Professional Documents
Culture Documents
Chapter 5
Chapter 5
Chapter 5
GSM Cellular System
5.1 Introduction
Old mobile communication systems, usually called “first generation
mobile systems”, used analog systems. They have some drawbacks such
as low capacity, inefficient use of the frequency spectrum, lack of
security, inflexibility and lack of international roaming. The AMPS
cellular service has been available in the United States to the public since
1983. Systems similar to AMPS were soon deployed internationally. The
development of low-rate digital speech coding techniques and the
continuous increase in the device density of integrated circuits have made
completely digital second-generation systems viable. The “second
generation mobile systems” are designed and use digital systems, with all
the inherent advantages of the digital systems compared to analog
systems. Digital systems can support more users per base station per MHz
of spectrum than analog systems, allowing wireless system operators to
provide service in high density areas more economically. To meet the
growing need to increase cellular capacity in high-density areas different
standardization bodies developed their own standard:
• The Electronic Industries Association (EIA) and the Telecommunications
Industry Association (TIA) in the USA adopted the IS-54 standard (D-
AMPS) and later on the CDMA IS-95 standard.
• The European Telecommunications Standards Institute (ETSI) adopted
the GSM standard.
The “third generation mobile systems” are the integration of all kinds of
wireless systems into one universal mobile telecommunication system.
Work is continuing in the European research consortium, Race, and in
ESTI towards developing UMTS (Universal Mobile Telecommunication
System) on a joint European basis. At the same time, the ITU is working
globally towards IMT-2000(International Mobile Telecommunication-
2000) with mutual agreement and information exchange. Technically,
these systems by offering bandwidths of more than 2 Mb/s, open new
possibilities for additional services in mobile communication networks,
such as full motion picture transmission.
83
Chapter 5, GSM Cellular System
OMS
MS BSS SS
84
Chapter 5, GSM Cellular System
- The MSC coordinates call set-up to and from GSM users. An MSC
controls several BSCs.
- The IWU is a gateway for MSC to interface with external networks for
communication with users outside GSM, such as packet-switched
public data network or circuit switched data network.
- The HLR is a database which contains subscriber's information and
information related to its current location (not the actual one). The
HLR also contains the authentication center (AUC), which manages
the security data for subscriber authentication, and the equipment
identity register (EIR) which stores the data of mobile equipment.
- The VLR is a subscriber's database concerned with the subscribers in
its area of service (which consists of a number of location areas
comprising many cells). Every time an MS registers itself in the VLR
area, the VLR updates itself from the HLR with the information
relevant to this subscriber. The VLR besides contains more detailed
information about subscribers location.
- The GMSC is the gateway to the whole public land mobile network
(PLMN). It is concerned with the routing of incoming calls to MS.
Actually, GMSC is a function implemented into a normal MSC and
sometimes more than one MSC, as the network implies.
AUC
GIWU MSC/VLR
85
Chapter 5, GSM Cellular System
Subscription Network
management SS operation and
and charging maintenance
BSS
Mobile
equipment MS
management
In GSM there are two types of channels: physical channels and logical
channels.
The time slots are called the physical channels on the GSM interface.
Transmission of the TDMA frames on air is synchronized and follows a
86
Chapter 5, GSM Cellular System
Logical channels
TCH CCH
At the beginning only full rate channel exists where speech coding of 13
k bit/sec is augmented to 22.8 k bit/sec through channel coding. This
information is transmitted on one time slot each frame. Now when speech
coders of 6.5 k bit/sec rate and of toll quality, has been achieved, the half
rate traffic is also deployed. The half rate traffic channels are used by
87
Chapter 5, GSM Cellular System
altering traffic from two subscribers on the same time slot. Thus doubling
the system capacity is obtained.
Notice
- Each BTS is assigned a number of carriers numbered C0, C1, C2, … Cn.
The carrier frequency C0 is used to carry BCCH and is thus called
BCCH carrier, and it works at full permissible power.
88
Chapter 5, GSM Cellular System
89
Chapter 5, GSM Cellular System
They are used either for call set up procedures or for special signaling
required during the call. There are three types of DCCH channels.
- On the up link the MS informs the BS about its own output power level
and the measured received RF signal strength and the quality of the
signals from adjoining cells. Also the MS location is updated.
90
Chapter 5, GSM Cellular System
Each time slot is composed of 156.25 bits with bit duration of 3.69 µs
which renders the time slot or burst period equal to 0.577 m sec.
TB Flag Flag TB
3 57 Encrypted bits 1 26 training bits 1 57 Encrypted bits 3 Guard 8.25
TB TB
3 Fixed Bits 142 3 Guard 8.25
92
Chapter 5, GSM Cellular System
TB TB
3 Encrypted sync bits Training sequence Encrypted sync bits 3 Guard 8.25
39 64 39
TB TB
8 Sync. Sequence 41 Encrypted bits 36 3 Guard 68.25
TB Flag Flag TB
3 57 information 1 26 training sequence 1 57 information 3 GP 8.25
bits bits
Note:
The long guard period (68.25 bits = 252 µ sec) provided in the access
burst guarantees that the signals from all mobiles in a cell reach the base
station without overlapping. In GSM cells of coverage distance up to 35
km are allowed, where the round trip from the BS to the MS and back
again is 233.3 µ sec. This long guard period is needed when the MS
attempts its first access to the BS or after a hand over has occurred.
93
Chapter 5, GSM Cellular System
94
Chapter 5, GSM Cellular System
F S BBBBC CC C F S C C C CC C C C F S C CC C C CC C F S C C C CC C C CF S CCCCC CC C I
0 10 20 30 40 50
Down link logical channels mapping
R R RRRRR RR R R RR R R RR R R RR R R RR R R RR R R RR R R RR R R RR R RRRRR RR R R
0 10 20 30 40 50
Uplink logical channels mapping
Figure (5.11) shows the mapping where 8 SDCCH channels together with
their associated 8 SACCH’s and 6 idle bursts occupy TS1 of 102
consecutive frames. The cycle repeats again and again. The symbols DX
and AX signify that the mobile “X” uses the SDCCH number DX for
setting up a call or updating location or exchanging system parameters
with the GSM PLMN and the SACCH for exchanging control signaling
such as power regulations. After the mobile “X” has been transferred to a
TCH to start a call it releases this channel which becomes available for
other mobiles use.
.
D0 D1 D2 D3 D4 D5 D6 D7 A4 A5 A6 A7 I I I
End of
Cycle
Figure 5.1 Mapping of SDCCH + SACCH on TS1
It is to be noticed that both up link and down link mapping are the same.
Also, eight SDCCHs are laid on one TS (TS1) because the bit rate during
call set-up and registration is quite low.
By now TSO and TS1 on Co are mapped by the logical control channels,
leaving TS2 → TS7 free for use as traffic channels.
TCH are followed by one SACCH, 12 TCH and one idle channel
constitute the traffic multi-frame. The TCH contains encoded speech or
data. The SACCH controls signaling, e.g. order for power output change.
On the up link the same mapping is used with an offset in time, i.e. TS(i)
on the down link does not occur at the same time as TS(i) on the up link.
An offset of three TS’s is managed between the two as shown in Figure
(5.13).
T T T T T T T T T T T T S T T T T T T T T T T T T I
0 10 20
0 1
Downlink BS to MS
C transmissi
on
MS to BS
Uplink Co transmissi
on
0 1
offset
TDMA frame no.
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 ↓
↓ ↓
↑ ↑ ↑
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
96
Chapter 5, GSM Cellular System
TDMA-frame
T T T T T T T T T T T T A T T T T T T T T T T T T I
26 frames = 120 ms
Multi-frame for full-rate channel
0: T T T T T T A T T T T T T
1: T T T T T T T T T T T T A
Multi-frame for half-rate channels MS0 and MS1
97
Chapter 5, GSM Cellular System
The receiver in either MS or BTS has the block diagram shown in Figures
(5.15),(5.16), where the blocks do the inverse processing of signals
compared to those of the transmitter.
The PCM signal used in telephony which achieves a good quality has a
bit rate 64 kbit/sec. When 8 such signals are time division multiplexed,
the resultant signal will have a bit rate equal to 8 x 64 = 512 kbit/sec. The
bandwidth required to transmit this signal depends on the type of
modulation used. As was mentioned before the RF carriers are separated
by 200 KHz, which implies the use of lower bit rate speech coders.
98
Chapter 5, GSM Cellular System
Antenna
Duplexer
Transmitter Receiver
Modulator Demodulator
33.8Kb/s
Burst Viterbi
formating Equalizer
Ciphering
interleaver De-ciphering
22.8Kb/s De-interleaver
Channel Viterbi
coding Decoding
13Kb/s
Speech Speech
coding Decoding
104Kb/s
A/D converter D/A converter
Microphone Speaker
99
Chapter 5, GSM Cellular System
Antenna
Duplexer
Transmitter Receiver
Modulator Demodulator
33.8Kb/s
Burst Viterbi
formating Equalizer
Ciphering
Interleaver De-ciphering
22.8Kb/s De-interleaver
Channel Viterbi
coding Decoding
13Kb/s
Speech Speech
coding Decoding
13 bits
8 KHz Receiving part
D/A converter
8 KHz
8 bits
64 Kbit/s PCM
Transmitting part
The speech coder used in GSM is of the hybrid type and is called Regular
Pulse Excited Speech coder. It works at 13 kb/sec rate (260 bit/20 m sec
speech segment). Details of speech coding will be studied later.
The importance of bits comes from the effect of its loss on the reproduced
speech quality at the decoder. Referring to Figure (5.17), it can be seen
that the 50 very important bits are block coded resulting in 53 bits (50
original bits + 3 parity bits). These 53 bits together with the 132
important bits and 4 tail bits are fed to convolution coder and encoded to
378 bits (rate 1:2). The resulting bit blocks are concatenated with the
remaining unprotected 78 bits and thus a final block results with length
456 bits. Through convolution coding some errors can be corrected. After
convolution decoding the block coded part can be detected whether the
information is too damaged to use, where in this case it will be ignored
(very important bits are erroneous).
101
Chapter 5, GSM Cellular System
132 78
50
Important bits Least important bits
Most important bits
Block Coding
Block Coding
378 bits
Channel coding for data and control channels are left for the student self
study. The effect of using GSM and channel coding on the BER
performance of the mobile system is shown in Figure (5.18).
100
Post-Decoding BER
10-1
10-2
10-3
No Channel Coding
10-4
10-5
GSM
-6
10
0 10 20 30 40 50
E /N (dB)
b o
Returning back to Sec. (5.4.4.1), it was mentioned that the normal burst is
mapped with two 57 coded bits. If these two 57 bits are taken from the
same speech frame (20 m sec length) then a loss of the burst would result
in a loss of 25% of the information bits. A second level of interleaving is
applied where the 57 bit blocks from two speech frames are interleaved
with each other as shown in Figure (5.20). This reduces the loss in
information bits to 12.5% due to the loss of a burst. Interleaving is very
103
Chapter 5, GSM Cellular System
effective for data transmission but not effective for voice transmission as
it operates in real time and a long delay in response cannot be tolerated.
Delay = 8 x 4.615 ms=36.92 ms.
A/8
A/8
A/8
A/8
B/8 A/8
B/8 A/8
B/8 A/8
B/8 A/8
C/8 B/8
C/8 B/8
C/8 B/8
C/8 B/8
D/8 C/8
D/8 C/8
D/8 C/8
Figure 5.20 Second level of interleaving
5.5.4 Modulation
The bursts of bits are modulated on the RF carrier using the Gaussian
Minimum Shift Keying (GMSK), which is a digital phase modulation
technique with a constant envelope, and the resulting bandwidth is
narrower than the ordinary MSK. This modulation system proves to be
robust against signal fading and interference while maintaining good
spectral efficiency.
happened to be in a deep fade, the next burst most probably will not be, as
long as the hopping is carried out to a frequency sufficiently far from the
present one and thus having a differently fading envelope. It is to be
noticed that frequency hopping reduces the amount of time spent by the
MS in a fade to 4.615 ms (the duration of a TDMA burst). The GSM
specifies a slow frequency hopping (217 hops/sec). A set N of RF
channels called mobile allocation are assigned for use in MS hopping
sequence. The set is limited to 1≤ N ≤ 64 channels out of the 124
legitimate GSM channels. Further details on frequency hopping will be
given later.
For the MS there are four transmitted power classes only: 2, 5, 8 and 20
W. The power of the MS is adaptive and dictated by the BS, to reduce the
co-channel interference while maintaining the quality of the radio
channel. Reducing the MS transmitted power saves power consumption
which is important for hand-held mobile stations [3].
For the MS, there are 16 different power control levels with 2 dB spacing
between adjacent steps. The lowest power class is 13 dBm (20 mW), and
the highest power level is equal to the maximum peak power
corresponding to the class of the MS.
In the BS’s the same 16 steps of 2 dB spaced power levels are provided to
achieve adaptive RF power control. The output power of a BS is
controlled by the network manager to adjust the radio coverage by the
BS.
adjacent cells and sends these information to the serving BS via the
SACCH. This operation is repeated for every new SACCH multi-frame of
480 ms duration. The BS evaluates the average of the measurements for
at least 32 measures over a time duration 32 x 480 m sec ≅ 15 sec. The
averaged parameters are compared to thresholds in the BS and if they
reveal not satisfactory, the BS tries to rectify small deviations by the RF
power control to meet the required conditions before HO is initiated.
P rA P rB
PrminA
PrminB
BSA a cb BSB
(a)
P rA HO margin A P rB
HO margin B
BSA a b BSB
(B-A) (A-B)
(b)
Figure 5.22 Hand over: (a) without hysteresis (b) with hysteresis
shown in figure (22-b) where new path- loss lines are drawn taking the
HO margin into account. Now the HO from cell A to cell B occurs at
point b while the HO from cell B to cell A occurs at point a.
The SIM card contains amongst others, the parameters necessary for
authentication and encryption, these are the International Mobile
Subscriber Identity (IMSI), the individual subscriber authentication key
Ki and the authentication algorithm A3. When an MS attempts to access
the network by identifying himself, the network sends to him a 128 bit
random number R. The MS calculates a signed response S by using the
confidential algorithm A3 to mix R and Ki. The result S is sent back to the
network where it is compared to the result calculated by the network
using the same R, Ki and A3. The verification is achieved when the two
results are equal. The process is shown in Figure (5.23). Using another
confidential algorithm A8 stored on the SIM card, the MS uses Ki and R
to calculate the ciphering key K c as shown in figure(5.24) which is also
calculated by the network and is used for cyphering messages using
another confidential ciphering algorithm A5. This process is shown in
Figure (5.25) and it is to be noticed that no confidential information is
sent unprotected on air.
Ki RAND RAND
128 bits
Ki RAND
A3
A3
SRES
32 bits
SRES Equal ?
MS Network
Figure 5.23 Authentication Procedure
108
Chapter 5, GSM Cellular System
Ki
A8 Kc
RAND
A5 A5
S1 S2 S1 S2
(114 bits) (114 bits) (114 bits) (114 bits)
Plain ⊕ ⊕ Plain
text Ciphering Deciphering text
Plain ⊕ ⊕ Plain
text Deciphering Ciphering text
MS BTS
109
Chapter 5, GSM Cellular System
110
Chapter 5, GSM Cellular System
Appendices
1) Speech coding:
In PCM-coded speech, each speech channel delivers 64 kb/s. 8 such
channels would give rise to a bit rate of 512 kb/s over the air interface.
It is required then to reduce the bit rate significantly for each speech
channel to be able to keep the spectrum within the allowed frequency
band. This is accomplished by speech coding. This is done by sending
information about the speech instead of itself. Actually we know that
the speech is created from the diaphragm, through the lungs and into
the vocal tract where we have the vocal cords and the tongue, so we
can create an all parametric model of the speech. The speech can be
separated into voiced and unvoiced sounds. The voiced speech sounds
(e.g. vowels) are produced when the vocal cords vibrate with rate
depending on the sound. For the unvoiced sounds, on the contrary yhe
vocal cords do not vibrate (e.g. s and f sounds).
The voiced speech production can be modeled with the vocal tract
filter being fed by a pulse source while the excitation in unvoiced
speech can be considered to be a noise generator. Since the speech
organs are slow in adapting, we can say that the filter parameters
representing the speech organs are approximately constant for 20 ms.
On the transmitting side we create a model or a filter H with the
inverse characteristics compared to the filter model for creation of
speech. An analysis function in the speech coder calculates the filter
parameters for H so the output signal will be as close as possible to a
noise signal with white spectrum. The speech coder also estimates the
frequency of the vocal cords. The filter parameters are then
transmitted over the air (so we can establish an inverse filter 1/H) and
information about the “excitation sequence” (= output from H). The
output on the receiving side should be understandable speech of good
quality.
Filter
parameters
Synthesized
1/H
speech
111
Chapter 5, GSM Cellular System
2) The equalizer
Every kind of channel has its own features concerning bandwidth,
attenuation and so on. An optimum receiver is adapted to the particular
type of channel used for the transmission, which means that the
receiver knows ( or has a fair idea of) what the channel looks like-
otherwise it is not an optimal receiver. So at the receiver the Viterbi
equalizer creates a mathematical model of the transmission channel,
which in this case is the air interface, and calculates the most probable
transmitted data.
The data is transmitted in bursts which are placed within timeslots of
length approximately 0.577 ms. In the middle of each burst a known bit
pattern called the “training sequence” is transmitted (S). By comparing
the known sequence, in a correlator at the receiver with the received bit
pattern(S), the equalizer creates a channel model. The channel is
considered to be constant during one burst. A probable transmitted bit
sequence is then fed through the channel mode and the output is
compared to the received bit sequence. By looking at the difference
between these two bursts the Viterbi equalizer selects a more probable
transmitted bit pattern which is again fed through the channel model.
The process is repeated until a “good enough” bit pattern is found. To
limit the processor load (i.e. processing time) a powerful algorithm is
used to neglect the least likely bit patterns.
The GSM specification prescribes an equalizer that should be able to
handle a reflected signal delayed up to four bit times, corresponding to
about 15 µs, or a path difference between direct and reflected signal of
about 4.5 km.
Idle mode:
Cell selection is made at “power on” of the mobile.
1. The mobile scans all RF channels in the GSM system and
calculates average levels for each of them. The mobile tunes to the
strongest carrier and finds out if it is a BCCH carrier. If so, the
mobile reads BCCH-data to find out if the cell can be locked to
(chosen PLMN, bared cell, etc). Otherwise the mobile tunes to the
second strongest carrier etc.
112
Chapter 5, GSM Cellular System
Call-connected mode:
Durig a call, the mobile continuously reports (via SACCH) to the
system how strong the received signal strength is from the BTSs in its
surroundings. These measurements are used by the BSC to make fast
decisions of target cells when a hand over is required.
The measurements on neighboring cells during a call take place when
the mobile is not doing anything else, i.e. between transmission and
reception on the allocated timeslot. The signal strength of the serving
cell is monitored during the reception of the TS allocated to the
mobile. On SACCH, the mobile is informed which BCCH- carriers are
to be monitored for handover purposes, and the strength of these are
measured one by one. The working schedule is therefore:
Transmit- measure- receive- transmit- measure –receive, and so on.
A mean value of the measurements for each carrier is then derived and
reported to the BSC. Now, to be sure that the measured values
correspond with the proper BTS, the identity of the BTS must also be
determined. The identity of a BTS is given in BSIC, sent on Co, Tso.
113
Chapter 5, GSM Cellular System
4) Frequency hopping:
Downlink C1 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 0
Uplink C1 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 0
N TDMA frame no. N+1
Downlink C2 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 0
Uplink C2 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 0
N TDMA frame no. N+1
References
[1] Saleh FARUQUE, "Cellular Mobile Systems Engineering". Artech House
Publishers, 1996.
[2] W.C.Y. Lee, "Mobile Cellular Telecommunications, Analog and Digital
Systems", McGraw Hill, 1995
[3] Raymond Steele, "Mobile Radio Communications". PENTEH Press and
IEEE Press, 1994.
114
Chapter 5, GSM Cellular System
Problems
115
Chapter 5, GSM Cellular System
116
Chapter 5, GSM Cellular System
117