m5
m5
MODULE 5 CONTENTS
Text Book 2:T L Singal, Wireless Communications, McGraw Hill Education (India) Private Limited,
2016, ISBN:0-07-068178-3.
WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2
MODULE 5
GLOBAL SYSTEM FOR MOBILE (GSM)
1. GSM NETWORK ARCHITECTURE*****
Q. With a neat block diagram explain GSM Network architecture.
GSM uses two 25-MHz frequency bands:
a. 890-MHz to 915-MHz band is used for mobile subscriber unit to base station transmissions
(reverse-link transmissions), and
b. 935-MHz to 960-MHz frequency band is used for base station to mobile subscriber unit
transmission (forward-link transmissions)
GSM uses Frequency-Division Duplexing (FDD) and a combination of TDMA and FDMA
techniques to multiple mobile subscriber units.
The GSM network architecture consists of three major subsystems:
a. Mobile Station (MS)
b. Base Station Subsystem (BSS)
c. Network and Switching Subsystem (NSS)
They basic system architecture for a GSM network is as shown in figure 1.
Page
The wired network uses a 64 kbps PCM digitized voice in the PSTN hierarchy.
The VLR assigns a Temporary Mobile Subscriber Identity (TMSI) that is used to avoid using
It is a subsystem that allows for non-speech communication between the GSM and the other
networks.
The tasks of an IWF are particularly to adapt transmission parameter and protocol conversion.
The OSS supports one or several Operation Maintenance Centres (OMC) that is used to monitor and
maintain the performance of each MS, BS, BSC, and MSC within a GSM system.
The OSS has three main functions, which are to maintain all telecommunications hardware and
network operations with a particular service area, manage all mobile equipment in the system, and
manage all charging and billing procedures.
Figure 3 shows the signaling protocol architecture for communication between the main hardware
elements of the GSM network architecture and the associated interfaces.
Um Interface: The air-interface ‘Um’, which specifies communication between the MS and BTS, is
the wireless related interface.
A-bis Interface: Messages between the BTS and BSC flow through the A-bis interface. The support
on this interface is for voice traffic at 64 kbps and data/signaling traffic at 16 kbps. Both types of
traffic are carried over LAPD (Link Access Protocol for D-Channel).
A Interface: The interface between a BSC and a MSC is called the ‘A’ interface which uses an SS7
protocol called the Signaling Connection Control Part (SCCP). It support communication between the
MSC and the BSS.
A number of control messages are exchanged between the key entities of GSM network architecture
that deal with Radio Resources Management (RRM), Mobility Management (MM), and Connection
Management (CM).
The protocol stack is divided into three layers:
1. Layer 1: Physical Layer
2. Layer 2: Data Link Layer (DLL)
6
Page
The Address filed is also optional and holds the nature of message address field.
The control field is also optional and holds the type of the frame.
The length indicator identifies the length of the information field.
Fill-in bits are all 1s bits to extend the length to the desired 184 bits.
The traffic channels are used to carry different speech or data services.
Page
events or messages between hardware elements of the systems that are implemented on the logical
channels.
Layer III defines the details of implementation of messages on the logical channels with DLL frames.
Information bits of the Layer II packets specify the operation of a Layer III message. As shown in
Figure 5, these bits are further divided into several fields.
The Transaction Identifier (TI) field is used to identify a procedure or protocol that consists of a
sequence of messages.
The Protocol Discriminator (PD) identifies the category of the operation (management, supplementary
services, call control, and test procedure).
The Message Type (MT) identifies the type of message for a given PD.
Information Elements (IE) is an optional field for the time that an instruction carries some information
that is specified by an IE Identifier (IEI).
GSM standard divides the messages into three sublayers that provide specific functions:
Radio Resource Management (RRM) - The RRM establishes and releases connections between
MSs and an MSC and maintains them despite subscriber movements. The RRM functions are
mainly performed by the MS and the BSC. The main responsibilities of the RRM are to assign the
radio channel and hop to new channels.
Mobility Management (MM) –The major functions of MM are location update, registration
procedures, authentication procedure, TMSI handling, and attachment and detachment procedures
for the IMSI. MM functions are handled by the MS/SIM, the MSC/VLR, and the HLR/AuC.
Communication Management (CM) – The CM is used to establish, maintain, and release the
circuitswitched connection between the calling and called subscribers of GSM network.
Mobile Application Part (MAP) - handles most of the signaling between different entities in the
fixed part of the network, such as between the HLR and VLR.
It runs on top of two intermediate protocols––Signal Connection Control Part (SCCP) and Message
Transfer Part (MTP).
SCCP and MTP protocols are part of Signaling System Number 7, which is a set of protocols
designed to provide control signaling within digital circuit-switching networks.
8
Page
The GSM actually does not identify a particular mobile phone, but a particular HLR. It is the
Page
11
Page
The subscriber is not aware of this loss of speech during this process.
Page
6. Maximum Delay Spread (Δm) Delay spread is the difference in propagation delay among
Page
different multipath signals arriving at the same Rx antenna. Typical delay spread in mountainous
Tail Bits: (3 Bits each at the Beginning and End of a Time Slot Excluding Guard Bits) It allows
synchronization of transmissions from mobile units located at different distances from the base
station.
Encrypted Data: (114 Bits) Data is encrypted in blocks by conventional encryption of 114 plaintext
bits into 114 ciphertext bits; the encrypted bits are then placed in two 57-bit data fields in the time
slot.
Training Data: (26 Bits) It is used to adapt the parameters of the receiver to the current path-
15
propagation characteristics and to select the strongest signal in case of multipath propagation. The
training sequence is a known bit pattern that differs for different adjacent cells.
Page
Guard Bits: (8.25 Bits) It is used to avoid overlapping with other bursts due to different path delays.
The 148 bits of a data burst are used to transmit the information. Delimited by tail bits (consisting of
0s), the frame contains 26 training bits sandwiched between two bursts of data bits. These training bits
allow the receiver to synchronize itself.
Each multiframes consists of 26 TDMA frames which takes 120ms to complete (for form1
superframe) or 51 TDMA frames which takes 235ms to complete (for form 2 superframe).
Within 1 TDMA frame there are 8 timeslots which takes 4.6ms to complete.
Start bit Encrypted data Training bits Encrypted data Stop bits Guard period
(3) (58) (26) (58) (3) (8.25bits)
1. Normal burst in GSM
Start bit Fixed bits of all 0s Stop bits Guard period
(3) (142) (3) (8.25bits)
2. Frequency correction (FCCH) burst in GSM
Start bit Encrypted data Training bits Encrypted data Stop bits Guard period
(3) (39) (64) (39) (3) (8.25bits)
3. Synchronization (SCH) data burst in GSM
Start bit Synchronization Encrypted data Stop bits Guard period
(8) (41) (36) (3) (8.25bits)
4. Access (RACH) burst in GSM
Start bit Mixed bits Training bits Mixed bits Stop bits Guard period
(3) (58) (26) (58) (3) (8.25bits)
5. Dummy burst in GSM
Figure 14: GSM bursts
It consist of 3 Start bits followed by 39 encrypted bits, a 64 bit synchronization sequence, 39 more
encrypted bits, 3 Stop bits and 8.25 bit long Guard Period (GP).
The encrypted bits contain Frame Number (FN).
This can be used on Synchronization Channel (SCH).
4. Access (RACH) burst in GSM:
Used by the mobile to facilitate random access request by the mobile and handover operations.
It consists of 8 Start Bits followed by 41 bit synchronization sequence, 36 bit encrypted bits and 3
Stop bits.
It has 68.25 bits long Guard Period (GP).
This can be used on both Random Access Channel (RACH) and Fast Associated Control Channel
(FACCH).
5. Dummy burst in GSM:
It is transmitted on the radio frequency when no other types of burst signal are being transmitted.
It consists of 3 Start bits, 58 mixed bits, 26 bit training sequence, 58 more mixed bits, 3 stop bits and
8.25 bit long Guard Period (GP).
The purpose of DB is to ensure that the BS is always transmitting on the frequency carrying the
system information.
2. MOBILE-TO-NETWORK CALL
mobile subscriber first dials the called subscriber number and presses the send button on the GSM
mobile phone.
The mobile subscriber transmits a burst of RACH data to the base station.
The base station then responds with message which assigns the mobile subscriber to a new channel
for connection.
The step-by-step procedure for mobile-originated call establishment is described in Table 3.
19
Page
3. NETWORK-TO-MOBILE CALL
To make a call from a landline telephone subscriber, the call-request information is processed
through the gateway MSC to the destination MSC after getting the information from the home
HLR of the called mobile subscriber.
Then the called mobile subscriber is contacted through the BSS. The base station broadcasts a
message, The base station then assign the mobile subscriber unit to a new channel for connection.
Figure 14 shows Network-to-Mobile call in the PSTN directs the call initiated by the calling
landline telephone subscriber to the MSC identified by the dialed phone number of the called
mobile subscriber.
The MSC requests routing information from the HLR. Since the mobile subscriber is roaming in the
area of a different MSC, the gateway MSC contacts the destination MSC.
The VLR initiates a paging procedure in all BSSs under the control of the MSC.
After getting response from the MS, the VLR sends the necessary system parameters to the MSC to
establish the link to the MS.
3. Inter-BSC-Cum-Intra-MSC Hand-off
Page
A call connection is changed between two cells that are served by different BSCs but operate in the
same MSC.
Figure 11.30 shows the hand-off procedure between two BSSs that are controlled by one MSC.
When the measured value of the received signal strength at the mobile subscriber is lower than the
threshold value, it informs the serving BSC which initiates the hand-off command to the MSC of
that area.
The MSC relays the hand-off request to the BSC, which sends a channel activation request to its
BTS.
It is then possible for the hand-off call to be handled in the new MSC.
The BTS provides the MS with a list of available channels in neighboring cells and reports these
measured data to the MSC.
The BTS also monitors the received signal strength from the mobile subscriber to make a hand-off
decision.
The MSC negotiates a new channel with the new BSS and indicates to the mobile subscriber that a
hand-off should be made using a hand-off command.
Upon completion of the hand-off, the mobile subscriber confirms with a hand-off complete message
to MSC.
4. Inter-MSC Hand-off
A connection is changed between two cells that are in different MSCs. This situation occurs in case
of roaming. This hand-off occurs wherein the home MSC is notified of the hand-off condition
through the PSTN, and the home MSC sends the necessary data to the new MSC through the PSTN
again.
21
Page
Telephone services: provide full-duplex voice communication applications between the calling and
called subscribers according to a standard protocol.
Data or bearer services: provide capabilities to transmit information among user-network-interfaces.
Bearer services include a variety of asynchronous and synchronous data access to PSTN/ISDN and
packet switched public data networks either in a transparent mode (where GSM provides standard
channel coding for the user data) or nontransparent mode (where GSM offers special coding
efficiencies based on the particular data interface).
Supplementary ISDN services: They are not standalone services but they are digital signaling
services that supplement telephone services or data services.
Short Messaging Service (SMS) allows GSM subscribers and base stations to transmit alphanumeric
pages of limited length. SMS may be used for advertisement, safety, and advisory applications
including broadcast of highway traffic conditions or weather information to all GSM subscribers
within reception range.
22
Page
*****
23
Page