usegsm presentation shaikot 96234 95599
TRANSCRIPT
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
1/44
GSM Protocol Architecture
Shariful Hasan Shaikot
Graduate StudentComputer Science Department
Oklahoma State University
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
2/44
2
Outline What is GSM?
Nomenclature
GSM Protocol Architecture
Overview of Interfaces
GSM Protocol Stack
Overview of Layer-I
Overview of Layer-II
Overview of Layer-III
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
3/44
3
What is GSM? GSM, the Global System for Mobile
Communications, is a digital cellular
communications system
GSM provides Digital Transmission
ISDN compatibility
Worldwide roaming in other GSM networks
Provides a model for 3G Cellular systems (UMTS)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
4/44
4
NomenclatureMS (Mobile Station) = ME (Mobile Equipment )
+SIM (Subscriber Identity Module)
BSS (Base Station Subsystem) = BTS (Base
Transceiver Station) + BSC (Base Station
Controller)
NSS (Network Switching Subsystem)
MSC (Mobile Switching Center): telephony
switching function and authentication of user
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
5/44
5
GSM Protocol Stack
Layer 1: Physical Layer Radio Transmission
Layer 2: Data Link Layer(DLL) provides error-free transmission between adjacent entities, based on the
ISDNs LAPD protocol for the Um and Abis interfaces, and on SS7sMessage Transfer Protocol (MTP) for the other Layer interfaces
Layer 3: Networking or Messaging Layer Responsible for the communication of network resources, mobility, code
format and call-related management messages between various networkentities
- In any telecommunication system, signalling is required to
coordinate the necessarily distributed functional entities of the
network.
- The transfer of signalling information in GSM follows the layered
OSI model
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
6/44
6
GSM Protocol Architecture
Layer 1
Layer 2
Layer 3
TDMA/FDMA
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
7/44
7
Overview of Interfaces
Um
Radio interface between
MS and BTS
each physical channel
supports a number of
logical channels
Abis
between BTS and BSC
primary functions: traffic channel transmission, terrestrial
channel management, and radio channel management A
between BSC and MSC
primary functions: message transfer between different
BSCs to the MSC
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
8/44
8
The data link layer(layer 2)over the radio link is based
on a modified LAPD (LinkAccess Protocol for the Dchannel) referred to asLAPDm (m like mobile).
On the A-bis interface, the layer 2 protocol is based on the LAPDfrom ISDN.
The Message Transfer Protocol (MTP) level 2 of the SS7 protocol isused at the A interface.
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
9/44
9
User Dataand Control at Air
Interface
Two types of ISDN "channels" orcommunication paths:
B-channelThe Bearer ("B") channel: a64kbps channel used for voice,video, data, or multimedia calls.D-channel
The Delta ("D") channel: a 16kbps or 64 kbps channel usedprimarilyfor communications (or"signaling") between switchingequipment in the ISDN networkand the ISDN equipment
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
10/44
10
User Dataand Control at Air
Interface
In GSM: Bm channel for traffic / user data Dm channel for signaling
As in ISDN the Dm channel in GSMcan be used for user data ifcapacity is available.
GSMs Short Message Service(SMS) uses this.
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
11/44
11
Lay
er I:Physical Layer
Radio transmission forms this Layer
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
12/44
12
Layer I: Physical Layer Modulation Techniques Gaussian Minimum Shift Keying (GMSK)
Channel Coding
Block Code Convolutional Code
Interleaving To distribute burst error
Power control methodology to minimize the co-channel interference
Time synchronization approaches
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
13/44
13
GSM Protocol Architecture for Speech
Air IF
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
14/44
14
GSM Physical Layer (MS Side)Speech in GSM is digitally coded ata rate of13 kbps
456 bits every 20 ms
260 bits every 20 ms
857 bits block
GMSK
Convolutional Encoder
184
bits( 20 ms)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
15/44
15
GSM SpeechTransmission
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
16/44
16
GSM Normal Burst Formatting
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
17/44
17
GSM Frame Hierarchy
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
18/44
18
Physical Vs. Logical Channel
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
19/44
19
Logical Channels in GSM
Two major classes of logical channels
Traffic Channels (TCHs)
Control Channels (CCHs)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
20/44
20
Traffic Channels in GSM Two types ofTCHs
Full-rate traffic channel (TCH/F)
Half-rate traffic channel (TCH/H)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
21/44
21
Control Channels in GSM
Three classes of control channels
Broadcast Channels (BCH)
Common Control Channels (CCCH) Dedicated Control Channels (DCCH)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
22/44
22
Layer II:Data Link Layer (DLL)
Error-free transmission between adjacent entities
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
23/44
23
GSM Layer II Connection-based Network
Traffic
Signaling and Control
Signaling and control data are conveyed through Layer II andLayer III messages in GSM
Purpose of Layer II is to check the flow of packets for Layer III
DLL checks the address and sequence # for Layer III
Also manages Acks for transmission of the packets
Allows two SAPs for signaling and SMS
SMS traffic is carried through a fake signaling packet that carries
user information over signaling channels
DLL allows SMS data to be multiplexed into signaling streams
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
24/44
24
GSM Layer II Signaling packet delivered to the physical layer
is 184 bits which conforms with the length of the
DLL packets in the LAPD protocol used in ISDN
network
The LAPD protocol is used for A and A-bis
interface
The DLL for the Um interface is LAPDm
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
25/44
25
LAPDm The Link Access Procedure on the Dm channel
(LAPDm) is the protocol for use by the data link layer on
the radio interface. Functions
organization of Layer 3 information into frames
peer-to-peer transmission of signaling data
in defined frame formats recognition of frame formats
establishment, maintenance, and
termination of one or more (parallel) data
links on signaling channels
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
26/44
26
Frame format (LAPD)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
27/44
27
Frame format (LAPDm)
Address field: is used to carry the service access point identifier(SAPI),
protocol revision type, nature of the messageSAPI: When using command/control frames, the SAPI identifies the user
for which a command frame is intended, and the user transmitting a
response frame
Control field: is used to carry Sequence number and to specify the types of
the frame (command or response)
Length indicator: Identifies the length of the information field that is used todistinguish the information carrying filed from fill-in bits
Information Field: Carries the Layer III payload
Fill-in bits: all 1 bits to extend the length to the desired 184 bits
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
28/44
28
Types ofFrame of LAPDmThree types of frames for
Supervisory functions
Unnumbered information transfer and control functions Numbered information transfer
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
29/44
29
Address field formatof LAPDm
Link Protocol Discriminator: is used to specify a
particular recommendation of the use of LAPDm
C/R: Specifies a command or response frame
ExtendedAddress : is used to extend the address field
to more than one octet (the EA bit in the last octet of the
address should be set to 1, otherwise 0)
Spare: reserved for future use
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
30/44
30
LAPD Vs. LAPDm LAPDm uses no cyclic redundancy check bits for error
detection
WHY?
Error correction and detection mechanism are
provided by a combination of block and convolutional
coding used (in conjunction with bit interleaving) in thephysical layer
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
31/44
31
Layer II Messages- Set asynchronous balanced mode
- Disconnect
- Unnumbered acknowledgement
- Receiver ready- Receiver not ready
- Reject
- These messages are sent in peer-to-peer Layer II communications,
DLL ack.
- These messages do not have Layer III information bits
- Fill-in bits cover the information bits field
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
32/44
32
Layer II Messages (contd)- The Paging Channel (PCH) is 176 bits.
- The DLL packet for this signaling channel only have an EIGHT bit
length of the field
-
184 bits encoded into 456 bits- The 456 bits transmitted over 8 physical NBs
- The Stand-alone Dedicated Control Channel (SDCCH) is 160 bits.
- The DLL packet for this signaling channel has 3 8-bits used for
address, control and length of the information field
- The Slow Associated Control Channel (SACCH) is 144 bits.
- The DLL packet for this signaling channel has 16 fill-in bits and 3 8-bits
used for address, control and length of the information field
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
33/44
33
Layer III:
Networkingor Messaging LayerThe layer 3 protocols are used for the communication ofnetwork
resources, mobility, code formatand call-related managementmessages between various network entities
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
34/44
34
Layer III A number of mechanisms needed to establish, maintain and
terminate a mobile communication session
Layer III implements the protocols needed to support these
mechanisms
A signaling protocol, the registration process, is composed of a
sequence of communication events or messages
Layer III defines the details of implementation of messages on
the logical channels encapsulated in DLL frames
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
35/44
35
Layer III Message Format
Transaction Identifier (TI): to identify a protocol that consists of a
sequence of message, allows multiple protocols to operate in parallel
Protocol Discriminator (PD): Identifies the category of the operation
(management, supplementary services, call control)
Message Type (MT): Identifies the type of messages for a given PD
Information Elements (IE):An optional field for the time that an instruction
carries some information that is specified by an IE identifier (IEI).
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
36/44
36
MM Message Type
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
37/44
37
Layer III Message Radio Resource Management (RR),
Mobility Management (MM) and
Connection Management (CM).
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
38/44
38
Radio Resource Management (RR)
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
39/44
39
Mobility Management (MM)
- Assumes a reliable RR connection
- Responsible for- location managementand- Security
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
40/44
40
Mobility Management (MM)- Location management involves the procedures andsignalingfor location updating, so that the mobiles currentlocation is stored at the HLR, allowing incoming calls to
be properly routed.
- Security involves the authentication of the mobile, to preventunauthorized access to the network, as well as the encryption ofall radio link traffic.
- The protocols in the MM layer involve the SIM, MSC, VLR, andthe HLR, as well as the AuC (which is closely tied withthe HLR).
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
41/44
41
Connection Management (CM)The CM functional layer is divided into three sublayers.
- Call Control (CC)
- Supplementary Services- Short Message Service
Call Control (CC) sub layer
-manages call r
outing, establish
ment,
maintenance,and release, and is closely related to ISDN call
control.
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
42/44
42
Connection Management (CM)Supplementary Services sub layer
- manages the implementation of the varioussupplementary services (Call Forwarding/waiting/hold ),and also allows users to access and modify theirservice subscription.
Short Message Service sub layer
- handles the routing and delivery of short messages,both from and to the mobile subscriber.
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
43/44
43
References 1. Principles ofWireless Networks: A Unified
Approach, K. Pahlavan, P. Krishnamurthy
2. www.chu.edu.tw/~lhyen/wc/gsm.pdf
3. www.hit.bme.hu/~mihaly/mobil.hir/gsmbase.pdf
4. www-rp.lip6.fr/maitrise/articles/Rahnema.pdf
5.opetus.stadia.fi/kurki/Courses/DigMobile/2006_Spri
ng_Course_materilas/DM_7_GSM_Protocol_Architec
ture.pdf
6. Moe Rahnema, Overview of the GSM System and
Protocol Architecture, IEEE Communications
Magazine, April 1993
-
8/7/2019 UseGSM Presentation Shaikot 96234 95599
44/44
44
The ENDThe slide is available at www.cs.okstate.edu/~shaikot
Thank You