0% found this document useful (0 votes)
8 views

m5

The document provides detailed notes on Module 5 of Optical and Wireless Communication, focusing on the Global System for Mobile (GSM) architecture, including its network structure, signaling protocols, and various components like Mobile Station, Base Station System, and Network Switching System. It outlines the functionalities of each subsystem, key interfaces, and the signaling protocol architecture necessary for mobile communications. The notes are prepared by Mrs. Meghana M N, Assistant Professor at MIT Thandavapura, and serve as a comprehensive guide for students in the Electronics and Communication Engineering department.

Uploaded by

Lv vY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

m5

The document provides detailed notes on Module 5 of Optical and Wireless Communication, focusing on the Global System for Mobile (GSM) architecture, including its network structure, signaling protocols, and various components like Mobile Station, Base Station System, and Network Switching System. It outlines the functionalities of each subsystem, key interfaces, and the signaling protocol architecture necessary for mobile communications. The notes are prepared by Mrs. Meghana M N, Assistant Professor at MIT Thandavapura, and serve as a comprehensive guide for students in the Electronics and Communication Engineering department.

Uploaded by

Lv vY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

DEPARTMENT OF

ELECTRONICS AND COMMUNICATION ENGINEERING


Accredited by NBA, New Delhi

OPTICAL AND WIRELESS COMMUNICATION


21EC72
VII SEMESTER
MODULE 5 NOTES
Prepared by,
Mrs. MEGHANA M N
Assistant Professor
Dept. of ECE
MIT Thandavapura

A Unit of Maharaja Education Trust®

MAHARAJA INSTITUTE OF TECHNOLOGY


THANDAVAPURA

NH 766, Nanjangud Taluk, Mysuru- 571 302


(An ISO 9001:2015 and ISO 21001:2018 Certified Institution)
(Affiliated to VTU, Belagavi and approved by AICTE, New Delhi)
DEPARTMENT OF
ELECTRONICS AND COMMUNICATION ENGINEERING
Accredited by NBA, New Delhi

MODULE 5 CONTENTS

GLOBAL SYSTEM FOR MOBILE (GSM)

 GSM Network Architecture


 GSM signalling protocol architecture
 Identifiers used in GSM system
 GSM Channels
 Frame structure for GSM
 GSM Call procedures
 GSM hand-off Procedures
 GSM Services and features
[Text2: 11.1, 11.2,11.3,11.4, 11.5, 11.8, 11.9. 11.10]

Text Book 2:T L Singal, Wireless Communications, McGraw Hill Education (India) Private Limited,
2016, ISBN:0-07-068178-3.
WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

MODULE 5
GLOBAL SYSTEM FOR MOBILE (GSM)
1. GSM NETWORK ARCHITECTURE*****
Q. With a neat block diagram explain GSM Network architecture.
 GSM uses two 25-MHz frequency bands:
a. 890-MHz to 915-MHz band is used for mobile subscriber unit to base station transmissions
(reverse-link transmissions), and
b. 935-MHz to 960-MHz frequency band is used for base station to mobile subscriber unit
transmission (forward-link transmissions)
 GSM uses Frequency-Division Duplexing (FDD) and a combination of TDMA and FDMA
techniques to multiple mobile subscriber units.
 The GSM network architecture consists of three major subsystems:
a. Mobile Station (MS)
b. Base Station Subsystem (BSS)
c. Network and Switching Subsystem (NSS)
 They basic system architecture for a GSM network is as shown in figure 1.

Figure 1: GSM Network architecture


1
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

1. MOBILE STATION (MS)


 A mobile station communicates across the air interface with a base station transceiver (BTS) in the
same cell in which the mobile subscriber unit is located.
 The MS communicates the information with the user and modifies it to the transmission protocols of
the air-interface to communicate with the BSS.
 The user’s voice information is interfaced with the MS through a microphone and speaker for the
speech, keypad, and display for short messaging, and the cable connection for other data terminals.
The MS has two elements: ME (Mobile Equipment) and SIM (Subscriber Identity Module).
 The ME refers to the physical device, which comprises of the transceiver, digital signal processors,
and the antenna.
 The SIM card is a smart card issued to the subscriber where subscriber signs up to the service operator
and the card contains the subscribers IMSI number (International Mobile Station Identity), the mobile
MSISDN number (Mobile Station International Subscriber Directory Number) and SIM PIN
(Personal Identification Number).
 SIM card can also store SMS messages that the subscriber receives.
 The SIM card also offers some protection against fraudulent use. A GSM mobile phone is useless
without a SIM.

2. BASE STATION SYSTEM (BSS)


 BSS consist of 2 elements: BTS (Base Transceiver System) and BSC (Base Station Controller).
 The BSS consists of many BSCs which connect to a single MSC, and each BSC typically controls up
to several hundred BTSs.
 Each BTS defines a single cell. A cell can have a radius of between 100 m and 35 km, depending on
the environment.
 A BSC may be collocated with a BTS. It may control multiple BTS units and hence multiple cells.
 The BSC reserves radio frequencies, manages the hand-off of a mobile unit from one cell to another
within the BSS, and controls paging.
 The BSS manages the radio interface between the mobile stations and all other subsystems of GSM
such as MSC.
 BTS communicates with MS over air interface, BSC communicates with MSC through wired
interface and the interface is called A interface.
 The user speech signal is converted into 13 kbps- digitized voice with a speech coder and
communicated over the air- interface.
2


Page

The wired network uses a 64 kbps PCM digitized voice in the PSTN hierarchy.

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

3. NETWORK SWITCHING SYSTEM (NSS)


 NSS is responsible for the network operation. It provides the link between the cellular network and
the Public Switched Telecommunications Networks (PSTN).
 The NSS controls hand-offs between cells in different BSSs, authenticates users and validates their
accounts, and includes functions for enabling worldwide roaming of mobile subscribers.
 The NSS provides communications with other wired and wireless networks, as well as support for
registration and maintenance of the connection with the MSs via BSCs in the radio subsystem.
 The network and the switching subsystem together include the main switching functions of GSM as
well as the databases needed for subscriber data and mobility management.
 The switching subsystem consists of:
 Mobile Switch Centre (MSC)
 The main role of the MSC is to manage the communications between the GSM users and other
telecommunications network users.
 The basic switching function is performed by the MSC, whose main function is to coordinate
setting up calls to and from GSM users.
 The MSC has interfaces with the BSS on one side (through which MSC VLR is in contact
with GSM users) and the external networks on the other side (ISDN/PSTN).
 An MSC is generally connected to several BSSs, which provide radio coverage to the MSC
area. The MSC is also connected to HLR through a fixed network.
 An MSC is the hardware part of the wireless switch that can communicate with PSTN
switches using the SS7 protocol as well as other MSCs in the coverage area of a service
provider.
 If the MSC has an interface to the PSTN then it is called a Gateway MSC (GMSC).
 Home Location Register (HLR)
 The HLR is permanent database software that handles the management of the mobile
subscriber account.
 It stores the subscriber’s address, service type, current location, forwarding address,
authentication/ciphering keys, and billing information.
 Each HLR is identified by the HLR number which is sent to all the required VLRs.
 The HLR provides data needed to route calls to all MS-SIMs home based in its MSC area,
even when they are roaming out of area or in other GSM networks.
 Visitor Location Register (VLR)
 The VLR is temporary database software similar to the HLR identifying the mobile
3

subscribers visiting inside the coverage area of an MSC.


Page

 The VLR assigns a Temporary Mobile Subscriber Identity (TMSI) that is used to avoid using

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

IMSI on the air.


 The visitor location register maintains information about mobile subscribers that are currently
physically in the region covered by the switching centre.
 A VLR is linked to one or more MSCs. The function of the VLR is to memories temporarily
information about the mobiles which are currently located in the geographical area controlled
by the linked MSC.
 VLR is a database that contains temporary information about subscribers that is needed by the
MSC in order to service visiting subscribers.
 Authentication Centre (AuC)
 The AuC database holds different algorithms that are used for authentication and encryption of
the mobile subscriber.
 Transmission is done to verify the mobile user’s identity and ensure the confidentiality of each
call.
 The AuC protects network cellular operators from different types of frauds in today’s cellular
world.
 AuC holds the authentication and encryption keys for all the subscribers in both the HLR and
VLR.
 Equipment Identity Register (EIR)
 The EIR is another database that keeps the information about the identity of mobile equipment
such as the International Mobile Equipment Identity (IMEI).
 IMEI provides the details about the manufacturer, country of production, and device type.
 This information is used to prevent calls from being misused, to report stolen mobile phones or
check if the mobile phone is operating according to the specification of its type.
 Each ME is identified by IMEI which is memorized by the manufacturer and cannot be
removed.
 EIR has three different lists:
1. White List This list contains the IMEI of the phones who are allowed to enter in the
network.
2. Black List This list on the contrary contains the IMEI of the phones who are not allowed
to enter in the network, for example because they are stolen. Those phones are not able to
enter in all the GSM networks which dispose of an EIR.
3. Grey List This list contains the IMEI of the phones temporarily not allowed to enter in the
network, for example because the software version is too old or because they are in repair.
 Interworking Function (IWF)
4
Page

 It is a subsystem that allows for non-speech communication between the GSM and the other

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

networks.
 The tasks of an IWF are particularly to adapt transmission parameter and protocol conversion.
 The OSS supports one or several Operation Maintenance Centres (OMC) that is used to monitor and
maintain the performance of each MS, BS, BSC, and MSC within a GSM system.
 The OSS has three main functions, which are to maintain all telecommunications hardware and
network operations with a particular service area, manage all mobile equipment in the system, and
manage all charging and billing procedures.

2. GSM NETWORK INTERFACE


Q. Explain GSM Network Interface.
 GSM standard specifies the various interfaces between the GSM elements as shown in figure 2.

Figure 2: GSM network interfaces


 There are 3 major interfaces in GSM network: Um, Abis and A interface.
1. Um Interface: it is the air interface between the MS and BTS. It carries the GSM bursts carrying
data and control information.
2. Abis Interface: it is the physical interface between BTS and BSC.
3. A Interface: it is the interface between BSC and MSC.
4. B Interface: It is used between MSC and VLR.
5. C Interface: It is used between HLR and GMSC and also between MSC and HLR.
6. D Interface: It is used between HLR and VLR.
7. E Interface: It is used between MSC and another MSC.
8. F Interface: It is used between EIR and MSC and between EIR and GMSC.
5

9. G Interface: It is used between VLR and VLR.


Page

10. H Interface: It is used between HLR and AUC.

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

3. GSM SIGNALING PROTOCOL ARCHITECTURE *****


Q. Explain GSM signaling protocol architecture/model with a neat diagram.

Figure 3: GSM signaling protocol architecture

 Figure 3 shows the signaling protocol architecture for communication between the main hardware
elements of the GSM network architecture and the associated interfaces.
 Um Interface: The air-interface ‘Um’, which specifies communication between the MS and BTS, is
the wireless related interface.
 A-bis Interface: Messages between the BTS and BSC flow through the A-bis interface. The support
on this interface is for voice traffic at 64 kbps and data/signaling traffic at 16 kbps. Both types of
traffic are carried over LAPD (Link Access Protocol for D-Channel).
 A Interface: The interface between a BSC and a MSC is called the ‘A’ interface which uses an SS7
protocol called the Signaling Connection Control Part (SCCP). It support communication between the
MSC and the BSS.
 A number of control messages are exchanged between the key entities of GSM network architecture
that deal with Radio Resources Management (RRM), Mobility Management (MM), and Connection
Management (CM).
 The protocol stack is divided into three layers:
1. Layer 1: Physical Layer
2. Layer 2: Data Link Layer (DLL)
6
Page

3. Layer 3: Networking or Messaging Layer

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

1. Layer 1: Physical Layer


 The physical layer defined in the GSM specifications is for the Um air-interface.
 This layer specifies how the information from different voice and data services are formatted into
packets and sent through the radio channel.
 This layer specifies modulation and coding techniques, power control methodology, and time
synchronization approaches which enable establishment and maintenance of the channels.
 The physical layer of the A and A-bis interfaces with 64 kbps digital data per voice user.

2. Layer 2: Data Link Layer (DLL)


 Signaling and control data are conveyed through Layer II and Layer III messages. At the link layer, a
Data Link Control Protocol known as LAPDm is used where m refers to the modified version of
LAPD adapted to the mobile environment.
 LAPD is designed to convert a potentially unreliable physical link into a reliable data link. It does this
by using a cyclic redundancy check to perform error detection and Automatic Repeat Request (ARQ)
to retransmit damaged frames.
 The LAPD protocol is used for the A-bis and A interfaces connecting the BTS to BSC and BSC to
MSC, respectively.
 The frame format of the layer II LAPDm packets, shown in Figure 4, is the same as LAPD, but the
format is slightly adjusted to fit the mobile environment.

Figure 4: The frame format of the layer II LAPDm packets

 The Address filed is also optional and holds the nature of message address field.
 The control field is also optional and holds the type of the frame.
 The length indicator identifies the length of the information field.
 Fill-in bits are all 1s bits to extend the length to the desired 184 bits.

3. Layer III: Networking or Signaling Layer


 The networking or signaling layer implements the protocols needed to support the mechanisms
required to establish, maintain, and terminate a mobile communication session.
 It is also responsible for control functions for supplementary and SMS services.
7

 The traffic channels are used to carry different speech or data services.
Page

 A signaling procedure such as the registration process is composed of a sequence of communication

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

events or messages between hardware elements of the systems that are implemented on the logical
channels.
 Layer III defines the details of implementation of messages on the logical channels with DLL frames.
 Information bits of the Layer II packets specify the operation of a Layer III message. As shown in
Figure 5, these bits are further divided into several fields.

Figure 5: The layer III message format

 The Transaction Identifier (TI) field is used to identify a procedure or protocol that consists of a
sequence of messages.
 The Protocol Discriminator (PD) identifies the category of the operation (management, supplementary
services, call control, and test procedure).
 The Message Type (MT) identifies the type of message for a given PD.
 Information Elements (IE) is an optional field for the time that an instruction carries some information
that is specified by an IE Identifier (IEI).
 GSM standard divides the messages into three sublayers that provide specific functions:
 Radio Resource Management (RRM) - The RRM establishes and releases connections between
MSs and an MSC and maintains them despite subscriber movements. The RRM functions are
mainly performed by the MS and the BSC. The main responsibilities of the RRM are to assign the
radio channel and hop to new channels.
 Mobility Management (MM) –The major functions of MM are location update, registration
procedures, authentication procedure, TMSI handling, and attachment and detachment procedures
for the IMSI. MM functions are handled by the MS/SIM, the MSC/VLR, and the HLR/AuC.
 Communication Management (CM) – The CM is used to establish, maintain, and release the
circuitswitched connection between the calling and called subscribers of GSM network.
 Mobile Application Part (MAP) - handles most of the signaling between different entities in the
fixed part of the network, such as between the HLR and VLR.
 It runs on top of two intermediate protocols––Signal Connection Control Part (SCCP) and Message
Transfer Part (MTP).
 SCCP and MTP protocols are part of Signaling System Number 7, which is a set of protocols
designed to provide control signaling within digital circuit-switching networks.
8
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

4. IDENTIFIERS USED IN GSM SYSTEM*****


 Several identity numbers are associated with a GSM system, they are: IMSI, SIM, MSISDN, LAI,
MSRN, and TMSI.
1. IMSI - International Mobile Subscriber Number
 The IMSI is usually 15 digits or less.
 When an MS attempts a call, it needs to contact a BS. The BS can offer its service only if it
identifies the MS as a valid subscriber.
 For this, the MS needs to store certain values uniquely defined for the MS, like the country of
subscription, network type, subscriber ID, and so on. These values are called the International
Mobile Subscriber Identity (IMSI).
 The structure of an IMSI is shown in Figure 6. The first three digits specify the country code, the
next two specify the network provider code, and the rest are the mobile subscriber identification
code (the customer ID number).

Figure 6: Format of IMSI


2. SIM - Subscriber Identity Module
 Every time the MS has to communicate with a BS, it must correctly identify itself.
 An MS does this by storing the mobile phone number, Personal Identification Number (PIN) for the
mobile station, authentication parameters, and so on, in the SIM card.
 Smart SIM cards also have flash memory that can be used to store small SMS sent to the unit.
 The main advantage of SIM is that it supports roaming with or without a cellphone, also called SIM
roaming.
 The SIM card is the heart of a GSM mobile phone, and the MS hardware equipment is unusable
without it.

3. MSISDN - Mobile System Integrated Services Digital Network


 MSISDN is the number that identifies particular MS subscriber, with the format shown in Figure 7.

Figure 7: Format of MSISDN


9

 The GSM actually does not identify a particular mobile phone, but a particular HLR. It is the
Page

responsibility of the HLR to contact the mobile phone.

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

4. LAI - Location Area Identity


 As shown in Figure 8 the GSM service area is usually divided into a hierarchical structure that
facilitates the system to access any MS quickly.

Figure 8: GSM system hierarchy


 Each PLMN area is divided into many MSCs. Each MSC typically contains a VLR to inform the
system if a particular cellphone is roaming, and if it is roaming, the VLR of the MSC, in which the
cellphone is, reflects the fact.
 Each MSC is divided into many Location Areas (LAs). An LA is a cell or a group of cells and is
useful when the MS is roaming in a different cell but the same LA.
 Since any LA has to be identified as a part of the hierarchical structure, the identifier should contain
the country code, the mobile network code, and the LA code.

5. IMSEI - International MS Equipment Identity number


 Each manufactured GSM mobile phone equipment is assigned a 15-bit long IMSEI to contain
manufacturing information, as shown in Figure 9.

Figure 9: Format of IMSEI


 When the mobile phone equipment passes the interoperability tests, it is assigned a type approval
code.
 Single mobile unit may not be manufactured at the same place, a field in IMSEI, called the final
assembly code identifies the final assembly place of the mobile unit.
10

 To identify uniquely a unit manufactured, a Serial Number (SN) is assigned.


Page

 A spare digit is available to allow further assignment depending on requirements.

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

6. MSRN – MS Roaming Number


 When an MS roams into another MSC, that unit has to be identified based on the numbering scheme
format used in that MSC.
 Hence, the MS is given a temporary roaming number called the MSRN, with the format shown in
Figure 10.

Figure 10: Format of MSRN


 This MSRN is stored by the HLR, and any calls coming to that MS are rerouted to the cell where
the MS is currently located.

7. TMSI - Temporary Mobile Subscriber Identity


 As all transmission is sent through the air interface, there is a constant threat to the security of
information sent. A TMSI is usually sent in place of IMSEI.

5. GSM CHANNEL CONCEPT*****


Q. Write a note of GSM channel or Explain logical channels in GSM.
 GSM cellular network uses various control and traffic channels to setup radio link for the transmission
of voice or data.
5.1 LOGICAL CHANNELS
 Logical channels are used to carry CONTROL or TRAFFIC information as shown in table 11.2.

11
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

1. GSM CONTROL CHANNEL (CCH)


 CCH used to establish communication between user and network access point and it carries signaling
information.
 There are 3 types of CCH: BCH, CCCH and DCCH.
1) BROADCAST CHANNEL (BCH)
 It is used to provide information to the mobile station about various system parameters and also
information about the Location area Identity (LAI). Here the MS can tune to particular BTS.
 There are 3 types of BCH: BCCH, FCCH and SCH.
i. BCCH – Broadcast Control Channel:
 It contains information that is needed by the MS about cell that it is attached to in order for the
MS to start making or receiving call or roaming.
 It includes information like maximum output power allowed in cell and carrier frequencies of
neighboring cells.
 It is used only in downlink direction from BTS to MS.
ii. FCCH – Frequency Correction Channel:
 It transmits bursts of zeros to the MS.
 Signaling is done for 2 reasons: MS use this signal to synchronize itself to correct frequency and
it is used by MS to verify correct channel.
 It is used only in downlink direction from BTS to MS.
iii. Synchronization Channel (SCH):
 It is used to transmit the required information for the MS to synchronize itself with particular
cell.
 MS gets information about frame number in the present cell and about BTS it is attached to.
 It is used only in downlink direction from BTS to MS.

2) COMMON CONTROL CHANNEL (CCCH)


 CCCH provides paging message to MS.
 There are 3 types of CCCH: PCH, RACH and AGCH.
i. Paging Channel (PCH):
 It is used by the system to send paging messages to the mobiles attached to the cell and mobile’s
identity number.
 The mobile will be paged whenever the network has an incoming call ready from the mobile or
12

some SMS or MMS to deliver to mobile.


Page

 It is used only in downlink direction from BTS to MS.

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

ii. Random Access Channel (RACH):


 It is used by the mobile to respond to a paging message.
 If a mobile receives a page on PCH, it will reply on the RACH for signaling channel request.
 It gives the information’s to BTS like distance between MS to BTS, time delay to transmit
information from MS to BTS and many more.
 In GSM system, RACH signal allows the maximum radius of 35kms.
 It is used only in uplink direction from MS to BTS.
iii. Access Grant Channel (AGCH):
 It is used by the network to assign a signaling channel to the MS.
 After mobile requests signaling channel over RACH, the network will assign AGCH to the
mobile.
 It is used only in downlink direction from BTS to MS.
3) DEDICATED CONTROL CHANNEL (DCCH):
 DCCH are used for call setup, handover and for short message delivery function.
 There are 4 types of DCCH: SDCCH, SACCH, FACCH.
i. Stand-alone Dedicated Control Channel (SDCCH):
 The call setup procedure like the initial step required to setup a radio link is performed on the
SDCCH.
 It is used both in uplink and in downlink direction from MS to BTS and from BTS to MS.
ii. Slow Associated Control Channel (SACCH):
 It is used to transmit information about measurements made by MS or instructions from the
BTS about mobile parameters.
 In uplink direction mobile sends measurement of received signal strength from its own BTS to
neighboring BTS.
 In downlink direction MS receives information the BTS about mobile’s output level.
 It is used both in uplink and in downlink direction from MS to BTS and from BTS to MS.
iii. Fast Associated Control Channel (FACCH):
 It is used to the provide handover in a GSM system.
 If handover is required, the handover signaling information is transmitted instead of 20ms
speech segment.
 This operation is known as “Stealing Mode” since time allotted for voice conversation is stolen
for short period of time.
13

 The subscriber is not aware of this loss of speech during this process.
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

2. TRAFFIC CHANNEL (TCH)


 TCH used to carry speech and data traffic.
 There are 3 types of TCH: TCH/F, TCH/H and EFR.
1)TCH/F (Full-rate Traffic Channel): It carries one conversation using one timeslot. The
transmitted voice signal is encoded at 13kbps data rate and with additional overhead the final
channel data rate is 22.8kbps.
2)TCH/H (Half-rate Traffic Channel): It carries 2 conversations or a conversation and a data using
one timeslot. Voice is encoded at a rate of 6.5kbps and data at a rate of 4.8kbps and with
additional overhead the final channel data rate is 11.4kbps.
3)EFR (Enhanced Full Rate): It encodes voice at 12.2kbps rate like TCH/F and with overhead the
channel data rate is 22.8kbps.

6. FRAMES STRUCTURE FOR GSM


 Frames in GSM used transmission in any TDMA-based wireless communication system is in the form
of a repetitive sequence of frames.
 Each TDMA frame is divided into a number of uniform time slots.
 Each time slot position across the sequence of frames forms a separate logical channel.

6.1 STEPS IN DESIGNING TDMA TIME SLOTS


 In designing an appropriate frame structure in TDMA, the following requirements are generally
considered:
1. Frequency Band of Operation The most common spectrum allocated to cellular mobile
communication applications is around 900 MHz.
2. Number of Logical Channels or Number of Time Slots in TDMA Frame In order to justify
the additional costs of multiplexing, let the minimum number of time slots per TDMA frame be 8
so as to serve eight simultaneous users.
3. Channel Bandwidth The current channel bandwidth being used for analog FM cellular systems
in Europe is 25 kHz. To serve 8 mobile subscribers using TDMA technique, the channel
bandwidth should not exceed 200 kHz.
4. Maximum Cell Radius (R) To provide radio service to high traffic in rural areas, let the
maximum cell radius be 35 km.
5. Maximum Vehicle Speed (Vm) To accommodate mobile subscriber units traveling on
expressways or highspeed trains, the maximum vehicle speed be 250 km/h.
14

6. Maximum Delay Spread (Δm) Delay spread is the difference in propagation delay among
Page

different multipath signals arriving at the same Rx antenna. Typical delay spread in mountainous

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

regions is about 10 seconds.


7. Maximum Coding Delay To avoid unnecessary delays within the fixed wireless network, which
may involve satellite links, maximum coding delay be approximately 20 milliseconds.
 Figure 11 suggests the general steps to be considered in designing the time slot in a TDMA frame.

Figure 11: Steps in design of TDMA time slot

6.2 GSM BASIC FRAME STRUCTRE


 The GSM basic frame structure is as shown in figure 12.

Figure 12: The GSM basic frame structure

 Tail Bits: (3 Bits each at the Beginning and End of a Time Slot Excluding Guard Bits) It allows
synchronization of transmissions from mobile units located at different distances from the base
station.
 Encrypted Data: (114 Bits) Data is encrypted in blocks by conventional encryption of 114 plaintext
bits into 114 ciphertext bits; the encrypted bits are then placed in two 57-bit data fields in the time
slot.
 Training Data: (26 Bits) It is used to adapt the parameters of the receiver to the current path-
15

propagation characteristics and to select the strongest signal in case of multipath propagation. The
training sequence is a known bit pattern that differs for different adjacent cells.
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

 Guard Bits: (8.25 Bits) It is used to avoid overlapping with other bursts due to different path delays.
 The 148 bits of a data burst are used to transmit the information. Delimited by tail bits (consisting of
0s), the frame contains 26 training bits sandwiched between two bursts of data bits. These training bits
allow the receiver to synchronize itself.

6.3 GSM HYPERFRAME FORMAT*****


Q. Explain GSM hyperframes / Explain the frame format used in GSM traffic.
 GSM frame structure is designed in 4 different ways as shown in figure 13:
i. Hyperframe
ii. Superframe
iii. Multiframe
iv. TDMA frame

Figure 13: GSM hyperframe format


 8 timeslots constitute a 1 TDMA frame. This grouping of successive TDMA frames is known as
Hyperframe.
 1 Hyperframe consists of 2,048 Superframes and takes 3 hours, 28mins, 53 seconds and 760 ms to
complete.
 Each superframe consists of 1,326 TDMA frames and takes 6.12 seconds to complete.
 These superframes take 1 or 2 possible formats.
16

i. Form 1 superframe format consists of 51 multiframes


Page

ii. Form 2 superframe format consists of 26 multiframes

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

 Each multiframes consists of 26 TDMA frames which takes 120ms to complete (for form1
superframe) or 51 TDMA frames which takes 235ms to complete (for form 2 superframe).
 Within 1 TDMA frame there are 8 timeslots which takes 4.6ms to complete.

6.4 PHYSICAL DATA BURSTS IN GSM***


 There are 5 different types of burst signal as shown in figure 14.

Start bit Encrypted data Training bits Encrypted data Stop bits Guard period
(3) (58) (26) (58) (3) (8.25bits)
1. Normal burst in GSM
Start bit Fixed bits of all 0s Stop bits Guard period
(3) (142) (3) (8.25bits)
2. Frequency correction (FCCH) burst in GSM
Start bit Encrypted data Training bits Encrypted data Stop bits Guard period
(3) (39) (64) (39) (3) (8.25bits)
3. Synchronization (SCH) data burst in GSM
Start bit Synchronization Encrypted data Stop bits Guard period
(8) (41) (36) (3) (8.25bits)
4. Access (RACH) burst in GSM
Start bit Mixed bits Training bits Mixed bits Stop bits Guard period
(3) (58) (26) (58) (3) (8.25bits)
5. Dummy burst in GSM
Figure 14: GSM bursts

1. Normal Burst (NB) in GSM:


 It consists of two groups of 58 encrypted bits transmitted on either side of a Training bits.
 Training Sequence consist of alternate 0s and 1s of 26 bits.
 Two groups of 3 bit Start and Stop Bits are placed before 1st group and last group of traffic bits. It
consists of 3 zeros which provide time to initialize itself.
 It has 8.25 bit long Guard Period (GP) at the end of the burst where no transmission takes place.
2. Frequency correction (FCCH) burst in GSM:
 Used by mobile to obtain frequency synchronization.
 It consists of 142 fixed bits (binary 0s) proceeded by 3 Start Bits followed by 3 Stop bits in the last.
 It has 8.25 bit long Guard Period (GP) at the end of the burst where no transmission takes place.
 This can be used on Frequency Correction Channel (FCCH).
3. Synchronization (SCH) data burst in GSM
17

 It is used by the mobile to obtain timing synchronization.


Page

 It consist of 3 Start bits followed by 39 encrypted bits, a 64 bit synchronization sequence, 39 more

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

encrypted bits, 3 Stop bits and 8.25 bit long Guard Period (GP).
 The encrypted bits contain Frame Number (FN).
 This can be used on Synchronization Channel (SCH).
4. Access (RACH) burst in GSM:
 Used by the mobile to facilitate random access request by the mobile and handover operations.
 It consists of 8 Start Bits followed by 41 bit synchronization sequence, 36 bit encrypted bits and 3
Stop bits.
 It has 68.25 bits long Guard Period (GP).
 This can be used on both Random Access Channel (RACH) and Fast Associated Control Channel
(FACCH).
5. Dummy burst in GSM:
 It is transmitted on the radio frequency when no other types of burst signal are being transmitted.
 It consists of 3 Start bits, 58 mixed bits, 26 bit training sequence, 58 more mixed bits, 3 stop bits and
8.25 bit long Guard Period (GP).
 The purpose of DB is to ensure that the BS is always transmitting on the frequency carrying the
system information.

7. GSM CALL PROCEDURES


 There are three mechanisms of call establishment: Registration of the mobile subscriber, Call
establishment, and Hand-off procedures.
1. REGISTRATION
 For an MS to operate in an MSC, it must be registered by accessing the BTS.
 The MSC assigns a TMSI to the MS and updates the information in VLR and HLR.
 Whenever the MS is switched on, there is a need to possibly establish a new registration with the
cellular network.
 If the present location is not the same as before, the MS initiates a registration procedure.
 During a registration procedure, the system provides the MS with a control channel for preliminary
signaling.
 The MS provides its own identity, and finally the system authenticates the MS.
 The MS registration process is described in Table 2 when a mobile subscriber is switched on in a
new MSC area.
18
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

Table 2: MS registration process

2. MOBILE-TO-NETWORK CALL
 mobile subscriber first dials the called subscriber number and presses the send button on the GSM
mobile phone.
 The mobile subscriber transmits a burst of RACH data to the base station.
 The base station then responds with message which assigns the mobile subscriber to a new channel
for connection.
 The step-by-step procedure for mobile-originated call establishment is described in Table 3.

Table 3: Mobile to Network call procedure

19
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

3. NETWORK-TO-MOBILE CALL
 To make a call from a landline telephone subscriber, the call-request information is processed
through the gateway MSC to the destination MSC after getting the information from the home
HLR of the called mobile subscriber.
 Then the called mobile subscriber is contacted through the BSS. The base station broadcasts a
message, The base station then assign the mobile subscriber unit to a new channel for connection.
 Figure 14 shows Network-to-Mobile call in the PSTN directs the call initiated by the calling
landline telephone subscriber to the MSC identified by the dialed phone number of the called
mobile subscriber.

Figure 14: Network-to-Mobile call in a visiting network

 The MSC requests routing information from the HLR. Since the mobile subscriber is roaming in the
area of a different MSC, the gateway MSC contacts the destination MSC.
 The VLR initiates a paging procedure in all BSSs under the control of the MSC.
 After getting response from the MS, the VLR sends the necessary system parameters to the MSC to
establish the link to the MS.

8. GSM HAND-OFF PROCEDURES


 Hand-off in GSM is divided into four major categories:
1. Intracell-Cum-Intra-BTS Hand-off
 This type of hand-off is necessary when high interference occurs during the call. The channel for
the connection is changed within the cell by moving to another frequency of the same cell or to
another time slot of the same frequency. The hand-off process is initiated by the base station.
2. Intercell-Cum-Intra-BSC Hand-off
 In this type of hand-off, the change is in the radio channel between two cells that are served by the
same BSC. The channel for the connection is changed outside the cell by the using same BSS. The
MSC transmits the hand-off request to the destination BSS.
20

3. Inter-BSC-Cum-Intra-MSC Hand-off
Page

 A call connection is changed between two cells that are served by different BSCs but operate in the

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

same MSC.
 Figure 11.30 shows the hand-off procedure between two BSSs that are controlled by one MSC.

 When the measured value of the received signal strength at the mobile subscriber is lower than the
threshold value, it informs the serving BSC which initiates the hand-off command to the MSC of
that area.
 The MSC relays the hand-off request to the BSC, which sends a channel activation request to its
BTS.
 It is then possible for the hand-off call to be handled in the new MSC.
 The BTS provides the MS with a list of available channels in neighboring cells and reports these
measured data to the MSC.
 The BTS also monitors the received signal strength from the mobile subscriber to make a hand-off
decision.
 The MSC negotiates a new channel with the new BSS and indicates to the mobile subscriber that a
hand-off should be made using a hand-off command.
 Upon completion of the hand-off, the mobile subscriber confirms with a hand-off complete message
to MSC.
4. Inter-MSC Hand-off
 A connection is changed between two cells that are in different MSCs. This situation occurs in case
of roaming. This hand-off occurs wherein the home MSC is notified of the hand-off condition
through the PSTN, and the home MSC sends the necessary data to the new MSC through the PSTN
again.
21
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

9. GSM SERVICE AND FEATURES


 The types of services to be offered over GSM network can be classified into 3 categories:
1. Telephone service
2. Data or Bearer service
3. Supplementary ISDN services

 Telephone services: provide full-duplex voice communication applications between the calling and
called subscribers according to a standard protocol.
 Data or bearer services: provide capabilities to transmit information among user-network-interfaces.
Bearer services include a variety of asynchronous and synchronous data access to PSTN/ISDN and
packet switched public data networks either in a transparent mode (where GSM provides standard
channel coding for the user data) or nontransparent mode (where GSM offers special coding
efficiencies based on the particular data interface).
 Supplementary ISDN services: They are not standalone services but they are digital signaling
services that supplement telephone services or data services.
 Short Messaging Service (SMS) allows GSM subscribers and base stations to transmit alphanumeric
pages of limited length. SMS may be used for advertisement, safety, and advisory applications
including broadcast of highway traffic conditions or weather information to all GSM subscribers
within reception range.

22
Page

Meghana M N, Assistant Professor, MIT Thandavapura


WIRELESS & CELLULAR COMMUNICATION – 18EC81 MODULE 2

*****

23
Page

Meghana M N, Assistant Professor, MIT Thandavapura

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy