Very Good Advanced Slides of GSM
Very Good Advanced Slides of GSM
GSM Cellular Telephony Networks Introduction to Technology Network Structure GSM Air Interface GSM Channel Structure GSM Radio Resource,Mobility and Call Liam Kilmartin Dept. of Elec. Eng., Management NUI, Galway February 2000 GSM Services
Cellular Networks
The essential difference between a cellular and fixed telephony network is that the subscribers terminal (the Mobile Station MS) is not linked by a fixed physical connection to the network
Connection is a radio based wireless connection
In order to support this terminal mobility the geographic area which the mobile network covers is subdivided into cells
Cells
Each cell is serviced by a fixed radio transmitter\receiver known as a base station (BS) which is commonly located in the centre or corner of a cell While often drawn as hexagonal in shape, real cells have no defined shape. The actual area a cell covers depends on many parameters:
Transmitter power Terrain Weather Antenna directivity
Cells
The area a cell covers typically varies from a very small region in urban areas to quite large regions (around 35 km radius in GSM) in rural areas
Balancing of subscribers and traffic between cells
Frequency Spectrum
Cellular networks operate within defined frequency bands of the spectrum For example, GSM-900 utilises two 25 MHz bands
890-915 MHz (Uplink - MS to BS) 935-960 MHz (Downlink - BS to MS)
These 25 MHz bands are subdivided into 124 carrier frequencies each spaced at approximately 200 kHz (FDMA)
Frequency Spectrum
Not all countries utilise the full 25 MHz and within a country the full GSM band must be subdivided among several network operators Additional frequency spectrum is allocated in most countries around 1800 MHz (GSM1800) In US, certain operators implement GSM standard on a frequency band around 1900 MHz (GSM-1900)
Frequency Re-use
In a given country with, say, two different GSM networks will each use half the 124 (i.e. 62) GSM-900 carriers Clearly, even using TDMA technology this is an extremely small number of carrier frequencies to support a GSM network in a complete country All cellular networks address this problem by what is termed frequency re-use
Frequency Re-use
Frequency re-use means that the same set of carrier frequencies being used in one cell can be re-used in the network in a different cell However, the cells re-using the same carriers must not be adjacent as they would interfere with one another In practice, these cell must be distant from one another
Typical re-use distance is 2.5 to 3 times the cell radius
Cell Clusters
Cells in a cellular network are generally grouped together into cell clusters Cellular networks are generally designed as a repeated cluster pattern The number of cells in a cluster (typically 4,7, 12 or 21) is a trade-off between the traffic capacity in the cluster and its interference with the adjacent cluster of cells (where the same frequencies will be re-used)
Trunking
In addition to frequency re-use, cellular network utilise the concept of trunking to support a very large number of subscribers using a much smaller number of channels (i.e. carriers) This is achieved due to the fact that MS access to a traffic channel in all cells is by demand assignment
They must first negotiate with the network over a signalling channel to gain access to a traffic channel for the duration of a call
As with all trunked systems, there is always the possibility that subscribers will not be able to access the network due to the limited number of traffic channels available
Currently, the most widely used of several second generation digital cellular telephony standards
However,
Still not a single global standard MS to BS bearer rates are still very slow for non-voice services
Mobile Station
The MS consists of the mobile equipment (terminal) and a smart card called the subscriber identity module (SIM) It is the SIM card which contains all the network relevant subscriber identity information SIM provides subscriber with personal mobility rather than the terminal (as in first generation systems) Access to SIM protected by security codes (PIN and PUK codes)
Mobile Station
Typical information stored on the SIM includes
International Mobile Subscriber Identity Number (IMSI) which is the unique identification of the subscriber (not the same as their mobile phone number) Information used in authenticating the SIM when it attempts to access the number Information indicating which bearer, supplementary and tele-services the subscriber has access to
The mobile equipment is also uniquely identified by what is called the International Mobile Equipment Identity (IMEI) but this is not of particular importance to the standard operation of the network
The BTS primarily consists of a number the radio transmitter\receivers required to cover an individual cell plus an functionality required to support traffic transmission over the radio link (e.g. channel coding, speech coding, encryption, RF modulation) The BSC is a more sophisticated device which manages the radio links between the BSSs, under its control, and any MS in the cells covered by the BSSs
Allocation of channels to MS for calls Measuring and controlling transmitter power levels
Network Subsystem
The network sub-system primarily consists of a network of telephone exchanges termed Mobile Switching Centres (MSC)
MSC interconnect using standard inter-exchange TDM links
In addition, however, it also includes equipment to support the particular requirements of GSM mobile telephony network A special MSC termed a Gateway MSC (GMSC) is used to interconnect the GSM network with other circuit and packet switched networks
The subscribers entry (identified by their IMSI) in their home HLR contains important information such as their current location in the GSM network and the services which the subscriber can access
Authentication Centre
AuC is a further database which supports certain aspect of network security In particular, it contains information, known as a key, which is used to authenticate the identity of a SIM when an attempt is made by the SIM to access the network The same information is also involved in the process by which the digital radio transmissions to\from a mobile can be encrypted
Physical Channels
A single Physical Channel consists of one burst period per TDMA frame on a specific FDMA carrier However, the relationship between physical channels and the data they contain is NOT simple
For example, a specific burst period on a carrier is NOT used to carry user traffic every frame For example, burst period N on a carrier has a different meaning dependent on which frame it is in a 26 or 51 frame multi-frame Even more complex time-relationships exist on burst periods used to carry control, or signalling, information
to form a multi-frame (depending upon use of burst periods - signalling or traffic) 51 x 26 frame multi-frames, or 26 x 51 frame multi-frames form a super-frame (6.12 s) 2048 super-frames form a cryptographic hyper-frame (3 hr 28 min 53 s)
Burst Transmission
The timeslots are termed burst periods because the GSM transmitter must transmit its data in a short burst within the time slot
Time slot (156.25 bits) is longer than transmitted packet duration (up to 148 bits) - 8.25 bit difference is a guard period Transmitter must ramp power up quickly at the start of the period and ramp it down at the end of the period Guard period is required (specifically in the uplink direction) to allow for slight deviations in the arrival times (synchronisation )of burst from different MS using adjacent burst periods
Types of Bursts
Four different types used in GSM depending on function of transmission
Normal Burst (used in both MS and BS in most cases) Frequency Correction Burst (transmitted by BS to supply all MS with a frequency reference to aid receiver carrier synchronisation) Synchronisation Burst (transmitted by BS to aid MS equalisation circuits) Random Access Burst (transmitted by MS when first attempting to transmit to a BS in a cell)
All of these may, or may not, be implemented in particular GSM networks but are included in the GSM specification (and hence must be implemented on all GSM MS) as an aid in minimising interference and maximising MS power usage
Timing Advance
Clearly, it is vital that the burst transmission from MS in a cell arrive within the bounds of the burst period allocated to that MS This is made difficult as the MS may be moving and hence the propagation delay between MS and BS can vary BS monitors the arrival position of a MS burst in the allocated burst period It must then inform the MS to either advance or retreat their timing to ensure than subsequent burst arrive well within the bounds of their allocated burst period The BS continuously performs this task while a communication session is in progress with an MS
The MS can also monitor the power it receives from the BS during its allocated burst period and instruct the BS to increase\decrease the transmitter power during that burst period - Also minimises co-channel interference Both of these will occur continuously while an MS is in a communication session with a BS
Discontinuous Transmission
In order to help maximise MS battery life and minimising co-channel interference, GSM MS and BS only transmit normal burst containing speech information in their allocated burst period, during a call, if the mobile user is actually speaking DTX utilises a Voice Activity Detector (VAD) in the MS software which analyses the incoming speech samples to distinguish between speech and background noise At the other end of the radio link, comfort noise is injected during periods of DTX so that the listener does not hear dead silence
Discontinuous Reception
The MS does not have to continuously monitor the transmissions being emitted from the BS either during calls or when idle (in case of incoming call requests) This means that the MS can power down its reception circuitry except during the periods when it must listen to the BS transmission This helps conserve MS battery life
Frequency Hopping
GSM standard does include a slow frequency hopping capability for FDMA carriers in order to counteract the effect of frequency dependent distortion of carriers (e.g. multi-path fading) on quality of link
Frequency hops every TDMA frame
Many networks do not implement frequency hopping in BS but ALL MS must BS must inform all MS of the frequency hopping algorithm being implemented in that cell
Similarly, the 51 frame multi-frame used on burst period carrying certain CCH (e.g. burst period 0) is used in a similarly manner to separate when different types of signalling information (or channels) are
Logical Channels
The GSM standard not only specifies then when of different channels in that different types of information is transmitted in different burst periods, frames, multi-frames superframes etc. It also distinguish the why of the information under the phrase of logical channels For example, it is not sufficient to identify between TCH and CCH. The GSM standard identifies the different types of CCH and TCH that are used
Control Channels
There are four important different classes of control channels defined:
Broadcast Channels (BCH) Common Control Channels (CCCH) Dedicated Control Channels (DCCH) Associated Control Channels (ACCH)
Each class is further subdivided to identify specific logical channels The mapping of these logical channels onto physical channels is quite complex but some examples have already been mentioned
Broadcast Channels
Broadcast channels are transmitted by the base station to convey information to ALL MS in the cell Three different logical BCH exist:
Broadcast Control Channel (BCCH) conveys all information required by the MS to access and identify the network - transmitted in burst period 0 on only one (non-hopping) carrier in a cell Synchronisation Channel (SCH) contains the synchronisation burst when transmitted Frequency Correction Channel (FCCH) contains the frequency correction burst when transmitted
Access Grant Channel (AGCH) is used by BS to tell MS which DCH to use after it has sent a message over the RACH
Logical TCHs
TCH are also classified accord to the type of traffic that they are carrying The main ones are:
TCH/F : Full rate speech codec traffic channel (1 per burst period) TCH/H : Half rate speech codec traffic channel (2 per burst period) TCH/n : n (e.g. 9.6, 4.8) kbps data traffic channel (1 per burst period)
The Full Rate codec buffers 20 ms (160 samples) worth of 8kHz sampled speech and develops a mathematical model used to predict the 20 ms of speech The parameters of this model are encoded using 260 bits (every 20 ms yields 13 kbps)
MS software implements all three sub-layers but different devices in the networks implement the other end of the three network sub-layers
RR sub-layer has responsibility for management of radio features such as power control, timing advance, DTX, DRX and Handover
Call Handover
Fundamentally important function to support seamless terminal mobility Allows MS to continue a call in progress while moving between different cells in the network
Support of the call is handed over to a different BTS to ensure continuity of the call as the MS moves
The procedures and operation of handover are one of the most important function of the RR sub-layer Handover is normally by MS or MSC (to distribute traffic or loading more evenly in a cell or cell cluster)
An MS with a call in progress continuously monitors the strength (quality) of signals (in the BCH) received from up to 16 neighbouring cells List of the six best possible candidate cells for handover is transmitted to the BSC (and MSC) once every second MSC may initiate call handover under limited circumstances as a means of load or traffic balancing The four types of Handover involve transferring support of the call between:
Traffic channels in the same cell BTS controlled by the same BSC BTS controlled by different BSC but belonging to the same MSC BTS controlled by different BSC
Call Handover
Power Budget algorithm allows handover to initiated if the link (signal) quality can be maintained by another BTS at the same, or lower, power
Far more complicated to implement but much reduced co-channel interference implications
Mobility Management
Mobility Management uses the RR sub-layer (to maintain a signalling link) and its primary functions are to support :
terminal mobility aspects of security Authentication
Primary role is to support a mechanism by which the network knows the location of a poweredon MS in order to efficiently route calls to that mobile To this end, the network of cells is divided into location areas which are typically a group of cell clusters controlled by the same MSC
Location Updating
A powered on MS is informed of an incoming call by a signalling message This must be transmitted in the Paging channel of the cell the MS is in In practice it is transmitted in ALL the cells of the location area the MS in currently in
Smaller location areas result is much higher signalling traffic as MS move around Larger location areas result excessive paging of MS on incoming calls
Authentication Procedure
Authentication procedure carried out at beginning of each access by MS to network AuC and SIM implement the A3 authentication algorithm with the same random number generated by AuC Both entities carry out the algorithm with the subscribers secret key SIM transmits the result of the algorithm back to AuC which compares it to its own result to authenticate SIM access Secret key is stored on SIM and in AuC but NEVER transmitted
Communication Management
CM sub-layer is responsible for call control and supplementary and teleservice management Call Control (CC) responsibility relate to the establishment, invoking of additional services and releasing of a call Initiation of outgoing calls from mobile is easily handled by MSC\VLR using information regarding MS downloaded from HLR Routing of incoming calls to an MS needs to be examined in a little more detail
MS Terminated Call
A caller to an MS (from say a fixed network) dials the Mobile subscriber ISDN (MSISDN) number which has been allocated to that subscriber
Contains country code and national destination code (NDC) which identify mobile network Remaining digits identify the subscriber (and specifically their HLR)
MS Terminated Call
HLR interrogates the VLR where the MS is located over the SS7 signalling network which returns a (temporary) Mobile Station Roaming Number to the HLR This MSRN is returned to the GMSC and allows it to set up a speech circuit for the call as far as the MSC to which the VLR is attached When the call reaches that MSC, the VLR translates the received MSRN back to the IMSI of the destination MS The MSC then instructs the require BTS to page the MS in all the cells in its current location area
GSM Teleservices
Wide range of Teleservices
Telephony Group 3 Fax Service Voice\Fax Mail Short Messaging Service (SMS) Cell Broadcast Service (CBS)
Delivered over various speech and data bearer services Data services can be transparent or utilise a comprehensive data link layer protocol (Radio Link Protocol (RLP) Data\Fax services utilise a digital bearer service and hence do NOT have a modem at the MS
Network (MSC) requires a inter-working function (IWF) (i.e. a modem bank) to allow inter-working with non-ISDN terminals (e.g. PSTN)
Cell Broadcast
Uni-directional messaging service controlled by a Cell Broadcast Centre (CBC) Messages of up to 93 characters delivered to MS over signalling channel Messages can be broadcast to all the MS is specific geographic areas
Current data bearer services only offer up to 9.6 kbps HSCD allows a high speech data connection by allocating multiple (up to 7) burst periods on a carrier to an MS GPRS provides a high speed (> 100 kbps) packet switched service to MS by dynamically utilising unused burst periods over the air interface