Escolar Documentos
Profissional Documentos
Cultura Documentos
WHAT IS GSM?
GSM stands for Global System for Mobile Communication and is an open, digital cellular technology used for transmitting mobile voice and data services. The GSM emerged from the idea of cell-based mobile radio systems at Bell Laboratories in the early 1970s. The GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard. The GSM standard is the most widely accepted standard and is implemented globally. The GSM is a circuit-switched system that divides each 200kHz channel into eight 25kHz time-slots.
WHAT IS GSM?
The GSM makes use of narrowband Time Division Multiple Access (TDMA) technique for transmitting signals. The GSM was developed using digital technology. It has an ability to carry 64 kbps to 120 Mbps of data rates. The GSM provides basic to advanced voice and data services including Roaming service. Roaming is the ability to use your GSM phone number in another GSM network. A GSM digitizes and compresses data, then sends it down through a channel with two other streams of user data, each in its own time slot.
CC: Country Code MNC: Mobile Network Code MSIN: Mobile Subscriber Identification Number (ID in home net.) When subscribing for service with a network, subscriber receives (IMSI) and stores it in the SIM (Subscriber Identity Module) card. The IMSI has the unique subscriber id that identifies the HLR of the MS. It is never made public
Where, TAC = Type Approval Code FAC = Final Assembly Code SNR = Serial Number SVN = Software Version Number
NDC: National Destination Code SN: Subscriber Number CC: Country Code The SIM can have several MSISDN numbers for selection of different services like voice, data, fax Mobile Station Roaming Number (MSRN) -It is temporary location dependent ISDN number -It is assigned by local VLR to each MS in its area.
CC NDC SN
- CC: Country Code - MNC : Mobile Network Code - LAC: Location Area Code -LAI is broadcast regularly by Base Station on BCCH -Each cell is identified uniquely as belonging to an LA by its LAI
It is an alias of the IMSI and is used in its place for privacy. It is used to avoid sending IMSI on the radio path. It is an temporary identity that is allocated to an MS by the VLR at inter-VLR registration, and can be changed by the VLR TMSI is stored in MS SIM card and in VLR. MSCs and location registers (HLR,VLR) are addressed with ISDN numbers.
NSS
Um INTERFACE MS
MOBILE STATION
A Mobile Station consists of two main elements: The Subscriber Identity Module (SIM): It is protected by a four-digit Personal Identification Number (PIN). In order to identify the subscriber to the system, the SIM card contains amongst others a unique International Mobile Subscriber Identity (IMSI). User mobility is provided through mapping the subscriber to the SIM card rather than the terminal as we done in past cellular systems. Mobile equipment/terminal (ME): There are different types of terminals (MN) distinguished principally by their power and application: `fixed' terminals mainly installed in cars. Their maximum allowed output power is 20W portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W. handheld terminals; their popularity is owed to their weight and volume, which is continuously decreasing. According to some specification these terminals may emit up to 0.8W. However, as technology has evolved their maximum allowed power output is limited to 0.1W.
CELLULAR STRUCTURE
Earlier Service was limited to a certain area. We call coverage area a cell. It was determined by transmitters power. The cells are grouped into clusters. A cluster consists of as much cells as the frequency band allocated to the operator had been divided into group which had been assigned to the cells. The number of the cells in each cluster is very important. If the cells grouped into a cluster are not very much, the channels available per each cell will be much enough to increase the capacity of the system.
FREQUENCY REUSE
Because only a small number of radio channel frequencies were available for mobile systems hence concept of frequency reuse comes into use. Frequency reuse was implemented by restructuring the mobile telephone system architecture into the cellular concept. The concept of frequency reuse is based on assigning to each cell a group of radio channels used within a small geographic area. Cells are assigned a group of channels that is completely different from neighboring cells. The coverage area of cells is called the footprint. This footprint is limited by a boundary so that the same group of channels can be used in different cells that are far enough away from each other so that their frequencies do not interfere.
FREQUENCY REUSE
Cells with the same number have the same set of frequencies. Here, because the number of available frequencies is 7, the frequency reuse factor is 1/7. That is, each cell is using 1/7 of available cellular channels.
NETWORK PLANNING
Different possibilities of network planning and cell planning have been developed. Macrocells are large cells, they are used only in sparsely populated areas Microcells are used in areas where the system must support much traffic. Selective cells Some cells has a full coverage (360 degrees ). But it is not always useful to use this types of cell Umbrella cells Many microcells obviously produce an important number of handovers. To solve this problem the concept of umbrella cells is introduced. An umbrella cell covers several microcells. When the speed of the mobile is too high, the mobile is handed off to the umbrella cell. The mobile will then stay longer in the same cell, in this case in the umbrella cell. This will reduce the number of handovers and the work of the network.
CELL SPLITTING
Cell splitting is the process of subdividing a congested cell into smaller cells Each with its own base station and a corresponding reduction in antenna height and transmitter power. Cell splitting increases the capacity of a cellular system since it increases the number of times that channels are reused. By defining new cells which have a smaller radius than the original cells and by installing these smaller cells (called microcells) between the existing cells. Capacity increases due to the additional number of channels per unit area.
NETWORK OPERATIONS
In GSM, five main functions can be defined: Transmission: of data and signaling. Not all the components of the GSM network are strongly related with both types of types of Tx. While the MSC, BTS and BSC, among others, are involved with data and signaling, components such as HLR, VLR or EIR registers, are only concerned with signaling. Radio Resources Management (RRM). Mobility Management (MM). Communication Management (CM). Operation, Administration and Maintenance (OAM).
HANDOVER OR HANDOFF
The user movements may result a change in the channel/cell, when the quality of the communication is degrading; this is known as handoff. Within the GSM system there are four types of handover that can be performed for GSM only systems: Intra-BTS handover: This form of GSM handover occurs if it is required to change the frequency or slot being used by a mobile because of interference, or other reasons. In this form of GSM handover, the mobile remains attached to the same base station transceiver, but changes the channel or slot.
HANDOVER OR HANDOFF
Inter-BTS Intra BSC handover: This for of GSM handover or GSM handoff occurs when the mobile moves out of the coverage area of one BTS but into another controlled by the same BSC. In this instance the BSC is able to perform the handover and it assigns a new channel and slot to the mobile, before releasing the old BTS from communicating with the mobile. Inter-BSC handover: When the mobile moves out of the range of cells controlled by one BSC, a more involved form of handover has to be performed, handing over not only from one BTS to another but one BSC to another. For this the handover is controlled by the MSC. Inter-MSC handover: This form of handover occurs when changing between networks. The two MSCs involved negotiate to control the handover.
HANDOVER (MAHO)
Handovers are initiated by the BSS/MSC (as a means of traffic load balancing). During its idle time slots, the mobile scans the Broadcast Control Channel of up to 16 neighboring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, at least once per second, and is used by the handover algorithm. In this way the mobile assists in the handover decision and as a result this form of GSM handover is known as Mobile Assisted Hand Over (MAHO).
MOBILITY MANAGEMENT
The MM component handles: Location Management: Location is managed through periodically or on-demand. At power-on time, the MH signals an IMSI attach. On-demand location updates are signaled when the MN moves to a different PLMN or new location area (LA). The signal is sent to the new MSC/VLR, which forwards it to the subscriber's HLR. Upon authorization in the new MSC/VLR, the subscriber's HLR removes the registration entry of the MN at the old MSC/VLR. If after the update time interval, the MN has not registered, it is then deregistered. On power-off, the MN performs an IMSI detach.
MOBILITY MANAGEMENT
Security and Authentication: Authentication involves the SIM card and the Authentication Center. A secret key, stored in the SIM card and the AuC together with a ciphering algorithm called A3, are used to authenticate the user. The MN and the AuC compute a SRES through A3 using the secret key and a nonce generated by the AuC. If the two computed SRES are the same, the subscriber is authenticated. The different services to which the subscriber has access are also checked. Next the a security check is performed in the equipment identity (IMEI). If the IMEI number of the mobile is authorized in the EIR, the mobile station is allowed to connect the network. To assure user confidentiality, the user is registered with a Temporary Mobile Subscriber Identity (TMSI) after its first location update procedure. Enciphering is another option to guarantee a very strong security.
COMMUNICATION MANAGEMENT
The CM component manages: Call control (CC): It controls call setup, management and tear-down in relation to management of type of service. Call routing is the primary task for this component. To reach a mobile subscriber, a user dials the Mobile Subscriber ISDN (MSISDN) number.
GSM MULTIFRAME
The GSM frames are grouped together to form multiframes and in this way it is possible to establish a time schedule for their operation and the network can be synchronized. There are several GSM multiframe structures: Traffic multiframe: The Traffic Channel frames are organized into multiframes consisting of 26 bursts and taking 120 ms . In a traffic multiframe, 24 bursts are used for traffic. These are numbered 0 to 11 and 13 to 24. One of the remaining bursts is then used to accommodate the SACCH, the remaining frame remaining free. The actual position used alternates between position 12 and 25.
GSM MULTIFRAME
Control multiframe: The Control Channel multiframe that comprises 51 bursts and occupies 235.4 ms. This multiframe is subdivided into logical channels which are timescheduled. These logical channels and functions include the following 1. Frequency correction burst 2. Synchronization burst 3. Broadcast channel (BCH) 4. Paging and Access Grant Channel (PACCH) 5. Stand Alone Dedicated Control Channel (SDCCH)
GSM SUPERFRAME
Multiframes are then constructed into superframes taking 6.12 seconds. These consist of 51 traffic multiframes or 26 control multiframes. As the traffic multiframes are 26 bursts long and the control multiframes are 51 bursts long, the different number of traffic and control multiframes within the superframe, brings them back into line again taking exactly the same interval.
GSM HYPERFRAME
Above this 2048 superframes (i.e. 2 to the power 11) are grouped to form one hyperframe which repeats every 3 hours 28 minutes 53.76 seconds. It is the largest time interval within the GSM frame structure. Within the GSM hyperframe there is a counter and every time slot has a unique sequential number comprising the frame number and time slot number. This is used to maintain synchronization of the different scheduled operations with the GSM frame structure.
TRAFFIC CHANNELS
Traffic channels are the combination of voice and data signals (time slot assignments) that exit within a communication channel. There are three basic types of traffic channels in the GSM system; full rate, half rate and eighth rate. Variants of these channels also exist. A full rate traffic channel - TCH/F - dedicates one slot per frame for a communication channel between a user and the cellular system. A half rate traffic channel - TCH/H dedicates one slot per every two frames for a communication channel between a user and the cellular system. The eighth rate traffic channel - TCH/8 - dedicates one time slot for every eight frames. The TCH/8 channel is only used for call setup and/or short message service, to provide limited data transmission rates.
CONTROL CHANNELS
The control channels move the data that the network and the radios need in order to make sure all the traffic moves about in the system reliably and efficiently. There are four types of control channel 1. Broadcast channel 2. Common control channel 3. Dedicated control channel 4. Associated control channel
CONTROL CHANNELS
The Broadcast channel(BCH) are transmitted only by the base station and are intended to provide sufficient information to the mobile station for it to synchronize with the network. There are three types of BCH The Broadcast control channel Broadcast network information The frequency control channel Broadcast correction of frequency The synchronization channel Broadcast data for the frame synchronization of an MS
CONTROL CHANNELS
The Common Control Channel The CCCH channels help to establish the calls from the mobile station or the network. These are: Paging Channel (PCH): used to alert the MN of an incoming call. Random Access Channel (RACH): used by the MN to request network access. Access Grant Channel (AGCH): used, by the BTS, to inform the MN about the channel it should use. This channel is the answer of a BTS to a RACH request from the MN. Notification Channel(NACH) : use to inform mobile station about incoming group and broadcast calls.
CONTROL CHANNELS
Dedicated Control Channels (DCCH) The DCCH channels are used for message exchange between several mobiles or a mobile and the network. These are: Standalone Dedicated Control Channel (SDCCH): used to exchange signaling in the downlink and uplink. Slow Associated Control Channel (SACCH): used for channel maintenance and control. Fast Associated Control Channels (FACCH) : replace all or part of a traffic channel when urgent signaling must be transmitted. The FACCH channels carry the same signaling as SDCCH channels.
FRAME STRUCTURES
Information both traffic and signaling , is ordered into frames before it is mapped onto time slots. Frames are carefully organized into structures that appear as certain channel combinations, one after another , so that receivers can recognize what kind of data should be present at any time with minimum delay and error.
The most common combinations are: Combination I: TCH/F + FACCH/F + SACCH/F. This combination is used for full rate traffic. Combination II: TCH/H + FACCH/H + SACCH/H. This combination is used for half rate traffic when only one channel is needed. Combination III: 2 TCH/H + 2 FACCH/H + 2 SACCH. This combination is used for half rate traffic. Combination IV: FCCH + SCH + BCCH + CCCH. This is the standard C0T0 combination for medium and large cells. Combination V: FCCH + SCH + BCCH + CCCH + 4 SDCCH + 4 SACCH. This is the typical C0T0 combination for small cells, which allows the BTS to trade unnecessary CCCH capacity for a pool of 4 SDCCHs. Combination VI: BCCH + CCCH. This combination is used to provide additional CCCH capacity in large cells. Combination VII: 8 SDCCH + 8 SACCH. This combination is used to provide additional SDCCH capacity in medium and large cells.
REGISTRATION
MS BTS BSC (G)MSC VLR HLR ACTION
CHANNEL REQUEST CHANNEL ACTIVATION COMMAND CHANNEL ACTIVATION ACK CHANNEL ASSIGNEMENT
Before RACH is sent by mobile(UE) , mobile is synchronized with network(BTS) both time and frequency wise. It means it has tuned frequency as per FCCH and time as per SCH burst. It has received and decoded SIs as per BCCH. Once BCCH is decoded mobile station comes to know where it has to transmit CCCH(RACH) and where it has to listen for CCCH(carrying PCH,AGCH). RACH is used in mobile originated call while PCH is used in mobile terminated call at the start.
FACCH
FACCH FACCH FACCH TCH
AUTHENTICATION
The authentication procedure checks the validity of subscribers SIM cards, and whether they are permitted in a particular network. The authentication is based on the authentication algorithm A3,which is stored on the SIM card and in the AC. The A3 algorithm uses two input parameters: one is the authentication key, Ki which is stored only on the sim card and network. The second value , the randomly generated number , is transmitted to the mobile station on the Um interface. The mobile station passes the RAND to the SIM card where it is used as an input value for the A3 algorithm. The result SRES, is returned via the Um interface from the mobile station to the network where the values of SRES us compared with the calculated value from the AC.
CIPHERING
The GSM system uses such a ciphering method to protect signaling and user data. In order to ensure that the ciphered data from one side can be deciphered on the other side, a reversible algorithm is used . This means that if the ciphering algorithm , A5 is used to encipher a data stream and get back to original data stream
Ki MS RAND
A8
Kc