Professional Documents
Culture Documents
It is Developed by Groupe Spéciale Mobile (founded 1982) which was an initiative of CEPT (Confederation
of European Posts and Telecommunications)
Under ETSI, GSM is named as “ Global System for Mobile communication “ in 1989
https://www.gsma.com/aboutus/history
BEARER SERVICES : Include various data services for information transfer between GSM and other networks
like PSTN, ISDN etc at rates from 300 to 9600 bps
Short Message Service (SMS) up to 160 character alphanumeric data transmission to/from the mobile terminal
Voice mailbox
Cell Radio
Mobile subscriber
A certain radio coverage area formed by a set of transceivers that connected to a set of antennas is called a CELL.
Macro Cell
● In the beginning , High-Power BTSs are adopted to provide services. The BTS covers a wider area , but its frequency utilization is not
efficient. So , it can only provide a few channels for subscribers.
Micro Cell
● Later the Low-Power BTS joins the system for getting a better service area with high capacity . At the same time it adopts the frequency
reuse technique to improve the efficiency of the frequency utilization and also the whole capacity of the network.
1) FDMA
2) TDMA and
3) CDMA.
Time
Time
Time
Uplink Downlink
DCS1800 systems use radio frequencies between 1710-1785 MHz for receive and
between 1805-1880 MHz for transmit.
RF carriers are spaced every 200 kHz, allowing a total of 373 carriers.
Transmit and receive frequencies are always separated by 95 MHz.
AUDIO QUALITY
Digital transmission of speech and high performance digital signal processors provide good quality speech transmission.
Since GSM is a digital technology, the signals passed over a digital air interface can be protected against errors by using better
error detection and correction techniques.
In regions of interference or noise-limited operation the speech quality is noticeably better than analogue.
SUBSCRIBER IDENTIFICATION
In a GSM system the mobile station and the subscriber are identified separately.
The subscriber is identified by means of a smart card known as a SIM.
This enables the subscriber to use different mobile equipment while retaining the same subscriber number.
The radio carriers available are allocated according to a regular pattern which repeats over
the whole coverage area.
The pattern to be used depends on traffic requirement and spectrum availability.
Some typical repeat patterns are 4*3,4*12, 7*21etc.
The different Subscribers can use the same frequency in different places.
The quality of communication must be ensured.
BSC
MS HLR/AUC
BTS
PCU
SS
7
BSC SMS system
MS
BTS
GPRS Backbone Internet,
SGSN Intranet
GGSN
OMC CG BG
Other PLMN
PCU
SS
Gb 7
BSC SMS system
MS Um Gr/Gs/Gd/Ge Gc
BTS
GPRS backbone Internet,
SGSN Gi Intranet
Ga GGSN
OMC CG BG
Gp Other PLMN
NAME INTERFACE
Um MS ----- BTS
Abis BTS ----- BSC
Ater BSC ----- TRC
A MSC ------ BSC
B MSC ------ VLR
C MSC ------ HLR
D VLR ----- HLR
E MSC ------ MSC
F MSC ------ EIR
G VLR ------ VLR
H HLR ------ AUC
NCC BCC
BSIC
CC NDC SN
National (significant)
Mobile number
Mobile station international
ISDN number
3 digits 2 digits
IMEI
Maintaining the traffic connection with a moving subscriber is made possible with the help of the handover function. The basic
concept is simple: when the subscriber moves from the coverage area of one cell to another, a new connection with the target
cell has to be set up and the connection with the old cell has to be released.
There are two reasons for performing a handover:
1. Handover due to measurements occurs when the quality or the strength of the radio signal falls below certain
parameters specified in the BSC. The deterioration of the signal is detected by the constant signal measurements
carried out by both the mobile station and the BTS. As a consequence, the connection is handed over to a cell
with a stronger signal.
2. Handover due to traffic reasons occurs when the traffic capacity of a cell has reached its maximum or is
approaching it. In such a case, the mobile stations near the edges of the cell may be handed over to
neighboring cells with less traffic load.
Inter cell - Inter BSC handover Inter cell - Inter MSC handover
Effects of Interference
Interference is a major limiting factor in the performance of cellular systems.
It causes degradation of signal quality.
It introduces bit errors in the received signal.
Bit errors are partly recoverable by means of channel coding and error correction mechanisms.
The interference situation is not reciprocal in the uplink and downlink direction.
Mobile stations and base stations are exposed to different interference situation.
Source of Interference
Another mobile in the same cell.
A call in progress in the neighboring cell.
Other base stations operating on the same frequency.
Any non-cellular system which leaks energy into the cellular frequency band.
Adjacent-Channel Interference
Interference resulting from signals which are adjacent in frequency to the desired signal is called adjacent channel interference.
Adjacent channel interference results from imperfect receiver filters which allow nearby frequencies to leak into the passband.
Adjacent channel interference can be minimized through careful filtering and channel assignments.
By keeping the frequency separation between each channel in a given cell as large as possible , the adjacent interference may be reduced considerably.
Uplink
Physical channel - Each timeslot on a carrier is referred to as a physical channel. Per carrier there are 8 physical
channels.
Logical channel - Variety of information is transmitted between the MS and BTS. There are different logical channels
depending on the information sent. The logical channels are of two types
• Traffic channel
• Control channel
0 1 2 3 4 5 6 7 0 1 2 3
Timeslot The
Theinformation
informationcarried
carriedininone
onetime
time
slot
slotisiscalled
calledaa“burst”
“burst”
• Uplink only
• Used by the MS to access the Network.
• Downlink only
• Used by the network to assign a signaling channel upon
successful decoding of access bursts.
• Downlink only.
• Used by the Network to contact the MS.
CCH
RACH CCCH
SDCCH
SACCH DCCH DCH
FACCH
TCH/F
TCH
TCH/H
FCCH
BCCH SCH
CCH BCCH
PCH
CCCH
AGCH
SDCCH
DCCH SACCH
DCH FACCH
TCH/F
TCH
TCH/H
Burst Types:
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0.577ms
0.546ms
3 57 bits 26 bits 57 bits 3
• Carries traffic channel and control channels BCCH, PCH, AGCH, SDCCH, SACCH and
FACCH.
Tail bits - Used to indicate the start and end of each burst. Three bits always 000.
Guard period - 8.25 bits long. The receiver can only receive and decode if the burst is received within the timeslot designated for it.
Since the MS are moving. Exact synchronization of burst is not possible practically. Hence 8.25bits corresponding to about 30us is
available as guard period for a small margin of error.
Flag bits - This bit is used to indicate if the 57 bits data block is used as FACCH.
Training Sequence - This is a set sequence of bits known by both the transmitter and the receiver( BCC of BSIC). When a burst of
information is received the equalizer searches for the training sequence code. The receiver measures and then mimics the distortion
which the signal has been subjected to. The receiver then compares the received data with the distorted possible transmitted sequence
and chooses the most likely one.
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0.577ms
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0.577ms
0.546ms
3 142 bits 3
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0.577ms
0.546ms
3 39 bits 64 bits 39 bits 3
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0.577ms
0.546ms
3 57 bits 26 bits 57 bits 3
Layer 3
Layer 2
Layer 1
TDMA/FDMA
GMSK
Connection-based Network
Traffic
Signaling and Control
Signaling and control data are conveyed through Layer II and
Layer III messages in GSM
Purpose of Layer II is to check the flow of packets for Layer III
DLL checks the address and sequence # for Layer III
Also manages Acks for transmission of the packets
- Security involves the authentication of the mobile, to prevent unauthorized access to the network, as well as the encryption of all radio link traffic.
- The protocols in the MM layer involve the SIM, MSC, VLR, and the HLR, as well as the AuC (which is closely tied with the HLR).
The first phase of GSM network architecture enhancements that allow mobiles to connect to IP or X.25 networks.
Characteristics of GPRS:
Packet-switched
Data rate: 9Kbps ~ 150Kbps
New functionalities: point-to-point data transferring, routing, logical link management, radio resource
management
Modulation: GMSK
Characteristics
Uses 200kHz carrier/multi-slot operation, time slot structure
Modulation: 8PSK(8-phase Shift Keying) modulation(3bits per modulated symbol) <-> apposed to the 1-bit
per symbol GMSK in GSM/GPRS
Data rates: 384Kbps
IMSI Attached
IMSI Detached
Normal Location Update
Periodic Location Update
Mobile Originated Sequence
Mobile Terminated Sequence
SIGNALING LINK
ESTABLISHED
Channel request
2 REQ. FOR SERVICE
3 AUTHENTICATION
6 COMPLETE CALL
Speech Started
BILLING STARTS
5 Page
Paging Request <PCH>
TMSI) TMSI) LAI & TMSI)