118
1 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved © Copyright 2000, Agilent Technologies All Rights Reserved GSM GSM Fundamentals Fundamentals

346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

  • Upload
    lehanh

  • View
    223

  • Download
    7

Embed Size (px)

Citation preview

Page 1: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

1

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

© Copyright 2000, Agilent Technologies

All Rights Reserved

GSM GSM

FundamentalsFundamentals

Page 2: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

2

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 2

System OverviewSystem Overview� GSM historie

� GSM Netværk

� Frequency Reuse

� GSM Network

Interfaces

� SIM Card

� GSM Bands

� GSM Cell Plan

� GSM Broadcast

Channel

� GSM Time Delay

� GSM Midamble

Equalisation

� GSM BCH Frames

� SMS Cell Broadcast

� GSM RACH

� GSM FACCH

� GSM Signal Path

� Ciphering

� GSM Modulate

� Mobile Turn-On

� IMSI Attach

� Mobile Originated Call

� Mobile Terminated

Call

� What is GPRS?

Page 3: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

3

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 3

GSM HistoryGSM History

1981 Analogue cellular introduced

Franco-German study of digital pan-

European cellular system

1987 MoU signed by over 18 countries

1989 GSM was moved into the ETSI organization

GSM name changed to Global

System for Mobile communications.

1990 DCS1800 (edited GSM900) specification

developed

In 1981 analogue cellular was introduced and at about the same time there was a

joint Franco-German study looking at digital cellular technology and the

possibility of making a pan-European system.

In 1982 a special working committee, Groupe Spécial Mobile (GSM), was

formed within the CEPT to look at and continue the Franco-German study.

In 1986 the working committee was taken a step further by the establishment of a

permanent nucleus of people to continue the work and create standards for a

digital system of the future. About a year later, the memorandum of

understanding, or MoU, as it is referred to, was signed by over 18 countries. It

stated that they would participate in the GSM system and get it into operation by

1991.

In 1989 GSM was moved into the ETSI (European Telecommunications

Standards Institute) organization. Once under the control of ETSI, the GSM

system had it's name changed to Global System for Mobile communications. The

committees working on the system changed from GSM to SMG (Special Mobile

Group). These changes avoided confusion between the system name (GSM), and

the people working on the specification (SMG). It also brought the naming in

line with the official working language of ETSI (English).

Page 4: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

4

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 4

GSM HistoryGSM History

1981 Analogue cellular introduced

Franco-German study of digital pan-

European cellular system

1987 MoU signed by over 18 countries

1989 GSM was moved into the ETSI organization

GSM name changed to Global

System for Mobile communications.

1990 DCS1800 (edited GSM900) specification

developed

In 1990 the GSM specification developed an offshoot - DCS1800. The Original

DCS1800 specifications were developed simply as edited versions of the

GSM900 documents.

Interest in GSM quickly spread outside Europe.

In 1992 Australia became the first non-European country to join the MoU. Since

then, many other Asian countries have adopted GSM. There's now a Pan-Asian

MoU, investigating international roaming agreements.

The Phase II specification for GSM has now been defined, merging GSM900 and

DCS1800 documents, a number of new features are added to the system, along

with many minor adjustments. The next step is Phase II+ that will define the

addition of specific new services such as data and fax to GSM and DCS1800.

Page 5: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

5

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 5

CIS, Denmark, Finland,France, Germany,Greece, Hungary,Poland, Norway, Sweden, Switzerland:

GSM900GSM900

DCS 1800DCS 1800

Singapore:

DCS1800DCS1800

USA:

PCS1900PCS1900

UK:

GSM900GSM900

DCS1800DCS1800

Thailand:

DCS1800DCS1800

Canada:

PCS 1900PCS 1900

Argentina,Brazil,Chile:

DCS 1800DCS 1800 Malaysia:

DCS 1800DCS 1800

Hong Kong:

PCS 1900PCS 1900

GSM Around the WorldGSM Around the World

GSM is truly becoming the GLOBAL System for Mobile Communications. It's

been clear for a long time that GSM would be used across Europe. Now, many

countries around the world, which have been delaying their decision, have

selected GSM. GSM has become a Pan Asian standard and is going to be used in

much of South America.

Personal Communications Networks PCN started in the UK with Mercury One-

to-One and Hutchison Microtel (Orange) offering the first two networks to use

DCS1800. The UK PCNs have had overwhelming success with their

competitive business tariffs and cheap off-peak calls.

Germany's E net followed the UK PCNs. DCS1800 is becoming more

widespread with systems in Thailand, Malaysia, France, Switzerland and

Australia. Further systems are planned in Argentina, Brazil, Chile, France,

Hungary, Poland, Singapore and Sweden.

The USA, which did not adopt GSM900, is about to use the GSM-based

PCS1900 for one of its PCS systems. In the USA, GSM will share the allocated

bands with other systems based on CDMA, NAMPS and IS-136 TDMA. The

PCS1900 licenses already cover approximately half of the US population, and it

is likely that this will increase to close to full coverage as remaining licenses are

granted.

Page 6: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

6

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 6

NMC

Interface to other networks

MS

MS

BTS

BTS

BTS

BSS

BSSMSCMSC

MSCMSC

VLR

VLR

HLR

EIR

AUC

OMC OMC

BSC

BTS

BTS

BTS

BSC

1

24

5

7

8

*

0

3

6

9

#

GSM NetworkGSM NetworkBase Station Controlle

Base Transceiver Station

Base Station SystemMobile Stations Mobile Switching Center

Visitors Location Register

Equipment Identity RegisterAuthentication Center

Home Location Register

Operations and Maintenance

Network Management center

This is the GSM system. The Mobile Stations (MS), both hand held (portables)

and traditional mobiles in a car, talk to the Base Station System (BSS) over the

RF air interface. The Base Station System (BSS) consists of a Base Transceiver

Station (BTS), and a Base Station Controller (BSC). It's typical for several BTS

to be located at the same site, producing 2 to 4 sectored cells around a common

antenna tower. BSC's are often connected to BTS via microwave links. The

BSC to BTS link is called the Abis interface. Typically 20 to 30 BTS will be

controlled by one BSC. A number of BSS's would then report back to the Mobile

Switching Center (MSC) which controls the traffic among a number of different

cells. Each (MSC) will have a Visitors Location Register (VLR) in which

mobiles that are out of their home cell will be listed, so that the network will

know where to find them. The MSC will also be connected to the Home Location

Register (HLR), the Authentication Center (AUC), and the Equipment Identity

Register (EIR) so the system can verify that users and equipment are legal

subscribers. This helps avoid the use of stolen or fraud mobiles. There are also

facilities within the system for Operations and Maintenance (OMC) and Network

Management (NMC) organizations. The Mobile Switching Center (MSC) also

has the interface to other networks such as Private Land Mobile Networks

(PLMN) and Public Switched Telephone Networks (PSTN) and ISDN networks.

Page 7: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

7

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 7

HLRHLR’’erneerne deler nummerserie deler nummerserie

mellem sigmellem sig

HLR

VLR MSC

MSC

BSC

BS BS BS

2 Mb/s

Page 8: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

8

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 8

Overview of GSMOverview of GSM

F1

F2

F3

F4

F1

F2

F3

F4

F2

F1

F2

N=4 Frequency Reuse Concept

� Second Generation Technology

� Global System for Mobile Communications.

� Developed by ETSI

� International wireless standard

� Based on the cellular concept

� Frequency reuse implementation

� Over 480 million subscribers

� GSM900, DCS1800, PCS1900, R-GSM

100 200 300 400 5000

GSM

IS-95

IS-136

PDC (Japan)

Analog

Millions of subscribers (Feb 2001)source: EMC

Page 9: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

9

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 9

Series Specification Area

01 General

02 Service Aspects

03 Network Aspects

04 MS-BS Interface and Protocol

05 Physical Layer and the Radio Path

06 Speech Coding Specification

07 Terminal Adapter for MS

08 BS-MSC Interface

09 Network Interworking

10 Service Internetworking

11 Equipment and Type Approval Specs

12 Operation and Maintenance

GSM Standards ETSI.GSM Standards ETSI.

� All GSM documents are

standardized by ETSI

� Standards are grouped into

12 series

� Allows for easy integration

of network elements from

different equipment vendors

� Significantly reduces the

cost of the overall network

deployment

Page 10: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

10

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 10

� GSM uses concept of cells� One cell covers small part of network� Network has many cells� Frequency used in one cell can be used

in another cells� This is known as Frequency Re-use

F=1

F=2

F=3

F=4,8

F=5,9

F=6,10

F=7

F=1

F=2

F=3

F=4,8

F=5,9

F=6,10

F=7F=1

F=2

F=3

F=4,8

F=5,9

F=6,10

F=7

F= 1,2,3,4,5,6,7,8,9,10

Clusters

Co-Channel ( Re-use ) Cells

Frequency ReuseFrequency Reuse

GSM is a wireless technology and the major bottleneck in wireless FDMA

systems is the spectrum. The basic method of increasing the capacity with a

limited spectrum is to re-use the channels. GSM uses the concept of cells and

each cell will alloted one or more than one ARFCN’s ( RF channel). Over a

group of cells the available spectrum will get exhausted and after which re-use

will start. This group of cells which uses the all the available resources once is

referred to as a cluster of cells. The cells in the next cluster will have the similar

channels used in the previos clusters. The cells in different clusters which use the

same Frequencies are referred to as Co-Channel cells.

Co-Channel cells due to propogation effects and distance of separation can

generate interference to each other.

Page 11: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

11

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 11

MS

BTS

BTS

BTS

BTSBTS

BTS

BTS

BTS

BSC

BSC

PSTN

VLR

TRAUHLR

EIR

OMC

SMSC

BC

AUC

VMSC

MSC

Abis

A

OML

GSM Network ArchitectureGSM Network Architecture

BTS : Base Transceiver Station

BSC : Base Station Controller

MS : Mobile Station

TRAU : Transcoder Rate Adaptation Unit

MSC : Mobile Switching Center

HLR : Home Location Register

VLR : Visiting Location Register

AUC : Authentication Centre

EIR : Equipment Identity Register

SMSC : Short Message Service Center

VMSC : Voice Mail Service Center

BC : Billing Center

OMC : Operations and Maintenance Center

Page 12: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

12

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 12

GSM GSM -- InterfacesInterfaces

� GSM defines different

interfaces between two system

components

� Allows for multi-vendor

implementation

� Promotes more competition

� Lower costs

� Air interface is limiting in terms

of capacity

� Air interface is also called Um

interface

BTS

BSC MSC

VLR

EIR

VLR

GatewayMSCMS

HLR

E

FF

B B

C

D D

G

A -

In

terf

ac

e

Ab

is -

In

terf

ac

e

Air

- I

nte

rfa

ce

GSM Interfaces

Page 13: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

13

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 13

� Separate Bands for Uplink and Downlink

� Down link : 1930.20 - 1989.80 MHz ( GSM 935 - 960 MHz )

� Uplink : 1850.20 - 1909.80 MHz ( GSM 890 - 915 MHz)

� TDMA and FDMA Multiplex

� 299 Frequency Channels (ARFCN) for GSM1900

� 512 to 810 for current band

� 200kHz Channels

� 8 Mobiles share ARFCN by TDMA

� 0.3 GMSK Modulation

� 270.833 kbits/sec. rate

� Variable Tx Power and Timing

GSM Air InterfaceGSM Air Interface

Page 14: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

14

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 14

1 Burst = 577usecs

0 1 2 3 4 5 6 71 TDMA Frame = 8 bursts = 4.616 ms

Multiframe

1 TCH Multiframe = 26 TF = 120ms 1 CCH Multiframe = 51 TF = 234.6ms

0 1 2 3 2044 2045 2046 2047

1 Hyperframe = 2048 Superframes = 2715648 TDMA Frames

= 3 hrs 28 min 53 sec 760 ms

00

11

22

4823

4924

5025

0 1 2 23 24 25 0 1 2 48 49 50

1 Superframe = 26 CCH MF = 1326 TF = 6.12 sec

1 Superframe = 51 TCH MF = 1326 TF = 6.12 sec

FRAMESFRAMES

1 TDMA burst = 577 usec

1 TDMA Frame = 8 bursts = 4.616 ms

1 TCH Multiframe = 26 TDMA frames = 120 ms

1 CCH Multiframe = 51 TDMA frames = 234.6 ms

1 TCH Superframe = 51 TCH Multiframes = 1326 TF = 6.12 secs

1 CCH Superframe = 26 CCH Multiframes = 1326 TF = 6.12 secs

1 Hyperframe = 2048 Superframes = 2715648 TDMA frames

= 3hrs 28 min 53 sec 760ms

The above derivations show that TDMA frames are numbered from 0 to 2715647 .

Page 15: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

15

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 15

Overview of GSM Overview of GSM -- Physical ChannelsPhysical Channels

Group Name Function UP.

Link

Down.

Link

BCCH Broadcast control Yes No

FCCH Frequency correction Yes No

BCH

SCH Synchronization Yes No

PCH Paging Yes No

AGCH Access Grant Yes No

CCCH

RACH Random Access No Yes

SDCCH Standalone dedicated control Yes Yes

SAACH Slow-associated control Yes Yes

DCCH

FACCH Fast-associated control Yes Yes

TCH TCH Traffic data and voice Yes Yes

� A GSM physical channel can carry several different types of logical channels

� Can be divided into two categories: traffic and signaling

� Signaling channels can be further categorized as:

• Broadcast

• Common Control

• Dedicated Control

Page 16: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

16

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 16

� One ARFCN, On all the time, in every cell

� Adjacent cells use different ARFCN

� Information on BCCH identifies the network and

cell

� Occupies Time Slot 0

� Cell ID, MCC, MNC

� Neighbours, hop sequences, paging information

� All timeslots on the BCH ARFCN are always On with

the max power.

� With Frequency Re-use, also need BSIC to

assist in identifying the cell

BBroadcast roadcast CHCHannelannel

Base Station Identity Code

Page 17: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

17

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 17

Omni-directional Cell

BTS

Sectored Cell

1x BCH1x BSIC

3x BCH3x BSIC

α α α α

ββββγγγγ

BTS

Cell FormatsCell Formats

Page 18: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

18

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 18

What is the BSIC ?What is the BSIC ?�Base Station Identity Code

�Part of the BCH

• Coded into the synchronization burst

�Two octal digits (value 0 to 7)

• Broadcast Colour Code (BCC)

• National Colour Code (NCC)T3

Coded Data39 bits

GP8.5

Synchronization Sequence64 bits

Coded Data39 bits

T3

148 bits Synchronization Burst

GSMDefinitions.

BSIC discriminates re-use cells within the network and between other networks

BCC = Colour code for which network it belongs too

NCC= Colour code for which country it belongs too

Page 19: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

19

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 19

Rf Test Equipment

PSTN

SS#7SS#7LAP-DLAP-DmAbis Interface

1

24

57

8*

0

3

6

9

#

1

24

57

8*

0

3

6

9

#

1

24

57

8*

0

3

6

9

#

BTS

BTS

BTS

BSC

BSC

BSC

MSC

MSC

MSC

Um Interface

GSM Network InterfacesGSM Network Interfaces

A simpler view of the GSM system, shows the base transceiver station,

base station controller, mobile switching center, and public switch

telephone network are tied together with hard lines (optical fibber or

microwave links). The various interfaces are all defined in the GSM

standard. Hewlett-Packard has many measurement solutions, designed to

test most areas of the GSM system whether the interface is a hardwire,

microwave or RF in origin.

Page 20: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

20

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 20

IMSI: 012345678910

Locator for Locator for

correct insertioncorrect insertionActive chip of Active chip of

smart cardsmart card

IMSIIMSI

Breakout for Breakout for

micro SIMmicro SIM

SIM CardSIM Card

Without a SIM installed, all GSM mobiles are identical. It's the SIM card

that gives a mobile its identity. If a user (Fred) takes his SIM on a business

trip and plugs it into the GSM mobile fitted to his rental car, the car's phone

takes on the SIM's identity. Fred's network access rights, his speed-dial

memories and any other saved features, are transferred to the rental car

phone. The really nice feature of SIM's is that they also carry your phone

number. If Fred's office want to call him, they simply dial his normal

mobile number. The network knows the location of the phone with Fred's

SIM in it and so routes the call directly to the rental car.

Page 21: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

21

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 21

SIM CardSIM CardPlugs into Every GSM MobilePlugs into Every GSM Mobile

Two Sizes - Standard (credit card)

Micro (postage stamp)

Holds All Unique Subscriber InformationHolds All Unique Subscriber Information

IMSI (International Mobile Subscriber)

Lists of Networks Allowed For User

Ki - Ciphering Key

Stores Information on Last LocationStores Information on Last Location

Stores User InformationStores User Information

Speed Dial Lists, Memories, etc.

SIM card comes in two sizes:

• standard (credit card size)

• micro (postage stamp size)

SIM’s (subscriber Identification Modules) plug into the GSM mobile. The

SIM holds all the information related to a subscriber. For example:

• Unique subscriber number or IMSI (International Mobile

Subscriber Identification)

• The networks and countries where service is entitled (MCC and

MNC)

• Any other user specific information like speed dial numbers and

memories

For test purposes, there are special Test-SIM’s. Test SIM’s allow mobiles

to enter a special loop-back mode for receiver BER test.

Page 22: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

22

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 22

1

2

4

5

7

8

*

0

3

6

9

#

Downlink

Uplink

GSM BandsGSM Bands

Each Base Transceiver Station (BTS) will be fitted with a number of

TX/RX pairs or transceiver modules. The number will determine how

many frequency channels can be used in the cell, and depends on the

expected number of users. The link between the Base Station (BS) and the

Mobile Station (MS) is called the Downlink and the link between MS and

BS is the Uplink. These are separated by

• 45 MHz in GSM

• 95 MHz in DCS

• 80 MHz in PCS

Page 23: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

23

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 23

Phase 1GSM900

Phase 2GSM900

Phase 1DCS1800

Phase 2DCS1800

PCS1900

UplinkFrequencyRange

890 to915MHz

880 to915MHz

1710 to1785MHz

1710 to1785MHz

1850 to1910MHz

DownlinkFrequencyRange

935 to960MHz

925 to960MHz

1805 to1880MHz

1805 to1880MHz

1930 to1990MHz

ARFCNRange

1 – 124 0 – 124 and

975 – 1023

512 – 885 512 – 885 512 – 810

Tx/RxSpacing(MHz)

45 45 95 95 80

GSM Channel PlansGSM Channel Plans

Above is a table that shows the relative frequency plans of the three GSM

networks: GSM900, DCS1800 and PCS1900.

The frequency range of the Uplink and Downlink show how the two bands

are split into the two directions, rather than an uplink being followed by a

downlink 200kHz later.

Another difference is that the channel numbers are different. Remember

this if you write any test control software and want to port from one system

to another, as the channel numbers must be changed for correct operation.

Page 24: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

24

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 24

1 2 3 4 5 6ARFCN #

Frequency

Amplitude

Time

0

1

2

3

4

5

6

7

Timeslot #

GSM FDMA and TDMAGSM FDMA and TDMA

GSM uses TDMA (Time Division Multiple Access) and FDMA

(Frequency Division Multiple Access). The slide shows part of one of these

bands. Each band is divided into 200kHz slots called ARFCN’s (Absolute

Radio Frequency Channel Numbers).

As well as dividing up the frequency, the ARFCN is also divided in time

into 8 Timeslots (TS), each TS being used in turn by a different MS. The 8

TS’s together are known as a Frame.

The slide illustrates 4 TCH’s (Traffic Channels). Each one of the TCH’s

uses a particular ARFCN and Timeslot. Two of the TCH’s are on the same

ARFCN, using different timeslots, the other two are on different ARFCN’s.

The combination of a TS number and ARFCN is called a physical channel.

Page 25: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

25

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 25

Frequency

Amplitude

Time

Overshoot

Lobes due tomodulation

Raised lobes dueto ramp up

GSM BurstsGSM Bursts

Above is a more detailed representation of a GSM burst.

There are three areas to consider:

• The overshoot that is caused by the fast ramp up of the burst

• The lobes due to the ramp up

• The lobes due to the modulation.

These are all specified by the GSM standard.

Page 26: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

26

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 26

Downlink and UplinkDownlink and Uplink

UPLINK

DOWNLINK

ARFCN

Timeslots

ARFCN

45 MHz

12 3 4 5 6 7 012 3 4 5 6 7 0

FrameTimeslots

12 3 4 5 6 7 012 3 4 5 6 7 0

To see how information is transmitted let's look at an example.

We have been assigned timeslot 2 and we're in a traffic mode, receiving

and transmitting information to the base station. The downlink, on which

we receive information, will be in the frequency range of 935 to 960MHz.

The uplink, the frequency which the mobile will transmit information to the

base station, will be in the frequency range of 890 to 915MHz.

The uplink and the downlink make up a frequency pair, which for

GSM900, is always separated by 45MHz.

Page 27: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

27

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 27

Downlink and UplinkDownlink and Uplink

� Uplink Lags Downlink by 3 Timeslot periods

� Uplink and Downlink use same Timeslot Number

� Uplink and Downlink use same Channel Number (ARFCN)

� Uplink and Downlink use different bands (45MHz apart for GSM900)

In the previous example we can see that the timeslots are offset by 3

between the downlink and the uplink. We receive information in timeslot

two in the downlink we have two timeslots in which to switch to the uplink

frequency and be ready to transmit information. Then, we have to get

ready to receive our next time slot of information in the next frame.

Page 28: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

28

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 28

3

6

6

2

2

1

4

5

7

GSM Cell PlanGSM Cell Plan

GSM uses a number of channels in each cell. However, the same channels

cannot be used in adjacent cells, as they would interfere with one another.

This is Spatial Division Multiple Access (SDMA), a scheme that reuses the

channels in distant geographical areas.

Above is a pattern known as an “N in 7”. In this example there is about

three cells distance between reused channels. There are many other patterns

used. These depend on output power and cell size.

Page 29: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

29

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 29

Cell

Omnidirectional

Antenna

Sector

SectoredAntenna

Cell

GSM Cell TypesGSM Cell Types

One way for cells to be designed is using an omnidirectional antenna at the

center. The whole cell uses the same channels.

Another cell design is a sectored cell. This uses a beam antenna, which in

the above example has a 120° beam width. This forms a three-sectored cell.

There are other sector designs that can be used for other applications.

The are other types available but these are the most common. Another cell

is the ‘Umbrella’ cell that is long and thin and is used to cover roadways in

remote areas. This is used so that the valuable energy from the base station

is not wasted on sides of the road that have no need for coverage. It also

reduces handoff frequency.

Page 30: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

30

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 30

1

24

5

7

8

*

0

3

6

9

#

BCH 1

BCH 3

BCH 2

GSM Broadcast ChannelGSM Broadcast Channel

All BTS produce a Broadcast Channel (BCH). The BCH is like a

lighthouse or beacon. It's on all the time and allows mobile to find the

GSM network. The network for a variety of user functions also uses the

BCH signal strength. It's a useful way of telling which is the closest BTS

to the mobile. It also has information coded onto it, such as the identity of

the network (e.g. Mannesmann, Detecon, or Optus), paging messages for

any mobiles needing to accept a phone call, and a variety of other

information. Each mobile will monitor the power of adjacent cell BCH’s to

aid the network in making hand-off decisions.

Page 31: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

31

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 31

Hvordan kan en MS Hvordan kan en MS

findes?findes?�Prøv at finde antenne-information påjeres MS?

�Nummeret efter navnet er hvilken retningen antennen vender.

Page 32: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

32

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 32

Antenne opdelingAntenne opdeling

12,5%

12,5% 12,5%

12,5%

12,5%

12,5% 12,5%

12,5%

33,3333%

33,3333%

33,3333%

1

2

3

45

6

7

81

2

3

TDC 7

TDC 2

Page 33: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

33

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 33

1

24

5

7

8

*

0

3

6

9

#

BCH

TCH

GSM Traffic ChannelGSM Traffic Channel

Mobiles on a call use a Traffic Channel (TCH). The TCH is a two way

channel used to exchange speech information between the mobile and base-

station. It's interesting to note that while the TCH uses a frequency channel

in both the uplink and downlink, the BCH occupies a channel in the

downlink band only. The corresponding channel in the uplink is

effectively left clear. The mobile can use this for unscheduled or Random

Access Channels (RACH). When the mobile wants to grab the attention of

the base station (perhaps to make a call).

Page 34: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

34

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 34

1

24

5

7

8

*

0

3

6

9

#

BCH

TCHMobile constantly monitors received TCH quality (RxQual & RxLev)

GSM HandGSM Hand--OffOff

When the MS is on a call, it is constantly monitoring the Received Signal

Quality (a bit error rate measurement known as RxQual) and the Received

Signal Level (a power measurement call RxLev). These are constantly

being sent back to the BS on a Slow Associated Control Channel

(SACCH). When the levels cannot be maintained by adjustments in power

level by the BS, it will instruct the MS to start a hand-off. As mentioned

earlier, the MS is also monitoring the surrounding cells’ BCH’s, this helps

the BS decide which is the best cell to hand-off to.

Page 35: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

35

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 35

UPLINK

ADJACENT CELLBC

H

DOWNLINK

Measuring Measuring AdjAdj BCH PowerBCH Power

Besides receiving and transmitting information, the mobile must switch

frequency and get ready to receive and measure the level of the adjacent

cell's broadcast channels. It then reports this (RxLev) information to its

own base station in order to establish when a handoff is appropriate

between cells. Again, information is received on timeslot 2, we switch

45MHz to transmit information and then, need to switch back 45MHz +/- a

few MHz to monitor and measure the level of the adjacent cell's broadcast

channels. This information will be reported back to the base station at least

every 30 seconds so that the base station can determine the appropriate time

to do a handoff. The RxLev information is reported back to the base-

station on the uplink SACCH (Slow Associated Control CHannel).

The mobile uses a list of ARFCN in the BA (Base Allocation) table to

know which BCH frequencies to go out and measure. The BA table is

coded onto the BCH, and also the downlink SACCH.

Page 36: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

36

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 36

1

24

57

8*

0

3

6

9

#

Too much PowerLow Talk Time

Too little PowerDropped Calls

Mobile adjusted according to Mobile adjusted according to

Received Signal Strength and Received Signal Strength and

Quality at Base Station.Quality at Base Station.

GSM Power StepsGSM Power Steps

As the mobile moves around the cell, its transmitter power needs to be

varied. When it's close to the base station, power levels are set low to

reduce the interference to other users. When the mobile is further from the

base station, its power level needs to increase to overcome the increased

path loss. However, if too much power is used, the user’s battery will run

down too quickly.

All GSM mobiles are able to control their output power in 2dB steps. The

base station commands the mobile to a particular MS TX Level (power

level) by watching the power level of the received signal at the BS.

Page 37: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

37

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 37

Phase 1GSM900

Phase 2GSM900

Phase 1DCS1800

Phase 2DCS1800

PCS1900

Mobile MaxPower

20W

(8W used)

43dBm/39dBm

8W / 39dBm 1W / 30dBm 4W / 36dBm 2W / 33dBm

Mobile MinPower

20mW /13dBm 3mW /

5dBm

1mW/ 0dBm 1mW / 0dBm 1mW / 0dBm

Mobile PowerControlSteps

0 - 15 2 - 19 0 - 13 0 - 15 0-15 ,30,31

Mobile Power LevelsMobile Power Levels

The table above shows the maximum and minimum power levels on the

mobiles in different systems. The final row shows the power steps, which

are all numbered, and how they relate to the max and min powers.

Page 38: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

38

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 38

Amplitude

Time

148 Bits in the ‘Useful Part of the Burst’

GSM Burst GSM Burst -- TDMATDMA

The burst can be divided into three distinct areas:

• Ramp Up

• Useful Part of the Burst

• Ramp Down

All of these levels are controlled by the GSM standard.

The Useful Part of the Burst is the area where the modulated data is

present. There are 148 bits (each bit is represented by a single symbol in

0.3GMSK modulation) which will be examined more closely in a later

section.

Page 39: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

39

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 39

BTS

Cell radius < 35 km

Signal travel or time 117 usec

GSM Time DelayGSM Time Delay

In GSM, because it uses TDMA with cells up to 35 km radius, a radio

signal will take a finite period of time to travel from the mobile to the base-

station. There must be some way to make sure the signal arrives at the

base-station at the correct time.

Page 40: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

40

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 40

Ideal

Delayed

GSM Time DelayGSM Time Delay

Change noted in 1/4 bit periods, but only changed if change in excess of 4/4 bit period.

If the burst arrives at the correct time, it will fit into its physical channel

and not disturb any other burst that may follow it in the next timeslot.

However, if it is delayed, due to a long distance to travel, it may arrive late

and impact the following burst from another user. In this case the mobile is

instructed by the BS to burst earlier which will correctly align the burst in

the timeslot. The message sent by the BS is called the Timing Advance.

The base station monitors the burst to see when it arrives at the base

station. If it arrives late or early, the base station will note how many times

it has changed since the last Timing Advance adjustment, and if there have

been more than 4 x ¼ bit periods change in one direction, the adjustment

will be made again.

Page 41: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

41

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 41

Reference Color Code (Midamble)

Actual Received Signal

GSM GSM MidambleMidamble

EqualisationEqualisation

The GSM burst may not arrive at the radio without first bouncing off a

number of objects. This can cause multipath signals that will add together

and distort the signal. Part of the burst data is called the midamble. The

midamble (color code) is known by the MS and BS. The mobile, as part of

its design, knows what the received signal’s midamble should look like. If

it does not see what is expected, the equalizer will set an inverse filter to

counter the effects of the environment on the transmitted signal.

Page 42: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

42

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 42

MidambleMidamble or Training Bitsor Training Bits

� 8 Midamble Patterns (Colour Codes) of

26 bits

� Equalizer Estimates Channel Impulse

Response From Midamble

� Mathematically Construct Inverse Filter

� Uses Inverse to Decode Data Bits

The middle 26 bits of the data in the useful part of the burst are

referred to as either a midamble or a training sequence. For a

normal burst this mid-amble will consist of 8 base station color

codes and these are numbered 0 through 7. They are 26 bits long.

Midambles are placed in the center of the burst to minimize the

time difference from to any bit in the burst. The midamble has a

number of different uses; the most important is equalization to

improve bit error rate.

The mobile knows the midamble it should be receiving (part of

the information the MS gets when assigned to a BS). This is a

pre-defined sequence is 26 bits in the case of a traffic channel. It

receives the mid-amble and compares the it to what it should

have been. From the difference it can estimate the impulse

response of the transmission path at that instant in time. Once it

knows the impulse response it can mathematically calculate an

inverse filter, it can apply this filter to the data bits on each side

of the mid-amble and clean them up, reducing the chance of

detecting a bit wrong.

This is referred to as equalization or the equalizer within the

radio. Equalizer mechanisms are a closely guarded design

feature of most mobiles. It's a key area of competition between

mobile manufacturers.

Page 43: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

43

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 43

dB

Wavelength

Frequency DiversityFrequency Diversity

If there is an area that has bad multipath, such as urban areas with

lots of reflections from buildings, the cell may have many fades.

A fade is where the multipath signals destructively adds and

produce a low level signal. The graph above shows these fades as

a function of wavelength. If a mobile moves into a fade it can

drop a call. There are two ways to avoid this problem:

1. Stop mobile moving into fades

2. Move the fades around so that a mobile may only

be in one for a very short and insignificant period

of time

Restricting the use of a mobile is impossible, as it would require

an exact mapping of the fades in a cell and warning signs around

them! The more practical method is to move the fade. Changing

the wavelength of the signal does this. By doing this you will see

that the above graph would expand and compress along the x-

axis and hence the fade would move. This is done by a system

called ‘frequency hopping.’ So the cell would need to be defined

as a hopping cell.

Page 44: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

44

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 44

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

C1

C2

C3

C1

C2

C3

UPLINK

ADJACENT CELL

BCH

DOWNLINK

Hopping SequencesHopping Sequences

All mobiles must have the capability of hopping. However, not all cells will

be hopping cells. In this example, there are three frequency pairs to hop

among. The mobile still needs to go out and measure the adjacent cells'

broadcast channel (BCH). In the first frame, the mobile receives

information on channel 1 downlink, then switches to the uplink for channel

1 (45MHz away), transmits it's information, and finally monitors one of the

adjacent cells to measure its level. The mobile must move to the downlink

for channel 2 and receive information in timeslot 2, switch 45MHz, and

transmit on the uplink for channel 2. Then it monitors another cell's

broadcast channel and measures its level. This continues through the

sequence of frequencies that have been assigned to the cell. The CA (Cell

Allocation) and MA (Mobile Allocation) tables define the hopping

sequence. The CA table is a master list of all the hop frequencies available

in a particular cell. It's sent to the mobile on the BCH and also the

downlink SACCH. The MA table is an index into the CA table, and gives

a hopping sequence for a particular mobile. The MA table is sent to the

mobile as part of the handoff or channels assignment process.

Page 45: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

45

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 45

Hopping SequencesHopping Sequences

�Control Channels NEVER hop

�Can employ cyclic or pseudo-random

hopping sequences

�Different mobiles in a cell have

different MAIO’s (Mobile Allocation

Index Offset)

There are a few things to know about hopping cells. The BCH never hops.

As the hopping process is a highly synchronized operation, and the mobiles

that are not camped to the system are not synchronized, we would end up

with a catch 22 situation. The mobile cannot hop because it is not

synchronized, it is not synchronized because it is not camped, it cannot

camp because it is not synchronized and it cannot synchronize because it

cannot hop!

There are pseudo-random sequences defined in cells, as they tend to better

reduce the affects of multipath signals. However, there is still the need for

cyclic hopping in a sequence.

If there are 8 users on a channel and the channel is hopping amongst three

channel, as in the example, they must not arrive in the same timeslot on the

same channel. The timeslot is defined on call set up, however this does not

account for two users in the same timeslot on different channels. The

mobiles would be given a channel offset (starting point) of 0, 1 or 2 so that

they stayed in the correct part of the channel sequence while hopping.

Page 46: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

46

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

© Copyright 2000, Agilent Technologies

All Rights Reserved

GSM BCH FramesGSM BCH Frames

We’re going to be introduced to a new term now, frames. In order to

understand frames, we must first get a grip on what is happening in the

timeslots.

The digital signal is transmitting bits. We will see when we examine the

speech path from the mobile to the base station that the bits do not form

complete messages. It’s a little like sending a shuffled deck of cards

through the mail in different envelopes and then sorting them all at the

destination. In order to make sure that he sorting can take place, we must

synchronize all the timeslots into frames. These are just repeating patterns.

Later we will see that the pattern repeats not every 8 slots but after many

slots.

We use frames to make sure that everyone starts in the correct place. Part

of the GSM standard defines a frame counter, which every mobile must

know before it can accurately transmit and receive.

We will start with the Broadcast Channel and then move on to the Traffic

Channel later.

Page 47: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

47

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 47

(normal burst)

Super-frame

Multi-frame

Frame

Timeslot 156.25 Bits

8 Timeslots

51 Frames

26 Multiframes

6.12 s

120 ms

4.615ms

576.92 us

BCH BCH -- FramesFrames

A timeslot is 577 microseconds long and serves a single user, or represent a

single Broadcast Channel (of which there is only 1 in a cell). Including guard bits

it is 156.25 bits long (remember that time can be represented by bit periods).

As we know 8 timeslots make up all the users on a channel. Together these are

known as frames.

51 frames make up a multiframe and 26 multiframes, a superframe.

The largest is a hyperframe and is 2048 superframes and lasts exactly 3 hours 28

minutes’ 53 seconds 760 milliseconds. This is the master clock of the system and

is also what gives GSM such security: A repeating pattern only happens 7 or 8

times every day! The mobile has to synchronize and find its place in the frame in

order to operate.

Page 48: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

48

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 48

GSM BCHGSM BCH

Broadcast ChannelBroadcast Channel

One BCH on all the time, in every cell

BCH Information carried in Timeslot 0

Identifies Network Carries, Paging

and other Control Information

The concept of a Broadcast Channel (BCH) is very simple; the BCH acts like a

beacon, or lighthouse. It's on all the time and is the first thing the mobile looks

for when it's trying to find service. The BCH ARFCN has to be active in all

timeslots to allow mobiles synchronized to other cells to measure its power. The

useful BCH information is always carried in timeslot 0. The other timeslots are

filled with dummy bursts, or are available for TCH.

There are a number of sub-channels on the BCH. A sub channels has a operation

to do with establishing the mobile as part of the network. In real terms it is just

dividing up the received bit into groups and saying that they have different

functions.

This is a little like saying that the deck of cards that we talked of earlier has

different uses between the four suits, Spade, club, heart and diamond. Together

they are a deck of cards, unless you previously define what the suits mean.

Page 49: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

49

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 49

Control Channel Organization

BCH CCCH DCCH

Control Channel

Broadcast ChannelBroadcast Channel

Although we refer to the main control channel as the Broadcast Channel, this is

really only one of its uses. There is also a Common Control Channel (CCCH) and

a Dedicated Control Channel (DCCH). We will discuss them in detail later.

Page 50: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

50

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 50

Broadcast Channel Organization

FCCH

Frequency Correction

SCH

Synchronization

BCCH

Broadcast Control

BCH

Broadcast Channel

BCH BCH -- SubchannelsSubchannels

The Broadcast Channel (BCH) has three ub-channels.

The FCCH is like a flag, it allows the mobile know that it has found a GSM BCH.

Once it has established this, it will then use the SCH to work out how fast the

system clock is ‘ticking’.

Now that it can get some useful information, it will examine the BCCH to find

out which network, or even networks, that it has found. It then uses other

information to make a choice of which network to camp on to.

Page 51: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

51

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 51

SCH SCH -- The The ‘‘SS’’ BurstBurst

3 39 64 39 3

TailBits

InformationBits

Midamble (training sequence)

Information Bits

TailBits

The SCH is sometimes known as the S burst. It is a complete message in itself

and does not need multiple messages to be sorted, in order to be used. It appears

at regular intervals and from its position, much of the order of the frame can be

deduced. Once the position of the burst is known, the mobile knows that it will

see a FCCH in the next frame. The midamble is a little longer than a normal burst

as the mobile has a harder time trying to find it. The midamble is fixed and never

changes, as this would make finding it nearly impossible for the mobile.

Page 52: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

52

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 52

FCCH FCCH -- The The ‘‘FF’’ BurstBurst

3 142 Bits set to ZERO 3

InformationBits

TailBits

TailBits

The FCCH is a very specially designed burst. Again it is a message in a single

timeslot. What the message is, is the ticking of a clock. Remember from Analog

and Digital Technology Course that a pattern of all 0’s will cause the signal to

look like a sine wave. This is the message. A constant frequency sine wave

(1625/24 kHz higher than the channel center frequency), with which the mobile

can synchronize its internal clock.

Page 53: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

53

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 53

CCCH CCCH -- subchannelssubchannels

Common Control Channel Organization

PCH

Paging

RACH

Random Access

AGCH

Access Grant

CBCH

Cell Broadcast

CCCH

Common Control Channel

So now we have synchronized to a network and we know which one, what next?

Next we need to be able to make and receive calls. The mobile will monitor the

Common Control Channel. This is so called, as all the mobiles will watch the

same common place. It is a little like a message board at an airport, everyone

looks at the same board but only act if there is a message for them.

The Paging Channel, as its name suggests, is where mobiles are paged to proceed

on a call. This is true even if it wants to make a call, as it will send a Random

Access Channel and wait to be paged back on the PCH.

Once it has answered a page, it waits for a channel on the Access Grant Channel

and then proceeds on the call.

The Cell Broadcast Channel is where Short Messages are sent to an entire cell,

not individual users.

Page 54: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

54

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 54

11

22

44

55

77

88

**

00

33

66

99

##

11

22

44

55

77

88

**

00

33

66

99

##

11

22

44

55

77

88

**

00

33

66

99

##

All mobilesin a cellreceive the same message from the base station

SMS Cell BroadcastSMS Cell Broadcast

SMS (Short Message Service) Cell Broadcast is a method by which all user in a

cell will receive the same text message on the display of their mobiles. Why

would this be useful? Take an example of a tariff that allows cheaper calls in

certain dialing code areas. By displaying the codes of that particular cell, the user

can decide whether to make the call. A message to say that the cell is undergoing

maintenance could also be useful. This message is carried on the CBCH.

Page 55: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

55

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 55

� Mobiles can receive SMS messages

in IDLE and DEDICATED modes:

� Cell Broadcast Channels (CBCH’s)

are part of CCCH so IDLE state

mobiles can receive SMS.

� FACCH sets up SMS send and

acknowledge. SACCH carries data

for mobiles in DEDICATED mode.

CBCHCBCH

We will learn later that the mobile does not look at the CCCH when it is on a call.

So how does it see the Cell Broadcast message during a call? During a call the

message is sent on something called the Fast Dedicated Control Channel

(FACCH). More about this later but suffice to say that it is a signaling message

sent during calls.

You may notice that the CBCH in this slide is said to be part of the SDCCH

(explored next) and not the CCCH as stated earlier. There seems to be some

contention in published texts, so be aware that there is a difference of opinion.

You may want to check the GSM standards, but it is not really very important.

Page 56: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

56

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 56

Only a singlemobile in a cell receivesthe message from the service center

11

22

44

55

77

88

**

00

33

66

99

##

11

22

44

55

77

88

**

00

33

66

99

##

11

22

44

55

77

88

**

00

33

66

99

##

XX

SMS Point to PointSMS Point to Point

Another messaging system that we will mention here is the SMS Point-to-Point

message. This is addressed to a single user, rather than a whole cell. It does not

work in the same way as the SMS Cell Broadcast, and does not use the CBCH.

We mention it here so as to keep all SMS discussions together.

Page 57: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

57

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 57

� This is a message that comes to a

particular user, from a service center, or to

the service center from the user.

� Sent and Received as data on the TCH as

a call.

� Send and Receive transparent to the user.

SMS Point to PointSMS Point to Point

The message is sent from a Service Center in much the same way as a call. If a

call is in progress, the message is sent on a FACCH, but otherwise is sent on a

Stand Alone Dedicated Control Channel (SDCCH) which we will look at next.

Page 58: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

58

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 58

DCCH DCCH -- subchannelssubchannels

Dedicated Control Channel Organization

SDCCH

Stand-Alone Dedicated

SACCH

Slow Associated

FACCH

Fast Associated

DCCH

Dedicated Control Channel

The Dedicated Control Channel (DCCH) is the only part of the Control Channel

used during calls and call set up. We mentioned earlier that the mobile does not

look at the CCCH during calls, it does however look at the DCCH. Remember

that another way of describing a mobile on a call is it is in Dedicated Mode. This

may be on the same frequency as the BCH, TCH or another altogether depending

on how the system is configured.

The Stand-Alone Dedicated Control Channel (SDCCH) is used during call set up

as a stepping stone to the Traffic Channel. It is also used to pass signaling when

the mobile is in IDLE mode. This is used for example for SMS Point-to-Point

messages as well as Location Updates that we will look at later.

The Slow Associated Channel (SACCH) is used to pass routine system

information (power level changes) during a call. It is synchronized to occur at

known breaks in the mobile's reception on the traffic channel.

The Fast Associated Control Channel is used to pass critical information to the

mobile during a call, by taking over the TCH from the callers. More later.

Page 59: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

59

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 59

GSM SDCCHGSM SDCCH

Stand Alone Dedicated Control Stand Alone Dedicated Control ChannelChannel

Used during Call Setup

Stepping Stone between BCH and TCH

Used for Authentication

During the call set-up process, there can be a lot of time between the mobile

getting service and the start of conversation. Time is taken up while the phone is

ringing and waiting to be answered.

During this period, there's a need to exchange control information between the

mobile and base station. Alerting messages are sent, and authentication takes

place, but there's no need to send speech information.

The SDCCH, by using less of the cell resource of physical channels, improves

efficiency, and provides a useful holding channel for the mobile until speech or

data needs to be exchanged.

Page 60: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

60

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 60

BCH OrganizationBCH Organization

Timeslot

0 10 20 30 40 ………………..

FCCH

SCH

BCCH

CCCH DOWNLINKDOWNLINK

We mentioned earlier about the fact that a BCH is a 51-frame multiframe. Let’s

look at the downlink direction for the Control Channel. We said that the SCH and

FCCH are always n the same place in the multiframe. They occupy the 1st and

2nd, 11th and 12th, 21st and 22nd, 31st and 32nd……..In this example the BCCH take

the 3rd to 5th with all other channels being CCCH’s. There are many ways to

arrange this frame, depending on the usage pattern of the cell. A mobile must be

able to operate using any combination. Look at your GSM channel simulator (the

8922X for example) or the GSM standards to get a better idea of the different

ones that are in use today.

Page 61: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

61

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 61

BCH OrganizationBCH Organization

Timeslot

0 10 20 30 40 ………………..

UPLINKUPLINKRACCH

In the uplink direction the mobile will be sending signaling to the Control

Channel in order to establish calls and be part of the network when it is in idle

mode.

These messages are sent on special bursts called Random Access Channels. The

Uplink Control Channel will allow for these to be received.

Page 62: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

62

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 62

GSM RACHGSM RACH

Random Access ChannelRandom Access Channel

Used by the mobile to get attention

SHORT BURSTSHORT BURST

Mobile sends normal burst after getting Timing Advance

When the mobile has become synchronized to the frequency and frame timing of

the cell, and looked at the other information on the BCH, it is ready to make and

receive calls. Once the mobile is in this state it is 'camped' to the base station.

If the mobile is near the base station, their timing will be closely aligned. If the

mobile is on the edge of the cell, maybe 30 km from the base station, the mobile's

timing could be 100us in error. This would cause it to overlap another timeslot.

When the mobile sends out a RACH, to start a call, to avoid collisions with bursts

in adjacent TS, RACH bursts, that are shorter than normal are sent.

Until the mobile gets its timing advance information (that we talked about earlier)

from the cell it sends short bursts.

Page 63: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

63

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 63

Frame Format Frame Format -- RACHRACH

7 41 36 3

TailBits

Midamble (training sequence)

InformationBits

TailBits

We said that theRACH burst is shorter than a TCH burst, but how much shoter? It

is only 87 bits long plus guard bits. The difference in length can be irectly

calculated from the time delay of the largest cell over free space. The final bits

are sent at zero power and are really just elongated guard bit areas. Again there is

a longer midamble as these bursts are hard for the base station to find.

Page 64: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

64

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 64

DRXDRX

1

24

5

7

8*

0

3

6

9

#

1

24

57

8*

0

3

6

9

#

1

24

57

8*

0

3

6

9

#

1

24

57

8*

0

3

6

9

#

ZZZzzzzzz

ZZZzzzzzz

Look for Pages

ZZZzzzzzz

It is worth mentioning at this point that although mobiles all look at the Paging

Channel (PCH) in order to find if the base station is calling them, they do not

need to look all the time. There is a method called Discontinuous Reception that

allows mobiles to turn off their receivers when they know that they will not be

paged, and only turn them on when they know they might be paged.

Page 65: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

65

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 65

DRXDRX

� Only looks for pages during its assigned ‘Paging Group’

� Paging Group is a function of the mobile IMSI

� Reduces power consumption as receiver can ‘sleep’ between pages

This requires the introduction of the term Paging Group. Each mobile has an

International Mobile Subscriber Identity (IMSI) carried by the SIM card. There is

an algorithm that will make the Paging Group number from this IMSI. By

knowing when it cannot be paged, the mobile will shut down to save power, and

only ‘wake up’ to look during its group.

Page 66: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

66

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

© Copyright 2000, Agilent Technologies

All Rights Reserved

GSM TCH FramesGSM TCH Frames

So far we have only talked about what happens when a mobile is looking for a

network and wants to camp and set up a call. What happens when it has achieved

all this and been granted a Traffic Channel? Lets look at this now.

Page 67: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

67

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 67

(normal burst)

Super-frame

Multi-frame

Frame

Timeslot 156.25 Bits

8 Timeslots

26 Frames

51 Multiframes

6.12 s

120 ms

4.615ms

576.92 us

TCH TCH -- FramesFrames

This diagram may look familiar. It is similar to the BCH frames that we looked at

in the previous section. There is one fundamental difference:

The multiframe is now 26 frames and the superframe is now 51 frames. This is

the opposite of the BCH implementation. It will become clear why this is

different as we move on.

Page 68: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

68

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 68

Frames format Frames format -- TCHTCH

3 57 1 26 1 57 3

TailBits

DataBits

StealingFlag

MidambleBits

StealingFlag

DataBits

TailBits

Lets look at the frame format that the TCH uses. This is what is carried on the full

sized bursts that we looked at, at the beginning of this lesson.

There are 148 bits of which 147 are ‘useful.’ Again, we can have half bits if we

think of the tail bits as bit periods, rather than data.

There are four main areas to the burst:

• The leading and trailing 3 bit blocks are called tail bits and are fixed data.

• The center 26 bits are called the Midamble or Color Code

• The single bits on either side of the midamble are known as Stealing Flags

• The two remaining 57 bit blocks carry the user data.

Page 69: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

69

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 69

TCH OrganizationTCH Organization

Timeslot

UPLINKUPLINK

TCH

SACCH

IDLE

0 12 25

So how is the frame organized?

We said before that there are 26 frames in the multiframe. We also mentioned

that there are areas where the Slow Associated Control Channel can send the

mobile information. This happens once every 26 frames, on the 13th.

Why is there an IDLE burst here?

This is all to do with timing of the multiframe. We will see later the mathematical

reason, but at this point accept that it is a ‘filler’ that is used to make sure that the

multiframe takes the correct amount of time.

Page 70: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

70

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 70

GSM SACCHGSM SACCH

Slow Associated Control ChannelSlow Associated Control Channel

DOWNLINKDOWNLINK

Mobile Tx Power Commands

Mobile Timing Advance

Cell’s Channel Configuration

UPLINKUPLINK

RXQual report

RXLev report

Adjacent BCH powers

The Downlink Slow Associated Control Channel (SACCH) is used to send

slowly but regularly changing control information to the mobile. Examples are

instructing the mobile to change its transmitter power (MS_Tx_Lev) and burst

timing advance (to compensate for RF transit time) as it moves around the cell.

The Uplink SACCH carries information about received signal strength (RxLev)

and quality (RxQual) of the TCH and the adjacent cell BCH measurement results

(also RxLev).

Page 71: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

71

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 71

GSM SACCH TimeoutGSM SACCH Timeout

Slow Associated Control ChannelSlow Associated Control Channel

SACCH delivers RxQual and RxLev, which starts Radio_Link_Timeout counter. If no reports within this timeout period, then the call is dropped.

There is another role that the SACCH plays. It is the way that a mobile and base

station know if a call is still in progress. When the SACCH is sent, it will

start/reset a timer called the Radio_Link_Timeout timer. If the timer value

exceeds a set value, the call is deemed dropped.

Page 72: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

72

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 72

SACCHSACCH

DOWNLINK UPLINK

* Timing * Adjacent BCH

* Power Ctrl. * Channel Power

* Call configuration * Rx Level

* Hopping frequency * Rx Qual.

Here is a table that summarizes the roles that the Uplink and Downlink SACCH’s

play in the communication models. Note that the Uplink is usually reports where

the downlink is instructions.

Page 73: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

73

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 73

Fast Associated Control ChannelFast Associated Control Channel

Used by BS and MS to send large amounts of data FAST

Hand-offs

Set Stealing Flags

GSM FACCHGSM FACCH

When the SACCH reports coming back to the base station indicate that another

cell would offer the mobile better signal quality, a hand-off may be necessary.

The SACCH doesn't have the bandwidth to transfer all the information associated

with a hand-off, such as the new ARFCN and timeslot.

For a short period of time, the TCH is replaced by an FACCH. The frame stealing

flags (the control bits on either side of the midamble) are set to indicate that the

data being sent is an FACCH, not the TCH.

When the FACCH steals bursts from the TCH, speech data is lost. It's often

possible to hear a small speech dropout when hand-off takes place.

The FACCH can also carry the SMS Point-to-Point and Cell Broadcast data.

Page 74: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

74

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 74

DTXDTX

1

2

4

5

7

8

*

0

3

6

9

#

SID

Normal Mode

Discontinuous Mode

Earlier we mentioned Discontinuous Reception (DRX). There is also something

called Discontinuous Transmission. The only similarity is that they both save the

mobile’s battery.

The mobile can be empowered by the base station (that usually makes all the

decisions) to not transmit all the time. It can notice when a mobile user is

listening and only send samples of the background noise to give the other party

comfort.

Page 75: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

75

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 75

DTXDTX

� Instead of transmitting useless background noise, the mobile sends Silence Descriptor Frames (SIDs)

� Reduces the power consumption by the mobile

� Reduces the noise in the Spectrum for other users

The mobile transmits samples called SID frames. These are Silence Descriptor

Frames. These are updated periodically to give the ‘lifelike’ sound to the caller.

There are two advantages to using DTX:

•The power consumption of the mobile drops

•The amount of energy put into the spectrum is reduced

The first point is obvious, but the second less so. All radio systems must try to

overcome the noise of the environment. This means that the more mobiles that a

network has, the more noise. So by adding more users, it gets harder to run the

network. If the operator can get the mobile to reduce its power output, it will

reduce the background noise and hence the problems for other users.

Page 76: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

76

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

© Copyright 2000, Agilent Technologies

All Rights Reserved

GSM Signal PathGSM Signal Path

Now that we know how all the information is passed over the air-interface, we

need to understand how the mobile and base station take a voice signal and get

the data onto the bursts. This is the GSM Signal Path.

Page 77: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

77

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 77

Codec InterleaveVocoder Modulate Burst

GSM Voice PathGSM Voice Path

A simple view of what needs to be done to take a voice and get it onto a burst, as

it were, is in the diagram above.

•There needs to be some way to encode the voice into data

•Next the data must have error protection added to it

•The Data has further error protection

•It is modulated

•It is bursted

Again, this is very simplistic and other steps will be explored during this section.

Page 78: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

78

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 78

Vocoder

20ms Speech makes 260

Bits

Output 13 kbit/s

3 Classes of bits output

RELP - Residually Excited Linear

Predictive

LTP - Long Term Predictive

GSM GSM VocoderVocoder

Most modern digital communications systems use some sort of voice

compression. GSM is no exception. It uses a voice coder to model the tone and

noise generation in the human throat and the acoustic filtering of the mouth and

tongue. These characteristics are used to produce coefficients that are sent via the

TCH.

The speech coder is based on a residually excited linear predictive coder (RELP);

including a long term predictor (LTP) enhances this. We will discuss these later.

Page 79: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

79

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 79

20 ms Block

Speech Coder

260 Bits

Speech CoderSpeech Coder

The voice is sampled into 20ms blocks. As you saw in the previous pages, the

data rate is fixed at 13kbits per second. If we want to send the same voice with

less bits, we will have to use Half Rate vocoders which will only output half the

bits, in other words 6.6 kbits per second.

In Digital the rate is not necessarily related to the quality. This is all tied up in the

complex coding algorithms used by the vocoders. We will see this later.

At this point let us say that the 20 ms of speech becomes 260 bits of data.

Page 80: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

80

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 80

� LongTerm Prediction

� Linear Predictive Coding

� ADPCM - Adaptive PCM

� MOS - Mean Opinion Scoring

Speech CoderSpeech Coder

So what is the LTP and LPC used in the vocoder. These are digital filters and

inverse filters that combine images of the data with itself to produce a model of

the voice. What the effect of this is, is to make some sounds more important than

others.

A very simple way to look at this system is:

Sounds that have long repeated components will be coded as shorter ones, as the

repetition does not really convey lots of useful data. Short consonant sounds will

carry lots of information so will get more merit. The OO sound in smooth,

contains less information that the TZ sound in Spritzer.

ADPCM is a version of Pulse Coded Modulation that is used in communications.

It allows lots of sampling where it is needed and restricts the sampling when little

is needed.

MOS is the Mean Opinion Score. This is a subjective way to rate the quality of

sound from a vocoder. The sounds are judged by people and scored 1 to 4. This is

the only way to rate a vocoder. We mentioned before that the data rate is not the

best guide, and if you are comparing equal data rates, this system is the only way.

The system of sound modeling and codebooks are where the real improvements

come from.

Page 81: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

81

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 81

50 Bitstype 1a

Bits Ordered

260 Bits

260 Bits

132 Bitstype 1b

78 Bitstype 2

Speech CoderSpeech Coder

Now that the voice has been modeled, it needs to be protected on its rough

journey through the hostile Rf environment.

The vocoder will output 260 bits of three types or classes 1a, 1b and 2(II).

These are the result of the coding schemes that give rise to important, less

important and unimportant bits.

The point here is that they will receive different amounts of error protection in the

codec.

Page 82: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

82

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 82

CODEC

13 kbit/s

456 bits

13 kbit/s

260 bits

3 classes of error correction

Class 1a bits: Error Correction and CRC bits

Class 1b bits: Error Correction only

Class II bits: No Error Correction

GSM CodecGSM Codec

The least important or type II bits have no error correction or detection. The

premier type Ia bits have error detection CRC bits added. Both type Ia and the

medium importance type Ib have convolutional error correction bits added.

It's sometimes interesting to think of GSM bits as aircraft passengers:

There are three classes, Ia, Ib and II. The most important bits get first-class

treatment; they get surrounded by lots of error correction, and in the case of Ia

bits, error detection as well. These extra bits take up space in the TCH bursts.

The second class, type II bits, take up the least space on the TCH, just like first

and second class passengers on an airplane.

Page 83: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

83

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 83

3 bit lock Code CRC inserted

50 3 132 78type 1a CRC type 1b type 2

50 Bitstype 1a

132 Bitstype 1b

78 Bitstype 2

263 bits

260 bits

Error CorrectionError Correction

What does this error correction look like?

The first step is to add the Cyclic Redundancy Check to the 50 type 1a bits. This

is a three-bit parity code or checksum.

At this point the 132 1b and 78 type II bits are not changed.

Page 84: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

84

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 84

25 66 3 66 25 4 78

50 3 132 78type 1a CRC type 1b type 2

4 Tail Bits Inserted

Bits Re-ordered

263 bits

267 bits

Error CorrectionError Correction

The next step is to ‘shuffle’ the bits around so that they are no longer in

sequential order. This means that when they are transmitted, the loss of one

section can still be rectified using the error correction schemes (described next)

and the fact that not all bits have been lost.

The type 1 bits are also separated from the type II bits by 4 tail bits.

Page 85: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

85

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 85

378 78

1/2 Rate Convolutional Coding

25 66 3 66 25 4 78

456 bits

267 bitsError CorrectionError Correction

The final error correction step is to add the convolutional coding to the type 1 bits

and all the other correction already added. None of this is applied to the type II

bits, which have the ‘make it if you can’ protection applied!

We are left with an output of 456 bits.

Page 86: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

86

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 86

Interleave

456 bits 456 bits

13 kbit/s

456 bits

13 kbit/s

456 bits

GSM InterleaveGSM Interleave

Just as important groups of individuals, like a company board of directors,

generally don't travel together (in case the plane crashes and wipes out the whole

management team); GSM bits spread themselves over several TCH bursts. If a

burst is lost due to interference, enough bits will still get through to allow the

error correction algorithms to work, maintaining reasonable speech quality. The

456 bits of speech data are sliced up into 8 blocks of 57. Each TCH frame carries

two 57-bit blocks of data from two different 20ms 456-bit speech segments.

Page 87: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

87

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 87

Diagonal InterleavingDiagonal Interleaving� TCH Bursts carry two 57 bit blocks

� 120ms of speech = 456 x 6 = 2736 bits

� 2736 / 114 = 24 bursts needed to transmit

� TCH Multiframe is 26 frames and 120ms

�� Now have 2 spare bursts:Now have 2 spare bursts:

� Use one for the SACCH

� Use the other as an IDLE

From the arithmetic point of view, notice that in the period taken up by 1 frame

(120ms), six 20ms blocks of speech are processed by the speech coder. Each of

these blocks results in 456 bits.

A 120ms segment of speech will produce 2736 bits.

Each TCH burst has a pair of 57 bit data sections on either side of the midamble.

Effectively, each TCH burst carries 114 bits. It takes 24 of these TCH bursts to

ship the 2736 bits from 120ms of speech.

Earlier we saw how the TCH frame structures has 26 frames in a multiframe,

lasting 120ms. Since the mobile or base station transmits one burst per frame,

there are two more bursts available in 120ms than are actually needed to transmit

the voice data. We discussed that one of these spare bursts is used for an SACCH,

the other is an idle burst, which makes up the 120ms.

Page 88: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

88

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 88

� Capable of correcting single errors

× Not able to correct multiple bit errors

CRCCRC

A brief comment about CRC’s. The GSM CRC is really only capable of

correcting a single error in the TCH frame. In the SCH and RACH there are more

parity bits included, which can correct for up to 3 errors in a frame.

Page 89: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

89

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 89

TCH/F different classes & coding

260 in, 456 out Parity (3 bits)

Convolution 1/2

TCH/F9.6 (data)

240 in, 456 out Convolution 1/2

punctured 1/15 bit

Coding: Channel TypesCoding: Channel Types

The previous page showed that there are different error correction schemes

applied to different frames. The following pages look at these schemes applied to

data, signaling and data.

As we have seen the Full Rate TCH uses 3 parity bits and ½ rate convolution.

A Full Rate Data TCH takes a 240 bit frame, adds 1/15 bits and then ½ rate

convolution to the whole frame.

Page 90: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

90

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 90

Coding: Channel TypesCoding: Channel Types

TCH/F4,8 (data) + 32 null bits

120 in, 456 out Convolution 1/3

TCH/F2.4 (data)

72 in, 456 out Convolution 1/6

The Half Rate Data Frame adds 32 null bits and then 1/3 rate convolution. The1/3

rate basically means that for 1 bit in you get 3 out.

A Quarter Rate frame just adds 1/6 rate convolution to the 72 bits.

Page 91: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

91

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 91

SCH (control) Parity 10 bits

25 in, 78 out Convolution 1/2

RACH (control) Parity 6

8 in, 36 out Convolution 1/2

FACCH (control) Firecode 224/184

184 in, 456 out Convolution 1/2

Coding: Channel TypesCoding: Channel Types

The SCH adds 10 parity bits and 4 tail bits and ten ½ rate convolutional coding.

This gives a very high degree of error protection.

Similarly the RACH adds 6 parity and 4 tail bits and than ½ rate convolutional

coding.

The FACCH adds 224/184 bits and then convolutional coding. This is because

the messages carried by the FACCH are usually important to call continuation.

Page 92: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

92

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 92

Interleaving: Channel Interleaving: Channel

TypesTypesTCH/F 8 half-bursts

TCH/F9.6 22 unequal portions

TCH/F4.8 22 unequal portions

TCH/F2.4 8 half-bursts

SCH (control) 1 S burst

RACH (control) 1 Access burst

FACCH (control) 8 half-bursts

In the same way that different error correction is applied to the different bursts, so

is the interleaving.

The main ones to remember are that the SCH and RACH are not split up for

interleaving. The other methods have either been discussed or can be seen above.

Page 93: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

93

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 93

XOR

CLEAR TEXT (data)

CIPHERING SEQUENCE

CIPHERED TEXT

CipheringCiphering

There is also a way of further scrambling the data known as ciphering. The cipher

is a code that requires an intimate piece of information to be known by both

sending and receiving parties. In this case it is the cipher key Ki.

This held in only two places, the SIM card and the Home Location Register.

The coding scheme works by XORing the data with a ciphering sequence derived

from the cipher key.

Page 94: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

94

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 94

Clear TextClear Text 0 1 0 0 1 0 1 1 1 0 0 1 . . .

Cipher SequenceCipher Sequence 0 0 1 0 1 1 0 0 1 1 1 0 . . .

XORXOR

Ciphered TextCiphered Text 0 1 1 0 0 1 1 1 0 1 1 1 . . .

CipheringCiphering

Here is an example:

Remember that an XOR gives a 0 out if the inputs are the same and a 1 output if

they are different.

The 0 is XORed with a 0 to produce 0

The 1 is XORed with a 0 to produce 1

The 1 is XORed with a 0 to produce 1

The 0 is XORed with a 0 to produce 0

The 1 is XORed with a 1 to produce 1

And so on…

Page 95: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

95

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 95

CipheringCiphering

� BS Controls if active or not

� After Interleaving, before Burst Building

� Very tightly controlled algorithms

� Requires Ki Cyphering Key from HLR

� Similar to techniques used by DOD

Rules of ciphering are:

•Base Station controls if it is implemented, he mobile has no control of whether

ciphering is implemented.

•Ki is only stored in the HLR and SIM

The data is ciphered after the error correction algorithms have been applied and

the system is very tightly controlled.

Page 96: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

96

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 96

Output 270.833 kbits/s

0.3GMSK(Time Divided)

Input 13 kbits/s

(Error Corrected,Interleaved)

Modulate

GSM ModulateGSM Modulate

Just before modulation, one more step has to be performed. This is burst building.

This is where the data blocks are added to the tail bits, stealing flags and

midamble to make up the burst structure that we saw earlier. Some call this

channel coding.

Now the signal can be modulated with a 0.3GMSK modulation scheme.

Page 97: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

97

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 97

Burst

270.833 kbits/s

Output 0.3GMSK(bursted)

Input 270.833 kbits/s

0.3GMSK(Time Divided)

GSM BurstGSM Burst

All that remains is to add enough power at the right time to get the signal into the

air from the transmission antenna.

Page 98: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

98

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 98

Fase og Fase og amplitydeamplityde

modulation?modulation?

=>

Page 99: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

99

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 99

QAM QAM modulatormodulator 4 bits4 bits

0000

0001

0010

001101000101

0110

1000

10011011

1100

11011110

1111

0111

1010

0000010111110001

Tx Rx

0000010111110001

Page 100: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

100

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 100

Hvor benyttes denne type Hvor benyttes denne type

mod?mod?�xDSL modemer

�Mobil telefoni

�Digital TV transmission

Page 101: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

101

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals10001633-GSM Fund.ppt

Page 101

QAM QAM modulatormodulator 3 Bits3 Bits

000

001(1)

010

011(4)

100

101(2)

110

111(3)

Hvad er bit mønstret der transmitters?

Page 102: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

102

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

© Copyright 2000, Agilent Technologies

All Rights Reserved

GSM ProtocolsGSM Protocols

This section looks at the signaling that takes place during various scenarios of the

mobiles life. They are not meant as a definitive study, more to guide you to

understand what happens across the sir interface.

Page 103: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

103

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 103

� Mobile Searches for Broadcast Channels (BCH)

� Synchronizes Frequency and Timing

� Decodes BCH sub-channels (BCCH)

� Checks if Network Allowed by SIM

� Location Update

� Authentication

Mobile TurnMobile Turn--OnOn

When a mobile first turns on, it searches all 124 channels in the downlink for

signals. It will then order the channels by received signal strengths and check to

determine if the channel was a BCH (Broadcast CHannel).

Once the MS finds a BCH, it adjusts internal frequency and timing from the FCH

and SCH, then checks to determine if the BCH is from its PLMN (Public Land

Mobile Network). This involves comparing the allowed network and country

codes stored on the SIM card with the information encoded on the BCCH. The

mobile repeats this cycle until a good broadcast channel is found.

If the mobile recognizes that it's in a different cell from the last time it was used,

it needs to tell the network where it is. The network has to keep track of where

every mobile is so that it can route calls to the correct cell for any particular

mobile. This process of telling the network "here I am" is called a location

update.

The mobile sends a RACH, gets assigned to an SDCCH, exchanges control

information, then ends the call. The user will typically not be aware that this

process is taking place.

Page 104: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

104

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 104

BTSBTS BSCBSCAUCAUC

PSTNPSTNMSMS MSCMSC11

OMCOMCChannel RequestChannel Request

Immediate AssignmentImmediate Assignment

Authentication ResponseAuthentication Response

Cipher Mode CommandCipher Mode Command

Cipher Mode CompleteCipher Mode Complete

Location Updating AcceptLocation Updating Accept

Location Update RequestLocation Update Request

Location Updating RequestLocation Updating Request

VLRVLR

HLRHLR

Authentication RequestAuthentication Request

Location UpdateLocation Update

This is a step by step process for Location Updates; this time showing which part

of the network is involved in transactions.

Page 105: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

105

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 105

�Forced Location Update on Power

On

�Only if LAC on SIM is different

� Forced Location Update on Power

Off

IMSI AttachIMSI Attach

The IMSI attach/detach process is a way of forcing all mobiles to inform the

network when they have camped and when they have turned off (or just before

they turn off!). The SIM stores the last location Area Code (LAC) when it is

powered down and it compares this to the camping LAC on Power up and if they

are different it will perform an IMSI attach.

Page 106: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

106

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 106

Mobile Originated CallMobile Originated Call

� Mobile Sends RACH

� Channel Assignment Posted on BCH (AGCH)

� Mobile and Base Station communicate on SDCCH

� Authentication

� Mobile Assigned to Traffic Channel (TCH)

� Speech Data sent and received

Once camped, the mobile is ready to send or receive calls.

When a user dials a number, and presses the send button on the mobile, call

origination takes place. The mobile transmits a short RACH burst on the uplink,

using the same ARFCN as the BCH is using on the downlink. The base station

responds to the RACH by posting an AGCH (Access Grant CHannel) on the

CCCH. These are logical channels on the BCH physical channel. The mobile

listens on the BCH for the AGCH, when it receives it and decodes the

instructions, it re-tunes to another ARFCN and/or timeslot and begins a two-way

dialogue with the base station on an SDCCH. One of the first things that the

mobile will receive is the SACCH associated with the SDCCH. Once it receives

the SACCH, it will get timing advance and transmitter power information from

the base station. The base station will have calculated the correct timing advance

from the arrival time of the RACH. Once the mobile gets timing advance

information, it can send normal length bursts. The SDCCH is used to send

messages back and forth, taking care of alerting (making the mobile ring) and

authentication (verifying that this mobile is allowed to use the network). After a

short period of time (1 to 2 seconds), the mobile is commanded over the SDCCH

to re-tune to a TCH. Once on the TCH, speech data is transferred on the uplink

and downlink.

Page 107: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

107

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 107

BTS BSC

LR’s

PSTNMS MSC

OMCChannel RequestChannel Request

Immediate Assign to DCCHImmediate Assign to DCCH

Asynchronous ModeAsynchronous Mode

Unnumbered AcknowledgeUnnumbered Acknowledge

SetSet--up Indicationup Indication

Authentication RequestAuthentication Request

Authentication ResponseAuthentication Response

Cipher Mode CompleteCipher Mode Complete

Cipher ModeCipher Mode

Mobile Originated Call (1)Mobile Originated Call (1)

Again here is the network detail of a Mobile Originated call. This is the first half,

the second follows.

Page 108: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

108

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 108

BTS BSC

LR’s

PSTNMS MSC

OMC

Call Set UpCall Set Up

Assign CommandAssign Command

Assign CompleteAssign Complete

Alert (Ringing)Alert (Ringing)

Call ConnectCall Connect

SpeechSpeech

SpeechSpeech

Mobile Originated Call (2)Mobile Originated Call (2)

Here is the second half of the setup.

Page 109: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

109

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 109

� Mobile Sees Page

� Mobile Sends RACH

� Channel Assignment Posted on BCH (AGCH)

� Mobile and Base Station communicate on SDCCH

� Authentication

� Mobile Assigned to Traffic Channel (TCH)

� Speech Data sent and received

Mobile Terminated CallMobile Terminated Call

The process for base station originated calls is very similar. The base-station

posts a PCH (paging CHannel) on the CCCH part of the BCH. When the mobile

receives the PCH, it responds by sending a RACH. The remainder of the process

is identical to the mobile originated case.

If you can find a way to translate the GSM bursts into audio tones (AM

demodulate), it's interesting to hear the difference between the channel types as a

call is set up. A good way to do this is to use a GSM phone near an old TV set or

a conventional wired phone. The interference created in these devices amounts to

AM demodulation.

The RACH burst can be heard as a single 'Tick' sound. It's quickly followed by

the SDCCH 'Tat, Tat-tat-tat, tat-tat-tat ...'. After a few seconds, the TCH is

connected 'Buzzzzzzzzz'

Page 110: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

110

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 110

BTS BSC

LR’s

PSTNMS MSC

OMCPaging RequestPaging Request

Immediate Assign to DCCHImmediate Assign to DCCH

Asynchronous ModeAsynchronous Mode

Unnumbered AcknowledgeUnnumbered Acknowledge

SetSet--up Indicationup Indication

Authentication RequestAuthentication Request

Authentication ResponseAuthentication Response

Cipher Mode CompleteCipher Mode Complete

Cipher ModeCipher Mode

Channel Request (RACH)Channel Request (RACH)

Mobile Terminated Call (1)Mobile Terminated Call (1)

Here is the mobile terminated call procedure in two parts.

Page 111: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

111

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 111

BTS BSC

LR’s

PSTNMS MSC

OMCOMCCall Set UpCall Set Up

AlertingAlerting

Assign CommandAssign Command

Assign CompleteAssign Complete

Call ConnectCall Connect

Connect AcknowledgeConnect Acknowledge

SpeechSpeech

Call ConfirmedCall Confirmed

Mobile Terminated Call (2)Mobile Terminated Call (2)

Page 112: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

112

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 112

BSC newswitchpoint

BSC old

11

2244

55

77

88

**

00

33

66

99

##

11

22

44

55

77

88

**

00

33

66

99

##

Allocation and Allocation and

activation ofactivation ofradio channelradio channel

Release of PathRelease of Path

MS has accessed cell BMS has accessed cell B

HandHand--over requiredover required

End of path establish andEnd of path establish and

hand over command to MShand over command to MS

Start of path Start of path establishmentestablishment

HandHand--over command to MSover command to MS

Mobile HandoffMobile Handoff

We have covered mobile power on and call establishment, but there is one other

important area. During a call the mobile may have to change base stations. If the

call is between faces of the same base station, this is performed locally. The case

shown here is that where the base station is not the same.

The mobile reports its measurements and the serving BSC determines that it is

time to perform a handoff. It will contact the new base station and get the

information on the new channel and timeslot (along with midamble and timing

information) and send this to the mobile. It then commends the mobile to switch

base stations and then once the new call is established, close down the old link

and reallocate it to another user if necessary.

Page 113: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

113

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 113

What is GPRS?What is GPRS?

9.6

19.2

56

128

GSM IS-95 CDMA Analog Modem ISDN

9.6

57.6

160

384

GSM HSCSD GPRS EDGE

� 2G technologies were designed for mobile telephony

� Landline services have higher data rates than wireless counterparts

� Next step: mobile wireless data services

� GSM has distinctive approach

towards 3G

� Intermediate step refers to as 2.5 G

� Allows for smooth transition from

voice to data services

Page 114: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

114

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 114

What is GPRS?What is GPRS?�In voice networks, RF is the main limiting

factor. In data networks, RF and many other factors will affect the performance for individual users

�Fixed network infrastructure performance

�Types of applications and service provision

�Number of users active in an area

Page 115: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

115

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 115

What is GPRS? What is GPRS? -- Circuit Circuit vsvs Packet Packet

SwitchSwitch� 2G technologies are circuit

switched

� Dial-up type connections

� A single user occupies a channel for the entire transmission

� Requires time-oriented billing

� GSM transmissions are bursty

� Bursty nature favors data services

� GPRS is packet switched

technology

� More appropriate for data

services

� Continuous flow is not required

� Access is based on demand

only

� Several users can be

multiplexed

Page 116: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

116

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 116

What is GPRS? What is GPRS? -- Types of Data Types of Data

ServicesServices

9.6

128

1500

SMS WWW Audio Video

128

� Most popular data applications include:

• E-mail

• Web browsing

• File transfers

• Real time audio

• Streaming video

� Different services have different throughput requirements

� GSM evolution is expected to provide services at throughputs similar to their landline counterparts

Page 117: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

117

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 117

What is GPRS? What is GPRS? -- A 2.5 G A 2.5 G

SolutionSolution

GPRS - General Packet Radio ServicePDN - Packet Data NetworkLAN - Local Area NetworkWWW - World Wide Web

Laptop computer

PALM DEVICE

PDNGPRS

Other GPRSNetworks

AirInterface

FTP

File

Transfer

Video

Multimedia

WWW

E-MAIL

LAN

�GPRS is a 2.5 G solution implemented over existing GSM network

�Theoretical data rates are up to 171.2 kbps

�GPRS makes a more efficient use of the air interface

�Supports point-to-point and point-to-multipoint transmissions

�GPRS will take over short message service (SMS) from GSM signaling channels

�New QoS parameters:

• Precedence

• Reliability

Page 118: 346sentation lkaa m noter[1])mars.tekkom.dk/pdf/GSM_lkaa.pdf3 GSM Fundamentals 10001633-GSM Fund.ppt Rev 5/16/00 © Copyright 1997, 2000 Agilent Technologies All Rights Reserved GSM

118

GSM Fundamentals

10001633-GSM Fund.ppt

Rev 5/16/00

© Copyright 1997, 2000 Agilent Technologies

All Rights Reserved

GSM Fundamentals

10001633-GSM Fund.ppt

Page 118

What is GPRS? What is GPRS? -- Important Important

ChallengesChallenges� There are several hardware and software

limitations that will decrease the expected data rates significantly

� Mobile data will impose a demand for more IP addresses. The existing version of IP is already reaching saturation

� The idea that the market will accept mobile data service with eagerness is still somewhat questionable

� The 3G standards are already being finalized and implementation will follow shortly after 2.5 G