Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
701,UDYOG VIHAR, PHASE -V GURGAON, INDIA TEL NO. 0124- 4005655, 4362150-52 FAX NO. 0124-4362151
Telecom Scenario
Mobile
Telecommunication is one of the fastest growing & most demanding of all telecommunication technologies. In many cases ,cellular solutions successfully compete with traditional wire line N\W and cordless telephones. In future ,cellular systems employing Digital technology will become the universal method of telecommunication.
Object of training
What
is GSM. Evolution of GSM. Fundamental of GSM Architecture of GSM Establishment of Network Fundamental of Radio Propagation Call flow
1906Human voice was successfully transmitted over RADIO. 1921Detroit police dept. used 2 Mhz frequency in vehicular mobile radio. 1930Amplitude Modulation was invented 1935---Frequency Modulation was invented (improved audio quality). 1947Bell labs. Envisions the cellular concepts. 1991first digital cellular standard (GSM) is launched 1998No. of subscriber world wide has grown to over 200 million.
GSM
GSM carriers are spaced 200 kHz. Apart In the BTS downlink signal, Different timeslots belong to different users - a mobile listens only to its recurring timeslots . During unused timeslots, a mobile can measure the signal strength of surrounding BTSs to guide the handover process The mobile on its uplink transmits only during its assigned timeslots . Mobiles transmit only during their own timeslots . Mobile transmit timeslots occur three timeslots after the corresponding BTS transmit Timeslot . This avoids simultaneous mobile TX/RX and the need for duplexer at the mobile
Total mobility
international access, Worldwide connectivity
High capacity
better frequency efficiency, smaller cells, more customers per cell
Security functions
access control, authentication
GENERATION OF GSM
1st generation:- Analog mobile technologies :- AMPS , TACS & NMT. 2nd generation:- digital mobile technologies :- GSM , CDMA 2.5generation:- Enhancement of GSM:- GPRS 3rd generation:- Technologies coursed by ITU-IMT
The following table lists the key events in the GSM evolution
YEAR 1982
EVENT TOOK PLACE CEPT adopts WARC 79 recommendation allocating 890-915 MHz and 935-960 MHz for land mobile GSM created to set standard
1985 1987
EEC supports GSM standards throughout community Digital Technology standards set for TDMA, speech coding, channel: and modulation method. Telecommunication carriers from 14 European countries sign Memorandum of Understanding (MOU) and agree to install system in 1991
Industrial development started Acceptance of GSM-1800 system, with GSM as standard First system deployed (July) First GSM terminals receive interim type approval First GSM-1800 network launched First GSM-1900 network in US & Canada
GSM STANDARDS
GSM-900 Standard
The GSM-900 standard is a standard for digital voice transmission in the 900 MHz band. This so called primary band" includes two sub bands of 25 MHz
GSM-1800 Standard
In GSM-1800, 1800 MHz band was allocated for digital mobile telephone services which has frequency of 75 MHz. This was three times the bandwidth allocated for GSM-900.
GSM-1900 Standard
GSM-1900 is the standard for the 1900MHz band. It includes the same network component as the GSM-900 or GSM-1800. The band width of this standard is 60 MHz.
GSM Channels/Carriers
The following table will show the channels and carriers of different GSM models
ADVANTAGES OF GSM1800
Small Cell radius makes it an ideal capacity solution. However, due to higher propogation losses, more number of sites are required (approx. 1.5~2 times that of GSM900)
Area type High Traffic area Medium Traffic area Low Traffic area Highways Small Towns (upto 10 sq. Kms)
GSM 1800 Sites 1.2~1.5 x GSM 900 sites 1.5~2 x GSM 900 sites 2~2.5 x GSM 900 sites 2~3 x GSM 900 sites Equal to GSM900 sites
GPRS-Wireless
Data Services . EDGEProvides 3 times the data capacity of GPRS. 3G---Uses WCDMA technologies Over Air interface (5MHz).
P-GSM 900 Uplink frequency 890-915 MHz 935-960 MHz 200 kHz
174
144
374
299
Duplex spacing
45 MHZ
45 MHZ
45 MHZ
95 MHZ 80 MHZ
Spectrum
K LIN N OW D
890MHz
915MHz
935MHz
960MHz
124
124
Technology
FDMA
TDMA
DIFFERENT TYPE OF TECHNOLOGIES USED IN GSM FDMA (Frequency division Multiple Access) In FDMA, signals from various users are assigned different frequencies. Frequency guard bands are maintained between adjacent signal spectra to minimize crosstalk between channels. Advantages of FDMA
1. 2.
Capacity increase can be obtained by reducing the information bit rate and using efficient digital codes. Technological advances required for implementation are simple. A system can be configured so that improvement in terms of speech code bit rate reduction could be readily incorporated. Disadvantages of FDMA The maximum bit rate per channel is fixed and low, inhibiting the flexibility in bit-rate capability that is needed for computer file transfers
Frequency multiplex
Separation of the whole spectrum into smaller frequency bands A channel gets a certain band of the k1 k2 k3 k4 k5 spectrum for the whole time c Advantages:
no dynamic coordination necessary works also for analog signals
k6
Disadvantages:
waste of bandwidth if the traffic is distributed unevenly inflexible t guard spaces
A channel gets the whole spectrum for a certain amount of time Advantages:
only one carrier in the medium at any time throughput high even for many users
Time multiplex
k1 c
k2
k3
k4
k5
k6
Disadvantages:
precise synchronization necessary
Combination of both methods A channel gets a certain frequency band for a certain amount of time k k k k
1 2 3 4
k5
k6
c f
Example:
GSM Advantages:
Better protection against tapping Protection against frequency k selective interference Higher data rates compared to c code multiplex
But:
k2
k3
k4
k5
k6
Cells
I wish I could
Representation of Cells
Ideal cells
Fictitious cells
size determines number of cells available to cover geographic area and (with frequency reuse) the total capacity available to all users Capacity within cell limited by available bandwidth and operational requirements Each network operator has to size cells to handle expected traffic demand
Cell structure
Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Advantages of cell structures: higher capacity, higher number of users less transmission power needed more robust, decentralized base station deals with interference, transmission area etc. locally Problems: fixed network needed for the base stations handover (changing from one cell to another) necessary interference with other cells Cell sizes from some 100 m in cities to, e.g., 35 km on the country side (GSM) - even less for higher frequencies
Sectorization
The problem with employing omni-directional cells (Radiate waves to 360 degrees) is that as the number of MSs increases in the same geographical region, we have to increase the number of cells to meet the demand. To gain a further increase in capacity within the geographic area we can employ a technique called sectorization. Sectorization splits a single site into a number of cells, each cell has transmit and receive antennas and behaves as an independent cell. This has a number of advantages: firstly, as we are now concentrating all the energy from the cell in a smaller area 60, 120, 180 degrees instead of 360 degrees, we get a much stronger signal, which is beneficial in locations such as inbuilding coverage. Secondly, we can now use the same frequencies in a much closer re-use pattern, thus allowing more cells in our geographic region which allows us to support more MSs.
Antenna types
Directional antennas are useful for covering long streets and have the following advantages: -Extra gain in the forward direction. -Suppressed signal in the reverse direction, this is a useful characteristic if the cell is a potential interferer with another cell located behind it. -It is also worth noting that a directional antenna could be used to improve in-building coverage, in specific buildings, within the micro cell area. Omni antennas are useful for covering open areas (for example squares, plazas). In these areas, it is desirable to have a clearly designated best server cell to avoid excessive handovers and their attendant problems
Frequency Reuse
The spectrum allocated for a cellular network is limited. As a result there is a limit to the number of channels or frequencies that can be used. For this reason each frequency is used simultaneously by multiple basemobile pairs. This frequency reuse allows a much higher subscriber density per MHz of spectrum than other system. System capacity can be further increased by reducing the cell size down to radii as small as 200m
Frequency Reuse
7 cell re-use pattern f7 f6 f1 f5 f4 f3 f5 f4 f2 f6 f1 f3 f7 f2
GSM Architecture
This is the part of the network which provides the radio interconnection from the MS to the land-based switching equipment.
Types of MS
Mobile Station
MOBILE STATION (MS) :station (MS) represents the terminal equipment used by the wireless subscriber supported by the GSM Wireless system. The SIM may be a removable module, while the equipment identity is not linked to a particular subscriber. Functions of a Mobile Station :Radio transmission termination. Radio Channel Management. Speech Encoding/Decoding Radio Link error Protection. Flow control of data. Mobility Management. The mobile
SIM
International Mobile Subscriber Identity (IMSI) This number identifies the MS subscriber. It is only transmitted over the air during initialization. The IMSI identifies the subscriber within the GSM network while the MS ISDN is the actual telephone number a caller (possibly in another network) uses to reach that person. Security is provided by the use of an authentication key (explained later in this section) and by the transmission of a temporary subscriber identity (TMSI) across the radio interface where possible to avoid using the permanent IMSI identity. Temporary Mobile Subscriber Identity (TMSI) This number identifies the subscriber, it is periodically changed by the system management to protect the subscriber from being identified by someone attempting to monitor the radio interface. Location Area Identity (LAI) Identifies the current location of the subscriber. Subscriber Authentication Key (Ki) This is used to authenticate the SIM card. Mobile Station International Services Digital Network (MSISDN) This is the telephone number of the mobile subscriber. It is comprised of a country code, a network code and a subscriber number.
The BSC as its name implies provides the control for the BSS. The BSC communicates directly with the MSC. The BSC may control single or multiple BTS. The BSC switching matrix also allows the BSC to perform handovers between radio channels on BTSs, under its control, without involving the MSC.
3)
The Transcoder (XCDR) is required to convert the speech or data output from the MSC (64 kbit/s PCM), into the form specified by GSM specifications for transmission over the air interface, that is, between the BSS and MS (64 kbit/s to 16 kbit/s and vice versa)
BSC
Characteristics of the Base Station System (BSS) are : The BSS is responsible for communicating with mobile stations in cell areas. One BSC controls one or more BTSs and can perform inter-BTS and intra-BTS handover. As we have mentioned, a BSC may control several BTSs, the maximum number of BTSs which may be controlled by one BSC is not specified by GSM.
- Each PLMN Should have at least one HLR - One VLR is connected to several MSC ,but one MSC has one VLR Characteristics of the Base Station System (BSS) are : The BSS is responsible for communicating with mobile stations in cell areas. One BSC controls one or more BTSs and can perform inter-BTS and intra-BTS handover. The Transcoder XCDR The Transcoder is used to compact the signals from the MS so that they are more efficiently sent over the terrestrial interfaces.
BSS
BTS can host 16 TRXs where one TRX handles one RF carrier (8 time slots). one BTS may have one to four TRXs corresponding to the no. of carriers used in the cell.
Practically
Slow
frequency hopping Interleaving and ordering again Channel coding and decoding Creation and transmission of the broadcast common control channel on channel 0 of the BCCH-TRX. GMSK Modulation & Demodulation on uplink and downlink
Does
TRAU
PCM voice fromtransmission to a mobile station. And also convert received 13 kbps or 8 kbps from mobile back to 64kbps required for MSC. TRAU is not used for data connections (used only for voice connections). Used b/w BSC & MSC or BTS & BSC.
Transcoder
The 64 kbit/s Pulse Code Modulation (PCM) circuits from the MSC, if transmitted on the air interface without modification, would occupy an excessive amount of radio bandwidth. This would use the available radio spectrum inefficiently. The required bandwidth is therefore reduced by processing the 64 kbit/s circuits so that the amount of information required to transmit digitized voice falls to a gross rate of 16 kbit/s. The transcoding function may be located at the MSC, BSC, or BTS.
TRANSCODER
MOBILE SWITCHING CENTER (MSC) :Mobile services switching center (MSC) performs the switching functions for all mobile stations located in the geographical area covered by its assigned BSSs. Each MSC provides service to MSs located within a defined geographic coverage area,the network typically contains more than one MSC. One MSC is capable of supporting a regional capital with approximately one million inhabitants. An MSC of this size will be contained in about half a dozen racks. The functions carried out by the MSC are listed below: Call Processing Includes control of data/voice call setup, inter-BSS and inter-MSC handovers and control of mobility management (subscriber validation and location). Operations and Maintenance Support Includes database management, traffic metering and measurement, and a manmachine interface. Internetwork Interworking Manages the interface between the GSM network and the PSTN. Billing Collects call billing data.
HLR
HOME LOCATION REGISTER (HLR) :The Home Location Register (HLR) Contains the identities of mobile subscribers, their service parameters, and their location information.HLR deals with tasks that are independent of Subscriber location. Function of the HLR include:Identity of mobile subscriber Location information for call routing. HLR stores Ki parameter (for each subscriber) which is also stored in SIM. HLR contains IMSI,MSISDN,VLR add.,Subscriber data.
VISITOR LOCATION REGISTER (VLR) :The Visitor Location Register (VLR) contains the subscriber parameters and location information for all mobile subscribers currently located in the geographical area controlled by that VLR. Functions of the VLR include :
Identity of mobile subscriber. Any temporary mobile subscriber identity (TMSI) allocation. Location area where the mobile station is registered Copy of the subscriber data from the HLR.
VLR
key (Ki) Generates security related parameters needed to authorize service using Ki. Generates unique data pattern called a cipher key (Kc) needed for encrypting user speech and data. AUC sends RAND to MS .AUC & MS do some calculation based on RAND ,secret key of SIM & A3 algorithm & generate a number. If result sent by MS is same as AUC Then MS is authenticated. 1. Triples (Kc, SRES and RAND) are stored at the VLR. 2. The VLR sends RAND via the MSC and BSS, to the MS (unencrypted). 3. The MS, using the A3 and A8 algorithms and the parameter Ki stored on the MS SIM card, together with the received RAND from the VLR, calculates the values of SRES and Kc. 4. The MS sends SRES unencrypted to the VLR 5. Within the VLR the value of SRES is compared with the SRES received from the mobile. If the two values match, then the authentication is successful. 6. If cyphering is to be used, Kc from the assigned triple is passed to the BTS. 7. The mobile calculates Kc from the RAND and A8 and Ki on the SIM. 8. Using Kc, A5 and the GSM hyperframe number, encryption between the MS and the BSS can now occur over the air interface.
EIR
EQUIPMENT IDENTITY REGISTER (EIR) :
The Equipment Identity Register (EIR) is accessed during the equipment validation procedure when a mobile station accesses the system .It contains the identity of mobile station equipment which may be valid, suspect, or known to be fraudulent. This contains :
White or Valid list list of valid MS equipment identities. Grey or Monitored list list of suspected mobiles under observation. Black or prohibited list list of mobiles for which service is barred
The Operation and maintenance Center (OMC) is the centralized maintenance and diagnostic heart of the base station system (BSS). It allows the network provider to operate, administer , and monitor the functioning of the BSS. This enables the network provider to configure and maintain the network from a central location. Includes database management, traffic metering and measurement, manmachine interface.
This consists of the Mobile services Switching Centre (MSC) and its associated system-control databases and processors together with the required interfaces. This is the part which provides for interconnection between the GSM network and the Public Switched Telephone Network (PSTN). The components of the Network Switching System are listed below: Mobile Services Switching Centre MSC Home Location Register HLR Visitor Location Register VLR Equipment Identity Register EIR Authentication Centre AUC InterWorking Function IWF Echo Canceller EC
Mobility Management
Other optional network elements that the MSC can interface include:
Internetwork Interworking The IWF provides the function to enable the GSM system to interface with the various forms of public and private data networks currently available. Echo Cancellor An EC is used on the PSTN side of the MSC for all voice circuits. Echo control is required at the switch because the inherent GSM system delay can cause an unacceptable echo condition, even on short distance PSTN circuit connections. During a normal PSTN land to land call, no echo is apparent because the delay is too short and the user is unable to distinguish between the echo and the normal telephone side tone. However, without the EC and with the GSM round trip delay added, the effect would be very irritating to the MS subscriber, disrupting speech and concentration. Gateway MSC The GMSC routes calls out of the network and is the point of access for calls entering the network from outside. GMSC--------PSTN+ISDN (other N/W).
LAI--Cells within the Public Land Mobile Network (PLMN) are grouped together into geographical areas. Each area is assigned a Location Area Identity (LAI), a location area may typically contain 30 cells. Each VLR controls several LAIs and as a subscriber moves from one LAI to another, the LAI is updated in the VLR. As the subscriber moves from one VLR to another, the VLR address is updated at the HLR.
TMSI--The VLR controls the allocation of new Temporary Mobile Subscriber Identity (TMSI) numbers and notifies them to the HLR. The TMSI will be updated frequently, this makes it very difficult for the call to be traced and therefore provides a high degree of security for the subscriber. The TMSI may be updated in any of the following situations: Call setup. On entry to a new LAI. On entry to a new VLR.
MSRNAs a subscriber may wish to operate outside its home system at some time, the VLR can also allocate a Mobile Station Roaming Number (MSRN). This number is assigned from a list of numbers held at the VLR (MSC). The MSRN is then used to route the call to the MSC which controls the base station in the MSs current location.
NMC
Sample Question
GSM Identifiers
IMEI International MobileStation Equipment Identity(80 Bit). The IMEI is an internationally-unique serial number allocated to the MS hardware at the time of manufacture. It is registered by the network operator and (optionally) stored in the AuC for validation purposes. IMSI International Mobile Subscriber Identifier (15 Bits) When a subscriber registers with a network operator, a unique subscriber IMSI identifier is issued and stored in the SIM of the MS. An MS can only function fully if it is operated with a valid SIM inserted into an <MS with a valid IMEI. TMSI Temporary Mobile Subscriber Identity (32 bits) A TMSI is used to protect the true identity (IMSI) of a subscriber. It is issued by and stored within a VLR (not in the HLR) when an IMSI attach takes place or a Location Area (LA) update takes place. At the MS it is stored in the MSs SIM (Issued by VLR) . The issued TMSI only has validity within a specific LA. MSISDN Mobile Subscriber ISDN number The MSISDN represents the true or dialled number associated with the subscriber. It is assigned to the subscriber by the network operator at
MSRN Mobile Station Roaming Number It is assigned by VLR of called subscriber.MSRN is required to route call from GMSC to Serving MSC/VLR (Where subscriber currently roams. LAI Location Area Identity Each Location Area within the PLMN has an associated internationally unique identifier (LAI). The LAI is broadcast regularly by BTSs on the Broadcast Control Channel (BCCH), thus uniquely identifying each cell with an associated LA. CI Cell Identifier The CI an identifier assigned to each cell within a network. However, the CI is only unique within a specific Location Area. When combined with the internationally unique LAI for its associated LA, the Global Cell Identity (GCI) is produced which is also internationally unique. BSIC Base Station Identity Code Each BTS is issued with a unique identity, the BSIC and is used to distinguish neighbouring BTSs. (6 Bits)
INTERFACE
Layer 1 Services The Physical Layer (Layer 1) contains all the functions necessary for the transmission of bit streams over the physical medium. It provides a transport service for the GSM logical channels. Services offered at Layer 1 include: Access Capabilities. Layer 1 carries out the cell selection functions for MSs in idle mode, in cooperation with the Layer 3 Radio Resource (RR) functions. Error Detection. Forward and backward error correction is implemented at layer 1 (see section on speech coding for details). Errored frames are not passed to Level 2 for processing. Encryption. Data encryption is also implemented at Layer 1 (see section on GSM security for details).
Layer 2 Services Here, the LAPDm protocol is used (similar to ISDN LAPD). LAPDm has the following functions: Connectionless transfer on point-to-point and point-to-multipoint signalling channels, Setup and take-down of layer 2 connections on point-to-point signalling channels, Connection-oriented transfer with retention of the transmission sequence, error detection and error correction.
Layer 3 Services Layer 3 contains the following sublayers which control signalling channel functions (BCH, CCCH and DCCH): Radio resource management (RR). The role of the RR management layer is to establish and release stable connection between mobile stations (MS) and an MSC for the duration of a call, and to maintain it despite user movements. The following functions are performed by the MSC: Cell selection, Handover, Allocation and take-down of point-to-point channels, Monitoring and forwarding of radio connections, Introduction of encryption, Change in transmission mode. Mobility management (MM). Mobility Management handles the control functions required for mobility including: Authentication Assignment of TMSI Management of subscriber location. Connection management (CM) is used to set up, maintain and clear call connections. It comprises three subgroups: Call control (CC) - manages call connections, Supplementary service support (SS) - handles special services, Short message service support (SMS) - transfers brief texts.
Neither the BTS nor the BSC interpret CM and MM messages. They are simply exchanged between the MSC and the MS using the Direct Transfer Application Part (DTAP) protocol on the A interface (see below). RR messages are mapped to or from the Base Station System Application Part (BSSAP) for exchange with the MS.
Um INTERFACE (MS- BTS) Air Interface between the MS and the BSS .It consist of protocol layer which help in -Radio resource management -Mobility management -Call management A-BIS INTERFACE (BSC - BTS) When the BSS consists of a Base Station Controller (BSC) and one or more Base Transceiver Stations (BTS), this interface is used between the BSC and BTS to support the services offered to the GSM users and subscribers. The interface also allows control of the radio equipment and radio frequency allocation in the BTS.In short it is used to exchange control information B/W BSC & BTS. A interface (BSC MSC) A interface carry 64kbps speech data B/W BSC & MSC
B INTERFACE (MSC - VLR) The VLR is the location and management data base for the mobile subscribers roaming in the area controlled by the associated MSC(s). Whenever the MSC needs data related to a given mobile station currently located in its area, it interrogates the VLR. When a mobile station initiates a location updating procedure with an MSC, the MSC informs its VLR which stores the relevant information. This procedure occurs whenever an MS roams to another location area. Also, when a subscriber activates a specific supplementary service or modifies some data attached to a service, the MSC informs (via the VLR) the HLR which stores these modifications and updates the VLR if required.
C INTERFACE (HLR and the MSC) The MSC must interrogate the HLR of the required subscriber to obtain routing information for a call or a short message directed to that subscriber.
D INTERFACE (HLR - VLR) This interface is used to exchange the data related to the location of the mobile station and to the management of the subscriber. The main service provided to the mobile subscriber is the capability to set up or to receive calls within the whole service area. To support this, the location registers have to exchange data. The VLR informs the HLR of the location of a mobile station managed by the latter and provides it (either at location updating or at call set-up) with the roaming number of that station. The HLR sends to the VLR all the data needed to support the service to the mobile subscriber. The HLR then instructs the previous VLR to cancel the location registration of this subscriber. Exchanges of data may occur when the mobile subscriber requires a particular service, when he wants to change some data attached to his subscription or when some parameters of the subscription are modified by administrative means.
When a mobile station moves from one MSC area to another during a call, a handover procedure has to be performed in order to continue the communication. For that purpose the MSCs have to exchange data to initiate and then to realize the operation. After the handover operation has been completed, the MSCs will exchange information to transfer A-interface signalling as necessary.
This interface is used between MSC and EIR to exchange data, in order that the EIR can verify the status of the IMEI retrieved from the Mobile Station. G INTERFACE (VLR VLR) When a mobile subscriber moves from a VLR area to another Location Registration procedure will happen. This procedure may include the retrieval of the IMSI and authentication parameters from the old VLR. H INTERFACE (HLR - AuC) When an HLR receives a request for authentication and ciphering data for a Mobile Subscriber and it does not hold the requested data, the HLR requests the data from the AuC.
CHANNELS
Logical channel
One
or more logical channel can be transmitted on a physical channel. Different types of logical channel are Traffic Channels (Speech & Data) Broad cast channel (Signalling) Common control channel (Signalling) Dedicated control channel (Signalling)
TRAFFIC CHANNEL
Speech channels are supported by two different methods of coding known as Full Rate (FR) and Enhanced Full Rate (EFR). Enhanced Full Rate coding provides a speech service that has improved voice quality from the original Full Rate speech coding, whilst using the same air interface bandwidth. EFR employs a new speech coding algorithm and additions to the full rate channel coding algorithm to accomplish this improved speech service,
CONTROL CHANNEL
These control channels are used by the MS to establish communication with the network in the idle mode and also in initiating calls to enter the dedicated mode. Timeslot 0 is grouped into structures of 51 frames referred to as Control Channel Multiframes The control channels are grouped as Broadcast Control Channels (BCCH) Common Control Channels (CCCH) and Dedicated Control Channel (DCCH).
The Broadcast Control Channel is transmitted by the BTS at all times. The RF carrier used to transmit the BCCH is referred to as the BCCH carrier. The information carried on the BCCH is monitored by the MS periodically (at least every 30 secs), when it is switched on and not in a call. Each cell has one carrier designated as a BCH carrier. The BCH carrier has all 8 timeslots continuously on, either with traffic or dummy bursts. Timeslot 0 of the BCH carrier contains logical control channels. Broadcast Control Channel (BCCH) Carries the following information (this is only a partial list): Location Area Identity (LAI). List of neighbouring cells which should be monitored by the MS. List of frequencies used in the cell. Cell identity. Power control indicator. DTX permitted. Access control (for example, emergency calls, call barring).
Information distributed over Broadcast channel helps the MS to orient themselves in the mobile radio N/W .BCH channels are all downlink Pt. to Multi pt. and are allocated to timeslot zero. FCCH: Frequency correction channel This is transmitted frequently on the BCCH timeslot and allows the mobile to synchronize its own frequency to that of the transmitting base site. The FCCH may only be sent during timeslot 0 on the BCCH carrier frequency and therefore it acts as a flag to the mobile to identify Timeslot 0. SCH: (Synchronisation channel ) The SCH carries the information to enable the MS to synchronize to the TDMA frame structure and know the timing of the individual timeslots. The following parameters are sent: Frame number. Base Site Identity Code (BSIC). The MS will monitor BCCH information from surrounding cells and store the information from the best six cells. The SCH information on these cells is also stored so that the MS may quickly resynchronize when it enters a new cell.
FACCH
FACCH: Fast Associated Control CHannel is used (when needed) for signalling during a call, mainly for delivering handover messages and for acknowledgement when a TCH is assigned.Used mainly during handovers when SACCH Signalling is not fast enough.FACCH data is transmitted over TCH, this is marked by Flag called Stealling Flag
Dedicated Control Channels (DCCH) The DCCH is a single timeslot on an RF carrier which is used to convey eight Stand-alone Dedicated Control Channels (SDCCH). A SDCCH is used by a single MS for call setup, authentication, location updating and SMS point to point. As we will see later, SDCCH can also be found on a BCCH/CCCH timeslot, this configuration only allows four SDCCHs. Associated Control Channels (ACCH) These channels can be associated with either an SDCCH or a TCH. They are used for carrying information associated with the process being carried out on either the SDCCH or the TCH.
CONTINUE
Slow Associated Control Channel (SACCH) Conveys power control and timing information in the downlink direction (towards the MS) and Receive Signal Strength Indicator (RSSI), and link quality reports in the uplink direction. Fast Associated Control Channel (FACCH) The FACCH is transmitted instead of a TCH. The FACCH steals the TCH burst\ and inserts its own information. The FACCH is used to carry out user authentication, handovers and immediate assignment. All of the control channels are required for system operation, however, in the same way that we allow different users to share the radio channel by using different timeslots to carry the conversation data, the control channels share timeslots on the radio channel at different times. This allows efficient passing of control information without wasting capacity which could be used for call traffic. To do this we must organize the timeslots between those which will be used for traffic and those which will carry control signalling.
TIME SLOT
As we can see in the diagram opposite, each of the control channel types are present on a single timeslot. The number of MSs which can effectively use this cell is therefore reduced, as we now only have 3 CCCH groups and 4 SDCCHs, which translates into fewer pages and simultaneous cell setups. A typical use of this type of control channel timeslot is in rural areas, where the subscriber density is low.
It is not by accident that the control channel multiframe is not a direct multiple of the traffic channel multiframe. From the diagram, it can be seen that any given frame number will only occur simultaneously in both multiframes every 1326 TDMA frames (26x 51). This number of TDMA frames is termed a superframe and it takes 6.12 s to transmit. This arrangement means that the timing of the traffic channel multiframe is always moving in relation to that of the control channel multiframe and this enables a MS to receive and decode BCCH information from surrounding cells.If the two multiframes were exact multiples of each other, then control channel timeslots would be permanently masked by traffic channel timeslot activity. This changing relationship between the two multiframes is particularly important, for example, to a MS which needs to be able to monitor and report the RSSIs of neighbour cells (it needs to be able to see all the BCCHs of those cells in order to do this). The hyperframe consists of 2048 superframes, this is used in connection with ciphering and frequency hopping. The hyperframe lasts for over three hours, after this time the ciphering and frequency hopping algorithms are restarted.
As the MS only transmits or receives its own physical channel (normally containing TCH and SACCH) for one-eighth of the time, it uses the remaining time to monitor the BCCHs of adjacent target cells. It completes the process every 480 ms, or four 26-TCH multiframes. The message that it sends to the BSS (on SACCH, uplink) contains the Receive Signal Strength Indication (RSSI) of the adjacent cells, plus that of the link to the BSS itself, plus an indication of the quality of the current connection. This quality measurement is somewhat similar to a bit error rate test. Just as the mobile completes one series of measurements, it completes sending the previous series to the BSS and starts to send the latest series; thus the processes of compilation and transmission form a continuous cycle.
Here we will consider two forms of coding techniques used within the GSM system. Firstly the process used to convert human speech into a digital equivalent and Secondly the coding processes for compressing and protecting the data for transmission over the air interface.
Speech Coding GSM transmits using digital modulation - speech must Be converted to binary digits Coder and decoder must work to the same standard Simplest coding scheme is Pulse Code Modulation (PCM) Sampling every 125 s Requires data rate of 64 kbps
Sampling rate- 8 Khz Quantization8192 levels (in GSM) Coding13 bits (2 ^ 13 =8192) We get bit rate=104 kbps If 8 subscriber uses 104 kbps we get 832 kbps 200khz cant fit it,So we go for speech coding & Segmenation. Speech is coded at 20 msec.this is same as sampling at 50/sec instead at 8000/sec. Instead of 13 bits 260 bits are used =50 * 260=13kbps 8 users are in 1 RF carrier =13*8=104 kbs (200khz) Channel coding I/p is 260 bits & O/p 456 bits.Which are then interleaved.(22.8 kbps).
Coding is added to the information bits (redundancy) which enable the original to be reconstructed given a small number of random errors.
Convolution Coding
Rate of coding describes the amount of redundancy in the coded data: 1/2 rate code transmits twice as many bits as actual data Data rate is halved Convolutional codes cannot detect errors The efficiency of the convolutional coding described above is based on An assumption that errors will be randomly distributed. However, radio transmission paths tend to be prone to frequency-dependent bursty type errors due primarily to fading. Inter leaving So the data bursts are not sent in their natural order, but are interleaved among a set of timeslots within the multiframe.
HANDOFF
Procedure
in which an MS releases a connection with a BTS, and establishes a connection with a new BTS, while ensuring that the ongoing call is maintained Needs two mechanisms
Handover preparation: detection of cellborder crossing . Based on radio link quality measurements Handover execution: setup of a new channel in a cell, and tear-down of a previous channel
Types of Handoff
GSM Power Control Functions Prevent unnecessary power emissions to: Increase life of battery-powered devices Reduce network interference Equalise power levels received at BTSs Adjustments to cell coverage Methods Include: Adaptive Power Control Discontinuous Transmission (DTX) Discontinuous Reception (DRX)
Power control within a GSM system has four main purposes: Reduce power outputs to the minimum required for effective communications in order to reduce interference Limit unnecessary power emissions in order to increase the longevity of battery-power equipments Prevent MSs closer to BTS de-sensitising those more distant Enable the network controller to adjust cell coverage by adjusting BTS output power. GSM power control is achieved by a number of methods. These include: Adaptive Power Control. This automatically adjusts power outputs up or down to ensure to the minimum required to meet the prescribed service quality level. Discontinuous Transmission (DTX). This is a procedure whereby transmissions are only made when information is to be passed. Discontinuous Reception (DRX). This procedure enables batterypowered MSs to minimise power consumption by only listening out on specific control channels.
When a call is established, the MS remains in transmit mode for the duration of the call. However, in speech mode, it has been shown that information (encoded speech) is actually being transmitted for less than half the time. DTX is a technique that reduces emissions from the MS by only transmitting when information is to be sent.
Reasons for Frequency Hopping (1) GSM radio signals are affected by multi-path interference, causing fading Changing frequency (wavelength) moves the position of the fade Frequency hopping cycles through many fade positions This reduces the effect of the fades when the mobile is moving slowly Cells are subject to interference from other cells using the same carriers at the re-use distance If the cells hop through a set of frequencies in different sequences, the effect of this interference is reduced C/I ratio is increased
Received signal quality Received signal strength Distance of MS from BTS Drops below power budget margin Each parameter has a operator-defined threshold and handover decisions can be based on one or a combination of the parameters During its idle time slots of a multiframe, the MS scans the BCCH of up to 32 neighbouring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, at least once per second, and is used by the handover algorithm.
Timing Advance
Contd
Timing Advance is needed to compensate for different time delays in the transmission of radio signals from different mobiles. The TA value to use is found initially from the position of the received RACH burst in the guard period and is adjusted during the call in response to subsequent normal burst positions. The TA value to use is found initially from the position of the received RACH burst in the guard period and is adjusted during the call in response to subsequent normal burst positions.
Call Flow
MS Mobility States A Mobile Station (MS) can be in one of three mobility states: MS turned off MS turned on in idle mode MS turned on in dedicated mode MS Turned Off In this case the MS cannot be reached by the network. This could be due to the MS being out of coverage for an extended period or in powered down or the SIM has been removed. In all cases, the MS fails to respond to paging messages and does not provide periodic location updates. In such circumstances, the network assumed the MS is IMSI detached (see below). MS Turned on in Idle Mode In idle mode the MS is camped-on, synchronised to the network and is ready to place or receive a call. The MS is said to be IMSI-attached. It can also receive paging messages and provide periodic location updates (e.g. on change of Location Area). In addition it carries out cell reselection procedures as it moves around the network. MS Turned on in Dedicated Mode In dedicated mode, the MS is participating in user information transfer, either through a voice or data call.
(1) The incoming call is passed from the fixed network to the gateway MSC (GMSC). (2) Using the MSISDN of the calling MS, the GMSC interrogates the HLR to determine the IMSI number of the called party. (3) The HLR checks for the existence of the called number and identifies the VLR to which it is currently affiliated. It then requests the mobile station roaming number (MSRN) from the identified VLR. (4) Upon receipt, the HLR transmits the MSRN back to the GMSC. (5) When the GMSC receives a valid MSRN, it switches the call through to the appropriate MSC. (6) The VLR is queried for the location range and reachability status of the mobile subscriber. (7) If the MS is marked reachable, a radio call is enabled at the MSC. (8) This generates a paging request to from the MSC to all BSSs in the MSs last recorded Location Area. (9) The mobile subscriber telephone responds to the paging request from its current cell, the link is extended to the MS and authentication information is passed from the MS to the MSC . (10) All necessary security procedures are executed. (11) If security procedures are successful, the VLR indicates to the MSC that the call can be completed. (12) The MSC then extends the call from the GMSC to the MS.
Subscriber identity confidentiality provides for the privacy of GSM PLMN subscribers identities by ensuring that the IMSI is not made available or disclosed without authorisation. This capability provides protection against location tracing mobile subscribers by listening to the signalling exchanges on the radio path. Protection of a subscribers IMSI is achieved through the issuing of a temporary replacement ID. This is known as the subscribers Temporary Mobile Subscriber Identity (TMSI pronounced timsie). This identity is allocated by the VLR when a subscriber first affiliates to the network and may be subject to change each time the subscriber reconnects to the network or when it moves between MSCs (and hence VLRs).
powers-up MS starts measuring received power level from all cells in range MS calculates average power level received from each cell: Stored in RXLEV(n) parameter MS calculates C1 parameter for each cell based on RXLEV(n) Mobile compares cells which give a positive value of C1 and camps-on to the cell with the highest C1 value On switch-on, an MS periodically measures the received power level on each of the BCCH frequencies of all cells within range. From these periodic measurements the MS calculates the mean received level value from each cell, stored in the parameter RXLEV(n) where n=neighbouring cell number .cell reselection is achieved by comparing current cell C1with neighbouring C1 cell measurements: Between cells within a Location Area: C1 (new) > C1 (old) (for more than 5 seconds) Between cells on a Location Area boundary: C1 (new) > C1 (old) + OFFSET Based on these calculated values, the MS selects which cell to connect to. This connection process is referred top as Camping-on to that cell. Once a mobile has camped on to a cell, it will continue to measure neighbouring BCCH carriers, looking for a better cell.
CALL MANAGEMENT
The Following Steps Took Place while a Mobile call is originated and Terminated:
Authentication; the MSC/VLR requests the AUC for Authentication parameters. Using these parameters the MS is Authenticated. Ciphering; using the parameters which were made available earlier during the authentication the uplink and the downlink are ciphered.
Equipment Validation; the MSC/VLR requests the EIR to check the IMEI for validity Call Setup; the MSC establishes a connection to the MS.
Handover (s)
Land-to-Mobile CALL Scenario The following table lists the phases of a Land-to-Mobile CALL Scenario
STAGE 1 2 3 4 5 6 7 8
Description
Routing Analysis; the MS terminated call is routed to the visited MSC using information from the HLR and VLR. Paging; the MSC initiates a communication with the MS Authentication; the MSC/VLR requests the AUC for authentication parameters. Using these parameters the MS is authenticated. Ciphering; using the parameters which were made available earlier during the authentication the uplink and the downlink are ciphered. Equipment Validation; the MSC/VLR requests the EIR to check the IMEI for validation Call setup; the MSC establishes a connection to the MS. Handover (s) Call release; the speech path is released
Mobile-to-Mobile Scenario Phases of a Mobile-to-Mobile Call The Mobile-to-Mobile call phases can be sub divided in two parts: 1. The Originating Mobile 2. The Terminating Mobile ORIGINATING MOBILE: The phases of originating mobile are:
Request for services. Authentication (optional). Ciphering (optional). Call setup Release
Mobile-to-Mobile Scenario
Routing analysis Paging Authentication (optional). Ciphering (optional). Equipment validation (optional). Call setup. Release.
End of Presentation