Академический Документы
Профессиональный Документы
Культура Документы
Outline
Introduction
GSM Logical Channels
Allowed Logical Channel Combinations
GSM Frame Structure
GSM Bursts
Data Encryption in GSM
Mobility Management
References
Introduction
Other channels that belong to the BCCH group are the FCCH
and SCH.
There are two downlink (BS to MS) and one uplink (MS to
BS) CCHs are defined.
The DCCHs are used for signaling and control after call
establishment.
In addition, there are two SACCH frames, one per TCH, that
require one TDMA frame out of every 26 frames.
CCH Multiframe-
The BCH and CCCH forward control channels are
implemented only on certain Absolute Radio Frequency
Channel Number (ARFCN) channels and are allocated time
slots in a specific manner.
All time slots on all other ARFCNs within the cell are
available for TCH or DCCH data.
The multiframe structure used for the first time slot of the
radio channel is shown in figure below-
Electronics & Communication Engineering Dr. TTIT, K.G.F., Karnataka
GSM Logical Channels and Frame Structure
Outline Introduction GSM Logical Channels Allowed Logical Channel Combinations GSM Frame Structure GSM Bursts Data E
In the uplink path, all frames are used for the RACH (R) of
the CCCH.
Each time slot consists of 156.25 bits, out of which 8.25 bits
are used for guard time and 6 are the start and stop bits that
are used to prevent overlap with adjacent time slots.
GSM Bursts
1- Normal Burst-
It is used to carry information on TCH and control channels,
except for RACH, SCH and FCCH.
The encrypted bits are 57 bits of data or speech plus one bit
”stealing Flag” to indicate whether the burst was stolen for
FACCH signaling or not.
The tail bits always equal (0,0,0). They are used to provide
start and stop bit patterns.
2- Synchronization Burst-
It is used for time synchronization of the mobile.
4- Access Burst-
It is used for random access and has a longer guard period to
protect for burst transmission from an MS.
5- Dummy Burst-
It carries no information and is sent from BTS on some
occasions.
Mobility Management
Location Registration-
Mobile Identification-
This process is used to identify the MS when the VLR does
not recognisze the TMSI sent by the MS.
If the VLR does not have the MS’s IMSI, it requests the HLR
for the user’s profile which contains MS’s IMSI.
References