Introduction To GSM: Technology
Introduction To GSM: Technology
Introduction to GSM
ROOT 2 technology
Introduction to GSM
This document is provided for training purposes only. Every effort has been made to ensure this document is as complete and as accurate as possible, but no warranty or fitness is implied. Root 2 Technology Limited has neither liability nor responsibility for any loss or damages caused to any person or entity arising from the information contained in this document.
Root 2 Technology and the Root 2 Logo are trademarks of Root 2 Technology Limited, all other trademarks are property of their respective owners
This document is copyright protected and must not be copied, reprinted or reproduced by any means mechanical, electrical or electronic or stored in any electronic retrieval system without the express written permission of the copyright holders Root 2 Technology Limited.
ROOT 2 technology
Introduction to GSM
Course Aim
The aim of this course is to provide the delegate with an understanding of the functionality and operation of a GSM Network. To explore interconnections between Mobile and Fixed network, studying signalling and al call establishment procedures.
ROOT 2 technology
Introduction to GSM
Course Objectives
On completion of this course of instruction the delegate will have gained an understanding of: In Module 1 - An Introduction to GSM Features In Module 2 - The GSM Network In Module 3 - GSM Terrestrial Interfaces In Module 4 - The Radio Air Interface In Module 5 - Air Interface Optimisation In Module 6 - Call and Handover Proceedures
ROOT 2 technology
Module Objectives
On completion of this module of instruction the delegate will have gained an understanding of: -
Discuss the history surrounding the birth of GSM Explore the reasons for using Cellular Networks List the GSM Cell structures Explain the GSM Frequency spectrums Discuss why Frequency reuse is adopted Define Interference occurring within GSM Networks Explore the reasons for using Cell sectorisation Compare the Noise differences with Analogue and Digital sources List the reasons for using TDMA Identify what Security GSM adopts Discuss the Services available with GSM
ROOT 2 technology
PSTN MSC
BSS MS
MS
MS BSS MS MS BSS BSS BSS (Public switched telephone network) (Mobile service switching centre) (Base station system) MS (Mobile station) (Cell coverage area) MS BSS
1. The liberalisation of the monopoly of telecommunications in Europe during the 1990s and the resulting competition, which consequently lead to lower prices. 2. The knowledge base and professional approach within the Groupe Speciale Mobile, together with the active cooperation of the industry; 3. The lack of competition; For example, in the United States and Japan, competitive standards for mobile services started being defined only after GSM had already been established. GSM also offered additional advantages over the existing analogue networks for both subscribers and network operators. It gave subscribers mobility, flexibility and convenience, whilst giving operators the flexibility of network expansion, increased revenue/profit margins, efficiency and easier re-configuration of networks if required. These areas will be discussed later in the course. GSM networks comprise of three main components, the Mobile services Switching Centres (MSC), Base Station Systems (BSS) and the phone itself known as a Mobile Station (MS). There are other network elements that will be discussed later.
ROOT 2 technology Limited 2001 Page 6 of 6
ROOT 2 technology
Cellular Technology
The GSM network is a Cellular Network, meaning that the network comprises of many hundreds of cells. A Cell covers an area in which an MS communicates with the network. If the MS for whatever reason is not located within a cell, then no communication is possible and the MS cannot make or receive calls. You may have seen this when you have no signal on your own MS. Cells are provided by the BSS and are controlled by a Base Station Controller (BSC). The BSS contains one BSC and multiple cells, depending on network configuration, planning and the surrounding terrain. Each cell in turn is controlled by a Base Transceiver Station (BTS), which relays information to the controlling element of the BSS, the BSC. The cells are normally drawn as hexagonal, but in practice they are irregularly shaped, this is as a result of the influence of the surrounding terrain, or of design by the network planners.The number of cells in any given geographical area is determined by the total number of MS subscribers whom operate within that given area, allowing also for roaming of additional MS subscribers in and out of that given area and the physical layout of the area (hills, forests, buildings etc). The maximum cell size for GSM is approximately 70 km in diameter BTS dependant though on the terrain over BTS BTS which the cell will cover and other factors such as the power of the MS and BTS BTS the number of MS subscribers. In GSM, BTS the maximum power that an MS transmits is approx 8 Watts, many though BTS transmit at much lower power levels such 300 m - 70 km as 1 Watt. Power will be discussed later as health and safety issues have become a major issue regarding radiation transmission. The higher the power, the larger the cell size. For example, if a cell Terms that you may have heard of site was placed on the top of a hill, with no obstruction, then the radio waves will referring to cell size, Macro for large cells, Micro and Pico for smaller cells. travel much further than that of a cell site in the middle of a city, with high-rise buildings causing obstructions. Generally large cells are employed in the following areas:
TRX TRX TRX TRX TRX TRX TRX
1. Remote areas. 2. Coastal regions. 3. Areas with few MS subscribers. Smaller cells are used where there is a requirement to support a large number of MS subscribers, in a small geographical region, or where a low transmission power is required to reduce the possible effects of interference. Small cells cover areas of approximately 200 m and upwards. Typical uses of small cells being: 1. Urban areas. 2. TX power requirements. 3. High number of MS subscribers. There is no correct answer for cell choice when configuring a GSM network. Network providers would like to use large Macro type cells to reduce installation and maintenance costs, but realise that this would restrict MS subscriber access and quality of the service that they could offer. Terrain, transmission power, size of coverage area all have to be taken into account when planning cell size, along with one other key element to the network, that of Frequency Allocation. All of these factors inevitably lead to the network being configured with a mixture of both large and small cells.
ROOT 2 technology Limited 2001 Page 7 of 7
ROOT 2 technology
Frequency Allocation
The frequency spectrum is extremely congested, with only narrow slots within the total spectrum being allocated for cellular communications. The list below shows the number of frequencies and total spectrum allocated to GSM, Extended GSM 900 (EGSM), GSM 1800 (Digital Communications System 1800) and PCS 1900 (Personal Communications System). The GSM spectrum is split into Radio Frequency (RF) carriers half allocated to transmission Uplink and the others receiving Downlink. GSM being a Duplex network (having the ability to transmit and receive information simultaneously) has to have a frequency allocated in both the uplink and downlink to achieve this.These uplink and downlink frequencies are linked together forming a pair and are given the name Absolute Radio Frequency Channel Number (ARFCN). This pairing gives GSM its duplex operation.
Down link
GSM 900 Uplink 890 - 915 MHz Downlink 935 - 960 MHz EGSM Uplink 880 - 915 MHz Downlink 925 - 960 MHz GSM 1800 (DCS 1800) Uplink 1850 - 1910 MHz Downlink 1930 - 1990 MHz
870
937
Up link
892 960
100K
100K
937 Freq.
100K 100K
892 Freq.
For successful duplex operation within GSM, the uplink and downlink frequencies have to be separated by a specific range, dependant on the frequencies used. If this separation is not present, duplex operation will fail due to interference problems incurred over the air interface from other frequencies. Frequency separation can be seen below. For each cell in a GSM network at least one ARFCN must be allocated, more can be allocated by the network to increase capacity to the network, increasing the number of subscribers. The RF carrier is divided into eight Time Division Multiple Access (TDMA) timeslots, allowing each RF carrier the capability of supporting up to eight simultaneous telephone calls. Later in the course we will see that although possible, network signalling and messaging is required, therefore reducing the overall number of timeslots per RF carrier to six or seven and reducing the number of simultaneous calls possible. Unlink the PSTN network, where every telephone is connected via a pair of fixed wires on a permanent basis, the MS only connects to the network over the air interface when required and it is possible to have a single RF carrier supporting many more mobile stations than its eights available timeslots. It is possible for a single RF carrier to support around twenty mobile stations, obviously though not all of these mobile subscribes could make a call at the same time. Therefore without the MS actually knowing, it shares the same physical resources of the network with other mobile stations, but at different times.
ROOT 2 technology Limited 2001 Page 8 of 8
ROOT 2 technology
Frequency Re-use
One of the limitations with GSM is the actual number of ARFCN that are allocated to individual networks. The entire GSM spectrum has to be allocated between all operators within a country i.e. within the United Kingdom the spectrum is split between four main operators Vodafone, BT Cellnet, Orange and One2One. In addition, with increased subscribers requiring access operators have to adopt two key features of implementation in order to elevate these problems, those being Frequency Re-use and Cell Sectorization. The cells that we have talked about so far are known as Omni-directional Cells. This is a cell site that typically has one antenna and is allocated a single ARFCN. It covers a large geographical area with limited access to subscribers. One antenna requires an ARFCN, so the more antennas that a site has, the more ARFCN required. The problem with employing omnidirectional cells throughout the whole of the network, is that when the number of MS increases in the same geographical area, the operator has to increase the number of cells to cater for the increased requirement of traffic. To increase the number of cells within a given geographical area increases the risk of interference. As we make omni-directional cells smaller and increase the number used, we introduce Co-Channel and Adjacent Channel Interference, both degrading the networks performance.
3 / 9 Configuration
4 / 12 Configuration
Co-Channel Interference occurs when RF carriers of the same frequency are transmitting in close proximity to each other, the transmission from one RF carrier interferes with the other carrier. Adjacent Channel Interference occurs when the RF source of a nearby frequency interferes with the RF carrier. To gain an increase of capacity within the geographical area we employ a technique called Sectorization. Sectorization divides single cells into a number of cells, with each cell having its own allocated ARFCN and acting independently. Each cell uses directional antennas as to not interfere with its neighbours. Sectorization has advantages: Firstly, we now concentrate all of the antennas energy into a smaller area 60, 120 or 180 degrees rather than 360 degrees, increasing signal strength which is beneficial for built up areas and in building coverage. Secondly, as the cells are focused covering a much smaller geographical area, it allows us to implement a much closer frequency re-use pattern, allowing greater capacity access for subscribers. When planning the frequency re-use pattern the network planner must take into account how often to use the same frequencies whilst determining the size of each individual cell. If the planner miss calculates either of these co-channel or adjacent channel interference may occur.
ROOT 2 technology Limited 2001 Page 9 of 9
ROOT 2 technology
Cell Sectorization
For GSM each carrier has a separation of 200 KHz, so adopting re-use as to not interfere with surrounding sells a separation of 400 KHz minimum must be used. An example of this is shown. GSM specifications state that for optimum performance a separation of 800 KHz should be used. Unfortunately, due to the number of ARFCN that an operator is allocated it is extremely difficult to implement using 800 KHz and typically you will only find spacing of around 400 KHz. For GSM each carrier has a separation of 200 KHz, so adopting re-use as to not interfere with surrounding sells a separation of 400 KHz minimum must be used. An example of this is shown. GSM specifications state that for optimum performance a separation of 800 KHz should be used. Unfortunately, due to the number of ARFCN that an operator is allocated it is extremely difficult to implement using 800 KHz and typically you will only find spacing of around 400 KHz. When planning the frequency re-use pattern, the network planner must take into account how often to use the same frequencies whilst determining the size of each individual cell. If the planner miss calculates either of these co-channel or adjacent channel interference may occur. In GSM each carrier has a separation of 200 KHz,
Site 120 degree cells Cell Cell Site Cell Cell Cell Cell Site Cell 60 degree cells Cell Cell
6 Cell Site 6 Transmit/Receive Antenna 3 Cell Site 3 Transmit/Receive Antenna
Variations in cell configurations lead to increased subscriber capacity, increased re-use patterns and the geographical size of cell coverage areas.
so adopting re-use as to not interfere with surrounding sells a separation of 400 KHz minimum must be used. An example of this is shown. GSM specifications state that for optimum performance a separation of 800 KHz should be used. Unfortunately, due to the number of ARFCN that an operator is allocated it is extremely difficult to implement using 800 KHz and typically you will only find spacing of around 400 KHz. The diagram above illustrates how, by sectoring a site we can fit more cells into the same geographical area, therefore increasing the number of MS subscribers that can gain access. The sectorization of sites typically occurs in densely populated areas, or where there is a high demand of mobile subscribers, such as residential or business areas.
ROOT 2 technology Limited 2001 Page 10 of 10
ROOT 2 technology
Page 11 of 11
ROOT 2 technology
Increased Capacity
With the analogue air interface, every connection to the network required one RF carrier. Old analogue systems typically used Frequency Division Multiple Access (FDMA) rather than Time Division Multiple Access (TDMA) in GSM. As we have already discussed, TDMA has eight timeslots for transmission, where FDMA has only one, limiting control and more importantly, the number of subscribers that can simultaneously access the network. FDMA networks required a greater number of equipments, per cell, if capacity of the network was to increase. This made network expansion expensive and time consuming as many sites had to be configured and retuned manually, making the analogue system extremely inflexible. GSM equipment however, overcomes many of these issues due to it being controlled primarily by its software. The reconfiguration of the network can be implemented quickly, with minimum manually intervention, and by using TDMA, expansion can be implemented
Increased Capacity FDMA requires up to eight times the equipments than that of a TDMA network.
FDMA
TDMA
Timeslots
with less equipment. In addition, GSM has standardised interfaces between network components, such as Signalling System No.7 (C7). Therefore, along with the radio equipment, upgrades to the entire network can be implemented with minimum disruption, time delay and cost. A key feature of GSM is that it offers the flexibility of International Roaming. This permits the MS subscriber to travel to foreign countries with GSM networks, and use their phones as if they were at home. If chosen too, a subscriber can choose only to take their Subscriber Identity Module (SIM) that we will discuss later, and hire a phone whilst travelling abroad. GSMs use of a digital air interface makes it more resilient to interference than historical analogue interfaces. It allows users on the same frequency or nearby frequencies to be co-located in closer geographical areas, decreasing the size of cells, making better use of ARFCN available within the re-use pattern. As GSM progresses, Multi-band networks and mobile phones now operate, operating within both frequency spectrums of 900 MHz and 1800 MHz/1900 MHz. In order for this the mobile must be capable of working in dual band mode, to the user however this is transparent. Multiband operation, allows the network greater flexibility in planning as it increases the number of frequencies available for the re-use pattern. It reduces interference and considerably increases the networks available or potential MS subscriber capacity.
ROOT 2 technology Limited 2001 Page 12 of 12
ROOT 2 technology
Page 13 of 13
ROOT 2 technology
Key Points
Flexibility and Compatibility Subscriber - Mobility, Flexibility, Convenience. Network Provider - Network Expansion Flexibility, Revenue/Profit margins, Efficiency and easier to Re-Configure. Cellular Technology Large cells are employed in the following areas: 1. Remote areas. 2. Coastal regions. 3. Areas with few MS subscribers. Typical uses of small cells being: 1. Urban areas. 2. TX power requirements. 3. High number of MS subscribers. Increased Capacity The RF carrier is divided into eight Time Division Multiple Access (TDMA) timeslots, allowing each RF carrier the capability of supporting up to eight simultaneous telephone calls. Uplink and downlink frequencies are linked together forming a pair and are given the name Absolute Radio Frequency Channel Number (ARFCN). To combat noise, GSM communicates to the network using Digital waveforms. Frequency Allocation GSM 900 Uplink 890 - 915 MHz Downlink 935 - 960 MHz EGSM 900 Uplink 880 - 915 MHa Downlink 925 - 960MHz GSM 1800 Uplink 1850 - 1910 MHz Downlink 1930 - 1990 MHz Frequencies separated with 200 KHz spacing both uplink and downlink. (374 ARFCN available) (174 ARFCN available) (124 ARFCN available)
Page 14 of 14
ROOT 2 technology
Module Objectives
On completion of this module of instruction the delegate will have gained an understanding of: -
Identify the GSM Network Configuration Discuss the functions of the Mobile Station List Mobile Station configurations Explore the characteristics of the SIM Explain the operation of the BSS Discuss the functions of the BTS List BTS configurations Discuss the functions of the BSC Discuss the functions of the XCDR Explain the operation of the NSS Explain the operation of the MSC Discuss the functions of the HLR Discuss the functions of the VLR Identify the requirements for GSM Network Databases
ROOT 2 technology
Network Configuration
As already discussed, the GSM network comprises of many different components (illustrated below), all being part of two core systems, the Network Switching System (NSS), to which the Operations and Maintenance System is interfaced, and the Base Station Subsystem (BSS). The illustration shows only one occurrence of each component, but in reality, the network will consist of multiple components. The component groups being. The Mobile Station (MS) consisting of the Mobile Equipment (ME) and the Subscriber Identity Module (SIM). The Base Station Subsystem (BSS) provides the radio air interface between the MS and the network. The Network Switching System (NSS) consisting of the Mobile Switching Centre (MSC) and associated system control elements. Here interconnections between other networks such as the PSTN are controlled. The Operations and Maintenance System enables the network the ability to control, configure and maintain the network from a central location.
NMC
VLR
HLR AUC
EIR
XCDR
PSTN
BSC BTS ME Base Station System SIM Interface/connection Mobile Station
Typical GSM Network Architecture consisting of the two core systems, the Network Switching System (NSS) and Base Station Subsystem (BSS).
Each network component communicates over an Interface, being specified by GSM standards, enabling a network the flexibility to use multi-vendor equipments (not being restricted to one product manufacturer).
Page 16 of 16
ROOT 2 technology
Revision Identifies GSM phase specifications. (GSM currently has progressed through three phases 1, 2 and presently 2+) RF Power The maximum power that the ME can transmit at. (GSM handset power transmission ranges from 8 Watts through 5 Watts, 2 Watts and 0.8 Watts) Ciphering Algorithm (Security) Indicates the type of algorithm that the ME uses. (Phase 1 used only an A5 algorithm, with Phase 2 using A5/0 A5/7 algorithms) Frequency Phase 2 and 2+ have the ability of transmitting in all GSM frequency ranges. Short Messaging (SMS) Phase 2 onward provides SMS for subscribers.
ROOT 2 technology Limited 2001 Page 17 of 17
ROOT 2 technology
IMSI
MSISDN
LAI
Ki TMSI SERVICES
SIM
IMEI
The Mobile Station International Services Digital Network number (MSISDN) the actually mobile telephone number, comprising of a Country Code, Network Code and Station Code e.g. 0044 773 675432. Most information held on the SIM is protected, some information though inconstantly updated by the network, the LAI for example. As the MS roams throughout the network this identity will change, therefore being updated. The SIM itself has been designed with high degrees of added security, some being imposed by the user in allocating a password Personal Identity Number (PIN), similar to a pin code with a credit card. The SIM card can also store addition information such as charging records if the operator makes the services available. It also is responsible for algorithm calculations during the authentication process.
ROOT 2 technology Limited 2001 Page 18 of 18
ROOT 2 technology
Normally the size of a BTS is defined by the number of RF carriers, some of the larger ones having upto 24 carriers
Transcoder
2Mbt x n
2Mbt x n
SIM
Mobile Station
The BSC provides the control for the BSS with functions being: Controls all BTS within the BSS. Switches traffic and signalling information between BTS and the NSS. Connects Terrestrial Circuits and channels on the air interface. Controls handover performed by the BTS under its control. Any operational information required by the BTS will be forwarded under the control of the BSC, likewise information required by the NSS about/from the BTS will be obtained by the BSC. The BSC connects radio channels from the air interface, to terrestrial circuits between the BSS and the MSC via the use of a Digital Switching Matrix. It also uses this matrix to perform handover between the BTS under its control without involving the MSC. Handover will be covered later in greater depth. The BTS provides the following functions of the BSS. Channel Coding / Decoding. Timing advance, dependant on the MS location within the given geographical area. Measurement reporting. Power control, paging, frequency hopping, traffic channel management and encryption are also functions of the BTS/BSC.
ROOT 2 technology Limited 2001 Page 19 of 19
ROOT 2 technology
BSS Configurations
The maximum number of BTS that a BSC can control is not specified within GSM, but individual specifications of manufacturers equipment do vary. The BTS maybe located at the same site as a BSC being Co-located, or located at a different site, Remote. It is common to find most BTS remotely configured due mainly to their being a larger number of BTS within the network compared too BSC. A BSS is configured using various topologies, Daisy chaining, Hub Spoke and Loop being a few. The Daisy Chain a BTS need not communicate directly with its controlling BSC, but via another BTS or chain of BTS equipment. Daisy chaining reduces the number of connections required within a network and is cheap to implement, but can lead to transmission delay through the BSS.
BSS
BTS
TRX
BTS
TRX
BTS BTS
LOOP
Topologies have both advantages and disadvantages when used within Networks.
BTS
TRX
BTS
TRX
BTS
TRX
DAISY CHAIN
The Loop these increase the redundancy of connectivity within a network as each BTS has a least two paths for communicating to the BSC. Hub Spoke a method used when initially commissioning a network. This topology reduces connections but decreases network redundancy, as a great deal of emphasis is place on the reliability of hub elements.
Page 20 of 20
ROOT 2 technology
The diagram shows a typical NSS interconnection. Note: - only one of each component is shown where in reality, the GSM network will have multiple components.
AUC
NMC
EIR
VLR
The Mobile Switching Centre (MSC) The main function of the MSC is to provide all switching functions, the same as any telephone network switch. However, because of the additional complications involved in the control and security aspects of the GSM network and the wide range of subscriber features offered the MSC has to be capable of fulfilling many additional functions. The MSC carries out different functions depending upon its location within the GSM network (as discussed earlier a GSM network will comprise of more than one MSC). If the MSC provides an interface between the GSM network and the PSTN, it is known as a Gateway Mobile Switching Centre (GMSC). Here additional network components such as the EC and IWF are located providing speech and data connections between the MS and adjoining networks. Both the IWF and EC can be considered as part of the MSC due to their functionality being required for switching.
Page 21 of 21
ROOT 2 technology
Page 22 of 22
ROOT 2 technology
Page 23 of 23
ROOT 2 technology
Security Databases
Equipment Identity Register As we have already discussed each MS has two identities, one of which being the IMEI. The Equipment Identity Register (EIR) is a centralized database that stores the IMEI of all subscribers on the GSM Network. The database concentrates on the physical ME, and not the subscriber whom may be using it to make or receive calls. The EIR database comprises of three database lists being a specific IMEI list or range of IMEI numbers. White List this contains IMEI numbers of MEs that have been allocated to a valid subscriber, that have not been reported stolen nor refused network services. Black List contains a list of IMEI numbers that have been bared by other networks, reported stolen, or denied access for what reason to network services. Grey List this list contains IMEI numbers that do not fall into either of the other two catogories. E.g. limited services, hardware problems or customer payment delays. The Database is continuously updated by network programmers and by the network obtaining information from a central database to which all networks can be connected (not all networks are connected though). EIRs are remotely accessed by an MSC/VLR during the authentication process. If the IMEI number is found in the black list the associated MS will not be permitted access to the network, or any other network containing the same EIR database information. Authentication Centre The Authentication Centre (AUC) is a processing database that provides the GSM Network with security keys for the authentication procedure called Triplets, and is generally co-located with the HLR, as it is continuously requested to produce new authentication keys for mobile subscriber records. The authentication procedure will be discussed later in the course. Interworking Function The Interworking Function (IWF) provides a GSM Network the capability of interfacing with private or public data networks. It consists of a bank of modems that act as the GSM Data Communication Equipment (DCE), exchanging data with a Data Terminal Equipment (DTE), an MS in the GSM network. It has two main functions: Data Rate Adaption provides data rate conversions (increasing / decreasing data speeds) for access to / from the GSM Network. Protocol Conversion ensures the correct protocol (communication tool) is used. Certain networks may require additional IWF functionality, dependant on the type of network too which it is connected.
ROOT 2 technology Limited 2001
Page 24 of 24
ROOT 2 technology
Page 25 of 25
ROOT 2 technology
Module Objectives
On completion of this module of instruction the delegate will have gained an understanding of: -
Explore the differing Terrestrial Interfaces used within GSM Discuss PCM Theory Explain the structure of a 2Mbit Trunk List the reasons for using ITU-T CCS No.7 Signalling Explain the uses of CCS No.7 Protocols Discuss the Link Access D Channel Protocol Explain why LAPDm is used accross the Um Interface Explore transmission rates accross the various GSM Interconnections
ROOT 2 technology
Terrestrial Interfaces
The terrestrial interfaces comprise of all of the connections between the GSM network components, apart from the Um or air interface. They are shown in the diagram below connecting the various components together. The interfaces are the message transport mediums for GSM, all complying with ITU-T specifications (International Telecommunications Union - Telecoms). The use of these standards provides the flexibility that can be seen today within multi-platform GSM networks. The terrestrial interfaces transport all of the messages throughout the system that are required to perform system functions. They transport all data for software up and downloads, the collection of statistical information and messages required for O&M operations (Maintenance and Control). The standard interfaces used within GSM are: PCM 2 Mbit Links Signalling System No.7 - (ITU-T SS7 or CCS7) LAPD Protocol - Link Access Protocol Data (D Channel) X.25 - (Packet Switch Data for OMC interface)
4-7
X.25 Applications C7 Applications
3 2 1
OSI LAYERS
Abis LAPD
2 Mbit Trunks
VLR EIR
B F
HLR
H
AUC
MSC
Um
Abis
BSC
BTS
OMC
Um A C E
Abis B D H
LAPD MAP C7 C7
Page 27 of 27
ROOT 2 technology
8 Bits
Control TS 0
Signalling TS 16
TS 0 1 - 15 16 17 - 31
The 2 Mbit Frame comprises of 32 Timeslots. Each Timeslot is 64Kbits in size, resulting in a total frame size of 2.048Mbits. Each 2 Mbit frame provides thirty channels for the transmission of speech, data or control information. The control information may contain C7, LAPD or X.25 formatted information. It is typical to find Timeslot 16 used for signalling information, but any timeslot can be used for this purpose. Some operators choose to use Timeslot 1 for signalling purposes. Timeslots are also referred to as D and B Channels (D Channel for signalling and B Channel for Traffic). If the 2Mbit frame is using C7 signalling, the D Channel can support signalling for 480 B Channels. If using Channel Associated Signalling (CAS), the D Channel can only support signalling for one frame (30 B Channels).
ROOT 2 technology Limited 2001 Page 28 of 28
ROOT 2 technology
C7 Signalling
The following message protocols are used to communicate between the different GSM components. For external connections, the MSC performs all call signalling functions by using the Telephone User Part (TUP), or for interfacing the ISDN, the ISDN User Part (ISUP). Between the MSC and BSC, the Base Station System Management Application Part (BSSMAP) is used. The Direct Transfer Application Part (DTAP) is used to send messages between the MSC and the MS. The Mobile Application Part (MAP) is used between the MSC and the VLR, EIR and HLR. The diagram below shows the breakdown of how the C7 protocol stack is configured.
Acronyms: BSSAP BSSMAP DTAP ISUP MAP SCCP TUP TCAP Base Station System Application Part Base Station System Management Application Part Direct Transfer Application Part ISDN User Part Mobile Application Part Signalling Connection Control Part Telephone User Part Transaction Capabilities Application Part
SCCP
3 2 1
C7 LAYERS
2 Mbit Trunks
Page 29 of 29
ROOT 2 technology
Flag
Flag
0 - 260 Octets
Address
Control
Information
FCS
LAPD
SAPI TEI N(S) N(R)
0 - 21 Octets
Address
Control
Information
LAPDm
SAPI N(S) N(R)
There is a limitation on the amount that can be transmitted across the air interface. With using the normal LAPD format 260 272 octets of information can be sent. Due to the restrictions GSM uses the LAPDm format, having a maximum length of 23 octets. The 23 octets formation is used for TCHs and a 21 Octets format for SACCH. The LAPDm format does not require flags as it uses the already synchronised path air interface. In addition it does not require a Frame Check Sequence (FCS). The Service Access Point Identifier (SAPI) is used to identify the information being transmitted, Signalling or Short Message Services (SMS). In short, 0 = Signalling information, 3 = SMS, 62 = O&M and 63 = Layer 2 Management. (62 and 63 are dedicated for use by the BTS.) N(S) related to the frame number being sent and N(R) corresponding to the next expected frame within the transmission sequence.
Page 30 of 30
ROOT 2 technology
Interconnections
The Interface between the BSC and MSC uses the standardised ITU-T CCS7 interface, referred to as the A Interface. The interface supports the following connections: BSC - MSC, BSC - BTS and MSC - MS Operations and Maintenance Interface All call processing functions These interfaces are commonly transported on a 2 Mbit/s link.
MSC
MTL
OMC- R BSC
OML (X.25)
LAPD
LAPD
BTS
BTS
BTS
Each 2 Mbit link provides 32, 64Kbit/s channels or Timeslots. Timeslot zero is always used for control and frame alignment purposes, with one other being used for signalling, typically Timeslot 16 and the remainder, used for traffic. The signalling protocols used with a GSM Network are: LAPD 1 x 64Kbit/s timeslot CCS7 1 x 64Kbit/s timeslot (BSSAP, MAP, TCAP, SCCP, MTP) X.25 1 x 64Kbit/s timeslot (Used between the BSC and OMC) CCS7 is used for transmission between the MSC and BSS, dependent upon the type of signalling required, will depend on which signalling part is used. (DTAP is used for the transfer of messages between the MSC and MS, a subset of BSSAP.)
Page 31 of 31
ROOT 2 technology
Page 32 of 32
ROOT 2 technology
Module Objectives
On completion of this module of instruction the delegate will have gained an understanding of: -
Explain Modulation Techniques Discuss the reasons for using TDMA Frames Explore Physical Channels used within GSM List the Logical Channels Explain the Broadcast Control Channel Explore all Common Control Channels Explore all Dedicated control Channels Define Mobile Access Explain channels used for Handover Examine the GSM Burst List the GSM Burst Types Identify the requirement for using Multi Frames Define GSM Timing Discuss the Speech Encoding process Discuss the GSM Authentication Procedure
ROOT 2 technology
Modulation Techniques
There are three methods of modulating a signal so that it can be transmitted over an air interface. Amplitude Modulation (AM) Amplitude modulation is the most basic form of modulation, where the information is transmitted through variations in a waveforms amplitude. AM is very susceptible to interference from noise, which leads to poor transmission quality over larger distances. Frequency Modulation (FM) Frequency modulation is slightly more complicated to implement than AM, due to the information being transmitted through variations in a waveforms frequency. FM provides a greater tolerance to noise than AM. Phase Modulation Phase modulation provides the best tolerance to noise but remains complex in implementing and is rarely used when transmitting analogue signals. As we have already discussed, GSM utilises digital transmission over the air interface. Digital signals can use any of the above methods of modulation, but unlike analogue, phase modulation being the most tolerant to noise can easily be implemented in GSM. Phase modulation does not suffer the same set backs when transmitting digital signals and is known as Phase Shift Keying (PSK) when applied to digital signals.
Digital signals must be converted prior to tramsmission over a normal telephone network
A carrier signal
Is modulated by the digital output from a data terminal equipment to produce Amplitude change Amplitude modulation
or
Phase change
Phase modulation
Phase Shift Keying (PSK) Although phase modulation provides a high tolerance to noise, there are problems with using this form of modulation. Digital signals are transmitted in the form of logic 0 and logic 1 (On or Off), two states completely opposite to one another. These states are referred to as Phases. When the signal changes phase abruptly, high frequency components are produced causing distortion when the signal is received, requiring greater bandwidth. GSM has limited available bandwidth, so utilisation has to be in the most efficient way possible. The use of PSK in its most basic form is not a viable option, so GSM utilises a more complex form of PSK called Gaussian Minimum Shift Keying (GMSK). Gaussian Minimum Shift Keying (GMSK) With GMSK, the phase change does not occur instantaneously as within PSK. GMSK introduces a transition period, increasing the time in which the phase change has to occur, therefore drastically reducing high frequency components and distortion. A Gaussian Digital Filter is used for this operation.
Page 34 of 34
ROOT 2 technology
Physical Channels
A GSM carrier comprises of one complete Time Division Multiple Access (TDMA) frame. Each frame is broken down into eight equal segments called Timeslots, that are arranged in sequential order from 0 7 (as can be seen from the diagram). The TDMA frame (Carrier) is transmitted continuously and lasts for a time period of 4.615ms. Therefore each timeslot lasts for an approximate time period of 577 microseconds. Each MS telephone call occupies one timeslot (0 7) within the frame until the call is terminated, or handover occurs. Due to there being a limited number of timeslots available within the frame, it limits the number of simultaneous MS users to seven, as timeslot zero is required for controlling elements. In order for the system to work correctly, timing of timeslot transmissions to and from the MS is critical. The MS or BTS must transmit information relating to a call, by using the allocated timeslot, at exactly the right moment.
7 6 5 4 3 2 1 0 7 6 5 4 3 2
TDMA Frame
1 0 7 6 5 4 3
2 1 0
TDMA frame is transmitted continuously. Each MS is allocated an individual Timeslot for a call, transmitting information within a burst.
T RS BU
lot es im 1T
Failure to do this will result in the information being lost, or corruption of consecutive timeslots. This information is transmitted in the form of a burst. Each burst occupying its allocated timeslot within successive frames, provides GSM with the physical channel for carrying logical channels between the MS and BTS.
Page 35 of 35
ROOT 2 technology
Logical Channels
There are two main groups of logical channels, traffic channels and control channels. Traffic Channels The Traffic Channel (TCH) is the channel used within GSM to carry speech and data information. There are two TCHs available for use with GSM; Full Rate Speech working at 13Kbit/s and Half Rate speech at 6.5Kbit/s. For Data transmission, TCHs working at 2.4Kbit/s, 4.8Kbit/s, 9.6Kbit/s and 14.4Kbit/s are available. Control Channels Control channels as named, are the channels used within GSM for controlling the air interface. There are three groups. Broadcast Control Channel (BCCH) Common Control Channel (CCCH) Dedicated Control Channel (DCCH) Broadcast Control Channel Group
Um Interface
DCCH
The Broadcast Control Channel (BCCH) is transmitted in the downlink only (from the BTS to the MS). The BCCH transmits information from the network regarding the MSs present location and surrounding cells. The BCCH also contains information relating to Synchronisation (SCH) and frequency (FCH). Common Control Channel Group The Common Control Channels are transmitted in both uplink and downlink directions. The group consists of the following channels. Random Access Channel (RACH) Paging Channel (PCH) Access Grant Channel (AGCH) Cell Broadcast Channel (CBCH) Dedicated Control Channel Group Dedicated Control Channels are allocated to individual MS for the purpose of call setup and subscriber validation. The group consists of the following channels. Stand-alone Dedicated Control Channel (SDCCH) Associated Control Channels (ACCH)
ROOT 2 technology Limited 2001 Page 36 of 36
ROOT 2 technology
Um Interface
BCCH
FCCH SCH
LAI BSIC DTX CBCH
Page 37 of 37
ROOT 2 technology
Um Interface
RACH
Paging Channel (PCH) The Network uses the Paging Channel in order to contact an MS (paging can be performed using either the IMSI, TMSI or IMEI identities). Access Grant Channel (AGCH) This is used by the BTS to assign a Dedicated Control Channel to an MS, in response to the receipt of a RACH from the MS. The MS will then move to the DCCH in order to proceed with the call set-up, or to respond with requested information, regarding Location Area Updates or Short Messaging Services (SMS). Cell Broadcast Channel (CBCH) This channel is used by the network to transmit broadcast messages to all MSs within a given cell. Although this channel really uses a DCCH to transmit the messages, it is considered a CCCH as all MS within the given cell can receive that message. All MS frequently monitor both the BCCH and CCCH within their associated cell, both being transmitted constantly on the carrier by the BTS.
ROOT 2 technology Limited 2001 Page 38 of 38
ROOT 2 technology
Um Interface
Slow Associated Control Channel (SACCH) This channel is used to convey power and timing information in the downlink and passes Receive Signal Strength Indications (RSSI) and link quality reports from the MS in the uplink. SACCH is also used for the handover procedure when the MS is idle (not involved in a physical call). Fast Associated Control Channel (FACCH) The FACCH is used to perform handover and also authentication when an MS is involved in a physical call (having been allocated a TCH). It is transmitted within the burst of the TCH, containing specific information that is required for the handover procedure. All of the control channels are required for system operation and have to share timeslots over the air interface just like MSs using the limited TCHs. By sharing the timeslots, it allows efficient passing of control information without wasting valuable capacity that can be used for carrying additional call traffic. We therefore organise the limited timeslots over the air interface to carry either control or traffic information.
ROOT 2 technology Limited 2001 Page 39 of 39
ROOT 2 technology
Info Field There are two info fields within the normal burst. Each field contains 57 Bits of information (Voice call or Data). If during the call procedure handover is required, FACCH steals one of these info fields (all 57 Bits) to transmit the specific information required.
Stealing Flags These flags comprise of a single bit each and indicate whether call or FACCH information is present within the information field.
0 1 2
TDMA Frame
INFO
TRAINING SEQUENCE
INFO
GUARD PERIOD
TAIL BITS
STEALING FLAGS
TAIL BITS
Training Sequence This is used by the receiver to estimate the quality and transfer characteristics of the physical path (air interface) between the MS and BTS. The training sequence consists of 26 Bits of information. Tail Bits The tail bits act as flags, identifying the beginning and end of the burst. Guard Period This period is designed to allow both the BTS and MS additional time to receive and decode the transmitted burst. The timeslot allows 0.577ms for the burst to be successfully transmitted, where actually the physical burst only requires 0.546ms. This difference in time relates to 8 Bits or 0.031ms time difference between actually burst transmission and the actually time available. This 8 Bit guard period can be transmitted at either the beginning, the end or in both areas of the burst format.
ROOT 2 technology Limited 2001 Page 40 of 40
ROOT 2 technology
Burst Types
The diagram below shows the five types of burst employed over the GSM air interface. All bursts, whatever type, consist of 156 Bits of information allowing them successful transmission within the allotted 0.577ms timeslot. The burst is a sequence of information bits transmitted by network components, where the timeslot is the specific period of time that the burst must arrive in order to be successfully decoded. Normal Burst - the normal burst carries traffic and control channels both up and downlink apart from those listed below. Frequency Correction Burst - carries the FCCH in the downlink only, to correct the frequency of the MS. Synchronisation Burst - carries the SCH in the downlink only, to synchronise timing of the MS with the BTS and therefore Network.
TAIL BITS
TAIL BITS
TAIL BITS
ENCODED (39)
ENCODED (39)
TAIL BITS
TAIL BITS
TRAINING SEQUENCE
TAIL BITS
TAIL BITS
TAIL BITS
Dummy Burst - this burst is transmitted to fill unused timeslots on the BCCH carrier (downlink only), to retain continuity over the air interface. Access Burst - this burst is much shorter in duration than the other bursts described. It has an increased guard period due to the time of transmission being unknown. When an Access Burst is transmitted, the BTS does not know the exact location of the MS, so therefore cannot accurately identify the timing of the message. The use of the larger guard period counters this problem.
ROOT 2 technology Limited 2001 Page 41 of 41
ROOT 2 technology
BURST
TDMA Frame
4.615ms
26 FRAME MULTIFRAME E 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
IDLE
SACCH
120ms
Frame No 25 is always set to idle, acting as a flag indicating the end of the previous or beginning of the next multiframe. The multiframe follows a pattern of, 12 bursts of traffic, 1 burst of SACCH, 12 bursts of traffic and finally 1 idle frame. Each TDMA frame lasts for duration of 4.615ms, there the total duration of the multiframe is 120ms (the duration of 26 TDMA).
Page 42 of 42
ROOT 2 technology
51 Frame Multiframe
The 51 Frame Multiframe is slightly more complicated than the 26 Frame Multiframe as it is associated with the control channels. The multiframe structure can vary, depending on the type of control channel and network functionality requirements. The 51 Frame Multiframe is constructed from 51 consecutive frames, from TDMA frame timeslot zeros. The diagram shows the breakdown in the downlink, of a BCCH/CCCH multiframe. As can seen, each timeslot zero contains differing information.
51 FRAME MULTIFRAME
0 10 20 30 40 50
BCCH CCCH
CCCH CCCH
CCCH CCCH
CCCH CCCH
CCCH CCCH
FCCH
SCH
235.365 ms
IDLE
Starting at frame 0 of the 51 frame structure, T/S 0 is occupied by FCCH, T/S 1 by SCH and the following four timeslots 2-5, by the BCCH. Timeslots 6-9 are allocated to CCCH traffic, that is for either PCH or AGCH information. Then follows in timeslots 10 and 11, a repeat of the frequency and synchronisation bursts, four further CCCH burst and so on. The final timeslot, T/S 50, is the last timeslot in the multiframe and is always set to idle. This idle frame acts as a flag, indicating the next frame received is the start of a new 51 Frame Multiframe.
Page 43 of 43
ROOT 2 technology
CLASS 1 50 BITS
CLASS 3 78 BITS
PARITY CHECKING
NO PARITY CHECKING
50
132
78
456 BITS
Over the air interface speech or data is transmitted at a rate of 22.8 Kbit/s (456 Bits every 20ms). Speech information is grouped into three groups depending on its sensitivity and importance. Class 1 - These 50 bits carry the most sensitive information, and if corrupted can lead to speech intelligibility. If errors are found within these bits, generally the entire block is ignored. These bits pass through a parity check where 3 additional bits are added. Class 2 - Here 132 bits are not parity checked. These bits are important, but not as important as the 50 Class 1 bits. These 132 bits are combined with the Class 1 bits, with an additional 4 tail bits being added (for decoding purposes) prior to the convolutional encoding process. Class 3 - These bits are the least sensitive bits that do not require encoding.
As can be seen from the diagram, after the convolutional encoding proceed, the Class 3 bits are added to the combined and encoded Class 1 and 2 bits, to produce 456 bits.
Page 44 of 44
ROOT 2 technology
GSM Authentication
One of the major drawbacks with analogue systems was the ease that an air interface transmission could be compromised. GSM uses an Authentication Centre (AUC) Database for providing a networks security elements. It provides the network the ability to monitor a users access rights for call setup, location updating and activation of supplementary services. When a subscriber first purchases a phone from a provider, the network Ki key will be allocated to their IMSI. On initial setup (first activation), the Ki will be opened and only then is susceptible to copying.
RAND Ki
HLR
AuC
A8 Algorithm Kc
TRIPLET
TRIPLET
MSC/VLR
RAND SRES RAND
BTS
RAND
Ki
SRES
SIM
A8 Algorithm
Kc
TRIPLET
Triplets Triplets are produced by the AUC for use throughout the authentication procedure. They consist of three separate elements, the Random Number (RAND), a Signed Response (SRES) and a Key Code (Kc). The AUC produces these triplets through the use of two algorithms, an A3 and an A8, both of which are matched with the same algorithms on the SIM. Due to both network algorithms being assigned to the AUC and Network SIM cards, when the RAND used by the AUC in producing the Triplet is passed to the MS for authentication, the MS in turn should produce the same Triplet results. The MS produces the triplet and returns either the SRES or Kc (depending on request) to the VLR, where results are processed and authentication granted. If the results differ, the MS will not be granted access.
Page 45 of 45
ROOT 2 technology
Page 46 of 46
ROOT 2 technology
Module Objectives
On completion of this module of instruction the delegate will have gained an understanding of: -
Explain the requirement for Timing Advance Discuss Timeslot allocation List GSM elements associated with Power Control Describe DRX and its uses Explore Multipath Fading Discuss Antenna Diversity Explain GSM Equalisation Define Frequency Hopping and reasons for its use
ROOT 2 technology
FRAME 1
DOWNLINK 0 1 2 3 4 5 6 7 BTS - MS
UPLINK 0 MS - BTS 1 2 3 4 5 6 7
3 TS OFFSET
FRAME 1
3
TIMING ADVANCE
Timing advance information is sent to the MS twice every second using the SACCH (the 13th frame on the 26 Frame Multiframe). This advance is superimposed upon the timeslot offset, again being shown in the diagram. If the network is configured for a maximum cell size with a radius of approximately 35km, the maximum timing advance will be approximately 0.233ms.
Page 48 of 48
ROOT 2 technology
MS Power Control
One of the main factors restricting the physical size of the MS is its battery. The battery must be large enough to hold sufficient power to maintain calls for a period of time prior to the MS requiring a recharged. The demand has increased for smaller, lighter phones, therefore leading to the requirement of smaller and lighter batteries. Within GSM, several features are utilised, two of which being Power Control and Discontinuous Reception. Power Control
1 Watt
A B C
Power control
BTS
2 Watts
1.4 Watts
This is a feature of the air interface, allowing the network not only to compensate for the timing distance, but additional to allow the MS to control its power output in comparison to the distance required for successful transmission to the BTS. The closer the MS is to the BTS, the less power required to transmit that distance, therefore increasing the MSs battery life. In addition to saving power, by reducing in accordance to distance it aids in the reduction of air interface interference (reducing co-channel and adjacent channel interference). Both Uplink and Downlink power setting can be controlled, typically though the BTS will transmit at a continuous power setting. (A BTS controls multiple MS so by adjusting power settings to compensate for an individual MS it could seriously affect others.) The BSS controls the power of both the MS and BTS. It monitors the receive power of both the MS and BTS, with reports being sent to the BSS, adjusting power setting accordingly.
Page 49 of 49
ROOT 2 technology
Discontinuous Reception
Discontinuous Reception (DRX) allows the MS to switch off when information being transmitted is not intended for it. By the MS monitoring the BCCH, the FCCH and SCH, the MS is exactly aware of the frame number and format, and can identify where the information relevant is being transmitted. With the MS knowing this information, it can switch off through the time period where the information being transmitted is not meant for its reception, again saving on battery life. When DRX is used, the BCCH informs the MS of which Paging Group it is to listen too. This Paging Group may appear at the same time during every multiframe, or once during a series of multiframe transmissions. (The Network specifies multiframe transmission.)
235.365 ms
BCCH
C0
C1
C2
C3
C4
C5
C6
C7
C8
Or
C5 on Combined Multiframes
BCCH
C0
C1
C2
C3
235 ms
C4
C5
C6
C7
C8
BCCH
C9
C10
C11
C12
470 ms
C13
C14
C15
C16
C17
BCCH
C18
C19
C20
C21
705 ms
C22
C23
C24
C25
C26
BCCH
C0
C1
C2
C3
C4
C5
C6
C7
C8
DRX may only be used when the MS is in an idle state, not physically making or receiving a call.
Page 50 of 50
ROOT 2 technology
Multipath Fading
Multipath Fading results from a signal travelling to a receiver over a multiple number of routes. This can be caused by, the signal being reflected off of objects such as buildings, or its path being altered by atmospheric pressures, such as weather. Received signals will therefore arrive at differing times and possibly out of phase with one another. On arrival at the receiver, the signals combine either constructively or destructively. The worst possible effect will be that the received signals arrive 180 out of phase with each other, therefore cancelling each other out. If this happens the result is zero signal. Within the GSM frequency bands, a distance of approx 15cm may be all that is required to alternate from a good, to a bad signal. To over come this variation, GSM adopts several techniques to counter Multipath Fading.
Buildings
Mulitiple Paths
MS
BSS
As the MS moves, the exact phase of the receive path will change. With this constant change, the combination of received signal strength will also change, continuously. The diagram shows an example of differing routes that a signal may take in travelling from a BTS to an MS. Each of the paths has suffered a varying number of losses through transmission; hence a variation in received signal amplitudes.
Page 51 of 51
ROOT 2 technology
Equalisation
Due to signal distortion caused through multipath fading, a receiver cannot be sure exactly when a burst will arrive. To aid in identification, a Training Sequence Code is transmitted at the centre of each burst. This is a set combination of bits, known by both the transmitter and receiver. When a burst of information is received, the equaliser searches for the training sequence code to identify how distorted it has become. It will then be able to identify through comparison, how distorted the remainder of the burst has become and identify the most probable signal outcome. There are eight different Training Sequence Codes used within GSM, numbered 0 to 7. Nearby cells, although operating on the same frequency will use different training sequence codes, therefore reducing additional air interface interference by disregarding foreign bursts.
NORMAL BURST
GUARD PERIOD
INFO
TRAINING SEQUENCE
INFO
GUARD PERIOD
TAIL BITS
STEALING FLAGS
TAIL BITS
COMBINER
Diversity
Intelligent Result of Combiner
Diversity As we have discussed, signals arrive at an antenna from multiple paths. The signals are therefore received in different phases and at different strengths, meaning some signals will combine to produce strong signals and others, subtract producing weak or no signal. When diversity is implemented within GSM, two receive antennas are used. These two antennas are placed several wavelengths apart, ensuring that there is minimum correlation between the two receive paths. The two received signals are combined at the BTS, producing the most intelligent and strongest signal possible from the two received signals (one from each of the receive antennas).
Page 52 of 52
ROOT 2 technology
Frequency Hopping
Frequency Hopping is used within GSM to limit the effects caused by multipath fading. It allows the MS to change the ARFCN used for each transmission (every 4.615ms), using the same timeslot, but different carrier. This provides a high degree of immunity to interference, due to interference averaging, as well as providing protection against signal fading. Interference Averaging assumes that radio channel interference does not exist on every allocated ARFCN due to the MS changing to a new ARFCN every 4.615ms or frame. Therefore, the overall communication received only experiences interference part of the time.
ARFCN 41
ARFCN 44
ARFCN 47
BSS
All mobile subscribers can use frequency hopping, which is controlled by the BSS. The BSS provides the MS with two identities, a Hopping Sequence Number (HSN), the order in which the MS hops through the available ARFCNs and a Mobile Allocation Index Offset (MAIO), the start point within the ARFCN hopping sequence. Not all cells support frequency hopping, so networks are configured for frequency hopping and allocated cells.
Page 53 of 53
ROOT 2 technology
Page 54 of 54
ROOT 2 technology
Module Objectives
On completion of this module of instruction the delegate will have gained an understanding of: Mobile to PSTN Call Discuss the Mobile to PSTN call procedure Explain key stages of the procedure
PSTN to Mobile Call Discuss the Mobile to PSTN call procedure Explain key stages of the procedure
Inter BSS Handover Discuss the procedure taken during a GSM Handover Explain key stages of the procedure
Location Updates Discuss the procedure for Location Updates Explain key stages of the procedure
ROOT 2 technology
AR
CR CC
PSTN
AC TCH
RACH AGCH
MSC
BSS
5. The MSC informs the BSS to assign a TCH to the MS for the call. 6. Upon completion of this allocation the TCH is connected between the MS and called number, where billing of the call commences. 7. Throughout the duration of the call, FACCH is used to monitor the status of the TCH in case a Handover is required.
Page 56 of 56
ROOT 2 technology
GMSC HLR/VLR
MSISDN MSRN MSRN MSISDN
PSTN
AC ANS
PCH
TCH
MSC
BSS
6. The MSC then informs the BSS to assign a TCH to the MS for the duration of the call. 7. The PSTN sends an Answer Message (ANS) to the MSC confirming connection. 8. The TCH is then connected and the call is established. 9. Throughout the duration of the call, FACCH is used to monitor the status of the TCH in case a Handover is required.
ROOT 2 technology Limited 2001 Page 57 of 57
ROOT 2 technology
1. HO Required
SACCH FACCH
oBSS
4. Clear Down
FACCH FACCH
2. HO Request Info
MSC
3. HO Complete
SACCH
nBSS
4. The MSC, via the oBSS orders the MS to change to the nBSS using FACCH. 5. The nBSS communicates with the MS Using FACCH to establish full connection. 6. Once all necessary information has been transferred the MSC is informed and Handover is complete. 7. The MSC now sends a Clear Down command to the oBSS, freeing the radio resource for another MS to use (The channel is not cleared until the nBSS can fully accommodate the MS). 8. Upon completion, the MS continues to periodically measure the RSSI values and reports to the nBSS.
ROOT 2 technology Limited 2001 Page 58 of 58
ROOT 2 technology
Location Update
1. A location update occurs when an MS detects that it has entered a new location area (LAI). The LAI is transmitted on the BCCH. If this occurs, the MS will be assigned an SDCCH by the BSS, for the duration of the update procedure. 2. Once an SDCCH has been assigned, the MS will transmit a Location Update Message (LU) to the MSC. 3. When the MSC receives this message it sends the new LAI and current TMSI to the VLR. (This information will also be sent to the HLR if it is the first update transmitted by the MS.)
VLR
LAI TMSI TMSI
RACH AGCH
LU UA UC
SDCCH
MSC
SDCCH SDCCH
BSS
SDCCH
MS Location Update
4. The VLR can now assign a new TMSI (if required) to the MS. Its transmits a location Update Accept Message (UA), containing the new TSMI and LAI to the MS. 5. When the MS has successfully received and stored the updated information, the MS responds with an Update Complete Message (UC) to the MSC. 6. The MSC informs the VLR that the update has been successful. 7. The MSC finally informs the BSS to release the SDCCH.
Page 59 of 59
ROOT 2 technology
Authentication Procedure
The authentication procedure maybe executed in addition to switch on, for call setup, location updating or applications for other services i.e. International roaming. 1. The VLR initiates the authentication process by sending an authentication message to the MSC, along with the associated RAND. 2. The MSC then sends the RAND to the BSS, which in turn sends it to the MS attached to a AGCH. The AGCH carries the RAND and information regarding the SDCCH that the MS will use to respond. 3. The MS responds to the request using the SDCCH passing the SRES.
VLR
RAND
SRES
RAND
SRES
AGCH
Complete
MSC
SDCCH
SDCCH
BSS
MS Authentication
4. The SRES is passed to the VLR via the MSC, where authentication will be confirmed. 5. If authentication is successful the MS will be able to continue with its request for service as an example. 6. If authentication fails, the HLR will be updated, the MS will be denied its request and service will be refused.
ROOT 2 technology Limited 2001 Page 60 of 60