Sunteți pe pagina 1din 110

Overview

Due to cellular system subscriber becomes fully mobile


Cellular system links mobile subscribers to PSTN or another
cellular system’s MS subscriber
It eliminates need for fixed wiring. Radio communication is used
between MS and cellular system
The difference between cellular & PSTN is the radio link that
connects the subscriber to switch via base station.
Radio is an electromagnetic phenomenon in which energy
travels in waves.
Cellular frequencies are primarily reliant on direct waves (they
do not bounce off the earth’s ionosphere as does short waves).
But they are subjected to refraction(bend through atmosphere),
diffraction(bend around obstructions) and reflections(bounce off
obstructions).
Advantages of Cellular Communication

There are many advantages to


Network provider
Mobile subscriber
Advantages to Mobile Subscriber
Mobility – international access, one number,
the network handles localization.
Flexibility of using same handset in other
networks.
Convenience of billing.
Connection (PSTN,PSPDN,CDMA,WAP etc).
Advanced features like SMS, VMS and all
ISDN features.
Advantages to Network Provider
Network Expansion Flexibility – choice of vendors results in
competition in both technology and price.
Revenue/Profit Margins – No cable laying and maintenance.
Connectivity to multiple networks and advanced features tempts
subscribers.
Less noisy compared to analog systems.
Efficiency – high call success rate, better spectrum utilization,
high subscriber concentration compared to analog system.
Easier re-configuration – expansion and cell coverage based on
subscriber growth is easier.
The real gem of GSM is MAP and its flexibility. This coupled with
SIM tool kit will allow service providers far more flexibility than
any thing current offered in any technology.
Disadvantages of GSM
No end to end encryption of user data.
No full ISDN BW of 64 kbps to the user
in Phase 2 GSM.
Electromagnetic radiation.
Abuse of private data possible
Roaming profiles accessible
High Complexity of system – over 5000
pages of recs.
Frequency Spectrum
GSM is Frequency and Time division system. Each physical
channel is characterized by a carrier frequency and a time slot
number.
GSM system frequencies include 900 MHz, 1800 MHz and 1900
MHz bands commonly referred to as GSM900, DCS1800 and PCS
1900 systems respectively.
Primary band in GSM is 900 system – 124 radio carriers have
been defined and assigned in two sub bands of 25 MHz each in
the 890 – 915 MHz and 935 – 960 MHz rages with channel
widths of 200 Khz.
Each carrier is divided into frames of 8 timeslots for speech at
full rate.
In practice, signalling and messaging may reduce the overall
number from eight to six or seven calls.
Frequency Spectrum
Each MS is connected to cellular networks by
the radio interface when required.
Using statistics it has been found that a
typical RF carrier can support upto 15 to 25
MSs. Obviously not all these MS subscribers
could make call at the same time. MSs share
the same physical resources at different
times.
Cell Size
Cell Size depends on
No. of MS subscribers
Geographic layout of the area like hills,
lakes, buildings etc.
Cells can be broadly divided into
Large cells
Small Cells.
Large Cells
Maximum Cell size for GSM is
approximately 70 Km in diameter.
Large cells are employed in
Remote areas
Coastal regions
Areas with few subscribers
Large areas which need to be covered with
minimum number of cell sites.
Small Cells
Supports large number of MSs in a small
geographic region.
Typical uses of small cells
Urban areas
Low transmission power required
High number of MSs.
Large cells are preferred when installation
and maintenance cost are important.
The geographic layout determines the type of
cells to be used. This leads to a mixture of
large and small cells in the network.
Frequency Reuse
Standard PGSM has a total of 124 frequencies
for use in a network.
Operator gets a small subset of 124.
Operator has to use this subset in his entire
network. So, in frequency planning frequency
reuse pattern is taken into account.
Frequency reuse depends on how close cells
are placed and nature of area to be covered.
Densely populated City – high frequency reuse,
small cells, high capacity
Sparsely Populated City – large omni cells, low
reuse, low capacity.
Frequency Reuse
Frequency Reuse and cell method suffer
from two interference
Co – channel Interference: When RF
carriers of same frequency are transmitting
in close proximity to each other one RF
carrier interferes with other RF carrier.
Adjacent Channel Interference: When an
RF source of a nearby frequency interferes
with the RF carrier.
Sectorization
Omni directional Cell: A single transmitting
antenna radiates the radio waves to 360
degrees.
As number of subscribers increases more and
more cells need to be defined. This leads to
close frequency reuse. This leads to co-
channel and adjacent channel interference.
To gain increase in capacity in the
geographical area we can employ
“sectorization”.
Each cell uses special directional antennas to
ensure the radio propagation from one cell is
concentrated in a particular direction.
Advantages of Sectorization.
All the energy from the cell is now
concentrated in a small area 60, 120,
180 degrees instead of 360 degrees, we
get much stronger signal.
We can use the same frequencies in a
much closer re – use pattern, thus
allowing more cells in our region which
allows more MSs.
Noise Robust
Analog systems provide excellent audio quality but vulnerable to
noise.
Sources of Noise:
Powerful nearby external source – vehical ignition system or
lightning bolt
Another transmission on the same frequency – co channel
interference
Another transmission “breaking through” from a near by
frequency – adjacent channel interference
Background radio noise intruding because the required
signal is too weak to exclude it.
GSM air interface in harsh RF environments can produce a
usable signal.
Handovers
Quality (uplink and downlink)
Interference (uplink and downlink)
RF level (uplink and downlink)
MS distance
Power budget
GSM subscriber features
Call forwarding Calling line ID
unconditional (CFU) restriction(CLIR)
Call forwarding Connected line ID
busy(CFB) presentation(COLP)
Call forwarding no reply Connected line id
(CFNRy) restriction(COLR)
Call forwarding not Call waiting (CW)
reachable(CFNRc) Multiparty
Calling line id service(MPTY)
presentation (CLIP) Call hold (CH)
GSM subscriber features
Barring all outgoing calls (BAOC)
Barring all incoming calls (BAIC)
Barring all incoming calls while roaming
(BAIC –Roam)
Barring all outgoing international
calls(BOIC)
GSM SUBSCRIBER FEATURES
Alternate Speech and Data: In co-ordination
with the MSC, changing from speech to data
and data to speech is provided by the in-call
modification procedure.
The BSS inter works with MSC at call
establishment and during call in-call
modification procedure is used to determine
appropriate channel coding function.
In-call modification provides a method to
change between user data rates or between
speech and data services during a call.
GSM Identities
Mobile Station ISDN Number (MSISDN)
MSISDN = CC + NDC + SN (15 digits)
• CC – Country Code
• NDC – National Destination Code
• SN – Subscriber Number
Mobile Station Roaming Number (MSRN)
• MSRN = CC + NDC + SN
GSM Identities
International Mobile Subscriber Identity
(IMSI) ( 16 digits).
IMSI = MCC + MNC + MSIN.
• MCC – Mobile Country Code. (3 digits).
• MNC – Mobile Network Code. (1-3 digits).
• MSIN – Mobile Station Identification Number.
Temporary Mobile Subscriber Identity
(TMSI) : Structure is determined by
operator.
GSM Identities
International Mobile Equipment Identity
(IMEI)
IMEI = TAC + FAC + SNR + SVN
• TAC – Type Approval Code (6 digits)
• FAC – Final Assembly Code(2 digits)
• SNR – Serial Number(6 digits)
• SVN – Software Version Number (2 digits)
GSM Identities
Location Area Identity (LAI)
LAI = MCC + MNC + LAC
• MCC – Mobile Country Code (3 digits)
• MNC – Mobile Network Code(1-3 digits)
• LAC – Location Area Code (16 bits)
Cell Global Identity (CGI)
• CGI = MCC + MNC + LAC + CI
• CI – Cell Identity ( 16 bits)
Network Components
GSM networks composed of
Network Subsystem (NSS)
• Mobile switching center (MSC)
• Visitor location register (VLR)
• Home location register (HLR)
• Authentication center (AUC)
• Equipment identity register (EIR)
Base station system (BSS)
• Transcoder (XCDR)
• Base station controller (BSC)
• Base tranceiver station (BTS)
Operations and Maintenance Center
• Network Management Center (NMS)
• Operations and Maintenance Center(OMC)
Information in the classmark
Mobile types have distinct features which
must be known to network for e.g. maximum
power of mobile. The ME is identified by
means of “classmark”.
Revision Level: Phase of the GSM spec
RF Power Capability: Maximum power. This info is
in mobile power class no.
Ciphering Alg: A5/0 to A5/7
Frequency Capability: Frequency band
SMS
Information stored in SIM
1. IMSI
2. A3
3. A8
4. Ki
5. PIN
6. LAI
7. CI
8. Access Control Class
9. Ciphering Key (Kc)
10. TMSI
11. Additional GSM Services
12. Forbidden PLMN
Base Station System (BSS)
It consists of digital and RF equipment
BSS provides link between the MS and MSC
BSS consists of
BTS (Base Transceiver Station):
• Provides air interface for a cell.
• Provides communication with MS.
• Antenna is part of it.
BSC (Base Station Controller):
• Provides control for the BSS.
• BSC communicates with MSC.
• BSC controls multiple BTSs.
XCDR (transcoder):
• Reduce the rate at which traffic is transmitted over the
air interface.
• Placed close to MSC.
Functions of MSC
Provides announcements and tones
Routing and Charging
Interworking with other networks
Switching
Mobility management of subscribers
Clock synchronization with PSTN
Functions of HLR
Subscriber Management
Subscriber Database Maintenance
VLR address
Supplementary Services, Basic services
Authentication data
Functions of VLR
Contains copy of active subscriber data
Tracks location of MS
Performs authentication and IMEI check
Provides TMSI
Verifies validity of service requested by
MS
Functions of EIR
Checks IMEI through the following lists
Back List
Grey List
White List
Functions of AUC
Maintains Subscriber Authentication
data
Generates Triplets (RAND, SRES and Kc)
A3,A8 and A5 algorithms
Authentication:
Authentication Check:
RAND
(128 bit
Random no.) SRES from VLR = SRES from MS
Ki
A3 SRES
(32 bit signed
Response)

Ciphering:
Kc

RAND Data A5 Ciphered


data

Ki
A8 Kc Hyper
64 bit ciphering Frame
key Number
Authentication in GSM
Ki is never transmitted over the radio
channel
Calculation of the signed response is
processed within the SIM
Computation of Kc takes place internally
within the SIM
Functions of MS
Mobility Management: Location update,
authentication, encryption etc.
Radio Resource Management – Management
of radio connection including connection
establishment, control and release and
changes (h/o).
Call Control and Supplementary Services:
supports the management of supplementary
services.
SMS: Transfer and management of SMS.
OSI Layers
Relationship between OSI and Protocols
MTP (Message Transfer Part)
MTP Level1:Defines physical and electrical
characteristics of the C7 networks. Defined
physical interfaces are E1, T1, V35.
MTP Level2: Ensures the two end points of
signalling link can reliably exchange signalling
messages – error checking, flow control and
sequence checking.
MTP Level3: Node addressing, routing,
alternate routing and congestion control.
MAP (Mobile Application Part)
Information transfer between GSM PLMN
entities uses the MAP.
It uses the service of the transaction
capabilities application part(TCAP) of SS7.
Major procedures supported by MAP
Location Registration and cancellation
Handover Procedures
Handling supplementary services
Retrieval of subscriber parameters during call
setup
Authentication Procedures.
BSSAP(BSS Application Part)
BSSAP is divided into
DTAP (Direct Transfer Application Part)
BSSMAP (BSS management application
part).
DTAP is used to transfer layer 3
messages between MS and MSC.
BSSMAP is responsible for all aspects of
radio resource handling at the BSS.
SCCP (Signalling Connection Control Part)

It is layer 3 protocol and provides network connectivity.


It provides C7 the capability to address applications within a
signalling point.
MTP can only receive and deliver messages from a node as a
whole; it does not deal with software applications with in a
node. SCCP allows these subsystems to be addressed explicitly.
Ability to perform incremental routing using Global title
translation (GTT).
GTT relieves the Originating station from the burden of having
to know every potential destination to which it might have to
route a message.
SCCP(Signalling Connection Control Part)
SCCP can operate in four modes. Two modes are used in GSM
Connectionless Protocol Class0: Single message modes are
used for GSM e.g. unit data (UDT).
Connection-Oriented Protocol Class 2: A signalling
connection is established before messages are sent. The
following message types must be passed through this
connection
CR (connection request); CC (connection confirm);
CREF (connection refused); DT1 (Data Form1); IT (inactivity
test)
Once the communication is complete the link must be
release. The following SCCP message types are used
to release the connection
RLSD – released
RLC – release complete
TCAP (Transaction Capabilities Application Part)

Defines the messages and protocol used to


communicate between applications deployed
as susbsystems in nodes.
It is used for database services.
Since TCAP messages must be delivered to
individual applications with in the nodes,
TCAP uses SCCP for transport.
TCAP supports the exchange of non circuit
related data between applications across SS7
network using SCCP CL services.
TCAP carries MAP messages sent between
mobile switches and databases to support
user authentication, equipment identification
and roaming.
X.25
X.25 specifies standards for the bottom layers
of OSI model.
Layer1: Physical Layer: Used traditionally on
leased lines. E.g E1 or RS 232 or V.35.
Layer2: Data Link Layer: Provides error free
link between two connected devices. It is also
responsible for the packet format. It is split
into two separate procedufres
LAP (Link Access Procedure) Based on
Asynchronous Response Mode
LAPB (Link access Procedure Balanced) It makes
possible for communicating parties to operate in
an autonomous balanced mode in which neither is
considered as master or slave.
X.25
Layer3: It is called packet level in X.25. It is
concerned with network routing functions and
multiplexing of simultaneous logical
connections over a single physical connection.
The layer protocol provides a statistical
multiplexing technique through the use of
multiple logical connections across a physical
link.
The possible logical (virtual) connections are:
1. SVC (Switched Virtual Circuit) 2.
PVC(Permanent Virtual Circuit).
GSM Functional Layers
Layer 1: Physical
TDMA Frame Structuring
Frequency Hopping
Layer 2: Transport
Multiplexing and Demultiplexing of logical
channels
Traffic control
Signalling
Synchronization
GSM Functional Layers
Layer3: Management
Radio Resource Management
• Paging, Cipher Mode Set,
• Assignments, Handover, MR
Mobility Management
• Authentication, Location Updating, IMSI attach/dettach,
Periodic Registration
Call Management
• Control, Supplementary services
• SMS
MS to MSC signalling model
MS and MSC signalling Model
CM and MM are not interpreted by the BSS
but are transferred using DTAP which are
transparent to BSS.
RR messages are passed between BTS and
MS and some messages are forwarded to
BSC.
BTSM (BTSM management) contains
procedures for handling above messages and
other procedures for managing the BTS-BSC
link.
MTP serves as transport system for reliable
transfer of messages.
User function of SCCP is BSSAP, which uses
one signalling connection per active MS.
Signalling Link Protocol
RSL (BTS & BSC): LAPD
MTL (BSC & MSC): C7 (MTP-SCCP)
OML (OMCR & BSC/XCDR): X.25 LAPB
XBL (RXCDR & BSC): LAPD
CBL (CBC & BSC): X.25 LAPB
Network Protocols
Physical and Logical Channels
Physical Channel: Medium over which
the information is carried.
Logical Channel: Information carried
over the physical channel.
GSM Physical Channel: RF carrier –
supports eight MS subscribers.
GMSK (Gaussian Minimum Shift Keying)

It is noise robust, enabling the use of tighter


frequency re-use patterns and minimizing
interference problems.
It incorporates error correction, thus
protecting the traffic that it carries.
It offers greatly enhanced privacy to
subscribers and security to network providers.
It is ISDN compatible, uses open
standardized interfaces and offers an
enhanced range of services to its subscribers.
TDMA/FDMA
In FDMA technique, a frequency is assigned to a user. So, we
require a large number of frequency which is not practically
possible.
TDMA allows several users to share the same channel. Each of
the users sharing the common channel are assigned their own
burst within a group of bursts. These group of bursts is called a
frame.
TDMA is used with FDMA.
The maximum bandwidth available 25mhz is divided into 125
carrier frequencies spaced 200khz.
First carrier frequency is used as guard band between GSM and
other services.
Each of these carriers are then divided in time using TDMA.
The fundamental unit of time in TDMA is burst period and is
equal to 15/26 ms.
Eight such bursts form a TDMA frame (120/26ms) which forms
the basic unit for the definition of logical channels.
GSM Logical Channels
Two groups of logical channels
Traffic channels
Control Channels
Types of Traffic Channels
TCH/FS: Speech (13kbps net, 22.8kbps gross)
TCH/EFR: Speech (12.2 kbps net, 22.8kbps gross)
TCH/9.6: Data 9.6 kbps
TCH/4.8: Data 4.8 kbps
TCH/2.4: Data 2.4 kbps
TCH/HS: Speech (6.5 kbps, 11.4 kbps gross)
Types of Control Channels
Broadcast Control Channel (BCCH)
Common Control Channel (CCCH)
Dedicated Control Channel (DCCH)
BCCH Group
BCCH (Broadcast Control Channel):
Information about the network
SCH (Synchronizing Channel): Frame
synchronization
FCCH (Frequency Control Channel):
Carrier synchronization
CCCH Group
RACH (Random Access Channel): To gain
access to network by MS.
PGH (Paging Channel): System calls MS.
AGCH (Access Grant Channel): System
assigns resources to MS such as SDCCH.
CBCH (Cell Broadcast Channel): System
broadcast messages to all MSs in a cell like
traffic information.
Broadcast Control Channel (BCCH)
It is transmitted by BTS at all times.
RF carrier is used to transmit the BCCH is referred to as BCCH
carrier.
BCCH carrier is transmitted at constant power all times.
Location area identity (LAI).
List of neighboring cells which should be monitored by the MS.
List of frequencies used in the cell.
Cell identity.
Power control indicator.
DTX permitted.
Access control (for example, emergency calls, call barring).
CBCH description.
DCCH Group
SDCCH (Standalone Dedicated Control
Channel): Supports the transfer of data
to and from MS during call set and
validation.
ACCH(Associated Control Channel).
SACCH (Slow Associated Control Channel):
Measurement reports & power control.
FACCH(Fast Associated Control Channel):
Pass event type messages like handovers.
Frequency Correction Channel (FCCH)

It is transmitted frequently on the BCCH timeslot and allows the


mobile to synchronize its own frequency to that of the
transmitted base site.

Since FCCH is transmitted only on TS0 on BCCH carrier


frequency and it is used as a flag to the mobile to identify TS0.
Synchronization Channel (SCH)
It carries the information to enable MS to synchronize to the
TDMA frame structure and know the timing of the individual
timeslots.

The following parameters are sent.


Frame Number.
Base Site Identity Code (BSIC).
Points to remember
MS will monitor BCCH information from
surrounding cells and store information
from the best six cells.
SCH information on these cells is also
stored so that the MS may quickly
resynchronize when it enter a new cell.
CCCH Group
Transfers control information between MS and
BTS.
Used for call organization and paging.
RACH: Used by MS to gain access to the
system. E.g. to respond to a page.
PCH: Used by BTS to page MS. Paging can be
performed by IMSI, TMSI or IMEI.
AGCH: Used by BTS to assign a DCCH to a
MS in response to an access message.
CBCH: Used by BTS to transmit information to
all MSs in a cell.
DCCH Group
It is bi- directional.
DCCH on a single timeslot on RF carrier
is used to convey eight SDCCHs.
SDCCH: Used by MS for call setup,
authentication, location updating and
SMS point to point.
SDCCH can be found on BCCH/CCCH
TS. This allows only four SDCCHs.
ACCH
These channels can be associated with
either SDCCH or TCH.
Carry information associated with the
process being carried out on SDCCH or
TCH.
Two types:
SACCH.
FACCH.
ACCH
SDCCH:
DL(Downlink).
• Power Control.
• Timing Information.
UL(Uplink).
• Receive Signal Strength (RSSI).
• Quality Report.
FACCH:
Transmitted instead of TCH.
Handover and Immediate assignment.
GSM Logical Channels
Logical Channels

Control Channels (CCH) Traffic Channels (TCH)


DL NB NB NB

BCCH DCCH (BI) CCCH (BI) DATA SPEECH DCCH

NB/DB AB NB
UL DL SA FA
BCCH Sync Ch SDCCH ACCH RACH CBCH TCH/9.6 TCH/FS CCH CCH
NB TCH/2.4 TCH/HS
SB FB TCH/4.8 TCH/EFR
PCH/AGCH
SCH FCCH FACCH SACCH DL
Channel Combinations
All control Channels are required for system
operation.
Conversation, Data, Control channels share
timeslots on RF carrier at different times
efficiently without wasting capacity.
Hence different logical channels are combined
and that results in various channel
combinations.
Combined.
Non Combined.
CHANNEL COMBINATIONS
Full rate traffic channel combinations – TCH8/FACCH
+SACCH.
Broadcast channel combinations – BCCH +CCCH.
Dedicated channel combinations – SDCCH8 +
SACCH8.
Combined channel combinations- BCCH +
CCCH+SDCCH4+SACCH4.
Half rate traffic channel combinations-TCH16/FACCH
+ SACCH.
TIMESLOT ALLOTMENT

Channel Combination Timeslots

Traffic Any Timeslot

Broadcast 0,2,4,6, (0 must be used first)*

Dedicated Any timeslot

Combined 0 only

* if broadcast is assigned to timeslots 2,4 or 6 then FCCH and SCH will be replaced with dummy bursts since these control channels may only
occur on timeslot0.
APPLICATIONS

Combined BCCH/CCCH/DCCH frames are used in low capacity


cells.
Noncombined frames are used in higher capacity cells.
Multiframes
On TDMA eight timeslots share eight
timeslots on a single physical RF carrier.
The physical channel is shared by number of
logical channels.
For this purpose TDMA frames are grouped
and is called multiframe.
There are three types of multiframes:
26-frame TCH MF.
51-frame Control Channel MF – Non Combined.
51-frame Control Channel MF - Combined.
26 – Frame Traffic MF
The 12th frame in the 26 – frame traffic
is used by SACCH.
This MF consists of.
12 frames of traffic.
1 frame of SACCH.
12 frames of Traffic.
1 Idle frame.
The Duration of MF is 120ms.
51 – Frame Control Channel MF Non Combined

TS0 of all 51 frames carry either BCCH or


CCCH.
UL: Timeslots 0 of all 51 frames is allocated
to RACH.
DL: TS0 of first frame: FCCH (F)
TS0 of second frame:SCH (S)
TS0 of 2 – 5 frames: BCCH (B)
TS0 of 6 – 9 frames:CCCH(PCH or AGCH)
The TS0 of 50th frame is idle.
51 frame CC MF DCCH/8 (NC)
It may be transmitted on any timeslot.
It takes two repetitions of 51 MF to complete
entire sequence – logically 102 frame
structure.
SD will has an SACCH like TCH.
SD repeats every 51 frames
SACCH repeats every 102 frames.
DL and UL channels are staggered in order to
give mobile to process the received message
and formulate a response.
51 frame Control Channel MF - Combined

On TS0 of every frame contains all Control


Channel types – BCCH,CCCH and DCCH.
It is possible only 3 CCCH groups and 4
SDCCH groups – fewer pages and fewer call
attempts :supports less number of subs.
Suitable for rural areas.
Duration of any type of 51 frame is
235.365ms.
Combined and Non Combined frames
Non Combined Combined
On TS0 – FCH, SCH, On TS0 – FCH, SCH,
BCCH,9 blocks CCCH BCCH, 4 Blocks of
(PCH & AGCH) SDCCH and 3 blocks
On other TS – 8 SD of CCCH
Superframes
1 Superframe = 1326 frames
= 51 frames X 26
= 26 frames X 51
= 6.12 sec.
Timing of TCH MF is always moving in
relation to that of the CC MF and this enables
MS to receive and Decode BCCH information
from surrounding cells
Hyperframes
1 hyperframe = 2048 superframes
It lasts for 3 hr 28 min 760ms
It used with ciphering and frequency
hopping
After one hyperframe ciphering and
frequency hopping algorithms are
restarted.
Mobile Activity
MS transmits and receives in its allocated
physical channel – 1/8 of the time.
Remaining time it monitors neighbor cell’s
BCCH.
If completes this process every 480 ms or
four 26 TCH.
On SACCH – UL: RSSI, Quality for serving and
6 neighbors.
Mobile completes one series of measurement
and sends the previous measurement to BSS
in one cycle.
GSM BURSTS
Each carrier frequency is divided into 8
independent timeslots.
The information contained in one of the
timeslots is called burst in TDMA.
TS = 0.577ms
Burst = 0.546 ms
The difference 0.31ms is there to
enable burst to hit the timeslot.
Types of Bursts
Five different types of bursts
Normal Burst (NB)
Frequency Correction Burst (FB)
Synchronization Burst (SB)
Access Burst (AB)
Dummy Burst
Information in the burst is always shorter
than the timeslot
Except the AB, all bursts are the same length.
Bursts
Flag bits are set when frame is stolen
by FACCH.
The receiver’s equalizer uses training
sequence as it estimates the transfer
characteristic of the physical path
between BSS and MS
From the Speech Source to Radio Waves and Vice Versa
Channel Coding
Block Coding: Provides error detection and
correction.
Convolution Coding: Provides protection.
Convolution coder multiplies the original
information so that the receiver has a better
chance of filling any gaps that may result
from transmission problems. ½ Convolutional
code generates two bits of information from
each original bit.
Data interleaving maximizes the effectiveness
of coding.
Error Protection and Detection
Coding Schemes are used to protect
logical channels from transmission
errors.
Coding and Interleaving schemes
depend on the type of logical channel
All logical channels require some form
of convolutional encoding at different
code rates
Coding Protection Schemes
Speech Channel Encoding: 20ms speech
block is divided over eight GSM bursts.
Common Control Channel Encoding:
20ms information is divided into 4
bursts
Data channel Encoding: The data
information is spread over 22 bursts.
Speech Channel Encoding
Transcoded information from BSC is received
in frames each containing 260 bits.
Speech bits are divided into 3 classes
Class 1a: 50 bits (intelligible bits) if there are
errors the whole block is ignored. Parity checked
and subjected to Convolutinal Encoder
Class 1b: 132 bits No parity checking. Subjected
to Convolutional Encoder. 4 Tail bits are added to
enable registers in receiver to a known state for
decoding purposes.
Class 2: 78 least significant bits and not protected.
Channel Coding for EFR
20ms Speech frames = 244 bits
In preliminary stage 16 bits are added
16 bits = (CRC generated from 50 Class
1a bits and15 most imp bits from Class
1b) + (8 repetition bits corresponding
to 4 selected bits in original EFR frame
of 244 bits).
Control Channel Encoding
Applied to all logical signalling channels.
It is applied to SCH and RACH but with
different numbers
20ms information = 184 bits
Fire code of 40 parity bits are added to these
bits.
4 tail bits(to set receiver registers) are added
to it
The resultant is applied to convolutional
coding.
Data Channel Encoding
Different data rates are encoded at
different rates.
Encoded with convolutional encoder.
Convolution Code - data
Three variables: n,k, K.
n=2,k=1 and K=5.
Ratio of convolution code R = ½.
Input to convolution code = 244.
The o/p of convolution code = 488.
488 bits are punctured to produce a block of
456 bits.
The punctured bits are determined c(11+15j)
j=0,1,2,……31.
Diagonal Interleaving - Speech
Speech block after encoding contains 456
bits.
456 bits block is divided into eight blocks
each containing 57 bits.
Each block will only contain bits from even bit
positions or from odd bit positions.
First four blocks will be placed in even bit
positions of the first four bursts.
The last blocks will be placed in the odd bit
positions of the next four bursts.
Each burst is shared by two speech blocks
Diagonal Interleaving - speech
Distribution of 456 bits
Distribution Burst
0 8 16 24 32 40 ..........................448 even bits of burst N
1 9 17 25 33 41 ..........................449 even bits of burst N + 1
2 10 18 26 34 42 ..........................450 even bits of burst N + 2
3 11 19 27 35 43 ..........................451 even bits of burst N + 3
4 12 20 28 36 44 ..........................452 odd bits of burst N + 4
5 13 21 29 37 45 ..........................453 odd bits of burst N + 5
6 14 22 30 38 46 ..........................454 odd bits of burst N + 6
7 15 23 31 39 47 ..........................455 odd bits of burst N + 7
Rectangular Interleaving - Control
456 bit block is divided into 4 blocks of
114 bits.
Each block will contain bits for even or
odd bit positions.
4 blocks will be transmitted in four
consecutive TDMA frames.
Control data is not diagonally
interleaved
Diagonal Interleaving - data
456 bit block is divided into 4 blocks of 114
bits.
First 6 bits from the first block are placed in
the first burst.
The 6 bits from second block will be placed in
the second burst so on.
Each 114 bit block is spread over 19 bursts.
Total 456 block will be spread across 22
bursts.
Transmission Timing
The timing between BSS and MS is 3 TS
MS will be instructed by BSS to advance the
transmission ahead to compensate for the
propagation delay.
This advance is superimposed on offset
Timing advance info is given to MS by
SACCH.
Maximum timing advance is 233micro sec. Or
63 bit periods for maximum distance of
35KM.
Battery Life
Battery power is saved by
Power Control
Voice Activity Detection (VAD)
Discontinuous Transmission (DTX)
Discontinuous Reception (DRX)
Power Control
Power output from MS can be adjusted
according to the distance between MS and
BTS.
Both UL and DL power settings can be
controlled independently.
Initial power setting for the MS is given in
BCCH info.
UL power is monitored by BSS and BTS power
is monitored by MS and reports to BSS
Voice Activity Detection (VAD)
VAD detects presence or absence of
speech.
Speech pattern silences are encoded at
500 bit/s rather than 13 kbps.
Comfort noise is generated in receiver.

S-ar putea să vă placă și