gsm intro
TRANSCRIPT
ROOT 2 technology
© ROOT 2 technology Limited 2001
Introduction to GS
M
This document is provided for training purposes only. Every effort has been made toensure this document is as complete and as accurate as possible, but no warranty orfitness is implied.
Root 2 Technology Limited has neither liability nor responsibility for any loss or damagescaused to any person or entity arising from the information contained in this document.
Root 2 Technology and the Root 2 Logo are trademarks of Root 2 Technology Limited,all other trademarks are property of their respective owners
This document is copyright protected and must not be copied, reprinted or reproducedby any means mechanical, electrical or electronic or stored in any electronic retrievalsystem without the express written permission of the copyright holders Root 2Technology Limited.
ROOT 2 technology
© ROOT 2 technology Limited 2001
Introduction to GS
M
Course Aim
The aim of this course is to provide the delegate with an understanding of thefunctionality and operation of a GSM Network. To explore interconnections betweenMobile and Fixed network, studying signalling and al call establishment procedures.
ROOT 2 technology
© ROOT 2 technology Limited 2001
Introduction to GS
M
Course ObjectivesOn completion of this course of instruction the delegate will have gained anunderstanding of: -
In Module 1 - An Introduction to GSM Features
In Module 2 - The GSM Network
In Module 3 - GSM Terrestrial Interfaces
In Module 4 - The Radio Air Interface
In Module 5 - Air Interface Optimisation
In Module 6 - Call and Handover Proceedures
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Module Objectives
On completion of this module of instruction the delegate will have gained anunderstanding of: -
• Discuss the history surrounding the birth of GSM• Explore the reasons for using Cellular Networks• List the GSM Cell structures • Explain the GSM Frequency spectrums• Discuss why Frequency reuse is adopted• Define Interference occurring within GSM Networks• Explore the reasons for using Cell sectorisation• Compare the Noise differences with Analogue and Digital sources• List the reasons for using TDMA• Identify what Security GSM adopts• Discuss the Services available with GSM
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
The Birth of GSM
When the acronym GSM was first used in 1982, it stood for ‘Groupe Speciale Mobile’,a committee under the umbrella of Conference Europeenne des Postes etTelecommunications (CEPT), the European standardization organisation.
The task of GSM was to define a new standard for mobile communications around thefrequency range of 900MHz using digital technology. In the course of time, CEPTevolved into a new organisation called, the European Telecommunications StandardInstitute (ETSI), however, this did not alter the task of GSM. The goal of GSM was toreplace the existing analogue purely national networks, already overloaded, and thusexpensive technologies of the member countries with an international standard.
In 1991, the first GSM systems were ready and brought into so-called ‘friendlyoperation’. During the same year the acronym GSM was changed with focus to the
BSS
MS
BSS
MS
BSS
MS
BSS
MS
BSS
MS
MS
BSS
PSTNMSC
(Public switched telephone network)
(Mobile service switching centre)
(Base station system)
MS (Mobile station)
(Cell coverage area)
1. The liberalisation of the monopoly of telecommunications in Europe during the1990’s and the resulting competition, which consequently lead to lower prices.
2. The knowledge base and professional approach within the Groupe Speciale Mobile,together with the active cooperation of the industry;
3. The lack of competition; For example, in the United States and Japan, competitivestandards for mobile services started being defined only after GSM had already beenestablished.
GSM also offered additional advantages over the existing analogue networks for bothsubscribers and network operators. It gave subscribers mobility, flexibility andconvenience, whilst giving operators the flexibility of network expansion, increasedrevenue/profit margins, efficiency and easier re-configuration of networks if required.These areas will be discussed later in the course.
GSM networks comprise of three main components, the Mobile services SwitchingCentres (MSC), Base Station Systems (BSS) and the phone itself known as a MobileStation (MS). There are other network elements that will be discussed later.
international standard beingcalled, Global System forMobile Communications. Theyear 1991 also saw thedefinition of the firstderivative of GSM, the DigitalCellular System 1800 (DCS1800), translating the GSMsystem into the 1800 MHzfrequency range. By 1992,many European countrieshad operational networks,with GSM starting to attract aworldwide interest. Thefollowing factors were majorcontributors to the success ofGSM:
Page 6 of 6
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Cellular Technology
The GSM network is a ‘Cellular Network’, meaning that the network comprises of manyhundreds of cells. A Cell covers an area in which an MS communicates with the network. If theMS for whatever reason is not located within a cell, then no communication is possible and theMS cannot make or receive calls. You may have seen this when you have no signal on yourown MS. Cells are provided by the BSS and are controlled by a Base Station Controller (BSC).The BSS contains one BSC and multiple cells, depending on network configuration, planningand the surrounding terrain. Each cell in turn is controlled by a Base Transceiver Station (BTS),which relays information to the controlling element of the BSS, the BSC. The cells are normallydrawn as hexagonal, but in practice they are irregularly shaped, this is as a result of theinfluence of the surrounding terrain, or of design by the network planners.The number of cellsin any given geographical area is determined by the total number of MS subscribers whomoperate within that given area, allowing also for roaming of additional MS subscribers in andout of that given area and the physical layout of the area (hills, forests, buildings etc).
The maximum cell size for GSM isapproximately 70 km in diameterdependant though on the terrain overwhich the cell will cover and otherfactors such as the power of the MS andthe number of MS subscribers. In GSM,the maximum power that an MStransmits is approx 8 Watts, many thoughtransmit at much lower power levels suchas 1 Watt. Power will be discussed lateras health and safety issues have becomea major issue regarding radiationtransmission. The higher the power, thelarger the cell size. For example, if a cellsite was placed on the top of a hill, withno obstruction, then the radio waves willtravel much further than that of a cell sitein the middle of a city, with high-risebuildings causing obstructions. Generally large cells are employed in the following areas:
1. Remote areas. 2. Coastal regions. 3. Areas with few MS subscribers.
Smaller cells are used where there is a requirement to support a large number of MSsubscribers, in a small geographical region, or where a low transmission power is required toreduce the possible effects of interference. Small cells cover areas of approximately 200 m andupwards. Typical uses of small cells being:
1. Urban areas. 2. TX power requirements. 3. High number of MS subscribers.
There is no correct answer for cell choice when configuring a GSM network. Network providerswould like to use large Macro type cells to reduce installation and maintenance costs, but realisethat this would restrict MS subscriber access and quality of the service that they could offer.Terrain, transmission power, size of coverage area all have to be taken into account whenplanning cell size, along with one other key element to the network, that of ‘FrequencyAllocation’. All of these factors inevitably lead to the network being configured with a mixtureof both large and small cells.
Page 7 of 7
BTS
TRXBTS
TRX
BTS
TRX
BTS
TRX
BTS
TRXBTS
TRX
BTS
TRX
300 m - 70 km
Terms that you may have heard ofreferring to cell size, Macro for large cells,
Micro and Pico for smaller cells.
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Frequency Allocation
The frequency spectrum is extremely congested, with only narrow slots within the totalspectrum being allocated for cellular communications. The list below shows the numberof frequencies and total spectrum allocated to GSM, Extended GSM 900 (EGSM),GSM 1800 (Digital Communications System 1800) and PCS 1900 (PersonalCommunications System).
The GSM spectrum is split into Radio Frequency (RF) carriers half allocated totransmission ‘Uplink’ and the others receiving ‘Downlink’. GSM being a ‘Duplex’network (having the ability to transmit and receive information simultaneously) has tohave a frequency allocated in both the uplink and downlink to achieve this.These uplinkand downlink frequencies are linked together forming a pair and are given the nameAbsolute Radio Frequency Channel Number (ARFCN). This pairing gives GSM itsduplex operation.
870
915
935
960892
937
100K
100K
892 Freq.
100K
100K
937 Freq.45 MHz
Up link
Down link
GSM 900 MHzspectrum
GSM 900Uplink 890 - 915 MHzDownlink 935 - 960 MHz
EGSMUplink 880 - 915 MHzDownlink 925 - 960 MHz
GSM 1800 (DCS 1800)Uplink 1850 - 1910 MHzDownlink 1930 - 1990 MHz
For successful duplex operation within GSM, the uplink and downlink frequencies haveto be separated by a specific range, dependant on the frequencies used. If thisseparation is not present, duplex operation will fail due to interference problemsincurred over the air interface from other frequencies. Frequency separation can beseen below. For each cell in a GSM network at least one ARFCN must be allocated,more can be allocated by the network to increase capacity to the network, increasingthe number of subscribers. The RF carrier is divided into eight Time Division MultipleAccess (TDMA) timeslots, allowing each RF carrier the capability of supporting up toeight simultaneous telephone calls. Later in the course we will see that althoughpossible, network signalling and messaging is required, therefore reducing the overallnumber of timeslots per RF carrier to six or seven and reducing the number ofsimultaneous calls possible. Unlink the PSTN network, where every telephone isconnected via a pair of fixed wires on a permanent basis, the MS only connects to thenetwork over the air interface when required and it is possible to have a single RFcarrier supporting many more mobile stations than its eights available timeslots. It ispossible for a single RF carrier to support around twenty mobile stations, obviouslythough not all of these mobile subscribes could make a call at the same time.Therefore without the MS actually knowing, it shares the same physical resources ofthe network with other mobile stations, but at different times.
Page 8 of 8
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Frequency Re-useOne of the limitations with GSM is the actual number of ARFCN that are allocated toindividual networks. The entire GSM spectrum has to be allocated between alloperators within a country i.e. within the United Kingdom the spectrum is split betweenfour main operators Vodafone, BT Cellnet, Orange and One2One. In addition, withincreased subscribers requiring access operators have to adopt two key features ofimplementation in order to elevate these problems, those being Frequency Re-use andCell Sectorization.
The cells that we have talked about so far are known as ‘Omni-directional Cells’. Thisis a cell site that typically has one antenna and is allocated a single ARFCN. It coversa large geographical area with limited access to subscribers. One antenna requires anARFCN, so the more antennas that a site has, the more ARFCN required.
3 / 9 Configuration
4 / 12 Configuration
Co-Channel Interference occurs when RF carriers of the same frequency are transmitting inclose proximity to each other, the transmission from one RF carrier interferes with the othercarrier.
Adjacent Channel Interference occurs when the RF source of a nearby frequency interfereswith the RF carrier.
To gain an increase of capacity within the geographical area we employ a technique called‘Sectorization’. Sectorization divides single cells into a number of cells, with each cell havingits own allocated ARFCN and acting independently. Each cell uses directional antennas as tonot interfere with its neighbours. Sectorization has advantages:
Firstly, we now concentrate all of the antennas energy into a smaller area 60, 120 or 180degrees rather than 360 degrees, increasing signal strength which is beneficial for built up areasand ‘in building’ coverage.
Secondly, as the cells are focused covering a much smaller geographical area, it allows us toimplement a much closer frequency re-use pattern, allowing greater capacity access forsubscribers.
When planning the frequency re-use pattern the network planner must take into account howoften to use the same frequencies whilst determining the size of each individual cell. If theplanner miss calculates either of these co-channel or adjacent channel interference may occur.
The problem with employing omni-directional cells throughout the wholeof the network, is that when thenumber of MS increases in the samegeographical area, the operator has toincrease the number of cells to caterfor the increased requirement oftraffic. To increase the number of cellswithin a given geographical areaincreases the risk of interference. Aswe make omni-directional cellssmaller and increase the numberused, we introduce Co-Channel andAdjacent Channel Interference, bothdegrading the networks performance.
Page 9 of 9
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Cell Sectorization
For GSM each carrier has a separation of 200 KHz, so adopting re-use as to notinterfere with surrounding sells a separation of 400 KHz minimum must be used. Anexample of this is shown. GSM specifications state that for optimum performance aseparation of 800 KHz should be used. Unfortunately, due to the number of ARFCNthat an operator is allocated it is extremely difficult to implement using 800 KHz andtypically you will only find spacing of around 400 KHz.
For GSM each carrier has a separation of 200 KHz, so adopting re-use as to notinterfere with surrounding sells a separation of 400 KHz minimum must be used. Anexample of this is shown. GSM specifications state that for optimum performance aseparation of 800 KHz should be used. Unfortunately, due to the number of ARFCNthat an operator is allocated it is extremely difficult to implement using 800 KHz andtypically you will only find spacing of around 400 KHz.
When planning the frequency re-use pattern, the network planner must take intoaccount how often to use the same frequencies whilst determining the size of eachindividual cell. If the planner miss calculates either of these co-channel or adjacentchannel interference may occur. In GSM each carrier has a separation of 200 KHz,
360 degree cells
120 degree cells
Site
Site
Cell
CellCell 60 degree cells
Site
CellCell
Cell
CellCell
Cell
Omni Cell Site1 Transmit/ReceiveAntenna
3 Cell Site3 Transmit/ReceiveAntenna
6 Cell Site6 Transmit/ReceiveAntenna
Variations in cellconfigurations
lead to increasedsubscribercapacity,
increased re-usepatterns and the
geographical sizeof cell coverage
areas.
so adopting re-use as to not interfere with surrounding sells a separation of 400 KHzminimum must be used. An example of this is shown. GSM specifications state that foroptimum performance a separation of 800 KHz should be used. Unfortunately, due tothe number of ARFCN that an operator is allocated it is extremely difficult to implementusing 800 KHz and typically you will only find spacing of around 400 KHz.
The diagram above illustrates how, by sectoring a site we can fit more cells into thesame geographical area, therefore increasing the number of MS subscribers that cangain access. The sectorization of sites typically occurs in densely populated areas, orwhere there is a high demand of mobile subscribers, such as residential or businessareas.
Page 10 of 10
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Flexibility and Compatibility
Cellular communications networks provide both the subscriber and network manyadvantages over a standard telephone network. There are though still drawbacks.
Compatibility
The rapid deployment of early analogue cellular networks during the early 80’s resultedin many different types of networks being incompatible with one another. Therequirement for a common standard between mobile communications networks wastherefore obvious, and an executive body GSM, was set up to co-ordinate thecomplicated task for standardization of mobile communications networks. Through thisstandardization, GSM networks have grown throughout many European countries, inco-operation with one another, along with other countries around the world. Anadditional advantage on offer to networks being, manufactures produce equipment
Noise Interference
Although analogue radio signals give an excellent form of communication, they areextremely vulnerable to noise interference; an example being your home radio. Noiseinterference is produced by.
A powerful or nearby source (a vehicle ignition system, a lightning bolt).
Another transmission system (co-channel or adjacent interference).
House hold appliances (kettle, television etc).
Background radio noise (because the required signal is too weak for transmission).
To combat noise, GSM communicates to the network using Digital waveforms.
By using digital waveforms, we have the ability to include sophisticated error correctionand detection software, giving digital signals the ability to withstand more errorsincurred from noise as they are transmitted across the air interface.
Due to digital transmission over the GSM air interface, the operator can provide ausable signal in harsh RF environments, where analogue systems would fail. It alsoleads to improved frequency re-use patterns, increasing a networks subscriber accesscapability.
of higher quality, all being compatible withGSM networks, therefore producing acompetitive and aggressive pricing market.This in turn, results in lower pricingstructures for the MS subscriber and theoperators themselves.
Noise Robustness
With analogue mobile communicationssuch as Analogue/American Mobile PhoneService (AMPS), Total AccessCommunication Network (TACS) or NordicMobile Telephone Service (NMT), the MSused analogue waveforms (radio signals),to communicate between the network.
Page 11 of 11
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Increased Capacity
With the analogue air interface, every connection to the network required one RFcarrier. Old analogue systems typically used Frequency Division Multiple Access(FDMA) rather than Time Division Multiple Access (TDMA) in GSM. As we havealready discussed, TDMA has eight timeslots for transmission, where FDMA has onlyone, limiting control and more importantly, the number of subscribers that cansimultaneously access the network. FDMA networks required a greater number ofequipments, per cell, if capacity of the network was to increase. This made networkexpansion expensive and time consuming as many sites had to be configured and re-tuned manually, making the analogue system extremely inflexible. GSM equipmenthowever, overcomes many of these issues due to it being controlled primarily by itssoftware. The reconfiguration of the network can be implemented quickly, withminimum manually intervention, and by using TDMA, expansion can be implemented
with less equipment. In addition, GSM has standardised interfaces between networkcomponents, such as Signalling System No.7 (C7). Therefore, along with the radioequipment, upgrades to the entire network can be implemented with minimumdisruption, time delay and cost.
A key feature of GSM is that it offers the flexibility of International Roaming. Thispermits the MS subscriber to travel to foreign countries with GSM networks, and usetheir phones as if they were at home. If chosen too, a subscriber can choose only totake their Subscriber Identity Module (SIM) that we will discuss later, and hire a phonewhilst travelling abroad.
GSM’s use of a digital air interface makes it more resilient to interference thanhistorical analogue interfaces. It allows users on the same frequency or nearbyfrequencies to be co-located in closer geographical areas, decreasing the size of cells,making better use of ARFCN available within the re-use pattern. As GSM progresses,Multi-band networks and mobile phones now operate, operating within both frequencyspectrums of 900 MHz and 1800 MHz/1900 MHz. In order for this the mobile must becapable of working in dual band mode, to the user however this is transparent. Multi-band operation, allows the network greater flexibility in planning as it increases thenumber of frequencies available for the re-use pattern. It reduces interference andconsiderably increases the networks available or potential MS subscriber capacity.
Page 12 of 12
IncreasedCapacity“FDMA
requires up toeight times the
equipmentsthan that of a
TDMAnetwork”.
FDMATDMA
Timeslots
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Security and Services
Security was a major problem encountered with analogue networks. In some networks,it was virtually non-existent and the unscrupulous were quick to recognise this. It wasestimated that in some of the earliest networks, 20% of phone calls were stolen.Extensive measures have been taken within GSM to substantially increase securityfrom both theft of calls and theft of the physical phone itself. With GSM, both themobile phone equipment and the subscriber are identified, using separate identities,the mobile phone equipment being, International Mobile Equipment Identity (IMEI) andthe subscriber, International Mobile Subscriber Identity (IMSI). Both of these identitiesare stored within the network and will be discussed later in the course. In addition tothese identities, the GSM air interface supports Frequency Hopping; a process wherethe MS transmits on a different frequency each time it communicates with the network,making it extremely difficult for a hacker to listen to a specific call. Although frequencyhopping is used as an aid to security, it is also employed to optimise networkperformance, to counter interference aiding to cell quality and capacity.GSM offers anenhanced range of services compared to those available with analogue networks,ranging from data transmission options, fax and a wide range of supplementaryoptions. When services were specified for GSM, current land PSTN services had to betaken into consideration, with the services made available based upon three factors:
The level of service provided by the network.
The level of service purchased by the subscriber.
The capabilities of the subscriber’s mobile equipment.
Speech services involve the transmission of speech information making up the basicservice that a network would offer.
Telephony provides normal MS originated / terminated voice calls.
Short Message Service (SMS) provides the transmission of an acknowledged shortmessage from a service centre to the MS.
Short Message Cell Broadcast provides the transmission of a short message to allMS within a cell area.
Data services provide the ability to transmit text files, images, messages and fax overthe GSM network. Data rates available range from 2.4 kbit/s, 4.8 kbit/s, 9.6 kbit/s and14.4 kbit/s.
In addition to supporting data transmission, GSM provides Group 3 Fax transmission.
Supplementary services are additional services to a basic telecommunicationsservice, where an operator will charge extra for use of them.
Number Identification the receiving party requests that the number be shown.
Call Barring where incoming or outgoing calls can be barred.
Call Forwarding where calls can be forwarded to another number if the MS does notanswer, as an example.
Multi-party provisions for conference calling.
Page 13 of 13
ROOT 2 technology
© ROOT 2 technology Limited 2001
An Introduction to G
SM
Features
Key PointsFlexibility and Compatibility
Subscriber - Mobility, Flexibility, Convenience.
Network Provider - Network Expansion Flexibility, Revenue/Profit margins, Efficiencyand easier to Re-Configure.
Cellular Technology
Large cells are employed in the following areas:
1. Remote areas. 2. Coastal regions. 3. Areas with few MS subscribers.
Typical uses of small cells being:
1. Urban areas. 2. TX power requirements. 3. High number of MS subscribers.
Increased Capacity
The RF carrier is divided into eight Time Division Multiple Access (TDMA) timeslots,allowing each RF carrier the capability of supporting up to eight simultaneoustelephone calls.
Uplink and downlink frequencies are linked together forming a pair and are given thename Absolute Radio Frequency Channel Number (ARFCN).
To combat noise, GSM communicates to the network using Digital waveforms.
Frequency Allocation
GSM 900 Uplink 890 - 915 MHz (124 ARFCN available)
Downlink 935 - 960 MHz
EGSM 900 Uplink 880 - 915 MHa (174 ARFCN available)
Downlink 925 - 960MHz
GSM 1800 Uplink 1850 - 1910 MHz (374 ARFCN available)
Downlink 1930 - 1990 MHz
Frequencies separated with 200 KHz spacing both uplink and downlink.
Page 14 of 14
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Module Objectives
On completion of this module of instruction the delegate will have gained anunderstanding of: -
• Identify the GSM Network Configuration• Discuss the functions of the Mobile Station• List Mobile Station configurations• Explore the characteristics of the SIM• Explain the operation of the BSS• Discuss the functions of the BTS• List BTS configurations• Discuss the functions of the BSC• Discuss the functions of the XCDR• Explain the operation of the NSS• Explain the operation of the MSC• Discuss the functions of the HLR• Discuss the functions of the VLR• Identify the requirements for GSM Network Databases
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Network Configuration
As already discussed, the GSM network comprises of many different components(illustrated below), all being part of two core systems, the Network Switching System(NSS), to which the Operations and Maintenance System is interfaced, and the BaseStation Subsystem (BSS). The illustration shows only one occurrence of eachcomponent, but in reality, the network will consist of multiple components. Thecomponent groups being.
The Mobile Station (MS) – consisting of the Mobile Equipment (ME) and theSubscriber Identity Module (SIM).
The Base Station Subsystem (BSS) – provides the radio air interface between theMS and the network.
The Network Switching System (NSS) – consisting of the Mobile Switching Centre(MSC) and associated system control elements. Here interconnections between othernetworks such as the PSTN are controlled.
The Operations and Maintenance System – enables the network the ability tocontrol, configure and maintain the network from a central location.
NMC
OMC
PSTN
MSC
VLRHLR
AUC
EIR
IWF
EC
Operations& maintenancesystem
NetworkSwitchingSystem
XCDR
ME
SIM
BSC
BTS
BaseStationSystem
MobileStationInterface/connection
Typical GSMNetwork
Architectureconsisting of the
two coresystems, the
NetworkSwitching
System (NSS)and Base Station
Subsystem(BSS).
Each network component communicates over an Interface, being specified by GSMstandards, enabling a network the flexibility to use multi-vendor equipments (not beingrestricted to one product manufacturer).
Page 16 of 16
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
The Mobile Station (MS)
The Mobile Station (MS) consists of two separate components, the Mobile Equipment(ME) and an electronic smart card known as the Subscriber Identity Module (SIM)card. The ME is the physical hardware, the phone that the subscriber uses to accessthe network. This hardware has an identity number associated to it, unique to everymobile phone, called the International Mobile Equipment Identity (IMEI), enablingthe network to identify individual ME’s. The SIM card interfaces directly with the ME (itis not limited to one ME therefore being transferable between different ME’s). Thismodule identifies the mobile subscriber, identifying the services available to thatsubscriber, and again is a unique identity. This identity is called the InternationalMobile Subscriber Identity (IMSI). Regarding purchasing of these two components,the ME can be purchased from many stores, but the SIM has to be purchased directlyfrom, or an agent of the mobile network itself. By using these two separatecomponents, GSM has the flexibility of being able to raise a bill against the individualsubscriber using the IMSI, rather than the IMEI of the ME (remembering that any onecan use a ME, making it difficult to identify the individual subscriber making a call). TheME is the only component of the network that a subscriber is physically likely to see.There are three main types available to a subscriber.
Vehicle Mounted – these devices areinstalled within a vehicle and have theirantenna mounted to the outside of thevehicle.
Portable Mobile Unit – this equipmentmaybe hand held, but the unit uses anexternal antenna, not the antenna of thedevice itself.
Hand Portable Unit – the more commonlyused device, the everyday mobile phone.
Each ME is identified by a Class Mark, thatinforms the network of the ME’s maximumpower output, services it is able to supportand frequency capabilities. This information is transmitted to the network in the ME’sinitial message (when the ME is turned on). Class Mark information;
Revision – Identifies GSM phase specifications.
(GSM currently has progressed through three phases 1, 2 and presently 2+)
RF Power – The maximum power that the ME can transmit at.
(GSM handset power transmission ranges from 8 Watts through 5 Watts, 2 Watts and0.8 Watts)
Ciphering Algorithm (Security) – Indicates the type of algorithm that the ME uses.
(Phase 1 used only an A5 algorithm, with Phase 2 using A5/0 – A5/7 algorithms)
Frequency – Phase 2 and 2+ have the ability of transmitting in all GSM frequencyranges.
Short Messaging (SMS) – Phase 2 onward provides SMS for subscribers.
Page 17 of 17
1006
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Subscriber Identity Module (SIM)
As previously mentioned, the SIM smart card interfaces directly into the ME giving anindividual subscriber their unique identity. The SIM contains several identities utilisedby the network for billing, locating and controlling the MS.
The International Mobile Subscriber Identity (IMSI) – the unique identifier of anindividual subscriber. Only ever transmitted to the network when the phone is initialised(turned on) or on request by the network.
The Temporary Mobile Subscriber Identity (TMSI) – an identity allocated to thesubscriber by the network on initialisation. This identity is used in replacement to theIMSI for added security and is changed periodically by the network.
Location Area Identity (LAI) – an identity allocated to a BSS, used by the network forpaging purposes (locating the whereabouts of the MS).
Subscriber Authentication Key (Ki) – used by the network during the authenticationprocess (registration on a network), and added security of transmission over the airinterface.
IMSI
Ki
MSISDN
TMSI
LAI
SERVICES
SIM
IMEI
The Mobile Station International Services Digital Network number (MSISDN) – theactually mobile telephone number, comprising of a Country Code, Network Code andStation Code e.g. 0044 773 675432.
Most information held on the SIM is protected, some information though inconstantlyupdated by the network, the LAI for example. As the MS roams throughout the networkthis identity will change, therefore being updated. The SIM itself has been designedwith high degrees of added security, some being imposed by the user in allocating apassword Personal Identity Number (PIN), similar to a pin code with a credit card. TheSIM card can also store addition information such as charging records if the operatormakes the services available. It also is responsible for algorithm calculations during theauthentication process.
Page 18 of 18
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Base Station Subsystem (BSS)
The Base Station Subsystem (BSS) is the GSM system that provides and controls thephysical radio air interface (communication between the MS and the NSS). It consistsof three major network components.
The Base Transceiver Station (BTS) – this provides the physical radio air interfaceconnection between the MS and the GSM network.
The Base Station Controller (BSC) – the BSC is the controlling element of a BSS. Itcontrols all BTS that are present within a BSS, therefore controlling the air interfaceeven though it does not physically provide the connection to the MS.
The Transcoder (XCDR) – is used to reduce the rate at which traffic (voice/data) istransmitted across the air interface and will be discussed later in the course.
Transcoder
BaseStation
Site
MobileStation
SwitchingSubSystem
SIM
BaseStation
Controller
2Mbt x n
2Mbt x n
Base StationSubSystem“Normally the
size of a BTS isdefined by thenumber of RFcarriers, someof the largerones having
upto 24carriers”
The BSC provides the control for the BSS with functions being:
Controls all BTS within the BSS.
Switches traffic and signalling information between BTS and the NSS.
Connects Terrestrial Circuits and channels on the air interface.
Controls handover performed by the BTS under its control.
Any operational information required by the BTS will be forwarded under the control ofthe BSC, likewise information required by the NSS about/from the BTS will be obtainedby the BSC. The BSC connects radio channels from the air interface, to terrestrialcircuits between the BSS and the MSC via the use of a Digital Switching Matrix. It alsouses this matrix to perform handover between the BTS under its control withoutinvolving the MSC. Handover will be covered later in greater depth. The BTS providesthe following functions of the BSS.
Channel Coding / Decoding.
Timing advance, dependant on the MS location within the given geographical area.
Measurement reporting.
Power control, paging, frequency hopping, traffic channel management and encryptionare also functions of the BTS/BSC.
Page 19 of 19
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
BSS Configurations
The maximum number of BTS that a BSC can control is not specified within GSM, butindividual specifications of manufacturer’s equipment do vary.
The BTS maybe located at the same site as a BSC being ‘Co-located’, or located at adifferent site, ‘Remote’. It is common to find most BTS remotely configured due mainlyto their being a larger number of BTS within the network compared too BSC.
A BSS is configured using various topologies, Daisy chaining, Hub Spoke and Loopbeing a few.
The Daisy Chain – a BTS need not communicate directly with its controlling BSC, butvia another BTS or chain of BTS equipment. Daisy chaining reduces the number ofconnections required within a network and is cheap to implement, but can lead totransmission delay through the BSS.
BSS
BTS
BTS
BTS
TRX
BTS
HUB & SPOKE
BSS
BTS
TRX
BTS
TRX
BTS
TRX
BTS
TRX DAISY CHAIN
LOOP
Topologies haveboth advantages
anddisadvantages
when used withinNetworks.
The Loop – these increase the redundancy of connectivity within a network as eachBTS has a least two paths for communicating to the BSC.
Hub Spoke – a method used when initially commissioning a network. This topologyreduces connections but decreases network redundancy, as a great deal of emphasisis place on the reliability of ‘hub’ elements.
Page 20 of 20
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Network Switching System (NSS)
The Network Switching System (NSS)controls the GSM network, carrying outthe physical switching functions,authentication procedures used forsecurity and overall Mobility Management(MM). Its main function is to managecommunications between the GSMnetwork and other telecommunicationsnetworks.The NSS comprises of manydifferent components, being;
Mobile Switching Centre (MSC)
Home Location Register (HLR)
Visitor Location Register (VLR)
Equipment Identity Register (EIR)
Authentication Centre (AUC)
Inter Working Function (IWF)
Echo Canceller (EC)
NMC
OMC
PSTN
(G)MSC
VLR
IWF
Operations& maintenance
system
NetworkSwitching
Sub system
HLR AUC
EIR
The Mobile Switching Centre (MSC)
The main function of the MSC is to provide all switching functions, the same as anytelephone network switch. However, because of the additional complications involvedin the control and security aspects of the GSM network and the wide range ofsubscriber features offered the MSC has to be capable of fulfilling many additionalfunctions.
The MSC carries out different functions depending upon its location within the GSMnetwork (as discussed earlier a GSM network will comprise of more than one MSC). Ifthe MSC provides an interface between the GSM network and the PSTN, it is knownas a Gateway Mobile Switching Centre (GMSC). Here additional network componentssuch as the EC and IWF are located providing speech and data connections betweenthe MS and adjoining networks. Both the IWF and EC can be considered as part of theMSC due to their functionality being required for switching.
The diagramshows a typicalNSSinterconnection.Note: - only oneof eachcomponent isshown where inreality, the GSMnetwork willhave multiplecomponents.
Page 21 of 21
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Home Location Register (HLR)
The MSC provides services for all MS located within a given geographical area. Itsprovides all switching required for mobile terminated and originating calls. One MSC iscapable of providing service cover for a region with approximately one millioninhabitants (not all will connect to the network simultaneously though).
Functions of the MSC are listed below.
Call Processing – includes control of voice/data call setup, inter-BSS and inter-MSChandover, and MM for all subscribers within its given geographical area.
Operation and Maintenance – management of databases and monitoring of trafficmeasurements for GSM operation centres.
Inter-working – manages interfaces between the GSM network and connectingnetworks such as the PSTN.
Billing – collects call billing data relating to MS terminated and originating calls.
Home Location Register (HLR)
The HLR is a database that containsreferences for mobile subscribers.Various identification numbers andaddresses are stored along withindividual authentication codes foreach mobile subscriber. Subscriberinformation is entered into thedatabase by the network providerupon subscriber registration, someinformation however, is dynamicallyallocated and updated continuouslyby the GSM network.
HLR information consists of:
Subscriber ID, IMSI and MSISDN
MS VLR location, Mobile Subscriber Roaming Number (MSRN)
MS Status, On or Off
Authentication Key and AUC functionality
Supplementary service information (Call forward number if activated)
Permitted supplementary services (International roaming)
The HLR is the master database for all subscribers to the GSM network, with databeing accessed by all MSC’s and VLR’s within the network. Due to the amount ofsubscriber data the GSM network often has more than one HLR, although there is onlyone mobile subscriber record per subscriber. Each HLR handles a portion of the datawith each subscriber being allocated to a specific HLR. The data is accessed by use ofeither the IMSI or MSISDN, allowing components of the home GSM network or othernetworks access to this information.
Page 22 of 22
HOMELOCATIONREGISTER
IMSIIMEIMOBILE STATUSTRIPLETSSERVICESMSRNMSISDN
SUBSCRIBERPROFILE
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Visitor Location Register (VLR)
Like the HLR the Visitor Location Register (VLR) is a database, but instead ofproviding permanent storage of data it only provides temporary storage. The dataexists for only as long as the MS is active within the given VLR area. It is thereforepossible that duplicate information can be present as well as the more precise datarelevant to a subscriber.
The VLR provides a local database for subscribers wherever they are geographicallylocated within the GSM network, whether being their home network or visiting network.The function of the VLR eliminates the requirement of constant communication with theHLR for subscriber references, reducing setup times and cost to the operator.
Additional data stored in the VLR:
Mobile status, busy/free/no answer etc
Location Area Identity (LAI)
Temporary Mobile Subscriber Identity (TMSI)
Mobile Station Roaming Number (MSRN)
Location Area Identity (LAI) – cells within the GSM network are grouped together intogeographical areas with each area being assigned an identity, a Location Area Identity,containing up to 30 cells. A VLR controls several LAI’s, so as a subscriber roams withinthe network the LAI will be updated within the VLR, therefore informing the network ofthe subscriber’s location. When required, the VLR address will be updated within theHLR.
Temporary Mobile Subscriber Identity (TMSI) – this identity is allocated by the VLRto use in replacement of the IMSI (by reducing the number of times that an IMSI istransmitted over the air interface, a GSM network increases a subscriber’s security).The TMSI is updated frequently, making it extremely difficult to trace calls, againproviding a high standard of security.
The TMSI is updated when:
During Call setup
On entry to a new LAI
On entry to a new VLR area
Mobile Station Roaming Number (MSRN) – this number is used for routing calls froman external network to an MS via the GMSC. The MSRN identifies the currentMSC/VLR area that a subscriber is connected too, therefore switching the call throughthe correct MSC. (Typically there will be a VLR co-located with each MSC within theGSM network, often being referred too as an MSC/VLR area.)
Page 23 of 23
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Security Databases
Equipment Identity Register
As we have already discussed each MS has two identities, one of which being theIMEI. The Equipment Identity Register (EIR) is a centralized database that stores theIMEI of all subscribers on the GSM Network. The database concentrates on thephysical ME, and not the subscriber whom may be using it to make or receive calls.The EIR database comprises of three database lists being a specific IMEI list or rangeof IMEI numbers.
White List – this contains IMEI numbers of ME’s that have been allocated to a validsubscriber, that have not been reported stolen nor refused network services.
Black List – contains a list of IMEI numbers that have been bared by other networks,reported stolen, or denied access for what reason to network services.
Grey List – this list contains IMEI numbers that do not fall into either of the other twocatogories. E.g. limited services, hardware problems or customer payment delays.
The Database is continuously updatedby network programmers and by thenetwork obtaining information from acentral database to which all networkscan be connected (not all networks areconnected though). EIR’s are remotelyaccessed by an MSC/VLR during theauthentication process. If the IMEInumber is found in the black list theassociated MS will not be permittedaccess to the network, or any othernetwork containing the same EIRdatabase information.
Authentication Centre
The Authentication Centre (AUC) is a processing database that provides the GSMNetwork with security keys for the authentication procedure called Triplets, and isgenerally co-located with the HLR, as it is continuously requested to produce newauthentication keys for mobile subscriber records. The authentication procedure will bediscussed later in the course.
Interworking Function
The Interworking Function (IWF) provides a GSM Network the capability of interfacingwith private or public data networks. It consists of a bank of modems that act as theGSM Data Communication Equipment (DCE), exchanging data with a Data TerminalEquipment (DTE), an MS in the GSM network. It has two main functions:
Data Rate Adaption – provides data rate conversions (increasing / decreasing dataspeeds) for access to / from the GSM Network.
Protocol Conversion – ensures the correct protocol (communication tool) is used.
Certain networks may require additional IWF functionality, dependant on the type ofnetwork too which it is connected.
Page 24 of 24
EQUIPMENTIDENTITY
REGISTER
IMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxx
WHITE LIST
IMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxx
BLACK LIST
IMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxxIMEI.xxx.xxx
GREY LIST
ROOT 2 technology
© ROOT 2 technology Limited 2001
The G
SM
Netw
ork
Module 2 Key Points
GSM Network Components
The Mobile Station (MS) – consisting of the Mobile Equipment (ME) and the SubscriberIdentity Module (SIM).
The Base Station Subsystem (BSS) – provides the radio air interface between the MSand the network.
The Network Switching System (NSS) – consisting of the Mobile Switching Centre(MSC) and associated system control elements. Here interconnections between othernetworks such as the PSTN are controlled.
The Operations and Maintenance System – enables the network the ability to control,configure and maintain the network from a central location.
SIM Card Identities
The International Mobile Subscriber Identity (IMSI)
The Temporary Mobile Subscriber Identity (TMSI)
Location Area Identity (LAI)
Subscriber Authentication Key (Ki)
The Mobile Station International Services Digital Network number (MSISDN)
BSS Components
The Base Transceiver Station (BTS)
The Base Station Controller (BSC)
The Transcoder (XCDR)
NSS Components
The Mobile Switching Centre (MSC)
Home Location Register (HLR)
Visitor Location Register (VLR)
Equipment Identity Register (EIR)
Authentication Centre (AUC)
Page 25 of 25
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
Module Objectives
On completion of this module of instruction the delegate will have gained anunderstanding of: -
• Explore the differing Terrestrial Interfaces used within GSM• Discuss PCM Theory• Explain the structure of a 2Mbit Trunk• List the reasons for using ITU-T CCS No.7 Signalling• Explain the uses of CCS No.7 Protocols• Discuss the Link Access D Channel Protocol• Explain why LAPDm is used accross the Um Interface• Explore transmission rates accross the various GSM Interconnections
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
Terrestrial Interfaces
The terrestrial interfaces comprise of all of the connections between the GSM networkcomponents, apart from the Um or air interface.
They are shown in the diagram below connecting the various components together.
The interfaces are the message transport mediums for GSM, all complying with ITU-Tspecifications (International Telecommunications Union - Telecoms). The use of thesestandards provides the flexibility that can be seen today within multi-platform GSMnetworks.
The terrestrial interfaces transport all of the messages throughout the system that arerequired to perform system functions.
Um - LAPDm Abis - LAPDA - BSSAP B - MAPC - MAP D - C7E - ISUP H - C7
D
F
H
OMC
VLR
EIR
AUC
MSC
BSC
HLR
BTS
UmAbis
A
B
C
They transport all data for software upand downloads, the collection ofstatistical information and messagesrequired for O&M operations(Maintenance and Control).
The standard interfaces used withinGSM are:
PCM 2 Mbit LinksSignalling System No.7 - (ITU-T SS7or CCS7)LAPD Protocol - Link AccessProtocol Data (D Channel)X.25 - (Packet Switch Data for OMCinterface)
Page 27 of 27
X.25Applications
X.25
LAPB
MTP (C7)
Abis
LAPD
2 Mbit Trunks
C7Applications
1
2
3
4 - 7
OSI LAYERS
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
2 Mbit/s PCM 30 Trunks
The 2 Mbit PCM 30 Trunk is the primary layer 1 transport medium used within GSM. Itcomplies too the international standard CCITT (ITU-T) Recommendation G.704;
“ Gives functional characteristics of interfaces associated with: Network Nodes andPCM Multiplexing equipment.”
G.704 is generally held to describe the frame structure and alignment of 2.048Mbit/sservices, however the recommendation also covers 1.544Mbit/s services and higherorder services. The recommendation also covers the codes for frame and multiframealignment, transmitted within Timeslot 0.
Then diagram below shows a breakdown of 2 Mbit Frame.
TS Use
0 Frame Alignment/Error Checking/Signalling1 - 15 Traffic Voice/Data16 Signalling17 - 31 Traffic Voice/Data
Frame Duration = 0.125ms
8 Bits
SignallingControlTS 0 TS 16
ITU-T G.704Frame Structure
The 2 Mbit Frame comprises of 32 Timeslots. Each Timeslot is 64Kbits in size,resulting in a total frame size of 2.048Mbits. Each 2 Mbit frame provides thirty channelsfor the transmission of speech, data or control information. The control information maycontain C7, LAPD or X.25 formatted information.
It is typical to find Timeslot 16 used for signalling information, but any timeslot can beused for this purpose. Some operators choose to use Timeslot 1 for signallingpurposes.
Timeslots are also referred to as D and B Channels (D Channel for signalling and BChannel for Traffic). If the 2Mbit frame is using C7 signalling, the D Channel cansupport signalling for 480 B Channels. If using Channel Associated Signalling (CAS),the D Channel can only support signalling for one frame (30 B Channels).
Page 28 of 28
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
C7 Signalling
The following message protocols are used to communicate between the different GSMcomponents.
For external connections, the MSC performs all call signalling functions by using theTelephone User Part (TUP), or for interfacing the ISDN, the ISDN User Part (ISUP).
Between the MSC and BSC, the Base Station System Management Application Part(BSSMAP) is used. The Direct Transfer Application Part (DTAP) is used to sendmessages between the MSC and the MS. The Mobile Application Part (MAP) is usedbetween the MSC and the VLR, EIR and HLR.
The diagram below shows the breakdown of how the C7 protocol stack is configured.
TUP
1
2
3
4
C7 LAYERS
MTP Level 3
MTP Level 2
MTP Level 1
2 Mbit Trunks
ISUP
MAP
TCAP
SCCP
BSSAP
Acronyms:
BSSAP - Base Station System Application PartBSSMAP - Base Station System Management Application PartDTAP - Direct Transfer Application PartISUP - ISDN User PartMAP - Mobile Application PartSCCP - Signalling Connection Control PartTUP - Telephone User PartTCAP - Transaction Capabilities Application Part
Page 29 of 29
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
Link Access Protocol D Channel
Because of the specific format of the signalling and control information being passedover the 2 Mbit links between the BSC and remotely sited BTS, a different type ofinterface is required. GSM uses Link Access Protocol D Channel for this operation.
The GSM specifications for the Abis interface are not completely standardised, as perITU-T G.704 for 2Mbit links. This unfortunately means that one manufactures range ofequipments will not necessarily work with another’s. As we have already discussed, thefunctionality of the BTS is governed by the BSC, generally leading to BSS selectioncomprising of a sole manufactures equipment range.
0 - 260 Octets
Address Control Information FCS
Flag Flag
SAPI TEI N(S) N(R)
SAPI N(S) N(R)
0 - 21 Octets
Address Control Information
LAPD
LAPDm
There is a limitation on the amount that can be transmitted across the air interface.With using the normal LAPD format 260 – 272 octets of information can be sent. Dueto the restrictions GSM uses the LAPDm format, having a maximum length of 23octets. The 23 octets formation is used for TCH’s and a 21 Octets format for SACCH.
The LAPDm format does not require flags as it uses the ‘already synchronised path’ airinterface. In addition it does not require a Frame Check Sequence (FCS). The ServiceAccess Point Identifier (SAPI) is used to identify the information being transmitted,Signalling or Short Message Services (SMS).
In short, 0 = Signalling information, 3 = SMS, 62 = O&M and 63 = Layer 2Management. (62 and 63 are dedicated for use by the BTS.)
N(S) related to the frame number being sent and N(R) corresponding to the nextexpected frame within the transmission sequence.
Page 30 of 30
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
Interconnections
The Interface between the BSC and MSC uses the standardised ITU-T CCS7interface, referred to as the A Interface.
The interface supports the following connections:
BSC - MSC, BSC - BTS and MSC - MS
Operations and Maintenance Interface
All call processing functions
These interfaces are commonly transported on a 2 Mbit/s link.
MSC
BSC
LAPD LAPD
MTL
OML (X.25)
OMC- R
BTS BTS BTS
Each 2 Mbit link provides 32, 64Kbit/s channels or Timeslots. Timeslot zero is alwaysused for control and frame alignment purposes, with one other being used forsignalling, typically Timeslot 16 and the remainder, used for traffic.
The signalling protocols used with a GSM Network are:
LAPD – 1 x 64Kbit/s timeslot
CCS7 – 1 x 64Kbit/s timeslot (BSSAP, MAP, TCAP, SCCP, MTP)
X.25 – 1 x 64Kbit/s timeslot (Used between the BSC and OMC)
CCS7 is used for transmission between the MSC and BSS, dependent upon the typeof signalling required, will depend on which signalling part is used. (DTAP is used forthe transfer of messages between the MSC and MS, a subset of BSSAP.)
Page 31 of 31
ROOT 2 technology
© ROOT 2 technology Limited 2001
GS
MTerrestrial Interfaces
Module 3 Key Points
Standard GSM Interfaces:
PCM 2 Mbit Links
Signalling System No.7 - (ITU-T SS7 or CCS7)
LAPD Protocol - Link Access Protocol Data (D Channel)
X.25 - (Packet Switch Data for OMC interface)
PCM 30
The 2 Mbit Frame comprises of 32 Timeslots. Each Timeslot is 64Kbits in size,resulting in a total frame size of 2.048Mbits. Each 2 Mbit frame provides thirty channelsfor the transmission of speech, data or control information. The control information maycontain C7, LAPD or X.25 formatted information.
C7 Protocols
BSSAP - Base Station System Application PartBSSMAP - Base Station System Management Application PartDTAP - Direct Transfer Application PartISUP - ISDN User PartMAP - Mobile Application PartSCCP - Signalling Connection Control PartTUP - Telephone User PartTCAP - Transaction Capabilities Application Part
LAPD
There is a limitation on the amount that can be transmitted across the air interface.With using the normal LAPD format 260 – 272 octets of information can be sent. Dueto the restrictions GSM uses the LAPDm format, having a maximum length of 23octets. The 23 octets formation is used for TCH’s and a 21 Octets format for SACCH.
Interfaces
The signalling protocols used with a GSM Network are:
LAPD – 1 x 64Kbit/s timeslot
CCS7 – 1 x 64Kbit/s timeslot (BSSAP, MAP, TCAP, SCCP, MTP)
X.25 – 1 x 64Kbit/s timeslot (Used between the BSC and OMC)
Page 32 of 32
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Module Objectives
On completion of this module of instruction the delegate will have gained anunderstanding of: -
• Explain Modulation Techniques• Discuss the reasons for using TDMA Frames• Explore Physical Channels used within GSM• List the Logical Channels• Explain the Broadcast Control Channel• Explore all Common Control Channels• Explore all Dedicated control Channels• Define Mobile Access• Explain channels used for Handover• Examine the GSM Burst• List the GSM Burst Types• Identify the requirement for using Multi Frames • Define GSM Timing• Discuss the Speech Encoding process• Discuss the GSM Authentication Procedure
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Modulation Techniques
There are three methods of modulating a signal so that it can be transmitted over anair interface.
Amplitude Modulation (AM)Amplitude modulation is the most basic form of modulation, where the information istransmitted through variations in a waveform’s amplitude. AM is very susceptible tointerference from noise, which leads to poor transmission quality over larger distances.
Frequency Modulation (FM)Frequency modulation is slightly more complicated to implement than AM, due to theinformation being transmitted through variations in a waveform’s frequency. FMprovides a greater tolerance to noise than AM.
Digital signals must be converted prior to tramsmissionover a normal telephone network
A carrier signal
Is modulated by thedigital output from adata terminal equipmentto produce
Amplitude modulation
Frequency modulation
or
Phase modulation
Amplitude change
Frequency change
Phase change
Phase Shift Keying (PSK)Although phase modulation provides a high tolerance to noise, there are problems withusing this form of modulation. Digital signals are transmitted in the form of logic 0 andlogic 1 (On or Off), two states completely opposite to one another. These states arereferred to as ‘Phases’. When the signal changes phase abruptly, high frequencycomponents are produced causing distortion when the signal is received, requiringgreater bandwidth.
GSM has limited available bandwidth, so utilisation has to be in the most efficient waypossible. The use of PSK in its most basic form is not a viable option, so GSM utilisesa more complex form of PSK called Gaussian Minimum Shift Keying (GMSK).
Gaussian Minimum Shift Keying (GMSK)With GMSK, the phase change does not occur instantaneously as within PSK. GMSKintroduces a transition period, increasing the time in which the phase change has tooccur, therefore drastically reducing high frequency components and distortion. AGaussian Digital Filter is used for this operation.
Phase ModulationPhase modulation provides the besttolerance to noise but remains complex inimplementing and is rarely used whentransmitting analogue signals.As we have already discussed, GSMutilises digital transmission over the airinterface. Digital signals can use any ofthe above methods of modulation, butunlike analogue, phase modulation beingthe most tolerant to noise can easily beimplemented in GSM. Phase modulationdoes not suffer the same set backs whentransmitting digital signals and is known asPhase Shift Keying (PSK) when applied todigital signals.
Page 34 of 34
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Physical Channels
A GSM carrier comprises of one complete Time Division Multiple Access (TDMA)frame. Each frame is broken down into eight equal segments called ‘Timeslots’, thatare arranged in sequential order from 0 – 7 (as can be seen from the diagram).
The TDMA frame (Carrier) is transmitted continuously and lasts for a time period of4.615ms. Therefore each timeslot lasts for an approximate time period of 577microseconds.
Each MS telephone call occupies one timeslot (0 – 7) within the frame until the call isterminated, or handover occurs. Due to there being a limited number of timeslotsavailable within the frame, it limits the number of simultaneous MS users to seven, astimeslot zero is required for controlling elements.
In order for the system to work correctly, timing of timeslot transmissions to and fromthe MS is critical. The MS or BTS must transmit information relating to a call, by usingthe allocated timeslot, at exactly the right moment.
TDMA Frame
BURST
1 Timeslot
76
54
01
32
76
54
01
23
76
54
01
23
TDMA frame istransmitted
continuously. EachMS is allocated anindividual Timeslot
for a call,transmitting
information withina burst.
Failure to do this will result in the information being lost, or corruption of consecutivetimeslots. This information is transmitted in the form of a ‘burst’.
Each burst occupying its allocated timeslot within successive frames, provides GSMwith the physical channel for carrying logical channels between the MS and BTS.
Page 35 of 35
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Logical Channels
There are two main groups of logical channels, traffic channels and control channels.
Traffic Channels
The Traffic Channel (TCH) is the channel used within GSM to carry speech and datainformation. There are two TCH’s available for use with GSM; Full Rate Speechworking at 13Kbit/s and Half Rate speech at 6.5Kbit/s.For Data transmission, TCH’s working at 2.4Kbit/s, 4.8Kbit/s, 9.6Kbit/s and 14.4Kbit/sare available.
Um Interface
BCCH
CCCH
DCCH
Control Channels
Traffic Channels
TCH
The BCCH transmits information from the network regarding the MS’s present locationand surrounding cells. The BCCH also contains information relating to Synchronisation(SCH) and frequency (FCH).
Common Control Channel Group
The Common Control Channels are transmitted in both uplink and downlink directions.The group consists of the following channels.
Random Access Channel (RACH) Paging Channel (PCH) Access Grant Channel (AGCH) Cell Broadcast Channel (CBCH)
Dedicated Control Channel Group
Dedicated Control Channels are allocated to individual MS for the purpose of call set-up and subscriber validation. The group consists of the following channels.
Stand-alone Dedicated Control Channel (SDCCH)Associated Control Channels (ACCH)
Control Channels
Control channels as named, are thechannels used within GSM forcontrolling the air interface. There arethree groups.
Broadcast Control Channel (BCCH)Common Control Channel (CCCH) Dedicated Control Channel (DCCH)
Broadcast Control Channel Group
The Broadcast Control Channel(BCCH) is transmitted in the downlinkonly (from the BTS to the MS).
Page 36 of 36
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Broadcast Control Channel
The Broadcast Control Channel (BCCH) is continuously transmitted by the BTS on theBCCH carrier. The MS monitors the BCCH periodically (at least once every 30seconds) when it is not associated in making or receiving a call, to obtain the followinginformation.
Location Area Identity (LAI)List of surrounding cells that the MS monitors for handover purposesFrequency information Power control informationAccess Control for Paging
Note: Additional information is transmitted within the BCCH.
Um Interface
SCH
FCCH
Broadcast Control Channel
BCCH
LAIBSICDTXCBCH
Frequency Correction (Control) Channel (FCCH)
This channel is frequently transmitted within timeslots on the BCCH carrier allowing theMS to tune its frequency to that being transmitted by the associated BTS.
Synchronisation Channel (SCH)
The Synchronisation Channel is utilised to enable the MS to synchronise with anassociated TDMA frame over the air interface. Synchronisation is key to the success ofthe air interface and is therefore essential when making or receiving a call.
The MS will monitor the BCCH carrier from surrounding cells, storing information fromthe six strongest cells. Again for the purpose of handover, if the MS should roam withinthe network, it has the necessary information stored to move between cells with easeand quickly resynchronise with the new cell.
The BCCH is transmitted at aconstant power, with its signalstrength being monitored bythe MS. The MS uses thispower monitoring to identify ifhandover is required (coveredlater in the course). Becauseof the importance of theBCCH carrier, if no trafficrequires transmitting, a‘dummy burst’ will betransmitted to ensurecontinuity over the airinterface.
Page 37 of 37
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Common Control Channels
The Common Control Channel (CCCH) is responsible for transferring controllinginformation between all MS within a BTS area. This control is necessary forimplementing ‘Call Origination’ and ‘Paging’ functions.
Random Access Channel (RACH)
The Random Access Channel is used by the MS to gain access to the network. It isonly used in the uplink, when the MS requests to initiate a call or responds to a PCHsent by the network.
Um Interface
AGCH
CBCH
PCHRACH
Common Control Channel
Paging Channel (PCH)
The Network uses the Paging Channel in order to contact an MS (paging can beperformed using either the IMSI, TMSI or IMEI identities).
Access Grant Channel (AGCH)
This is used by the BTS to assign a Dedicated Control Channel to an MS, in responseto the receipt of a RACH from the MS. The MS will then move to the DCCH in order toproceed with the call set-up, or to respond with requested information, regardingLocation Area Updates or Short Messaging Services (SMS).
Cell Broadcast Channel (CBCH)
This channel is used by the network to transmit broadcast messages to all MS’s withina given cell. Although this channel really uses a DCCH to transmit the messages, it isconsidered a CCCH as all MS within the given cell can receive that message.
All MS frequently monitor both the BCCH and CCCH within their associated cell, bothbeing transmitted constantly on the carrier by the BTS.
Page 38 of 38
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Dedicated Control Channels
Dedicated Control Channels (DCCH) are used to convey specific information over theair interface. GSM uses a Stand-alone Dedicated Control Channel (SDCCH) to passinformation across the air interface, working in both directions between the BTS andMS. This SDCCH carries information for call setup, the authentication process, locationupdating and SMS.
Associated Control Channels
These channels are associated with either the SDCCH or a TCH. They are used tocarry information associated with handover whilst a simultaneous process is beingcarried out by either an SDCCH or a TCH.
Um Interface
Dedicated Control Channels
FACCH
SACCH
SDCCH
Slow Associated Control Channel (SACCH)
This channel is used to convey power and timing information in the downlink andpasses Receive Signal Strength Indications (RSSI) and link quality reports from the MSin the uplink. SACCH is also used for the handover procedure when the MS is idle (notinvolved in a physical call).
Fast Associated Control Channel (FACCH)
The FACCH is used to perform handover and also authentication when an MS isinvolved in a physical call (having been allocated a TCH). It is transmitted within theburst of the TCH, containing specific information that is required for the handoverprocedure.
All of the control channels are required for system operation and have to sharetimeslots over the air interface just like MS’s using the limited TCH’s. By sharing thetimeslots, it allows efficient passing of control information without wasting valuablecapacity that can be used for carrying additional call traffic. We therefore organise thelimited timeslots over the air interface to carry either control or traffic information.
Page 39 of 39
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
GSM Burst Format
The diagram below shows the format of a GSM burst. It consists of differing elementsdependant upon the burst in use. The elements described below form a Normal Burst,used for transmitting Voice Call and Data information.
Info Field
There are two info fields within the normal burst. Each field contains 57 Bits ofinformation (Voice call or Data). If during the call procedure handover is required,FACCH steals one of these info fields (all 57 Bits) to transmit the specific information required.
0 1 2 3 4 5 6 7
TDMA Frame
INFO INFOTRAININGSEQUENCE
STEALING FLAGSTAIL BITSTAIL BITS
GUARD PERIOD GUARD PERIOD
148 Bits
156 Bits (0.577ms)
44
Training Sequence
This is used by the receiver to estimate the quality and transfer characteristics of thephysical path (air interface) between the MS and BTS. The training sequence consistsof 26 Bits of information.
Tail Bits
The tail bits act as flags, identifying the beginning and end of the burst.
Guard Period
This period is designed to allow both the BTS and MS additional time to receive anddecode the transmitted burst. The timeslot allows 0.577ms for the burst to besuccessfully transmitted, where actually the physical burst only requires 0.546ms. Thisdifference in time relates to 8 Bits or 0.031ms time difference between actually bursttransmission and the actually time available. This 8 Bit guard period can be transmittedat either the beginning, the end or in both areas of the burst format.
Stealing Flags
These flags compriseof a single bit eachand indicate whethercall or FACCHinformation is presentwithin the informationfield.
Page 40 of 40
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Burst Types
The diagram below shows the five types of burst employed over the GSM air interface.All bursts, whatever type, consist of 156 Bits of information allowing them successfultransmission within the allotted 0.577ms timeslot.
The burst is a sequence of information bits transmitted by network components, wherethe timeslot is the specific period of time that the burst must arrive in order to besuccessfully decoded.
Normal Burst - the normal burst carries traffic and control channels both up anddownlink apart from those listed below.
Frequency Correction Burst - carries the FCCH in the downlink only, to correct thefrequency of the MS.
Synchronisation Burst - carries the SCH in the downlink only, to synchronise timingof the MS with the BTS and therefore Network.
ENCODED (39) SYNCHRONISATION SEQUENCE(64) ENCODED (39)
GUARD PERIOD (68.25)ENCRYPTED BITS(36)
SYNCH SEQUENCE(41)
156 Bits (0.577ms)
INFO (57) INFO (57)TRAININGSEQUENCE (26)TAIL BITS TAIL BITS
FIXED BITS (142) TAIL BITSTAIL BITS
TAIL BITS TAIL BITS
FIXED BITS (57) TRAININGSEQUENCE FIXED BITS (57)TAIL BITS TAIL BITS
TAIL BITS
TAIL BITS
Dummy Burst - this burst is transmitted to fill unused timeslots on the BCCH carrier(downlink only), to retain continuity over the air interface.
Access Burst - this burst is much shorter in duration than the other bursts described.It has an increased guard period due to the time of transmission being unknown. Whenan Access Burst is transmitted, the BTS does not know the exact location of the MS,so therefore cannot accurately identify the timing of the message. The use of the largerguard period counters this problem.
Page 41 of 41
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Multiframes and Timing
As we have discussed there are eight timeslots within each TDMA frame, enablingeight physical channels to share an RF carrier, where in addition, each physicalchannel may be shared by a number of logical channels.In order to understand how the sharing of logical channels is achieved, we have tointroduce ‘Multiframe’ structures.
The 26 Frame Multiframe - Call Traffic
The diagram below shows the relationship between the timeslot allocated to an MS forthe duration of a call, the TDMA frame and 26 Frame Multiframe. (The timings shownare not exact timings but are approximate timings)
The 26 Frame Multiframe comprises of 26 frames, containing information fromconsecutive timeslots on the associated TDMA frames. Frame No 12 (actually the13th) on the multiframe is always reserved for SACCH, passing network informationbetween the MS and BTS.
26 FRAME MULTIFRAMEE
0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
BURST
01234567891011121314151617181920212223242526
TDMA Frame
SACCHIDLE
4.615ms
0.577ms
120ms
Frame No 25 is always set to idle, acting as a flag indicating the end of the previous orbeginning of the next multiframe. The multiframe follows a pattern of, 12 bursts oftraffic, 1 burst of SACCH, 12 bursts of traffic and finally 1 idle frame.
Each TDMA frame lasts for duration of 4.615ms, there the total duration of themultiframe is 120ms (the duration of 26 TDMA).
Page 42 of 42
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
51 Frame Multiframe
The 51 Frame Multiframe is slightly more complicated than the 26 Frame Multiframe asit is associated with the control channels. The multiframe structure can vary, dependingon the type of control channel and network functionality requirements.
The 51 Frame Multiframe is constructed from 51 consecutive frames, from TDMAframe timeslot zeros. The diagram shows the breakdown in the downlink, of aBCCH/CCCH multiframe. As can seen, each timeslot zero contains differinginformation.
51 FRAME MULTIFRAME
T/S 0’S OF TDMA FRAMES
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
235.365 ms
IDLE
BCCH CCCH CCCH CCCH CCCH CCCH CCCH CCCH CCCH CCCH
0 10 20 30 40 50
FCCH SCH
Starting at frame 0 of the 51 frame structure, T/S 0 is occupied by FCCH, T/S 1 bySCH and the following four timeslots 2-5, by the BCCH. Timeslots 6-9 are allocated toCCCH traffic, that is for either PCH or AGCH information. Then follows in timeslots 10and 11, a repeat of the frequency and synchronisation bursts, four further CCCH burstand so on. The final timeslot, T/S 50, is the last timeslot in the multiframe and is alwaysset to idle. This idle frame acts as a flag, indicating the next frame received is the startof a new 51 Frame Multiframe.
Page 43 of 43
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Speech Channel Encoding
To protect the logical channels from transmission errors that may be introduced overthe air interface, various coding schemes are utilised. The coding and interleavingschemes used depend on the type of logical channel being encoded. All logicalchannels require a form of Convolutional Encoding, but due in addition to varyingstandards of protection required, these coding rates differ.
Speech Channel Coding
Speech is divided into 20ms periods, comprising of 260 bits of information. After theencoding and interleaving procedure, 456 bits are transmitted within 8 bursts, thereforereducing reproduction problems should interference cause problems over the airinterface.
CONVOLUTIONAL ENCODING
CLASS 150 BITS
CLASS 2132 BITS
CLASS 378 BITS
50 1323 4 78
PARITYCHECKING
NO PARITY CHECKING
378 78
456 BITS
Over the air interface speech or data is transmitted at a rate of 22.8 Kbit/s (456 Bitsevery 20ms). Speech information is grouped into three groups depending on itssensitivity and importance.
Class 1 - These 50 bits carry the most sensitive information, and if corrupted can leadto speech intelligibility. If errors are found within these bits, generally the entire block isignored. These bits pass through a parity check where 3 additional bits are added.
Class 2 - Here 132 bits are not parity checked. These bits are important, but not asimportant as the 50 Class 1 bits. These 132 bits are combined with the Class 1 bits,with an additional 4 tail bits being added (for decoding purposes) prior to theconvolutional encoding process.
Class 3 - These bits are the least sensitive bits that do not require encoding.
As can be seen from the diagram, after the convolutional encoding proceed, the Class3 bits are added to the combined and encoded Class 1 and 2 bits, to produce 456 bits.
Data Channel Encoding
Data transmission arespread over 22 bursts.The reason being, thatevery bit of datainformation is vitallyimportant, so byincreasing the number ofbursts used, we canminimise interferenceaspects incurred over theair interface.
Page 44 of 44
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
GSM Authentication
One of the major drawbacks with analogue systems was the ease that an air interfacetransmission could be compromised.
GSM uses an Authentication Centre (AUC) Database for providing a network’s securityelements. It provides the network the ability to monitor a users access rights for callsetup, location updating and activation of supplementary services.
When a subscriber first purchases a phone from a provider, the network Ki key will beallocated to their IMSI. On initial setup (first activation), the Ki will be opened and onlythen is susceptible to copying.
Ki
RAND
SRES
Kc
A3Algorithm
A8Algorithm
RAND
TRIPLET
Ki
RAND
SRES
Kc
TRIPLET
A3Algorithm
A8Algorithm
RANDBTS
RAND
SRESSRES
RAND
TRIPLET
SRESSRES
SIM
AuCHLR
MSC/VLR
Triplets
Triplets are produced by the AUC for use throughout the authentication procedure.They consist of three separate elements, the Random Number (RAND), a SignedResponse (SRES) and a Key Code (Kc). The AUC produces these triplets through theuse of two algorithms, an A3 and an A8, both of which are matched with the samealgorithms on the SIM. Due to both network algorithms being assigned to the AUC andNetwork SIM cards, when the RAND used by the AUC in producing the Triplet ispassed to the MS for authentication, the MS in turn should produce the same Tripletresults. The MS produces the triplet and returns either the SRES or Kc (depending onrequest) to the VLR, where results are processed and authentication granted. If theresults differ, the MS will not be granted access.
Page 45 of 45
ROOT 2 technology
© ROOT 2 technology Limited 2001
The R
adio Air Interface
Module 4 Key Points
Modulation Types
Amplitude Modulation (AM)
Frequency Modulation (FM)
Phase Shift Keying (PSK)
Gaussian Minimum Shift Keying (GMSK)
Control Channels
Broadcast Control Channel (BCCH)Common Control Channel (CCCH) Dedicated Control Channel (DCCH)
BCCH
Location Area Identity (LAI)List of surrounding cells that the MS monitors for handover purposesFrequency information Power control informationAccess Control for Paging
GSM Bursts
Normal Burst Frequency Correction Burst Synchronisation BurstDummy Burst Access Burst
Multi Frames
The 26 Frame Multiframe - Call TrafficThe 51 Frame Multiframe - Signalling
Authentication
Triplets are produced by the AUC for use throughout the authentication procedure.They consist of three separate elements, the Random Number (RAND), a SignedResponse (SRES) and a Key Code (Kc).
Page 46 of 46
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Module Objectives
On completion of this module of instruction the delegate will have gained anunderstanding of: -
• Explain the requirement for Timing Advance• Discuss Timeslot allocation• List GSM elements associated with Power Control• Describe DRX and its uses• Explore Multipath Fading• Discuss Antenna Diversity• Explain GSM Equalisation• Define Frequency Hopping and reasons for its use
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Transmission Timing Advance
To simplify the design of the MS, by it not having to transmit and receive informationsimultaneously, GSM offsets the timing between TDMA frames. GSM specificationsstate that a timing offset of three timeslots must be incorporated. The diagram belowshows an example of this. Timing advance is not required on the BTS due to beingconfigured for simultaneous transmission and reception.
The synchronisation of TDMA frames is critical due to bursts having to be transmittedand received within ‘real time’ timeslots allocated to them. The further that the MS isfrom the BTS the longer it takes for the burst to be transmitted between them. The BTScaters for this problem by instructing the MS to advance its timing (to transmit earlier)to compensate for this increased delay.
0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7
FRAME 1
FRAME 1
DOWNLINK
UPLINK
BTS - MS
MS - BTS
3 TS OFFSET
TIMING ADVANCE
2 30 1
Timing advance information is sent to the MS twice every second using the SACCH(the 13th frame on the 26 Frame Multiframe). This advance is superimposed upon thetimeslot offset, again being shown in the diagram.
If the network is configured for a maximum cell size with a radius of approximately35km, the maximum timing advance will be approximately 0.233ms.
Page 48 of 48
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
MS Power Control
One of the main factors restricting the physical size of the MS is its battery. The batterymust be large enough to hold sufficient power to maintain calls for a period of timeprior to the MS requiring a recharged. The demand has increased for smaller, lighterphones, therefore leading to the requirement of smaller and lighter batteries.
Within GSM, several features are utilised, two of which being Power Control andDiscontinuous Reception.
Power Control
ABC Power control
0.8 Watts
2 WattsBTS
0.8 Watts
1 Watt
1.4 Watts
This is a feature of the air interface, allowing the network not only to compensate forthe timing distance, but additional to allow the MS to control its power output incomparison to the distance required for successful transmission to the BTS. The closerthe MS is to the BTS, the less power required to transmit that distance, thereforeincreasing the MS’s battery life. In addition to saving power, by reducing in accordanceto distance it aids in the reduction of air interface interference (reducing co-channeland adjacent channel interference).
Both Uplink and Downlink power setting can be controlled, typically though the BTS willtransmit at a continuous power setting. (A BTS controls multiple MS so by adjustingpower settings to compensate for an individual MS it could seriously affect others.)
The BSS controls the power of both the MS and BTS. It monitors the receive power ofboth the MS and BTS, with reports being sent to the BSS, adjusting power settingaccordingly.
Page 49 of 49
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Discontinuous Reception
Discontinuous Reception (DRX) allows the MS to ‘switch off’ when information beingtransmitted is not intended for it.
By the MS monitoring the BCCH, the FCCH and SCH, the MS is exactly aware of theframe number and format, and can identify where the information relevant is beingtransmitted. With the MS knowing this information, it can ‘switch off’ through the timeperiod where the information being transmitted is not meant for its reception, againsaving on battery life.
When DRX is used, the BCCH informs the MS of which Paging Group it is to listen too.This Paging Group may appear at the same time during every multiframe, or onceduring a series of multiframe transmissions. (The Network specifies multiframetransmission.)
BCCH C0 C1 C2 C3 C4 C5 C6 C7 C8
BCCH C0 C1 C2 C3 C4 C5 C6 C7 C8
BCCH C0 C1 C2 C3 C4 C5 C6 C7 C8
BCCH C18 C19 C20 C21 C22 C23 C24 C25 C26
BCCH C9 C10 C11 C12 C13 C14 C15 C16 C17
235 ms
470 ms
705 ms
C5 on Combined Multiframes
235.365 ms
MS Paged during C1once every 235ms Or
MS Pagedonce every 705ms
DRX may only be used when the MS is in an idle state, not physically making orreceiving a call.
Page 50 of 50
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Multipath Fading
Multipath Fading results from a signal travelling to a receiver over a multiple number ofroutes. This can be caused by, the signal being reflected off of objects such asbuildings, or its path being altered by atmospheric pressures, such as weather.
Received signals will therefore arrive at differing times and possibly out of phase withone another. On arrival at the receiver, the signals combine either constructively ordestructively. The worst possible effect will be that the received signals arrive 180∞ outof phase with each other, therefore cancelling each other out. If this happens the resultis zero signal. Within the GSM frequency bands, a distance of approx 15cm may be allthat is required to alternate from a good, to a bad signal.
To over come this variation, GSM adopts several techniques to counter MultipathFading.
Buildings
BSS
Mulitiple Paths
MS
As the MS moves, the exact phase of the receive path will change. With this constantchange, the combination of received signal strength will also change, continuously.
The diagram shows an example of differing routes that a signal may take in travellingfrom a BTS to an MS.
Each of the paths has suffered a varying number of losses through transmission;hence a variation in received signal amplitudes.
Equalisation
Diversity
Frequency Hopping
Interleaving
Channel Coding
Page 51 of 51
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Equalisation
Due to signal distortion caused through multipath fading, a receiver cannot be sureexactly when a burst will arrive. To aid in identification, a Training Sequence Code istransmitted at the centre of each burst. This is a set combination of bits, known by boththe transmitter and receiver.
When a burst of information is received, the equaliser searches for the trainingsequence code to identify how distorted it has become. It will then be able to identifythrough comparison, how distorted the remainder of the burst has become and identifythe most probable signal outcome.
There are eight different Training Sequence Codes used within GSM, numbered 0 to 7.Nearby cells, although operating on the same frequency will use different trainingsequence codes, therefore reducing additional air interface interference bydisregarding foreign bursts.
=> 10 Wave Lengths
COMBINER
Diversity
Intelligent Result of Combiner
GUARD PERIOD GUARD PERIODINFO INFOTRAININGSEQUENCE
NORMAL BURST
STEALING FLAGSTAIL BITSTAIL BITS
Diversity
As we have discussed, signals arrive at an antenna from multiple paths. The signalsare therefore received in different phases and at different strengths, meaning somesignals will combine to produce strong signals and others, subtract producing weak orno signal.
When diversity is implemented within GSM, two receive antennas are used. These twoantennas are placed several wavelengths apart, ensuring that there is minimumcorrelation between the two receive paths. The two received signals are combined atthe BTS, producing the most intelligent and strongest signal possible from the tworeceived signals (one from each of the receive antennas).
Page 52 of 52
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Frequency Hopping
Frequency Hopping is used within GSM to limit the effects caused by multipath fading.It allows the MS to change the ARFCN used for each transmission (every 4.615ms),using the same timeslot, but different carrier. This provides a high degree of immunityto interference, due to interference averaging, as well as providing protection againstsignal fading.
Interference Averaging – assumes that radio channel interference does not exist onevery allocated ARFCN due to the MS changing to a new ARFCN every 4.615ms orframe. Therefore, the overall communication received only experiences interferencepart of the time.
BSS
0 1 2 3 4 5 6 7
01
23
45
67
0 12
34
56
7
ARFCN 41
ARFCN 44
ARFCN 47
HSN - ARFCN Sequence order
MAIO - Sequence start position
All mobile subscribers can use frequency hopping, which is controlled by the BSS. TheBSS provides the MS with two identities, a Hopping Sequence Number (HSN), theorder in which the MS hops through the available ARFCN’s and a Mobile AllocationIndex Offset (MAIO), the start point within the ARFCN hopping sequence. Not all cellssupport frequency hopping, so networks are configured for frequency hopping andallocated cells.
Page 53 of 53
ROOT 2 technology
© ROOT 2 technology Limited 2001
Air Interface O
ptimisation
Module 5 Key Points
Timing Advance
The synchronisation of TDMA frames is critical due to bursts having to be transmittedand received within ‘real time’ timeslots allocated to them. The further that the MS isfrom the BTS the longer it takes for the burst to be transmitted between them. The BTScaters for this problem by instructing the MS to advance its timing (to transmit earlier)to compensate for this increased delay.
Power Control
Both Uplink and Downlink power setting can be controlled, typically though the BTS willtransmit at a continuous power setting. (A BTS controls multiple MS so by adjustingpower settings to compensate for an individual MS it could seriously affect others.)
Discontinuous Reception (DRX)
Discontinuous Reception (DRX) allows the MS to ‘switch off’ when information beingtransmitted is not intended for it.
Multipath Fading
GSM utilises the following processes to limit Multipath fading:
Equalisation
Diversity
Frequency Hopping
Interleaving
Channel Coding
Page 54 of 54
ROOT 2 technology
© ROOT 2 technology Limited 2001
Call and H
andover Proceedures
Module Objectives
On completion of this module of instruction the delegate will have gained anunderstanding of: -
Mobile to PSTN Call
• Discuss the Mobile to PSTN call procedure• Explain key stages of the procedure
PSTN to Mobile Call
• Discuss the Mobile to PSTN call procedure• Explain key stages of the procedure
Inter BSS Handover
• Discuss the procedure taken during a GSM Handover• Explain key stages of the procedure
Location Updates
• Discuss the procedure for Location Updates • Explain key stages of the procedure
Authentication Procedure
• Explore the procedure and reasons for Authentication
ROOT 2 technology
© ROOT 2 technology Limited 2001
Call and H
andover Proceedures
Mobile to PSTN Call
1. The MS requests service by sending a RACH to the BSS. The BSS then assigns aDedicated Control Channel, SDCCH to the MS by using an AGCH.
2. The request for service (Call Request message - CR) is passed to the MSC, whichin turn relays the message to the VLR (At this stage the VLR can initiate theauthentication process if required where it will obtain parameters for the HLR).
3. The MSC then sends a Call Complete Message (CC) to the BSS for set up initiation,which in turn notifies the MS to proceed with the call.
4. The MSC accesses the PSTN with an Address Request Message (AR). The PSTNnegotiates with the called number and responds with an Address Complete Message(AC).
AR
AC
TCH
PSTN
SDCCH
SDCCH
RACH
AGCH
SDCCH
TCH
FACCH
SDCCH BSS
CC
CR
MSCTCH
5. The MSC informs the BSS to assign a TCH to the MS for the call.
6. Upon completion of this allocation the TCH is connected between the MS and callednumber, where billing of the call commences.
7. Throughout the duration of the call, FACCH is used to monitor the status of the TCHin case a Handover is required.
Page 56 of 56
ROOT 2 technology
© ROOT 2 technology Limited 2001
Call and H
andover Proceedures
PSTN to Mobile Call
1. The PSTN through the use of C7 Messaging contacts the GMSC with an MSISDN.
2. The GMSC passes the MSISDN to the HLR and responses with an MSRN (theidentity of the MSC/VLR area to which requested MS is attached).
3. The controlling MSC then informs the BSS to page the MS using a PCH.
4. The MS responds to the PCH with a RACH. The BSS then assigns a DedicatedControl Channel, SDCCH to the MS by using an AGCH.
5. Upon completion of this proceed (including authentication if required), the MSCsends an Address Complete Message (AC) to the PSTN.
PSTN
TCH
GMSC
MSISDNMSISDN
MSRN
MSRN
AC
ANS
MSC
BSS
RACH
AGCH
SDCCH
TCH
FACCH
SDCCH
PCH
HLR/VLR
6. The MSC then informs the BSS to assign a TCH to the MS for the duration of thecall.
7. The PSTN sends an Answer Message (ANS) to the MSC confirming connection.
8. The TCH is then connected and the call is established.
9. Throughout the duration of the call, FACCH is used to monitor the status of the TCHin case a Handover is required.
Page 57 of 57
ROOT 2 technology
© ROOT 2 technology Limited 2001
Call and H
andover Proceedures
Inter BSS Handover
While the MS is involved in a call (i.e. has a TCH allocated), it is continuouslycompiling measurements and reporting to the BSS.
1. When a Handover is required, typically due to low Receive Signal StrengthIndication (RSSI), the originating BSS (oBSS) notifies the MSC.
2. The MSC then targets the new BSS (nBSS) for the MS, through its TMSI.
3. The nBSS assigns a new TCH for the MS to use and passes relevant informationback to the MSC.
nBSS
oBSS
MSCFACCH
FACCH
SACCH
Inter BSS Handover
2. HO RequestInfo
3. HO Complete
1. HO Required
4. Clear Down
SACCH
FACCH
4. The MSC, via the oBSS orders the MS to change to the nBSS using FACCH.
5. The nBSS communicates with the MS Using FACCH to establish full connection.
6. Once all necessary information has been transferred the MSC is informed andHandover is complete.
7. The MSC now sends a Clear Down command to the oBSS, freeing the radioresource for another MS to use (The channel is not cleared until the nBSS can fullyaccommodate the MS).
8. Upon completion, the MS continues to periodically measure the RSSI values andreports to the nBSS.
Page 58 of 58
ROOT 2 technology
© ROOT 2 technology Limited 2001
Call and H
andover Proceedures
Location Update
1. A location update occurs when an MS detects that it has entered a new locationarea (LAI). The LAI is transmitted on the BCCH. If this occurs, the MS will be assignedan SDCCH by the BSS, for the duration of the update procedure.
2. Once an SDCCH has been assigned, the MS will transmit a Location UpdateMessage (LU) to the MSC.
3. When the MSC receives this message it sends the new LAI and current TMSI to theVLR. (This information will also be sent to the HLR if it is the first update transmitted bythe MS.)
BSS
LAITMSI
TMSI
MS Location Update
UC
UA
LU
SDCCH
RACH
AGCH
SDCCH
SDCCH
SDCCH
MSC
VLR
4. The VLR can now assign a new TMSI (if required) to the MS. Its transmits a locationUpdate Accept Message (UA), containing the new TSMI and LAI to the MS.
5. When the MS has successfully received and stored the updated information, the MSresponds with an Update Complete Message (UC) to the MSC.
6. The MSC informs the VLR that the update has been successful.
7. The MSC finally informs the BSS to release the SDCCH.
Page 59 of 59
ROOT 2 technology
© ROOT 2 technology Limited 2001
Call and H
andover Proceedures
Authentication Procedure
The authentication procedure maybe executed in addition to switch on, for call setup,location updating or applications for other services i.e. International roaming.
1. The VLR initiates the authentication process by sending an authentication messageto the MSC, along with the associated RAND.
2. The MSC then sends the RAND to the BSS, which in turn sends it to the MSattached to a AGCH. The AGCH carries the RAND and information regarding theSDCCH that the MS will use to respond.
3. The MS responds to the request using the SDCCH passing the SRES.
SDCCH
SDCCH
Complete
BSS
MS Authentication
SRES
RAND
SRES
AGCHMSC
VLRRAND
4. The SRES is passed to the VLR via the MSC, where authentication will beconfirmed.
5. If authentication is successful the MS will be able to continue with its request forservice as an example.
6. If authentication fails, the HLR will be updated, the MS will be denied its request andservice will be refused.
Page 60 of 60