Vous êtes sur la page 1sur 202

1

UTL Technologies Ltd www.utltraining.com


Global system for
Mobile communication

UTL Technologies Ltd www.utltraining.com


3

UTL Technologies Ltd www.utltraining.com


INTRODUCTION

UTL Technologies Ltd www.utltraining.com


Multiple Access Method :
It determines how several users can share a medium with
minimum or no interference.
Access Methods
 FDMA (Frequency Division Multiple Access)
 TDMA (Time Division Multiple Access)
 CDMA (Code Division Multiple Access)

UTL Technologies Ltd www.utltraining.com


Frequency Division Multiple Access
(FDMA) :

An approach to sharing a channel by


separating the simultaneous users in
frequency

UTL Technologies Ltd www.utltraining.com


FDMA
c
f

UTL Technologies Ltd www.utltraining.com


Time division multiple access
(TDMA)

Approach for allotting single-channel


usage amongst many users, by
dividing the channel into slots of time
during which each user has access to
the medium.

UTL Technologies Ltd www.utltraining.com


TDMA

c
f

9
2.17.1
UTL Technologies Ltd www.utltraining.com
TDMA / FDD

c
f

10
2.18.1
UTL Technologies Ltd www.utltraining.com
Code Division Multiple Access
(CDMA) :

Approach for allotting the channel


usage amongst many users, by
converting the speech signals of all
users in to different codes.

11

UTL Technologies Ltd www.utltraining.com


CDMA

12

UTL Technologies Ltd www.utltraining.com


How CDMA uses codes to the actual data?

User Data : 1011 (to be transmitted)


PN Code : 110101
Transmitting Data : 001010 110101 001010 001010

Receiving Data : 001010 110101 001010 001010


PN Code : 110101
Final Data : 111111 000000 111111 111111
Received Data : 1011

13

UTL Technologies Ltd www.utltraining.com


How CDMA uses codes to the actual data?

14

UTL Technologies Ltd www.utltraining.com


What we do, we can undo

15

UTL Technologies Ltd www.utltraining.com


16

UTL Technologies Ltd www.utltraining.com


EVOLUTION MOBILE COMMUNICATION

AMPS D-AMPS TD-SCDMA

TACS IS-95 CDMA 2000


GPRS
2.5G UMTS/
NMT GSM
W-CDMA

ANALOG DIGITAL IMT-2000


1G 2G 3G

17

UTL Technologies Ltd www.utltraining.com


ANALOG MOBILE COMMUNICATION

Advanced Mobile Phone Service


AMPS
US based, 800 MHz band
Total Access Communication
TACS
System UK based, AMPS in 900
MHz band
NMT Nordic Mobile Telephone System
Scandinavian, Both in 450 MHz
ANALOG
SYSTEM and 900 MHz band
1G
18

UTL Technologies Ltd www.utltraining.com


DIGITAL MOBILE COMMUNICATION

Dual mode AMPS


US, Analog signaling and Digital voice
D-AMPS coding

IS-95 IS-95
US, CDMA based

GSM GLOBAL SYSTEMS FOR MOBILE


COMMUNICATIONS
DIGITAL European standard, Both in 900 MHz
SYSTEM & 1800 MHz band
2G
19

UTL Technologies Ltd www.utltraining.com


Comparison of 4G with Other Mobile Technologies
Technology 1G 2.5G 3G 4G
2G

Design began 1970 1985 1990 2000


1980

Implemen- 1984 1999 2002 2010?


tation 1991

Service Analog voice Higher- Higher- Higher


and capacity data capacity data capacity
Digital voice and
data Transfer Transfer with multimedia
data (SMS)
(internet) more data
rates
Standards AMPS,TACS, GPRS,EDGE, UMTS/WCDM Single
Cdma A, standard
CDMA,GSM,
20001XRTT CDMA2000
1xEVDO etc
Data Rate 1.9kbps 384kbps 2Mbps 200Mbps
14.4kbps

Multiplexing FDMA TDMA,CDMA CDMA CDMA?


TDMA,CDMA
20

UTL Technologies Ltd www.utltraining.com


Why GSM?

GSM gives mobility without any loss in


Audio quality
Encryption techniques used gives high
security
Bit Interleaving for high efficiency in
Transmission.

21

UTL Technologies Ltd www.utltraining.com


Variable Power (Power budgeting-
extend battery life)
Minimum Interference (DTX)
Support International Roaming
SMS (Short Message Services)

22

UTL Technologies Ltd www.utltraining.com


GSM System specifications
Frequency band
Uplink : 890 MHz-915 MHz
Downlink : 935 MHz-960MHz 25 MHz

Duplex distance : 45MHz


Carrier separation : 200KHz
Modulation : GMSK
Access method : FDMA/TDMA
Speech Coder : RPE-LTP-LPC
(Regular Pulse Excitation - Long Term Predictive
- Linear Predictive Coder)

23

UTL Technologies Ltd www.utltraining.com


What are the types in GSM Network?

GSM-900 (Channels 125, spacing 45Mhz)

GSM -1800 (Channels 374, spacing 95Mhz)

Due to frequency, a BTS transmitting information at


1800MHz with an output power of 10 Watts will
cover only half the area of a similar BTS transmitting
at 900MHz. To counteract this, BTSs using
1800MHz may use a higher output power.
24

UTL Technologies Ltd www.utltraining.com


Frequency Resource

GSM900 :
Up link: 890~915MHz
Down link: 935~960MHz
Duplex interval: 45MHz
Bandwidth: 25MHz
frequency interval: 200KHz

25

UTL Technologies Ltd www.utltraining.com


GSM1800 :
Up link: 1710-1785MHz
Down link: 1805-1880MHz
Duplex interval: 95MHz
working bandwidth: 75MHz
frequency interval: 200KHz
GSM1900MHz:
Up link :1850~1910MHz
Down link:1930~1990MHz
Duplex interval: 80MHz
working bandwidth: 60MHz
frequency interval: 200KHz 26

UTL Technologies Ltd www.utltraining.com


Frequency Resource

Single Band Network General Priority

Which one?
900MHz High

1800MHz

Low
1900MHz
New Operator
Reason
Propagation
Characteristic
For Operator For Subscriber 27

UTL Technologies Ltd www.utltraining.com


Frequency Resource
Single Band Network

Single Band 900MHz

Dual Band 1800MHz

Triple Band 1900MHz

The network determines the handsets to be


selected.
But nowadays, most handsets support dual band.
28

UTL Technologies Ltd www.utltraining.com


Frequency Resource
Single Band Network
Cell coverage radius :

We know

Propagation characteristic

The higher the propagation


frequency 900MHz
1800MHz
The higher the propagation loss
1900MHz
The smaller the cell coverage radius.
29

UTL Technologies Ltd www.utltraining.com


System GSM 900 GSM 1800 GSM 1900

1.Frequencies 890 - 915 MHz 1710 1785 MHz 1850 1910 MHz

Uplink

Down Link 935 960 MHz 1805 1880 MHz 1930 1990 MHz

2.Wavelength 33cm 17cm 16cm

3.Band Width 25MHz 75MHz 60MHz

4.Duplex Distance 45MHz 95MHz 80MHz

5.CarrierSeparation 200kHz 200kHz 200kHz

6.Radio Channels 125 375 300

30

UTL Technologies Ltd www.utltraining.com


Case Study 3:

Why different bands of frequencies


are required for operators?
What is the difference between
different bands of GSM frequencies?
Why uplink frequency is less
compared to down link frequency?

31

UTL Technologies Ltd www.utltraining.com


CELLULAR CONCEPT

32

UTL Technologies Ltd www.utltraining.com


Wireless Communication

U
z

PL
MH

IN
DO
z
MH

K
0.2

W
89

NL
5.2

I
NK
93
A pair of RF channels require per
active call
Up link & down link frequency
difference 45 MHz
33

UTL Technologies Ltd www.utltraining.com


Access Techniques
Uplink 890 MHz to 915 MHz
Down Link 935 MHz to 960 MHz
25 MHz divided into 125 channels of 200 KHz
bandwidth ( 25 / 0.2 = 125)
5 MHz BW allocated to each Cellular Service
Provider( Maximum 5 operator )
UP 890.0 890.2 890.4 914.8 915.0

DOWN 935.0 935.2 935.4 959.8 960.0

34

UTL Technologies Ltd www.utltraining.com


What is ARFCN ?

ARFCN--> Absolute Radio Frequency Channel


Number used to express one pair of RF channels
ARFCN = (fUP -890) / 0.2 or (fdown -935) / 0.2
ARFCN 1 2 124 125

UP 890.0 890.2 890.4 914.8 915.0

DOWN 935.0 935.2 935.4 959.8 960.0

fup=890+0.2*n; fdown=935+0.2*n;
35

UTL Technologies Ltd www.utltraining.com


TDMA FRAME AT AIR INTERFACE

ARFCN 1 TDMA FRAME PER ARFCN


ARFCN 2
890.2 T0 T1 T2 T3 T4 T5 T6 T7
ARFCN 3
5 ARFCN 4
MHz 935.2 T0 T1 T2 T3 T4 T5 T6 T7
.
A R F C N 24

A R F C N 25

UPLINK & DOWNLINK USE SAME ARFCN


FOR A
UPLINK & DOWNLINK USE SAME TIME SLOT NUMBER
PARTICULAR 36
MS UPLINK LAGS DOWNLINK BY 3 TIME SLOT PERIOD
UTL Technologies Ltd www.utltraining.com
What is the problem with one cell?

One BTS is covering whole city


All 25 ARFCN are used

Problem with High power Transmission


----Talk time supported by battery will be less
----Human body Hazards
Limited Capacity of the Network due
to limited spectrum
High Transmission 37
Power Required
UTL Technologies Ltd www.utltraining.com
Maximum Capacity with one cell
ARFCN 1 TDMA FRAME PER ARFCN
ARFCN 2
T0 T1 T1 T3 T4 T5 T6 T7
ARFCN 3
5 ARFCN 4
MHz
.
A R F C N 24

A R F C N 25

5 MHz / 0.2 MHz = 25 CHANNEL


8 MOBILES CAN SHARE ONE CHANNEL BY TDMA
38
MAXIMUM ACTIVE CALL AT A TIME = 25 * 8=200
UTL Technologies Ltd www.utltraining.com
Cellular Structure

39

UTL Technologies Ltd www.utltraining.com


GSM Concepts - Cellular Structure
Cell: A cell is the basic geographic unit of a cellular
system and is defined as the area of radio
coverage given by one BS antenna system.

Classification of cells in GSM Network:

1. Large Cells:
large cells are employed in
1. Remote areas.
2. Coastal regions.
3. Areas with few subscribers.
4. Large areas which need to be covered with the
minimum number of cell sites
40

UTL Technologies Ltd www.utltraining.com


Small Cells or Micro Cells:
Urban areas.
Low transmission power required.
High number of MSs.
However, micro cells are cells where the antenna
height is under the average roof top level and
they are typically used in urban areas.
Pico cells :
The Pico cells are small cells whose diameter
is a few dozen meters and are mainly used
indoors. 41

UTL Technologies Ltd www.utltraining.com


Umbrella Cells

Umbrella cells are used to cover


shadow regions of smaller cells and fill
in gaps in coverage between those
cells. These cells are usually built on
top of tall buildings or in other high
ways.

42

UTL Technologies Ltd www.utltraining.com


Case Study 4 :

How a cell site will be planned in


the network?... Reg.Drive Test &Planning.

43

UTL Technologies Ltd www.utltraining.com


What is a Cluster ?

A Cluster is a group of cells. No


channels are reused within a cluster. If a
cluster has 3 cells, it is called 3 cell
cluster, if a cluster has 4 cells, it is called
4 cell cluster, and if it is 7 cells, it is
called 7 cell cluster.

44

UTL Technologies Ltd www.utltraining.com


Frequency reuse : The concept of using the same
frequencies again and again is called frequency
reuse.
Cellular
Networking technology
2 that breaks geographic
area into cells shaped like
2 7 honey comb
7 3 1 Cell
1 6 Area of coverage provided
4 2 by one or more Radio
6 5 terminals(TRX)
5 2 7 TRX => TX + RX
7 3 1
1 6
4
6 5
45
5
UTL Technologies Ltd www.utltraining.com
4 Cell Cluster

46

UTL Technologies Ltd www.utltraining.com


7 cell Cluster

47

UTL Technologies Ltd www.utltraining.com


12 Cell Cluster

48

UTL Technologies Ltd www.utltraining.com


GSM Concepts - Cellular Structure
To Overcome Network Congestion problem, We can
add more channel in that particular cell
2

2 7
10
7 3 1

1 6
15
8 4
6 5

5
To Overcome Coverage problem, We have to install 49
UTLnew BTS inLtd
Technologies that nearby location www.utltraining.com
Case Study 5:

How frequency planning will be done


generally in cell sites?
How sectorization will be done in cell
sites?

50

UTL Technologies Ltd www.utltraining.com


GSM NETWORK ARCHITECTURE

51

UTL Technologies Ltd www.utltraining.com


GSM Architecture

52

UTL Technologies Ltd www.utltraining.com


GSM - Network Structure
MS
Um

BTS VLR HLR

BSC
Abis MSC
A
MS AuC
BTS GMSC

Abis
EIR
A
MSC

BSC PSTN
Um
BTS
VLR
OMC Server
53

UTL Technologies Ltd www.utltraining.com


54

UTL Technologies Ltd www.utltraining.com


Mobile Station (MS)

Mobile Mobile
Handset + SIM => Station

Hand portable unit


Frequency and Time Synchronization
Voice encoding and transmission
Voice encryption/decryption functions
Power measurements of adjacent cells
Display of short messages
55

UTL Technologies Ltd www.utltraining.com


GSM Identifiers
Subscriber Identities - MSISDN

Human Identity to call a MS


MSISDN uniquely identifies a mobile
subscriber in PSTN
Calls will be routed from the PSTN and other
networks based on MSISDN number.
MSISDN= CC + NDC + SN
CC= Country Code (91)
NDC= National Destination Code(9848)
SN= Subscriber Number (012345)
56

UTL Technologies Ltd www.utltraining.com


International Mobile Subscriber Identity [IMSI]
A subscriber is always identified within the GSM
network by the IMSI
- Used for all signaling in the PLMN.
- Stored in the SIM, HLR & VLR.
- The IMSI consists of three different parts.
IMSI= MCC + MNC + MSIN
(Maximum of 15 digits) = (3 digits)+(1-2digits)+
(maximum 11 digits)
MCC = Mobile Country Code
MNC = Mobile Network Code
MSIN = Mobile Station Identification Number 57

UTL Technologies Ltd www.utltraining.com


Temporary Mobile Subscriber Identity [TMSI]

The TMSI is used for the subscribers


confidentiality.
It should be combined with the LAI to
uniquely identify a MS.
Since the TMSI has only local significance (that
is, within the MSC/VLR area), the structure may
be chosen by each administration.
The TMSI should not consist of more than four
octets.
58

UTL Technologies Ltd www.utltraining.com


International Mobile Equipment Identity [IMEI]

The IMEI is used for equipment identification.


An IMEI uniquely identifies a mobile station as a piece
or assembly of equipment.
IMEI = TAC + FAC + SNR + sp
TAC= Type Approval Code (6 digits),determined by
GSM body
FAC= Final Assembly Code (2 digits), identifies the
manufacturer
SNR= Serial Number (6 digits), uniquely identifying all
equipment within each TAC & FAC
sp = Spare for future use (1 digit)
59

UTL Technologies Ltd www.utltraining.com


Subscriber Identity Module (SIM)
Portable Smart Card with memory
(ROM- 6 to 16KB, RAM- 128 to 256KB, EEPROM- 3 to8KB
A3/A8 algorithm)

Dynamic Information SIM


Temporary Mobile Subscriber identity (TMSI)
Cell Identity (CID)
Location Area Identity (LAI)
Phone memories, billing information
Ability to store Short Messages received
60

UTL Technologies Ltd www.utltraining.com


Static Information on the SIM card:
International Mobile Subscriber Identity
(IMSI) = (MCC + MNC+MSIN)
Personal Identification Number (PIN)
Authentication Key (Ki)
MSISDN (Mobile Number)

61

UTL Technologies Ltd www.utltraining.com


Base Transceiver Station (BTS)

Consists of one or more radio terminals (TRX) for


transmission and reception
Each TRX represents an RF Channel(ARFCN)
TRX and MS communicates over Um interface
BTS Hardware : TRX, Combiner, Splitter, OMU etc..
BTS Type: Omnidirectional, Bi-directional(2 Sector)
& Sctorised (3 Sector)

62

UTL Technologies Ltd www.utltraining.com


BTS Hardware : TRX, Combiner,
Splitter, OMU, Filters, Multi
couplers, Power Supply Modules
etc..
BTS Type: Omni-directional,
Bi-directional(2 Sector) & Sctorised
(3 Sector)

UTL Technologies Ltd


63
www.utltraining.com
UTL Technologies Ltd www.utltraining.com
1 sector
3 sectored

2 sectored
UTL Technologies Ltd 64

UTL Technologies Ltd www.utltraining.com www.utltraining.com


Sectorised BTS Configuration

BTS
CONFIGURATION TRX 1 TRX 4
SECTOR 1
1+1+1 ARFCN 1 ARFCN 10

BTS
CONFIGURATION
2+2+2 TRX 2 TRX 5
SECTOR 2
ARFCN 4 ARFCN 13

Maximum 12 TRX
(4+4+4) TRX 3
TRX 6 SECTOR 3
ARFCN 7
ARFCN 16 65

UTL Technologies Ltd www.utltraining.com


Base Station Controller (BSC)

External Interfaces
Abis interface towards the BTS
A interface towards the MSC
Monitors and controls several BTSs
Management of channels on the radio interface
Performs inter-cell Handover
Interface to OMC for BSS Management

66

UTL Technologies Ltd www.utltraining.com


BSS Configurations
The connectivity between BTS and BSC may
be through Optical Fiber or Micro Wave Link.

UTL Technologies Ltd 67

UTL Technologies Ltd www.utltraining.com www.utltraining.com


Case Study 6: BTS and BSC configurations

How BTS will be configured?


How BSC will be configured?
How many BTS will be connected to
a BSC?
How BTS will be connected to a
BSC?

68

UTL Technologies Ltd www.utltraining.com


Gateway Mobile Switching Center (GMSC)

Interface of the cellular network to PSTN


Routes calls between PLMN and PSTN
Inter-BSC Handover
Performs call switching
Billing

69

UTL Technologies Ltd www.utltraining.com


Home Location Register (HLR)

Stores user data of all Subscribers related to the GMSC


International Mobile Subscriber Identity(IMSI)
Users telephone number (MS ISDN)
Current Subscriber VLR (current Location).
Subscription information and services.
Authentication Key and Authentication functionality
Subscriber Status (Registered / deregistered).
Referred when call comes from public land network

70

UTL Technologies Ltd www.utltraining.com


Visitor Location Register (VLR)

Copy of subscriber data from HLR


Generates and allocates TMSI for Subscriber
confidentiality
Location Area Identity (LAI)
Mobile Status
Mobile Station Roaming Number (MSRN)
Provides necessary data when mobile originates call

71

UTL Technologies Ltd www.utltraining.com


LAI 01 LAI 02

VLR 1

LAI 03 LAI 04

VLR 2

72
HLR
UTL Technologies Ltd www.utltraining.com
Authentication Center (AuC)

Stores Subscriber authentication data called Ki, a


copy of which is also stored in in the SIM card
Generates security related parameters to authorize a
subscriber (SRES)
Generates unique data pattern called Cipher key
(Kc) for user data encryption
Provides triplets - RAND, SRES & Kc, to the HLR
on request.

73

UTL Technologies Ltd www.utltraining.com


EIR (Equipment Identity Register)

EIR is a database of all valid Subscribers


Handset Identity (IMEI).
EIR has different databases as follows.,
White list - For all known,good IMEIs
Black list - For all bad or stolen handsets
Implementation depends on Service Provider

74

UTL Technologies Ltd www.utltraining.com


Operations & Maintenance Center

The OMC provides a


central point from which to
control and monitor the
other network entities (i.e.
base stations, switches,
database, etc)
UTL Technologies Ltd 75

UTL Technologies Ltd www.utltraining.com www.utltraining.com


There are two types of OMCs.
These are:
OMC (R)
OMC controls specifically the Base
Station System.
OMC (S)
OMC controls specifically the
Network Switching System.
UTL Technologies Ltd 76

UTL Technologies Ltd www.utltraining.com www.utltraining.com


The OMC should support the following
functions
Event/Alarm Management.
Fault Management.
Performance Management.
Configuration Management.
Security Management.
77

UTL Technologies Ltd www.utltraining.com


Case Study 7:

How many elements will be


there in network with a
network operator (for a state)
Elements wise description of
a network.

78

UTL Technologies Ltd www.utltraining.com


Interfaces between different blocks of GSM Architecture.

79

UTL Technologies Ltd www.utltraining.com


GSM Network Parts

80

UTL Technologies Ltd www.utltraining.com


81

UTL Technologies Ltd www.utltraining.com


.

82

UTL Technologies Ltd www.utltraining.com


83

UTL Technologies Ltd www.utltraining.com


GSM Network

MS BTS BSC MSC

84
AKS 268
UTL Technologies Ltd www.utltraining.com
Performance characteristics of GSM

Communication
Total mobility
Worldwide connectivity
High capacity
High transmission quality
Security functions

85

UTL Technologies Ltd www.utltraining.com


HAND OVERS IN GSM

UTL Technologies Ltd 86

UTL Technologies Ltd www.utltraining.com www.utltraining.com


HAND OVER IN GSM

87

UTL Technologies Ltd www.utltraining.com


TYPES OF HAND OVERS

Internal Handover (Intra-BSS)


1. Within same base station - intra cell Hand over
2. Between different base stations - inter cell or
intra BSC Hand over

External Handover (Inter-BSS)


1. Within same MSC -intra MSC or Inter BSC Hand
over
2. Between different MSCs - inter-MSC Hand over.

UTL Technologies Ltd 88

UTL Technologies Ltd www.utltraining.com www.utltraining.com


4
3
1 2
Cell Cell Cell Cell
Site Site Site Site

BTS BTS BTS BTS

1.Intra Cell Hand over BSC BSC BSC


2.Inter cell/Intra BSC Hand over
3.Inter BSC/Intra MSC Hand over
MSC MSC
4.Inter MSC Hand over UTL Technologies Ltd 89

UTL Technologies Ltd www.utltraining.com www.utltraining.com


UTL Technologies Ltd 90

UTL Technologies Ltd www.utltraining.com www.utltraining.com


Case study 8:

Why call drops will happen in a


network even when handovers
are present in a network?

91

UTL Technologies Ltd www.utltraining.com


ROAMING CONCEPT

UTL Technologies Ltd 92

UTL Technologies Ltd www.utltraining.com www.utltraining.com


Roaming:

Roaming is defined as the ability


for a cellular customer to automatically
make & receive voice calls, send &
receive data, or access other services
when traveling outside the
geographical coverage area of the
home network, by means of using a
visited network.
UTL Technologies Ltd 93

UTL Technologies Ltd www.utltraining.com www.utltraining.com


1.National Roaming:
If the visited network is in the
same country as the home network, this is
known as National Roaming.
2. International Roaming:
If the visited network is outside
the home country, this is known as
International Roaming (the term Global
Roaming has also been used).
UTL Technologies Ltd 94

UTL Technologies Ltd www.utltraining.com www.utltraining.com


3.Inter-Standard Roaming:
If the visited network operates
on a different technical standard than
the home network, this is known as
Inter-standard roaming.

95

UTL Technologies Ltd www.utltraining.com


AUTHENTICATION

96

UTL Technologies Ltd www.utltraining.com


97

UTL Technologies Ltd www.utltraining.com


Authentication Process
To discuss the authentication process,
assume that the VLR has all the
information required to perform that
authentication process (Kc, SRES and
RAND). If this information is unavailable,
then the VLR would request it from the
HLR/AUC.
1. Triples (Kc, SRES and RAND) are stored
at the VLR.
2. The VLR sends RAND via the MSC and
BSS, to the MS (unencrypted). 98

UTL Technologies Ltd www.utltraining.com


3. The MS sends SRES unencrypted to the
VLR.
4. Within the VLR the value of SRES is
compared with the SRES received from
the mobile. If the two values match, then
the authentication is successful.
5. If ciphering is to be used, Kc from the
assigned triple is passed to the BTS.

99

UTL Technologies Ltd www.utltraining.com


6. The mobile calculates Kc from the
RAND and A8 and Ki on the SIM.
7. Using Kc, A5 and the GSM hyper
frame number, encryption between
the MS and the BSS can now occur
over the air interface .

100

UTL Technologies Ltd www.utltraining.com


GSM Channels on Air Interface

101

UTL Technologies Ltd www.utltraining.com


Channel concept

Physical channel:
One timeslot of a TDMA-frame on one ARFCN
is referred to as a physical channel.
There are 8 physical channels per carrier in GSM,
channel 0-7(timeslot 0-7)
Logical channel:
Depending on the kind of information transmitted, we
refer to different logical channels.
These logical channels are mapped on physical channel.

102

UTL Technologies Ltd www.utltraining.com


Logical channels

Logical channels

Control channels Traffic channels

Half Full
CCCH DCCH
BCH rate rate

103
FCCH SCH BCCH PCH AGCH RACH SDCCH SACCH FACCH
UTL Technologies Ltd www.utltraining.com
Control channels
I. Broadcast channels BCH

1)Broadcast Control Channel-BCCH


The last information the MS must receive in
order to receive calls or make calls is some
information concerning the cell. This is BCCH.

This is transmitted Downlink point to multipoint.

104

UTL Technologies Ltd www.utltraining.com


Broadcast Control Channel (BCCH)

Carries the following information


(this is only a partial list):
Location Area Identity (LAI).
List of neighboring cells, which
should be monitored by the MS.
List of frequencies used in the cell.
Cell identity.
105

UTL Technologies Ltd www.utltraining.com


Control channels
I. Broadcast channels BCH
2)Frequency correction channel-FCCH
This is transmitted frequently on
the BCCH timeslot and allows the
mobile to synchronize its own
frequency to that of the transmitting
base site.

106

UTL Technologies Ltd www.utltraining.com


3) Synchronization Channel-SCH
This is used by the MS to synchronize to
the
TDMA frame structure within the
particular cell.
Listening to the SCH the MS receives
1. TDMA frame number
2. BSIC (Base Station Identity code).
107

UTL Technologies Ltd www.utltraining.com


Control channels
II. Common Control Channels,CCCH

1) Paging Channel-PCH
The information on this channel is a
paging message including the MSs
identity(IMSI).This is transmitted on
Downlink.

108

UTL Technologies Ltd www.utltraining.com


2) Random access channel-RACH:

When the mobile realizes it is paged,


it answers by requesting a signaling
channel on RACH. RACH is also used by
the MS if it wants to originate a call. It is
transmitted in Uplink point to point.

109

UTL Technologies Ltd www.utltraining.com


Control channels
Common Control Channels,CCCH

3) Access Grant Channel-AGCH


On request for a signaling channel by MS
the network assigns a signaling
channel(SDCCH) on AGCH. AGCH is
transmitted on the downlink point to point.

110

UTL Technologies Ltd www.utltraining.com


Control channels
III. Dedicated Control Channels-DCCH

1) Stand alone dedicated control


channel (SDCCH)
AGCH assigns SDCCH on request by MS.
Used during Call setup
Steppingstone between BCH & TCH
MS is informed about frequency &
timeslot to use
Up and Downlink, point-point.
111

UTL Technologies Ltd www.utltraining.com


Control channels
Dedicated Control Channels-DCCH
2) Slow associated control channel-SACCH

Timing Advance

112

UTL Technologies Ltd www.utltraining.com


3) Fast associated control channel-FACCH
Used for handover.
Rapid Message Exchange for HANDOVER

113

UTL Technologies Ltd www.utltraining.com


Traffic Channels-TCH

Full rate traffic channel occupies one physical


Channel (one TS on a carrier)

Two half rate TCHs can share one physical


channel.

114

UTL Technologies Ltd www.utltraining.com


TDMA FRAME

115

UTL Technologies Ltd www.utltraining.com


116

UTL Technologies Ltd www.utltraining.com


117

UTL Technologies Ltd www.utltraining.com


118

UTL Technologies Ltd www.utltraining.com


119

UTL Technologies Ltd www.utltraining.com


BURSTS

120

UTL Technologies Ltd www.utltraining.com


Burst
The information format transmitted
during one timeslot in the TDMA frame is
called a burst.
A Burst consists of several different elements.
 Information : This is the area in which
the speech, data or control information is
held.
Tail Bits : These are used to indicate the
beginning and end of the burst. 121

UTL Technologies Ltd www.utltraining.com


 Stealing Flags : These two bits are set when
a traffic channel burst has been stolen by a
FACCH (the Fast Associated Control
Channel). One bit set indicates that half of the
block has been stolen.
 Training Sequence : This is used by the
receivers equalizer as it estimates the transfer
characteristic of the physical path between the
BTS and the MS. The training sequence is 26
bits long.
122

UTL Technologies Ltd www.utltraining.com


 Guard Period :
The BTS and MS can only receive the burst
and decode it, if it is received within the timeslot
designated for it.
The timing, therefore, must be extremely
accurate, but the structure does allow for a small
margin of error by incorporating a guard period
as shown in the diagram.
To be precise, the timeslot is 0.577 ms long,
whereas the burst is only 0.546 ms long; therefore
there is a time difference of 0.031 ms to enable
123
the burst to hit the timeslot.
UTL Technologies Ltd www.utltraining.com
124

UTL Technologies Ltd www.utltraining.com


Different Types of Bursts

Normal Burst
Random Access Burst
Frequency Correction Burst
Synchronization Burst
Dummy Burst

125

UTL Technologies Ltd www.utltraining.com


Normal Burst
 Normal Burst : The normal burst carries traffic channels
and all types of control channels apart from those
mentioned specifically below. (Bi-directional).
156.25 bits OR 576.92 us
T Coded Data S T. Seq. S Coded Data T GP
3 57 1 26 1 57 3 8.25

Tail Bit(T) :Used as Guard Time


Coded Data :It is the Data part associated with the burst
Stealing Flag :This indicates whether the burst is carrying
Signaling data.
Training Seq. :This is a fixed bit sequence known both to
the BTS & the MS.This takes care of the 126

UTL Technologies Ltd signal deterioration. www.utltraining.com


Frequency Correction Burst

This burst carries FCCH downlink to


correct the frequency of the MSs local
oscillator, effectively locking it to that of the
BTS.

127

UTL Technologies Ltd www.utltraining.com


Synchronization Burst

It is so called because its function is to


carry SCH downlink, synchronizing the timing
of the MS to that of the BTS

128

UTL Technologies Ltd www.utltraining.com


Dummy Burst

Used when there is no information to be


carried on the unused timeslots of the BCCH
Carrier (downlink only).

129

UTL Technologies Ltd www.utltraining.com


Access Burst
This burst is of much shorter duration than
the other types. The increased guard period is
necessary because the timing of its
transmission is unknown. When this burst is
transmitted, the BTS does not know the location
of the MS and therefore the timing of the
message from the MS can not be accurately
accounted for. (The Access Burst is uplink only.)

130

UTL Technologies Ltd www.utltraining.com


131

UTL Technologies Ltd www.utltraining.com


Mobile Station in IDLE mode

What does a Mobile do in idle mode?

Reads BCCH (System Information


Messages)
Listen To Paging
Monitors Neighbor for cell selection

132

UTL Technologies Ltd www.utltraining.com



Inside A GSM Cellphone

Transeiver Speaker Battery

Signal Processing LCD


ARM
Processor Chipset Display

SIM card/ Micro


phone Keypad
Controller
133

UTL Technologies Ltd www.utltraining.com


MOBILE STATION

TX PART RX PART
TX MODULATOR RX DEMODULATOR

BURST FORMATING VITERBI EQULISER


CIPHERING DE-CIPHERING
INTERLEAVING DE-INTERLEAVING

CHANNEL CODING DECODING

SPPECH CODING SPPECH DECODING


SEGMENTATION

A/D CONVERSION D/A CONVERSION


134
Microphone
UTL Technologies Ltd Receiver www.utltraining.com
ANALAG TO DIGITAL (A/D) CONVERSION

One of the primary functions of


an MS is to convert the analog speech
information into digital form for
transmission using a digital signal.
The analog to digital conversion (A/D)
conversion process outputs a collection
of bits; binary ones and zeroes which
represent the speech input

135

UTL Technologies Ltd www.utltraining.com


The A/D Conversion is performed by
using a process called Pulse Code
Modulation (PCM). PCM involves three
main steps.
Sampling
Quantization
Coding.

136

UTL Technologies Ltd www.utltraining.com


Sampling:

Sampling involves measuring the analog


signal at specific time intervals.
The accuracy of describing the analog
signal in digital terms depends on how
often the analog signal is sampled. This
is expressed as the sampling frequency

137

UTL Technologies Ltd www.utltraining.com


The sampling theory states that :
To reproduce an analog signal without
distortion, the signal, must be
sampled with at least twice the
frequency of the highest frequency
component in the analog signal.

138

UTL Technologies Ltd www.utltraining.com


Normal speech mainly contains frequency
components lower than 3400 Hz.
Applying the sampling theory to analog
speech signals, the sampling frequency
should be at least 2X3.4 kHz=6.8 kHz.
Telecommunication systems use a
sampling frequency of 8 kHz, which is
acceptable based on the sampling theory.

139

UTL Technologies Ltd www.utltraining.com


Quantization:

The amplitude of the signal at the time of


sampling is measured and approximated
to one of a finite set of values
The degree of accuracy depends on the
number of quantization levels used.
Within common telephony, 256 levels are
used while in GSM 8,192 levels are
used.
140

UTL Technologies Ltd www.utltraining.com


Coding

Coding involves converting the


quantized values into binary. Every
value is represented by a binary code of
13 bits (213=8192).

For example, a quantized value of 2,157


would have a bit pattern of
0100001101101:
141

UTL Technologies Ltd www.utltraining.com


Bit 12 11 10 9 8 7 6 5 4 3 2 1 0 Total

Set to 0 1 0 0 0 0 1 1 0 1 1 0 1 2157

Value 0 2048 0 0 0 0 64 32 0 8 4 0 1

Coding of Quantized value 2157.

142

UTL Technologies Ltd www.utltraining.com


Summary of A/D Conversion
The result from the process of A/D
Conversion is 8,000 samples per second of
13 bits each. This is a bit rate of 104
kbits/s.
When it is considered that 8 subscribers
use one radio channel, the overall bit rate
would not fit into the 200 kHz available for
all 8 subscribers. The bit rate must be
reduced somehow. This is achieved using
segmentation and speech coding 143

UTL Technologies Ltd www.utltraining.com


STAGE 2: SEGMENTATION AND
STAGE 3: SPEECH CODING

The speech coding process analyzes


speech samples and outputs parameters
of what the speech consists of.
Segmentation: Given that speech
organs are relatively slow in adapting to
changes, the filter parameters
representing the speech organs are
approximately constant during 20 ms..
144

UTL Technologies Ltd www.utltraining.com


For this reason, when coding speech
in GSM, a block of 20 ms is coded into
one set of bits. In effect, it is similar to
sampling speech at a rate of 50 times per
second instead of the 8,000 used by A/D
conversion

145

UTL Technologies Ltd www.utltraining.com


Summary of segmentation and speech coding

The GSM speech coder produces a bit rate of


13 kbits/s per subscriber. When it is considered
that 8 subscribers use one radio channel, the
overall bit rate would be 8X13kbits/s =104kbits/s.
This compares favorably with the 832 kbits/s from
A/D conversion.
However, speech coding does not consider
the problems which may be encountered on the
radio transmission path. The next stages in the
transmission process, channel coding and
interleaving, help to overcome these problems.
146

UTL Technologies Ltd www.utltraining.com


Speech & Channel Coding
Microphone
Sampling at 8 KHz &
A/D CONVERSION Coding using 13bits
=104 Kbps
SEGMENTATION = 2080 bits/20ms
2080 bits / 20ms
20 ms block SPEECH CODER
260 bits / 20ms
BITS ORDERED

Very Important Important Other


50 bits 132 bits 78 bits
BLOCK CODER

CONVOLUTION CODER

456 bits => 8 Block of 57 bits 147

UTL Technologies Ltd www.utltraining.com


STAGE 4: CHANNEL CODING

Channel coding in GSM uses the 260 bits


from speech coding as input to channel coding
and outputs 456 encoded bits.
The 260 bits are split according to their
relative importance:
Block 1 : 50 very important Bits.
Block 2 : 132 important Bits and
Block 3 : 78 not so important bits.

148

UTL Technologies Ltd www.utltraining.com


The first block of 50 bits is sent through a block
coder, which adds three parity bits that will
result in 53 bits. These three bits are used to
detect errors in a received message.
The 53 bits from first block, the 132 bits from
the second block and 4 tail bits (total: 189) are
sent to a 1:2 convolutional coder which outputs
378 bits. Bits are added by the convolutional
coder enable the correction of errors when the
message is received.
The bits of block 3 are not protected. 149

UTL Technologies Ltd www.utltraining.com


150

UTL Technologies Ltd www.utltraining.com


STAGE 5 : INTERLEAVING
First level of interleaving:
The channel coder provides 456 bits for
every 20 ms of speech. These are interleaved,
forming eight blocks of 57 bits each, as shown
in the figure below.
In a normal burst, there is space for two of
these speech blocks or 57 bits, as can be seen
in figure. The remaining bits are like tail bits,
stealing flags, training sequence and guard
period. Thus, if one burst of transmission is
lost, there is a 25% BER for the entire 20 ms of
speech (2/8=25%). 151

UTL Technologies Ltd www.utltraining.com


First Stage of Interleaving

152

UTL Technologies Ltd www.utltraining.com


Second level of interleaving or
Diagonal interleaving:

If only one level of interleaving is


used, a loss of this burst results in a
total loss of 25%. This is too much
for the channel decoder to correct.
A second level of interleaving can be
introduced to further reduce the
possible BER to 12.5%.
153

UTL Technologies Ltd www.utltraining.com


Instead of sending two blocks of 57 bits
from the same 20 ms of speech within one
burst, a block from one 20 ms and a block from
next sample of 20 ms are sent together.
A delay is introduced in the system when
the MS must wait for the next 20 ms of speech.
However, the system can now afford to loose a
whole burst, out of eight, as the loss is only
12.5% of the total bits from each 20 ms speech
frame. 12.5% is the maximum loss level that
channel decoder can correct
154

UTL Technologies Ltd www.utltraining.com


Diagonal interleaving

155

UTL Technologies Ltd www.utltraining.com


STAGE 6: CIPHERING/ENCRYPTION

The purpose of ciphering is to encode


the burst so that it cannot be interpreted
by any other device than the intended
receiver. The ciphering algorithm in
GSM is called A5 algorithm.

156

UTL Technologies Ltd www.utltraining.com


STAGE 7 : BURST FORMATTING
As previously explained, every transmission
from an MS/BTS must include some extra
information such as training sequence.
The process of burst formatting is to add
these bits (along with some others such as
tail bits) to the basic speech/data being
sent.
This increases the overall bit-rate, but is
necessary to counteract problems
encountered on the radio path. 157

UTL Technologies Ltd www.utltraining.com


In GSM, the input to burst formatting is
the 456 bits received from ciphering,
Burst formatting adds a total of 136 bits
per block of 20 ms, bringing the overall
total to 592.

158

UTL Technologies Ltd www.utltraining.com


159

UTL Technologies Ltd www.utltraining.com


STAGE 8: MODULATION & TRANSMISSON

The bits must then be sent over the air


using a carrier frequency.
GSM uses the GMSK modulation
technique. The bits are modulated onto
a carrier frequency and transmitted (e.g.
912.2MHz).

160

UTL Technologies Ltd www.utltraining.com


2 Mbps PCM Sharing by 1 BTS (Total 1 TRX)

2Mbps =32 X 64KbpsT00 Synchronization


T01 TRX_1 TRX_1 TRX_1 TRX_1
T02 TRX_1 TRX_1 TRX_1 TRX_1
TRX T03 TRX_2 TRX_2 TRX_2 TRX_2
TRAFFIC TRX_2
T04 TRX_2 TRX_2 TRX_2
8X16Kbps/TRX
..
TRX TRX1_S OMU1_S
T25
SIGNALLING
T26 TRX2_S OMU2_S
16Kbps/TRX
T27
OMU T28
SIGNALLING
T29
16Kbps/BTS
T30
161
T31 Signaling
UTL Technologies Ltd www.utltraining.com
2 Mbps PCM Sharing by 1 BTS (Total 2 TRX)

2Mbps =32 X 64KbpsT00 Synchronization


T01 TRX_1 TRX_1 TRX_1 TRX_1
T02 TRX_1 TRX_1 TRX_1 TRX_1
TRX T03 TRX_2 TRX_2 TRX_2 TRX_2
TRAFFIC TRX_2
T04 TRX_2 TRX_2 TRX_2
8X16Kbps/TRX
..
TRX TRX1_S OMU1_S
T25
SIGNALLING
T26 TRX2_S OMU2_S
16Kbps/TRX
T27
OMU T28
SIGNALLING
T29
16Kbps/BTS
T30
162
T31 Signaling
UTL Technologies Ltd www.utltraining.com
2 Mbps PCM Sharing by 2 BTS (Total 2 TRX)

2Mbps =32 X 64Kbps T00 Synchronization


T01 TRX_1 TRX_1 TRX_1 TRX_1
T02 TRX_1 TRX_1 TRX_1 TRX_1
TRX T03 TRX_2 TRX_2 TRX_2 TRX_2
TRAFFIC TRX_2
T04 TRX_2 TRX_2 TRX_2
8X16Kbps/TRX
..
TRX TRX1_S OMU1_S
SIGNALLING T25
T26 TRX2_S OMU2_S
16Kbps/TRX
T27
OMU T28
SIGNALLING
T29
16Kbps/BTS
T30
163
T31 Signaling
UTL Technologies Ltd www.utltraining.com
2 Mbps PCM Sharing by 1 BTS (Total 12 TRX)

T00 Synchronization
2Mbps =32 X 64Kbps
T01 TRX_1 TRX_1 TRX_1 TRX_1
T02 TRX_1 TRX_1 TRX_1 TRX_1
TRX ...
TRAFFIC TRX_12
T23 TRX_12 TRX_12 TRX_12
8X16Kbps/TRX
T24 TRX_12 TRX_12 TRX_12 TRX_12
TRX TRX1_S OMU1_S TRX7_S
T25 OMU7_S
SIGNALLING
T26 TRX2_S OMU2_S TRX8_S OMU8_S
16Kbps/TRX
T27 TRX3_S OMU3_S TRX9_S OMU9_S
OMU T28 TRX4_S OMU4_S TRX10_S OMU10_S
SIGNALLING OMU5_S TRX11_S OMU11_S
T29 TRX5_S
16Kbps/BTS
T30 TRX6_S OMU6_S TRX12_S OMU12_S
164
T31 Signaling
UTL Technologies Ltd www.utltraining.com
2 Mbps PCM Sharing by 12 BTS (Total 12 TRX)

T00 Synchronization
2Mbps =32 X 64Kbps
T01 TRX_1 TRX_1 TRX_1 TRX_1
T02 TRX_1 TRX_1 TRX_1 TRX_1
TRX ...
TRAFFIC TRX_12
T23 TRX_12 TRX_12 TRX_12
8X16Kbps/TRX
T24 TRX_12 TRX_12 TRX_12 TRX_12
TRX TRX1_S OMU1_S TRX7_S
T25 OMU7_S
SIGNALLING
T26 TRX2_S OMU2_S TRX8_S OMU8_S
16Kbps/TRX
T27 TRX3_S OMU3_S TRX9_S OMU9_S
OMU T28 TRX4_S OMU4_S TRX10_S OMU10_S
SIGNALLING OMU5_S TRX11_S OMU11_S
T29 TRX5_S
16Kbps/BTS
T30 TRX6_S OMU6_S TRX12_S OMU12_S
165
T31 Signaling
UTL Technologies Ltd www.utltraining.com
GSM SERVICES

166

UTL Technologies Ltd www.utltraining.com


Types of GSM services

Basic Services: These are available to all


subscribers to a mobile network. For
example, the ability to make voice
telephone calls is a basic service.
Supplementary Services: These are
additional services that are available by
subscription only. Call forwarding is an
example of a supplementary service
167

UTL Technologies Ltd www.utltraining.com


Basic Services

Basic Services can be divided into 2 types:


Tele services:
A tele service allows the subscriber
to communicate (usually via voice, fax,
data or SMS) with another subscriber. It
is a complete system including necessary
terminal equipment.

168

UTL Technologies Ltd www.utltraining.com


Bearer Services:
A bearer service transports speech and
data as digital information within the network
between user interfaces.
A bearer service is the capability to
transfer information and does not include the
end user equipment.
Every tele service is associated with a
bearer service. For example, a bearer service
associated with the speech telephony tele
service is the timeslot assigned to a call on a
TDMA frame over the air interface. 169

UTL Technologies Ltd www.utltraining.com


TELE SERVICES:

The following are the major tele


services supported by GSM System.
1. Speech
2. Emergency Calls
3. Dual Tone Multi Frequency (DTMF)
4. Alternate Speech/Fax
5. Short Message Service
6. SMS Cell Broadcast (SMSCB)
7. Voice Mail
170
8. Fax Mail
UTL Technologies Ltd www.utltraining.com
BEARER SERVICES:

1. Traffic to PSTN
2. Traffic to ISDN
3. Traffic to Packet Switched Public
Data Networks (PSPDN)
4. Traffic to Circuit Switched Public
Data Networks (CSPDN)
5. Traffic to Internet
171

UTL Technologies Ltd www.utltraining.com


SUPPLEMENTARY SERVICES

1. Call Forwarding
2. Barring of outgoing calls
3. Bar all outgoing calls
4. Bar all outgoing international calls
5. Bar all outgoing international calls except
those directed to the home PLMN
6. Call waiting
7. Multi party service
8. Closed User Group (CUG)
172

UTL Technologies Ltd www.utltraining.com


BATTERY LIFE

173

UTL Technologies Ltd www.utltraining.com


Battery Life

One of the main factors, which restrict


reducing the size of a MS, is the battery.
A battery must be large enough to
maintain a telephone call for an
acceptable amount of time without
needing to be recharged.
Since there is demand for MSs to
become smaller and lighter the battery
must also become smaller and lighter.
174

UTL Technologies Ltd www.utltraining.com


The features which enable the life of a
GSM MS battery to be extended are :
1.Power Control
2.Voice Activity Detection (VAD)
3.Discontinuous Transmission (DTX)
4.Discontinuous Reception (DRX)

175

UTL Technologies Ltd www.utltraining.com


1. Power Control:
This is a feature of the GSM air
interface which allows the network
provider to not only compensate for
the distance from MS to BTS as
regards timing, but can also cause
the BTS and MS to adjust their
power output to take account of that
distance also.
176

UTL Technologies Ltd www.utltraining.com


The closer the MS is to the BTS,
the less the power it and the BTS will
be required to transmit. This feature
saves radio battery power at the MS,
and helps to reduce co-channel and
adjacent channel interference

177

UTL Technologies Ltd www.utltraining.com


Power Control

178

UTL Technologies Ltd www.utltraining.com


2. Voice Activity Detection (VAD):
VAD is a mechanism whereby the source
transmitter equipment identifies the presence
or absence of speech.
VAD implementation is effected in speech
mode by encoding the speech pattern silences
at a rate of 500 bit/s rather than the full 13
kbit/s.
This results in a data transmission rate for
background noise, known as comfort noise,
which is regenerated in the receiver. Without
comfort noise the total silence between the
speeches would be considered to be 179

disturbing
UTL Technologies Ltdby the listener. www.utltraining.com
3. Discontinuous Transmission (DTX) :

DTX increases the efficiency of the


system through a decrease in the possible
radio transmission interference level. It
does this by ensuring that the MS does not
transmit unnecessary message data.
DTX can be implemented, as necessary,
on a call-by-call basis. The effects will be
most noticeable in communications
between two MS.
180

UTL Technologies Ltd www.utltraining.com


4. Discontinuous Reception (DRX):

DRX allows the MS to effectively


switch off during times when reception
is deemed unnecessary.
This allows the MS to go to sleep
and listen-in only when necessary, with
the effective saving in power usage. DRX
may only be used when a MS is not in a
call.
181

UTL Technologies Ltd www.utltraining.com


GSM Basic Call Sequence

182

UTL Technologies Ltd www.utltraining.com


Call from Land Line to a GSM network

183

UTL Technologies Ltd www.utltraining.com


Call flow :
The incoming call is passed from the
fixed network to the gateway MSC
(GMSC) (1).
Then, based on the IMSI numbers of the
called party, its HLR is determined (2).
The HLR checks for the existence of the
called number. Then the relevant VLR is
requested to provide a mobile station
roaming number (MSRN) (3).
184

UTL Technologies Ltd www.utltraining.com


This is transmitted back to the GMSC (4).
Then the connection is switched through to the
responsible MSC (5).
Now the VLR is queried for the location range
and reachability status of the mobile subscriber
(6).
If the MS is marked reachable, a radio call is
enabled (7)
and executed in all radio zones assigned to the
VLR (8).
185

UTL Technologies Ltd www.utltraining.com


When the mobile subscriber telephone
responds to the page request from the
current radio cell (9),
all necessary security procedures are
executed (10).
If this is successful, the VLR indicates
to the MSC (11)
that the call can be completed (12).
186

UTL Technologies Ltd www.utltraining.com


Call from Mobile Station to land line

187

UTL Technologies Ltd www.utltraining.com


Call Flow from MS to PSTN

1. MS after dialing a number and press


send key uses RACH to ask for a
signaling channel.
2. The BSC allocates a signaling channel,
using AGCH.
3. The MS sends a call setup request
through SDCCH, to the MSC/VLR. Over
SDCCH, all signaling takes place. This
includes:
188

UTL Technologies Ltd www.utltraining.com


Marking the MS status as active in the VLR
(if the MS status is not updated earlier).
The Authentication Procedure
Ciphering
Equipment Identification
Sending the called Subscriber number to the
network
Checking if the subscriber has service
barring of outgoing calls activated.
189

UTL Technologies Ltd www.utltraining.com


4. The MSC/VLR instructs the BSC to
allocate an idle TCH. The BTS and MS are
told to tune to the TCH.
5. The MSC/VLR forwards the called number
to an exchange in the PSTN, which
establishes a connection to the subscriber.
6. If the called subscriber answers, the
connection is established.
190

UTL Technologies Ltd www.utltraining.com


Case Study 9:

How Call flow happens in


reality from the cell site?
(PSTN Demo and BTS Video)

191

UTL Technologies Ltd www.utltraining.com


Handover between Cells Controlled by the Same BSC

192

UTL Technologies Ltd www.utltraining.com


1. The BSC orders the new BTS to activate a
TCH.
2. The BSC sends a message to the MS, via the
old BTS, containing information about the
frequency and time slot to change to and also
the output power to use. This information is
sent to the MS using FACCH.
3. The MS tunes to the new frequency, and
transmits handover access burst in the correct
time slot. Since the MS had no information yet
on TA, the handover burst are very short (only
8 bits of information). 193

UTL Technologies Ltd www.utltraining.com


4. When the new BTS detects the hand
over bursts, it sends the information
about TA. This is also sent through
FACCH.
5. The MS sends a handover complete
message to the BSC through the new
BTS.
6. The BSC tells the old BTS to release
the old TCH 194

UTL Technologies Ltd www.utltraining.com


.Hand over between cells controlled by
different BSCs but the same MSC/VLR :

195

UTL Technologies Ltd www.utltraining.com


1. The serving BSC sends a Hand over
Required Message to the MSC containing
the identity of the target cell
2. The MSC knows which BSC controls this
cell and sends a Hand over Request to this
BSC.
3. The new BSC orders the target BTS to
activate a TCH.
4. The new BSC sends a message to the MS
through the MSC and the old BTS. 196

UTL Technologies Ltd www.utltraining.com


5. MS tunes to the new frequency and transmits
handover access bursts in the correct time slot.
6. When the new BTS sends information about TA.
7. MS sends a handover complete message to
MSC through the new BSC.
8. MSC sends the old BSC an order to release the
old TCH.
9. The old BSC tells the old BTS to release the
TCH.
197

UTL Technologies Ltd www.utltraining.com


Hand over between cells controlled by
different MSC/VLRs:

198

UTL Technologies Ltd www.utltraining.com


1. The serving (old) BSC sends a Hand over
required message to the serving MSC
(MSC-A), with the identity of the target cell.
2. MSC-A identifies that this cell belongs to
another MSC (MSC-B), and requests help.
3. MSC-B allocates a hand over number to
reroute the call. A Hand over Request is
then sent to the new BSC.
199

UTL Technologies Ltd www.utltraining.com


4. The new BSC orders the target BTS to activate a
TCH.
5. MSC-B receives the information, and passes it on
to MSC-A together with the handover number.
6. A link is set up to MSC-B, possibly, though PSTN.
7. MSC-A sends a handover command to the MS,
through the old BSC.
8. The MS tunes to the new frequency and transmits
hand over access burst in the correct time slot.
200

UTL Technologies Ltd www.utltraining.com


9. When the new BTS detects the hand over
burst it sends information about TA.
10. The MS sends hand over complete
message to the old MSC, through the new
BSC and the new MSC/VLR.
11. A new path in the group switches in MSC-A
is established, and the call is switched
through.
12. The old TCH is deactivated by the old BSC.
201

UTL Technologies Ltd www.utltraining.com


ALL THE BEST..

202

UTL Technologies Ltd www.utltraining.com

Vous aimerez peut-être aussi