25513738 speech transmission
Post on 05-Apr-2018
218 Views
Preview:
TRANSCRIPT
-
7/31/2019 25513738 Speech Transmission
1/17
CONTENTS
SPEECH TO RADIO TRANSMISSION
CHANNEL CODING INTERLEAVING
BURST FORMATTING
CIPHERING
MODULATION
-
7/31/2019 25513738 Speech Transmission
2/17
SPEECH TRANSMISSIONSpeech
Source
decoding
Channeldecoding
De-interleaving
Burst deformatting
Deciphering
Demodulation
equalization
Speech
Digitizing and
source coding
Channel
coding
Modulation
Ciphering
Burst formatting
Interleaving
Step 1
Step 2
Step 3
Step 4
Transmission
Step 5
Step 6 Diversity
-
7/31/2019 25513738 Speech Transmission
3/17
SPEECH TRANSMISSION
From speech to Radio Transmission, several operations are performed,main operations are the following:
DIGITIZING-SPEECH CODING
CHANNEL CODING
INTERLEAVING
BURST FORMATTING
CIPHERING
MODULATION
DIGITIZING SPEECH CODING: The GSM Speech Coderis based on the ResiduallyExcited Linear Predictive Coder[RELP], which is enhanced by a LongTerm Predictor [LTP]. The
coder provides 260 bits for each 20ms blocks of speech, whichyields a bit rate of 13kbps.
-
7/31/2019 25513738 Speech Transmission
4/17
CHANNEL CODING
CHANNEL CODING: The output bits of the speech coder
are ordered in to groups for error protection, based upon theirsignificance in contributing to speech quality.Out of the total260bits the most important 50bits, called type Ia bits, have 3parity check [CRC] bits added to them.The next 132 bits along
with 53 are re-ordered by four trailing bits thus providing a totalof 189bits. This block is then encoded for error protection usinga convolutional encoder providing a sequence of378bits.The least important 78 bits do not have any error
protection and are added to the existing sequence of378 bits toform a block of456bits in a 20ms frame.The error protectioncoding scheme increases the Gross Rate of GSM Speech signal,
with channel coding to 22.8kbps.
-
7/31/2019 25513738 Speech Transmission
5/17
INTERLEAVING
INTERLEAVING: In order to minimize the effect of sudden
fades on the received data, the total of 456 encoded bits withineach 20ms speech frame are broken into eight 57bit sub-blocks.These 8 sub-blocks which make up a single speech frame arespread over eight consecutive TCH timeslots. If a burst is lostdue to interference or fading, channel coding ensures that
enough bits will still be received correctly to allow the errorcorrection to work. Each TCH time slot carries two 57bit blocksof data from two different 20ms [456bits] speech segments.
-
7/31/2019 25513738 Speech Transmission
6/17
INTERLEAVING
C
20 ms20 ms
A
A8
A7
A6
A5
B4
B3
B2
B1
B8
B7
B6
B5
C4
C3
C2
C1
57 bits
Information
1 1
CRL CRL
3 3
Tail Tail
26 bits
Training
8 Bursts
8 Sub blocks
of 57 bits
Source coding
Channel coding
Interleaving
Normalburst
20 ms
B
456 bitsA
456 bitsB
456 bitsC
57 bits
Information
A8B4
A7B3
A6B2
A5B1
B8C4
B7C3
B6C2
B5C1
Speech blocks
260 bits 260 bits260 bits
-
7/31/2019 25513738 Speech Transmission
7/17
INTERLEAVING
0 1 2 3 4 5 6 7 8 ... ... 452 453 454 455
0 1 2 3 4 5 6 78 9 10 11 12 13 14 15
448 449 450 451 452 453 454 455
57Rows
Divide 456 bits in 8 sub-blocks
765432107654 0 1 2 3
reordering&
partitioningout
diagonal
interleaving
456coded bits
burst
b0 b1 b56 b1 b56b0
bitinterleaving
-
7/31/2019 25513738 Speech Transmission
8/17
BURST FORMATTING
BURST FORMATTING: A basic unit of measure intransmission on a radio path is BURST. A series of 114 modulatedbits of information.Bursts have a finite duration and occupy a finitepart of the radio spectrum.Bursts are sent in time and frequencywindows called slots.A normal burst is made of:
Tail Bits Three 0 bits at the beginning and end to help avoid lossof synchronization.
Information Speech, Data or Signaling two blocks of 57bits.
Training Sequence A list of bits [26] known by the receiverallowing it to demodulate the burst.
Stealing Flags Indicate if information is either users data orsignaling data for call in state [2 in total].
Guard Band Bits [8.25] where nothing is transmitted to allow foroverlap due to the variable distance from the mobile phone to BaseStation. This is necessary if the Timing Advance is not exactly right.
Normal Burst bears traffic channels, its associated channels [Fast orSlow], Standalone and the Broadcast Control Channels.
-
7/31/2019 25513738 Speech Transmission
9/17
BURST FORMATTING
Guard
157 126 57
156.25 bits
0.577 ms
1 frame:
4.615 ms
0 1 2 3 4 5 6 7
33 8.25
S SDATA DATAGuard
BandTraining
sequence
Burst
148 bits
-
7/31/2019 25513738 Speech Transmission
10/17
BURST FORMATS
A FrequencyCorrection Burst contains 142 bits for the frequencycorrection and 3 tail bits at the beginning and end. This burst in
used on the FCCH in order to enable the mobile to find anddemodulate a synchronization burst in same cell. No information is
transmitted in this burst as all bits are 0.
A Synchronization Burst contains 64 bits for the training sequence,twice 39 for the information & 3 tail bits at the beginning and end.It is used in downlink direction, for time synchronization of themobile station. It has larger training sequence when compared withother bursts as this is the first burst mobile needs to be able to
demodulate.
-
7/31/2019 25513738 Speech Transmission
11/17
Synchronization Burst
(SCH)
Tail Data Extended Training Sequence Data Tail
156.25 bits (0.577 ms)
3 bits 39 encrypted bits 64 synchronization bits 39 bits 3 bits 8.25 bits
Guard
Period
Frequency Correction Burst
(FCCH)
Tail Data Tail
156.25 bits (0.577 ms)
3 bits 142 fixed bits (0) 3 bits 8.25 bits
Guard
Period
BURST FORMATS
-
7/31/2019 25513738 Speech Transmission
12/17
BURST FORMATS
A DummyBurst structure is similar to the Normal Burst but
information bits are replaced by mixed bits: this burst is used toreplace data if there is nothing to transmit. It is the case of TCHfilling when they are transmitted on beacon frequency.
An Access Burst contains 41bits for the training sequence, 36 bits
for the information 8 and 3 tail bits at respectively the beginningand the end of the burst. The Guard Period is of 68.25bits. It isused on RACH, in the uplink direction during initial phase of
transmission when the propagation delay between the mobile
station and the BTS is not yet known.
-
7/31/2019 25513738 Speech Transmission
13/17
Access Burst
TailTraining
Sequence Guard PeriodTail
156.25 bits (0.577 ms)
8 bits 36 encrypted bits 68.25 bits3 bits41 synch bits
Data
Dummy Burst
Tail Dummy Sequence Training Sequence Dummy SequenceTail
3 bits 58 mixed bits 28 midamble bits 58 mixed bits 3 bits 8.25 bits
GuardPeriod
156.25 bits (0.577 ms)
156.25 bits (0.577 ms)
13 bits 57 encrypted bits 1 26 bits 57 encrypted bits 3 bits 8.25 bits
Tail Data Training Sequence Data Tail Guard
Period
BURST FORMATS
-
7/31/2019 25513738 Speech Transmission
14/17
CIPHERING
Ciphering or encryption, is a procedure that provides additionalsecurity for the subscriber. Ciphering is only done on two Data
segments of Normal Burst. Ciphering is achieved by performingan XOR function between a psuedo random bit sequence and
the 114 useful bits of a Normal Burst.
De-ciphering in turn applies the same operation, since XORtwice with the same data leads back to the original value.
GSM uses two A5 types of algorithm for Ciphering:
Encryption Algorithm A5/1 which contains European
and US technical software that could not directly orindirectly exported to any country.
Encryption Algorithm A5/2 which contains softwarethat do not require license or approval.
-
7/31/2019 25513738 Speech Transmission
15/17
CIPHERING
Plain data: 0 1 1 1 0 0 1 0.....
Ciphering sequence: 0 0 0 1 1 0 1 0.....
XOR:Ciphered data (transmitted): 0 1 1 0 1 0 0 0.....
Ciphered sequence: 0 0 0 1 1 0 1 0.....
XOR:
Recovered data: 0 1 1 1 0 0 1 0.....
Data S S DataBurst to be
transmitted
Data S S DataTrainingsequence
Receivedburst
-
7/31/2019 25513738 Speech Transmission
16/17
MODULATION
Modulation transforms the binary signal into an analog signalusingGaussian Minimum Shift Keying [GMSK].
The modulation scheme used by GSM is 0.3GMSK, where 0.3describes the 3dB bandwidth of the Gaussian pulse ShapingFilter with relation to the bit rate. GMSK is a special type ofdigital FM modulation. The MSK modulated signal is passedthrough a Gaussian Filter to smooth the rapid frequencytransitions which would otherwise spread energy into adjacentcells.
Reason for GMSK chosen for modulation and transmission ofGSM Signal is that it filters the side bands and consequentlyhelps in reducing Adjacent Channel Interference.
-
7/31/2019 25513738 Speech Transmission
17/17
THANK YOU!
top related