Professional Documents
Culture Documents
ISDN
D Signaling B
Layer 2
Voice
Layer 1
Layer 1
Abis
Layer 3 Layer 2
RR LAPDm L1
LAPDm
Signaling SMS Voice
Layer 2
LAPDm
Provides: Segmentation and reassembly Frame filling; all layer one frames are of fixed length size depending on channel. Unacknowledge mode Acknowledge mode; window size = 1.
Transport of voice
GSM Source Coding (13 kb/s voice)
GSC
A-law
Layer 1
Cipher Radio
E1
E1
MS
BTS
BSC
Transparent data
Unrestricted Digital Information
UDI
Layer 1
Cipher Radio
E1
MS
BTS
BSC
MSC
IWF
Non-transparent data
Radio Link Protocol
UDI RLP Coding Coding Cipher E1 Radio TRAU E1 E1 E1 UDI RLP
Layer 1
Cipher Radio
MS
BTS
BSC
MSC
IWF
Abis
Layer 3 Layer 2
RR LAPDm L1
10
LAPDm
SAPI: 0 SAPI: 3
RA UI UI/I UI/I
UI UI/I Mux
UI/I
RACH
BCCH
SDCCH
FACCH
SACCH
PCH/ AGCH
11
LAPDm
UI-frames (Unnumbered Information) are unacknowldedge frames used for broadcasting and common control messages (who should acknowledge?). Also used by messages on the SACCH. I-frames (information) are acknowledged by the reciever. The window size is set to 1 so we only send one frame at a time. Used by SDCCH and FACCH (handover).
12
Layer 3 RR/MM/CM
CC MM RR
SAPI 0
GSM Network and Services 2G1723 Johan Montelius
SS
SMS
SAPI 3
13
14
Mobility Management
Attach and detach of subscribers (SIM). Localization of subscriber (paging) Location updating (mobile station is responsible). Authentication of subscriber. Confidentiality of subscriber allocating TMSI
16
Connection Management
Call Control establish and terminate calls call related supplementary services Supplementary Services call forwarding / barring Number identification Charging SMS Sending and receiving of short messages
GSM Network and Services 2G1723 Johan Montelius
17
How does the mobile identify himself? How do we know it's our assignment?
GSM Network and Services 2G1723 Johan Montelius
18
SDCCH
20
RR procedures handover
MS Handover Command Switch to new Channel Handover Access Handover Access Physical Information Handover Complete How does the new BSS know it's us??
GSM Network and Services 2G1723 Johan Montelius
21
RR procedures ciphering
MS Cipher Mode Command Start encryption Cipher Mode Compleet BSS SDCCH :
22
MM procedures authentication
MS Authentication Request BSS SDCCH
Authentication response Authentication is done by encrypting a challenge (RAND) with a shared key (Ki) and sending back the result (SRES)?
23
MM procedures confidentiality
MS TMSI reallocation Command TMSI Reallocation complete BSS SDCCH
24
MM procedures
Procedures are divided into: Common: can be performed anytime Specific: one at a time MM Connection Management: requests by CM procedures for establishment of services.
25
26
27
Incomming call
MS paging (PCH) channel req (RACH) assigned (AGCH) paging resp (SDCCH) auth req and resp (SDCCH) cipher setup (SDCCH) call setup (SDCCH) call connect (FACCH) talk (TCH)
GSM Network and Services 2G1723 Johan Montelius
28
BSS