Você está na página 1de 72

Introduction To GSM

WHAT IS GSM?
GSM stands for Global System for Mobile Communication and is an open, digital cellular technology used for transmitting mobile voice and data services. The GSM emerged from the idea of cell-based mobile radio systems at Bell Laboratories in the early 1970s. The GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard. The GSM standard is the most widely accepted standard and is implemented globally. The GSM is a circuit-switched system that divides each 200kHz channel into eight 25kHz time-slots.

WHAT IS GSM?
The GSM makes use of narrowband Time Division Multiple Access (TDMA) technique for transmitting signals. The GSM was developed using digital technology. It has an ability to carry 64 kbps to 120 Mbps of data rates. The GSM provides basic to advanced voice and data services including Roaming service. Roaming is the ability to use your GSM phone number in another GSM network. A GSM digitizes and compresses data, then sends it down through a channel with two other streams of user data, each in its own time slot.

ADDRESSES AND IDENTIFIERS


International Mobile Subscriber Identity (IMSI)
CC MNC MSIN

CC: Country Code MNC: Mobile Network Code MSIN: Mobile Subscriber Identification Number (ID in home net.) When subscribing for service with a network, subscriber receives (IMSI) and stores it in the SIM (Subscriber Identity Module) card. The IMSI has the unique subscriber id that identifies the HLR of the MS. It is never made public

ADDRESSES AND IDENTIFIERS


International Mobile Station Equipment Identity (IMEI) It is allocated by equipment manufacturer, registered by network, and stored in EIR
TAC FAC SNR SVN

Where, TAC = Type Approval Code FAC = Final Assembly Code SNR = Serial Number SVN = Software Version Number

ADDRESSES AND IDENTIFIERS


Mobile Subscriber ISDN (MSISDN)
CC NDC SN

NDC: National Destination Code SN: Subscriber Number CC: Country Code The SIM can have several MSISDN numbers for selection of different services like voice, data, fax Mobile Station Roaming Number (MSRN) -It is temporary location dependent ISDN number -It is assigned by local VLR to each MS in its area.
CC NDC SN

ADDRESSES AND IDENTIFIERS


Location Area ID(LAI)
CC MNC LAC

- CC: Country Code - MNC : Mobile Network Code - LAC: Location Area Code -LAI is broadcast regularly by Base Station on BCCH -Each cell is identified uniquely as belonging to an LA by its LAI

ADDRESSES AND IDENTIFIERS


Temporary Mobile Subscriber Identity (TMSI)
CC MNC LAC

It is an alias of the IMSI and is used in its place for privacy. It is used to avoid sending IMSI on the radio path. It is an temporary identity that is allocated to an MS by the VLR at inter-VLR registration, and can be changed by the VLR TMSI is stored in MS SIM card and in VLR. MSCs and location registers (HLR,VLR) are addressed with ISDN numbers.

GSM SYSTEM ARCHITECTURE


VLR AuC MSC NSSSS EIR A INTERFACE BSC Abis Interface BTS BSS PSDN ISDN PSTN HLR PLMN

NSS

Um INTERFACE MS

GSM SYSTEM ARCHITECTURE

GSM NETWORK AREAS


In a GSM network, the following areas are defined: Cell: Cell is the basic service area: one BTS covers one cell. Each cell is given a Cell Global Identity (CGI), a number that uniquely identifies the cell. Location Area: A group of cells form a Location Area. This is the area that is paged when a subscriber gets an incoming call. Each Location Area is assigned a Location Area Identity (LAI). Each Location Area is served by one or more BSCs. MSC/VLR Service Area: The area covered by one MSC is called the MSC/VLR service area. Public Land Mobile Network(PLMN) : The area covered by one network operator is called PLMN. A PLMN can contain one or more MSCs. Public Switched Telephone Network(PSTN): is the global collection of interconnects originally designed to support circuitswitched voice communication.

GSM NETWORK AREAS


Public Switched Data Network(PSDN):a data communications network that is based on the principles of packet switching, as opposed to circuit switching that is used in public telephone networks. Integrated Services Digital Network(ISDN): is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

GSM NETWORK ARCHITECTURE


The GSM network can be divided into four main parts: The Mobile Station (MS). The Base Station Subsystem (BSS). The Network and Switching Subsystem (NSS). The Operation and Support Subsystem (OSS).

MOBILE STATION
A Mobile Station consists of two main elements: The Subscriber Identity Module (SIM): It is protected by a four-digit Personal Identification Number (PIN). In order to identify the subscriber to the system, the SIM card contains amongst others a unique International Mobile Subscriber Identity (IMSI). User mobility is provided through mapping the subscriber to the SIM card rather than the terminal as we done in past cellular systems. Mobile equipment/terminal (ME): There are different types of terminals (MN) distinguished principally by their power and application: `fixed' terminals mainly installed in cars. Their maximum allowed output power is 20W portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W. handheld terminals; their popularity is owed to their weight and volume, which is continuously decreasing. According to some specification these terminals may emit up to 0.8W. However, as technology has evolved their maximum allowed power output is limited to 0.1W.

BASE STATION SUBSYSTEM


The BSS provides the interface between the ME and the NSS. It is in charge of the transmission and reception. It may be divided into two parts: Base Station Controller (BSC): It controls a group of BTSs and manages their radio resources. A BSC is principally in charge of Handoffs Frequency hopping, Exchange functions Power control over each managed BTSs.

BASE STATION SUBSYSTEM


Base Transceiver Station (BTS) or Base Station: It maps to transceivers and antennas used in each cell of the network. It is usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS has between 1-16 transceivers depending on the density of users in the cell.

NETWORK SWITCHING SUBSYSTEM


Its main role is to manage the communications between the mobile users and other users, such as mobile users, ISDN users, fixed telephony users, etc. It also includes databases needed in order to store information about the subscribers and to manage their mobility. The different components of the NSS are described below. Mobile Switching Center(MSC): The central component of the NSS. The MSC performs the switching functions of the network. It also provides connection to other networks.

NETWORK SWITCHING SUBSYSTEM


Gateway MSC(GMSC): A gateway that interconnects two networks: the cellular network and the PSTN. It is in charge of routing calls from the fixed network towards a GSM user. The GMSC is often implemented in the same machines as the MSC. Home Location Register(HLR): The HLR stores information of the subscribers belonging to the coverage area of a MSC. It also stores the current location of these subscribers and the services to which they have access.

NETWORK SWITCHING SUBSYSTEM


Visitor Location Register (VLR): contains information from a subscriber's HLR necessary to provide the subscribed services to visiting users. When a subscriber enters the covering area of a new MSC, the VLR associated to this MSC will request information about the new subscriber to its corresponding HLR. The VLR will then have enough data to assure the subscribed services without needing to ask the HLR each time a communication is established. The VLR is always implemented together with a MSC; thus, the area under control of the MSC is also the area under control of the VLR.

NETWORK SWITCHING SUBSYSTEM


Authentication Center (AuC): It serves security purposes; it provides the parameters needed for authentication and encryption functions. These parameters allow verification of the subscriber's identity.

NETWORK SWITCHING SUBSYSTEM


GSM Interworking Unit (GIWU): The GIWU provides an interface to various networks for data communications. During these communications, the transmission of speech and data can be alternated. Equipment Identity Register (EIR): EIR stores security-sensitive information about the mobile equipments. It maintains a list of all valid terminals as identified by their International Mobile Equipment Identity (IMEI). The EIR allows then to forbid calls from stolen or unauthorized terminals (e.g., a terminal which does not respect the specifications concerning the output RF power).

THE OPERATION SUPPORT SUBSYSTEM(OSS)


The operations and maintenance center (OMC) is connected to all equipment in the switching system and to the BSC. The implementation of OMC is called the operation and support system (OSS). Here are some of the OMC functions: Administration and commercial operation (subscription, end terminals, charging and statistics). Security Management. Network configuration, Operation and Performance Management. Maintenance Tasks.

THE OPERATION SUPPORT SUBSYSTEM(OSS)


The OSS is the functional entity from which the network operator monitors and controls the system. The purpose of OSS is to offer the customer cost-effective support for centralized, regional, and local operational and maintenance activities that are required for a GSM network. An important function of OSS is to provide a network overview and support the maintenance activities of different operation and maintenance organization

CELLULAR STRUCTURE
Earlier Service was limited to a certain area. We call coverage area a cell. It was determined by transmitters power. The cells are grouped into clusters. A cluster consists of as much cells as the frequency band allocated to the operator had been divided into group which had been assigned to the cells. The number of the cells in each cluster is very important. If the cells grouped into a cluster are not very much, the channels available per each cell will be much enough to increase the capacity of the system.

FREQUENCY REUSE
Because only a small number of radio channel frequencies were available for mobile systems hence concept of frequency reuse comes into use. Frequency reuse was implemented by restructuring the mobile telephone system architecture into the cellular concept. The concept of frequency reuse is based on assigning to each cell a group of radio channels used within a small geographic area. Cells are assigned a group of channels that is completely different from neighboring cells. The coverage area of cells is called the footprint. This footprint is limited by a boundary so that the same group of channels can be used in different cells that are far enough away from each other so that their frequencies do not interfere.

FREQUENCY REUSE

Cells with the same number have the same set of frequencies. Here, because the number of available frequencies is 7, the frequency reuse factor is 1/7. That is, each cell is using 1/7 of available cellular channels.

NETWORK PLANNING
Different possibilities of network planning and cell planning have been developed. Macrocells are large cells, they are used only in sparsely populated areas Microcells are used in areas where the system must support much traffic. Selective cells Some cells has a full coverage (360 degrees ). But it is not always useful to use this types of cell Umbrella cells Many microcells obviously produce an important number of handovers. To solve this problem the concept of umbrella cells is introduced. An umbrella cell covers several microcells. When the speed of the mobile is too high, the mobile is handed off to the umbrella cell. The mobile will then stay longer in the same cell, in this case in the umbrella cell. This will reduce the number of handovers and the work of the network.

CELL SPLITTING
Cell splitting is the process of subdividing a congested cell into smaller cells Each with its own base station and a corresponding reduction in antenna height and transmitter power. Cell splitting increases the capacity of a cellular system since it increases the number of times that channels are reused. By defining new cells which have a smaller radius than the original cells and by installing these smaller cells (called microcells) between the existing cells. Capacity increases due to the additional number of channels per unit area.

NETWORK OPERATIONS
In GSM, five main functions can be defined: Transmission: of data and signaling. Not all the components of the GSM network are strongly related with both types of types of Tx. While the MSC, BTS and BSC, among others, are involved with data and signaling, components such as HLR, VLR or EIR registers, are only concerned with signaling. Radio Resources Management (RRM). Mobility Management (MM). Communication Management (CM). Operation, Administration and Maintenance (OAM).

RADIO RESOURCES MANAGEMENT


The role of the RR function is to establish, maintain and release communication links between mobile stations and the MSC. The elements that are mainly concerned with the RR function are the MN and the BTS. However, since the RR component performs connection management also during cell handoffs, it also affects the MSC which is the handoff management component. The RR is also responsible for the management of frequency resources as well as varying radio interface conditions. Main component operations are: Channel assignment, change and release. Handoff Frequency hopping. Power-level control. Discontinuous transmission and reception. Timing advance.

HANDOVER OR HANDOFF
The user movements may result a change in the channel/cell, when the quality of the communication is degrading; this is known as handoff. Within the GSM system there are four types of handover that can be performed for GSM only systems: Intra-BTS handover: This form of GSM handover occurs if it is required to change the frequency or slot being used by a mobile because of interference, or other reasons. In this form of GSM handover, the mobile remains attached to the same base station transceiver, but changes the channel or slot.

HANDOVER OR HANDOFF
Inter-BTS Intra BSC handover: This for of GSM handover or GSM handoff occurs when the mobile moves out of the coverage area of one BTS but into another controlled by the same BSC. In this instance the BSC is able to perform the handover and it assigns a new channel and slot to the mobile, before releasing the old BTS from communicating with the mobile. Inter-BSC handover: When the mobile moves out of the range of cells controlled by one BSC, a more involved form of handover has to be performed, handing over not only from one BTS to another but one BSC to another. For this the handover is controlled by the MSC. Inter-MSC handover: This form of handover occurs when changing between networks. The two MSCs involved negotiate to control the handover.

HANDOVER (MAHO)
Handovers are initiated by the BSS/MSC (as a means of traffic load balancing). During its idle time slots, the mobile scans the Broadcast Control Channel of up to 16 neighboring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, at least once per second, and is used by the handover algorithm. In this way the mobile assists in the handover decision and as a result this form of GSM handover is known as Mobile Assisted Hand Over (MAHO).

MOBILITY MANAGEMENT
The MM component handles: Location Management: Location is managed through periodically or on-demand. At power-on time, the MH signals an IMSI attach. On-demand location updates are signaled when the MN moves to a different PLMN or new location area (LA). The signal is sent to the new MSC/VLR, which forwards it to the subscriber's HLR. Upon authorization in the new MSC/VLR, the subscriber's HLR removes the registration entry of the MN at the old MSC/VLR. If after the update time interval, the MN has not registered, it is then deregistered. On power-off, the MN performs an IMSI detach.

MOBILITY MANAGEMENT
Security and Authentication: Authentication involves the SIM card and the Authentication Center. A secret key, stored in the SIM card and the AuC together with a ciphering algorithm called A3, are used to authenticate the user. The MN and the AuC compute a SRES through A3 using the secret key and a nonce generated by the AuC. If the two computed SRES are the same, the subscriber is authenticated. The different services to which the subscriber has access are also checked. Next the a security check is performed in the equipment identity (IMEI). If the IMEI number of the mobile is authorized in the EIR, the mobile station is allowed to connect the network. To assure user confidentiality, the user is registered with a Temporary Mobile Subscriber Identity (TMSI) after its first location update procedure. Enciphering is another option to guarantee a very strong security.

COMMUNICATION MANAGEMENT
The CM component manages: Call control (CC): It controls call setup, management and tear-down in relation to management of type of service. Call routing is the primary task for this component. To reach a mobile subscriber, a user dials the Mobile Subscriber ISDN (MSISDN) number.

COMMUNICATION MANAGEMENT (CM)


The call is then passed to the GMSC (if the call is originated from a fixed network) that 'knows' the HLR corresponding to the particular MSISDN number. The GMSC signals the HLR for call routing information. The HLR requests this information from the subscriber's current VLR. This VLR allocates temporarily a Mobile Station Roaming Number (MSRN) for the call. The MSRN number is the information returned by the HLR to the GMSC. It is latter that routes the call through the MSRN number, to the subscriber's current MSC/VLR. In the subscriber's current LA, the mobile is paged.

COMMUNICATION MANAGEMENT (CM)


Supplementary Services management: This involves the MN and the HLR. SMS management: Here the GSM network contacts the Short Message Service Center through the two following interfaces: SMS-GMSC for Mobile Terminating Short Messages (SMSMT/PP). It has the same role as the GMSC. SMS-IWMSC for Mobile Originating Short Messages (SMSMO/PP)

SHORT MESSAGE SERVICE ARCHITECTURE


The GSM SMS provides a connectionless transfer of messages ,lowcapacity , Low-time performance Up to 140 octets, 160 characters per short message SMS are sent on the GSM SDCCH signaling channel. Two types of GSM short message services have been defined: Cell Broadcast Service: periodically deliver short messages to all subscribers in some cells Point-to-point Service: send short messages to a user

TYPES OF SHORT MESSAGES


Three types of short messages: User-specific messages are displayed to the users. ME-specific messages are processed by the ME instead of showing to the users. SIM-specific messages are processed at the SIM card.

GSM SMS NETWORK ARCHITECTURE

GSM SMS NETWORK ARCHITECTURE


Step 1: The Mobile Station (MS) is powered on and registered with the network. Step 2: The MS transfers the SMS to the MSC Step 3: The MSC interrogates the Visitor Location Register (VLR) to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed. Step 4: The MSC send the short message to the SMSC using the forward short message operation. Step 5: The SMSC delivers the short message to the SME (acknowledgement is optional). Step 6: The short message is submitted from the ESME (External Short Message Entity) to the SMSC. Step 7: After completing its internal processing, the SMSC interrogates the Home Location Register (HLR)

GSM SMS NETWORK ARCHITECTURE


Step 8: The SMSC sends the short message to the MSC using the forward short message operation. Step 9: The MSC retrieves the subscriber information from the VLR. This operation may include an authentication procedure. Step 10: The MSC transfers the short message to the Mobile Station Step 11: The MSC returns to the SMSC the outcome of the forward short message operation. Step 12: If requested by the ESME, the SMSC returns a status report indicating delivery of the short message. Step 13: The SMSC acknowledges to the MSC the successful outcome of the forward short message operation. Step 14: The MSC returns to the MSC the outcome of the MO-SM operation

SHORT MESSAGE SERVICE CENTRE


The SMSC is a combination of hardware and software responsible for the relaying and storing and forwarding of a short message between an SME and a mobile device. In this way, if ones phone is switched off or the storage for SMS is full, the SMSC will retain any messages until the user can receive them. The SMSC must be highly reliable, with redundant backups for its primary functionality in case of failure. It must be able to serve a large number of subscribers, and thus be able to support a high throughput of messages. It should also be scalable, to allow expansion for greater capacity or new developments in messaging, such as EMS or MMS in future.

OPERATION, ADMINISTRATION AND MAINTENANCE (OAM)


The OAM component allows the operator to monitor and control the system as well as modify the configuration of the elements of the system. Not only the OSS is part of the OAM, but also the BSS and NSS participate in functions such as: provide the operator with all the information it needs. This information is forwarded to the OSS to control the network. perform self-test tasks in addition to the OAM functions. control of multiple BTSs by the BSS.

CHANNEL ACCESS METHOD


If the number of channels available for all user is less than the total number of all possible user, then such a system is called a trunked radio system. Trunking is a process whereby user share a limited number of channels in some orderly way. The method of sharing channels is termed access. Types of Access Frequency Division Multiple Access Time-Division Multiple Access Space-Division Multiple Access Code-Division Multiple Access

CHANNEL ACCESS METHOD

CHANNEL ACCESS METHOD


Frequency Division Multiple Access Using FDMA, a frequency is assigned to each user. So for large number of users in a FDMA system, the larger the number of required frequencies. The limited available radio spectrum and the fact that a user will not free its assigned frequency until he does not need it anymore, reasons about scalability problems in an FDMA system Time Division Multiple Access TDMA allows several users to share the same channel. Each subscriber multiplexes the shared channel, scheduling their frame for transmission. Usually TDMA is used with an FDMA structure.

CHANNEL ACCESS METHOD


Code Division Multiple Access : In CDMA, all the users occupy the same bandwidth. However they are all assigned separate codes, which differentiates them from each other Space Division Multiple Access (SDMA) : SDMA utilizes the spatial separation of the users in order to optimize the use of the frequency spectrum. A primitive form of SDMA is when the same frequency is re-used in different cells in a cellular wireless network. However for limited co-channel interference it is required that the cells be sufficiently separated. This limits the number of cells a region can be divided into and hence limits the frequency re-use factor

GSM FRAME STRUCTURE


The GSM system has a defined GSM frame structure to enable the orderly passage of information. The GSM frame structure establishes schedules for the predetermined use of timeslots. By establishing these schedules by the use of a frame structure, both the mobile and the base station are able to communicate not only the voice data, but also signaling information without the various types of data becoming intermixed and both ends of the transmission knowing exactly what types of information are being transmitted.

BASIC GSM FRAME STRUCTURE


The basic element in the GSM frame structure is the frame itself. This comprises the eight slots, each used for different users within the TDMA system
Transmit Frame
0 1 2 3 4 5 6 7 0

Base Station Transmit Slot Numbers Corresponding Receive Frame 5 6 7 0 1 2 3 4 5

Base Station Receive Time

BASIC GSM FRAME STRUCTURE


GSM frame consisting of eight slots The basic GSM frame defines the structure upon which all the timing and structure of the GSM messaging and signaling is based. The fundamental unit of time is called a burst period and it lasts for approximately 0.577 ms (15/26 ms). Eight of these burst periods are grouped into what is known as a TDMA frame. This lasts for approximately 4.615 ms (i.e.120/26 ms) and it forms the basic unit for the definition of logical channels. One physical channel is one burst period allocated in each TDMA frame

GSM FRAME STRUCTURE SUMMARY

GSM MULTIFRAME
The GSM frames are grouped together to form multiframes and in this way it is possible to establish a time schedule for their operation and the network can be synchronized. There are several GSM multiframe structures: Traffic multiframe: The Traffic Channel frames are organized into multiframes consisting of 26 bursts and taking 120 ms . In a traffic multiframe, 24 bursts are used for traffic. These are numbered 0 to 11 and 13 to 24. One of the remaining bursts is then used to accommodate the SACCH, the remaining frame remaining free. The actual position used alternates between position 12 and 25.

GSM MULTIFRAME
Control multiframe: The Control Channel multiframe that comprises 51 bursts and occupies 235.4 ms. This multiframe is subdivided into logical channels which are timescheduled. These logical channels and functions include the following 1. Frequency correction burst 2. Synchronization burst 3. Broadcast channel (BCH) 4. Paging and Access Grant Channel (PACCH) 5. Stand Alone Dedicated Control Channel (SDCCH)

GSM SUPERFRAME
Multiframes are then constructed into superframes taking 6.12 seconds. These consist of 51 traffic multiframes or 26 control multiframes. As the traffic multiframes are 26 bursts long and the control multiframes are 51 bursts long, the different number of traffic and control multiframes within the superframe, brings them back into line again taking exactly the same interval.

GSM HYPERFRAME
Above this 2048 superframes (i.e. 2 to the power 11) are grouped to form one hyperframe which repeats every 3 hours 28 minutes 53.76 seconds. It is the largest time interval within the GSM frame structure. Within the GSM hyperframe there is a counter and every time slot has a unique sequential number comprising the frame number and time slot number. This is used to maintain synchronization of the different scheduled operations with the GSM frame structure.

TRAFFIC CHANNELS
Traffic channels are the combination of voice and data signals (time slot assignments) that exit within a communication channel. There are three basic types of traffic channels in the GSM system; full rate, half rate and eighth rate. Variants of these channels also exist. A full rate traffic channel - TCH/F - dedicates one slot per frame for a communication channel between a user and the cellular system. A half rate traffic channel - TCH/H dedicates one slot per every two frames for a communication channel between a user and the cellular system. The eighth rate traffic channel - TCH/8 - dedicates one time slot for every eight frames. The TCH/8 channel is only used for call setup and/or short message service, to provide limited data transmission rates.

CONTROL CHANNELS
The control channels move the data that the network and the radios need in order to make sure all the traffic moves about in the system reliably and efficiently. There are four types of control channel 1. Broadcast channel 2. Common control channel 3. Dedicated control channel 4. Associated control channel

CONTROL CHANNELS
The Broadcast channel(BCH) are transmitted only by the base station and are intended to provide sufficient information to the mobile station for it to synchronize with the network. There are three types of BCH The Broadcast control channel Broadcast network information The frequency control channel Broadcast correction of frequency The synchronization channel Broadcast data for the frame synchronization of an MS

CONTROL CHANNELS
The Common Control Channel The CCCH channels help to establish the calls from the mobile station or the network. These are: Paging Channel (PCH): used to alert the MN of an incoming call. Random Access Channel (RACH): used by the MN to request network access. Access Grant Channel (AGCH): used, by the BTS, to inform the MN about the channel it should use. This channel is the answer of a BTS to a RACH request from the MN. Notification Channel(NACH) : use to inform mobile station about incoming group and broadcast calls.

CONTROL CHANNELS
Dedicated Control Channels (DCCH) The DCCH channels are used for message exchange between several mobiles or a mobile and the network. These are: Standalone Dedicated Control Channel (SDCCH): used to exchange signaling in the downlink and uplink. Slow Associated Control Channel (SACCH): used for channel maintenance and control. Fast Associated Control Channels (FACCH) : replace all or part of a traffic channel when urgent signaling must be transmitted. The FACCH channels carry the same signaling as SDCCH channels.

FRAME STRUCTURES
Information both traffic and signaling , is ordered into frames before it is mapped onto time slots. Frames are carefully organized into structures that appear as certain channel combinations, one after another , so that receivers can recognize what kind of data should be present at any time with minimum delay and error.

The most common combinations are: Combination I: TCH/F + FACCH/F + SACCH/F. This combination is used for full rate traffic. Combination II: TCH/H + FACCH/H + SACCH/H. This combination is used for half rate traffic when only one channel is needed. Combination III: 2 TCH/H + 2 FACCH/H + 2 SACCH. This combination is used for half rate traffic. Combination IV: FCCH + SCH + BCCH + CCCH. This is the standard C0T0 combination for medium and large cells. Combination V: FCCH + SCH + BCCH + CCCH + 4 SDCCH + 4 SACCH. This is the typical C0T0 combination for small cells, which allows the BTS to trade unnecessary CCCH capacity for a pool of 4 SDCCHs. Combination VI: BCCH + CCCH. This combination is used to provide additional CCCH capacity in large cells. Combination VII: 8 SDCCH + 8 SACCH. This combination is used to provide additional SDCCH capacity in medium and large cells.

SUMMARY OF THE DIFFERENT LOGICAL CHANNELS AND THEIR DIRECTIONS


Logical Channel TCH FACCH BCCCH FCCH SCH RACH PCH AGCH SDCCH SACCH Transmitting Direction MS<->BTS MS<->BTS MS<-BTS MS<-BTS MS<-BTS MS->BTS MS<-BTS MS<-BTS MS<->BTS MS<->BTS

REGISTRATION
MS BTS BSC (G)MSC VLR HLR ACTION
CHANNEL REQUEST CHANNEL ACTIVATION COMMAND CHANNEL ACTIVATION ACK CHANNEL ASSIGNEMENT

LOCATION UPDATE REQ


AUTHENTICATION REQUEST AUTHENTICATION RESPONSE COMPARISON OF AUTHENTICATION PARAMETER ASSIGNMENT OF NEW AREA AND THE TMSI ACK OF NEW AREA AND TMSI ENTRY OF NEW AREA AND IDENTITY INTO VLR,HLR CHANNEL RELEASE

CALL ESTABLISHMENT-MOBILE ORIGINATED

CALL ESTABLISHMENT-MOBILE ORIGINATED

Before RACH is sent by mobile(UE) , mobile is synchronized with network(BTS) both time and frequency wise. It means it has tuned frequency as per FCCH and time as per SCH burst. It has received and decoded SIs as per BCCH. Once BCCH is decoded mobile station comes to know where it has to transmit CCCH(RACH) and where it has to listen for CCCH(carrying PCH,AGCH). RACH is used in mobile originated call while PCH is used in mobile terminated call at the start.

MOBILE ORIGINATED CALL RELEASE

CALL ESTABLISHMENT- MOBILE TERMINATED


Logical Channel PCH RACH AGCH SDCCH MS BS Paging of the mobile station Channel request Channel assignment Answer to the paging from the network this is already transmitted on assigned channel Authentication request from the network Authentication response from the mobile station Request to transmit in the ciphered mode Acknowledgement of the ciphered mode

SDCCH SDCCH SDCCH SDCCH

CALL ESTABLISHMENT- MOBILE TERMINATED


Logical Channel SDCCH SDCCH SDCCH MS BS Setup message for the incoming call confirmation Assignment of a traffic channel

FACCH
FACCH FACCH FACCH TCH

Acknowledgment of the traffic channel


Alerting (ringing) Connect message when the mobile is off. Acceptance of the connect message Exchange of user data (speech)

AUTHENTICATION
The authentication procedure checks the validity of subscribers SIM cards, and whether they are permitted in a particular network. The authentication is based on the authentication algorithm A3,which is stored on the SIM card and in the AC. The A3 algorithm uses two input parameters: one is the authentication key, Ki which is stored only on the sim card and network. The second value , the randomly generated number , is transmitted to the mobile station on the Um interface. The mobile station passes the RAND to the SIM card where it is used as an input value for the A3 algorithm. The result SRES, is returned via the Um interface from the mobile station to the network where the values of SRES us compared with the calculated value from the AC.

CIPHERING
The GSM system uses such a ciphering method to protect signaling and user data. In order to ensure that the ciphered data from one side can be deciphered on the other side, a reversible algorithm is used . This means that if the ciphering algorithm , A5 is used to encipher a data stream and get back to original data stream
Ki MS RAND

A8

Kc

Você também pode gostar