0% found this document useful (0 votes)
13 views22 pages

SLM - Unit 05

Uploaded by

Pavan Thakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views22 pages

SLM - Unit 05

Uploaded by

Pavan Thakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Mobile Computing Unit 5

Unit 5 Wireless Telecommunication Systems – I


Structure:
5.1 Introduction
Objectives
5.2 Global System for Mobile (GSM) Communications
5.3 Architecture of a GSM System
Radio Sub System (RSS)
Network and Switching Subsystem (NSS)
Operation Sub System (OSS)
5.4 GSM – TDMA/FDMA Frame
5.5 Logical Channels and GSM Hierarchy of Frames
5.6 GSM Protocol Layers for Signaling
5.7 Localization and Calling
5.8 Summary
5.9 Terminal Questions
5.10 Answers

5.1 Introduction
In the previous unit, you learnt that the special Medium Access Control
(MAC) is needed for the wireless domain. You learnt that the medium can
be accessed in wireless domain – by dividing the space of communication
by space Division Multiple Access (SDMA), dividing the frequency used for
channel access in Frequency Division Multiple Access (FDMA) and
allocating time to various users in Time Division Multiple Access (TDMA).
You also studied the various techniques used as the TDMA scheme via
Fixed TDM, Classical Aloha, Slotted Aloha, Carrier Sense Multiple Access
(CSMA), Multiple Access with Collision Avoidance (MACA) and Polling. The
technique of accessing the medium through Code Division Multiple Access
(CDMA) was also discussed.
In this unit and the next unit (i.e. unit 6), you will study about the wireless
telecommunication system. In this unit, you will read about the performance
characteristics of GSM with respect to analog system. You will study about
the Mobile Services present in GSM and the architecture of the GSM
system. GSM hierarchy of frames will be discussed to give the concept of
TDMA/FDMA scheme that works as an interface between Mobile station

Sikkim Manipal University B2067 Page No.: 83


Mobile Computing Unit 5

and the Base Station. We will also discuss the GSM protocol layers required
for signaling and communication along with the steps of connection for both
the Mobile Terminated Call and Mobile Originated Call.
Objectives:
After studying this unit, you will be able to:
 discuss the performance characteristics of GSM system
 describe the mobile services available in GSM system
 explain the architecture of the GSM system
 explain the concept of TDMA/FDMA scheme deployed as Um interface
 discuss the GSM protocol layers required for signaling
 tell how the connection are setup for both the Mobile Terminated Call
and Mobile Originated Call

5.2 Global System for Mobile (GSM) Communications


The groupe spéciale mobile (GSM) was founded in 1982. The name of this
system was soon changed to Global System for Mobile (GSM)
communications in which the specification process was controlled by
European Telecommunications Standardization Institute (ETSI) in 2002. It
formed GSM Association in 2002.
The European telecommunication administrations in Germany introduced
D1 and D2 system with essential services in three phases in 1991, 1994,
1996. It made seamless roaming possible within Europe.

Performance Characteristics of GSM


GSM system is used by many communication service providers all over the
world today. Nearly more than 219 countries in Asia, Africa, Europe,
Australia, and America with more than 4.2 billion subscribers in more than
700 networks use GSM. More than 75% of all digital mobile phones use
GSM.
Performance of GSM with respect to analog system is very good. GSM
supports mobile and wireless communication for voice and data services. It
provides total mobility with international access as chip-card enables use of
access points of different providers. It also provides worldwide connectivity
with one number and at the same time the network handles localization too.
GSM has a high capacity of accommodating the subscribers with better

Sikkim Manipal University B2067 Page No.: 84


Mobile Computing Unit 5

frequency efficiency, smaller cells and as a result more customers per cell.
The transmission quality of GSM is also high as it provides high audio
quality and reliability for wireless along with the uninterrupted phone calls at
higher speeds (e.g., from cars, trains). GSM is more secure as it has
authentication via chip-card and Personal Identification Number (PIN).
GSM also has its own disadvantages too. GSM has no end-to-end
encryption of user data. It does not have full ISDN bandwidth of 64 Kbps so
the user does not have transparent B-channel. Due to use of GSM service,
the user have reduced concentration while driving which may lead to road
accidents. The electromagnetic radiation by the use of GSM is responsible
for the environment pollution. Due to use of GSM, there is a possibility of
abuse of private data. The privacy of users can be breached as their
roaming profiles are accessible. The GSM system is also highly complex
and there are several incompatibilities within the GSM standards that are
yet to be resolved.
GSM: Mobile Services
GSM offers several types of connections by interworking with existing
networks viz. voice connections, data connections, and short message
service (SMS) etc. It also offers multi-service options which can be the
combination of basic services such as Multimedia Message Service (MMS),
video calling etc.
GSM specifies different mechanisms for data transmission. Depending upon
the range of frequency used, GSM is grouped as GSM 900 and GSM 1800.
In GSM 900, 124 channels, each 200 kHz wide, are used for FDMA,
whereas GSM 1800 uses, 374 channels. The original GSM allows data
rates up to 9600 bps for non-voice services. GSM mainly focuses on voice-
oriented tele services. Similarly, GSM provides supplementary services to
enhance the standard telephony service, and may vary from provider to
provider.
Hence, GSM has defined three different categories of services: (i) bearer,
(ii) tele, and (iii) supplementary services.
Figure 5.1 shows a reference model for GSM services which shows bearer
and tele services reference model. This model provides supplementary
services and is not shown in the figure.

Sikkim Manipal University B2067 Page No.: 85


Mobile Computing Unit 5

Figure 5.1: Bearer and Tele Services Reference Model of GSM Services

In figure 5.1, you can see that GSM reference model consists of Mobile
Station (MS), GSM public land mobile network (GSM-PLMN), a transit
network (Integrated Services Digital Network (ISDN) or traditional Public
Switched Telephone Network (PSTN), Source/destination network and the
Terminal (TE). A Mobile station (MS) which consists of Terminal (TE) and
Mobile Termination (MT) communicates with any Terminal (TE) through
GSM-PLMN, transit network and source/destination network with either
bearer, tele or supplementary services or all services. The mobile
termination (MT) of mobile station (MS) performs all network specific tasks
like TDMA, FDMA, coding etc. and offers an interface for data transmission
to the terminal TE which can then be network independent.
A Mobile Station (MS) is connected to the GSM-PLMN via the Um interface.
GSM-PLMN is the infrastructure needed for the GSM network. This network
is connected to transit networks and the source/destination network to
connect with terminal TE.
It is the interface that connects one entity of GSM model to other entity to
avail different types of services viz. bearer, tele or supplementary services.
In the figure 5.1, you can see the interfaces like U, S, R and Um between
different entities. For example, an interface named S connects mobile
station with other terminal. Interface named as R and S are in between
TE and MT within the mobile station. Similarly there are Interfaces
like U, S, and R defined for ISDN but it may not be defined for all networks,
so it depends on the specific network which interface is used as a reference
for the transparent transmission of data.
(i) Bearer services: Bearer services permit transparent and non-
transparent, synchronous or asynchronous data transmission.
Transparent bearer services only use the functions of the physical layer
(layer 1) of ISO/OSI model to transmit data. Transparent bearer
services do not try to recover lost data. Non-transparent bearer

Sikkim Manipal University B2067 Page No.: 86


Mobile Computing Unit 5

services use protocols of layers two and three of ISO/OSI model to


implement error correction and flow control.
GSM uses transparent and non-transparent services and specifies
several bearer services for interworking with PSTN, ISDN, and Packet
Switched Public Data Networks (PSPDN) like X.25. Data transmission
can be full-duplex and synchronous with data rates of 1.2, 2.4, 4.8, and
9.6 kbit/s. Data rates can also be full-duplex and asynchronous from
300 to 9,600 bit/s. In the classical GSM model, bearer services are
connection-oriented and circuit- or packet-switched.
(ii) Tele services: Tele services comprise encrypted voice transmission,
message services, and basic data communication with terminals as
known from the PSTN or ISDN (e.g., fax). Services like emergency
number, short message service (SMS), multimedia message service
(MMS) and group 3 fax are all example of tele services. Group 3 fax is
a non-voice tele service available worldwide which transmits fax data
as digital data over the analog telephone network according to the
ITU-T standards T.4 and T.30 using modems.
(iii) Supplementary services: These services are the enhancements for
the standard telephony service, and may vary from provider to provider.
Typical services are user identification, call redirection, or forwarding of
ongoing calls. Other types of features include closed user groups and
multiparty communication. Closed user groups are a company-specific
GSM sub-network, to which only members of the group have access.
Self Assessment Questions
1. The original GSM allows data rates up to __________ bit/s for non-
voice services.
2. In GSM 900, 124 channels, each ________ kHz wide, are used for
FDMA, whereas GSM 1800 uses, _______ channels.
3. A Mobile Station (MS) is connected to the GSM-PLMN via the _____
interface.
4. This services of GSM permit transparent and non-transparent,
synchronous or asynchronous data transmission.
(a) Bearer services
(b) Tele services
(c) Supplementary services
(d) None of the above

Sikkim Manipal University B2067 Page No.: 87


Mobile Computing Unit 5

5.3 Architecture of a GSM System


In section 5.2, you read the reference model of GSM services. Let us now
discuss the GSM architecture.
As shown in figure 5.2, a GSM system consists of three subsystems. They
are: (i) Radio Sub System (RSS), (ii) Network and Switching Subsystem
(NSS), and (iii) Operation Sub System (OSS).
5.3.1 Radio Sub System (RSS)
The radio subsystem (RSS) comprises all radio specific entities. RSS
covers all the Base Station Subsystem (BSS). Each BSS is divided into
radio cells. A GSM cell can measure between some 100 m and 35 km
depending on the environment (buildings, open space, mountains etc.) and
also expected traffic. Each radio cell consists of Base Transceiver Station
(BTS) which communicates to MS through the Um interface. The Um
interface contains all the mechanisms necessary for wireless transmission
(TDMA, FDMA etc.). Each BTS of each cell is connected to the Base
Station Controller (BSC) of each BSS via Abis interface. The Abis interface
consists of 16 or 64 kbit/s connections. Each BSC of each BSS in turn
communicates to the Mobile Switching Centre (MSC) of NSS through the A
interface. BSC communicates to the Operation and Maintenance Centre
(OMC) of OSS through the O interface.
The A interface is typically based on circuit-switched systems carrying up to
thirty 64 kbit/s connections, whereas the O interface uses the Signaling
System No. 7 (SS7) too from the RSS.
Let us now discuss about the components of RSS.
 Base station subsystem (BSS): Each BSSs of a GSM network is
controlled by a base station controller (BSC). The BSS performs all
functions necessary to maintain radio connections to MS such as
coding/decoding of voice, and rate adaptation to/from the wireless
network part.
 Base transceiver station (BTS): A BTS comprises all radio equipment,
i.e. antennas, signal processing, amplifiers necessary for radio
transmission. ABTS can form a radio cell or several cell using sectorized
antennas.
 Base station controller (BSC): The BSC basically manages the BTSs.
Sikkim Manipal University B2067 Page No.: 88
Mobile Computing Unit 5

It reserves radio frequencies, handles the handover from one BTS to


another within the BSS, and performs paging of the MS. The BSC also
multiplexes the radio channels onto the fixed network connections at the
A interface.
 Mobile station (MS): Mobile stations (MS) are the mobile devices which
are handy and comprise all user equipment and software needed for
communication with a GSM network. An MS consists of user
independent hardware and software and subscriber identity module
(SIM), which stores all user-specific data that is relevant to GSM.
MS can be identified via the International Mobile Equipment Identity (IMEI)
but a user can personalize any MS using his or her Subscriber Identity
Module (SIM). SIM provides user-specific mechanisms like charging and
authentication whereas mobile devices provide device-specific mechanisms
such as theft protection using the device specific IMEI. The SIM card
contains many identifiers and tables, such as card-type, serial number, a list
of subscribed services, a Personal Identity Number (PIN), a PIN unblocking
key (PUK), an authentication key (Ki), and The International Mobile
Subscriber Identity (IMSI).
The MS stores dynamic information while it is logged onto the GSM system,
such as, e.g., the cipher key Kc and the location information consisting of a
Temporary Mobile Subscriber Identity (TMSI) and the Location Area
Identification (LAI). You should have been aware that typical MSs,
e.g., mobile phones, comprise many vendor-specific functions and
components such as display, loudspeaker, microphone, programmable soft
keys, cameras, fingerprint sensors, calendars, address books, games, and
Internet browsers etc.
Self Assessment Questions
5. Each BTS of each cell is connected to the Base Station Controller
(BSC) of each BSS via _______ interface.
6. A BTS can form a radio cell or several cell using ______________
antennas.
7. MS can be identified via the _________________________ but a user
can personalize any MS using his or her ______________________.
5.3.2 Network and Switching Subsystem (NSS)

Sikkim Manipal University B2067 Page No.: 89


Mobile Computing Unit 5

The NSS connects the wireless network with standard public networks,
performs handovers between different BSSs and comprises functions for
worldwide localization of users. It also supports charging, accounting, and
roaming of users between different providers in different countries. The NSS
connects to BSC of RSS through An interface whereas it connects to OMC
of OSS through O interface. The NSS consists of the following switches and
databases:
 Mobile Services Switching Center (MSC): MSCs are high-
performance digital ISDN switches. They set up connections to other
MSCs and to the BSCs via the A interface, and form the fixed backbone
network of a GSM system. Typically, an MSC manages several BSCs in
a geographical region.
 Gateway MSC (GMSC): A GMSC has additional connections to other
fixed networks, such as PSTN and ISDN. Using additional interworking
functions (IWF), an MSC can also connect to public data networks
(PDN) such as X.25. An MSC handles all signaling needed for
connection setup, connection release and handover of connections to
other MSCs. The standard signaling system No. 7 (SS7) is used for this
purpose. SS7 covers all aspects of control signaling for digital networks
(reliable routing and delivery of control messages, establishing and
monitoring of calls). Features of SS7 are number portability, free
phone/toll/collect/credit calls, call forwarding, three-way calling etc. An
MSC also performs all functions needed for supplementary services
such as call forwarding, multi-party calls, reverse charging etc.
 Home location register (HLR): The HLR stores all user-relevant static
information, such as the Mobile Subscriber ISDN Number (MSISDN),
subscribed services (e.g., call forwarding, roaming restrictions, GPRS),
and the International Mobile Subscriber Identity (IMSI). It also stores
dynamic information such as the current Location Area (LA) of the MS,
the mobile subscriber roaming number (MSRN), the current VLR and
MSC. The information in the HLR is updated about the movement of MS
and helps in locating a user in the worldwide GSM network.
 Visitor location register (VLR): The VLR associated to each MSC is a
dynamic database and stores all important information needed for the
MS users currently in the LA that is associated to the MSC

Sikkim Manipal University B2067 Page No.: 90


Mobile Computing Unit 5

(e.g., IMSI, MSISDN, HLR address). If a new MS comes into an LA the


VLR copies all relevant information for this user from the HLR.

Figure 5.2: Functional Architecture of a GSM System

5.3.3 Operation Sub System (OSS)


The operation subsystem (OSS) contains the necessary functions for
network operation and maintenance. The OSS possesses network entities
of its own and accesses other entities via SS7 signaling.
OSS consists of the following entities:
 Operation and maintenance centre (OMC): The OMC monitors and
controls all other network entities via the O interface. Typical OMC
management functions are traffic monitoring, status reports of network
entities, subscriber and security management, or accounting and billing.
 Authentication center (AuC): AuC protects user identity and data

Sikkim Manipal University B2067 Page No.: 91


Mobile Computing Unit 5

transmission. The AuC contains the algorithms for authentication as well


as the keys for encryption and generates the values needed for user
authentication in the HLR.
 Equipment identity register (EIR): The EIR is a database for all IMEIs.
It stores all device identifications registered for this network. The EIR
stores a blacklist of stolen (or locked) devices. The EIR also contains a
list of valid IMEIs (white list), and a list of malfunctioning devices
(gray list).
Self Assessment Questions
8. Theses witches are high-performance digital ISDN switches and set up
connections to other MSCs and to the BSCs via the A interface.
(a) Mobile Services Switching Center (MSC)
(b) Gateway MSC (GMSC)
(c) Base station controller (BSC)
(d) Base transceiver station (BTS)
9. The standard signaling system No. 7 (SS7) covers all aspects of control
signaling for digital networks. (True/False)
10. The database for all IMEIs is ______________________________.

5.4 GSM – TDMA/FDMA Frame


You can see in the GSM architecture that the entities are connected through
certain type of interface. Each interface has its own use and functionality.
For example, Um is a radio interface that comprises the mechanism for
multiplexing and media access. Let us study how this interface that deploys
TDMA/FDMA for media access works.
GSM implements Space Division Multiple Access (SDMA) using cells with
BTS and assigns an MS to a BTS. Frequency Division Duplex (FDD) is the
technique to separate downlink and uplink channel between MS and BTS.
Media access combines TDMA and FDMA. In GSM 900, 124 channels,
each 200 kHz wide, are used for FDMA, whereas GSM 1800 uses, 374
channels.
Due to technical reasons, channels 1 and 124 are not used for transmission
in GSM 900. Typically, 32 channels are reserved for organizational data; the
remaining 90 are used for customers. Each BTS then manages a single
channel for organizational data and, e.g., up to 10 channels for user data.

Sikkim Manipal University B2067 Page No.: 92


Mobile Computing Unit 5

The following example is based on the GSM 900 system, but GSM works in
a similar way at 1800 and 1900 MHz.
Figure 5.3 shows the GSM’s TDMA frame, slots and bursts. Each of the
248 channels (124 x 2 channels for uplink and downlink) is additionally
separated in time via a GSM TDMA frame, i.e., each 200 kHz carrier is
subdivided into frames that are repeated continuously. The duration of a
frame is 4.615 ms. A frame is again subdivided into 8 GSM time slots,
where each slot represents a physical TDM channel and lasts for 577 μs.
Each TDM channel occupies the 200 kHz carrier for 577 μs every 4.615 ms.

Figure 5.3: GSM TDMA frame, slots, and bursts

Data is transmitted in small portions, called bursts. In Figure 5.3, a normal


burst used for data transmission inside a time slot (for user and signaling
data) is shown. This burst is only 546.5 μs long and contains 148 bits. The
remaining 30.5 μs are used as guard space to avoid overlapping with other
bursts due to different path delays and to give the transmitter time to turn on
and off. Filling the whole slot with data allows for the transmission of

Sikkim Manipal University B2067 Page No.: 93


Mobile Computing Unit 5

156.25 bit within 577 μs. Each physical TDM channel has a raw data rate of
about 33.8 kbit/s, each radio carrier transmits approximately 270 kbit/s over
the Um interface.
The first and last three bits of a normal burst is known as tail and are all
set to 0. It can be used to enhance the receiver performance. The training
sequence in the middle of a slot is used to adapt the parameters of the
receiver to the current path propagation characteristics and to select the
strongest signal in case of multi-path propagation. A flag S indicates
whether the data field contains user or network control data. As defined by
ETSI (1993a), there are four more bursts for data transmission other than a
normal burst. They are: (i) a frequency correction, (ii) a synchronization
burst (iii) an access burst (iv) a dummy burst. A frequency correction burst
allows the MS to correct the local oscillator to avoid interference with
neighboring channels. A synchronization burst with an extended training
sequence synchronizes the MS with the BTS in time. An access burst is
used for the initial connection setup between MS and BTS, and finally a
dummy burst is used if no data is available for a slot.
A simple transmitter hardware can be used for MS. It is because on one
hand, the slots for uplink and downlink of a physical TDM channel are
separated in frequency (45 MHz for GSM 900, 95 MHz for GSM 1800 using
FDD). On the other hand, the TDMA frames are shifted in time for three
slots, i.e., if the BTS sends data at time t0 in slot one on the downlink, the
MS accesses slot one on the uplink at time t0+3·577 μs. Hence, an MS does
not need a full-duplex transmitter, a simpler half-duplex transmitter switching
between receiving and sending is enough.
Self Assessment Questions
11. Each TDM channel occupies the 200 kHz carrier for ___________ μs
every 4.615 ms.
12. Each physical TDM channel has a raw data rate of about _______
kbit/s, each radio carrier transmits approximately __________ kbit/s
over the Um interface.
13. A frequency correction burst allows the MS to correct the local oscillator
to avoid ______________ with neighboring channels.
5.5 Logical Channels and GSM Hierarchy of Frames
We have discussed that the medium is physically separated into (8x124)

Sikkim Manipal University B2067 Page No.: 94


Mobile Computing Unit 5

duplex channels (due to 8 GSM time slots). Now we will discuss about the
logical channels and a hierarchy of frames based on the combination of
these physical channels. We have also seen that a physical channel
consists of a slot, repeated every 4.615 ms. If we consider that a logical
channel C1 takes up every fourth slot and another logical channel C2 that
uses every other slot then both logical channels could use the
same physical channel with the pattern C1C2xC2C1C2xC2C1 etc.
(The x indicates that the physical channel still has some capacity left.)
GSM specifies two basic groups of logical channels, i.e., traffic channels
and control channels.
 Traffic channels (TCH): GSM uses a TCH to transmit user data
(e.g., voice, fax) and is classified into two types. Full-rate TCH (TCH/F)
has a data rate of 22.8 kbit/s, whereas half-rate TCH (TCH/H) has a
data rate of 11.4 kbit/s.
 Control channels (CCH): There are three CCHs used in a GSM system
to control medium access, allocation of traffic channels or mobility
management. They are: (1) Broadcast control channel (BCCH)
(2) Common control channel (CCCH) (3) Dedicated control channel
(DCCH). Three groups of control channels have been defined, each
again with sub channels.
(1) Broadcast control channel (BCCH): A BTS uses this channel to
signal information to all MSs within a cell. The sub channel of BCCH
are (i) Frequency Correction Channel (FCCH) used for frequency
correction and (ii) Synchronization Channel (SCH) for
synchronization.
(2) Common control channel (CCCH): All information regarding
connection setup between MS and BS is exchanged via the CCCH.
The sub channels of CCCH are: (i) Paging Channel (PCH) for
paging the appropriate MS, (ii) Random Access Channel (RACH) to
set up a call, and (iii) Access Grant Channel (AGCH) to signal an MS
that it can use a TCH or SDCCH for further connection setup.
(3) Dedicated control channel (DCCH): This channel is bi-directional
and is of two type. They are: (i) the Stand-Alone Dedicated Control
Channel (SDCCH) used for signaling (ii) Fast Associated Dedicated
Control Channel (FACCH) used for handling handovers.

Sikkim Manipal University B2067 Page No.: 95


Mobile Computing Unit 5

All these channels mentioned above cannot use time slots arbitrarily. GSM
specifies a very elaborate multiplexing scheme that integrates several
hierarchies of frames.
If we take a simple TCH/F for user data transmission, each TCH/F will have
an associated SACCH for slow signaling. If fast signaling is required, the
FACCH uses the time slots for the TCH/F. A typical usage pattern of a
physical channel for data transmission now looks like this.
TTTTTTTTTTTTSTTTTTTTTTTTTx
TTTTTTTTTTTTSTTTTTTTTTTTTx
Here T indicates the user traffic in the TCH/F and S indicates the signaling
traffic in the SACCH channel.
The physical channel for data transmission has twelve slots with user data
followed by a signaling slot. Again 12 slots with user data follow along with
an unused slot. This pattern of 26 slots is repeated over and over again. In
this case, only 24 out of 26 physical slots are used for the TCH/F.

Figure 5.4: GSM Structuring of Time using a Frame Hierarchy

Now recall that each normal burst used for data transmission carries 114 bit
user data and is repeated every 4.615 ms. This results in a data rate of

Sikkim Manipal University B2067 Page No.: 96


Mobile Computing Unit 5

24.7 kbit/s. As the TCH/F only uses 24/26 of the slots, the final data rate is
22.8 kbit/s as specified for the TCH/F. The SACCH thus has a capacity of
950 bit/s.
This periodic pattern of 26 slots occurs in all TDMA frames with a TCH. The
combination of these frames is called traffic multiframe.
Figure 5.4 shows the logical combination of 26 frames (TDMA frames with a
duration of 4.615 ms) to a multiframe with a duration of 120 ms. This type of
multiframe is used for TCHs, SACCHs for TCHs, and FACCHs. As these
logical channels are all associated with user traffic, the multiframe is called
traffic multiframe. TDMA frames containing (signaling) data for the other
logical channels are combined to a control multiframe. Control multiframes
consist of 51 TDMA frames and have a duration of 235.4 ms.
The logical frame hierarchy continues, combining 26 multiframes with
51 frames or 51 multiframes with 26 frames to form a superframe. 2,048
superframes build a hyperframe with a duration of almost 3.5 hours.
Altogether, 2,715,648 TDMA frames form a hyperframe. This large logical
structure is needed for encryption – GSM counts each TDMA frame, with
the frame number forming input for the encryption algorithm. The frame
number plus the slot number uniquely identify each time slot in GSM.
Self Assessment Questions
14. GSM uses a TCH to transmit user data. (True/False)
15. A BTS uses this channel to signal information to all MSs within a cell.
(a) Traffic channels (TCH)
(b) Broadcast control channel (BCCH)
(c) Common control channel (CCCH)
(d) Dedicated control channel (DCCH)
16. As the logical channels are all associated with user traffic, the
multiframe is called ____________ multiframe.

5.6 GSM Protocol Layers for Signaling


GSM system follows its own protocol architecture for establishing the
communication between MS and MSC. Figure 5.5 shows the protocol
architecture of GSM with signaling protocols and interfaces between MS,
BTS, BSC and MSC.

Sikkim Manipal University B2067 Page No.: 97


Mobile Computing Unit 5

Figure 5.5: Protocol Architecture for Signaling

The protocol architecture for signaling in GSM system comprises of five


different layers. Few layers consists of sub layers too. The physical layer or
the layer 1, handles all radio-specific functions such as multiplexing of
bursts into a TDMA frame, synchronization with the BTS, detection of idle
channels, and measurement of the channel quality on the downlink.
LAPDmor the Layer 2 offers reliable data transfer over connections,
re-sequencing of data frames, and flow control. Further services provided by
LAPDm include segmentation and reassembly of data and acknowledged/
unacknowledged data transfer.
The network layer in GSM or the layer three, comprises several sub layers.
The lowest sub layer is the Radio Resource Management (RR). Only a part
of this layer, RR’, is implemented in the BTS, the remainder is situated in
the BSC. The functions of RR’ are supported by the BSC via the BTS
management (BTSM). The main tasks of RR are setup, maintenance, and
release of radio channels. RR also directly accesses the physical layer for
radio information and offers a reliable connection to the next higher layer.
BSS application part (BSSAP) is used by MSC to control a BSS.
Mobility management (MM) contains functions for registration,

Sikkim Manipal University B2067 Page No.: 98


Mobile Computing Unit 5

authentication, identification, location updating, and the provision of a


Temporary Mobile Subscriber Identity (TMSI) for Mobile station. TMSI
replaces the International Mobile Subscriber Identity (IMSI) and hides the
real identity of an MS user over the air interface.
Finally, the Call Management (CM) layer contains three entities: Call Control
(CC), Short Message Service (SMS), and Supplementary Service (SS).
SMS allows for message transfer using the control channels SDCCH and
SACCH (if no signaling data is sent), while SS offers the services such as
user identification, call redirection, or forwarding of ongoing calls. CC
provides a point-to-point connection between two terminals and is used by
higher layers for call establishment, call clearing and change of call
parameters. This layer also provides functions to send in-band tones, called
dual tone multiple frequency (DTMF), over the GSM network.

The physical layer at Um interface performs encryption/decryption of data.


The physical layer at the A interface typically includes leased lines with
2.048 Mbit/s capacity. LAPD and BTSM is used for layer 2 through Abis
interface between BTS and BSC for BTS management. Signaling system
No. 7 (SS7) is used for signaling between an MSC and a BSC. This protocol
also transfers all management information between MSCs, HLR, VLRs,
AuC, EIR, and OMC.
Self Assessment Questions
17. This layer of protocol architecture for signaling handles all radio-specific
functions.
(a) The physical layer or the layer 1
(b) LAPDm or the Layer 2
(c) call management (CM) layer
(d) Mobility management (MM) layer
18. The main tasks of ________________ are setup, maintenance, and
release of radio channels.
19. Temporary Mobile Subscriber Identity (TMSI) replaces the __________
and hides the real identity of an MS user over the air interface.

5.7 Localization and Calling


GSM is able to locate the users worldwide automatically as the same phone
number is valid worldwide. GSM is able to perform periodic location updates

Sikkim Manipal University B2067 Page No.: 99


Mobile Computing Unit 5

about the user through the HLR and VLR with which it is registered. The
HLR registers the current location (only the location area, not the precise
geographical location) of the MS, and the VLR informs the HLR about
location change of MS. As soon as an MS moves into the range of a new
VLR (a new location area), the HLR sends all user data needed to the new
VLR. Changing VLRs with uninterrupted availability of all services is also
called roaming. Roaming can take place within the network of one provider,
between two providers in one country and between different providers in
different countries, which is called international roaming.
Addressing and Location of MS is performed by several numbers. All these
numbers are needed to find a subscriber and to maintain the connection
with a mobile station. They are as follows:
 Mobile station international ISDN number (MSISDN): The MSISDN
follows the ITU-T standard and consists of: (i) the country code (CC)
that represents the address of country, (ii) the national destination code
(NDC) that represents the address of network provider and (iii) the
subscriber number (SN). For example, for the mobile number
+91-9115524455, 91 is the CC that belongs to India. 911 is the NDC
and 5524455 is the SN.
 Temporary mobile subscriber identity (TMSI): GSM uses the 4 byte
TMSI for local subscriber identification and is selected by the current
VLR which is valid temporarily and within the location area of the VLR.
 Mobile station roaming number (MSRN): MSRN contains the current
visitor country code (VCC), the visitor national destination code (VNDC),
the identification of the current MSC together with the subscriber
number. The MSRN helps the HLR to find a subscriber for an incoming
call.
Let us now discuss how the calls are originated and terminated. Call
connection can be in two ways: (i) Mobile Terminated Call (MTC) and
(ii) Mobile Originated Call (MOC).
(i) Mobile Terminated Call (MTC): It is a situation in which a station calls
a mobile station. Here the calling station could be outside the GSM
network or in another mobile station. Figure 5.6 shows the basic steps
needed to connect the calling station with the mobile user. In step 1, a

Sikkim Manipal University B2067 Page No.: 100


Mobile Computing Unit 5

user dials the phone number of a GSM subscriber. In step 2, the fixed
network (PSTN) forwards the number of GSM network for call setup to
the Gateway MSC. In step 3, the GMSC identifies the HLR for the
subscriber and signals the call setup to the HLR. In step 4, the HLR
now checks whether the number exists and whether the user has
subscribed to the requested services, and requests an MSRN from the
current VLR. In step 5, after receiving the MSRN, the HLR can
determine the MSC responsible for the MS and in step 6, it forwards
this information to the GMSC. In step 7, the GMSC can now forward the
call setup request to the MSC indicated.
As a step 8, MSC requests the current status of the MS from the VLR.
In step 9, if the MS is available, the MSC initiates paging in all cells it is
responsible for. In step 10, the location area is found. In step 11, the
BTSs of all BSSs transmit this paging signal to the MS. In step 12, MS
answers to BSS and in step 13, BSS communicates to MSC and in step
14, VLR performs security checks. In step 15, the VLR signals to the
MSC; in step 15, MSC connects to BSS and in step 17, BSS sets up a
connection to the MS.

Figure 5.6: Mobile Terminated Call (MTC)

(ii) Mobile Originated Call (MOC): It is a situation when mobile station


calls any other station. As shown in figure 5.7, in step 1, the MS
transmits a request for a new connection. In step 2, the BSS forwards
this request to the MSC. In step 3 and 4, the MSC then checks if this

Sikkim Manipal University B2067 Page No.: 101


Mobile Computing Unit 5

user is allowed to set up a call with the requested service. In


step 5 and 6, MSC checks the availability of resources through the
GSMC network and into the PSTN. In step 7 and 8, PSTN approves the
availability of the resources through GMSC to MSC. And in
step 9 and 10, if all resources are available, the MSC sets up a
connection between the MS and the fixed network through BSC.

Figure 5.7: Mobile Originated Call (MOC)

Self Assessment Questions


20. Changing VLRs with uninterrupted availability of all services is also
called ____________.
21. The MSISDN follows the ITU-T standard and consists of: the country
code (CC), ___________________ and _______________________.
22. Mobile Terminated Call (MTC) is a situation in which a station calls a
mobile station.(True/False)

5.8 Summary
Let us summarize the important points discussed in this unit:
 GSM supports mobile and wireless communication for voice and data
services with total mobility and international access.
 GSM has defined three different categories of services: (i) bearer,
(ii) tele, and (iii) supplementary services
 The radio subsystem (RSS) comprises all radio specific entities.
 The NSS connects the wireless network with standard public networks,

Sikkim Manipal University B2067 Page No.: 102


Mobile Computing Unit 5

performs handovers between different BSSs and comprises functions for


worldwide localization of users.
 The operation subsystem (OSS) contains the necessary functions for
network operation and maintenance.
 Um interface or the media access for the physical channel in GSM
combines TDMA and FDMA scheme.
 GSM specifies two basic groups of logical channels, i.e., traffic channels
and control channels to transmit user data and control the media access
respectively.
 Addressing and Location of MS is performed to find a subscriber and to
maintain the connection with a mobile station.
 Calls connection in GSM system can be in two ways: (i) Mobile
Terminated Call (MTC) and (ii) Mobile Originated Call (MOC).

5.9 Terminal Questions


1. Draw the reference model of GSM Services and explain it.
2. Draw the Functional Architecture of a GSM System and explain about
Radio sub system.
3. Explain about the GSM TDMA frame with the help of frame structure.
4. Describe about the GSM logical channels.
5. Draw the Protocol Architecture for Signaling in GSM system and explain
it in brief.

5.10 Answers
Self Assessment Questions
1. 9600
2. 200, 374
3. Um
4. (a) Bearer services
5. Abis
6. sectorized
7. International Mobile Equipment Identity (IMEI), Subscriber Identity
Module (SIM)
8. (a) Mobile Services Switching Center (MSC)
9. True
10. Equipment identity register (EIR)
Sikkim Manipal University B2067 Page No.: 103
Mobile Computing Unit 5

11. 577
12. 33.8, 270
13. interference
14. True
15. (b) Broadcast control channel (BCCH)
16. traffic
17. (a) The physical layer or the layer 1.
18. Radio Resource Management (RR)
19. International Mobile Subscriber Identity (IMSI)
20. roaming
21. the National Destination Code (NDC), the Subscriber Number (SN)
22. True

Terminal Questions
1. Bearer services permit transparent and non-transparent, synchronous or
asynchronous data transmission. (Refer to section 5.2 for more details)
2. The radio subsystem (RSS) comprises all radio specific entities and
covers all the Base Station Subsystem (BSS). (Refer to section 5.3.1 for
more details)
3. The 248 channels (124 x 2 channels for uplink and downlink) in GSM
frame structure is separated in time via a GSM TDMA frame, i.e., each
200 kHz carrier is subdivided into frames that are repeated continuously.
(Refer to section 5.4 for more details)
4. GSM specifies two basic groups of logical channels, i.e., traffic channels
and control channels. GSM uses a TCH to transmit user data. (Refer to
section 5.5 for more details)
5. The protocol architecture for signaling in GSM system comprises of five
different layers. Few layers consist of sub layers too. The physical layer
or the layer 1 handles all radio-specific functions. (Refer to section 5.6
for more details)

Sikkim Manipal University B2067 Page No.: 104

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy