mode MS Turned Off In this case the MS cannot be reached by the network. This could be due to the MS being out of coverage for an extended period or in powered down or the SIM has been removed. In all cases, the MS fails to respond to paging messages and does not provide periodic location updates. In such circumstances, the network assumed the MS is IMSI detached (see below). MS Turned on in Idle Mode In idle mode the MS is camped-on, synchronised to the network and is ready to place or receive a call. The MS is said to be IMSI-attached. It can also receive paging messages and provide periodic location updates (e.g. on change of Location Area). In addition it carries out cell reselection procedures as it moves around the network. MS Turned on in Dedicated Mode In dedicated mode, the MS is participating in user information transfer, either through a voice or data call.

(1) The incoming call is passed from the fixed network to the gateway MSC (GMSC). (2) Using the MSISDN of the calling MS, the GMSC interrogates the HLR to determine the IMSI number of the called party. (3) The HLR checks for the existence of the called number and identifies the VLR to which it is currently affiliated. It then requests the mobile station roaming number (MSRN) from the identified VLR. (4) Upon receipt, the HLR transmits the MSRN back to the GMSC. (5) When the GMSC receives a valid MSRN, it switches the call through to the appropriate MSC. (6) The VLR is queried for the location range and reachability status of the mobile subscriber. (7) If the MS is marked reachable, a radio call is enabled at the MSC. (8) This generates a paging request to from the MSC to all BSSs in the MSs last recorded Location Area. (9) The mobile subscriber telephone responds to the paging request from its current cell, the link is extended to the MS and authentication information is passed from the MS to the MSC . (10) All necessary security procedures are executed. (11) If security procedures are successful, the VLR indicates to the MSC that the call can be completed. (12) The MSC then extends the call from the GMSC to the MS.

Subscriber identity confidentiality provides for the privacy of GSM PLMN subscribers identities by ensuring that the IMSI is not made available or disclosed without authorisation. This capability provides protection against location tracing mobile subscribers by listening to the signalling exchanges on the radio path. Protection of a subscribers IMSI is achieved through the issuing of a temporary replacement ID. This is known as the subscribers Temporary Mobile Subscriber Identity (TMSI pronounced timsie). This identity is allocated by the VLR when a subscriber first affiliates to the network and may be subject to change each time the subscriber reconnects to the network or when it moves between MSCs (and hence VLRs).

Cell selection Procedure


MS

powers-up MS starts measuring received power level from all cells in range MS calculates average power level received from each cell: Stored in RXLEV(n) parameter MS calculates C1 parameter for each cell based on RXLEV(n) Mobile compares cells which give a positive value of C1 and camps-on to the cell with the highest C1 value On switch-on, an MS periodically measures the received power level on each of the BCCH frequencies of all cells within range. From these periodic measurements the MS calculates the mean received level value from each cell, stored in the parameter RXLEV(n) where n=neighbouring cell number .cell reselection is achieved by comparing current cell C1with neighbouring C1 cell measurements: Between cells within a Location Area: C1 (new) > C1 (old) (for more than 5 seconds) Between cells on a Location Area boundary: C1 (new) > C1 (old) + OFFSET Based on these calculated values, the MS selects which cell to connect to. This connection process is referred top as Camping-on to that cell. Once a mobile has camped on to a cell, it will continue to measure neighbouring BCCH carriers, looking for a better cell.

CALL MANAGEMENT
The Following Steps Took Place while a Mobile call is originated and Terminated:

Mobile-to-Land Scenario Land-to-Mobile Scenario Mobile-to-Mobile Scenario

Mobile-to-Land CALL Scenario


The following table lists the phases of a Mobile-to-Land call.

Mobile-to-Land CALL Scenario


STAGE DESCRIPTION

Request for services; the MS requests to setup a call

Authentication; the MSC/VLR requests the AUC for Authentication parameters. Using these parameters the MS is Authenticated. Ciphering; using the parameters which were made available earlier during the authentication the uplink and the downlink are ciphered.

Equipment Validation; the MSC/VLR requests the EIR to check the IMEI for validity Call Setup; the MSC establishes a connection to the MS.

Handover (s)

Call release; the speech path is released

Land-to-Mobile CALL Scenario The following table lists the phases of a Land-to-Mobile CALL Scenario
STAGE 1 2 3 4 5 6 7 8

Description
Routing Analysis; the MS terminated call is routed to the visited MSC using information from the HLR and VLR. Paging; the MSC initiates a communication with the MS Authentication; the MSC/VLR requests the AUC for authentication parameters. Using these parameters the MS is authenticated. Ciphering; using the parameters which were made available earlier during the authentication the uplink and the downlink are ciphered. Equipment Validation; the MSC/VLR requests the EIR to check the IMEI for validation Call setup; the MSC establishes a connection to the MS. Handover (s) Call release; the speech path is released

Mobile-to-Mobile Scenario Phases of a Mobile-to-Mobile Call The Mobile-to-Mobile call phases can be sub divided in two parts: 1. The Originating Mobile 2. The Terminating Mobile ORIGINATING MOBILE: The phases of originating mobile are:

Request for services. Authentication (optional). Ciphering (optional). Call setup Release

Mobile-to-Mobile Scenario

TERMINATNG MOBILE The phases of originating mobile are:


Routing analysis Paging Authentication (optional). Ciphering (optional). Equipment validation (optional). Call setup. Release.

End of Presentation

Potrebbero piacerti anche