OASIS+ Wireless 1

77
Advanced Wireless Concepts for Hughes Software Systems Gurgaon by S. Shankarnarayan Revision 2 19 th April 2001

description

n

Transcript of OASIS+ Wireless 1

Ethan Frome

Advanced Wireless Concepts

for

Hughes Software Systems

Gurgaon

by

S. Shankarnarayan

Revision 2

19th April 2001

a)GSM system architecture

Figure 1.1 - GSM system model - signaling view

--------------------------------------------------------------------------------------------------

3

Figure 1.2 - GSM system model - Interfaces

--------------------------------------------------------------------------------------------------

4

c)GSM PLMN & frequency reuse

1)Cells, Location Area & Service Area

Figure 1.3 - Cells, Location Area & Service Area

--------------------------------------------------------------------------------------------------

5

2)Frequency spectrum of existing cellular systems 450 MHz NMT 450

800 MHz cellular AMPS, D-AMPS, TACS, PDC & CDMA

900 MHz cellular NMT, GSM 900

1500 MHz PDC 1500

1800 MHz DCS GSM 1800 (DCS), DECT & PHS

1900 MHz PCS D-AMPS 1900, CDMA 1900

3)Frequency spectrum for GSM & System specifications

Frequency band:

Uplink:890 - 915 MHz

Downlink:935 - 960 MHz

Duplex distance

45 MHz

Carrier separation

200 KHz (1st carrier: 890.2)

Number of carriers

124

Modulation

GMSK

Transmission rate

270 Kbps

Access method

TDMA

Time-slots

8 per carrier

Speech coding

RPE-LTP-LPC

Regular Pulse Excitation-

Long Term Prediction

Linear Predictive Coding

Diversity

Channel coding

Interleaving

Adaptive equalization

Frequency hopping

Extended frequency bandup-link880 - 915 MHz

Downlink925 - 960 MHz

--------------------------------------------------------------------------------------------------

6

4)Co-channel Interference

Figure 1.4 - Carrier-to-Interference ratio

Figure 1.5 - Carrier-to-Adjacent ratio

The aspect of interference from carriers in other cells of the same frequency or adjacent frequency (Carrier + 200Hz) should be kept in view from the point of frequency reuse.

Both C/I & C/A should be greater than 9/-9dB as per GSM specifications.

--------------------------------------------------------------------------------------------------

7

5)Frequency Reuse & cell clusters

Cell structure

3/9 cell clusters

Each cell may use one or more carriers

Each cell in a 3-sectored cluster uses a unique set of carriers

Each cluster in a 3/9-cluster uses a unique set of carriers

Figure 1.6 a) - 3-cell cluster & 3/9 frequency reuse

7/21 cell clusters

Figure 1.6 b) - 7-cell cluster & 7/21 frequency reuse

--------------------------------------------------------------------------------------------------

8

Frequency reuse in adjacent 3/9 cell clusters

Set of frequencies used in one cell is reused after a 2-cell gap

Figure 1.7 - 3/9-cluster group & frequency reuse

--------------------------------------------------------------------------------------------------

9

Frequency reuse in 7/21 cell clusters

Set of frequencies used in one cell is reused again after a 4-cell gap

Figure 1.8 - 7/21-cluster group & frequency reuse

--------------------------------------------------------------------------------------------------

10

6)PLMN, frequency allocation & Reuse

PLMN Service Area

One PLMN may be allocated only a part of the GSM frequency spectrum

Figure 1.9 - A PLMN Service Area

Omni-cell & 3-sectored cell-structure

One BTS site covering three cells with directional antennas each covering 120 degree angle at the tri-junction of a 3-sectored cell-structure

Figure 1.10 - Omni cell & 3-sectored cell structure

--------------------------------------------------------------------------------------------------

11

4/12 cell pattern using 12 frequency groups in 4 sites

Figure 1.11 - 4/12-cell pattern using 3-sectored cells

--------------------------------------------------------------------------------------------------

12

12 frequency groups in 4 sites for the 4/12 cell pattern

A1B1C1D1A2B2C2D2A3B3C3D3

C0f1f2f3f4f5f6F7f8f9101112

C1131415161718192021222324

C2252627282930313233343536

Sector A1 has 3 carriers of frequency f1, f13 & f25

Figure 1.12 - 36 available frequencies allocated evenly to sectors

3/9 cell pattern using 12 frequency groups in 4 sites

Figure 1.13 - 3/9-cell pattern with 3 sites & 9 frequency groups--------------------------------------------------------------------------------------------------

13

Cell sizes

Large

10 - 30 Km

Small

1 - 3 Km

Micro

100-300 m

Pico

10 - 30 m (Used in DECT, 3G)

Figure 1.14 - Different cell sizes

Hierarchical cell structure

Figure 1.15 - Layered cell structure

--------------------------------------------------------------------------------------------------

14

7)Traffic calculations

Traffic per subscriber

A = n T / 3600 Erlang (E)

Where, n = number of calls per hour,

T = call holding time in seconds

e.g.,

if n = 2 & T = 90 then,

A = 2 * 90 / 3600 = 0.050 E or 50 mE

Number of 3-sector sites

Given,

Traffic per subscriber: 50 mE

Total subscribers:

50,000

Available frequencies:36

Cell pattern:

4/12

Grade of Service:

0.02 or 2%

Calculation of 3-sector sites needed

Frequencies per cell:3

Traffic channels (TCH):22 [(3 * 8) - 2 (Control)]

Traffic per cell:

14.9 E (22 with GOS 2%)

As per Erlang table

Subscribers per cell:298 (14.9 / 0.05)

Number of cells:

168 (50,000 / 298)

3-sector sites:

56 (168 / 3)

--------------------------------------------------------------------------------------------------

15

d)Cellular mobile technologies

1)Access methods

FDMA

(Analog)

TDMA

(Digital)

CDMA

(Digital)

Occupancy by one voice channel in time & frequency domains

In CDMA, all channels concurrently occupy the whole bandwidth all the time

Figure 1.16 - Illustration of FDMA, TDMA & CDMA access methods

--------------------------------------------------------------------------------------------------

16

2)First generation 1G technologies based on FDMA NMT or Nordic Mobile Telephony (1981) proposed by Nordic PTTs as two standards NMT 450 & NMT 900 with a carrier spacing of 25 kHz. First system was launched in 1979. Roaming was later introduced between several countries.

AMPS or Advanced Mobile Phone System (1984) standard proposed by FCC & EIA using 800-900 MHz band with a carrier- spacing of 30 kHz. The first system was launched in 1982. Networks based on AMPS are still existing in some countries.

TACS or Total Access Communication System standard (1985), derived from AMPS & proposed by Dept. of Trade & Industries, UK. With extended specifications, it is known as ETACS. Existing in several scattered countries, roaming is not possible.

3)Second generation 2G technologies based on TDMA & CDMA IS-54 earlier known as ADC or American Digital Cellular, also called as D-AMPS (1991), proposed by TIA, using digital TDMA for communication channels and analog 10 Kbps FSK for control channels. This was an upgrade of AMPS to digital technology with 3 full-rate or 6 half-rate channels per 30 KHz carrier & initially known as TDMA/AMPS. There is no noticeable addition in features or services compared to AMPS.

There are about 75 million users in these networks spread around in 34 countries.

IS-136 Rev. A is a later improvement over IS-54 using 48.6 Kbps digital modulated control channels. IS-136 provides for SMS or short messaging capabilities.

IS-136 Rev. B is a recent version providing for HSCSD, etc.

--------------------------------------------------------------------------------------------------

17

GSM 900 or Global Systems for Mobile Communication (1991) standard proposed by CEPT/ETSI, based on TDMA with 8 full-rate or 16 half rate channels per 200 KHz carrier. The network architecture separates the radio functions from switching functions and concentrates them in a Base Switching System, BSS. GSM standard provides for SMS, circuit-switched data & international roaming.

There are about 200 networks & 100 million subscribers in 110 countries.

DCS 1800 is a further development of GSM operating in 1800 MHz band.

PDC 800 is a Japanese digital cellular standard (1994) using radio concepts from ADC and adopting the GSM network architecture. Used only in Japan, there are about 33 million subscribers.

PDC 1500 standard has also been defined.

IS-95 or CDMA, originally proposed by Qualcom, is an alternative to the TDMA access standards. This standard uses a carrier (800 MHz) with 1.25 MHz band & spread spectrum techniques in forward (down) & reverse (up) links. IS-95 has also been used in the 1900 MHz band in US.

There are about 13 million subscribers in networks in North America and South Korea (9million).

Since CDMA can coexist with TDMA such as IS-136 & GSM, it is also preferred for WILL applications.

--------------------------------------------------------------------------------------------------

18

e)Digital radio transmission

1)Access methods FDMA Vs TDMA

Figure 1.17 - Illustration of FDMA Vs TDMA access methods

2)TDMA & propagation delay

Figure 1.18 - different overlapping arrival times --------------------------------------------------------------------------------------------------

19

Propagation delays & radio burst

It is not possible to transmit one PCM voice sample per timeslot in digital TDMA over air as in the wire-line point to point digital transmission.

We need to accumulate a number of PCM voice samples (say, 32, 64 or 128) before sending them all together as a burst from one mobile. This will allow us to provide sufficient gap between bursts from two mobiles located at different distances. The gap will take care of some delay differences. 160 samples for a period of 20ms are accumulated in GSM before the burst transmission.

Round trip delay & echo

The burst method of a block of speech introduces long round trip delays on an established voice connection. This will result in echo on a connection to a POTS subscriber. GSM network should take care to provide an echo canceller on such a connection.

Low bit-rate coding of speech

Since the voice samples are buffered, it opens up the possibility of digital processing of voice samples to reduce the bit rate for voice transmission and number of bits per block of speech.

The speech coders defined for GSM use a hybrid approach of combining the speech quality of waveform coders & low bit-rate capability of vocoders. The speech is reduced to 13 Kbps in GSM, known as full rate. There is provision for half rate.

3)Timing advance controlTo reduce the gap between adjacent bursts from nearer & farther mobile stations, GSM uses a technique of timing advance. The mobiles moving away from the base station are periodically asked to advance their burst transmission in terms of a number of bit times. The mobiles moving towards the base station are asked periodically to reduce the timing advance (TA).

--------------------------------------------------------------------------------------------------

20

Figure 1.19 - Periodic control of timing advance

Figure 1.20 Burst transmission with timing advance

4)Transmission path loss & MS transmit power controlFor a given antenna, the received power is inversely proportional to the square of the distance between the transmit & receive antennas.

The received power is also inversely proportional to the square of the frequency.

Ls ~ d2f2 or in dB

Ls (dB) = 32.4 (dB) + 20 log (fMHz) + 20 log (dKm)

Where 32.4 is a constant of proportionality

--------------------------------------------------------------------------------------------------

21

Figure 1.21 - periodic control of transmit power

5)Log-normal fading

Figure 1.22 - Obstacles in the radio path & the shadowing effect

Figure 1.23 - Log-normal fading due to shadowing effect on a moving MS

--------------------------------------------------------------------------------------------------

22

If logarithm of the signal strength is measured along the path of a mobile, the curve will take the form of a normal distribution around a mean value that represents the path loss. The fading dips are situated about 10 to 20 meters apart.

6) Rayleigh or multi-path fading

This occurs when the transmitted radio signal takes more than one path to reach the mobile receiver. When the mobile is in the direct line-of-sight path, it may receive the signal as several reflections against big buildings.

Figure 1.24 - Multi-path or Rayleigh fading

Figure 1.25 - Rayleigh fading over log-normal fading

--------------------------------------------------------------------------------------------------

23

This means that the received signal is a sum of many identical signals differing mainly in phase. Two received signals that are 1800 out of phase may cancel each other out. Smaller phase differences cause steep dips in the received signal.

7) Time dispersion of received signal bits

Time dispersion causes inter-symbol-interference between consecutive bits received at a mobile.

Figure 1.26 - Inter-symbol-interference due to time dispersion

--------------------------------------------------------------------------------------------------

24

Bit rate in GSM

270 Kbps

Bit cell period

3.7 microseconds

Bit traverse distance in 1 bit

period - straight path

1.1 Km

Interfering reflected bit traverse distance, possibly

2.2 Km

A moving car 1 Km from a base station may find the preceding bit arriving via a reflected path at the same time as the arrival of a new bit.

Depending on the distance and the surroundings, a reflected bit may interfere with another bit transmitted two bit-times later.

8) Coding of speech to reduce bit rate

To economize on the frequency spectrum & bandwidth requirements per channel & carrier, GSM employs speech coding to reduce the bit rate to 13 Kbps per voice channel.

A block of 160 speech samples over a period of 20 ms is digitally processed using DSP technology to reduce the number of bits to 260 bits per block. Compare this to 1280 bits needed as PCM samples.

Speech codingscheme

RPE-LTP-LPC

Figure 1.27 - Speech coding in GSM

--------------------------------------------------------------------------------------------------

25

9) Coding of speech for error control

Error control codes

Log normal fading, multi-path fading, time dispersion, etc. result in bit errors in the received bit stream. Bit error ratio or BER of the received bit stream is a measure of the transmission quality.

By using redundancy & spreading out the information bits, It is possible to reduce BER and also be able to detect as well as correct errors. These are known as Error Control codes.

Error control codes can be divided into Block Codes and Convolution Codes.

Block coding

Figure 1.28 - Principle of Block coding

Figure 1.24 shows the principle of block coding. Redundant check bits are generated and added by the block coder to the information bits in a block. The check bits added are based and dependent on the bit stream in that block of information bits.

Block codes are used for data blocks where we are interested in detecting errors and ask for retransmission. This method of error correction by retransmission is known as ARQ. In the case of data, we can afford to wait for retransmission since data transmission is tolerant of delays and delay variations.

Voice & video, known as isochronous services do not admit delay variations. In these cases, we have either to ignore errors or correct them in real time.

--------------------------------------------------------------------------------------------------

26

Convolution coding

Figure 1.29 - Principle of convolution coding

In convolution coding, the output of the coder depends not only on the current input block but also on the preceding block(s). If the output has two bits for each input bit, then the rate of redundancy is said to be 1 : 2.

Convolution codes are suitable for voice and video, as it is possible to correct errors in this method.

Channel coding in GSM - Error control

GSM uses a two-step approach of block and convolution coding of speech blocks.

Figure 1.30 - Channel coding in GSM

--------------------------------------------------------------------------------------------------

27

First step: 3 parity bits are added in the block coder to the 50 very important bits in the information block.

Second step:53 block coded bits + 132 important bits + 4 tail bits are convolution coded with a rate of 1:2. The output of convolution coder has 378 bits.

Third step:Add the 78 rest of the not so important bits to the output of the convolution coder to get the final block of spread out block of 456 bits of the original speech block.

The two-step approach is used in GSM both for speech & data. The schemes for speech and data are somewhat different.

We are able to correct errors as far as possible by convolution coding. The block coding helps to detect errors and determine if the information block is too damaged to use and if so to ignore it.

Channel coding is effective in detecting and correcting single errors and very short burst errors. What if the burst errors are too long?

10) Segmentation & interleaving for burst error control

Principle of Interleaving for Burst Error control

Figure 1.31 a) - Principle of interleaving for burst error control

--------------------------------------------------------------------------------------------------

28

Interleaving is a way of separating consecutive bits that would be affected by burst errors and sending them in a non-consecutive way by spreading them out over long periods.

Interleaving is a way of separating consecutive bits that would be affected by burst errors and sending them in a non-consecutive way by spreading them out over long periods.

In figure 1.28 a), blocks of speech are segmented into four parts numbered 1 to 4. At the time of sending, segments numbered 1 from four consecutive blocks together sent as a frame. Similarly, frames 2, 3 & 4 are transmitted consecutively.

Figure 1.31 b) - Principle of interleaving & spreading of burst errors

Suppose frame 2 underwent heavy burst errors and had to be rejected. Figure 1.28 b) shows the regrouped information where the burst errored parts have been spread out.

Now, with the help of channel coding it may be possible to reconstruct the original information with error correction.

GSM adopts a two-level interleaving scheme.

First level of interleaving in GSM

In the first level of interleaving, the 456 bits from the channel coder are interleaved into eight segments of 57 bits each. The consecutive eight bits from the original information are spread out into these eight segments. That is to say that each of these segments holds 57 non-consecutive information bits.

See figure 1.29 where each column is a segment of 57 non-consecutive bits.

--------------------------------------------------------------------------------------------------

29

Figure 1.32 - First level of interleaving & spreading in GSM

Second level of interleaving in GSM

Figure 1.30 shows four blocks of channel coded and first level interleaved speech blocks.

Figure 1.33 a) - Four channel coded speech blocks with 1st level of interleaving

Figure 1.33 b) - Four channel coded speech blocks with interleaved segments from consecutive blocks--------------------------------------------------------------------------------------------------

30

Figure 1.34 - Normal burst over air in GSM containing 2 speech segments

Figure 2.34 shows a normal radio burst that has space for two segments of 57 bits of speech.

Figure 1.35 a) - 2nd level interleaved segments -1

--------------------------------------------------------------------------------------------------

31

Figure 1.35 b) - 2nd level interleaved segments -2

Figure 1.36 - Normal bursts carrying 2nd level bit-interleaved segments

32

Each burst in GSM actually holds two segments from two consecutive speech blocks. In other words, eight segments of a speech block are spread over eight consecutive bursts with interleaving of consecutive bits from the two segments.

See figure 2.36

Each burst shown is sent in consecutive TDMA frames in the allocated timeslot or the physical channel.

Round trip delay

The duration of a TDMA frame is about 5 ms each. As the speech block is spread over 8 TDMA frames, there is a delay of 40 ms over the radio for the entire block to be sent.

Speech coding itself introduces a delay of 20 ms due to buffering of 160 samples.

In the base station system, these interleaved segments are accumulated, trascoded into PCM format and sent forward as PCM samples over a period of 20 ms thereon.

Thus the various coding & interleaving schemes introduce a one-way delay of 80 ms or a round trip delay of 160 ms on a speech connection.

Therefore we need an echo canceller on a connection from a mobile to a POTS subscriber involving a two-wire to four-wire converter to avoid talker echo for the mobile user.

11) Modulation of carrier in GSM

GSM uses GMSK (Gaussian Minimum Shift Keying) modulation scheme. This is a BPSK Phase Shift Keying technique with two phases wherein the phase shift is controlled to be smooth rather than abrupt as in the conventional method.

GMSK reduces the carrier bandwidth requirements at the cost of lesser resistance to noise.

--------------------------------------------------------------------------------------------------

33

12) Frequency hopping (slow) & Rayleigh fading

The Rayleigh fading pattern mentioned earlier is frequency-dependent. This means that the fading dips will occur at different places for different frequencies. If we keep changing the frequencies during a call and if only one of them has a fading dip, we lose only a fraction of the information. With complex signal processing, it may be possible to restore the information. Se figure 1.33 for frequency hopping in GSM.

Figure 1.37 - Frequency hopping between two carriers

Frequency hopping can be over several carriers in cyclic fashion over consecutive TDMA frames but using the same timeslot all the time.

13) Antenna (or space) diversity & deep fading

The method involves using two receiver antennas at the base stations independently receiving the same signal and influenced by fading differently. The risk of both being affected by deep fading at the same time is small. By choosing the better of the two received signals, the degree of fading can be reduced. The distance between the two antennas should be such that the correlation between the two received signals is small. At 900 MHz, we can gain 3 dB with an antenna distance of 5-6 meters.

--------------------------------------------------------------------------------------------------

34

Figure 1.38 - Antenna diversity 14) The Viterbi equalizer & time dispersion

The equalizer in GSM is to reduce the effect of time dispersion causing adjacent inter-symbol-interference. The principle is based on creating a mathematical model of the air interface channel and calculating the most probable transmitted data.

Figure 1.39 - Viterbi equalizer --------------------------------------------------------------------------------------------------

35

A pattern known as the training sequence is included in the middle of the burst in the GSM for this purpose. The GSM specification prescribes an equalizer capable of handling a reflected signal delayed upto four bit times. This corresponds to 15 microseconds or a path difference of 4.5 Km between the direct and reflected signals.

How the Viterbi equalizer works?

Channel is assumed to be constant during one burst.

Known training sequence T is compared with T' of the received burst in a correlator.

A probable transmitted bit sequence is fed through a channel model and output is compared with the received bit sequence.

Based on the difference, the Viterbi equalizer selects a more probable transmitted bit sequence and again feeds it through the channel model.

The process is repeated until good enough bit sequence is found.

A powerful algorithm is used to neglect the least likely bit patterns.

15) The time advance

The base station periodically sends a value between 0 & 63 telling a moving mobile as to how many bit times (3.7 micro seconds) the mobile should advance its burst transmission relative to synchronization time.

This is one of the parameters limiting the size of the cell.

16) Encryption of speech, signaling or data

As a matter of security over the air interface, GSM employs encryption of all the important communications between MS & the MSC on a per call or access basis. The ciphering key is derived using an algorithm in the MS itself based on a random number linked to the identity of the MS. The random number is sent by the MSC during the establishment of the communication channel between MS & the MSC. We will see more of this later.

--------------------------------------------------------------------------------------------------

36

17) Digital transmission summary

Block schematic of a Mobile Station (MS)

Figure 1.36 shows the different signal processing parts involved in the transmission and reception of speech.

Figure 1.40 - Block schematic of transmission functions of an MS

The receiving part

A channel model is created in the equalizer where also an estimated bit sequence pattern is calculated for each burst.

--------------------------------------------------------------------------------------------------

37

After all the eight bursts of a 20 ms speech block have been received, they are reassembled into 456 bits block.

The sequence is decoded in the Viterbi decoder to detect and correct errors encountered in transmission. The decoder uses "soft information" (as to the probability that a bit is zero) from the equalizer to improve error correction.

Block schematic of the Base station & the network part

Figure 1.41 - Block schematic of transmission functions in the network --------------------------------------------------------------------------------------------------

38

Transcoder

The network has a transcoder for D/D conversion between PCM samples & linear-coded 13 bit samples.

18) Transcoder & rate adaptation unit or TRAU

TRAU functionally belongs to BTS but can be remotely located in the BSC as is the normal practice or even the MSC. But a remote TRAU is still controlled by the BTS.

Figure 1.42 TRAU placed in BSC & Abis interface

--------------------------------------------------------------------------------------------------

39

Figure 1.43 TRAU in between 16 Kbps & 64 Kbps channels --------------------------------------------------------------------------------------------------

40

f)GSM Components

1)GSM system model

Figure 1.44 - GSM system model

--------------------------------------------------------------------------------------------------

41

2)System components

The Switching System (SS)

Mobile Services Switching Centre (MSC) MSC handles call processing, signaling, switching, charging, authentication of MS identity, etc.

MSC is a regular digital switch with digital trunk interfaces with CCS 7 signaling and mobile-related software.

Visitor Location Register (VLR) VLR obtains & stores the subscriber data of all the Mobile Stations (MS) currently visiting the MSC service area and keeps track of the current location, i.e., location area (LA), of all of them.

VLR is normally integrated with MSC and is known as MSC/VLR.

Gateway MSC (GMSC) This is a software function for finding out the current MSC service area in which a called MS is currently located. This function is required for all mobile- terminated calls and is resident in MSC. GMSC function interrogates the HLR to obtain this information required for further routing the call. Home Location Register (HLR) HLR has all the subscriber data of all the subscribers to a PLMN. The subscriber data for a new visitor to an MSC service area is supplied to the MSC/VLR for temporary storage as long as the MS stays in its service area. It also updates the current location, i.e., MSC service area, of the subscriber. This information is provided to GMSC, on interrogation.

HLR is generally integrated with one of the MSC/VLR in the PLMN. There can be more than one HLR in a PLMN. A block of MSISDN numbers would be allocated to each HLR.

HLR can also be implemented as a stand-alone node.

--------------------------------------------------------------------------------------------------

42

Authentication Centre (AUC)For authenticating an MS identity during registration, call origination, etc, security data known as triplets are needed by the MSC. This security data against each MS identity is generated in the AUC and is supplied to HLR & MSC.

AUC can be implemented on a PC or on a UNIX platform.

Equipment Identity Register (EIR)EIR is a database for validation of Mobile Equipment (ME) with lists of type-approved & barred ME numbers.

GSM Interworking Unit (GIWU)

This is required for circuit-switched voice-band data communication between an MS with digital data & a POTS line with MODEM or analog data.

SM-SC & SMS GatewayThese two nodes together enable Short Message Service or SMS (limited to 160 characters) to be offered to mobile users.

Short Message Service Centre or SM-SC is a store - and - forward centre for short messages.

SMS Gateway finds out the current location (MSC service area) from the HLR & enables mobile-terminated messages to be forwarded to the MS. The node also has the function of SMS-IWMSC required for relaying short messages to the SM-SC for storage.

The Base Station Sub-system (BSS)

All the radio-related functions & activities have been separated from the MSC and concentrated in the BSS in the GSM. The BSS consists of two components.

Base Station Controller (BSC)

This node also consists of a digital switch with digital trunk terminations and GSM radio-related interfaces & software functions.

--------------------------------------------------------------------------------------------------

43

Administration of the radio network, switching of mobile subscribers during a call, paging a called MS, locating a mobile subscriber moving from cell to cell during conversation, handovers, collection of statistics such as traffic per cell, etc. are some of the functions of BSC.

Transcoder Rate Adapter Unit (TRAU), an important component of the BSS is also normally located in the BSC.

Base Transceiver Station (BTS) It consists of radio transmitter & receiver, mast, antennas and signal processing specific to radio interface. A number of BTSs can be located at a site, sharing a common mast.

The Operation and Support Sub-system (OSS)

The individual MSC/VLR & BSC nodes handle the basic & routine O&M tasks such as handle traffic measurement, analysis and fault diagnosis. OSS is centralised node, which provides the network operator with user-friendly tools for planning, operating and maintaining a cellular network efficiently and with a high quality of service. Some of the functions of the OSS are:

Radio configuration - e.g., adding cells & carriers

Network supervision & operation - e.g., network modeling and alarm handling

Switching configuration - e.g., expansion, soft patches and software updates

Performance management - e.g., generation of statistical reports

The Mobile Station (MS)

The MS consists of the Mobile Equipment (ME) from a vendor and a Subscriber Identity Module (SIM) provided and/or programmed by the network operator.

ME is uniquely identified by an International Mobile Equipment Identity (IMEI).

--------------------------------------------------------------------------------------------------

44

An International Mobile Subscriber Identity (IMSI) uniquely identifies a mobile subscriber or MS to a specific GSM PLMN. IMSI is embodied into the SIM, which can be inserted into any ME. The SIM has all the information related to the mobile subscriber.

IMSI is used between the MS and the MSC at the time of the initial registration of an MS visiting the MSC service area. Thereafter IMSI is not normally used over the radio path for security reasons. On registration, the MSC allocates a Temporary Mobile subscriber Identity (TMSI), which is also changed from time to time. TMSI is used by MSC for paging MS. MS uses TMSI during location updating and mobile-originated calls.

GSM subscribers are also publicly identified by Mobile Station ISDN number (MSISDN). A caller uses MSISDN to call a mobile subscriber. MSISDN consists of:

Country Code (CC) + National Destination Code (NDC) + Subscriber Number (SN)

The call is routed to the home PLMN of the mobile subscriber. It is the HLR that translates the MSISDN to IMSI, knows the MSC/VLR service area where the MS is currently located & helps in routing the call to the specific MSC.

Another identity known as Mobile Subscriber Roaming Number (MSRN) is used internally in the PLMN to route the incoming call to the specific MSC.

--------------------------------------------------------------------------------------------------

45

g)GSM Identities

1)Mobile Station ISDN Number (MSISDN) (E.164)

CC Country Code

(1~3 digits)

NDC National Destination code (2-3 digits)

Identifies the GSM PLMN Area Code

SN

Subscriber Number

2)International Mobile Subscriber Identity (IMSI) (E.212)

MCCMobile Country Code

(3 digits)

MNCMobile Network Code

(2 digits)

MSINMobile Subscriber Identification Number

3)Mobile Station Roaming Number (GSM Rec.)

SN

Subscriber Number, in effect the address of the MSC/VLR node within the PLMN

4)Temporary Mobile Station Identity (TMSI) (GSM Rec.)

TMSI is of only local significance.

--------------------------------------------------------------------------------------------------

46

5)International Mobile Equipment Identity (IMEI) (GSM Rec.)

TAC

Type Approval Code

6 digits

(Central GSM body)

FAC

Final Assembly Code

2 digits

(Manufacturer)

SNR

Serial Number

6 digits

Unique number within a TAC + FAC

Sp

Spare

1 digit

(Future Use)

6)Location Area Identity (LAI) (GSM Rec.)

MCC

Mobile Country Code

3 digits

(As in IMSI)

MNC

Mobile Network Code

2 digits

(As in IMSI)

LAC

Location Area Code

16 bits

(PLMN operator)

LAI

is used for location updating of MS.

All cells in a location area broadcast the LAI.

MS recognizes when it enters a new LA.

--------------------------------------------------------------------------------------------------

47

7)Cell Global Identity (CGI) (GSM Rec.)

CI

Cell Identity

16 bits

(PLMN Operator)

Each cell broadcasts its CGI. MS listens to this information in the current & surrounding cells.

8)Base Station Identity Code (BSIC) (GSM Rec.)

NCC

PLMN Colour Code

3 bits (xyy)

xoperator

yycountry

(to distinguish between neighbouring operators)

BCC

Base Station Colour Code3 bits

(to distinguish between neighbouring base stations)

9)Global Title (GT) (E.164)

GT is an address such as dialed digits, say MSISDN, as per CCITT/ITU Rec. E.164. The SN can be a node address.

GT is used in the No.7 SS to route a message to a remote node without a circuit-switched connection. SCCP with routing function is used at the originating & intermediate nodes. The GT is contained as a parameter inside the message.

For example the first two digits in the subscriber number (SN) in the MSISDN identifies an HLR. The GMSC function identifies an appropriate HLR from the received MSISDN.

--------------------------------------------------------------------------------------------------

48

10)Mobile Global Title (MGT) (GSM Rec.)

MSINMobile Station Identification Number 10 digits

MSIN identifies the MS & also its HLR

CC/NDCidentifies the country & the PLMN & possibly the HLR where the MS is registered.

IMSI & MGT

When an MS is turned on in (or enters) the MSC/VLR service area of a PLMN, the MS has to be registered as a new visitor in the VLR. VLR needs to address the HLR where the subscription information of the mobile subscriber is registered.

The information obtained from the MS for this purpose is IMSI consisting of MCC + MNC + MSIN. There are two possibilities.

The HLR is in the same PLMN as the VLR. That is the MS is in the home PLMN. Analysis of MCC + MNC identifies this case. Further analysis of MNC itself or MSIN identifies the HLR where the subscriber profile of the MS is registered.

Analysis of MCC + MNC indicates another PLMN, possibly in another country. Then the VLR has to send a message via the public national/international-signaling network to the HLR of the home PLMN. This has to go as an SCCP message for which the IMSI must be converted to MGT.

Conversion of IMSI to MGT

--------------------------------------------------------------------------------------------------

49

Translation of IMSI to MGT in the VLR

CC is derived directly from the MCC translation.

NDC is derived either directly from the MNC or in conjunction with the initial digits of the MSIN

The MSIN from IMSI is directly mapped in to the MSIN part of the MGT.

This translation is done in the application layer of the VLR.

h)Digital Radio Interface

1)TDMA frame, time slot & logical channels

Figure 1.45 - TDMA frame & timeslots

Timeslot & physical channels

Each timeslot of a TDMA frame - downlink or uplink - is known as a physical channel.

Logical channel

Using multi-frame mode, different logical channels can be mapped independently in either direction. These "logical channels" carrying control information are generally mapped on to one or two timeslots of one carrier, C0, in a cell. The remaining "logical channels" are used to carry traffic such as voice.

--------------------------------------------------------------------------------------------------

50

Figure 1.46 - Control channels, traffic channels & broadcast channels

Broadcast channels (BCH)

The carrier carrying the BCCH channel, normally C0, is also known as the BCCH-carrier. The BCCH-carrier is used to broadcast a lot of information required by an MS. A list of allocated BCCH carriers for the home network operator is programmed into SIM. An MS is also capable of scanning the whole GSM frequency band.

When an MS is turned on, it has to camp on to the nearest BTS preferably of the home PLMN. When it finds the strongest carrier, it has to find the BCCH-carrier in the cell. The BCH bursts are normally transmitted at the maximum power for the cell so that a farthest new arrival can lock on to it.

Frequency correction channel - FCCH

This channel carrying a sine wave signal is broadcast downlink for an MS to synchronise to the frequency. This is on the same carrier as that of the BCCH.

--------------------------------------------------------------------------------------------------

51

Synchronisation channel (SCH)

This carries information regarding the TDMA frame structure and frame number in this cell to which an MS has to lock on to, when it enters a cell or when it is turned on. The MS also comes to know that this is GSM base station. SCH also carries BSIC information. SCH is a downlink channel.

Broadcast control channel (BCCH)

After locking on to the frequency and frame structure in the cell, MS needs some more general information broadcast on the BCCH. The LAI, the maximum output power in the cell, BCCH-carriers of the neighbouring cells on which the MS will perform the measurements, etc. BCCH is a downlink channel.

If the MS has just been turned on or has entered a new location area, it has to carry out a procedure known as location updating.

The MS is now ready to roam around, camp on a cell, listen to paging, originate calls, etc.

Common control channels (CCCH)

Figure 1.47 - Common control channels

Paging channel - PCH

Mobile subscribers are paged on this downlink channel for incoming calls or short messages, using their TMSI. Every MS in a cell will periodically listen to this channel.

--------------------------------------------------------------------------------------------------

52

Random access channel - RACH

When an MS wants to do location updating, responds to a paging message or wants to originate a call, it sends a short burst on the RACH requesting for a dedicated signaling channel. For security reasons, the MS uses a random number for identity. The actual communication between the MS and the MSC will take place later on the dedicated channel. If the request is not granted within a specific time period, the MS repeats the request. RACH is an uplink channel.

Access grant channel - AGCH

In response to requests from different MSs, the network allocates a specific dedicated signaling channel (SDCCH) against each request for further communication. The response to each request is sent on the downlink AGCH. The MS is to now access the corresponding timeslot in the relevant carrier.

Dedicated control channels (DCCH)

Figure 1.48 - Dedicated control channels

Stand alone-dedicated control channel - SDCCH

As per the allocation conveyed over the AGCH, both the MS & the BTS switch over to the assigned SDCCH for a secure communication between the MS & the MSC.

--------------------------------------------------------------------------------------------------

53

The signaling communication can be a short message delivery (or cell broadcast) in idle mode or call setup procedure for an incoming or originated call.

Slow associated control channel - SACCH

While an MS is busy on a call over a traffic channel (TCH) or in communication with MSC on the SDCCH, MS takes periodic carrier-signal strength measurements on own base station & neighbouring base stations. These measurement results have to be conveyed to the BSC on the uplink. Similarly, based on the analysis of measurements taken by BTS & the MS, the BSC has to convey information on timing advance & MS transmitter power control.

SACCH is designed for this purpose. SACCH is interleaved either with SDCCH or TCH periodically.

Fast associated control channel - FACCHWhile an MS is in conversation & based on the analysis of signal strength measurements the BSC decides that a handover to a neighbouring cell, FACCH is used. FACCH works on the principle of stealing a segment of speech or TCH.

2)TDMA frames, logical channels, multiframes, superframes and hyperframe

Logical channels - TDMA frame, timeslot & burst

C0, C1 & C2Carriers in a cell

C

Control channels on timeslot 0 & 1 of C0

T

Traffic channels on remaining timeslots of C0, C1 & C2

Figure 1.49 - Mapping of control channels on C0 or BCCH carrier

--------------------------------------------------------------------------------------------------

54

TDMA frame, timeslot & burst

Figure 1.50 - Relationship between a TDMA burst & timeslot

TDMA frame & two types of multiframes

Figure 1.51 - Relationship between TDMA frame & multiframe

--------------------------------------------------------------------------------------------------

55

TDMA frames, multiframes & superframe

Figure 1.52 - Relationship between multiframes & superframe

TDMA frames, multiframes, superframes & hyperframe (Cycle for frequency hopping & ciphering)

Figure 1.53 - Relationship between superframes & hyperframe

3)Mapping of logical control channels on physical channels in multiframe structure (FCCH +SCH + BCCH + CCCH)CCCH & BCH channels are mapped on to timeslot 0 of the first carrier, C0 or the BCCH-carrier, in a cell. Timeslot 1 of the BCCH-carrier is used for SDCCH & SACCH. Timeslots 2 to 7 are used for TCH.

The multiframe structures for Control channels & traffic channels are different even if they are in the same carrier.

--------------------------------------------------------------------------------------------------

56

Downlink, C0, timeslot 0 - Multiframe mapping

FFCCH

Frequency correction channel

SSCH

Synchronisation channel

BBCCH

Broadcast control channel

CPCH /

Paging channel /

AGCH

Access grant channel

IIDLE

Figure 1.54 - Mapping of common control & broadcast channels

Uplink, C0, timeslot 0 - Multiframe mapping

RACH

Random access channel

Figure 1.55 Continuous mapping of RACH on the uplink

--------------------------------------------------------------------------------------------------

57

Uplink & downlink, C0, timeslot 1 - Multiframe mapping

D0

SDCCH 0

D7

SDCCH 7

A0

SACCH 0

A7

SACCH 7

I

IDLE

SDCCH is used to exchange information between MSC/VLR & MS during location updating or call setup.

SACCH is used downlink to send timing advance & power control information. MS sends measurement report on the uplink. SACCH is associated with SDCCH.

Figure 1.56 - Mapping of SDCCH & SACCH - C0, timeslot 1

--------------------------------------------------------------------------------------------------

58

4)Mapping of logical traffic channels on physical channels

Timeslots 0 & 1 on C0

logical control channels

Timeslots 2 ~ 7 on C0

logical traffic channels

Timeslots 0 ~ 7 on C1 ~ C3

logical traffic channels

If there are 5 or more carriers, another timeslot on C4 can be used for signaling. However, there is only one BCCH-carrier per cell.

C0, timeslot 2 (or 3 ~ 7) - Multiframe mapping of TCH

TTCH

Traffic channel

ASACCHSlow associated control channel

IIDLE

Figure 1.57 - Mapping of traffic channel TCH on timeslot 2

SACCH

During conversation, the MS has to periodically send measurement results. Like wise, the BSC has to send timing advance & power control information to the MS. Therefore an SACCH is interleaved every 26 TDMA frames on the same physical channel as that of the associated TCH.

IDLE

The MS uses the idle-TDMA-frame period is to take measurements.

--------------------------------------------------------------------------------------------------

59

Downlink

Uplink

Figure 1.58 Down-link reception & uplink transmission

5)Time to take measurements

Downlink

Uplink

Figure 1.59 - Time to measure & Idle TDMA frame

Measurements & Reporting

During a call an MS has to continuously take measurements on the signal strength of own as well as neighbouring cells. The results must be reported to the BSC on the uplink SACCH. The mobile is informed through system information on the downlink SACCH as to which neighbouring BCCH carriers to monitor.

--------------------------------------------------------------------------------------------------

60

Figure 1.59 TCH multiframe sliding over FCCH/SCH multiframe

--------------------------------------------------------------------------------------------------

61

i)RACH & network access by mobile

1)Access burst format

Figure 1.60 Short access burst with long guard period

2)Access burst arrival times & delays

Figure 1.61 Different arrival times of bursts & delays on the RACH

--------------------------------------------------------------------------------------------------

62

3)Channel request & information in the Access Burst

Figure 1.62 Contents in the channel request message on the RACH

4)Channel request & initial channel assignment

Figure 1.63 Channel request & access grant

5)Channel request & retransmission

Figure 1.64 Retransmission of channel request message

--------------------------------------------------------------------------------------------------

63

j)GSM traffic cases

1)Location updating normal type

1) System information

2) RR connection establishment

3) Service indication

4) Authentication

5) Updating

6) Acceptance

7) Channel release

Figure 1.65 - Location updating, normal type --------------------------------------------------------------------------------------------------

64

2)IMSI detach

Figure 1.66 - IMSI detach

3)Location updating, IMSI attach

Figure 1.67 - Location updating, IMSI attach type --------------------------------------------------------------------------------------------------

65

4)Call from MS

1a-c)RR connection establishment

2) Service indication

3) Authentication

4) Ciphering mode setting

5) Call initiation

6) Assignment of a TCH

7) Call confirmation

8) Call accepted

Figure 1.68 - Mobile originated call --------------------------------------------------------------------------------------------------

66

Figure 1.69 - Mobile originated call messages--------------------------------------------------------------------------------------------------

67

5)Call to MS from PSTN/ISDN

Figure 1.70 - Mobile terminated call --------------------------------------------------------------------------------------------------

68

Figure 1.71 - Mobile terminated call messages--------------------------------------------------------------------------------------------------

69

j)MS states & modes

1) MS detached or turned off having been registered in MSC/VLR

When the MS does not respond to paging messages and there has been no contact between the MS & the network, due to either MS being powered off or out of reach, the state is known as "MS detached".2) MS attached or turned on

When the MS has been turned on or entered the MSC service area, been registered as a visitor and has been in periodic contact, the state is known as "MS attached".

While being attached, an MS can be in idle or busy mode.

Idle modeThe MS may be moving around from cell to cell in the same location area or enter a cell in a new location area. The MS keeps listening to cell broadcasts and initiates "Location updating" whenever it enters a new location area. Thus the MSC/VLR is aware of the location of the MS. In case of an incoming call, the MSC/VLR can page for the MS in all the cells of the current location area.

Busy modeWhen the MS is involved in an incoming or originating call or call setup stage, it is said to be busy. While it is busy it can be moving around from cell to cell. The MS & the BTS keep taking the signal measurements of the current & surrounding cells periodically so that the BSC can know when the MS moves towards a new cell area. This is known as locating.

As the MS nears the border of a new cell, the BSC takes a decision to switch the call via a traffic channel in the new cell.

The changeover procedure is known as handover.

--------------------------------------------------------------------------------------------------

70

3) Location updating - periodic registration - idle mode

It is possible that the IMSI detach was not registered in the VLR due to poor radio link quality and the system may continue to assume that the MS is still in the same LA.

To avoid ambiguity, MS carries out periodic registration procedure once every 30 minutes. If there is no response to the request for a channel, MS will make repeated attempts. The system information on the BCCH tells all MSs about the frequency of periodic registration.

4) Implicit detach - idle mode

If the periodic registration does not take place and a timer times out, the MS is marked as detached in the VLR. This can happen when the MS has been turned off outside the radio coverage area.

--------------------------------------------------------------------------------------------------

71

k)The Mobile Station (MS)

1) The Subscriber Identity Module (SIM)

The MS can be operated only when a valid SIM is present. However, emergency calls to emergency numbers can be made without a SIM.

SIM Storage types for subscriber related information

Fixed data : IMSI, subscriber authentication key (KI), access control class, security algorithms, etc.

Temporary network data: TMSI, LAI, ciphering key (Kc), forbidden PLMNs, etc.

Service related data: language preference, advice of charge, etc.

Security features

Authentication algorithm, A3

Subscriber authentication key, KI

Ciphering key generation algorithm, A8

Ciphering key, Kc Control of access to data stored & performed in the SIM

Subscriber data in the Mobile Equipment (ME)

All subscriber-related information transferred to the ME during operation must be deleted after the removal of SIM & deactivation of the MS. Examples of such data are PIN (Personal Identification Number) and the PUK (Personal Unlock Key) codes.

PIN management

Changing the PIN code by the subscriber

PIN disabling function

Inhibition of PIN disabling function

Indication of incorrect PIN entry

SIM blocking on three repeated entries of incorrect PIN

--------------------------------------------------------------------------------------------------

72

Unblocking of SIM & PUK

Unblocking of SIM is possible under the control of PUK.

PUK is an 8-digit numeric only code. Indication is given if an incorrect PUK is entered. After 10 repeated incorrect entries, SIM is blocked.

l)Authentication of an MS

1)The authentication key, Ki

This is allocated at the time of subscription and stored in the SIM as well as the authentication centre that provides the system with so-called Triplets. The IMSI allocated to the subscriber is also stored in the SIM & the HLR.

2)The Triplets

Against each registered IMSI, the HLR keeps a stock of triplets. Whenever it is exhausted, the HLR requests for triplets against an IMSI. See figure 1.57.

Figure 1.72 - Request from HLR & response from AUC.

Generation of Triplets in the AUC (See figure 1.58)

A non-predictable random number, RAND, is generated.

RAND & Ki are used to generate Signed Response (SRES) and Ciphering Key Kc via algorithms A3 & A8.

RAND, SRES & Kc are delivered to HLR as Triplets.

--------------------------------------------------------------------------------------------------

73

RAND

Random number

SRES

Signed Response

IMSI

International mobile subscriber identity

KI

Subscriber authentication key

Kc

Ciphering keyFigure 1.73 - Generation of triplets in the AUC.

Authentication procedure

The MSC/VLR stores upto 10 triplets against each IMSI registered in its service area. Whenever a new visiting IMSI is registered or whenever its stock is depleted, the VLR obtains a fresh batch of triplets for use later on.

Figure 1.74 - Authentication procedure

--------------------------------------------------------------------------------------------------

74

Encryption & ciphering procedure

Figure 1.75 Cipher mode setting procedure

Figure 1.76 Ciphering & deciphering of speech/data/signaling

--------------------------------------------------------------------------------------------------

75

On successful completion of cipher mode command, all information over the air interface will be ciphered and all data, speech & signaling information are protected.

IMEI

IMSI (except at the time of registration as a new visitor)

Calling & called party addresses in the SETUP message

All information during conversation

Equipment identification

The MSC/VLR requests for IMEI from the MS after the cipher mode is complete.

MS sends IMEI to MSC which then sends it to EIR

EIR can check it against 3 possible lists of IMEIs

White list of all valid IMEIs in all GSM countries

Black list of all IMEIs known as barred

Grey list of faulty or non-approved IMEIs

See figure 1.61

Figure 1.77 - Equipment identification

--------------------------------------------------------------------------------------------------

76

Encrypted 114 bits

Encrypted 114 bits

S1 (114)

S2 (114)

S1 (114)

S2 (114)

+

+

+

+

FN (22)

FN (22)

Kc (64)

Kc (64)

B (S5-S8)

C (S1-S4)

C (S5-S8)

A

A

A

A

C

C

B

A

B

A

C

B

A

I

H

G

F

E

D

C

B

A

I

H

G

F

E

D

C

B

A

I

H

G

F

E

C

B

A

I

H

G

F

E

D

C

B

A

I

H

G

F

E

D

A

A

A

I

H

G

F

E

D

I

HB

G

F

D (S1-S4)

A (S5-S8)

B (S1-S4)

Z (S5-S8)

A (S1-S4)

E

D

C

B

G

A

F

PLMN Service Area

(One per Operator)

E

D

C

B

A

D

TDMA frame - 4.615 ms

7

6

5

4

3

2

1

0

TDMA frame - 4.615 ms

7

6

5

4

3

2

1

0

3 hours 28 minutes 53.760 seconds

3

2

1

0

2047

2046

2045

B9, A13, B25, A29, B41, A45,.

B1, A5, B17, A21, B33, A37,.

B-S1/A-S5

Speech segments

Speech segments

Speech block

C

8 segments

Speech block

A

8 segments

Speech block

B

8 segments

Speech block

D

8 segments

C-S2/B-S6

C-S2/B-S6

C-S1/B-S5

C-S1/B-S5

B-S4/A-S8

B-S4/A-S8

B-S3/A-S7

B-S3/A-S7

B-S2/A-S6

B-S2/A-S6

B-S1/A-S5

B-S1/A-S5

C - S3

B - S7

C - S2

B - S6

C - S1

B - S5

B - S4

A - S8

B - S3

A - S7

B - S2

A - S6

B - S1

A - S5

Z - S8

A - S4

Z - S7

A - S3

Z - S6

A - S2

Z - S5

A - S1

3

1

3

1

26

57

57

Speech block

D

8 segments

C-S4/B-S8

C-S4/B-S8

Translation of MSISDN to IMSI

5

C

C

C

C

C

C

C

C

C

B

C

C

C

C

C

C

C

C

C

B

B

C

C

C

PLMN service area

MSC/VLR

MSC/VLR

C3

C2

C1

BTS site

Location area

A3

A2

A1

D2

D1

A3

A2

A1

B3

B2

B1

B3

B2

B1

C3

B2

B1

C3

C2

C1

D3

D2

D1

A3

A2

A1

C3

C

C

C2

C1

D3

C

C

Speech block

C

8 segments

Speech block

B

8 segments

8 segments of 57 bits each

7

15

23

31

.

.

.

.

.

.

447

455

C

C

8

16

24

32

.

.

.

.

.

.

448

456

4

12

20

28

.

.

.

.

.

.

444

452

Speech block

A

8 segments

6

14

22

30

.

.

.

.

.

.

446

454

5

13

21

29

.

.

.

.

.

.

445

453

3

11

19

27

.

.

.

.

.

.

443

451

2

10

18

26

.

.

.

.

.

.

442

450

1

9

17

25

.

.

.

.

.

.

441

449

4

1

X

3

4

1

X

3

4

1

X

3

4

1

X

3

Regrouped information block

4

3

2

1

4

3

2

1

4

1.Introduction to GSM

3

2

1

4

3

2

1

4

3

2

1

4

3

2

1

4

3

2

1

4

3

2

1

53

78 not so important bits

132 important + 4 tail bits

Block coder

50 VI bits

456 bits

Convolution coder

Block of 160 samples over 20 ms (2080 bits)

Block of 260 bits

Speech coder

Coded info

Info

Info

Convolution coder

Block coder

1

0

0

1

EMBED MS_ClipArt_Gallery

0

3

1

1

EMBED MS_ClipArt_Gallery

2

1

B

EMBED MS_ClipArt_Gallery

1

Rayleigh fading

Log (distance)

Log-normal fading

Path loss

Log (distance)

EMBED MS_ClipArt_Gallery

Signal level (dB)

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

Log-normal fading

MSC Service Area

Cell

Cell

Cell

Cell

Location Area

Location Area

Cell

Cell

Cell

Cell

GSM Service Area

Path loss

Signal level (dB)

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

C

C2

f1

f2

C1

D3

D2

D1

A3

A2

A1

B3

B2

B1

C

C

C

C

C

C

D2

D1

A3

A2

A1

B3

A2

A1

B3

B2

B1

C3

C2

C1

D3

C

C

C

C

C

C

C

C

C

C

C

B

C

C

C

C

C

C

C

C

C

B

C

C

C

C

C

C

C

C

C

B

B

C

C

C

C

C

C

C

C

C

T

T

FDMA

T

T

A4

A0

A3

A2

A1

B3

A3

A2

A1

B3

B2

B1

D3

D2

D1

A3

A2

A1

C3

C2

C1

C3

C2

C1

D3

D2

D1

A3

A3

A1

I

D7

D0

3

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

Advance timing - n bits

2

7

6

5

4

3

2

1

0

A7

A5

I

D7

Increase power - m dB

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

C

C, Carrier f1 strength in dB

I, Interferer f1 strength in dB

C

I

C/I > 9dB

A, Interferer f2 strength in dB

C, Carrier f1 strength in dB

C/A > -9dB

A

EMBED MS_ClipArt_Gallery

B2

B1

C3

A1

B3

B2

B1

C3

C2

C1

A3

A2

A1

B3

B2

B1

C3

C2

C1

C2

C1

BTS-TRAU signaling

Synchronization of the 20ms blocks

Time alignment i.e., BTS control of the phasing of incoming 20ms blocks from the TRAU

Speech/data discrimination and the type of adaptation needed for data

Bad frame indication to TRAU by BTS

Indication whether DTX is to be applied on the downlink

Silence Descriptor (SID) indication on the uplink

4 channels of 16 Kbps in one 64 Kbps channel

MSC

BTS

A

G.703

1

1

1

1

1

1

1

1

t

f

t

f

1

1

Layer 2

Layer 2

Layer 2

Layer 3 cells

A3

A2

Abis

ET

TRAU

G.703

4 channels of 64 Kbps

ET

BTS

16 Kbps channels

13 Kbps speech + 3 Kbps BTS-TRAU signaling

M

S

C

A

TRAU

B

S

C

Abis

TRAU

13 Kbps

BTS

A5

A5

Channel request

Random timer

Channel request

BTS

MS

AGCH

Immediate assignment Cause, random No., frame No., initial timing advance, initial power control & dedicated channel identity

RACH

Channel required

Frame No. Delay estimate

Channel request

B

S

C

EMBED MS_ClipArt_Gallery

Random discriminator

Establishment cause

EMBED MS_ClipArt_Gallery

Access burst

Frame 1, ts1

Arrival time & delay

Arrival time & delay

AB 1

AB 2

Frame 1, ts0

Frame 2, ts0

EMBED MS_ClipArt_Gallery

Information available to mobile for access

Max transmit power in the cell but not the actual one

Timing advance not known

Reasons for access

Location updating

Originating a call

Responding to paging, etc.

60 + 8.25

3

36

41

8

Guard period

Tail

INFO

Synch

Tail

Receive

Transmit with Timing Advance

Downlink

Uplink

0

1

2

3

4

5

6

7

0

1

2

3

4

5

6

7

MSC

t

f

GMSC

MSC/VLR

GMSC

MSC/VLR

GMSC

MSC/VLR

VLR

MSC

HLR

VLR

MSC

VLR

BSC

Base station system (BSS)

Switching System (SS)

EIR

GIWU

SM-SC

SMS Gateway

AUC

HLR

To/from PSTN/ISDN

EMBED MS_ClipArt_Gallery

114 bits

+

CONNECT ACK

CONNECT

Actions by the MS, say on TS 2

MS receives the burst and measures the signal strength

MS transmits

MS measures the signal strength of at least one of the surrounding cells

MS reads BSIC on SCH for one of the six strongest surrounding cells

The MS is not synchronized with the adjacent cell and does not know as to when TS 0 will occur on that cell

It has to monitor for at least 8 timeslot periods to read TS 0

4

3

2

1

2

1

CC

TAC

Max 4 octets long

IMSI (Max 15 digits)

National MSI

MSIN

MNC

MCC

International MSISDN (15 digits)

National mobile number

SN

NDC

CC

BTS

Operation & Support System (OSS)

NDC

7

6

5

4

3

2

1

0

SNR

FAC

SN

CC

CI

LAC

MNC

MCC

LAC

MNC

MCC

Sp

NCC

NDC

MCC

E.212

E.164

MSIN

NDC

CC

SN

BCC

C-S3/B-S7

C-S3/B-S7

D-S4/C-S8

D-S4/C-S8

MGT

IMSI

CC

NDC

MSIN

MSIN

MNC

D-S3/C-S7

2

D-S3/C-S7

EMBED MS_ClipArt_Gallery

4

3

2

1

0

7

6

5

4

3

1

0

DCCH

BCH

CCCH

Control channels

AGCH

RACH

PCH

DCCH

BCH

CCCH

Control channels

SCH

BCCH

FCCH

DCCH

BCH

CCCH

Traffic channels

Control channels

Logical channels

Downlink

Uplink

7

6

5

T

T

T

T

T

T

C

C

C0

FACCH

SACCH

SDCCH

C1

T

T

T

T

C2

T

T

T

T

T

T

T

T

5

4

3

2

1

0

4.615 ms

T

T

T

T

57 bits

57 bits

26 bits

Data

Data

Training

0.577 ms & 156.25 bits

7

6

3

2

1

0

Normal burst - 148 bits

3

3

1

1

3

2

1

0

TDMA frame - 4.615 ms

7

6

5

4

22

3

2

1

0

(Type A) multiframe of 26 TDMA frames - 120 ms

- - -

(Type B) multiframe of 51 TDMA frames - 3060/13 ms

50

49

48

47

1

0

Superframe of 1326 TDMA frames - 6.12s

- - -

25

24

23

TDMA frame - 4.615 ms

7

6

5

4

3

2

1

0

1325

1324

1323

1322

3

2

49

48

47

3

2

1

0

Superframe of 51 type A multiframes - 1326 TDMA frames - 6.12s

- - -

25

24

23

22

3

2

1

0

Superframe of 26 type B multiframes - 1326 TDMA frames - 6.12s

Used for Control channels

Used for TCH

2044

Hyperframe of 2048 superframes - 2,715,648 TDMA frames

- - -

50

7

6

5

4

TDMA frame - Idle

7

6

0

5

4

3

2

1

0

TDMA frame - 25

7

6

5

4

TDMA frame - 24

0

1

2

3

2

1

1

0

TDMA frame - 24

4

1

ALERT

ASSIGN CMD

ASSIGN COM

CALL CONFIRM

SETUP

CIPH MODE COM

AUTH REQ

AUTH RESP

CIPH MODE CMD

PAGING RESP

IMM ASSIGN

CHAN REQ

PAGING REQ

MSNetwork

Paging the MS

RR - Connection

Establishment

Service indication

Authentication

Cipher mode setting

Call initiation

Assignment of a

Traffic channel

Call confirmation

Call accepted

EMBED MS_ClipArt_Gallery

9

8

9

8

BSC

MSC / VLR 2

MSC / VLR 3

7

2 IMSI

+

2 MSRN

6 MSRN (IAM)

5 MSRN

1 MSISDN

GMSC

MSC/VLR

HLR

2 MSISDN

CONNECT ACK

CONNECT

ALERT

ASSIGN CMD

ASSIGN COM

CALL PROC

SETUP

CIPH MODE COM

AUTH REQ

AUTH RESP

CIPH MODE CMD

SERV REQ

IMM ASSIGN

CHAN REQ

MSNetwork

RR - Connection

Establishment

Service indication

Authentication

Cipher mode setting

Call initiation

Assignment of a

Traffic channel

Call confirmation

Call accepted

8

7

6

4

3

2

BSC

MSC

EMBED MS_ClipArt_Gallery

VLR

1a

1c

1b

5

4

3

EMBED MS_ClipArt_Gallery

BSC

MSC

2

1

VLR

4

3

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

BSC

HLR

MSC

2

1

VLR

7a

7b

6

5a

4a

4b

5b

EMBED MS_ClipArt_Gallery

BSC

HLR

MSC

3

1

2c

VLR

2a

2b

Radio interface

Um

Abis

A

MSC

BSC

.

.

.

.

.

.

LAPDm/Q.931

MS

BSS

LAPD/Q.931

BTS

BSSAP

BSC

ISUP/MAP

PSTN /

ISDN

PLMN

MSC

MAP/ISUP

MAP

HLR

VLR

MAP

EIR

MAP

MAP

MAP

HLR

Check IMEI

4

Access / barred

EIR

VLR

3

EMBED MS_ClipArt_Gallery

IMEI

2

1

MSC

6

Decryption of M' successful?

TDMA frame No.

Kc

A5

4

M'

5

Encrypted

TDMA frame No.

Kc

M

2

M

A5

MSC / VLR

IMEI request

EMBED MS_ClipArt_Gallery

MS

Cipher mode completed

1

3

MSC / VLR

M + Kc

Compares received SRES with that in the triplet

4

3

SRES

Calculates SRES & Kc

2

1

RAND

EMBED MS_ClipArt_Gallery

MSC/VLR

Kc (64 bits)

SRES (32 bits)

RAND

A3

Authentication

Algorithm

A8

Ciphering

Algorithm

RAND generator

Database

A3

A8

IMSI - KI

IMSI - KI

IMSI - Ki IMSI - Ki

Request for triplets

3 or 5 triplets

AUC

IMSI

HLR

8 KHz, 8 bits

64 Kbps, PCM

8 KHz, 13 bits

8 KHz, 8 bits

64 Kbps, PCM

8 KHz, 13 bits, linear

Transcoding

Speech blocking

Deciphering

Speech decoding

Speech coding

22.8 Kbps

13 Kbps

Viterbi decoding

33.8 Kbps

Channel coding

Interleaving

Deinterleaving

Ciphering

Transcoding

Burst formatting

Viterbi equalizer

Transmitter

Modulator

Receiver

Demodulator

Earphone

Antenna

D/A conversion

Speech decoding

Viterbi decoding

Deinterleaving

Deciphering

Viterbi equalizer

Receiver

Demodulator

Antenna

33.8 Kbps

22.8 Kbps

13 Kbps

8 KHz, 13 bits

Microphone

A/D conversion

Speech blocking

Speech coding

Channel coding

Interleaving

Ciphering

Burst formatting

Transmitter

Modulator

Downlink

Uplink

Probable transmitted bit sequence

Chose

? pattern so that the difference is minimized

Channel model

Difference

Correlator

Received burst

T

?

?

T'

Data

Data

2

1

Time

2

1

Carrier, C2

Carrier, C1

7

6

5

4

3

2

1

0

7

6

5

4

3

2

1

0

0

1

3

4

5

6

7

4

5

0

1

2

3

6

7

2

0

1

2

3

4

Arrival of timeslots from mobiles

TDMA

TDMA

f4

EMBED MS_ClipArt_Gallery

EMBED MS_ClipArt_Gallery

5

4

3

2

1

0

3

5

4

7

6

7

6

5

6

7

4

5

0

1

2

3

6

7

1

0

2

D - S4

C - S8

D - S3

C - S7

D - S2

C - S6

C - S5

D - S1

C - S4

B - S8

1

0

S

F

B

C

S

F

C

C

C

C

S

F

I

Timeslot 0, C0, downlink - from 51 TDMA frames

B

0

1

0

1

2

3

4

5

6

7

TDMA frame - 4.615 ms

0

1

2

3

4

5

6

7

TDMA frame - 4.615 ms

D0

Each burst on the uplink is a RACH

Timeslot 0, C0, uplink - from 2 cycles of 51 TDMA frames

Timeslot 0, C0, uplink

0

1

TDMA frame - 4.615 ms

7

6

5

4

3

2

1

0

0

1

2

3

4

5

6

7

TDMA frame - 4.615 ms

Timeslot 0, C0, downlink - from 2 cycles of 51 TDMA frames

A7

A4

D0

D7

I

I

A3

A0

D7

D0

TDMA frame 101 in a 102 frame cycle

1

0

TDMA frame - 4.615 ms

3

2

1

7

6

5

4

3

2

2

3

0

1

4

5

6

7

TDMA frame - 4.615 ms

Timeslot 2, C0, - from 26 TDMA frames

T

T

I

A

T

TDMA

7

6

5

4

3

T

T

T

0

3

2

1

0

TDMA fra

2

1

0

TDMA frame - n+1

7

6

5

4

3

2

1

0

TDMA frame - n

D-S2/C-S6

D-S2/C-S6

7

6

5

4

3

2

1

0

7

6

5

4

3

2

1

0

TDMA

TDMA frame - n+1

TDMA frame - n

3

2

1

0

D-S1/C-S5

D-S1/C-S5

A-S4/Z-S8

A-S4/Z-S8

A-S3/Z-S7

A-S3Z-S7

A-S1/Z-S5

A-S2/Z-S6

A-S1/Z-S5

B-S1/A-S5

A-S2/Z-S6

3

2

4

5

6

7

3

2

1

0

TDMA frame - Idle

7

6

5

3

2

0

TDMA frame - 25

INFO+ Check bits

INFO