Vous êtes sur la page 1sur 152

GSM

Prepared by :
Eng. Mahmoud Yousry

Contents
Introduction
Basic GSM Network Architecture
Air interface
Traffic cases
Planning

Introduction

History of GSM system.


Wireless transmission
Multiple Access Techniques
Wireless Challenges

What is the GSM?


GSM is the Global System for Mobile telecommunications.
It is the European standard for the Mobile
telecommunications and it is considered as one of the most
popular standard worldwide.
It is known as the second generation mobile
telecommunications system 2G system.
It is used in Egypt by the three existing operators; Mobinil
and Vodafone; Etisalat.

Evolution of GSM
1982, CEPT conference is held to specify a common
European mobile telecommunications in the band of 900
MHz.
1987, GSM specs drafted TDMA+FDMA, Time multiplexing
of order 8 with slow frequency hopping.
1992, first GSM network was commercial in Finland .
Global System for Mobile (GSM) is a second-generation
digital cellular telephone system.

Evolution of GSM
1996, first GSM operator in Egypt owned by the
government.
1998, Egypt privatizes its GSM operator.
1998, Click GSM commercial launch.
GSM became the world's leading and fastest growing
mobile standard, spanning over 174 countries, serving
more than one in ten of the world's population.
2000, First GPRS roll out.

What is the GPRS?


GPRS is the General Packet Radio Service.
GPRS is defined by 3GPP (Third Generation Partnership
Project) and is employed to connect mobile cellular users to
PDN (Public Data Network).

Within the GSM network it shares the network databases


and radio access network.
It is known as the 2.5 generation mobile
telecommunications system 2G system.

GSM to GPRS development


GSM offers circuit-switched with good voice quality, but it is
providing data rates of 9.6 kbps which is too slow.
In 1999 General Packet Radio Service (GPRS) reuses the
existing GSM infrastructure to provide higher data rate
It was lunched to increase the data rate to 115 kbps by using
the packet-switched in data transmission and defining new
coding scheme.
In 2001 Evolved Data rate for GSM Evolution (EDGE) offers
data rate of 384 kbps by using new modulation scheme.
Now, EDGE is used in Mobinil the first operator in Egypt.

3G Systems

In 2000 the ITU-T was responsible for the IMT-2000


specification, which is meant to be a guideline for every 3G
standard
Universal Mobile Telecommunication Service (UMTS) is the
marketing name for the 3G has two standardization
bodies:
1- 3GPP which uses the W-CDMA technology.
2- 3GPP2 which uses the CDMA2000 technology.

WCDMA as a 3G Approach
The 3G solution for GSM is called WCDMA (Wideband
CDMA).

WCDMA requires a new radio spectrum as it operates in


ultra wide 5-MHz radio channels.
WCDMA meets the IMT-2000 requirements of 384 kbps
outdoors and 2 Mbps indoors.

Evolution Vs. Time


Functionality
& capabilities

UMTS
capable systems
EDGE
384
kbps

WCDMA
2 Mbps

GPRS
115 kbps

Circuit
data
9.6
kbps
Speech

HSCSD
57.6
kbps
Circuit

Packet
Switched

Switched

1997

1998
Fig 9-1

1999

2000

GSM Data Rates Evolution

2001

2002

Time

Introduction
History of GSM system.
Wireless transmission
Multiple Access Techniques

Wireless Challenges

Wireless transmission

source

Transmission medium

Destination

Wireless transmission
The kinds of transmission medium :
1- Twisted-pair:
It has very low bandwidth and it is easily tapped either
physically or by monitoring its electromagnetic radiation
2- Coaxial cable:
It has greater bandwidth than twisted-pair but it is very
expensive.
3- optical fibers:
It is very high bandwidth , very high bit rate and
inherently transmission medium.

Wireless transmission
4- Radio (wireless):
It is greatly depending on the particular frequency of
the electromagnetic wave
Some of their advantages :
a- They are very flexible and suitable for all terrain.
b- Portable system can be installed very quickly
c- There are often the most cost-effective solution

Wireless transmission

As a summary, the radio transmission is used in case of


mobile telecommunications. Also, the using of Radio
transmission is combined with many problems that
may cause the degradation of the service quality.

Introduction

History of GSM system.


Wireless transmission
Multiple Access Techniques

Wireless Challenges

Multiple Access Techniques

What is the Multiple Access Technique?

It is the use of the same transmission media by more than one user.

It is used because the limitation of transmission resources comparing with


the number of users

Multiple Access Techniques

Multiple Access Techniques


Three types of Multiple Access Technique are available:

Frequency Division Multiple Access (FDMA)


Time Division Multiple Access (TDMA)
Code Division Multiple Access (CDMA)

Multiple Access Techniques

Frequency Division Multiple Access (FDMA), divide the available bandwidth into
smaller bandwidths and allocated to the users.

Strength

f1

f2

f3

Multiple Access Techniques

Time Division Multiple Access (TDMA), allocate the whole available bandwidth to one
subscriber for a certain period of time
Strength
User
User 2,
1, time=t0
time=0

Multiple Access Techniques

Time Division Multiple Access (TDMA) and Frequency Division Multiple Access.

Strength
User 1
User 7
User 2

Multiple Access Techniques


Code Division Multiple Access (CDMA).

Strength

Frequency

Introduction

History of GSM system.


Wireless transmission
Multiple Access Techniques
Wireless Challenges

Wireless Challenges
Radio Communication applied to mobile telephony has the
following limitations :
Powerful transmitters & huge equipment are required.
Capacity is limited to the frequency band allocated.
So, in order to get rid of these shortages the cellular
system is being used in the mobile communications.

Wireless Challenges
The Area to be covered is
divided into small cells.
So,
Low Transmission power.
Smaller equipment size.
Capacity of the system can be increased by
reuse the frequency.

Cell Geometry
The simplest shape is the circular shape
So, why not using this shape???????

Dead Spots

Cell Geometry
So, what are the possible shape and what is the used shape???

Types of Antennas
Two types of antennas are being commonly used; the Omni-directional antenna
and the directional antenna.
A site is the place where the transmission equipment is placed; this maybe on
the top of the buildings or on the top of the advertising.
In case of directional type antenna; one site is corresponding to 3 cells and in
case of Omni-directional antenna one site is corresponding to one cell and one
antenna.

Omni-Directional Cell

Sectorial Cells

Frequency Reuse

As the frequency resources that are given to an operator


Vodafone or Mobinil are limited; the frequency used in a
cell should be reused again in a cell that is away from this
cell in order to increase the capacity of the system.
Moreover, for a certain frequency 8 time slots are used for
more capacity of the system.
So, the access technique that is used is FDMA+TDMA with
frequency reused.

Cellular System Concepts

Reuse Pattern(Cluster):
Cells are grouped into Clusters
Available Band is distributed among
the cells of the cluster
N is the number of cells in a
cluster .
Each frequency is reused after the
same distance D
Reuse Plan = (D/R)= 3N
Where R is the cell radius

3
2

4
1
7

5
6

N=7 Cell Cluster

D
3
3

5
6

3
2

3
2

4
1

4
1
7

5
6

7
5

5
6

7 Cell Reuse Plan

Contents
Introduction
Basic GSM Network Architecture
Air interface
Traffic cases
Planning

Basic GSM Network Structure


Mobil station and SIM card
BSS part
NSS part
OSS
GSM subscriber identifications

Basic GSM Network Structure


PSTN
ISDN
PDN

BSC

MS

BTS
MSC
GMSC

BTS

BSC
VLR
MS

EIR

BTS

AUC

MS

HLR

Basic GSM Network Structure


Mobil station and SIM card
BSS part
NSS part
OSS
GSM subscriber identifications

Mobile Station (MS)


The Mobile Station (MS) is the interface between the user
and the network. The MS consists of two independent parts:
Subscriber Identity Module (SIM) card
Mobile Equipment (ME)

+
The Mobile Equipment is said to be a Mobile Station if the
Subscriber Identity Module ( SIM Card ) is added to it.

Mobile Station (MS)


MS features are defined as mandatory or optional
Mandatory features are:
Display of called number: Check the dialed number
before call setup.
Support of A5/1 and A5/2: Provisions are made for
support of up to seven algorithms as well as the support of
no encryption. It is mandatory for A5/1 and A5/2 and nonencrypted mode to be implemented, but other algorithms are
optional.
Short message indication and acknowledgment: This
feature allows the reception of the delivery report of short
messages to a MS from a service center.
Emergency call capabilities: It must be possible to make
an emergency call even without a valid SIM.

Mobile Equipment (ME)


The MS sends these features to the network when it
is powered on.
Optional features are:
On/Off switch: The MS can be equipped with the
means of switching its power supply on and off.
Short Message Service Cell Broadcast (SMSCB)
screening

Subscriber Identity Module


(SIM) card
A SIM card is an electronic smart card, which stores
information about the subscription.
Thus it contains a microprocessor and a memory
The SIM stores three types of subscriber related
information:
Fixed data stored before the subscription: e.g. IMSI,
authentication key and security algorithms.
Temporary network data: e.g. the location area of the
subscriber and other data of the subscriber.
Service data

Basic GSM Network Structure


Mobil station and SIM card
BSS part
NSS part
OSS
GSM subscriber identifications

Base Station Subsystem (BSS)

BTS

MS

BSC

BSS

The Base Station Sub-system (BSS) is responsible for all the


radio-related functions in the system.

Base Transceiver Station (BTS)


A BTS acts as the interface between MSs and the network, by
providing radio access to the network subscribers.
Converts the GSM radio signals into a format that can be
recognized by the BSC.
Ciphering using the ciphering key.
Channel coding and interleaving.
Records and passes to the BSC the Signal strength
measurements.

Base Station Controller (BSC)

The BSC is the central node within a BSS and co-ordinates the actions of
Base Stations. The BSC controls a major part of the radio network.
Its main functions can be divided into two types:
During Call Set Up:
Finding the called mobile station by paging.
Allocate the frequency for setting the call.
During Call Progress:
Monitoring the call quality.
Controlling the transmitted power to the MS depending
on the location of the MS.
Control the handover for the MS after receiving the
power measurements from the MS and from the BTS.

Base Station Controller (BSC)

TRC Handling
The TRC provides the BSS with rate adaptation
capabilities. This is necessary because the rate used over
the air interface and that used by MSC/VLRs are different 33.8 Kbit/s and 64 Kbit/s respectively. A device, which
performs rate adaptation is called a transcoder.

LAI and CGI


LAI: Location Area Identification.
A location area is determined by the operator and it consists
of one or more BSC coverage area. It is used to control the
subscribers within a coverage area larger than the cell area
and smaller than the MSC coverage area.
LAI consists of MCC (Mobile Country Code) + MNC (Mobile
Network Code) + LAC (Location Area Code 4 hex digit); for
example for Vodafone, Egypt one LAI can be as following:
602 02 8f65

LAI and CGI

CGI: Cell Global Identification.


It is an identifier for the cell of GSM system.
CGI consists of LAI+CI (Cell Identity, 4 hex digit)

Basic GSM Network Structure


Mobil station and SIM card
BSS part
NSS part
OSS
GSM subscriber identifications

Network Switching Subsystem


(NSS)
HLR
AUC
BTS

BSC

MSC/VLR

NSS
BTS

Mobile Switching Center (MSC)


The primary node in a GSM network is the MSC. It is the
node which controls calls establishment. The primary
functions of an MSC include the following:
Switching and call routing to or from MS.
Charging.
Service provisioning.
Control of connected BSCs.
Access to PSTN.
Provides the gateway functionality to other networks.
One MSC controls more than one BSC.

Types of the MSC

There are three types of the MSC, the difference just in the function.

VMSC: Visited MSC

GMSC: Gateway MSC


TMSC: Transit MSC

Visited Mobile Switching Center


Its function is to switch in the level of BSCs and it is combined with a VLR.

MSC/VLR

BSC

BSC

Transit Mobile Switching Center


Its function is to switch between the different
VMSC. It is not combined with a VLR.

TMSC

VMSC

VMSC

Gateway Mobile Switching


Center (GMSC)
Its function is to connect the PLMN to the PSTN or to the
other PLMN existing in the country.
Vodafone

PSTN

Mobinil GMSC

TMSC

VMSC

TMSC

VMSC

VMSC

VMSC

Home Location Register (HLR)


The HLR is a centralized network database that stores and
manages all mobile subscriptions belonging to a specific
operator.
It acts as a permanent store for a persons subscription
information until that subscription is cancelled.
The primary functions of the HLR include:
Stores for each mobile subscriber:
Basic subscriber categories.
Supplementary services.
Current location.
Allowed/barred services.
Authentication data.
Subscription database management
Controls the routing of mobile terminated calls and SMS.

Visitor Location Register (VLR)


The role of a VLR in a GSM network is to act as a temporary
storage location for subscription information for MSs, which
are within a particular MSC service area.
Thus, there is one VLR for each MSC service area. This
means that the MSC does not have to contact the HLR
(which may be located in another country) every time the
subscriber uses a service or changes its status.

The VLR is always integrated with the MSC.

Visitor Location Register (VLR)


For the duration when the MS is within one MSC service
area, then the VLR contains a complete copy of the
necessary subscription details, including the following
information:
Identity numbers for the subscriber
Supplementary service information (e.g. Does the
subscriber has call waiting activated or not)
Activity of MS (e.g. idle or busy)
Current Location Area of MS

Authentication Center (AUC)


To protect GSM systems, the following security functions
have been defined:
Subscriber authentication: by performing authentication,
the network ensures that no unauthorized users can
access the network, including those that are attempting to
impersonate others.
Radio information ciphering: the information sent between
the network and an MS is ciphered. An MS can only
decipher information intended for it.

Authentication Center (AUC)


The information provided by the AUC to ensure authentication
processing is called a triplet and consists of:
A non predictable random number (RAND)
A Signed Response (SRES)
A ciphering Key (Kc)

Triplets
Authentication Center
RAND

SRES

Kc

Triplet
Home Location Register
RAND

SRES

Kc

Triplet
Visitor Location Register
RAND

SRES

Kc

The Ciphering Procedure


To the BSC

From the BSC

DATA

DATA

Base Transceiver Station

Kc

Encrypted
DATA

TDMA
Frame Number

Encryption
Algorithm A5
Encrypted
DATA

Decryption
Algorithm A5

Air Interface
Mobile Station

Encryption
Algorithm A5

Kc
TDMA
Frame Number

DATA

Decryption
Algorithm A5

DATA

The Authentication Procedure


Visitor
LocationSRES
Register
Rand
AUC

SRES AUC

Kc

VLR

Access

SRES MS

Barred

Base Station Subsystem


Rand

SRES MS

SRES MS

SIM Card

Rand

A3

Ki

Rand

A8

Kc

Equipment Identification
Register(EIR)
In order to block the stolen mobiles equipments; the EIR
equipment is used; also in case of the Mobile operator
wants to block a certain type of Mobile phones.
Example, In Turkey all the mobile phones bought from
outside Turkey are blocked and can not be used before
paying fees.
The Mobile equipment is identified by a number called
International Mobile Equipment Identity (IMEI). This
number is uniquely identifies the MS worldwide.

Equipment Identification
Register(EIR)
Because the subscriber and equipment are separate in
GSM, it is necessary to have a separate authentication
process for the MS equipment.
The equipment identification procedure uses the identity
of the equipment itself (IMEI) to ensure that the MS
terminal equipment is valid.

1. IMEI Request

4. Access/ Barring Data


EIR

2. IMEI

3. IMEI Check
MSC / VLR

Equipment Identification
Register(EIR)
International Mobile Equipment Identity (IMEI)
6 Digits

2 Digits

6 Digits

TAC

FAC

SN

IMEI
TAC: Type Approval Code,
The first two digits are the
code for the country
approval
FAC: Final Assembly Code
SN: Serial Number

Short Message Center (SMC)


An SMC is added to a GSM network to provide one or more
of the following messaging services:
Short Message Service (SMS) text messages.
Any service that combined with SMS; like the missed call
notification SMS and the voice mail notification SMS.

Basic GSM Network Structure


Mobil station and SIM card
BSS part
NSS part
OSS
GSM subscriber identifications

OSS

The operation and Maintenance center (OMC) is connected to all


equipment (the GMSC, MSC, HLR, VLR, AUC, EIR and the BSC).

It can be viewed as a computerized monitoring center were staff can


monitor and control the network remotely.

MSC
OMC
LAN

HLR

BSC

SMC

OSS
In the GSM network, the implementation of the OMC is
called the operation and support sub-system (OSS).

OSS is the functional entity from which the network


operator can monitor and control the entire mobile
network.
Other functions provided by the OSS include provision of
network maintenance support as well as customer support.

Basic GSM Network Structure


Mobil station and SIM card
BSS part
NSS part
OSS
GSM subscriber identifications

Subscribers Identities in GSM


In order to identify the subscribers of the GSM system;
the standard defined identities to be assigned to the
subscribers uniquely worldwide.
MSISDN: Mobile Subscriber Integrated Service Digital Number
IMSI: International Mobile Subscriber Identity

MSRN: Mobile Subscriber Roaming number


TMSI: Temporary Mobile Subscriber Identity

GSM Identities
Mobile Station ISDN Number (MSISDN)
20

10

1100477

44

385

196099

CC

NDC

SN

CC

NDC

SN

Vodafone Egypt MSISDN

CC
NDC
SN

: Country Code
: National Destination Code
: Subscriber Number

Vodafone UK MSISDN

GSM Identities
International Mobile Subscriber Identity

(IMSI)

602

02

1234567890

234

15

1234567890

MCC

MNC

MSIN

MCC

MNC

MSIN

Vodafone Egypt IMSI


MCC
MNC
MSIN

: Mobile Country Code


: Mobile Network Code
: Mobile Station Identification Number

Vodafone UK IMSI

GSM Identities
Temporary Mobile Subscriber Identity Number

(TMSI)

The TMSI is allocated to the mobile subscriber in order to be


used instead of his IMSI during all radio communications.
The purpose is to keep subscriber information confidential
on the air interface. So that this make the call is so difficult
to be traced.
The VLR is the device responsible for the allocation of the
TMSI for the mobile subscriber.
This TMSI is changed at certain events or after a certain
time.
The TMSI consists of 4 bytes and determined by the telecom
operator.

GSM Identities
Mobile Station Roaming Number

(MSRN)

When a mobile terminating call is to be set-up, the HLR


of the called subscriber requests the MSC/VLR to allocate
an MSRN to the called subscriber.
This MSRN is returned via the HLR to the MSC where the
calling subscriber exists.
The routing is done using the MSRN. When the routing is
completed, the MSRN is released so it can be used in the
routing of another call.
The MSRN is in the same format like that of the MSISDN.

GSM Identities
On the SIM card the following data is included:
IMSI
TMSI
KI
KC
A3 Algorithm
A8 Algorithm

Contents
Introduction
Basic GSM Network Architecture
Air interface
Traffic cases
Planning

Communication Channels types

Channel Type

Properties

Applications

Simplex

One-way only

FM radio, television

Half duplex

Two-way, only one at a time

Police radio, push-to-talk

Full duplex

Two-way, both at the same


time

PSTN, Mobile systems

A duplex channel, such as that used during a mobile call, uses two
frequencies: one to the MS and one from the MS. The direction from the
MS to the network is referred to as uplink. The direction from the network
to the MS is referred to as downlink.
Because it requires less power to transmit at lower frequency over a
given distance, uplink frequencies in mobile systems are always the lower
band of frequencies this saves valuable battery power of the Mobile
station.

Frequency Allocation
GSM

900

GSM 1800

GSM 1900

Uplink

890-915 MHz

1710-1785 MHz

1850-1910 MHz

Downlink

935-960MHz

1805-1880 MHz

1930-1990MHz

Bandwidth

25 MHz

75 MHz

60 MHz

Duplex Distance

45MHz

95 MHz

80 MHz

Carrier Separation

200 KHz

200 KHz

200KHz

Radio Channels

124

374

299

Frequency

FDMA in GSM

Separation between carriers Frequency gap must be sufficient to eliminate


interference between adjacent channels.

Where The more the separation the less the co-channel interference but the
less the available channels suited in the bandwidth.

It is found that a 200 kHz channel separation is suitable for all systems.

Spectrum Allocation (GSM 900)


Downlink 935 960 MHz

Uplink 890 915 MHz


200 KHz
890.2

890

890.6
3

935

121
121 122 123 124

915

890.4

935.2
1

Uplink

935.6
3

F (MHz)

Downlink
121 122 123 124
121

960

935.4

GSM 900 Frequency Allocation

F (MHz)

TDMA in GSM

With TDMA, one carrier is used to carry a number of calls, each call using that
carrier at designated periods in time .

These periods of time are referred to as time slots .

Each MS on a call is assigned one time slot on the uplink frequency and one
on the downlink frequency, and both the same.

It is found that a 8 Time Slots per carrier, called physical channels is suitable
for all systems.

Information sent during one time slot is called a burst, and depending on
information sent we named what called logical Channels

Physical Channels
GSM band is divided into 124 RF channels, and each channel is
divided into 8 time slots using TDMA.
These time slots are called physical channels.
CH 124

CH 3

CH 2

CH 1

Logical Channels-Traffic Channels


TCH
Traffic Channels
Normal Burst

Speech
TCH/FS

TCH/HS

TCH Traffic Channel


TCH/FS Full rate Speech Channel
TCH/HS Half rate Speech Channel
TCH/9.6 Data Channel 9.6kb/s
TCH/4.8 Data Channel 4.8kb/s
TCH/2.4 Data Channel 2.4Kb/s

Data

TCH/9.6

TCH/2.4

TCH/4.8

Traffic Channels
Carries either encoded speech or user data up and down link between a
single mobile and a single BTS.

Types of traffic channel:


Full rate (TCH)
Transmits full rate speech (13 Kbits/s). A full rate TCH occupies one
physical channel.
Half rate (TCH/2)
Transmits half rate speech (6.5 Kbits/s).
Two half rate TCHs can share one physical channel, thus doubling the
capacity of a cell.

Logical Channels-Control Channels


CCH Control Channels
DCCH
SDCCH

FACCH

BCH
ACCH

BCCH
SACCH

Synch. CH.

CCCH
SCH
RACH

CBCH
PCH/AGCH

FCCH

Control Channels

These are used to carry signaling or synchronization data. They are


divided into three types:-

Broadcast CHannels (BCH)


Common Control CHannels (CCCH)
Dedicated Control CHannels (DCCH)

Broadcast Channels
From Single BTS to all the mobiles in the area

Frequency Correction Control CHannel (FCCH)


Carries information for frequency correction of the mobile

Synchronization CHannel (SCH)


Carries 2 important pieces of information
TDMA frame number (max = 2715684 )
Base station identity Code (BSIC)

Broadcast Control CHannel (BCCH)


Broadcasts some general cell information such as:
Location Area Identity (LAI),
maximum output power allowed in the cell
and the identity of BCCH carriers for neighboring cells.

Common Control Channels


To or from a certain BTS to a single mobile
Paging Channel (PCH)
BTS Transmits a paging message to indicate an incoming call or short message.
The paging message contains the identity number of the mobile subscriber that
the network wishes to contact.

Random Access Channel (RACH)


MS Answers paging message on the RACH by requesting a signaling channel of
SDCCH.

Access Grant Channel (AGCH)


Assigns a signaling channel (SDCCH) to the MS.

Dedicated Control Channels


Stand alone Dedicated Control Channel (SDCCH)
The BTS switches to the assigned SDCCH. The call set-up procedure is performed in
idle mode. The BSC assigns a TCH (carrier and time slot) and the MS switches to
the assigned SDCCH.
SDCCH is also used to Registration & Authentication

Slow Associated Control Channel (SACCH)


BTS Instructs the MS the transmitting power to use and gives instructions on
timing advance (TA).
MS Sends averaged measurements on its own BTS (signal strength and quality) and
neighboring BTSs (signal strength). The MS continues to use SACCH for this
purpose during a call.

Fast Associated Control Channel (FACCH)


Transmits handover information.
Transmits necessary handover information

Burst Structure Types


Normal Burst Structure
TDMA Frame

Tail
Bits

Training
Sequenc
e

Encrypted
Bits

Encrypted
Bits

Tail
Bit
s

156.25 bits in 577 u Sec

57

26

57

Guar
d
Perio
d
8.25

The tail bits help the equalizer to determine the start and stop points of the
transmitted bits. They are three bits at the beginning and at the end of the burst
and they are always zeros

Burst Structure Types


Normal Burst Structure
TDMA Frame

Tail
Bits

Training
Sequenc
e

Encrypted
Bits

Encrypted
Bits

Tail
Bit
s

Guar
d
Perio
d

156.25 bits in 577 u Sec

57

26

57

8.25

The subscriber speech or data is encrypted into 57 bit blocks. Each burst will
contain two 57 bits blocks from two different speech segments(20m Sec).

Burst Structure Types


Normal Burst Structure
TDMA Frame

Tail
Bits

Training
Sequenc
e

Encrypted
Bits

Encrypted
Bits

Tail
Bit
s

Guar
d
Perio
d

156.25 bits in 577 u Sec

57

26

57

One bit stealing flag will be added to each block to


indicate whether the burst is stolen for the FACCH
signaling or used as a normal traffic channel

8.25

Burst Structure Types


Normal Burst Structure
TDMA Frame

Tail
Bits

Training
Sequenc
e

Encrypted
Bits

Encrypted
Bits

Tail
Bit
s

Guar
d
Perio
d

156.25 bits in 577 u Sec

57

26

57

8.25

The guard period of 8.25 bits length, which is equivalent to about 30 s,


is left at the end of each burst, to prevent overlapping between
consecutive bursts and to facilitate burst synchronization

Burst Structure Types


Normal Burst Structure
TDMA Frame

Tail
Bits

Training
Sequenc
e

Encrypted
Bits

Encrypted
Bits

Tail
Bit
s

Guar
d
Perio
d

156.25 bits in 577 u Sec

57

26

57

8.25

It carries information of all logical channels except RACH, SCH and FCCH

Burst Structure Types


Frequency Correction Burst Structure
TDMA Frame

Tail
Bits

Fixed Bits

Tail
Bit
s

156.25 bits in 577 u Sec

142

Guar
d
Perio
d
8.25

This is the one used by the channel (FCH) for frequency correction of the mobile.
It consists of a long sequence of bits called the fixed bits which are all equal to
zeros, leading to a constant frequency output from the GMSK modulator

Burst Structure Types


Synchronization Burst Structure

TDMA Frame

Tail
Bits

Encrypted
Bits

Synchronization
Sequence

Encrypted
Bits

Tail
Bit
s

Guar
d
Perio
d

8.25

156.25 bits in 577 u Sec

39

64

39

The SCH burst consists of a long synchronization sequence along with the important
information being encrypted and divided into two blocks. The TDMA frame number is
sent on the SCH channel, which carries also the Base station Identity code (BSIC).
The TDMA frame number is used by the mobile to determine which control channels
will be transmitted on that frame.

Burst Structure Types


Access Burst Structure
TDMA Frame

Tail
Bits

Synchronization
Sequence

Encrypte
d Bits

Tail
Bits

41

36

Guard Period
68.25

156.25 bits in 577 u Sec

The Access Burst is used by the RACH channel. The mobile sends this burst when
it does not know the distance to its serving BTS, which is the case when the
mobile is switched on or after it makes a handover to a new cell. So this burst
must be shorter in order to prevent it from overlapping with the burst on the next
time slot.

Burst Structure Types


Dummy Burst Structure
0

Tail
Bits

Encrypted
Bits

TDMA Frame

Training
Sequenc
e

Encrypted
Bits

Tail
Bit
s

Guar
d
Perio
d

8.25

156.25 bits in 577 u Sec

58

26

58

The dummy burst is sent from the BTS when there is nothing else to be sent. It
carries no information and it has the same structure of a normal burst with the
encrypted bits replaced by a known bit pattern to the mobile.

1 Hyper frame = 2048 Super frames = 2,715,648 TDMA Frames = 3hrs 28 min and 53.76 s
Hyper Frame
2

e.g. TCH

e.g. BCCH

e.g. TCH

26

57

26

1 Super frame = 51 TCH Multi frames

1 Super frame = 26 BCCH Multi frames

1 BCCH Multi frame = 51 TDMA Frames

1 TCH Multi frame = 26 TDMA Frames

51

26

57

Normal burst

156.25 bits in 577 m Sec

e.g. BCCH

8.25

51

Power Measurements in Active Mode


1.

2.
3.

To enable the mobile from making power measurements during a call, the
uplink time slot will be delayed by an offset of three time slots from the down
link time slot. (The mobile will try to measure the signal strength of these
carriers one by one during the time between transmission and reception of the
allocated traffic channel)
The mobile is informed on the SACCH channel which BCCH frequencies to be
measured.
To make sure that the measured carriers do not belong to co-channel cells, the
mobile will have to check the identity of the adjacent cells by reading the BSIC
value sent on the SCH of each cell. This will take place during the idle frame
number 26.

4.

(Note) The signal strength of the serving cell is measured during reception of the
allocated traffic channel.

The mobile will make a list of the strongest six carriers and their BSIC values
along with the signal strength of its cell, and reports this list to the BSC via the
uplink SACCH channel which is repeated once every 26 frame.

Radio Transmission problems

As it was stated before that the mobile telecommunications will use radio
transmission as the transmission technique; the radio transmission is suffering
from many problems which causing unacceptable degradation of the service
quality.
We will discuss these problems in details during our course.

Radio Transmission problems

1.

Path Loss

2.

Shadowing (Normal Fading)

3.

Multipath Fading

a. Rayleigh Fading
b. Time Dispersion
4.

Time Alignment

Radio Transmission problems

1. Path Loss
Cause

Due to Increasing distance between MS, and BTS.


Solution
Handover

Radio Transmission problems

2. Shadowing (Normal Fading)


Cause

Due to Obstacles between MS, and BTS.


Solution

increase the fading margin for the receiver in the mobile


station and at the Transceiver station of the mobile network; so that how
weak the signal received is the receiver will still can receive and regenerate
this signal.

Radio Transmission problems


3. Multipath Fading
a. Rayleigh Fading
Cause

Due to different paths of signals between MS, and BTS.


Which cause fading dips as a result of different in phase and amplitude
Solution
Diversity

a. Space Diversity
b. Polarization Diversity
c. Frequency Diversity ( Frequency Hopping)

Radio Transmission problems


3. Multipath Fading
b. Time Dispersion
Cause

Due to different paths of signals between MS, and BTS.


Which cause Intersymbol Interference (ISI)
Solution
Adaptive Equalizer, by using training sequence in bursts

Radio Transmission problems

4. Time Alignment

Cause
Due to different distance of different MSs from BTS (Near-Far)
Solution

Time Advance

Contents
Introduction
Basic GSM Network Architecture
Air interface
Traffic cases
Planning

Traffic cases
Location update
Handover
Mobile originating a call
Mobile terminating a call
SMS

Location Update
Why do we need to update our location data ?
Actually, the location update process is done in aim to exactly identify
the location of the subscribers within the network so that any incoming
call goes directly to the called subscriber.
To fulfill this aim, one can say that we may update the system with the cell ID each
time the subscriber changes his serving cell. The MSC/VLR will now know the exact
cell you are roaming in. This will result in a huge amount of location update
messages.

An extreme is never to make a location update and to be paged in all the network.
This will cause huge amount of paging messages.

Location Update

Types of Location Update


1. Normal Location update within same MSC/VLR service area
2. Normal Location update between 2 different MSC/VLR service areas

3. IMSI attach/detach
4. Periodic Location Update

Normal Location within the same


MSC/VLR Service area
4
MSC/VLR

Updates
LA Record

1. The Mobile sends an SDCCH allocation


request message to the BTS on RACCH
2. The BTS responds with the SDCCH
allocation message on AGCH .

BSC

3. The mobile sends a location update


request message with its IMSI to the
MSC/VLR on SDCCH
4. The MSC/VLR updates the location
information and sends a Location Update
confirmation message on SDCCH
5. SDCCH is released

Normal Location Update between 2


different MSC/VLR service areas
1. The mobile sends a location
update request to the MSC.

VLR Address
=
New
Old MSC
VLR

HLR

IMSI to MGT
translation

2. The new MSC/VLR receives the IMSI


and conclude the its HLR address.
3. The MSC/VLR sends a subscriber
information request with the IMSI
to the proper HLR

Old MSC/VLR

New MSC/VLR

Old BSC

NEW BSC

4. The HLR stores the address of


the new MSC/VLR

5. The HLR sends the data to the


new MSC/VLR and it is kept there
6. The HLR sends a location
cancellation message to the old
MSC/VLR to remove the data

7. The new MSC/VLR sends a location


updating confirmation message to
the mobile

LA 2
LA 1

IMSI Detach
1. At power off, the MS asks for a signaling SDCCH channel.

2. The MS uses this signaling channel to send the IMSI detach message to the
MSC/VLR.
3. In the VLR, an IMSI detach flag is set for the subscriber. This is used to reject
incoming calls to the MS.
4. The subscribers record is kept in the VLR for a certain time; i.e. 24 hour then
it is removed if the subscriber doesnt switch on his mobile.

IMSI Attach
IMSI attach is a complement to the IMSI detach procedure. It is used by the
mobile subscriber to inform the network that it has re-entered an active state
and is still in the same location area. If the MS changes location area while
being switched off, a normal location update takes place.
1. The MS requests a signaling SDCCH channel.
2. The MSC/VLR receives the IMSI attach message from the MS.
3. The MSC/VLR sets the IMSI attach in the VLR. The mobile is now ready
for normal call handling.

4. The VLR returns an acknowledgment to the MS.

IMSI Attach

BSC

MSC/VLR
3

Periodic Location Update

Periodic location update is a routine task performed by the network if the


MS doesnt make any network action (sets a call, sends SMS, location
update, receives a call,. etc)
If the MS doesnt respond to this periodic location update, it will be marked
as implicitly detached. ( Temporarily out of service )

Traffic cases
Location update
Handover
Mobile originating a call
Mobile terminating a call
SMS

Handover

Handover is to keep continuity of the call when the subscriber is


roaming along the network moving from one cell to another and
moving between different nodes in the network.

During call, the MS is continuously measuring transmission quality


of neighboring cells and reports this results to the BSC through the
BTS.

The BSC, being responsible on supervising the cells, is responsible


of handover initiation.

Good neighbor relations between cells is an important factor in


keeping the network performance in the accepted level.

Types of Handover
1. Intra BSC Handover:
When the cell to which the call will be handed over belongs to the same BSC of the
serving cell.

2. Inter BSC / Intra MSC Handover:


When the cell to which the call will be handed over belongs to the different
BSCs but to the same serving MSC.

3. Inter MSC
When the cell to which the call will be handed over belongs to the different BSC
and different MSC.

1.

BSC
7

8
2

The BSC decides from the power measurement


reports that the call must be handed over to
another cell
2. The BSC checks for an vacant traffic TCH in the
new cell and orders this cell to activate the TCH

3. The BSC orders the serving cell to send


a message to the MS on FACCH telling the
information
of new TCH

4. The MS tunes to the new frequency and


3

Sends handover access burst


New Cell

6
5

5. The new cell detects the handover burst


and sends information about the suitable
timing advance to the MS

6. The MS sends a HO complete message to the new cell


7. The new cell sends a message to the BSC that
the handover is successful

8. The BSC orders the old Cell to release the TCH

MSC/VLR

Old BSC

New BSC

Old MSC

Old BSC

New MSC

New BSC

Traffic cases
Location update
Handover
Mobile originating a call
Mobile terminating a call
SMS

MSC

BSC

1. The MS uses RACH to ask for a signaling channel.


2. The BSC/TRC allocates a signaling channel, using
AGCH.
3. The MS sends a call set-up request via SDCCH to the
MSC/VLR. Over SDCCH all signaling preceding a
call takes place. This includes:

Marking the MS as active in the VLR

The authentication procedure

Start ciphering

Equipment identification

Sending the B-subscribers number to the network

Checking if the subscriber has the service Barring


of outgoing calls activated
4. The MSC/VLR instructs the BSC/TRC to allocate an
idle TCH. The BTS and MS are told to tune to the
TCH.
5. The MSC/VLR forwards the Bnumber to an exchange
in the PSTN, which establishes a connection to the
subscriber.
6. If the B-subscriber answers, the connection is
established.

Traffic cases
Location update
Handover
Mobile originating a call
Mobile terminating a call
SMS

1. Calling a GSM
subscribers
2. Forwarding call to
GMSC
3. Signal Setup to HLR
4. 5. Request MSRN from
VLR
6. Forward responsible
MSC to GMSC
7. Forward Call to current
MSC
8. 9. Get current status of
MS
10.11. Paging of MS
12.13. MS answers
14.15. Security checks
16.17. Set up connection

Traffic cases
Location update
Handover
Mobile originating a call
Mobile terminating a call
SMS

Short Messages

The Short Message Service (SMS) allows a mobile subscriber to send and
receive text messages composed of 160 characters at most.
These messages can be read on the phones LCD panel and they are delivered
using the signaling channel SACCH; so short messages can be received while a
call is in progress.
The short messages sent or received are handled by the Short Message Service
Center (SMSC), which consists of three parts:
Service Center
SC
Short Message Service GMSC
SMS-GMSC
Short Message Service Inter-working MSC
SMS-IWMSC

Short Message Delivery


Process
SC
4

SMS-IWMSC

SMS-GMSC

6
7
MSC1

MO

HLR

MSC2

MT

MT

Unsuccessful delivery
SC

SMS-IWMSC

SMS-GMSC

5
MSC2
3

4
HLR
6

Retry method
Usage of Alert Service Center in the HLR

MT

Contents
Introduction
Basic GSM Network Architecture
Air interface
Traffic cases
Planning

GSM Coverage Plan

To provide coverage for a large service area of a mobile network


we have two Options:

(A) Install one transceiver with high radio power at the center of
the service area
Drawbacks:
The mobile equipments used in this network should have
high output power in order to be able to transmit signals
across the coverage area.
The usage of the radio resources would be limited.

GSM Coverage Plan


(B) Divide the service area into smaller areas (cells)
Advantages:
Each cell as well as the mobile handsets will have
relatively small power transceivers.
The frequency spectrum might be reused in two far
separated cells. This yields:
1- Unlimited capacity of the system.

2- Good interference characteristics

Cell Geometry
Problem of omni directional antennas

Dead Spots

Cell Geometrical Shape


Differentiation between these three shapes will be in order to
optimize the number of cells required to cover a given service area
against the cell transceiver power. By some calculations, you will find
that using hexagonal shaped cells achieves the optimum.

Cell Geometrical Shape


Umbrella Cell

Normal Cell

Normal Cell

Cell Geometrical Shape


Umbrella cell

Fast moving
subscribers

Pico
cell

Macro cell

Slow moving
subscribers

In building
coverage

Clusters
Cluster is a set of cells where the
frequency is not being reused
within this cluster.
Cluster can be 3, 4, 7 and 9 cells.

Sectorization

Omni-Directional Cell

sectroized Cells

3/9 Cluster
A3

B3
A2

A1
A3

B3
A2

A1

C1
A3

A2

B3
A2

A1

C3

B1

C1
A3

C2
C1

A2
A1

C3
C2
C1

C3
C2
C1

B2
B1

C3
B2

B1

B2
B1

A2

B3

A1

B3

A1

A2

B3

C1

C2

A3

C2

A3

C1

C2

C3

B1

B2

B2
B1

B2

C3

B1

B2

C3

A1
B3

A1

B3
A2

C2

A3

C2

A1
A3

C1

B3

A2

B1

B2

C3

B2

C3

B1

A3

C2
C1

4/12 Cluster
A3

B3
A2

A1

A3
B2

B1
C3

A1

C2
A3

B3
A2

A1

A3
B2

B1
C3

C1
B3

A1

A3
B2

B1
C3

A2
B1

C1

D2
D1

B2
B1

C3

D3
C2

D2
D1

D1

A2

D3

D2

B3

A1

C2

C1

C2

A3

B1

D3

C1

B2

C3

D3

C3

D1

A2

B2
B1

D2

B3

A1

C2

D2
D1

A3

B2

C3

D3

C1

D1
B3

A1

C2
C1

C1

D1

A2

D3

D2

B3

A1

C2

D2

C2

A3

B1

D3

C1

B2

C3

D3

C3

D1

A2

B2
B1

D2

B3

A1

C2

D2
D1

A2

B1

A1

C2

A3

B3

A2

D3

C1

B2

C3

D3
C2

A3

A2

B2

C3

D1

A3

B1

D2

B3

A1

A2

D3

C1

B3

C1

D2
D1

A3

E3
A2

A1
B3

E2
E1

D3
B2

B1

7/21 Cluster

D2
D1

C3

B3

A3
A2
A1

B1

D1

F1

C2
C1

A1

B2

G2
G1

B1

D2

C3

F2
F1

G3
C2

C1

C1

G2
G1

F2
F1

G3
C2

F3

D1

D2

C3

E1

F3

D1

E2

D3

E1

B2

E3

E2

D3

B1

A2

B3

A1

G2

A3

E3

A2

B3

G1

F2

G3

F1

C2

F3

A3
F2

G3

C1

D2

C3

D1

E2

D3

F3
D2

C3

E1

B2

D3

B1
E3

E2
E1

B2

G2
G1

B3

A1

F1

C2

E3

A2

F2

G3

C1

A3

F3

G2
G1

Frequency Reuse
If the GSM900 system has 124 Absolute Radio Frequency Traffic
Channels, and if we are using only in our network 60 of them, then
we can only serve 8 x 60 = 480 Calls if we only use the frequency
once.
However, a cellular network overcome this constraint and
maximizes the number of subscribers that it can serve by using
frequency re-use.

The frequency reuse is performed by dividing the whole available


frequencies between a group of neighboring cells which is called
frequency reuse pattern or a Cluster, and then repeat this cluster
over the whole network

Co- Channel Interference


Co-channel interference is caused by short distance between the cell
and other cell that use the same frequency.

To overcome this type of interference. Each frequency is reused after


the same distance D
Reuse Plan = (D/R)2 = 3N.
cluster

Where N is the number of cells per

Adjacent Channel Interference


Adjacent frequencies, that are frequencies shifted 200kHz from the
carrier frequency, must be avoided in the same cell and preferably in
neighboring cells also .

To overcome this type we must make good planning for the frequencies
in the cluster

Frequency Planning
A3

B3
A2

A1

A3

B1

B3
A2

A1

C3
B2

C1
B3

A3
A2

C2

C1

A3
C2

B1
C3

B2

A1

B3

A2
A1

B2
B1

C3
B2

B1

C2
C1

C3
C2
C1

Frequency
group
Channels

A1

B1

C1

A2

B2

C2

A3

B3

C3

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

Frequency Planning

In a real network the allocation of channels to cells will not be


as uniform as in table, as some cells will require more channels
and some will require less.
In this case, a channel may be taken from a cell with low
traffic load and moved to one with a higher traffic load.
However, if doing so, it is important to ensure that
interference is still minimized.

Which Cluster Size to use?

Carrier to interference ratio


Its the difference in power level between the carrier in a given cell and the same
carrier received from the nearest cell that reuses the same frequency.

Number of frequencies
per site

Traffic Channels

3/9

High

High

Low

4/12

Medium

Medium

Medium

7/21

Low

Low

High

C/I Ratio

END

Vous aimerez peut-être aussi