usegsm presentation shaikot 96234 95599

Upload: empalmighty

Post on 08-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    1/44

    GSM Protocol Architecture

    Shariful Hasan Shaikot

    Graduate StudentComputer Science Department

    Oklahoma State University

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    2/44

    2

    Outline What is GSM?

    Nomenclature

    GSM Protocol Architecture

    Overview of Interfaces

    GSM Protocol Stack

    Overview of Layer-I

    Overview of Layer-II

    Overview of Layer-III

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    3/44

    3

    What is GSM? GSM, the Global System for Mobile

    Communications, is a digital cellular

    communications system

    GSM provides Digital Transmission

    ISDN compatibility

    Worldwide roaming in other GSM networks

    Provides a model for 3G Cellular systems (UMTS)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    4/44

    4

    NomenclatureMS (Mobile Station) = ME (Mobile Equipment )

    +SIM (Subscriber Identity Module)

    BSS (Base Station Subsystem) = BTS (Base

    Transceiver Station) + BSC (Base Station

    Controller)

    NSS (Network Switching Subsystem)

    MSC (Mobile Switching Center): telephony

    switching function and authentication of user

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    5/44

    5

    GSM Protocol Stack

    Layer 1: Physical Layer Radio Transmission

    Layer 2: Data Link Layer(DLL) provides error-free transmission between adjacent entities, based on the

    ISDNs LAPD protocol for the Um and Abis interfaces, and on SS7sMessage Transfer Protocol (MTP) for the other Layer interfaces

    Layer 3: Networking or Messaging Layer Responsible for the communication of network resources, mobility, code

    format and call-related management messages between various networkentities

    - In any telecommunication system, signalling is required to

    coordinate the necessarily distributed functional entities of the

    network.

    - The transfer of signalling information in GSM follows the layered

    OSI model

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    6/44

    6

    GSM Protocol Architecture

    Layer 1

    Layer 2

    Layer 3

    TDMA/FDMA

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    7/44

    7

    Overview of Interfaces

    Um

    Radio interface between

    MS and BTS

    each physical channel

    supports a number of

    logical channels

    Abis

    between BTS and BSC

    primary functions: traffic channel transmission, terrestrial

    channel management, and radio channel management A

    between BSC and MSC

    primary functions: message transfer between different

    BSCs to the MSC

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    8/44

    8

    The data link layer(layer 2)over the radio link is based

    on a modified LAPD (LinkAccess Protocol for the Dchannel) referred to asLAPDm (m like mobile).

    On the A-bis interface, the layer 2 protocol is based on the LAPDfrom ISDN.

    The Message Transfer Protocol (MTP) level 2 of the SS7 protocol isused at the A interface.

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    9/44

    9

    User Dataand Control at Air

    Interface

    Two types of ISDN "channels" orcommunication paths:

    B-channelThe Bearer ("B") channel: a64kbps channel used for voice,video, data, or multimedia calls.D-channel

    The Delta ("D") channel: a 16kbps or 64 kbps channel usedprimarilyfor communications (or"signaling") between switchingequipment in the ISDN networkand the ISDN equipment

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    10/44

    10

    User Dataand Control at Air

    Interface

    In GSM: Bm channel for traffic / user data Dm channel for signaling

    As in ISDN the Dm channel in GSMcan be used for user data ifcapacity is available.

    GSMs Short Message Service(SMS) uses this.

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    11/44

    11

    Lay

    er I:Physical Layer

    Radio transmission forms this Layer

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    12/44

    12

    Layer I: Physical Layer Modulation Techniques Gaussian Minimum Shift Keying (GMSK)

    Channel Coding

    Block Code Convolutional Code

    Interleaving To distribute burst error

    Power control methodology to minimize the co-channel interference

    Time synchronization approaches

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    13/44

    13

    GSM Protocol Architecture for Speech

    Air IF

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    14/44

    14

    GSM Physical Layer (MS Side)Speech in GSM is digitally coded ata rate of13 kbps

    456 bits every 20 ms

    260 bits every 20 ms

    857 bits block

    GMSK

    Convolutional Encoder

    184

    bits( 20 ms)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    15/44

    15

    GSM SpeechTransmission

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    16/44

    16

    GSM Normal Burst Formatting

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    17/44

    17

    GSM Frame Hierarchy

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    18/44

    18

    Physical Vs. Logical Channel

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    19/44

    19

    Logical Channels in GSM

    Two major classes of logical channels

    Traffic Channels (TCHs)

    Control Channels (CCHs)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    20/44

    20

    Traffic Channels in GSM Two types ofTCHs

    Full-rate traffic channel (TCH/F)

    Half-rate traffic channel (TCH/H)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    21/44

    21

    Control Channels in GSM

    Three classes of control channels

    Broadcast Channels (BCH)

    Common Control Channels (CCCH) Dedicated Control Channels (DCCH)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    22/44

    22

    Layer II:Data Link Layer (DLL)

    Error-free transmission between adjacent entities

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    23/44

    23

    GSM Layer II Connection-based Network

    Traffic

    Signaling and Control

    Signaling and control data are conveyed through Layer II andLayer III messages in GSM

    Purpose of Layer II is to check the flow of packets for Layer III

    DLL checks the address and sequence # for Layer III

    Also manages Acks for transmission of the packets

    Allows two SAPs for signaling and SMS

    SMS traffic is carried through a fake signaling packet that carries

    user information over signaling channels

    DLL allows SMS data to be multiplexed into signaling streams

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    24/44

    24

    GSM Layer II Signaling packet delivered to the physical layer

    is 184 bits which conforms with the length of the

    DLL packets in the LAPD protocol used in ISDN

    network

    The LAPD protocol is used for A and A-bis

    interface

    The DLL for the Um interface is LAPDm

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    25/44

    25

    LAPDm The Link Access Procedure on the Dm channel

    (LAPDm) is the protocol for use by the data link layer on

    the radio interface. Functions

    organization of Layer 3 information into frames

    peer-to-peer transmission of signaling data

    in defined frame formats recognition of frame formats

    establishment, maintenance, and

    termination of one or more (parallel) data

    links on signaling channels

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    26/44

    26

    Frame format (LAPD)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    27/44

    27

    Frame format (LAPDm)

    Address field: is used to carry the service access point identifier(SAPI),

    protocol revision type, nature of the messageSAPI: When using command/control frames, the SAPI identifies the user

    for which a command frame is intended, and the user transmitting a

    response frame

    Control field: is used to carry Sequence number and to specify the types of

    the frame (command or response)

    Length indicator: Identifies the length of the information field that is used todistinguish the information carrying filed from fill-in bits

    Information Field: Carries the Layer III payload

    Fill-in bits: all 1 bits to extend the length to the desired 184 bits

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    28/44

    28

    Types ofFrame of LAPDmThree types of frames for

    Supervisory functions

    Unnumbered information transfer and control functions Numbered information transfer

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    29/44

    29

    Address field formatof LAPDm

    Link Protocol Discriminator: is used to specify a

    particular recommendation of the use of LAPDm

    C/R: Specifies a command or response frame

    ExtendedAddress : is used to extend the address field

    to more than one octet (the EA bit in the last octet of the

    address should be set to 1, otherwise 0)

    Spare: reserved for future use

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    30/44

    30

    LAPD Vs. LAPDm LAPDm uses no cyclic redundancy check bits for error

    detection

    WHY?

    Error correction and detection mechanism are

    provided by a combination of block and convolutional

    coding used (in conjunction with bit interleaving) in thephysical layer

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    31/44

    31

    Layer II Messages- Set asynchronous balanced mode

    - Disconnect

    - Unnumbered acknowledgement

    - Receiver ready- Receiver not ready

    - Reject

    - These messages are sent in peer-to-peer Layer II communications,

    DLL ack.

    - These messages do not have Layer III information bits

    - Fill-in bits cover the information bits field

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    32/44

    32

    Layer II Messages (contd)- The Paging Channel (PCH) is 176 bits.

    - The DLL packet for this signaling channel only have an EIGHT bit

    length of the field

    -

    184 bits encoded into 456 bits- The 456 bits transmitted over 8 physical NBs

    - The Stand-alone Dedicated Control Channel (SDCCH) is 160 bits.

    - The DLL packet for this signaling channel has 3 8-bits used for

    address, control and length of the information field

    - The Slow Associated Control Channel (SACCH) is 144 bits.

    - The DLL packet for this signaling channel has 16 fill-in bits and 3 8-bits

    used for address, control and length of the information field

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    33/44

    33

    Layer III:

    Networkingor Messaging LayerThe layer 3 protocols are used for the communication ofnetwork

    resources, mobility, code formatand call-related managementmessages between various network entities

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    34/44

    34

    Layer III A number of mechanisms needed to establish, maintain and

    terminate a mobile communication session

    Layer III implements the protocols needed to support these

    mechanisms

    A signaling protocol, the registration process, is composed of a

    sequence of communication events or messages

    Layer III defines the details of implementation of messages on

    the logical channels encapsulated in DLL frames

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    35/44

    35

    Layer III Message Format

    Transaction Identifier (TI): to identify a protocol that consists of a

    sequence of message, allows multiple protocols to operate in parallel

    Protocol Discriminator (PD): Identifies the category of the operation

    (management, supplementary services, call control)

    Message Type (MT): Identifies the type of messages for a given PD

    Information Elements (IE):An optional field for the time that an instruction

    carries some information that is specified by an IE identifier (IEI).

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    36/44

    36

    MM Message Type

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    37/44

    37

    Layer III Message Radio Resource Management (RR),

    Mobility Management (MM) and

    Connection Management (CM).

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    38/44

    38

    Radio Resource Management (RR)

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    39/44

    39

    Mobility Management (MM)

    - Assumes a reliable RR connection

    - Responsible for- location managementand- Security

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    40/44

    40

    Mobility Management (MM)- Location management involves the procedures andsignalingfor location updating, so that the mobiles currentlocation is stored at the HLR, allowing incoming calls to

    be properly routed.

    - Security involves the authentication of the mobile, to preventunauthorized access to the network, as well as the encryption ofall radio link traffic.

    - The protocols in the MM layer involve the SIM, MSC, VLR, andthe HLR, as well as the AuC (which is closely tied withthe HLR).

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    41/44

    41

    Connection Management (CM)The CM functional layer is divided into three sublayers.

    - Call Control (CC)

    - Supplementary Services- Short Message Service

    Call Control (CC) sub layer

    -manages call r

    outing, establish

    ment,

    maintenance,and release, and is closely related to ISDN call

    control.

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    42/44

    42

    Connection Management (CM)Supplementary Services sub layer

    - manages the implementation of the varioussupplementary services (Call Forwarding/waiting/hold ),and also allows users to access and modify theirservice subscription.

    Short Message Service sub layer

    - handles the routing and delivery of short messages,both from and to the mobile subscriber.

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    43/44

    43

    References 1. Principles ofWireless Networks: A Unified

    Approach, K. Pahlavan, P. Krishnamurthy

    2. www.chu.edu.tw/~lhyen/wc/gsm.pdf

    3. www.hit.bme.hu/~mihaly/mobil.hir/gsmbase.pdf

    4. www-rp.lip6.fr/maitrise/articles/Rahnema.pdf

    5.opetus.stadia.fi/kurki/Courses/DigMobile/2006_Spri

    ng_Course_materilas/DM_7_GSM_Protocol_Architec

    ture.pdf

    6. Moe Rahnema, Overview of the GSM System and

    Protocol Architecture, IEEE Communications

    Magazine, April 1993

  • 8/7/2019 UseGSM Presentation Shaikot 96234 95599

    44/44

    44

    The ENDThe slide is available at www.cs.okstate.edu/~shaikot

    Thank You