Você está na página 1de 99

2G Mobile Communications

Technology
Fundamentals
Version 2.80

ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: doc@zte.com.cn

LEGAL INFORMATION
Copyright 2005 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of
this document or any portion of this document, in any form by any means, without the prior written consent of ZTE
CORPORATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality
obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions are
disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or noninfringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on
the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the
subject matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its
licensee, the user of this document shall not acquire any license to the subject matter herein.
The contents of this document and all policies of ZTE CORPORATION, including without limitation policies related to support
or training are subject to change without notice.

Revision History
Date

Revision No.

Serial No.

2005/09/01

R1.0

sjzl20060094

Description

ZTE CORPORATION
Values Your Comments & Suggestions!
Your opinion is of great value and will help us improve the quality of our product
documentation and offer better services to our customers.
Please fax to: (86) 755-26772236; or mail to Publications R&D Department, ZTE
CORPORATION, ZTE Plaza, A Wing, Keji Road South, Hi-Tech Industrial Park,
Shenzhen, P. R. China 518057.
Thank you for your cooperation!
Document
Name

2G Mobile Communications Technology Fundamentals

Product
Version

V2.80

Document
Revision Number

R1.0

Equipment Installation Date


Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
Good
Your
evaluation of
this
documentation

Fair

Average

Poor

Bad

N/A

Accessibility:
(Contents, Index, Headings, Numbering, Glossary)
Good

Fair

Average

Poor

Bad

N/A

Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good

Fair

Average

Poor

Bad

N/A

Please check the suggestions which you feel can improve this documentation:

Your
suggestions for
improvement
of this
documentation

Improve the overview/introduction

Make it more concise/brief

Improve the Contents

Add more step-by-step procedures/tutorials

Improve the organization

Add more troubleshooting information

Include more figures

Make it less technical

Add more examples

Add more/better quick reference aids

Add more detail

Improve the index

Other suggestions
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.

If you wish to be contacted regarding your comments, please complete the following:
Name

Company

Postcode

Address

Telephone

E-mail

This page is intentionally blank.

Contents
About this Manual .....................................................................................ix
Purpose of this Manual ............................................................................................ x
Typographical Conventions..................................................................................... xi
Mouse Operation Conventions................................................................................. xi
Safety Signs..........................................................................................................xii
How to Get in Touch .............................................................................................xiii
Customer Support.................................................................................................................xiii
Documentation Support.........................................................................................................xiii

Chapter

1................................................................................... 15

Overview.................................................................................................. 15
Evolution of 2G Mobile Communications Technology ................................................ 15
Development Trend of Mobile Communication Technology ....................................... 17

Chapter

2................................................................................... 19

GSM System............................................................................................. 19
GSM Definition ..................................................................................................... 19
GSM Features....................................................................................................... 20
GSM Standard Specifications ................................................................................. 21
GSM Network Structure......................................................................................... 22
NSS......................................................................................................................................23
BSS ......................................................................................................................................23
OMS .....................................................................................................................................24
MS........................................................................................................................................24
Network Service Area ............................................................................................................24

GSM Protocol Platform .......................................................................................... 25


GSM Interfaces .....................................................................................................................26
GSM Interface Protocol Model ................................................................................................27

Frame Structure and Radio Channels...................................................................... 28


Radio Frame Structure...........................................................................................................29
Physical Channel ...................................................................................................................29

Logical Channel .....................................................................................................................30


Channel Combination ............................................................................................................32
Mapping Between Logical Channels and Physical Channels ......................................................34

Key Technologies.................................................................................................. 38
Channel Allocation and Frequency Reuse................................................................................38
Interleaving and Deinterleaving..............................................................................................43
Encryption and Decryption.....................................................................................................47
Frequency Hopping Technology..............................................................................................47
Diversity Reception................................................................................................................49
Power Control .......................................................................................................................50

Basic Signaling Procedure...................................................................................... 54


Location Update Procedure of MS...........................................................................................54
IMSI Detach Procedure..........................................................................................................55
Mobile-Originated Call and Called Party On-hook Procedure.....................................................56
Mobile-Terminated Call and Calling Party On-hook Procedure ..................................................58
Intra-cell Handover Procedure................................................................................................60
Inter-cell Handover Procedure................................................................................................60
Power Control Signaling Procedure.........................................................................................61

Chapter

3................................................................................... 63

GPRS Technology .................................................................................... 63


GPRS Definition .................................................................................................... 63
GPRS Features ..................................................................................................... 63
GPRS Standard Specifications ................................................................................ 64
GPRS Network Structure ....................................................................................... 65
GPRS Protocol Platform ......................................................................................... 67
GPRS Transmission Protocol Platform .....................................................................................67
GPRS Signaling Protocol Platform ...........................................................................................69

Frame Structure and Radio Channels...................................................................... 72


Radio Frame Structure...........................................................................................................72
Physical Channel ...................................................................................................................73
Logical Channel .....................................................................................................................73
Channel Combination ............................................................................................................75
Mapping Between Logical Channels and Physical Channel........................................................75

Key Technologies of GPRS ..................................................................................... 79


Implementation of QoS .........................................................................................................79
Media Access Control (MAC) Layer .........................................................................................80
Radio Block Structure ............................................................................................................81
Channel Coding.....................................................................................................................82
Flow Control..........................................................................................................................86
Cell Selection and Reselection ................................................................................................86

Power Control .......................................................................................................................89

Abbreviations ............................................................................... 93
Figures.......................................................................................... 97
Tables ........................................................................................... 99

This page is intentionally blank.

About this Manual


The ZXG10 is a GSM mobile communication system independently
developed by ZTE CORPORATION (hereinafter referred to as ZTE). It
consists of the ZXG10-MSS Mobile Switching Sub System and the ZXG10BSS Base Station Sub System. The ZXG10-BSS provides and manages
GSM radio transmission, and its hardware is composed of the ZXG10-BSC
Base Station Controller, the ZXG10-BTS Base Transceiver Station, and
some other devices.
The ZXG10-BTS (V2) is the second-generation base station control
developed by ZTE, featuring high capacity, high reliability, perfect
functions and powerful service support capability.
The ZXG10-BSS (V2) base station sub system consists of the ZXG10-BSC
(V2) base station controller and the ZXG10-BTS base transceiver station.
The ZXG10-BTS is a general designation of a series of base transceiver
stations developed by ZTE.
The ZXG10-OMCR (V2) is the operation & maintenance platform of the
ZXG10-BSS (V2) base station sub system.
The 2G Mobile Communications Technology Fundamentals describes the
Global System for Mobile Communication (GSM) and some basic concepts
of the General Packet Radio Service (GPRS) evolved from the GSM. It
serves as the supplementary material for the ZXG10-BSC (V2.80) Base
Station Controller Technical Manual.
The whole suite of documentation also contains the following manuals:
ZXG10-BSC (V2) Base Station Controller Guide to Documentation
2G Mobile Communications Technology Fundamentals
ZXG10-BSC (V2.80) Base Station Controller Technical Manual
ZXG10-BSC (V2.80) Base Station Controller Hardware Manual
ZXG10-BSC (V2.80) Base Station Controller
Hardware

Installation Manual

ZXG10-BSC (V2.80) Base Station Controller


Software

Installation Manual

ZXG10-BSC (V2.80) Base Station Controller


System Debugging

Installation Manual

ZXG10-BSS (V2.80) Base Station Sub System Network Management


Technical Manual

Confidential and Proprietary Information of ZTE CORPORATION

ix

2G Mobile Communications Technology Fundamentals

ZXG10-BSS (V2.80) Bate Station Sub System Operation Manual


Configuration Management
ZXG10-BSS (V2.80) Bate Station Sub System Operation Manual
Wireless Parameters
ZXG10-BSS (V2.80) Bate Station Sub System Operation ManualFault
Management
ZXG10-BSS (V2.80) Bate Station Sub System Operation Manual
Performance Measurement Counter
ZXG10-BSS (V2.80) Bate Station Sub System Operation Manual
Security Management and System Tools
ZXG10-BSS (V2.80) Base Station Sub System Command Manual
ZXG10-BSC (V2.80) Base Station Controller
Troubleshooting

Maintenance Manual

ZXG10-BSC (V2.80) Base Station Controller


Routine Maintenance

Maintenance Manual

ZXG10-BSC (V2.80) Base Station Controller


Emergency Maintenance

Maintenance Manual

Purpose of this Manual


This manual comprises three chapters:
Chapter 1 Overview describes the evolution process of the mobile
communication technology from 2G to 3G and the development of the
mobile communication technology in the future.
Chapter 2 GSM System describes the features, related standards and
specifications, and key technologies of the GSM system.
Chapter 3 GPRS Technology describes the features, related standards
and specifications, and key technologies of the GPRS.

Confidential and Proprietary Information of ZTE CORPORATION

About this Manual

Typographical Conventions
ZTE documents employ the following typographical conventions.

TABLE 1 TYPOGRAPHICAL CONVENTIONS

Typeface

Meaning

Italics

References to other guides and documents; parameter values

Quotes

Links on screens

Bold

Menus, menu options, input fields, radio button names, check


boxes, drop-down lists, dialog box names, window names

CAPS

Keys on the keyboard and buttons on screens and company


name

Constant width

Text that you type, program code, files and directory names,
and function names

[]

Optional parameters

{}

Mandatory parameters

Select one of the parameters that are delimited by it


Note: Provides additional information about a certain topic
Checkpoint: Indicates that a particular step needs to be checked
before proceeding further
Tip: Indicates a suggestion or hint to make things easier or
more productive for the reader

Mouse Operation Conventions


TABLE 2 MOUSE OPERATION CONVENTIONS

Typeface

Meaning

Click

Refers to clicking the primary mouse button (usually the left


mouse button) once.

Double-click

Refers to quickly clicking the primary mouse button (usually the


left mouse button) twice.

Right-click

Refers to clicking the secondary mouse button (usually the right


mouse button) once.

Drag

Refers to pressing and holding a mouse button and moving the


mouse.

Confidential and Proprietary Information of ZTE CORPORATION

xi

2G Mobile Communications Technology Fundamentals

Safety Signs
TABLE 3 SAFETY SIGNS

Safety Signs

Meaning
Danger: Indicates an imminently hazardous situation, which if
not avoided, will result in death or serious injury. This signal
word should be limited to only extreme situations.
Warning: Indicates a potentially hazardous situation, which if
not avoided, could result in death or serious injury.
Caution: Indicates a potentially hazardous situation, which if not
avoided, could result in minor or moderate injury. It may also
be used to alert against unsafe practices.
Note: Indicates a potentially hazardous situation, which if not
avoided, could result in injuries, equipment damage or
interruption of services.

Erosion: Beware of erosion.

Electric shock: There is a risk of electric shock.


Electrostatic: The device may be sensitive to static electricity.

Microwave: Beware of strong electromagnetic field.


Laser: Beware of strong laser beam.

No flammables: No flammables can be stored.

No touching: Do not touch.

No smoking: Smoking is forbidden.

xii

Confidential and Proprietary Information of ZTE CORPORATION

About this Manual

How to Get in Touch


The following sections provide information on how to obtain support for
the documentation and the software.

Customer Support
If you have problems, questions, comments, or suggestions regarding
your product, contact us by e-mail at support@zte.com.cn. You can also
call our customer support center at (86) 755 26771900 and (86) 8009830-9830.

Documentation Support
ZTE welcomes your comments and suggestions on the quality and
usefulness of this document. For further questions, comments, or
suggestions on the documentation, you can contact us by e-mail at
doc@zte.com.cn; or you can fax your comments and suggestions to (86)
755
26772236.
You
can
also
explore
our
website
at
http://support.zte.com.cn, which contains various interesting subjects like
documentation, knowledge base, forum and service request.

Confidential and Proprietary Information of ZTE CORPORATION

xiii

This page is intentionally blank.

xiv

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Overview
This chapter describes the evolution process of 2G mobile communications
technology, 3G mobile communications technology, and the development
trend of mobile communication in the future.

Evolution of 2G Mobile
Communications Technology
The mobile communication was first used in military and some special
fields in 1920's. In 1940's, it began to be employed for civil use. The
mobile communication really booms in recent decade. The development of
the mobile communication comprises the following phases:
The first generation (1G) mobile communication system
The second generation (2G) mobile communications system
The third generation (3G) mobile communications system
Starting from 1980's, the 1G analog mobile communication system adopts
cellular networking technology.
The major standards include:
Advanced Mobile Phone System (AMPS) in North America
Nordic Mobile Telephone System-450/900 (NMT-450/900) in north
Europe
Total Access Communication System (TACS) in the U.K.
However, the 1G mobile communication system has the following
disadvantages:
There is no common interface between systems.
It cannot keep up with the fast digitizing of the fixed network and
provide digital bearer services.
It cannot meet the demand for large capacity due to low frequency
utilization.

Confidential and Proprietary Information of ZTE CORPORATION

15

2G Mobile Communications Technology Fundamentals

It features poor security. The information being exchanged on the


radio path may be easily eavesdropped, and the subscriber account
may be easily embezzled.
Due to the defects of analog systems like the TACS, the digital mobile
communication system characterized by digital transmission, Time Division
Multiple Access (TDMA), and narrowband Code Division Multiple Access
(CDMA) were developed in 1990's. That is the so-called 2G digital mobile
communication system.
The major standards include:
Global System for Mobile Communication (GSM)
CDMA IS95
Personal Digital Cellular (PDC)
Compared with the 1G mobile communication system, the 2G mobile
communication system:
Provides high spectrum utilization and large system capacity.
Provides diversified services (voice services and low-rate circuitswitched data services).
Enables automatic roaming.
Provides better voice quality.
Provides good security.
Can be interconnected with the ISDN and PSTN.
However, the 2G mobile communication system has the following
disadvantages:
It can provide low-rate data services only and cannot support multimedia service. For example, the Internet access speed of GSM MS can
reach 9.6 kbit/s theoretically.
Different 2G mobile communication systems in the world use different
frequencies and cannot be compatible with each other, therefore, it is
difficult to implement global roaming.
Nowadays the Internet, E-business, and multi-media communication
develop very rapidly. Failing to provide strong support to data
communication has already constrained the development of 2G system.
The demand for higher data rate and more diversified services impels the
evolution from 2G to 3G. Figure 1 shows the evolution process.

16

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 - Overview

FIGURE 1 EVOLUTION FROM 2G TO 3G

IS-95
CDMA

IS-2000
MC WCDMA

IS-95-B

ARIB
WCDMA

PDC

IMT-2000

GSM

HSCSD
GPRS

IS-136

IS-136+
IS-136HS

2G

2.5G

EDGE
UWC-136

UTRA
WCDMA

2.75G

3G

In Phase2 and Phase2+, two high-rate data service models are put
forward for the GSM system.
High Speed Circuit Switched Data (HSCSD) based on high-speed data
bit rate and circuit switching
General Packet Radio Service (GPRS) based on packet switched data
These two services are called 2.5G services. Adopting high-rate adaptive
coding solution, the GPRS provides the data rate up to 171 kbit/s.
The Enhanced Data Rates For GSM Evolution (EDGE) developed by the
European Telecommunications Standards Institute (ETSI) adopts 8-PSK
(Phase Shift Keying) modulation. It supports the rate up to 384 kbit/s
theoretically. The EDGE is more advanced than the GPRS. However, it
cannot provide the rate up to 2 Mbit/s as the 3G system does. Therefore,
it is called 2.75G technology.

Development Trend of Mobile


Communication Technology
The research of 3G theory, development of 3G technologies, and
establishment of 3G standards began in mid 1980s.
The International Mobile Telecommunication 2000 (IMT-2000) released by
the International Telecommunications Union (ITU) defines and describes
3G. It enables the mobile data service and some fixed high-speed data
services to use one or several radio channels and fixed network platform
to provide:
A global standard
IMT-2000 services, which are compatible with other fixed network
services.

Confidential and Proprietary Information of ZTE CORPORATION

17

2G Mobile Communications Technology Fundamentals

High quality
The use of common band in the world
Small terminals used in the world.
Global roaming.
Multi-media services and terminals
Higher frequency utilization
Flexibility for the development to the next generation.
High-speed hierarchical data rate.
Rate up to 2 Mbit/s in fixed environment
Rate up to 384 kbit/s in pedestrian environment.
Rate up to 144 kbit/s for vehicle mounted stations.
Currently, instead of driven by pure technology, the communication
technology is developing into the mode featuring the combination and
interoperability of services and technology. It is estimated that the largest
and the most profound change in the coming five to ten years is the
strategic transition from voice services to data services from the aspect of
market application and service demand. This change will deeply influence
the development trend of the communication technology.
Some researchers and telecom operators describe the fourth-generation
(4G) mobile communication system as a new world better than 3G, which
can provide many unimaginable applications. The 4G system can provide
over 100 Mbit/s data transmission rate, which is 10,000 times of the
current MSs and 50 times of 3G MSs. The 4G MSs can provide highperformance multi-media contents. Through ID application, the 4G MS can
serve as a personal identification device. It can also receive highresolution movies and TV programs, acing as the bridge of combined
broadcast and new telecommunication infrastructure. In addition, some
services, such as 4G wireless instant connection, are less charged than 3G
services.

18

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

GSM System
This chapter introduces the features, related standards and specifications,
and key technologies of the GSM system.

GSM Definition
Originally, the Global System for Mobile Communication (GSM) was the
standard made for the communication system working at 900 MHz in
Europe. Because the analog communication system has limited capability
in expansion, the GSM is developed on the demand for capacity expansion
and has achieved global success. The GSM has become the wireless
communication standard widely accepted in the world.
The development process of the GSM is as follows:
1982: The Group Special Mobile (GSM) was set up in the Conference of
European Posts and Telecommunications (CEPT) to develop the 2G
mobile communication system.
1986: Eight proposals put forward by European countries after massive
research and experiments were accepted in Paris, and on-site
experiments were performed.
1987: After on-site test, demonstration, and comparison, the GSM
member countries have reached an agreement that the digital system
adopts narrowband Time Division Multiple Access (TDMA), Regular
Pulse Excitation-Long Term Prediction (RPE-LTP), voice coding, and
Gaussian Minimum Shift Keying (GMSK) modulation.
1998: Eighteen European countries reached GSM Memorandum of
Understanding (MOU).
1989: GSM took effect.
1991: The first GSM network was deployed in Europe.
1992: The GSM standard was frozen.
1993: The major part of the GSM phase II standard was completed.

Confidential and Proprietary Information of ZTE CORPORATION

19

2G Mobile Communications Technology Fundamentals

1994: A new research phase (Phase 2+) was added to further improve
the GSM as the platform of mobile data services.

GSM Features
The GSM system has the following features:
High spectrum efficiency
The GSM system features high spectrum efficiency due to the highefficient modulator, channel coding, interleaving, balancing and voice
coding technologies adopted.
Large capacity
The volumetric efficiency (number of channels/cell/MHz) of GSM
system is three to five times higher than that of the TACS.
High voice quality
Due to the features of digital transmission technologies and the
definition of the air interface and speech coding in the GSM
specifications, the voice quality is irrelevant with the radio transmission
quality and can reach the same level when it is above the threshold.
Open interfaces
The GSM standard provides not only open air interface, but also open
interfaces between networks and those between network entities, such
as A interface and Abis interface.
High security
The encryption of MS identification code makes the eavesdropper
unable to determine the MS number, ensuring the security of the
subscriber's location.
The encryption of voice, signaling data, and identification codes makes
the eavesdropper unable to receive the communication contents.
Interconnection with ISDN and PSTN.
The GSM can interconnect with other networks through current
standard interfaces, such as ISUP or TUP.
Roaming function
The GSM supports roaming by introducing the Subscriber Identity
Module (SIM) card that separates the subscriber from the terminal
equipment.
Diversified services
The GSM provides diversified services, including teleservices, bearer
services, and supplementary services.
Inter-cell handover
In the course of a conversation, the MS continues to report the
detailed radio environment of the local cell and the neighboring cells to

20

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

the serving base station. If inter-cell handover is required, the MS


sends a handover request to the serving base station.

GSM Standard Specifications


The GSM standard is initiated and made by the ETSI.
The ETSI divided the GSM into several phases and set up many Special
Mobile Groups (SMGs) to make the related GSM standard.
In the GSM standard specifications, detailed specifications are made for
functions and interfaces only. There is no any specification on the
hardware. The purpose is to reduce the restriction on designers, enabling
the operators to purchase equipment from different manufacturers.
The GSM technical specifications consist of 12 chapters:
Chapter 1 General
Chapter 2 Services
Chapter 3 Network Functions
Chapter 4 MS-BS Interfaces and Protocols
Chapter 5 Physical Layer on Radio Path
Chapter 6 Speech Coding
Chapter 7 MS Terminal Adaptor
Chapter 8 BS-MSC Interface
Chapter 9 Network Interworking
Chapter 10 Service Interworking
Chapter 11 Equipment and Model Acceptance Specification
Chapter 12 Operation and Maintenance

Confidential and Proprietary Information of ZTE CORPORATION

21

2G Mobile Communications Technology Fundamentals

GSM Network Structure


Figure 2 shows the basic GSM network structure.

FIGURE 2 GSM NETWORK STRUCTURE

AUC
SMC
PSTN
ISDN
PDN

HLR
GMSC

BTS
M
S
BTS

BSC

TRAU

MSC/VLR

IWF
MS

Signaling

Here, the meaning of the network entities is as below:


MS: Mobile Station
BTS: Base Transceiver Station
BSC: Base Station Controller
TRAU: Transcoding and Rate Adaptation Unit
IWF: Interworking Function
EIR: Equipment Identification Register
MSC: Mobile Switching Center
VLR: Visitor Location Register
GMSC: Gateway MSC
HLR: Home Location Register
AUC: Authentication Center
SMC: Short Message Center
PSTN: Public Switched Telephone Network
ISDN: Integrated Services Digital Network
PDN: Public Data Networks

22

Confidential and Proprietary Information of ZTE CORPORATION

EIR

Chapter 2 - GSM System

The GSM digital mobile communication system consists of:


Network Subsystem (NSS)
Base Station Subsystem (BSS)
Operation and Maintenance Subsystem (OMS)
MS
The following introduces the functions of each part.

NSS
The NSS implements switching and provides the database for subscriber
data management, mobility management, and security management.
The NSS consists of the MSC, HLR, VLR, EIR, AUC and SMC.
MSC: As the core of the GSM, the MSC implements the switching
function, that is, accomplishes the communication connection between
the PLMN subscribers and the subscribers in other networks. It
implements the functions such as the paging access of PLMN
subscribers, channel assignment, call connection, traffic control, billing,
and base station management. It provides interfaces to other
functional entities, interfaces with other networks, and interfaces for
connecting with other MSCs.
HLR: As the central database of the system, the HLR stores all the
information related to subscribers, including the roaming authority,
basic services, supplementary services, and current location
information. It provides routing information for the MSC for call setup.
An HLR may cover several MSC service areas or even the whole PLMN.
VLR: The VLR stores the information of all the subscribers in its
coverage and provides the call setup conditions for the registered
mobile subscribers. As a dynamic database, the VLR must exchange
large volume of data with the HLR to ensure data validity. When an MS
leaves the controlling area of a VLR, it registers in another VLR. The
original VLR deletes the temporary records of that subscriber. The VLR
is always integrated with the MSC physically.
AUC: The AUC is a strictly protected database that stores subscriber
authentication information and encryption parameters. It is integrated
with the HLR physically.
EIR: The EIR stores the parameters related to MSs. It can identify,
monitor and block the MS, preventing unauthorized MSs from
accessing the network.

BSS
The BSS serves as a bridge between the NSS and the MS. It performs
radio channel management and wireless reception and transmission. The
BSS comprises the Base Station Controller (BSC) and Base Transceiver
Station (BTS).

Confidential and Proprietary Information of ZTE CORPORATION

23

2G Mobile Communications Technology Fundamentals

BSC: Located between the MSC and the BTSs, the BSC controls and
manages one or several BTS. It accomplishes radio channel
assignment, BTS and MS transmit power control, and inter-cell
handover. The BSC is also a small switch that converges and connects
the local network with the MSC through A interface.
BTS: As a wireless transceiving equipment controlled by the BSC in the
BSS, the BTS is in charge of radio transmission and implements wiredrelated wireless conversion, radio diversity, radio channel encryption,
and hopping. The BTS is connected with the BSC through Abis interface,
and connected with the MS through Um interface.
In addition, the BSS also comprises the TRAU. Located between the
BSC and the MSC, the TRAU performs the conversion between 16
kbit/s RPE-LTP codes and 64 kbit/s A law PCM codes.

OMS
The OMS refers to the operation & maintenance part of the GSM. All the
functional units in the GSM can be connected to the OMS through their
own networks. The OMS monitors various functional units in the GSM
network, submits status report, and performs fault diagnosis.
The OMS consists of two parts: OMC System (OMC-S) and OMC-Radio
(OMC-R). The OMC-S implements the operation and maintenance of the
NSS, while the OMC-R implements the operation and maintenance of the
BSS.

MS
As the subscriber equipment in the GSM, the MS can be vehicle installed or
hand portable. It is composed of the mobile terminal and SIM card.
The mobile terminal processes voice signals, and receives and
transmits radio signals.
The SIM stores all information required for identifying a subscriber and
security information, preventing unauthorized subscribers. A mobile
terminal cannot access the GSM network without a SIM card.

Network Service Area


The GSM service area refers to the total area covered by the networks of
all GSM operators. Physically, it consists of several MSC service areas,
each of which comprise of several cells. Logically, several cells form a
location area (LA).
MSC Service Area
A Public Land Mobile Network (PLMN) is composed of multiple MSC
service areas. An MSC service area refers to the coverage of the MSC,
that is, the total area covered by the BTSs under control of the BSCs
connected to the MSC. All the MSs in the service area register in the
local VLR. Therefore, in actual network, the MSC is always integrated
with the VLR as a node.

24

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

Location Area (LA)


Each MSC/VLR service area is divided into several LAs. In an LA, the
MSs can move freely without performing location update. Hence, an LA
is the paging area of a broadcast paging message. An LA belongs to
one MSC/VLR only, that is, an LA cannot cross MSCs/VLRs. The system
can identify different LAs via the LA identity (LAI).
Cell
An LA contains several cells. Each cell has a unique Cell Global
Identification (CGI), which indicates a basic radio coverage area in a
network.
Figure 3 shows the relationship between different coverage areas in a
GSM network.

FI G U R E 3 R E L AT I O N S H I P B E T W E E N C O V E R AG E AR E AS I N A G S M N E T W O R K
GSM service area
The total network coverage provided by all GSM operators
PLMN service area
The network coverage provided by a GSM operator
MSC service area
The area controlled by an MSC
Location area
An area for location update and paging
Cell
A service area provided by a
specific BTS

GSM Protocol Platform


The GSM technical specifications make clear and normative definition of
the interfaces and protocols between subsystems and various functional
entities. The interface refers to the point where two adjacent entities are
connected. The protocol defines the rules for information exchange at the
connection point.

Confidential and Proprietary Information of ZTE CORPORATION

25

2G Mobile Communications Technology Fundamentals

GSM Interfaces
Figure 4 shows the interfaces in the GSM.

FIGURE 4 GSM INTERFACES


G
VLR
Sm

Um

Abis

VLR

D
MS

BTS

BSC

MSC
E

HLR
F

MSC

EIR

Sm: The man-machine interface. It is the interface between


subscribers and the PLMN and implemented in the MS. It comprises the
keyboard, LCD, and the SIM card.
Um: The radio interface between the MS and the BTs, an important
interface in the PLMN. The digital mobile communication network has
different radio interface with the analog mobile communication network.
A interface: Interface between the BSC and the MSC. It is an important
interface because it connects the two important parts (BSC and MSC)
in the GSM. The base station management information, call processing
interface,
mobility
management
information,
and
specific
communication information are transferred through the A interface.
Abis interface: Interface between the BSC and the BTS. It supports all
the services provided to subscribers, especially supports the control of
BTS radio equipment and the management of radio resources assigned.
B interface: Interface the MSC and the VLR. The VLR is a database
locating and managing the MS when the MS roams in the related MSC
control area. The MSC can query the current location of the MS from
the VLR and update the MS location. When the subscriber uses a
special supplementary service or changes a relevant service, the MSC
notifies the VLR. When necessary, the information in the HLR is also
updated.
C interface: Interface between the MSC and the HLR. It transfers
management and route selection information. When a call finishes, the
MSC sends the billing information to the HLR. When the PSTN cannot
get the location information of a mobile subscriber, the related GMSC
queries the HLR of the subscriber to obtain the roaming number of the
called MS, and then transfers it to the PSTN.

26

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

D interface: Interface between the HLR and the VLR. It exchanges the
MS location information and subscriber management information. To
enable a mobile subscribe to originate or receive calls in the whole
service area, data must be exchanged between the HLR and the VLR.
The VLR notifies the HLR of the current location of the MSs belonging
to the HLR, and then provides the roaming number of the MSs. The
HLR sends the VLR all the data required to support the services of the
MS. When an MS roams to the service area of another VLR, the HLR
notifies the original VLR to delete the relevant information of the MS.
When the MS uses supplementary services, or some parameters are
changed, the D interface is also used to exchange the related
information.
E interface: Interface between MSCs. It exchanges the handover
information between two MSCs. When the MS in a conversation moves
from one MSC service area to another MSC service area, inter-cell
handover occurs to maintain the conversation. At that time, the
related MSCs exchange the handover information through the E
interface.
F interface: Interface the MSC and the EIR. It exchanges the
management information of the MS, such as the IMEI, between the
MSC and the EIR.
G interface: Interface between VLRs. When an MS uses a Temporary
Mobile Subscriber Identity (TMSI) to register in a new VLR, the
relevant information is exchanged between the VLRs through the G
interface. This interface also searches the IMSI of the subscriber from
the VLR that registers the TMSI.

GSM Interface Protocol Model


As a 2G cellular mobile network, the GSM adopts the Open System
Interconnection (OSI) mode to define its protocol model. Figure 5 shows
the GSM interface protocol model, which defines the interfaces and
protocols between the MS and the MSC.

FIGURE 5 GSM INTERFACE PROTOCOL MODEL


Um interface

Abis interface

A interface

CM

CM

MM

MM

RRM

RRM

RRM

LAPD m

LAPD m

LAPD

LAPD

Radio

Radio

64
kbit/s

64
kbit/s

MS

BTS

BSC

RRM
SCCP

SCCP

MTP

MTP

64
kbit/s

64
kbit/s
MSC

Confidential and Proprietary Information of ZTE CORPORATION

27

2G Mobile Communications Technology Fundamentals

The OSI reference model is of the hierarchical structure. According to the


concept of hierarchy, the communication processing process can be
divided into several logical layers from the lowest to the highest layer. In
different systems, the entities in the same layer that exchange information
for the same purpose are called peer entities. The entities in adjacent
layers interact with each other through the common layer. The lower
layers provide services to higher layers. The services provided by layer N
is a combination of the services and functions provided by the layers below
it.
The first layer of the Um interface protocol is the physical layer, which
is marked as L1. As the lowest layer, L1 provides the basic radio
channels for the information transmission of higher layers.
The second layer L2 is the data link layer, which is marked as LAPDm. It
covers various data transmission structures and controls the data
transmission.
The third layer L3 is the highest layer, which is called the application
layer. It covers various messages and programs, and controls services.
L3 comprises radio resource management (RRM), mobility management
(MM) and call connection management (CM).
The Abis interface protocol is slightly different from the Um interface
protocol. Its physical layer is the 64 kbit/s land line, and the link layer
is the LAPD.
The first layer of A interface protocol is the 64 kbit/s land line, and the
second layer is the message transfer part (MTP), which is part of the
CCS7 network. The MTP comprises many network protocols and
centralizes all the link layer protocols. The signaling connection control
part (SCCP) and MTP jointly constitute the network layer protocols on
A interface.
The MM and CM are transparently transmitted in the BSC.

Frame Structure
Channels

and

Radio

The GSM is a digitizing system, and its task is to transfer bit stream. To
associate the communication services with transmission solutions, the
concept of channel is introduced. Different channels can transfer different
bit streams at the same time. The channels fall into physical channels and
logical channels. The mapping between the logical channel and physical
channel is the process that arranges the information to be sent to the
proper TDMA frames and timeslots.

28

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

Radio Frame Structure


The GSM radio frame structure consists of five levels: timeslot, TDMA
frame, multiframe, superframe and hyperframe.
1. The timeslot is the basic unit of a physical channel.
2. A TDMA frame is composed of eight timeslots. It is the basic unit
occupying carrier bandwidth, that is, each carrier has eight timeslots.
3. There are two types of multiframes:
i.

Multiframe composed of 26 TDMA frames. This type of multiframe


is used in TCH, SACCH, and FACCH.

ii. Multiframe composed of 51 TDMA frames. This type of multiframe


is used in BCCH, CCCH, and SDCCH.
4. The superframe is a consecutive 51 x 26 TDMA frame. It consists of 51
26-multiframes or 26 51-multiframes.
5. The hyperframe consists of 2,048 superframes.
Figure 6 shows the structure of the frames in the GSM.

FIGURE 6 HIERARCHICAL FRAME STRUCTURE OF GSM


1 hyperframe = 2048 superframes = 2715648 TDMA frames
0

2042 2043 204420452046 2047

1 superframe = 1326 TDMA frames (6.12s)


= 51 26-multiframe or 26 51-multiframes
0 1 2 3
47 48 49 50
0
1
24
25
1 26-multiframe = 26 TDMA frames (120 ms)
0 1 2 3 4

1 51-multiframe = 51 TDMA frames (3036/13 ms)

22 23 2425

0 1 2 3 4

47 48 49 50

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0

1
0
TDMA frame

2
0

Physical Channel
The GSM adopts the mixed technology of Frequency Division Multiple
Access (FDMA) and Time Division Multiple Access (TDMA). It features high
frequency utilization.
The FDMA enables 124 carrier frequencies (carriers for short) to be
assigned to the uplink (from the MS to the BTS) 890 MHz 915 MHz or
downlink (from the BTS to the MS) 935 MHz 960 MHz in GSM900 band.
The interval between carriers is 200 kHz. The carriers in the uplink and
downlink are in pairs, which is the so-called duplex communication mode.

Confidential and Proprietary Information of ZTE CORPORATION

29

2G Mobile Communications Technology Fundamentals

The interval between duplex receiving and transmitting carrier pair is 45


MHz.
The TDMA enables each carrier of the GSM900 band to be divided into
eight time segments. Each time segment is called a timeslot. See Figure 7.
This type of timeslot is called a channel or a physical channel. Eight
consecutive timeslots on a carrier constitute a TDMA frame, that is, a
carrier of the GSM provides eight physical channels.

FIGURE 7 TIME-FREQUENCY STRUCTURE OF PHYSICAL CHANNELS

Frequency

200 kHz

Time
16/25 ms

Timeslot

Logical Channel
If each timeslot of the TDMA frame is looked as a physical channel, the
different information carried on the physical channels is classified as
logical channels. Based on the requirements for mobile communication,
the logical channels are control logical channels, speech or data logical
channels assigned to the eight TDMA timeslots to transfer various control
signaling and speech or data services.
The information transferred on the physical channels of the GSM digital
system is the pulse train composed of about 100 modulated bits, which is
called burst. Different logical channels are carried in the bursts of different
formats.
The logical channels fall into common channels and dedicated channels.
Figure 8 shows the logical channels defined by the GSM.

30

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

FIGURE 8 GSM LOGICAL CHANNELS


Logical
channels

Dedicated
channels

Common
channels

Common control
channel (CCCH)

Broadcast
channel (BCH)

Frequency
correction
channel
(FCCH)

Synchronizati
on channel
(SCH)

Broadcast
control channel
(BCCH)

Paging channel
(PCH)

Stand-alone
Dedicated Control
Channel (SDCCH)

Random access
channel (RACH)

Traffic channel
(TCH)

Dedicated control
channel (ECCH)

Slow associated
control channel
(SACCH)

Access grant
channel (AGCH)

Fast associated
control channel
(FACCH)

Full rate
channel

Half-rate
channel

Enhanced
full rate
channel

Common Channel
The common channels comprise:
Broadcast channel (BCH): Transmits the broadcast messages from the
base station to the MS.
Common control channel (CCCH): Transmits the bi-directional signals
required to set up the connection between the MSC and the MS.
1. Broadcast channels (BCHs)
BCHs are unidirectional channels from the base station to the MS. The
BCHs comprises:
Frequency correction channel (FCCH): Transmits the information used
to correct the MS frequency. The MS receives the frequency correction
information through the FCCH and corrects its time base frequency.
Synchronization channel (SCH): Transmits frame synchronization
(TDMA frame number) information and Base Station Identity Code
(BSIC) to MSs.
Broadcast control channel (BCCH): Broadcasts general information to
BTSs. For example, broadcast the local cell and neighboring cell
information, and synchronization (time and frequency) information on
this channel. The MSs listen to the BCCH periodically to obtain the
information transmitted on it, such as the Local Area Identity, List of
Neighboring Cell, frequency table used in the local cell, cell identity,
power control indication, intermittent transmission permission, access
control, and CBCH description. The BCCH carrier is transmitted by the
base station at the fixed power, and its signal strength is measured by
all the MSs.
2. Common control channels (CCCHs)
The CCCHs are point-to-multipoint bi-directional channels between the
base station and the MS.
The CCCHs include:

Confidential and Proprietary Information of ZTE CORPORATION

31

2G Mobile Communications Technology Fundamentals

Paging channel (PCH): Broadcasts the paging messages from the base
station to the MS. It is a downlink channel.
Random access channel (RACH): The MS sends information to the base
station through this channel when accessing the network at random.
The information sent includes the response to the paging message of
the base station and the access of mobile-originated call. The MS also
applies for a stand-alone dedicated control channel (SDCCH) from the
base station through this channel. The RACH is a uplink channel.
Access grant channel: The base station sends the assigned SDCCH to
the MS that accesses the network successfully through this channel.
The AGCH is a downlink channel.

Dedicated Channel
Dedicated channels are the traffic channels that transmit voices and data.
Some dedicated channels are used for the purpose of control.
1. Dedicated control channel (DCCH)
The DCCHs are point-to-point bi-directional channels between the base
station and the MS.
The DCCHs include:
Stand-alone dedicated control channel (SDCCH): Transmits the
signaling and channel information between the base station and the MS,
such as the authentication and registration signaling messages. During
the establishment of a call, the SDCCH supports bi-directional data
transmission and the transfer of short messages.
Slow associated control channel (SACCH): Through this channel, the
base station sends the power control message and frame adjustment
message to the MS, and receives signal strength report and link quality
report from the MS.
Fast associated control channel (FACCH): Transmits inter-cell handover
signaling messages between the base station and the MS.
2. Traffic channel (TCH)
The TCHs transmit voice and data services. According to the switching
mode, the TCHs can be divided into circuit-switched channels and
data-switched channels. According to the transmit rate, the TCHs can
be divided into full-rate channels and half-rate channels. The rate of
the GSM full-rate channels is 13 kbit/s, and that of the GSM half-rate
channels is 6.5 kbit/s. In addition, the enhanced full-rate channel has
the same rate as the full-rate channels, which is 13 kbit/s. However, it
has better compressed coding scheme than the full-rate channels. That
is why the enhanced full-rate channel provides better voice quality.

Channel Combination
In actual application, the logical channels of different types are always
mapped to the same physical channel. This is called channel combination.
The following are nine channel combinations of GSM:

32

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

1. Full-rate traffic channel (TCHFull): TCH/F + FACCH/F + SACCH/TF


2. Half-rate traffic channel (TCHHalf): TCH/H (0, 1) + FACCH/H(0, 1) +
SACCH/TH (0, 1)
3. Half-rate1 traffic channel (TCHHalf2): TCH/H (0, 0) + FACCH/H (0, 1)
+SACCH/TH (0, 1) + TCH/H (1, 1)
4. SDCCH: SDCCH/8 (0,, 7) + SACCH/C8 (0,, 7)
5. Main broadcast control channel (MainBCCH): FCCH + SCH + BCCH +
CCCH
6. Combined broadcast control channel (BCCHCombined): FCCH + SCH +
BCCH + CCCH + SDCCH/4 (0,,3) + SACCH/C4 (0,, 3)
7. Broadcast channel (BCH): FCCH + SCH + BCCH
8. Cell broadcast channel (BCCHwithCBCH): FCCH + SCH + BCCH +
CCCH + SDCCH/4 (0,, 3) + SACCH/C4 (0,, 3) + CBCH
9. Slow dedicated control channel (SDCCHwithCBCH): SDCCH + SACCH +
CBCH
Among the above channel combinations, CCCH = PCH + RACH + AGCH.
As downlink channels only, the CBCHs carry cell broadcast information
and share the physical channel with the SDCCH.
Each cell broadcasts an FCCH and an SCH. The basic combination in
the downlink direction includes an FCCH, an SCH, a BCCH and a CCCH
(PCH + AGCH). It is allocated to TN0 of BCCH carrier configured for a
cell, as shown in Figure 9.

FIGURE 9 STRUCTURE OF A 51-FRAME CHANNEL


51 frames
BCCH+CCCH
F S
Downlink

F S

F S

F S

F S

BCCH+CCCH
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
Uplink
(a) FCCH+SCH+BCCH+CCCH
8 SDCCH/8
Downlink
8 SDCCH/8
Uplink

D0

D1

D2

D3

D4

D5

D6

D7

A0

A1

A2

A3

I I I

D0

D1

D2

D3

D4

D5

D6

D7

A4

A5

A6

A7

I I I

A1

A2

A3

I I I

D0

D1

D2

D3

D4

D5

D6

D7

A0

A5

A6

A7

I I I

D0

D1

D2

D3

D4

D5

D6

D7

A4

(b) SDCCH/8(0,...,7)+SACCH/C8(0,...,7)
BCCH+CCCH
+4SDCCH/4 F S
Downlink
F S
BCCH+CCCH
+4SDCCH/4
Uplink

F S

F S

F S

F S

D3

RR

A2

D3

R R A0

D
0
D
0

D
1
D
1

F S
F S

D
2
D
2

A3

RRRRRRRRRRRRRRRRRRRRRRR

A1

RRRRRRRRRRRRRRRRRRRRRRR

D
3
D
3

A
0
A
2

F S
F S
D
0
D
0

D
1
D
1

A
1
A
3
F S
F S

I
I
D
2
D
2

(c) FCCH+SCH+CCCH+SDCCH/4(0,...,3)+SACCH/C4(0,...,3)
F: FCCH
B: BCCH
R: RACH
A: SACCH/C

S: SCH
C: CCCH (CCCH=PCH+AGCH+RACH)
D: SDCCH
I: Idle

Confidential and Proprietary Information of ZTE CORPORATION

33

2G Mobile Communications Technology Fundamentals

For the half-rate voice channel combination, each timeslot has two
half-rate sub-channels and corresponding SACCH, with 26TDMA frames
as the multiframe. Figure 10 shows the frame structure.

FIGURE 10 STRUCTURE OF A HALF-RATE VOICE CHANNEL


26 frames
H
0

H
1

H
0

H
1

H
0

H
1

H
0

H
1

H
0

H
1

H
0

H
1

S
0

H
0

H
1

H
0

H
1

H
0

H
1

H
0

H
1

H
0

H
1

H
0

H
1

S
1

Mapping Between Logical Channels and


Physical Channels
Obviously, the logical channels in the GSM are much more than the eight
physical channels that a GSM carrier can provide. If each logical channel is
configured with a physical channel, the eight physical channels provided
by a carrier are not enough. In such case, extra carriers must be added.
However, the communication in this way is not highly effective. The way to
solve this problem is to multiplex the CCCH, that is, multiplex the CCCH on
one or two physical channels.
In GSM, the mapping between the physical channels and the logical
channels is set up as follows:
A base station has N carriers, and each carrier has eight timeslots. Define
the carriers as f0, f1, f2, The downlink starts from timeslot 0 (TS0) of f0.
TS0 is used to map with the control channel only. f0 is also called the
broadcast control channel (BCCH). Figure 11 shows the multiplexing of
BCCH and CCCH on TS0.

FIGURE 11 MULTIPLEXING OF BCCH AND CCCH ON TS0


TDMA
frame 012

BCCH+CCCH
FS
Downlink

7 012

FS

701

FS

FS

FS

F (FCCH): The MS synchronizes its frequency through it.


S (SYCH): The MS reads the TDMA frame number and Base Station Identity Code
(BSIC) through it.
B (BCCH): The MS reads the general inforamtion of the cell through it.
I (IDLE): Idle frame, containing no information. It serves as the end flag of the
multi-frame.

The BCCH and CCCH occupy 51 TS0s in total. Although only the TS0 of
each frame is occupied, the total length is 51 TDMA frames in terms of

34

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

time. Each time when an idle frame appears, the multiframe ends. After
that, a new multiframe starts from F and S. Repeat like this, and the
TDMA multiframe is constructed.
When there is no paging or call connected, the base station always
transmits on f0. This enables the MS to detect the signal strength of the
base station to determine the cell to be used.
For the uplink, the TS0 on f0 does not include the above channels. It is
used for the MS access only; that is, it is used as the RACH. Figure 12
shows the TS0 of 51 consecutive TDMA frames.

F I G U R E 1 2 M U L T I P L E X I N G O F R AC H O N T S 0

TDMA
frame 012

RACH
Uplink

7012

701

RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR

The BCCH, FCCH, SCH, PCH, AGCH and RACH are all mapped to TS0. The
RACH is mapped to the uplink, and the rest are mapped to the downlink.
The TS1 on downlink f0 is used to map the DCCH to physical channel.
Figure 13 shows the mapping relationship.

F I G U R E 1 3 M U L T I P L E X I N G O F S D C C H A N D S AC C H O N T S 1 ( D O W N L I N K )

TDMA
frame 0 1 2

7012

701

D0

D1

D2

D3

D4

D5

D6

D7

A0

A1

A2

A3

III

D0

D1

D2

D3

D4

D5

D6

D7

A4

A5

A6

A7

III

SD CCH+ SA CCCH
Downlink

Since the bit rate in call setup and registration is quite low, eight dedicated
control channels can be placed on one timeslot to improve the multiplexing
ratio of the timeslot.

Confidential and Proprietary Information of ZTE CORPORATION

35

2G Mobile Communications Technology Fundamentals

The SDCCH and SACCH have 102 timeslots in total, that is, 102 time
division multiplexing (TDM) frames.
The DX (D0, D1, ) of the SDCCH is used in the early time when a call is
set up. When the MS transfers to the TCH, and the subscriber starts the
conversation or the release is triggered after registration, the DX is used
by other MSs.
The AX (A0, A1, ) of the SACCH transfers unimportant control
information, such as radio measurement data.
The TS1 on the uplink f0 has the same structure with the TS1 on the
downlink f0. They have an offset in time, which means bi-directional
connection can be performed at the same time for an MS. Figure 14 shows
the multiplexing of the SDCCH and SACCH on TS1 of the uplink f0.
F I G U R E 1 4 M U L T I P L E X I N G O F S D C C H A N D S AC C H O N T S 1 ( U P L I N K )

TDMA
frame

012

A5

A1

7012

701

A6

A7 I I I

D0

D1

D2

D3

A2

A3

D0

D1

D2

D3

III

SDCCH+ SACCCH

DX: same as uplink

Uplink

D4

D4

D5

D6

D7

A0

D5

D6

D7

A4

AX: Same as downlink

The uplink and downlink TS0 and TS1 on f0 are used by the logical control
channel, while the other six physical channels (TS2 to TS7) are used by
the TCH.
Figure 15 shows the mapping from the TCH to the physical channel.

FIGURE 15 MULTIPLEXING OF TCH

TDMA
frame

TCH
Downlink

012

7012

7012

TT TTTTTTTTTT ATTTTTTTTTTTT I

Note: There are 26 timeslots in total.The sequence


starts from the begining after the idel timeslot.

36

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

Figure 15 shows the time division multiplexing of TS2 only. In this figure,
T stands for the TCH, which transmits voice or data; A for the SACCH,
which transfers control commands such as the command to change the
output power; I for Idle, which does not contain any information but is
used in measurement. The TDM is implemented on TS2 with 26 timeslots
as a cycle. The idle timeslot I serves as the beginning or end of the
repeated sequence.
The uplink TCH is of the same structure with the downlink TCH. They only
have a time offset, which is three timeslots. That is, the TS2 of the uplink
and that of the downlink do not appear simultaneously, which means that
the MS need not send or receive data at the same time. Figure 16 shows
the offset between the uplink and downlink of the TCH.

FIGURE 16 OFFSET BETWEEN THE UPLINK AND DOWNLINK OF TCH

0
Downlink C0

TDMA frame number


0
1

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

45MHz (GSM900)
95MHz (DCS1800)
Uplink

From BTS to MS
From MS to BTS

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

C0
Offset

1
0

TDMA frame number

In conclusion, on carrier f0:


TS0: a logical control channel, with repeat cycle of 51 timeslots.
TS1: a logical control channel, with repeat cycle of 102 timeslots.
TS2: a logical traffic channel, with repeat cycle of 26 timeslots.
TS3 to TS7: logical traffic channels, with repeat cycle of 26 timeslots.
The TS0 to TS7 of other f0 fN are all traffic channels.

Confidential and Proprietary Information of ZTE CORPORATION

37

2G Mobile Communications Technology Fundamentals

Key Technologies
Channel Allocation and Frequency Reuse
Channel Allocation
1. Working band
Currently, the GSM can adopt 900 MHz band, extended 900 MHz band,
and 1800 MHz band. Some countries use 1900 MHz band.
i.

900 MHz band


Uplink (from the MS to the base station) frequency range: 890 MHz
915 MHz
Downlink (from the base station to the MS) frequency range: 935
MHz 960 MHz

ii. Extended 900MHz band


Uplink (from the MS to the base station) frequency range: 880 MHz
915 MHz
Downlink (from the base station to the MS) frequency range: 925
MHz 960 MHz
iii. 850 MHz band
Uplink (from the MS to the base station) frequency range: 824 MHz
849 MHz
Downlink (from the base station to the MS) frequency range: 869
MHz 894 MHz
iv. 1800 MHz band
Uplink (from the MS to the base station) frequency range: 1710
MHz 1785 MHz
Downlink (from the base station to the MS) frequency range: 1805
MHz 1880 MHz
v. 1900 MHz band
Uplink (from the MS to the base station) frequency range: 1850
MHz 1910 MHz
Downlink (from the base station to the MS) frequency range: 1930
MHz 1990 MHz
2. Channel interval
The interval between any two adjacent channels is 200kHz.
3. Channel configuration
All channels are configured with the same interval.
i.

900 MHz band


Channel number: 1 124. There are 124 frequency points in total.

38

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

The relation between the channel number and the frequency point
nominal central frequency is:
Fu (n) = 890 + 0.2 x n (MHz), uplink
Fd (n) = Fu (n) + 45 (MHz), downlink
Here, n (1 n 124) is the channel number or the Absolute Radio
Frequency Channel Number (ARFCN).
ii. Extended 900MHz band
Channel number: 0 124 and 975 1023. There are 174
frequency points in total.
The relation between the channel number and the frequency point
nominal central frequency is
Fu (n) = 890 + 0.2 x n (MHz), 0 n 124
Fu (n) = 890 + 0.2 x (n - 1024) (MHz), 975 n 1023
Fd (n) = Fu (n) +45 (MHz)
iii. 850 MHz band
Channel number: 128 251. There are 124 frequency points in
total.
The relation between the channel number and the frequency point
nominal central frequency is
Fu (n) = 824.2 + 0.2 x (n - 128) (MHz)
Fd (n) = 869.2 + 0.2 x (n 128) (MHz)
128 n 251
iv. 1800 MHz band
Channel number: 512 885. There are 374 frequency points in
total.
The relation between the channel number and the frequency point
nominal central frequency is
Fu (n) = 1710.2 + 0.2 x (n - 512) (MHz)
Fd (n) = Fu (n) + 95 (MHz)
512 n 885
v. 1900 MHz band
Channel numbers: 512 811. There are 300 frequency points in
total.
The relation between the channel number and the frequency point
nominal central frequency is
Fu (n) = 1850.2 + 0.2 x (n - 512) (MHz)
Fd (n) = Fu (n) + 80 (MHz)
512 n 811

Confidential and Proprietary Information of ZTE CORPORATION

39

2G Mobile Communications Technology Fundamentals

4. Interval between transmitting and receiving


i.

900 MHz band


The interval of duplex transceiving frequency is 45MHz.

ii. Extended 900MHz band


The interval of duplex transceiving frequency is 45MHz.
iii. 850 MHz band
The interval of duplex transceiving frequency is 45MHz.
iv. 1800 MHz band
The interval of duplex transceiving frequency is 95MHz.
v. 1900 MHz band
The interval of duplex transceiving frequency is 80MHz.

Frequency Reuse
Currently, the GSM adopts the cellular system to provide the coverage.
That is, the whole GSM network service area is divided into several cells.
Each cell is equipped with a base station, which controls the mobile
communication within the cell. Meanwhile, under the control of the MSC,
the base stations implement the communication of the mobile subscribers
in local cell with other cells and with PSTN subscribers.
In the cellular system, the system capacity is expanded through frequency
reuse. That is, as long as the distance between cells is far enough (the
interference signal does not impact the receiving of useful signals), the
same frequency can be used. The common way is to divide the N channels
available into F groups, and then allocate the F groups of channels to
adjacent cells. See Figure 17. The number of channels in each cell is about
N/F. If omni antennas are used, a base station is installed in the center of
each cell BS (O in Figure 17), called O-type site. If directional sector
antennas are used, a base station is installed in the cross point of three
cells (S in Figure 17), called S-type site. The S-type site covers three
adjacent cells.

FIGURE 17 FREQUENCY REUSE IN THE CELLULAR SYSTEM

B
C

A
D

F
E O

The ZXG10 system adopts 4/12 and 3/9 frequency reuse.

40

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

In 4/12 frequency reuse, the frequencies are divided into 12 groups and
assigned in turn to four sites (A, B, C and D). Each site can use three
frequency groups. Figure 18 shows the cells in 4/12 frequency reuse.

FIGURE 18 CELLS IN 4/12 FREQUENCY REUSE

D3

A1

C2

C3

B1

D2

C1

A2
C3

A3
B1

D1
D2

B2
D3

C1

B3
A1

C3

C2

A1

B2

B3

C1

A2

D1

A3

D2

A1

C3

C2

B1

D2
A1

D3

In 3/9 frequency reuse, the limited frequencies are divided into 9 groups
and allocated to three sites (A, B, and C) in turn. Each site can use three
frequency groups. See Figure 19.

FIGURE 19 CELLS IN 3/9 FREQUENCY REUSE

B3

A1

B2

B3

A1

B2

C1

A2
C3

A3
B1

C1
C2

A2
C3

C1

A3
B1

C3

C2

A1

B2
A3

B3
C1

A1
A2

B2
A3

A1

B3
C1

A2
A1

A3

It can be seen from the above two frequency reuse modes that the
frequency utilization and the number of subscribers increase as the
frequency reuse density increases (the number of frequency groups
decreases). However, with the distance of frequency reuse shortened, the
inter-cell interference is caused, for example, the carrier-to-interference
ratio (C/I) and C/A decreases. The C/I refers to the interference of other
cells to the service area when different cells use the same frequency. The
C/A refers to the interference of adjacent channels to the channels of the
service area in the frequency reuse mode.
The C/I and C/A are the two major parameters in frequency reuse. In the
GSM, the C/I should be more than or equal to 9dB (C/I 9dB) and C/A be
more than or equal to 9dB (C/A -9dB).

Confidential and Proprietary Information of ZTE CORPORATION

41

2G Mobile Communications Technology Fundamentals

After the frequency reuse relation is determined, the frequency groups N


is determined. In the case of 4/12 frequency reuse, N is12. In the case of
3/9 frequency reuse, N is 9.

Discontinuous Transmission (DTX)


Voices are transmitted in two modes:
Voices are continuously coded (a speech frame every 20 ms) no matter
whether the subscribers speaks or not.
DTX: In speech activation period, 16 kbit/s coding is performed. In
speech deactivation period, 500 bit/s coding is performed. A comfort
noise frame (20 ms per frame) is transmitted each 480 ms. See Figure
20.

FIGURE 20 DISCONTINUOUS TRANSMISSION

TRAU

BTS

BTS

MS

480 ms
Comform noise
frame
Speech frame

The DTX can reduce the total interference level in the air and save the
power of transmitters. However, the DTX may slightly lower the
transmission quality. Therefore, the DTX mode and common mode are
optional.

GMSK Modulation
The Guassian Minimum Shift Keying (GMSK) is a special digital FM
modulation mode. The modulation rate is 270.833 kilobauds. The
Frequency Shift Keying (FSK) modulation with bit rate four times of
frequency offset is called MSK (Minimum Shift-frequency Keying). In the
GSM, the Gaussian demodulation filter is used to further reduce the
modulation spectrum. It can cut the frequency conversion speed.
The GMSK can be expressed by a I/Q diagram. If there is no Gaussian
filter, when a series of constant 1s are sent, the MSK signal will be kept in
the state that is higher than the center frequency 67.708 kHz of the
carrier. If the center frequency of the carrier serves as the fixed phase
reference, the signal 67.708 kHz will cause steady increment of phase.
The phase rotates 360 at 67,708 times per second. In a bit period
(1/270.833 kHz), the phase moves 1/4 a circle in the I/G diagram, that is,

42

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

90. The data 1 can be looked as 90 plus the phase. Two 1s makes a
phase increment by 180, three 1s makes a increment by 270, and so on.
The data 0 indicates the same phase change in the reverse direction.
The actual phase track is strictly controlled. In the GSM, digital filter and
1/Q or digital FM modulator are used to generate correct phase track
accurately. The Root Mean Square (RMS) between the actual track and the
ideal track allowed by GSM specifications cannot exceed 5, and the peak
deviation cannot exceed 20.

Channel Coding
Channel coding is used to improve transmission quality and overcome the
adverse impact of interferences on signals.
Using specialized redundancy technology, the channel coding inserts
redundancy bits in a certain pattern at the transmitting end for coding.
The decoding process at the receiving end uses these redundancy bits to
detect error codes and correct errors, and recover the original information
transmitted.
Two coding modes are available in the GSM, namely, convolution code and
block code. In actual application, they are used in combination.
Convolutional code: compiles k information bits into n bits. Both k and
n are very small, and suitable for serial transmission. In addition, the
delay is very shot. After coded, the n elements are not only related to
k information elements of this group, but also to information elements
of the preceding (N-1) group. Here, N is called constraint length. The
convolution code can be expressed as (n, k, N). The error-correction
capability of the convolution encoding is improved with the rise of N,
while the error rate decreases exponentially as N rises. The
convolution code is used to correct errors. It can bring very effective
result when the decoder works in the maximum likelihood estimate
mode.
Block code: It is a kind of shortened loop code, which gets the
redundancy bits by increasing the exclusive-or algorithm of information
bits and maps k input information bits to n output binary code
elements (n>k) through exclusive-or algorithm. The block code is used
to detect and correct errors in groups. It is always used along with the
convolution code.

Interleaving and Deinterleaving


The burst error codes occurred in wireless communication are usually
caused by long fading dips. It is not enough to detect and correct errors
using the channel coding mentioned above. To solve this kind of problem,
the interleaving technology is adopted.
Interleaving in fact is to separate the consecutive bits of a message block
and transmit them non-consecutively. In other words, the original
consecutive block becomes non-consecutive during the transmission, and
a group of interleaved message block is sent. At the receiving end, the

Confidential and Proprietary Information of ZTE CORPORATION

43

2G Mobile Communications Technology Fundamentals

interleaved message blocks is restored (deinterleaved) to original message


blocks. See Figure 21.

FIGURE 21 INTERLEAVING TECHNOLOGY


Message
block

3 1 4

2 1 2

3 1 4

Interleave
Message block
after interleaving

Error

With the interleaving technology, if a message block is lost in transmission,


the data restored at the receiving end only has a part of each message
block lost. The coding technology can recover the data lost easily.
In the GSM, different coding and interleaving modes are used in different
types of channels. See Table 4 for details.

TABLE 4 CODING AND INTERWEAVING OF CIRCUIT LOGICAL CHANNELS

Channel
Type

Ia
TCH
/FS

TCH
/HS:

44

Input
Rate
(kbit/
s)

Input
Code
Block
(bits)

13

50

On four 1/2
bursts

1/2

Parity
check
,3

1/3

240

1/2, one bit


is
removed
every 15 bits.

456

Combine on
22
unequal
bursts

120

32

1/3

456

Combine on
22
unequal
bursts

78

Ia

5.6

22

Ib

5.6

73

II

5.6

17

228

13

TCH/F4.8

On eight 1/2
bursts

Parity
check
,3

II

456

Convolutional
Code Rate

132

TCH/H4.8

Interleaving
Depth

Tail
Bit

13

12

Output
Code
Block
(bits)

Check
Bit

Ib

TCH/F9.6

Code

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

Channel
Type

Input
Rate
(kbit/
s)

Input
Code
Block
(bits)

TCH/F2.4

3.6

TCH/H2.4

3.6

Code
Tail
Bit

Convolutional
Code Rate

Output
Code
Block
(bits)

72

1/6

456

On eight 1/2
bursts

144

1/3

456

Combine on
22
unequal
bursts

Check
Bit

Interleaving
Depth

SCH

25

Parity
check
, 10

1/2

78

Combine on
one SB burst

RACH

Parity
check
,6

1/2

36

Combine on
one AB burst

FACCH

184

Block
code,
40

1/2

456

On eight 1/2
bursts

184

Block
code,
40

1/2

456

On four whole
bursts

SACCH
BCCH
SDCCH
AGCH
PCH

Note: The voice input rate on TCH/FS is 13 kbit/s, that is, each speech frame lasts
20 ms and contains 260 bits. According to the interference of different bits on
voice, the 260 bits are divided into I category (182 bits in total) and II category
(78 bits in total). The I category is further divided into Ia and Ib. The Ia bits are
very important bits. If any of them is incorrect, the subscriber will hear a loud
noise in 20 ms voice interval. There are 50 Ia bits and 132 Ib bits. That is, the 260
bits in a speech frame (20 ms) is { d (0), d (1),, d (181), d (182), , d (259)}.
The part with a single line is I category, and that with a double-line is II category.
It is similar to the TCH/HS.

Table 4 gives the coding and interleaving adopted in different types of


transmission. The first column lists the channels and the related
transmission mode. The Input Code Block column gives the size of the
data block (bits) before channel coding. The Output Code Block column
gives the size of the data block (bits) after channel coding. In Code, the
parameters are listed in the same sequence as the coding sequence. The
tail bit is "0". The decoding is in the reverse order.
The following uses a speech communication as an example to describe the
process of channel coding and interleaving.
In the GSM, the voice input rate on TCH/FS is 13kb/s, that is, 260 bits are
transmitted every 20ms. The 260 bits are protected by means of
segmented coding.
Among the 260 bits, 182 bits adopts 1/2 convolutional coding, and the
remaining 78 bits are not protected. Among the 182 bits, 50 bits are

Confidential and Proprietary Information of ZTE CORPORATION

45

2G Mobile Communications Technology Fundamentals

performed with parity check and then with 1/2 convolutional coding. Three
information bits are added. Those 50 bits are called Ia bits. The other 132
bits, called Ib bits, are performed with 1/2 convolutional coding directly.
Figure 22 shows the interleaving algorithm of voice signals on TCH/F.
After channel coding, 456 bits are carried in every 20ms. Those bits are
divided into eight groups, with the 57 bits in each group carried in
different burst pulses (eight BPs in total). To maximize irrelevancy
between the bit sequences, the bits should be arranged as described in
Table 5.

FIGURE 22 INTERLEAVING OF CODE ELEMENTS

456 bits

456 bits

0 1 2 3 4 5 6
8 9 10 11 12 13 14
. . .
. .
.
. . .
.. .
.
. . .
. . .
.
.

7 0 1 2 3
15 8 9 10 11
. . .
.
. . .
.
. . .
.

5 6 7 8

4
12
.
..
. .
.

456 bits

5
13
.
.
.

4 5

6
14
.
.
.

7 0 1 2 3 4 5
15 8 9 10 11 12 13
.
. . .
. .
.
. . .
.. .
.
. . .
. . .
.

6 7 8

4 5

Block A
57

1
1

57

57

11
bit
6

1 57
1
11
bit
6

57

456 bits

1 57
1
11
bit
6

57
Odd bit

6 7 0 1 2 3 4 5 6
14 15 8 9 10 11 12 13 14
. .
. . .
. .
.
. .
. . .
.. .
.
. .
. . .
. . .
.
.

7 8

Block
B
1
1

57

Even bit

TAB L E 5 FU L L -R AT E S P E E C H I N T E R L E AV I N G AL G O R I T H M

46

No.

Item

Description

0, 8, , 448

Even bits (Block B) of BP (N)

1, 9, , 449

Even bits (Block B) of BP (N + 1)

2, 10, , 450

Even bits (Block B) of BP (N + 2)

3, 11, , 451

Even bits (Block B) of BP (N + 3)

4, 12, , 52

Odd bits (Block A) of BP (N + 4)

5, 13, , 453

Odd bits (Block A) of BP (N + 5)

6, 14, , 454

Odd bits (Block A) of BP (N + 6)

7, 15, , 455

Odd bits (Block A) of BP (N + 7)

Confidential and Proprietary Information of ZTE CORPORATION

7
15
.
.
.

6 7 8

Chapter 2 - GSM System

456 bits are divided into eight groups (rows). Each group has 57 bits
(columns), occupying Block A or Block B of BP (N) to BP (N+7). After
interleaving, a BP carries 114 bits of information plus 2 bits of stolen
frame (116 bits in total). The 114 bits contain 57 bits (odd bits) of
information block A and 57 bits (even bits) of information block B. The
remaining two bits indicate respectively whether the first half BP (odd bit)
and the last half BP (even bit) are subscriber data or fast channel
associated signaling.

Encryption and Decryption


The GSM provides encryption of voice, data, and signaling. Irrelevant
with data type, this type of encryption can be used in normal bursts only.
Encryption is implemented through exclusive or operation of an encryption
sequence (produced by A5 encryption algorithm using Kc and frame
number) and 114 information bits on a normal burst.
At the receiving end, exclusive-or operation is performed on the
encryption sequence using the same sequence to obtain the original data.

Frequency Hopping Technology


In the digital mobile communication system, spread spectrum technology,
including direct sequence spread spectrum and frequency hopping, is used
to improve the anti-interference capability of the system. The GSM adopts
the frequency hopping technology.
There are two reasons for introducing frequency hopping. First, based on
the principle of frequency diversity, frequency hopping is used to
counteract Rayleigh fading. In mobile radio transmission, when the signals
transmitted encounter any obstacle, a short-term change of signal
amplitude occurs inevitably. That change is the Rayleigh fading. Different
frequencies suffer the fading of different degrees. In addition, the fading
becomes more independent with the increase of frequency difference.
With frequency hopping, the burst pulses will not be damaged by Rayleigh
fading in the same way. The second reason is based on the features of
interference source. In the area where traffic is heavy, the cellular system
is liable to be restricted by the interference from frequency reuse, and the
C/I may change a lot during the call. The frequency hopping can break up
the interference from the calls that may affect the cell.
Frequency hopping refers to hopping of the carrier frequency in a certain
sequence within a wide frequency band. That is, the control and
information data are modulated into baseband signals and sent into the
carrier for modulation. Then, the carrier frequency changes it frequency
under the control of pseudo-random codes. The pseudo random sequence
is frequency hopping sequence. Finally, the signals are sent via the RF
filter to the antenna for transmission. The receiver determines the
receiving frequency according to the frequency hopping synchronization
signals and frequency hopping sequence, receives corresponding signals,
and demodulates them. Figure 23 shows the basic structure of frequency
hopping.

Confidential and Proprietary Information of ZTE CORPORATION

47

2G Mobile Communications Technology Fundamentals

FIGURE 23 BASIC STRUCTURE OF FREQUENCY HOPPING

Transmit

Information
modulation

Circuit
synchronization

Receive

Upconversion

Hopping
sequence
generator

Information
demodulation

Variablefrequency
synthesizer

Downconversion

The frequency hopping technology has the following features:


The frequency hopping can increase the system work band, improving
the anti-interference and anti-fading capabilities of the communication
system.
The frequency hopping can improve the pulse of the valid information
part and protect it against the influence from Rayleigh fading in the
communication environment. After frequency hopping, the original
data is restored via channel decoding.
The increment of number of frequency hoppings can increase hopping
gain, improving the anti-interference and anti-fading capability of the
system.
In fact, the frequency hopping is to protect signals from external
interference. Since the signals cannot follow the frequency change, the cofrequency interference and frequency selective fading can be avoided or
obviously decreased. The reason to increase the number of hoppings is
that the gain of frequency hopping system is equal to the ratio of
frequency hopping system bandwidth to N minimum frequency hopping
intervals. Usually, the number of frequency hoppings should be higher
than three. If frequency diversity is also available for the FH system, and
a message is transmitted by several groups of frequency hopping
simultaneously and then judged by the law of large numbers, more
subscribers can use services at the same time with least mutual
interference.
The frequency hopping comprises baseband hopping and RF hopping.
The baseband hopping enables the transmit and receive frequencies of
each carrier unit to remain unchanged. At different frame number (FN)
moment, the frame unit sends data to different carrier units.
The RF hopping controls the frequency synthesizer of each transceiver,
making it hop according to different schemes in different timeslot.

48

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

Diversity Reception
To eliminate system performance deterioration caused by multi-path
facing, the GSM adopts diversity reception technology at the radio
interface of the BTS.
The diversity technology enables branch signals to be combined according
to a certain method. It separates the multi-path signals received into
mutually irrelevant multi-channel signals, and then combines the energy
of these signals so as to improve the reception quality.
The diversity technology comprises time diversity, space diversity,
frequency diversity, and polarity diversity.
1. Space diversity
Two receiving antennas are installed in a place to receive the same
signal independently. Upon receiving signals, the two antennas
combine them and output the signal combined. By this way, the
degree of fading is greatly reduced. This is the so-called space
diversity. The space diversity is based on the fact that the field
strength varies randomly with the space. The longer the distance, the
more variant the multi-path transmission will be, and the less relevant
the receiving filed strength will be. The relevancy refers to the
similarity between the signals. Therefore, the necessary distance must
be determined. Based on related test and statistics, the CCIR
recommends that the distance between two antennas be longer than
0.6 (d > 0.6). The antennas should be installed near the place that is
odd multiple of /4. Even if the distance between antennas is
shortened to be /4, good diversity effect can be achieved.
2. Time diversity
Time diversity enables the same message to be sent within certain
delay or a part of the message to be sent in different time within the
delay range allowed by the system. In the GSM, interleaving
technology is adopted to implement the time diversity.
3. Frequency diversity
Frequency diversity enables a signal to be transmitted by more than
two frequencies. At the receiving end, the signals of different
frequencies are combined. By use of the different paths of radio
carriers in different frequencies, the impact of fading is reduced or
eliminated. The frequency diversity is effective and requires one set of
antenna only. In the GSM, the frequency hopping technology is used to
implement frequency diversity.
4. Polarization diversity
Polarization diversity is the use of two linear polarized antennas
mounted orthogonally to receive signals. It can achieve good diversity
effect. The two sets of polarized antennae in polarity diversity can be
integrated in one set of antenna. Thus, only one receiving antenna and
one transmitter antenna are required in a cell. If duplexer is adopted,
only one transceiving antenna is required. It saves antennas greatly.

Confidential and Proprietary Information of ZTE CORPORATION

49

2G Mobile Communications Technology Fundamentals

Power Control
Power control implements the control of the actual transmit power (keep it
as low as possible) of MS or base station in radio propagation to reduce
the power consumption of MS/BS and the interference of the entire GSM
network. Of course, the prerequisite of power control is to ensure the
good communication quality of the ongoing calls. Figure 24 shows the
power control process.

FIGURE 24 POWER CONTROL

As shown in Figure 24, the MS at point A is far from the BS antenna.


Because the propagation loss of electric wave in air is in direct proportion
to n power of the distance, the MS at A needs higher transmit power to
ensure good communication quality. Comparatively, point B is closer to
the BS antenna than point A, hence the transmission loss is less. To obtain
similar communication quality, the MS at point B requires lower transmit
power. When an MS in communication is moving from A towards B, the
power control can reduce its transmit power gradually. On the contrary, if
it is moving from B towards A, the power control can increase its transmit
power gradually.
The power control is classified as uplink power control and downlink power
control, which are implemented separately. The uplink power control
controls the transmit power of the MS. The downlink power control
controls the transmit power of the base station. No matter uplink power
control or downlink power control, the uplink or downlink interference is
suppressed as the transmit power is reduced. Meanwhile the power
consumption of the MS or base station is reduced. The most obvious
benefits are the average conversation quality of the whole GSM network is
greatly increased, and the MS standby time is prolonged.

Power Control Process


The original information used for decision making of power control is the
measurement data of the MS and base station. Through processing and
analyzing the original data, the MS or base station makes power control
decision. Similar to the handover control process, the whole power control
process is shown in Figure 25.

50

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

FIGURE 25 POWER CONTROL PROCESS

Save measurement
data
Average measurement
data
Make power control
decision
Send power control
command
Rectify measurement
data

1. Saving measurement data


The measurement data related to power control includes uplink signal
level, uplink signal quality, downlink signal level, and downlink signal
quality.
2. Averaging measurement data
To reduce the influence of complicated radio transmission on the
measurement values, forward averaging method is usually adopted to
process the measurement data smoothly. That is, the average value of
several measurement values is used for the decision making of power
control. The setup of parameters in averaging calculation may vary
with the type of the measurement data, that is, the number of the
measurement parameters to be used may be different.
3. Making power control decision
In the decision making of power control, there are three parameters: a
threshold, an N value, and a P value. Among the latest N average
values, if there are P parameters exceed the threshold, the signal level
is too high or the signal quality is good; if there are P parameters are
lower than the threshold, the signal level is too low or the signal
quality is poor.
According to the signal level or signal quality, the MS or BS can judge
how to control the transmit power. The power to be increased or
decreased is determined by the value configured in advance.
4. Sending power control command
According to the power control decision, the corresponding control
command is sent to the base station. The base station executes the
command or transfers the command to the MS.
5. Updating measurement data
After power control, the original measurement data and average values
are useless. If the useless information is still kept, it may cause

Confidential and Proprietary Information of ZTE CORPORATION

51

2G Mobile Communications Technology Fundamentals

incorrect power control decision. Therefore, it is necessary to discard


the outdated data or update it for later use.
The fastest power control can be performed once every 480 ms, which
is the highest speed that the measurement data is reported. In other
words, an entire power control process is executed once in at least
480ms.

Fast Power Control


The ETSI recommends fixed span of control, which is 2dB or 4dB. However,
in actual application, the fixed power control limit cannot achieve optimal
effect. The following gives an example.
When an MS initiates a call in a place close to the base station antenna,
the initial transmit power is the maximum transmit power of the MS in the
system
message
broadcast
on
the
BCCH
of
the
cell
(MS_TXPWR_MAX_CCH). At that time, as the MS is quite close to the MS
antenna, the power control process is supposed to decrease its transmit
power as fast as possible. However, it can hardly be achieved by the
power control process recommended by the ETSI specifications, because
only 2dB or 4dB is decreased each time. In addition, there is an interval
between every two power control processes (because enough new
measurement data need be collected). Therefore, it takes a long time to
reduce the transmit power of the MS to a proper value. It is the same in
the downlink direction. Obviously, it is disadvantageous in suppressing the
interference of the whole GSM network. To solve this problem, more
transmit power should be decreased each time. That is the core idea of the
fast power control.
The fast power control can determine the power control span according
the actual signal strength and quality, breaking through the limitation of
the fixed extent. It can easily solve the power control problem occurred
during the initial access of the MS. Of course, the fast power control can
be applied in other circumstances, such as fast moving MSs and sudden
interference or obstacles. As long as the power control in wide range is
required, the fast power control is the ideal solution.

Timing Advance
In the GSM, because TDMA is adopted in the air interface, the MS must
employ the TSs allocated to it only, and remain inactive in other time.
Otherwise, it may affect the MSs using other TSs on the same carrier.
In the GSM, the MS requires three intervals between timeslots when
receiving or transmitting signals. See Figure 26.

52

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

FIGURE 26 OFFSET BETWEEN UPLINK AND DOWNLINK OF TCH

0
Downlink

TDMA frame
number

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

Uplink
Offset

1
TDMA frame
number

BTS
transmits

MS transmits

Suppose an MS occupies TS2 and moves away from the base station, the
messages sent from the base station will be delayed further and further in
reaching the MS. Meanwhile, the response returned by the MS will also be
delayed further and further in reaching the base station. If nothing is done
to solve the problem, the message sent by the MS from TS2 will
eventually overlap with another calling message received by the base
station in TS3. Therefore, it is important to monitor the time when a call
reaches the base station. As the distance between the MS and the base
station changes, the system issues instructions to the MS, notifying it of
the time advanced. This process is the adjustment of timing advance.
After a specific connection is established, the BTS measures the time
offset between the pulse TSs and the received MS TSs. Based on the value
measured, the BTS calculates the timing advance and notifies the MS of it
through the SACCH at a certain frequency.

Confidential and Proprietary Information of ZTE CORPORATION

53

2G Mobile Communications Technology Fundamentals

Basic Signaling Procedure


Location Update Procedure of MS
Figure 27 shows the location update procedure of the MS.

FIGURE 27 LOCATION UPDATE PROCEDURE OF MS


BTS

MS
CH REQ

BSC

MSC

CH RQD
CH ACT
CH ACT ACK
IMM ASS CMD

IMM ASS
SABM

EST IND

UA

CR LOC UPD REQ


CC

CIPH MODE CMD


CIPH MODE COM

ENCRY CMD

DI CIPH MODECOM

DT1 CIPH MODE CMD

DT1 CIPH MODE COM

DTAP LOC UPD ACCEPT

DT1Clear CMD
CH REL
DISC
UA

DR CH REL
DEACT SACCH
REL IND

DT1Clear COM
RLSD
RLC

RF CH REL
RF CH REL ACK

The MS sends a CH REQ (Channel Request) message through the RACH to


the BTS. Upon receiving the CH REQ message, the BTS processes it and
then sends it to the BSC.
After receiving the CH REQ message, the BSC sends a CH ACT message to
the BTS to activate the SDCCH. After activating the channel, the BTS
returns a CH ACT ACK message.
The BSC sends the IMM ASS CMD to the BTS. Upon receiving the message,
the BTS sends the IMM ASS through the AGCH to the MS. When receiving
the message, the MS sends the SABM. The BTS sends the UA to the MS.

54

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

At the same time, the BTS sends a channel establishment indication (EST
IND) to the BSC, containing the location update request of the MS. The
BSC forwards the location update request (LOC UPD REQ) to the MSC in
CR. As receiving the message, the MSC returns a CC message to the BSC.
The SDCCH is established between the MS and the BTS, and the location
update message is sent to the MSC through the SDCCH. The MSC selects
the encryption mode and sends a location update acceptance message
(LOC UPD ACCEPT) to the MS.
The MSC sends a Clear CMD message to the BSC. The BSC returns a Clear
COM message to the MSC. Meanwhile, the BSC sends the BTS a CH REL
message to release the SDCCH and a DEACT SACCH message to
deactivate the SACCH.
The BTS sends a CH REL message to the MS. The MS requests the BTS to
release radio link (DISC). The BTS returns the UA and reports the channel
release indication to the BSC.
The BSC sends a RF CHL REL message to the BTS. The BTS returns a RF
CHL REL ACK message. The radio channel is released.

IMSI Detach Procedure


Figure 28 shows the IMSI detach procedure.

FIGURE 28 IMSI DETACH PROCEDURE


BTS

MS
CH REQ

BSC

MSC

CH RQD
CH ACT
CH ACT ACK

IMM ASS
SABM
UA

CH REL
DISC
UA

IMM ASS CMD

EST IND

DR CH REL

CR IMSI DETACH
CREF

DEACT SACCH
REL IND
RF CH REL
RF CH REL ACK

The SDCCH is established first. Then, an IMSI DETACH message is sent


through the SDCCH to the MSC. After receiving the message, the MSC
releases the SDCCH.

Confidential and Proprietary Information of ZTE CORPORATION

55

2G Mobile Communications Technology Fundamentals

Mobile-Originated Call and Called Party


On-hook Procedure
Figure 29 shows the mobile-originated call and the called party on-hook
procedure.
When a mobile subscriber originates a call, the SDCCH is established first,
and then a request for the TCH is sent through the SDCCH to the MSC.
The MSC sends an Assignment Request message to the BSC. After
receiving the message, the BSC sends an IMM ASS CMD message to the
MS. The MS establishes a TCH with the BTS. The BTS sends a channel
establishment indication, completes immediate assignment, and release
the SDCCH.
The MSC sends a ring-back tone to the MS over the established TCH. After
the Connect and connect ACK messages are exchanged, the call is set up.
When the called party hooks on, the MSC sends a Disconnect message to
the MS. The MS releases the TCH, and the MSC replies with a Release
Complete message and releases the TCH.

56

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

FIGURE 29 MOBILE-ORIGINATED CALL AND CALLED PARTY ON-HOOK PROCEDURE


MS

BTS

BSC

CH REQ

MSC

CH RQD
CH ACT
CH ACT ACK
IMM ASS CMD

IMM ASS
SABM

EST IND

UA

CR CM SERV REQ
CC

CIPH MODE

CIPH MODE COM

DT1 CIPH MODE CMD

ENCRY CMD

CMD

DI CIPH MODE

COM

DTAP: CM SERV AC

DT1 CIPH MODE COM

CP

DTAP:SETUP
DTAP:CALL PROC

PHY CONT REQ

DT1:ASS REQ

PHY CONT CONF


CH ACT
CH ACT ACK
ASS
CMD
SABM
UA
ASS COM

DR

ASS CMD
EST IND

DI ASS COM
RF CH REL

DT1

ASS COM

RF CH REL ACK
DTAP A lerting
DTAP Connect
DTAP Connect ACK
Data flow
DTAP D isconnect
DTAP Release
DTAP Release COM

CH REL
DISC
UA

DR CH REL
DEACT SACCH
REL IND
RF CH REL

DT1 C lear CMD


DT1 Clear COM
RLSD
RLC

RF CH REL ACK

Confidential and Proprietary Information of ZTE CORPORATION

57

2G Mobile Communications Technology Fundamentals

Mobile-Terminated Call and Calling Party


On-hook Procedure
Figure 30 shows the mobile-terminated call and the calling party on-hook
procedure.
When an MS is called, the MSC sends the paging message to the MS. After
receiving the paging message, the MS establish a SDCCH. Then, the MSC
establishes a TCH and releases the SDCCH. The TCH is used to complete
the call connection.
After the conversation is over, the TCH is released.

58

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

FIGURE 30 MOBILE-TERMINATED CALL AND CALLING PARTY ON-HOOK PROCEDURE


MS

BTS

BSC
UDT

PAG CMD

PAG REQ
CH REQ

MSC
PAG

CH RQD
CH ACT
CH ACT ACK
IMM ASS CMD

IMM ASS
SABM

EST IND

UA

CR PAG RES
CC

CIPH MODE

CIPH MODE COM

DT1 CIPH MODE CMD

ENCRY CMD

CMD

DI CIPH MODE C

OM

DT1 CIPH MODE COM

DTAP:SETUP
DTAP:CALL CONF

PHY CONT REQ

DT1:ASS REQ

PHY CONT CONF


CH ACT
CH ACT ACK
DR ASS CMD

ASS CMD
SABM

EST IND

UA
ASS COM

DI AS S COM

DT1 ASS COM

RF CH REL
RF CH REL ACK
DTAP
DTAP
DTAP

lertin
A
g
Connect

Connect ACK

Data flow
isconnec
t
Releas
DTAP
e

DTAP

DTAP

CH REL
DISC
UA

Release COM
DR CH REL
DEACT SACCH
REL IND
RF CH REL

DT1 C lear CMD


DT1 Clear COM
RLSD
RLC

RF CH REL ACK

Confidential and Proprietary Information of ZTE CORPORATION

59

2G Mobile Communications Technology Fundamentals

Intra-cell Handover Procedure


Figure 31 shows the intra-cell handover procedure.

FIGURE 31 INTRA-CELL HANDOVER PROCEDURE

BTS

MS
MEAS REP

BSC

MSC

MEAS RES
PHY CONT REQ
PHY CONT CON
CH ACT
CH ACT ACK

ASS CMD
SABM
UA
ASS COM

DR : ASS CMD
EST IND
DI : ASS COM
RF CH REL

DT1 : HO PERF

RF CH REL ACK

Based on the measurement reports submitted by the MS continuously, the


BSC judges whether to perform handover.
If intra-cell handover is going to happen, the BSC activates another TCH in
the same cell and assigns that TCH to the MS immediately.
After the MS completes the immediate assignment, the BSC notifies the
MSC of the intra-cell handover occurred to the MS and releases the
original TCH.

Inter-cell Handover Procedure


Figure 32 shows the inter-cell handover procedure.
Based on the measurement reports sent from the MS continuously, the
BSC judges whether to perform handover.
If an inter-cell handover is necessary, the BSC activates a TCH in the
target BTS and sends a HO CMD message to the MS. The MS sets up a
connection with the TCH of the target BTS and performs the handover.
The BSC informs the MSC of the inter-cell handover occurred to the MS
and releases the TCH in the original cell.

60

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 - GSM System

FIGURE 32 INTER-CELL HANDOVER PROCEDURE

MS

BTS1

BTS2

MEAS REP

BSC

MSC

MEAS RES
CH ACT
CH ACT ACK
DRHO CMD

HO CMD
HO ACCESS

HO DET

PHY INFO
SABM

EST IND

UA
HO COM

DIHO COM

DT1HO PERF

RF CH REL
RF CH REL ACK

Power Control Signaling Procedure


When an MS is in the dedicated mode, it is assigned with an SACCH
besides a TCH. The SACCH transmits the measurement report, power
control, timing advance control, and link monitoring information under
mobile environment. Figure 33 and Figure 34 shows the measurement
report and transmit power control procedures respectively.

FIGURE 33 MEASUREMENT REPORT PROCEDURE

MS

BTS

BSC

MEAS REP
MEAS REP

Confidential and Proprietary Information of ZTE CORPORATION

61

2G Mobile Communications Technology Fundamentals

FIGURE 34 TRANSMIT POWER CONTROL PROCEDURE

MS

BTS

BSC
MS POWER CTRL

MS POWER CTRL
BS POWER CTRL

The MS reports the measurement data through the SACCH. The BSC
makes the power control decision and sends the BTS the related control
commands. The BTS executes the power control commands or forwards
the commands to the MS.

62

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

GPRS Technology
This chapter introduces the features, related standards and specifications,
and key technologies of the GPRS.

GPRS Definition
The General Packet Radio Service (GPRS) is the packet data service
introduced in GSM Phase2+. It provides subscribers the end-to-end mobile
data services based on packet switching and transmission technology. The
GPRS can effectively utilize the radio resources and network terrestrial
resources and is suitable for long-time small-volume burst data services.

GPRS Features
The GPRS has the following features:
Seamless connection with IP network
IP technology is adopted in the core network of the GPRS, and many
transmission technologies are employed in the bottom layer of the
GPRS. Thus, it is easy to implement the seamless connection with the
highly developed IP network.
High rate
With the help of multi-slot binding and high-speed coding scheme, the
GPRS phase I adopts CS1 and CS2 coding schemes, and provides the
access rate up to 115 kbit/s. The GPRS phase II adopts CS3 and CS4
coding schemes, and provides up the rate up to 171 kbit/s.
Always online and flow charging
The GPRS provides the "availability for connection everywhere and the
performance of always online", offering new means for mobile
subscribers to access the Internet and Intranet rapidly. Once a GPRS
terminal is powered on and connected with the GPRS network, it can
maintain the online status all the way. The subscriber can receive and
send information at any time without the dial-up process required in

Confidential and Proprietary Information of ZTE CORPORATION

63

2G Mobile Communications Technology Fundamentals

circuit switching. As long as the GPRS terminal does not transmit data,
it will not occupy network and radio resources. Thus, the mobile
subscribers can benefit from the flow charging. That is, the mobile
subscribers can stay online as long as possible without bothering the
prohibitive bill.
Mature technology
The GPRS provides solutions to implement data services in the mature
GSM technologies and current networks. It can save investment and
make quick return.

GPRS Standard Specifications


It was suggested in 1993 in Europe that the GPRS be deployed in GSM
network. In 1997, great progress was made in the standardization of the
GPRS. In October that year, the ETSI issued the GPRS Phase1 service
description. The GPRS phase 2 was completed at the end of 1999. The GPRS
standard goes through three phases. In order to implement the GPRS, 18
new standards are made and many standards are modified in these three
phases.
Table 6 lists the three phases of the GPRS.

T A B L E 6 T H R E E P H A S E S O F G P R S S TA N D A R D S

Phase 1

Phase 2

Phase 3

02.60
Service
Description

03.60 System Description and


Network Structure

04.60 RLC/MAC Protocol

03.64 Description
Interface

04.61 PTM-M Service

of

Radio

03.61 Point to Multipoint Broadcast Service

04.62 PTM-G Service

03.62 Point to Multipoint-Group


Call

04.64 LLC 04.65 SNDCP


07.60 Subscriber Interworking
08.14 Gb Layer1
08.16 Gb Layer Network Services
08.18 BSSGP and Gb Interface
09.16 Gb Layer2
09.18 Gb Layer3
09.60 Gn & Gp Interface
09.61 Interworking
Networks

64

Confidential and Proprietary Information of ZTE CORPORATION

of

External

Chapter 3 - GPRS Technology

According to the assumption of ETSI, the GPRS must implement:


PTP service
PTP TCP/IP subscriber interworking
X.28 protocol from the MS to the GGSN and X.25 protocol from the
GGSN to external PDN
Gn, Gb, Gr, Gp, Gs, and Gi interfaces
Security guarantee for PTP and roaming.
Charging
Operator-determined Call barring and call termination, and operator
call filtering
Preparation for PTM radio interface
Anonymous access
Support of SMS-MO and SMS-MT through the GPRS

GPRS Network Structure


Figure 35 shows the network structure of the GPRS.

FIGURE 35 GPRS NETWORK STRUCTURE

BSC

MSC/VLR

Gs interface

PCU

HLR

SMC

Gd interface

Gc interface

Gr interface
Gb interface
Gn interface

Gn interface
SGSN

Ga
interface
SGSN

GGSN

Charging
gateway
function (CGF)

Gi interface

Ga interface
Packet data
network

Billing system

Signaling and GPRS subscriber data


Signaling

Confidential and Proprietary Information of ZTE CORPORATION

65

2G Mobile Communications Technology Fundamentals

To support the GPRS, the GSM introduces two new equipment: Serving
GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN).
The BSC is added with Packet Control Units (PCUs), and related BSS
software is upgraded.
The SGSN provides similar functions as the MSC. It accomplishes GPRS
channel assignment, mobility management, encryption, and charging.
The GGSN provides various interfaces. It supports the interconnection
with external Public Data Networks (PDNs) like Internet and X.25, and
other PLMNs.
With the SGSN and GGSN, the operators can construct a GPRS backbone
network on the basis of the current transmission network. By
reconstructing the current GSM network, the operators can easily provide
both circuit and packet services, and fully utilize the radio resources and
network terrestrial resources.
The GPRS MSs fall into three categories:
Type-A GPRS MSs
Be able to connect with the GSM and GPRS at the same time, the typeA GPRS MS can be activated in these two systems and listen to the
messages from these two systems simultaneously. It can provide GPRS
services and GSM circuit-switched services, including the short
message service (SMS) at the same time. The Type-A MS can originate
and receive calls in GSM and GPRS system at the same time, and
perform automatic service changeover. It enables the subscribers to
receive speech calls and communicate with the called party without
interrupting the data transmission.
Type-B GPRS MSs
The type-B MS can connect with the GSM and GPRS system at the
same time, and provide GPRS and GSM circuit-switched services.
However, it cannot provide either GPRS or GSM services at a time.
When a circuit-switched call is originated to the type-B MS in GPRS,
the MSC/VLR sends a Suspend message to the SGSN. Upon receiving
the message, the SGSN disconnects the GPRS connection temporarily.
After the circuit-switched call is complemented, the MSC/VLR sends a
Restore message to the SGSN. The SGSN resumes the GPRS
connection after receiving the message. Thus, the MS need not
establish GPRS connection repeatedly. Most of the GPRS MSs in the
current market are type-B MSs.
Type-C GPRS MSs
The type-C MS enables subscribers to use GSM services and GPRS
alternatively. Manual service changeover is required.

66

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

GPRS Protocol Platform


GPRS Transmission Protocol Platform
Composed of a hierarchical protocol structure, as shown in Figure 36, the
GPRS transmission platform is in charge of subscriber information
transmission and the related process control (for example, flow control,
error detection, error correction, and error recovery). The transmission
platform is connected with the NSS through the radio interface in the
bottom layer. This kind of independence is implemented through the Gb
interface reserved.

FIGURE 36 GPRS TRANSMISSION PROTOCOL PLATFORM


Gb
interfac
e

Um
interface
App

Gi
interface

Gn
interface

IP/X.25

IP / X.25
R elay

SNDCP
LLC

SNDCP

GTP

GTP

LLC

UDP /

UDP /

TCP

TCP

Relay
RLC

RLC

BSSGP

BSSGP

IP

IP

MAC

MAC

NS

NS

L2

L2

L1 bis

L1

L1

GSM RF

GSM RF L1 bis

MS

BSS

SGSN

GGSN

1. GPRS Tunnel Protocol (GTP)


In the GPRS backbone network, the subscriber data and signaling
between GSNs are transmitted through the GTP. All the point-to-point
PDP protocol data units (PDUs) are encapsulated using the GTP. As the
protocol for the interconnection between GSN nodes in the GPRS
network, the GTP defines the Gn interface. The GSM09.60 makes the
specifications of the GTP.
2. Transmission Control Protocol (TCP)
When a reliable data link (for example, X.25) is required to transmit
the GTP PDUs in the GPRS backbone network, TCP is used as the
transmission protocol. If a reliable data link is not required (for
example, IP), UDP is used to deliver GTP PDUs. The TCP provides flow
control and prevents the loss or destruction of GTP PDUs The UDP can
prevent the GTP PDUs from being destructed.

Confidential and Proprietary Information of ZTE CORPORATION

67

2G Mobile Communications Technology Fundamentals

3. Internet Protocol (IP)


As the GPRS backbone network protocol, the IP is used for the route
selection of subscriber data and control signaling. The GPRS backbone
network was first built on the basis of IPv4. With the popularity of IPv6,
the GPRS will adopt IPv6 ultimately.
4. SubNetwork Dependent Convergence Protocol (SNDCP)
The SNDCP enables the network-level features to be mapped to the
network features in the bottom layer. It divides and assembles the
data to be transmitted, and determines the TCP/IP address and
encryption mode. In the SNDC layer, the data transmitted between the
MS and SGSN is divided into one or several SNDC data packet units.
The SNDC data packet units generated are placed in the LLC frame.
The GSM04.65 provides the description of the SNDCP.
5. Logical Link Control (LLC)
The LLC is a radio link protocol based on High-level Data Link Control
(HDLC). It can provide high reliable encrypted logical links. The LLC
layer enables the LLC address and frame field to be generated from the
SNDC data units of the SNDC layer, helping a complete LLC frame be
generated. Moreover, the LLC can implement point to multipoint
address and the retransmission control of data frames. The LLC is
independent from the radio interface protocol of the bottom layer,
which enables the minimum reconstruction of the NSS when other
GPRS wireless solutions are introduced. The GSM04.64 provides the
specifications of the LLC.
6. Relay
In the BSS, the relay transfers the LLC PDUs between the Um interface
and the Gb interface. IN the SGSN, the relay transfers the PDP PDUs
between the Gb interface and the Gn interface.
7. BSS GPRS Protocol (BSSGP)
This layer transfers the information related to routing service quality
between the BSS and the SGSN. The BSSGP does not provide the error
correction function. The GSM08.18 provides the specifications of the
BSSGP.
8. Network Service (NS)
This layer transfers BSSGP PDUs. The NS is based on the frame relay
connection between the BSS and the SGSN. It provides multi-hop
function and transverses the network having frame relay switching
nodes. The GSM08.16 provides the specifications of the NS.
9. Radio Link Control (RLC)/Media Access Control (MAC)
This layer provides two functions:
Radio link control: It provides a reliable link which is independent from
the wireless solution.
Media access control: It defines and allocates the GPRS logical
channels for air interface, enabling these channels to be shared by
different MSs. Besides controlling the radio channels used for signaling
transfer, the MAC maps the LLC frames to GSM physical channels. The
GSM04.60 provides specifications of the LLC.

68

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

10. GSM RF
The physical layer of the Um interface is the RF interface part. The
logical link layer provides various logical channels for air interfaces.
The carrier bandwidth of the GSM air interface is 200 kHz. A carrier is
divided into eight physical channels. If all of the eight physical
channels are assigned to transmit GPRS data, the original data rate
can reach 200 kbit/s. With the overhead of forward error correction
codes considered, the final data rate can reach 164 kbit/s.

GPRS Signaling Protocol Platform


The signaling platform describes the hierarchical structure of signaling
transmission. It is composed of the protocols controlling and supporting
the transmission platform. There are seven kinds of signaling platforms
according to its application.
1. MS-SGSN
Figure 37 shows the signaling platform MS-SGSN. The GMM/SM refers
to GPRS mobility management and session management. The MSSGSN supports mobility management, such as GPRS service
connection/disconnection, security, routing area update, location
update, PDP environment activation, and PDP environment
deactivation.

FIGURE 37 MS-SGSN
GMM/
SM

GMM/
SM
LLC

LLC

Relay

RLC

RLC

BSSGP

BSSGP

MAC

MAC

NS

NS

RF

L1bis

RF
MS

Um

BSS

Gb

L1bis
SGSN

2. SGSN-HLR
Figure 38 shows the signaling platform SGSN-HLR. Here, MAP refers to
Mobile Application Part. This protocol supports the signaling exchange
with the HLR.

Confidential and Proprietary Information of ZTE CORPORATION

69

2G Mobile Communications Technology Fundamentals

FIGURE 38 SGSN-HLR

MAP

MAP

TCAP

TCAP

SCCP

SCCP

MTP3

MTP3

MTP2

MTP2

L1
SGSN

L1

Gr

HLR

3. SGSN-MSC/VLR
Figure 39 shows the signaling platform SGSN-MSC/VLR. The BSSAP+
refers to Base Station System Application+, which is a subset of the
BSSAP and supports the signaling exchange between the SGSN and
the MSC/VLR.

FIGURE 39 SGSN-MSC/VLR

BSSAP+

BSSAP+

SCCP

SCCP

MTP3

MTP3

MTP2

MTP2

L1
SGSN

L1

Gs

MSC/VLR

4. SGSN-EIR
Figure 40 shows the signaling platform SGSN-EIR. The MAP supports
the signaling exchange between the SGSN and the EIR.

FIGURE 40 SGSN-EIR

MAP

MAP

TCAP

TCAP

SCCP
MTP3

SCCP
MTP3

MTP2

MTP2

L1
SGSN

Gf

5. SGSN-SMS-GMSC or SMS-IWMSC

70

Confidential and Proprietary Information of ZTE CORPORATION

L1
EI R

Chapter 3 - GPRS Technology

The signaling platform as shown in Figure 41 indicates that the MAP


supports the signaling exchange between the SGSN and the SMSGMSC or SMS-IWMSC.

FIGURE 41 SGSN-SMS-GMSC OR SMS-IWMSC

MAP

MAP

TCAP

TCAP

SCCP

SCCP

MTP3

MTP3

MTP2

MTP2

L1
SGSN

Gd

L1
SMS-GMSC

6. GSN-GSN
As Figure 42 shows, GTP stands for GPRS Tunnel Protocol. In GPRS
backbone network, the GTP tunnel is used to transfer subscriber data
and signaling information between the SGSN and GGSN or between
two SGSNs. The UDP is used to transfer the signaling information
between two GSNs.

FIGURE 42 GSN-GSN

GTP

GTP

UDP

UDP

IP

IP

L2

L2

L1
GSN

Gn

L1
GSN

7. GGSN-HLR
When signaling path is optional, a GGSN is allowed to exchange
signaling information with an HLR. Normally, there are two types of
signaling paths:
GGSN-HLR signaling based on MAP
If the GGSN has an SS7 interface, MAP can be used between the GGSN
and the HLR. Figure 43 shows that the MAP supports the signaling
exchange of the HLR.

Confidential and Proprietary Information of ZTE CORPORATION

71

2G Mobile Communications Technology Fundamentals

F I G U R E 4 3 G G S N - H L R B A S E D O N M AP

MAP

MAP

TCAP

TCAP

SCCP
MTP3

SCCP
MTP3

MTP2

MTP2

L1

L1
HLR

Gc

GGSN

GGSN-HLR signaling based on GTP and MAP


If the GGSN has no SS7 interface, any GSN with an SS7 interface in
the same PLMN can serve as a GTP-MAP protocol translator. Thus, in
the GPRS backbone network, signaling information can be transferred
between the GGSN and the GSN with protocol translation function
through tunnel. The Interworking in Figure 44 provides the
interworking between the GTP and MAP, enabling the signaling
exchange between the GGSN and the HLR.

F I G U R E 4 4 G G S N - H L R B A S E D O N G T P A N D M AP
Interworking

GTP
UDP
IP
L2
L1
GGSN

MAP
TCAP
SCCP
MTP2
MTP2
L1

GTP

Gn

UDP
L2
L2
L1
GSN

MAP
TCAP
SCCP
MTP3
MTP2
Gc

L1
HLR

Frame Structure and Radio


Channels
Radio Frame Structure
Compared with the 26-multiframe and 51-multiframe structure, the GPRS
introduces the multiframe structure with 52 TDMA frames. The mapping of
the logical channels on packet data channels (PDCHs) is based on such a
multiframe structure. Figure 45 shows the multiframe structure.

72

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

FIGURE 45 52-MULTIFRAME STRUCTURE


52-multiframe

B
0

B
1

B
2

B0-B11:BLOCK

B
3

B
4

B
5

B
6

B
7

T: Frame used for PTCCH

B8 T

B9

B10 B11

I: Idle frame

The multiframe of the PDCH contains 12 blocks (each block is composed of


4 consecutive TDMA frames), 2 idle frames, and 2 TDMA frames used for
Packet Timing advanced Control Channel (PTCCH). There are 52 TDMA
frames all together.
In the GPRS, except the packet random access channel (PRACH) and
PTCCH/U, the basic unit of other packet logical channels is block.
In a 52-multiframe, the sequence of the 12 blocks is B0, B6, B3, B9, B1,
B7, B4, B10, B2, B8, B5, B11.

Physical Channel
Because the basic design approach of GPRS is to maintain its compatibility
with GSM as much as possible, the GPRS inherits the frequency band use
mode and wireless transmission mode of the GSM. The former refers to
the TDMA under FDMA, and the latter refers to the basic transmission unit
on the radio path, which is the burst pulse lasting for 15/26 ms
(equivalent to about 156.25 modulation bits).
Same as the GSM, the GPRS system divides a carrier into eight timeslots,
which constitute eight basic time division channels. Therefore, a physical
channel can be uniquely determined by a TDMA frame sequence, a
timeslot No. (module 8), and a definite hopping sequence. Because GPRS
is designed to coexist with the GSM voice transmission, some physical
channels in a GSM cell supporting GPRS may transfer voice, and other
physical channels may transfer GPRS packet data. In addition, some GPRS
signaling flows, such as packet system message broadcasting, packet
access and resource allocation, are conducted on CS channels.

Logical Channel
All the packet logical channels are mapped to a dedicated packet data
channel (PDCH). The packet logical channels can be divided into the
following categories:

Confidential and Proprietary Information of ZTE CORPORATION

73

2G Mobile Communications Technology Fundamentals

TABLE 7 PACKET LOGICAL CHANNELS

Packet random access channel (PRACH, uplink)


Packet common control channel
(PCCCH)

Packet paging channel (PPCH, downlink)


Packet access grant channel (PAGCH, downlink)
Packet notice channel (PNCH, downlink)

Packet
broadcast
control
channel (PBCCH, downlink)
Packet data transport channel (PDTCH: PDTCH/U and
PDTCH/D)

Packet transport channel

Packet associated control channel (PACCH)


Packet
channel

dedicated

control

Packet timing
(PTCCH/U)
Packet timing
(PTCCH/D)

advanced
advanced

control
control

uplink

channel

downlink

channel

Here:
1. Packet common control channels (PCCCHs)
The PRACH delivers packet access burst pulse and extended access
burst pulse. The MS sends data or paging response to the BSS through
the PRACH.
The PPCH can send paging messages for CS services and GPRS
services. However, the paging of CS services is applicable to type-A
and type-B MSs. The PPCH also uses paging group and can support
DRX.
Before the MS sends packets, the PAGCH allocates one or several
PDTCHs to the MS for packet transmission. If the MS is transmitting
packets, the resources allocated can be transferred in the PACCH.
The PNCH notifies the MS of the PTM-M call. The DRX mode must be
configured to monitor the PNCH.
2. Packet broadcast control channel (PBCCH)
The PBCCH broadcasts packet data system messages. The parameters
carried in these messages determine the mapping of the channels on
multiframes. If no PBCCH is allocated, the BCCH can transfer these
messages. The BCCH will give definite indication, showing whether the
cell supports packet data service. If the cell supports packet data
service, and PBCCH is assigned, the PBCCH combination configuration
information will be given.
3. Packet transport channel
Under the packet switching mode, the PDTCH bears subscriber data. It
is allocated temporarily to a specific MS or a group of MSs (under the
PTM-M mode). Under multi-slot mode, an MS can use several PDTCHs
concurrently. Because different logical channels can be multiplexed on
a physical channel, a PDTCH can bear 0 to 21.4 kbit/s pure data rate
(including RLC header). Different from the CS service, all the PDTCHs
are unidirectional. The MS uses the PDTCH/U to send packet data to

74

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

the network and uses the PDTCH/D to receive packet data from the
network.
4. Packet dedicated control channels
The PACCH transmits signaling information, such as acknowledge
message and power control message. In addition, it also carries
resources allocation and re-allocation information, which is used for
allocating PDTCH capacity or adding PACCH in the future. The MS
transmitting packets can enter the circuit switching mode through
PACCH paging. The PACCH is dynamically allocated to the physical
channel with PDTCH. It is a bi-directional channel.
The PTCCH/U transmits random access burst and estimates the time
advance of the MS in the packet transmission mode.
The PTCCH/D amends the time advance of several MSs. A PTCCH/D
corresponds to several PTCCH/Us.

Channel Combination
There are three new logical channel combinations for the GPRS.
PBCCH + PCCCH + PDTCH + PACCH + PTCCH
PCCCH + PDTCH + PACCH + PTCCH
PDTCH + PACCH + PTCCH
Here, PCCCH = PPCH + PRACH + PAGCH + PNCH.
Different logical channels may appear on the same PDCH. The PDCH is
shared by block. In other words, the type of logical channel, to which each
block belongs, on a PDCH may change one by one. The message type ID
contained in the head of each block identifies the channel type (except for
the PRACH).

Mapping Between Logical Channels and


Physical Channel
Mapping of Uplink Channel
1. Mapping of PDTCH/U and PACCH/U
For each PDCH allocated to the MS, the MS will be allocated with an
Uplink State Flag (USF). The network uses the USF to control the
multiplexing of radio blocks of different MSs in the uplink PDCH. The
US controls the use of the timeslot. It is used in the dynamic and
extended dynamic medium access modes. The three-bit USF is located
in the header of each downlink radio block, and can form eight states
for uplink transmission multiplexing. In the PCCCH, one USF value
marks the PRACH (USF = idle), and other values are reserved for
seven different MSs (USF = R1/R2 R7). When a PDCH is not the
PCCCH, the eight USF values are all used to reserve uplinks for eight
different MSs. When an MS without the USF is using the uplink, a USF

Confidential and Proprietary Information of ZTE CORPORATION

75

2G Mobile Communications Technology Fundamentals

value can prevent conflict of uplink channels. The USF is directed to


the next uplink radio block.
When an MS finds its own USF in the header of a BX (Bx = B0B11)
downlink block of a PDCH, the MS can use BX+1 (X!= 11) or B0 (when
X=11) uplink blocks on this PDCH. If the network permits, the MS can
also use three consecutive blocks (four blocks in total).
The PACCH/U corresponding to the PDTCH/D can be determined by the
network in the polling mode.
2. Mapping of the PTCCH/U
When an MS is allocated a PDTCH from a PDCH, the PTCCH/U must
also be allocated from that PDCH. The cycle of the PTCCH/U is eight
52-multiframes, including 16 PTCCH/Us (0 to 15). The PTCCH/U subchannel No. of each MS is determined by the time advance index (TAI)
obtained by the MS in resource allocation. See Figure 46.

76

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

FIGURE 46 MAPPING OF PTCCH ON PHYSICAL CHANNEL


52-multiframe number n:

TAI=0
TAI=1

uplink
B0

B1

B2

B3

B4

B2

B3

B4

B1

B2

B3

B4

B2

12

B3

B4

B2

16

B3

B4

B1

B2

20

B3

B4

B2

24

B1

B5

B3

B4

B5

TA-message 4

B2

28

B6

B7

B9

B10

B11

B8

10

B9

B10

B11

11

B10

B11

15

B10

B11 19

B10

B11

23

B10

B11

27

B10

B11

31

TA-message

13

B6

B7

B8

14

B9

TA-message

17

B6

B7

B8

18

B9

TA-message

21

B6

B7

B8

22

B9

TA-message

25

B6

B7

B8

26

B9

TA-message

4
TAI=14
TAI=15

uplink

downlink

B8

TAI=12
TAI=13

52-multiframe number n+7:

B0

TA-message

uplink
B1

B5

TA-message 3

downlink

B11

TAI=10
TAI=11

52-multiframe number n+6:

B0

B7

uplink

downlink

B10

TAI=8
TAI=9

52-multiframe number n+5:

B0

B5

TA-message 3

downlink

B6

uplink
B1

B9

TAI=6
TAI=7

52-multiframe number n+4:

B0

B5

TA-message 2

downlink

TA-message

uplink
B1

TA-message 2

52-multiframe number n+3:

B0

B8

TAI=4
TAI=5

uplink

downlink

B7

52-multiframe number n+2:

B0

B5

TA-message 1

downlink

B6

TAI=2
TAI=3

uplink
B1

1
1

52-multiframe number n+1:

B0

B5

TA-message 1

downlink

B3

B4

TA-message 4

B5

29
4

B6

B7

B8

30

B9

TA-message

B0~B11=Radio blocks
Idle frames are numbered from 1 to 31 [odd numbers]
PTCCH frames are numbered from 0 to 30 [even numbers]

3. Uplink PCCCH: mapping of PRACH


As described above, on the PDCH with PCCCH, if the USF is idle, the
corresponding downlink block is the PRACH. The PRACH can be
mapped in a fixed manner. The number of PRACH blocks fixedly
allocated on a PCCCH is determined by the system broadcast
parameter BS_PRACH_BLKS. Its relationship with the specific blocks is
determined by the block sequence described above.

Confidential and Proprietary Information of ZTE CORPORATION

77

2G Mobile Communications Technology Fundamentals

Mapping of Downlink Channel


1. Mapping of PDTCH/D and PACCH/D
The MS interprets every downlink block on the allocated PDCH and
determines whether the block is its PDTCH/D and PACCH/D according
to the TFI.
The TBF is a physical connection used by two RR entities to transmit
LLC PDU in a unidirectional manner on the packet data radio channel.
This parameter is used in the LLC frame transmission sequence of the
same timeslot in the same cell to replace the MS identification in the
RLC/MAC layer. It is the radio resource assigned to one or multiple
PDCHs. It transmits RLC/MAC blocks carrying one or multiple LLC PDUs.
The TBF is temporary and only kept in data transmission (the TBF is
kept until there is no RLC/MAC block to transmit, or all the RLC/MAC
blocks are received successfully by the receiver under the RLC
acknowledgement mode).
For each TBF, the network allocates a TFI. For concurrent TBFs in each
direction, the TFI allocated is unique. It is used to replace the MS
identifier in the RLC/MAC layer. The same TFI can be used in different
directions. The TFI is assigned in the resource allocation message
before the transmission of the LLC frame.
The RLC/MAC block related to a specific TBF must contain a TFI. For a
RLC data block, the TBF is jointly identified by the TFI and the
transmission direction of the data block. For a RLC/MAC control
message, there are transmission direction and message type in
addition to the TFI. If the header of a downlink control block contains a
TFI, the TFI identifies to which MS the control message is sent;
otherwise, all MSs will receive this message. If the TFI in the header is
inconsistent with that in the message, the MS accepts the TFI in the
header.
2. Mapping of the PBCCH and transmission of the packet system message
In a cell, the PBCCH is mapped to one PDCH only. The specific location
is broadcast by the BCCH. In a 52-multiframe, the PBCCH is mapped
to BS_PBCCH_BLKS (whereBS_PBCCH_BLKS<4) blocks. The
specific blocks are determined by the block sequence described above.
In the packet idle mode, the MS listens to the system messages on the
BCCH and learns whether the cell supports GPRS and whether PBCCH
is configured from SI3, SI4, SI7 and SI8. If there is the PBCCH, the
MS leaves the BCCH to listen to the system messages PSIs 1 3 or
other PSI on the PBCCH. The BSC determines the time and the type of
messages to be sent.
The system parameter PSI1_REPEAT_PERIOD determines the position
where the PSI1 is sent. In addition, except PSI 1, other PSIs are
divided into two groups. One group is sent at a high repetition rate,
while the other is sent at a low repetition rate. The parameter
PSI_COUNT_HR indicates the number of PSIs sent at a high repetition
rate, and PSI_COUNT_LR indicates the number of PSIs sent at a low
repetition rate.
The system sends PSIs according to the following rules:

78

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

i.

PSI 1 is sent on BLOCK B0 when TC is 0. (TC = (FN DIV 52) mod


PSI1_REPEAT_PERIOD)

ii. When BS_PBCCH_BLKS is higher than 1, PSI 1 is also sent on


BLOCK B6 with TC of 0.
iii. The PSIs in the group sent at a high frequency are sent in the
sequence determined by the network. The sequence starts when TC
is 0; that is, the sending cycle of PSIs in this group is
PSI1_REPEAT_PERIOD*52 frame. When the PSIs in this group are
sent, the PBCCH BLOCKs, which are not occupied by PSIs specified
by rules (1) and (2), will be used.
iv. The PSIs sent in the group sent at a low frequency are sent in the
sequence determined by the network, and sent repeatedly. When
the PSIs in this group are sent, the PBCCH BLOCKs, which are not
occupied by PSIs specified by rules (1), (2) and (3), will be used.
3. Mapping of downlink PCCCH
The mapping of the downlink PCCCH on a PDCH can be described by
the following four rules:
i.

If the PDCH has a PBCCH, BS_PBCCH_BLKS blocks are used in the


PBCCH.

ii. In the remaining blocks, BS_PAG_BLKS_RES blocks cannot be used


in the PPCH; they can be used in the PAGCH, PNCH, PDTCH and
PACCH only.
iii. The remaining blocks can be used in the PPCH, PAGCH, PNCH,
PDTCH and PACCH.
iv. When the PBCCH is on timeslot k, the PCCCH can be located on
timeslot n only, and n must be greater than k-4 and smaller than
or equal to 7 (k-4 < n 7).
For example, for a PDCH with both PBCCH and PCCCH, when
BS_PBCCH_BLKS is 2 and BS_PAG_BLKS_RES is 5, the following
can be known according to the block sequence (B0, B6, B3, B9, B1,
B7, B4, B10, B2, B8, B5, B11):
The PBCCHs are located on B0 and B6.
The PPCH can be located on B10, B2, B8, B5, and B11 only.
The PAGCH, PNCH, PDTCH, and PACCH can be located on B3, B9,
B1, B7, B4, B10, B2, B8, B5, and B11.

Key Technologies of GPRS


Implementation of QoS
The GPRS provides subscribers five negotiable QoS attributes:
Peak throughput class
Mean throughput class

Confidential and Proprietary Information of ZTE CORPORATION

79

2G Mobile Communications Technology Fundamentals

Reliability class
Delay class
Precedence class
Each attribute comprises multiple level options, and the combination of
the attributes of different levels constitutes the support of various
applications requiring different QoS. The GPRS standard defines may
QoS combinations, however, the GPRS only supports some QoS
configuration currently.
The GPRS QoS profile is related with each Packet Data Protocol (PDP)
context. Treated as a single parameter, the QoS profile features
multiple data transfer attributes.
During the negotiation of QoS profile, the MS can apply a value for
each QoS attribute, including the default value of the subscriber profile
saved in the HLR. The network also negotiates a level for each
attribute to match the valid GPRS resources, thus, proper resources
can be provided to support the QoS profile negotiated.

Media Access Control (MAC) Layer


The MAC layer enables several MSs to share the same transmission media
and connect with the physical layer directly.
On the uplink (for example, an MS starts to access the network), when
several MSs apply for access at the same time, the limited physical
resource need be managed properly. The reservation protocol of the
contention mechanism between different MSs is based on the time division
ALOHA protocol. In addition, because the radio channel resources for an
MS are also limited, some services are competitive. The coordination
function provided by the MAC layer can solve the problems caused by the
competition.
On the downlink (for example, the MS), the MAC layer has the access
requests queue and makes an access time table. For the downlink, the
contention mechanism is unnecessary because there is only one transmit
end in the downlink direction.
The MAC layer also assigns the data to be sent with different priority and
transmits the data according to the priority. The signaling data has higher
priority than subscriber data. After combined, the signaling and subscriber
data are sent through the transmission media. The MAC layer enables
several MSs to share the same transmission medium. The transmission
medium can be a physical channel or several physical channels. In TDMA,
physical channels are TDMA timeslots.
When several physical channels serve as transmission media, the MS
sends data concurrently. It can increase the data transmission capacity
between MSs and network. See the example as shown in Figure 47. Two
mobile subscribers are transmitting data. Timeslots 5 and 6 are used as
the common transmission media. The MAC layer at the network side
makes the transmission time table for the MSs. Thus, subscriber A can
send data on a TDMA frame, and subscriber B can send data on the next

80

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

TDMA frame. This standard enables the network to arrange eight MSs to
share a transmission medium at the same time.

F I G U R E 4 7 M AC L A Y E R T R A N S M I S S I O N

Frame

Physical
channel

Time

MS A

Transmission
medium

MS B

Radio Block Structure


The GPRS radio block is composed of MAC header and RLC data block or
RLC control block. The GPRS assigns different types of RLC/MAC block
structures to transfer data and control information, as shown in Figure 48.

FIGURE 48 STRUCTURE OF A RADIO BLOCK

PL PDU

MAC header

RLC header

RLC data unit

Idle

RLC data block

MAC header

RLC/MAC control message


RLC/MAC control block

The RLC/MAC block that transfers data contains the MAC header and RLC
data block.
The RLC data block contains a RLC header, a RLC data unit, and a
reserved part (in the current technical specifications, that part is set to 0
at the transmit end and neglected at the receive end). The RLC data unit
contains one or several LLC PDUs. The RLC/MAC block containing the RLC

Confidential and Proprietary Information of ZTE CORPORATION

81

2G Mobile Communications Technology Fundamentals

data block can be coded using the channel coding schemes CS1, CS2, CS3,
and CS4. When CS1 is adopted, the RLC/MAC block does not contain the
reserved part.
The RLC/MAC control block is composed of the control message content
field and the control header, which is optional in downlink. The RLC/MAC
control message is transferred in the RLC/MAC control block. The RLC/MAC
control block must use CS1.
Reduced Block Serial Number (RBSN)
Made up of one bit, the RBSN carries the serial number of the downlink
RLC/MAC control block.
Radio Transaction Identifier (RTI) domain
Made up of five bits, the RTI groups and identifies the downlink
RLC/MAC control blocks. The value range is 0 to 31. These control
blocks form a complete RLC/MAC control message.
Final Segment (FS)
Made up of one bit, the FS indicates whether the downlink
control block contains a final segment of a RLC/MAC control
If the FS is 0, the downlink RLC/MAC does not contain
segment of a RLC/MAC control message. If it is 1, the
RLC/MAC contains the final segment.

RLC/MAC
message.
the final
downlink

Address Control (AC)


Made up of one bit, the AC indicates whether the header of the
downlink RLC/MAC control block contains the optional TFI/D field. "0"
indicates the TFI/D field is contained, and "1" not.
Direction (D) bit
Made up of one bit, the D bit indicates the TBF direction. The TBF is
identified by the TFI field in the downlink RLC/MAC control header. If D
bit is 0, the TBF identified by the TFI is uplink. If it is 1, the TBF is
downlink.

Channel Coding
The GPRS defines four coding modes on the PDTCH: CS-1 to CS-4. Except
for PRACH and PTCCH/U, other packet control channels adopt CS-1. For
the packet access pulse on PRACH and PTCCH/U, there are 8-bit and 11bit coding modes. Figure 49 and Figure 50 shows the coding procedure of
four different coding modes.

82

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

FIGURE 49 CODING PROCEDURE OF CS-1 TO CS-3

Radio block
USF

BCS
rate 1/2 convolutional
coding

puncturing

456bits

FIGURE 50 CODING PROCEDURE OF CS-4

Radio block
USF
block
code

BCS
no coding

456bits

The coding procedure is as follows:


1. Add a Block Check Sequence (BCS) to the end of the radio block for
error detection.
2. Perform pre-coding of the USF (for CS-1, CS-2, and CS-3 only), add
four tail bits, and perform half-rate convolutional coding for error
correction.
3. Punch to obtain the desired coding rate.
Error-correction coding is not performed in CS-4.

Confidential and Proprietary Information of ZTE CORPORATION

83

2G Mobile Communications Technology Fundamentals

Table 8 describes the specific coding process of the four channel coding
modes.

TABLE 8 CHANNEL CODING PROCESS OF PDTCH

Type
Procedure
Length
of
data source

CS1

CS2

CS3

CS4

184 bits

271 bits

315 bits

413 bits

(1) Fire coding.


The
multinomial
generated is:

(1)
Packet
coding.
The
multinomial
generated is:

(1)
Packet
coding.
The
multinomial
generated is:

(1) Packet coding.


The
multinomial
generated is:

23

Packet
coding

Convolutiona
l coding

17

(D +1)(D +D
+1). The BCS
added is 40
bits.
(2) Add four tail
bits. The coding
data length is
228 bits.

16

12

+D +D +1.
D
The added BCS
is 16 bits.
(2)
USF
preprocessing.
See Table 9.

12

D +D +D +
1.
(2) The USF
preprocessing
is the same as
CS2.

(3) Add four tail


bits. The coding
data length is
294 bits.

(3) Add tail


bits.
The
coding
data
length is 338
bits.

(1)
Convolutional
coding with a
1/2 code rate.
The
multinomial
generated is:

(1) Convolutional
coding with a 1/2
code rate. The
multinomial
generated is:

G0=1+D3+D4,G
1=1+D+D3+D4

(2) Reduce 132


bits by punching.
The position of
punching:

(1)
Convolutional
coding with a
1/2 code rate.
The
multinomial
generated is:
G0=1+D3+D4,
G1=1+D+D3+
D4

(2)
punching.

No

G0=1+D3+D4,G1
=1+D+D3+D4

C
(3+4xk),
k=3, , 146 and
k9, 21, 33, 45,
57, 69, 81, 93,
105, 117, 129,
141

84

16

Confidential and Proprietary Information of ZTE CORPORATION

(2) Position of
punching:
C(3+6
and

k)

C
(5+6xk)
k=2, 3, ,
111

D16+D12+D5+1.
(2)
USF
preprocessing. See
Table 10.
(3) Add tail bits.
The coding data
length is 456 bits.

None

Chapter 3 - GPRS Technology

Table 9 shows the difference between the four coding modes.

TABLE 9 GPRS CHANNEL CODING

Coding
scheme

Code
Rate

Size of RLC/MAC Data


Block (bytes)

Maximum Throughput of
RLC/MAC (kbps)

CS-1

1/2

20

CS-2

2/3

30

12

CS-3

3/4

36

14.4

CS-4

50

20

CS1 has powerful error correction capability and tolerates a certain bit
error ratio. Therefore, it has low requirements for the wireless
environment. However, its throughput is the smallest. The higher the
level of a coding scheme (CS4 is of the highest level), the poor the
error correction capability and the higher the throughput will be.
Table 10 describes the coding and interleaving procedure of various
packet logical channels.

TABLE 10 CODING AND INTERLEAVING OF PACKET LOGICAL CHANNELS

Input
Channel Rate
Type
(kbit/
s)

Input Code
Code
Tail Convolutional
Block Check USF
Bit
(bits)
Precoding Bit Code Rate

Output
Interleaving
Code
Block
Depth
(bits)

184

Packet
coding,
40

1/2

456

On four NB
bursts

271

Packet
Adding
coding,
three bits
16

1/2

456

On four NB
bursts

Parity 6

1/2

36

Combine on
one AB burst

11

Parity 6

1/2, perforate
reduction code 36
6 bits

Combine on
one AB burst

PTCCH/U

184

Packet,
40

1/2

456

On
four
inconsecutive
bursts

PPCH,
PAGCH,
PNCH,
PBCCH,
PACCH

184

Packet
coding,
40

1/2

456

On
four
consecutive
bursts

PDTCH
(CS1)
PDTCH
(CS2)

PARCH
PTCCH/D

Confidential and Proprietary Information of ZTE CORPORATION

85

2G Mobile Communications Technology Fundamentals

Flow Control
The flow control controls the load of the QoS delay queue between the
SGSN and the BSS to optimize the use of the buffer area.
The BSSGP layer of the PCU manages two buffers: one is the buffer for
MSs, and the other is the buffer for the BSSGP Virtual Connection (BVC).
When the PCU receives a LLC packet, its BSSGP protocol layer identifies it
according to the TLLI and places it into the buffer for the MS. Then, the
BSSGP protocol layer uses the BVCI as identifier and places all the related
information into the buffer for that BVC. See Figure 51.

FIGURE 51 BSSGP LAYER BUFFER


LLC
Subscriber data
TLLI
BSSGP

TLLI

BVCI

MS buffer

NSEI
BVC buffer
BVCI =1

BVCI=2
NSEI 1

BVCI=1
NSEI 2

The SGSN can perform flow control on specific MS and cell. The PCU sends
the SGSN a Flow Control BVC/MS message containing the flow control
parameter. Thus, the SGSN knows how to control the throughput to the
PCU and adjusts the BSSGP UNITDATA PDU flow cached from the SGSN to
PCU. In addition, to optimize the BSSGP UNITDATA PDU cached at the PCU,
if the life period of the BSSGP UNITADATA PDU at the PCU expires, and
the BSSGP UNITADATA PDU is not sent out through the radio interface,
the PCU will delete it locally and send a PDU (LLC-DISCARDED PDU)
message to the SGSN.

Cell Selection and Reselection


The cell selection and reselection of the GPRS are independent from those
of the GSM. The GPRS system has no the concept of handover. The GPRS
MSs perform cell reselection no matter whether they are under packet
transmission mode or packet idle mode.
If the service area of the MS has no PBCCH, the MS will listen to the
system message broadcast by the BCCH and performs cell reselection
according to the C1 and C2 rules under the idle mode of circuit switching.

86

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

1. Cell Selection
When an MS is powered on or moves from the dead zone to the
coverage, it searches all the frequencies permitted by the PLMN and
selects the best cell to stay. This process is called cell selection.
The GPRS cell selection algorithm is the same as that of the GSM.
Before the GPRS dedicated channel is assigned, the GPRS MS uses the
GSM signaling resources.
During the cell selection process, the MS searches the 124 RF channels
(The dual-band MS will search 374 GSM1800 RF channels, too), reads
the strength of the signal received on each RF channel, and calculates
the average level. The whole measurement process lasts three to five
seconds. During this period, at least five measurement samples are
extracted from different RF channels.
Then, the MS tunes to the carrier with maximum incoming level and
judges whether that harmonic wave is a BCCH carrier (by searching
FCCH burst pulse). If yes, the MS tries to decode the SCH to
synchronize with that carrier and read the system message broadcast
on the BCCH. If the MS decodes the BCCH data correctly, and verifies
that the cell belongs to the PLMN selected, parameter C1 is greater
than 0, and the cell is not prohibited from accessing, the MS can select
that cell. Otherwise, the MS tunes to the next most signification carrier
till it finds the cell available.
If the MS finds a cell available, it will listen to the system messages
type 1 to type 4 and SI13 (in the case of GPRS cell) on the BCCH of
that cell, and decodes all the information. After that, the MS stays in
that cell.
2. Cell reselection
In GPRS, the cell reselection can be controlled by the network or
performed by the MS automatically. Compared with the cell reselection
automatically performed by the MS, the cell reselection controlled by
the network can fully utilize each cell load, status, level and other
information obtained by the network. Reasonable reselection decision
can be made with flexible control strategy, implementing optimized
allocation of inter-network services.
The network-controlled cell reselection module consists of two layers,
which are respectively on the BRP and Pn. The BRP stores and
equalizes the packet measurement report submitted by the MS and
decides whether to perform cell re-selection according to certain
criteria (pre-decision). When cell reselection is required, BRP informs
Pn of the decision parameters related to the service cell and each
candidate cell in the cell reselection request message. After receiving
the cell reselection request, the Pn, based on the resource and service
load statuses of each adjacent cell, selects the target cell and notifies
the BRP. Finally, the BRP sends the cell reselection command to the MS
to complete the whole cell reselection process. Besides, other modules,
for example, the power control module can request the cell reselection
from the network-controlled cell reselection module when the power
control fails.
Figure 52 shows the network-controlled cell reselection process.

Confidential and Proprietary Information of ZTE CORPORATION

87

2G Mobile Communications Technology Fundamentals

FIGURE 52 NETWORK-CONTROLLED CELL RESELECTION PROCESS

Save measurement report

Perform weighted average of


measurement report

Make predecision of cell


reselection

Make cell reselection decision

Send cell reselection


command

i.

Save measurement report.


Find the instance according to TLLI carried in the packet
measurement report, and respectively store the level value of the
service cell and adjacent cell in the instance data area. The
measurement reports of at most eight adjacent cells are stored in
the instance.

ii. Perform weighted average of measurement report.


To avoid frequent cell reselection, the cell re-reselection module
makes cell re-selection pre-decision after performing weighted
average of the measurement reports submitted recently. Since the
submitting period of the packet measurement report is relatively
long and unstable, different weighted values are employed for the
measurement reports submitted in different time. The level
weighted average values of the service cell and adjacent cell are
calculated respectively.
iii. Make pre-decision of cell reselection
The network-controlled cell reselection pre-decision algorithm uses
three parameters: path loss parameter C1, hierarchical cell
structure signal level threshold criteria parameter C31, and cell
sequencing criteria parameter C32. The cell reselection is triggered
when C1 is smaller than 0. C31 and C32 are used to select the
optimal cell, and the last selection is not made here in the predecision. When it is necessary to perform cell reselection according
to the cell reselection pre-decision algorithm, the BRP informs the
Pn of C31 and C32 of these adjacent cells in the cell reselection
request message.
The pre-decision algorithm is as follows:
Service cell C1<0.

88

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

If the estimated value of a non-service cell is better than the


service cell, it is the optimal cell. The optimal cell is the cell with
the highest C32 in the following cells:
C31 0, the highest LSA priority is available, and PRIORITY_CLASS
is the highest;
If no cell can satisfy C31 0, the optimal cell is that with the
highest C32 value among all cells.
These two algorithms are optional.
iv. Make cell reselection decision.
After receiving the cell reselection request message from the BRP,
the Pn makes the cell reselection decision and selects the target
cell. The Pn queries the resource and service load statuses of the
strongest adjacent cells, respectively takes different weighted
values together with the level values, selects the best cell, and
sends the cell reselection indication to the BRP. Meanwhile, it sends
the cell reselection indication to the BRP where the target cell is
located. Thus, after the cell reselection of the MS, the new cell can
perform cell reselection control over it rapidly.
v. Send cell reselection command.
After receiving the cell reselection indication, the BRP sends the cell
reselection command to the MS. Under the packet idle status, if
PCCCH is configured, the cell reselection command is sent to the
MS on PCCCH. If there is no PCCCH, a downlink block is assigned
on CCCH via the immediate assignment message. The cell
reselection command is sent in the downlink block assigned. Under
the packet transmission status, the cell reselection command is
sent to the MS on PACCH.

Power Control
Because there is no continuous bi-directional connection in the GPRS
system, the power control in the packet connection is even more
complicated than that in circuit connection. The main difference is that the
power control of circuit-switched service is channel-oriented, while that of
packet-switched service is radio-block-oriented. The four bursts in this
radio block must be sent with the same power.
According to the object controlled, the power control falls into uplink
power control and downlink power control. The uplink power control
controls the transmit power of the MS, and the downlink power control
controls the transmit power of the BTS.
1. Uplink power control
In the case of uplink power control, the BSS performs power control
over the MS by assigning relevant parameters to MS. According to the
power control modes, the uplink power control is further classified into
open loop power control and closed loop power control.

Confidential and Proprietary Information of ZTE CORPORATION

89

2G Mobile Communications Technology Fundamentals

Uplink open loop power control


The MS determines the output power based on the power of the
downlink signal received, and assumes that the uplink and downlink
have the same path loss.
In the packet idle mode, the BTS measures the interference signal
level of the candidate PDCHs, calculates the carrier-to-interference
ratio, obtains the power control parameter, and sends it to the MS
when the MS enters the packet transmission mode.
In the packet transmission mode, the BTS measures the power of each
RLC block on the PDCH being used, and performs the even filtering of
the obtained power values to obtain the new uplink power control
parameter. When necessary, for example, the interference level
changes, the BTS notifies the MS to adjust the transmit power.
Uplink closed loop power control
The BTS measures the received signals. The network, based on the
measured value, controls the MS output power. The MS transmits
according to the transmit power specified by the network.
To ensure transmission quality, in the initial resource assignment, the
MS can send the uplink block at the maximum power. Then, the BTS
measures the uplink signal level or quality, and adjusts the uplink
transmit power of the MS on a real time basis according to the signal
level or quality, or carrier-to-interference ratio.
In this system, the power control is performed according to the carrierto-interference ratio. That is, the BTS measures the power for each
uplink data block on PDCH in use. According to the idle blocks or
usable blocks, it respectively counts the interference power and carrier
power in the filter calculation, and obtains the carrier-to-interference
ratio. Based on the carrier-to-interference ratio calculated, the BTS
calculates the current power adjustment amount and obtains the latest
transmit power according to the "fast rise and slow decrease" principle
and the previous uplink transmit power. The BTS sends the latest
transmit power calculated to the MS, and the MS updates its output
power.
For the MS with multi-timeslot capability, the BTS calculates the
receiving powers and interference powers of different timeslots
respectively. After comparing them, the MS selects the channel with
the lowest carrier-to-interference ratio as the basis to adjust power.
2. Downlink power control
The downlink power control controls the BTS transmit power.
For the PDCH containing PBCCH and PCCCH, the constant transmit
power must be adopted.
There are two downlink power control modes based on the channel
quality report, namely, power control mode A and power control mode
B. Power control mode A is applicable to the various resource allocation
modes. Power control mode B is only applicable to the fixed allocation
mode. This system adopts power control mode A.
The power control mode A calculates the power change amplitude of
the radio block on each downlink PDTCH, converts the power change

90

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 - GPRS Technology

amplitude into power control level according to the relation between


them, and sends it to the BTS. The BTS performs the actual power
control. At the same time, set the relevant field in the downlink data
block header according to the power change value.
Same as the uplink closed loop power control, the downlink power
control is performed according to the carrier-to-interference. If
downlink power control is adopted, the MS will periodically submit the
Channel Quality Report (containing the signal level and interference
level) in the downlink response. The BSS calculates the downlink
carrier-to-interference ratio based on it. Based on the previous
downlink transmit power and the "fast rise and slow decrease principle",
the BSS calculates the current power adjustment amount, obtains the
new BTS transmit power, and sends it to the BTS. The BTS performs
power control according to the value received.

Confidential and Proprietary Information of ZTE CORPORATION

91

2G Mobile Communications Technology Fundamentals

This page is intentionally blank.

92

Confidential and Proprietary Information of ZTE CORPORATION

Abbreviations
Abbreviation

Full Name

A
AC

Address Control

AGCH

Access Grant Channel

AUC

Authentication Center

B
BCH

Broadcast Channel

BCCH

Broadcast Control Channel

BSC

Base Station Controller

BSIC

Base Station Identity Code

BSS

Base Station Subsystem

BSSGP

BSS GPRS Protocol

BTS

Base Transceiver Station

BVC

BSSGP Virtual Connection

BVCI

BSSGP Virtual Connection Identifier

C
CBCH

Cell Broadcast Channel

CCCH

Common Control Channel

CEPT

Conference of European Posts and Telecommunications

CGF

Charging Gateway Function

C/I

Carrier-To-Interference Ratio

CM

Connection Management

CS-i

Coding Scheme (GPRS)

E
ECSD

Enhanced Circuit Switched Data

EDGE

Enhanced Data Rates For GSM Evolution

EGPRS

Enhanced GPRS

EIR

Equipment Identity Register

ETSI

European Telecommunications Standards Institute

F
FACCH

Fast Associated Control Channel

Confidential and Proprietary Information of ZTE CORPORATION

93

2G Mobile Communications Technology Fundamentals

Abbreviation

Full Name

FCCH

Frequency Correction Channel

FDMA

Frequency Division Multiple Access

FS

Fianl Slot

G
GGSN

Gateway GPRS Support Node

GMSC

Gateway MSC

GMSK

Gaussian Minimum Shift Keying

GPRS

General Packet Radio Service

GSM

Global System for Mobile Communication

GTP

GPRS Tunnel Protocol

H
HLR

HOME Location Register

HSCSD

High-Speed Circuit Switched Data

I
IMSI

International Mobile Subscriber Identity

IP

Internet Protocol

IR

Incremental Redundancy

ISDN

Integrated Services Digital Network

ISUP
IWF

Interworking Function

L
LA

Link Adaptation

LLC

Logic Link Control

LQC

Link Quality Control

M
MAC

Medium Access Control

MAP

Mobile Application Protocol

MCS

Modulation and Coding Scheme (EDGE)

MGW

Media GateWay

MM

Mobile Management

MS

Mobile Station

MSC

Mobile Switching Center

MTP

Message Transfer Part

94

NSEI

Network Service Entity Identifier

NSS

Network Switching Subsystem

Confidential and Proprietary Information of ZTE CORPORATION

Abbreviations

Abbreviation

Full Name

O
OMS

Operation and Maintenance Subsystem

OSI

Open System Interconnect

P
PACCH

Packet Associated Control CHannel

PAGCH

Packet Access Grant CHannel

PBCCH

Packet Broadcast Control CHannel

PCCCH

Packet Common Control CHannel

PCH

Paging Channel

PCU

Packet Control Units

PDN

Public Data Networks

PDP

Packet Data Protocol

PDTCH

Packet Data Traffic Channel

PLMN

Public Land Mobile Network

PNCH

Packet Notification Channel

PPCH

Packet Paging Channel

PRACH

Packet Random Access Channel

PSTN

Public Switched Telephone Network

PTCCH

Packet Timing advance Control Channel

Q
QoS

Quality of Service

R
RACH

Random Access Channel

RAN

Radio Access Network

RLC

Radio Link Control

RPE-LTP

Regular Pulse Excitation-Long Term Prediction

RRM

Radio Resources Management

S
SACCH

Slow Associated Control Channel

SCCP

Signaling Connection Control Part

SDCCH

Standalone Dedicated Control Channel

SGSN

Serving GPRS Support Node

SIM

Subscriber Identity Module

SMC

Short Message Center

SNDCP

Subnetwork Dependent Convergence Protocol

STP

Signaling Transfer Point

Confidential and Proprietary Information of ZTE CORPORATION

95

2G Mobile Communications Technology Fundamentals

Abbreviation

Full Name

SCH

Synchronization Channel

T
TACS

Total Access Communication System

TAI

Timing Advance Index

TBF

Temporary Block Flow

TCH

Traffic Channel

TDMA

Time Division Multiple Access

TLLI

Temporary Logical Link Identity

TMSI

Temporary Mobile Subscriber Identity

TRAU

Transcoding and Rate Adaptation Unit

U
USF

Uplink State Flag

96

VLR

Visitor Location Register

VPN

Virtual Private Network

8-PSK

8 Phase Shift Keying

Confidential and Proprietary Information of ZTE CORPORATION

Figures
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure

1 Evolution from 2G to 3G .................................................................17


2 GSM Network Structure ..................................................................22
3 Relationship Between Coverage Areas in a GSM Network .....................25
4 GSM Interfaces..............................................................................26
5 GSM Interface Protocol Model ..........................................................27
6 Hierarchical Frame Structure of GSM ................................................29
7 Time-Frequency Structure of Physical Channels ..................................30
8 GSM Logical Channels.....................................................................31
9 Structure of a 51-Frame Channel .....................................................33
10 Structure of a Half-Rate Voice Channel ............................................34
11 Multiplexing of BCCH and CCCH on TS0 ...........................................34
12 Multiplexing of RACH on TS0..........................................................35
13 Multiplexing of SDCCH and SACCH on TS1 (Downlink) .......................35
14 Multiplexing of SDCCH and SACCH on TS1 (Uplink) ...........................36
15 Multiplexing of TCH ......................................................................36
16 Offset Between the Uplink and Downlink of TCH ...............................37
17 Frequency Reuse in the Cellular System ..........................................40
18 Cells in 4/12 Frequency Reuse .......................................................41
19 Cells in 3/9 Frequency Reuse .........................................................41
20 Discontinuous Transmission ...........................................................42
21 Interleaving Technology ................................................................44
22 Interleaving of Code Elements .......................................................46
23 Basic Structure of Frequency Hopping .............................................48
24 Power Control..............................................................................50
25 Power Control Process ..................................................................51
26 Offset Between Uplink and Downlink of TCH .....................................53
27 Location Update Procedure of MS ...................................................54
28 IMSI Detach Procedure .................................................................55
29 Mobile-Originated Call and Called Party On-hook Procedure ................57
30 Mobile-Terminated Call and Calling Party On-hook Procedure..............59
31 Intra-cell Handover Procedure........................................................60
32 Inter-cell Handover Procedure........................................................61
33 Measurement Report Procedure......................................................61
34 Transmit Power Control Procedure ..................................................62
35 GPRS Network Structure ...............................................................65
36 GPRS Transmission Protocol Platform ..............................................67
37 MS-SGSN....................................................................................69
38 SGSN-HLR ..................................................................................70
39 SGSN-MSC/VLR ...........................................................................70
40 SGSN-EIR ...................................................................................70
41 SGSN-SMS-GMSC or SMS-IWMSC ..................................................71
42 GSN-GSN....................................................................................71
43 GGSN-HLR Based on MAP ..............................................................72
44 GGSN-HLR Based on GTP and MAP .................................................72
45 52-Multiframe Structure ................................................................73
46 Mapping of PTCCH on Physical Channel ...........................................77
47 MAC Layer Transmission ...............................................................81
48 Structure of a Radio Block .............................................................81
49 Coding Procedure of CS-1 to CS-3 ..................................................83

Confidential and Proprietary Information of ZTE CORPORATION

97

2G Mobile Communications Technology Fundamentals

Figure 50 Coding Procedure of CS-4..............................................................83


Figure 51 BSSGP Layer Buffer ......................................................................86
Figure 52 Network-Controlled Cell Reselection Process ....................................88

98

Confidential and Proprietary Information of ZTE CORPORATION

Tables
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table

1 Typographical Conventions ................................................................xi


2 Mouse Operation Conventions ............................................................xi
3 Safety Signs................................................................................... xii
4 Coding and Interweaving of Circuit Logical Channels ............................44
5 Full-rate Speech Interleaving Algorithm..............................................46
6 Three Phases of GPRS Standards.......................................................64
7 Packet Logical Channels ...................................................................74
8 Channel Coding Process of PDTCH .....................................................84
9 GPRS Channel Coding ......................................................................85
10 Coding and Interleaving of Packet Logical Channels............................85

Confidential and Proprietary Information of ZTE CORPORATION

99

Você também pode gostar