Professional Documents
Culture Documents
DUPLEXING
Duplexing is the technique by which the send and receive paths are separated
over the medium.
Different Frequencies are used for send and receive paths and hence there will be a forward
band and reverse band
Duplexer is needed if simultaneous transmission(send) and reception methodology is adopted
Frequency separation between forward band and reverse band is constant
Time Division Duplexing (TDD)
TDD uses different time slots for transmission and reception paths
Single radio frequency can be used in both the directions instead of two as in FDD.
No duplexer is required, Only a fast switching synthesizer,RF filter path and fast antenna switch
are needed. It increases the battery life of mobile phones
FDMA Analogy
If the intended listener is close enough, the speaker may decide to whisper.
Conversely, if the listener is too far away, the speaker may have to shout. Since no
one else should be talking, this presents no problem. If someone talks out of turn, the
listener will probably be confused and not be able to understand either speaker.
TDMA was the first digital standard to be proposed, and a smooth transition
took place between analog mobile systems to digital mobiles, by allowing
simultaneous existence of analog and digital base stations.
Features of TDMA
There can be only one carrier in the medium at any time, if a simple TDMA scheme is followed.
Transmission is in bursts and hence is well suited for digital communication.
Since the transmission is in bursts, Battery life is extended.
Transmission rate is very high compared to analog FDMA systems .
Precise synchronization is necessary.
Guard time between slots is also necessary
TDMA Analogy
In TDMA, everyone in the room agrees to watch a clock on the wall, and speak
only during a particular time. Each person wishing to talk is given a set period of
time, and each person listening must know what that time period will be. For
example, everyone may agree on time slots with a duration of ten seconds. Speaker
number one may talk for ten seconds starting from the top of the minute.
The listener who wishes to hear this speaker must also be made aware of the
schedule, and be ready to listen at the top of the minute. Speaker number two may
speak only from ten seconds after the minute until twenty seconds after. As with
FDMA, only one person at a time may speak, but each speaker's time is now limited
and many persons may take their turn. If someone in the room cannot see the clock,
they will not be able to speak and will have great difficulty understanding the
speakers.
CDMA is fundamentally different than TDMA and FDMA. Where FDMA and TDMA
transmit a strong signal in a narrow frequency band, CDMA transmits a relatively
weak signal across a wide frequency band. Using a technique called direct sequence
spread spectrum, the data to be transmitted are combined with a pseudo-noise code
(a pre-determined binary sequence that appears random) and transmitted broadband.
CDMA under Interim Standard 95 uses a bandwidth of 1.25 MHz.
The pseudo-noise code (PN code) is a series of binary "chips" that are much
shorter in duration than the data bits. Since the chips appear to be in a random
pattern, and there are many chips per data bit (in IS-95 there are 128 chips for each
data bit), the modulated result appears to normal (FDMA) receivers as ba ckground
noise.
A spread spectrum receiver with a different PN code will not be able to recover
that signal, and if the PN codes were chosen incorrectly, will hear nothing but noise.
This relative immunity to interference, whether from outside sources or other spread
spectrum transmitters, gives CDMA systems the ability to pack many users into the
same frequency space at the same time. It also gives a measure of security to each
signal, since each user will have a different PN code. CDMA also does not requi re
different base station radios for each user - the same radio may serve multiple users
with just a change in PN code.
Even though multiple access techniques allowed multiple users to share the
medium simultaneously, due to constraints in providing resources, an amount of
blocking will exist. The amount of blocking is called “Grade Of Services”(GOS).
GOS is a measure of the probability that a percentage of the offered traffic will be
blocked or delayed. It is commonly expressed as the fraction of calls or demands that
fail to receive immediate service. The aim is to achieve the GOS equal to 0
Based on GOS and resource availability (no. of carriers/no. of timeslots/both) the
traffic handling capacity of the system is calculated. If this total traffic is divided by
traffic per subscriber, we get number of subscribers supported by the system. For
these purposes Erlang B table (Blocking calls cleared ) is useful.
cellular Concepts - What is a cell?
Cell is the basic geographic unit. They are base stations transmitting over that
small area. Cells are usually represented on paper as hexagon. In reality the shape is
not so because of the landscape and man-made structures. The base stations can be
employing omni directional or directional antenna.
Cell size depends on sub density and demand in that given area. To start with
cell can be of maximum size 30Km radius and subsequently can be split into smaller
cells. Usually in rural areas the cells are big and in urban will be smaller.
Cellular Concepts
Macro cells
Micro cells
Selective cells
Umbrella cells
Macrocells
The macrocells are large cells for remote and sparsely populated areas.
Microcells
These cells are used for densely populated areas. By splitting the existing areas
into smaller cells, the number of channels available is increased as well as the
capacity of the cells. The power level of the transmitters used in these cells is then
decreased, reducing the possibility of interference between neighboring cells.
Cellular Concepts
Selective Cells
It is not always useful to define a cell with a full coverage of 360 degrees. In
some cases, cells with a particular shape and coverage are needed. These cells are
called selective cells. A typical example of selective cells is the cells that may be
located at the entrances of tunnels where a coverage of 360 degrees is not needed. In
this case, a selective cell with a coverage of 120 degrees is used.
Umbrella cells
The cells in the adjacent clusters using the same set of frequencies are called
co- channel cells. The interference depends on the reuse distance between them
Cellular Concepts
N Q= 3N
1 1.73
3 3.00
4 3.46
7 4.58
9 5.20
12 6
Higher value of Q is achievable in big cluster size. But more no.of cells lead to
less RF bandwidth per cell and hence less traffic handling capacity.
Lesser value of Q in small cluster size leads lesser number of cells per cluster and
more number of RF channels per cell and hence more traffic handling capacity.
Introduction
The GSM network is shown in the figure with the major interfaces indicated as
Um, Abis and A
GSM Interfaces
Abis
This is a BSS internal interface linking the BSC and a BTS, and it has not been
standardised. The Abis interface allows control of the radio equipment and radio
frequency allocation in the BTS.(2M link)
A interface is between the BSS and the MSC. The A interface manages the
allocation of suitable radio resources to the MSs and mobility management. (2M link
CCS7)
Physical Channel
The carrier number and the repetitive time slot number determine Physical
Channel (e.g.) time slot 3 on carrier number 4. The duration of timeslot in GSM is 577
micro secs (15/26 ms). The transmission is digital and is in bursts and hence in GSM,
physical channel, timeslot and burst refer to the same.
Logical Channel
Traffic channels are used to send data or services. Once the call set up
procedures are completed on the control channels, MS tunes to a traffic physical
channel. It uses the Traffic Channel logical channel. Traffic channel carries speech or
data traffic.
There are enhanced full rate coders, (12.2Kbps) which improve the speech
quality but still occupy one full rate TCH. Data rates supported by speech coders: A
full rate traffic channel can support data rate of 9.6Kbps and a half rate channel 4.8
Kbps.
GSM, one time slot duration is 0.577ms(15/26ms). One TDMA frame carries 8
timeslots and hence duration of one frame is 4.612ms.
GSM Bursts
Burst is the content of the timeslot. The duration of timeslot is 577 micro secs.
It consists of usable bits and guard period. The burst are classified into.
Normal Burst
Dummy Burst
Frequency Control Burst(F-Burst)
Sync Burst(S-Burst)
Access Burst
F-Burst is associated with FCCH, S-burst with SCH and Access Burst with RACH.
All other logical channels use normal burst. Dummy Burst is used to fill the empty
physical channel in TS0 in BCCH carrier, if necessary.
Normal Bursts
It consists of 148 usable bits and guard period corresponding to 8.25 bits.(30.5
micro secs).
Burst period= time slot duration- guard period= 577-30.5 =546.5 micro secs.
It consists of three tail bits each at the beginning and end, encrypted data bits
57 each as two blocks and a midamble of 26 bits as training sequence, a known
pattern used for adoptive equalization at BTS and MS. The flag bits are used to
indicate whether the particular block of 57 bits belong to TCH or FACCH during pre -
emption.
The different logical channels are used to take MS from “Off mode” to “Idle
mode” and then to “Dedicated mode”.
Off Mode
Idle Mode
Dedicated Mode
A bis Interface
It is connectivity between BSC to BTS and 2 Mbps link is established for this
purpose. Every timeslot of 64Kbps can be sub divided into four 16 Kbps and the traffic
of 13Kbps from BTS with the associated signaling information is multiplexed as
16Kbps and inserted in the timeslots. Hence each timeslot on 2Mbps Abis can
accommodate four physical channels of Um. For one carrier we need two slots.
Additionally we require exclusive timeslots for signaling purposes related to the
transceivers of each sector (TRX) and for O andM purposes.
Consider a BTS with three sectors with 4 Carriers in each sector (4/4/4), then
the timeslot calculations are as follows:
In each sector each TRX needs 2 slots. Hence four TRXs need 8 slots. We need
one slot for TRXs signaling purposes and one for O and M purposes in that sector.
Three sectors need 30 slots and TS0 is reserved for FAW and the total comes
31. With one spare timeslot added it tallies to 32 slots of 2Mbps link. Hence one
2Mbps link to BTS can take a maximum load until the BTS reaches a configuration
4/4/4
Introduction
BTS and MS are connected through radio link this air interface is called Um. A
radio wave is subject to attenuation, reflection, Doppler shift and interference from
other transmitter. These effects causes loss of signal strength and distortion which
will impact the quality of voice or data. To cope with the harsh conditions, GSM make
use of an efficient and protective signal processing. Proper cellular design must
ensure that sufficient radio coverage is provided in the area.
The signal strength variation for mobile is due to different types of signal
strength fadings.
Macroscopic Variations
Due to the terrain contour between BTS and MS the fading effect is caused by
shadowing and diffraction (bending) of radio waves.
Microscopic variations
where n is typically 4.
The other macroscopic component is a Log normal random variable which takes
into account the effects of shadow fading caused by variations in terrain and other
obstructions in the radio path. Local mean value of path loss=deterministic
component+ log normal random variable
Microscopic Variations
Microscopic Variations or Rayleigh Fading occur as the mobile moves over short
distances compared to the distance between mobile and base. These short term
variations are caused by signal scattering in the vicinity of the mobile unit e.g. by hill,
building or traffic. The result is that not one but many different paths are followed
between transmitter and receiver (Multipath Propagation). The reflected wave will be
altered in both phase and amplitude. The signal may effectively disappear if the
reflected wave is 180 degree out of phase with the direct path signal. The partial out
of phase relationships among multiple received signal produce smaller reduction in
received signal strength.
Reflection and multipath propagation can cause positive and negative effects.
Coverage Extension
Multipath propagation allow radio signal to reach behind hills , buildings and
into tunnels.
Signals received through multi paths may add together or destroy each other
Transmitting/Receiving Processes
Coding
Coding is the information processing that involves preparing the basic data
signals so that they are protected and put in a form that the radio link can handle.
Generally the coding process includes the Logical Gate exclusive OR(EXOR).
Coding is included in :
Waveform coding
Parameter Coding
: Only a very limited quantity of information is sent.A decoder built up according to
the speech production model will regenerate the speech at the receiver.Only 1 to
3kbps is required for the speech transmission. The regenerated speech is intelligible
but it suffers from noise and often the speaker cannot be recognised.
Hybrid Coding
: Hybrid Coding is a mix of waveform coding and parameter coding.It combines the
strong points of both technique and GSM uses hybrid coding technique called RPE-
LTP(Regular Pulse Excited-Long Term Prediction) resulting in 13Kbps per voice
channel.
The 64kbits/s PCM transcoded from the standard A-law quantized 8bits per
sample into a linearly quantised 13bits per sample bit stream ,that correspond to a
104kbits/s bit rate. The 104kbits/s stream is fed into the RPE-LTP speech encoder
which takes the 13 bits samples in a block of 160 samples (every 20ms). RPE-LTP
encoder produces 260bits in every 20 ms, resulting in a bit rate of 13kbits/s. This
provides a speech quality acceptable for mobile telephony and comparable with
wireline PSTN phones.In GSM 13Kbps speech coding is called full rate and
alternatively half rate coders(6.5Kbps) are also available to enhance the capacity.
Channel coding in GSM uses the 260 bits from speech coding as input to
channel coding and outputs 456 encoded bits. Out of the 260 bits produced by RPE-
LTP speech coder, 182 are classified as important bits and 78 as unimportant bits.
Again 182 bits are divided into 50 most important bits and are block coded into 53
bits and are added with 132 bits and 4 tail bits, totaling to 189 bits before undergoing
1:2 convolutional coding, converting 189 bits into 378 bits. These 378 bits are added
with 78 unimportant bits resulting in 456 bits.
Encryption /Ciphering
Every transmission from mobile/BTS must include some extra information along
with basic data. In GSM a total of 136 bits per block of 20ms are added bringing the
overall total to 592 bits. A guard period of 33 bits is also added bringing 625 bits per
20ms.
Modulation
Modulation is the processing that involves the physical preparation of the signal
so that the information can be transported on a RF carrier. GSM uses Gaussian
Minimum Shift Keying technique (GMSK). Carrier frequency is shifted by +/ - B/4 ,
where B=Bit rate. However using the Gaussian filter reduces the bandwidth to 0.3
instead of 0.5.
MOBILITY MANAGEMENT
Network Attachment
The process starts when the mobile station is switched on, and ends when the
mobile station enters the idle mode. In idle mode the mobile station does not have a
traffic channel allocated to make or receive a call, but the Public Land Mobile
Network(PLMN) is aware of the existence of the mobile station within the chosen cell.
Automatic Mode
In automatic mode the mobile station will choose which PLMNs to try all by
itself. The automatic mode is based on the existence of the preferred list,which is
stored in a non-volatile memory in the SIM.This list includes a number of PLMN
identities in order of performance and is under control of the user.The most preferred
is usually the home PLMN.The list is filled in by the user through a mechanism to be
specified by the mobile station manufacturer.The automatic mode is normally used
when the mobile station operates on its home PLMN(that is the PLMN the mobile
station subscribed to)
Manual Mode
In manual mode the user is presented a list containing all found PLMN's.The
user chooses one of the PLMN's from the list.
A page message it broadcast which contains the identification code of the MS.Not every Base
Station Controller(BSC) in the network is requested to transmit the page message. The broadcast
limited to a cluster of radio cells that together form a location area.The last reported position of
the MS identifies the location area to be used for the broadcast.
The MS monitors the page message transmitted by the radio cell in which it is located and,on
detecting its own identification code,responds by transmitting a page response message to the
Base Transceiver Station(BTS).
Communication is then established between the MSC and the MS via BTS that received the page
response message.
Network Configuration
PLMN area
Location area
MSC area
VLR area
PLMN Area
A PLMN area is the geographical area in which land mobile communication
services are provided to the public by a particular PLMN operator.From any
position within a PLMN area,the mobile user can set up calls to another user of
the same network,or to a user of another network.The other network may be a
fixed network,another GSM PLMN,or another type of PLMN.Users of the same
PLMN or users of other networks can also call a mobile user who is active in the
PLMN area.When there are several PLMN operators,the geographical areas
covered by their networks may overlap.The extent of a PLMN area is normally
limited by national borders.
The MS detects that it has entered a new Location Area and transmits a Channel Request
message over the Random Access Channel(RACH)
Once the BSS receives the Channel Request message,it allocates a Stand-alone Dedicated
Control Channel(SDCCH) and forwards this channel assignment information to the MS over the
Access Grant Channel(AGCH). It is over the SDCCH that the MS will communicate with the BSS
and MSC.
The MS transmits a location update request message to the BSS over the SDCCH.Included in
this message are the MS Temporary Mobile Subscriber Identity(TMSI) and the old Location Area
Subscriber(oldLAI).The MS can identify itself either with its IMSI or TMSI.In this example we will
assume that the mobile provided a TMSI.The BSS forwards the location update request message
to the MSC
The VLR analyzes the LAI supplied in the message and determines that the TMSI received is
associated with a different VLR(old VLR).In order to proceed with the registration.The IMSI of the
MS must be determined.The new VLR derives the identity of the old VLR by using the received
LAI,supplied in the location update request message. It also request the old VLR to supply the
IMSI for a particular TMSI
Hand Over
The process of automatically switching a call in progress from one traffic
channel to another to neutralise the adverse effects of the user movements.
Hand over process will be started only if power control is not helpful anymore.
The Hand Over process is MAHO(Mobile Assisted Hand Over).It starts with the
Down Link Measurements by the MS(Strength of the signal from BTS,Quality of
the signal from BTS).MS can measure the Signal Strength of the 6 best
neighboring BTS down link(candidate list)
CALL MANAGEMENT
Phases of Mobile To Land Call . The following table lists the phases of a Mobile
To Land Call
Routing Analysis :the MS terminated call is routed to the visited MSC using information from HLR
and VLR
Paging :the MSC initiates a communication with the MS
Authentication :the MSC/VLR requests the ACC for authentication parameters.Using these
parameters the MS is authenticated
Ciphering :using the parameters which were made available earlier during the authentication the
uplink and the downlink are Ciphered
Equipment Validation : the MSC/VLR requests the EIR to check the IMEI for validity.
Call setup :the MSC establishes a connection to the MS
Handover(s)
Call release :the speech path is released.
The mobile-to-mobile call is established using the same phases as seen earlier
The originating mobile part where the phases are the same as those of a mobile-to-land call
except that the call setup phase is partially performed.Which means that only the call setup with
Mobile is done
The terminating mobile part consist of the same phases as the land-to-mobile call scenario
except again that the call setup phase performs only the call setup with mobile
Originating Mobile
The Phases of Originating Mobile
Routing Analysis,Paging,Authentication(optional),Ciphering(optional),Equipment
validation(optional),call setup,release
END