Академический Документы
Профессиональный Документы
Культура Документы
Systems
-
The GSM System
2001 edition
by Petri Jarske
Contents:
In this context
2
Straightforward solution:
• The same frequencies used over the whole geographical
area.
• For increasing capacity, use more efficient source coding
and modulation (compression, efficient modulation, TDMA,
CDMA, etc.)
• No need to worry about the location of the customer.
Cellular solution:
• Divide the geographical area into small subareas (cells), and
assign each cell enough frequency resource to serve the
customers in this area (see figure below, real cells are not
that regular in shape and size).
• The same frequency resource may be used in many cells
provided that they are separated by enough distance.
Capacity can be increased simply by making the cells
smaller and smaller...
3
Other advantages:
Problems to be considered:
• In order to provide service anytime, the network has to know
the location of each customer to some accuracy (location
management) at least when a call is coming to the mobile
unit.
• To provide continuous service even when the customer is
moving, handover procedures are needed. That is, the
service connection is passed to a new base station every
time the quality of the existing connection gets too low.
4
Some further “tricks” to improve system efficiency in general
(not only capacity):
5
Overview of mobile services
Examples
Services in GSM:
6
Evolution of Wireless Cellular Communication:
ITU-T: IMT-2000
7
The mobile radio environment
General description
For large cell designs (radius 6.5 · · · 13 km) the height of the base
station antenna is usually 30 · · · 90 m. The height of a mobile unit
antenna is about 2 · · · 3 m.
Base station
antenna
8
From this description of the environment, we might imagine that the
mobile site will receive many reflected waves and (possibly) one
direct wave. We can assume that the reflected waves received at the
mobile site come from different angles equally distributed throughout
360°.
The signal strength r(x) or r(t) can be, for modelling purposes,
separated into two parts called long-term fading m(t) or m(x), and
short-term fading r0(t) or r0(x) as
or
The long term fading is the envelope of the fading signal, or local
mean.
x+L x+ L
1 1
2 L x∫− L 2 L x∫− L
mˆ ( x) = r (ξ ) d ξ = m(ξ ) r0 (ξ )dξ
9
When the length L is properly chosen, this becomes
x+ L
1
2 L x∫− L
mˆ ( x) = m( x) r0 (ξ )dξ
10
Classification of channels
Nondispersive channels
1 1
F << and δ <<
T W
Time-dispersive channels
1 1
δ >> T and δ >> but F <<
W T
11
12
Frequency-dispersive channels
1
F >> W and F >>
T
but
1
δ <<
W
13
Delay spread
∞
Td = ∫ t ⋅ e(t ) dt
0
∞
∆ = ∫ t 2 ⋅ e(t )dt − Td2
2
14
Prediction of propagation loss
The measurements are usually recorded while the mobile units are
travelling along a road (street). The recorded signals from the mobile
paths have to be converted to radio path.
15
Models for path loss
Note: path loss model is only for path loss prediction and not for
multipath fading.
Es = (1 + avej∆ψ)E
where β is the wave number and ∆d is the difference between the two
radio path lengths. E is the direct wave received at the mobile
antenna.
16
According to the free-space propagation path loss, the received power
from a direct wave is
2
λ
P0 r = Pt
4π d
4π d 4π d
4π h1h2
∆ψ ≈
λd
This gives
2
hh
Pr ≈ Pt 1 22
d
17
An area-to-area path loss prediction model
The area-to-area path loss prediction requires two parameters: (1) the
power at the reference (1-mile) point of interception Pr0 and (2) a
path loss slope γ. The field strength of the received signal Pr can be
expressed as
−γ −n
r f
Pr = Pr 0 α 0
r0 f0
or in dB
r f
Pr = Pr 0 − γ log − n log + α 0
r0 f0
18
The adjustment factor is used for different conditions as follows:
where
2
new base station antenna height (m)
α1 =
30.48m
ν
new mobile station antenna height (m)
α2 =
3m
new transmitt er power
α3 =
10W
new base station antenna gain with respect to λ/2 dipole
α4 =
4
α5 = antenna gain correction factor at the mobile unit
19
The model of Okumura et al.
(From M. Hata, "Empirical Formula for Propagation Loss in Land Mobile Radio Services", IEEE Trans.
Vehicular Tech., VT-29, No. 3, August 1980.)
The signal strength received from a street in line with the base station
is about 10 dB higher than the signal from a street perpendicular to
the base. This phenomenon diminishes at about 8 km distance.
20
Note, that the previous description gave only examples of how radio
path loss is modelled in mobile communication systems. It is not a
complete list, and the exact numbers are not relevant for this course.
21
The GSM System
Basic Architecture
BTS
BSC TRAU
HLR
AC
EIR
BTS
MSC PSTN
OSS VLR ISDN
BTS SMSC
BSC TRAU VMS
BTS
22
GSM Network Elements:
MS = ME + SIM
23
The Network & Switching Subsystem (NSS)
24
The Operation Sub-System (OSS)
More value add services have been, and will be built as the
capabilities of the GSM network improve over time.
Intelligent Network (IN) features are added to the GSM
networks, in order to enable tailored services to different
customer groups, or individual subscribers.
25
Architecture Evolution
26
Step 2: Packet data
BTS
BSC TRAU
HLR
AC
EIR
BTS
MSC PSTN
OSS VLR ISDN
BTS SMSC
BSC TRAU VMS
BTS IP
SGSN IP GGSN IP
networks
27
Step 3: Higher data rates (again)
For the 3rd generation (3G) cellular networks, the core of the
network, at least in Europe and Japan, will be based on GSM.
The air interface, however, will be based on CDMA
technology which is completely different from basic and
enhanced GSM.
28
BTS
BSC TRAU
HLR
AC
EIR
BTS
MSC PSTN
VLR ISDN
BTS SMSC
BSC TRAU VMS
OSS
BTS IP
SGSN IP GGSN IP
networks
BS
RNC IWU
BS
29
Step 5: All-IP
BTS
BSC TRAU
HLR
AC
EIR
BTS
MSC PSTN
VLR ISDN
IP NETWORK
BS
SMSC
RNC IWU
VMS
BS
IP
SGSN GGSN
networks
30
In the following, we will concentrate on the basic GSM
functionality, and will revisit HSCSD, GPRS, and EDGE later
on.
31
Mobility Management (MM): functions are handled by the MS
(or SIM actually), the HLR/AuC, and the MSC/VLR. These
include also management of security functions.
32
Transmission inside GSM
33
Speech on the radio interface
34
As an example, we can take a brief look at the original full
rate codec. The full rate speech encoder, compressing 64
kbit/s −> 13 kbit/s, is a so called RPE-LTP (regular pulse
excitation - long term prediction) encoder.
35
The transmitted parameters, after speech encoding, are NOT
equal in importance. Therefore, they are divided into 3 classes
of importance, each protected against transmission errors in a
different manner. This will be described later.
Discontinuous transmission
Otherwise a bit rate around 500 bit/s (260 bits / 480 ms) is
used which is sufficient to encode the background noise.
36
Speech on the BTS-TRAU interface
37
Data in the basic GSM system
(residual error rates for typical urban conditions with frequency hopping)
38
The following table summarises all basic GSM data
connection types:
39
The Radio Interface
The radio interface, in addition to the fact that the users move,
is the source of many difficult problems that need to be solved
in the GSM system (just as in any mobile communication
system).
Logical channels
40
The main task of the communication system is to transport
user information. For the speech and different types of data
communications, the radio interface accommodates bi-
directional connections.
41
The other alternative is (surprise!) Fast Associated Control
CHannel (FACCH) which is actually not a separate logical
channel but uses the traffic channel (TCH) by replacing a user
data frame with a signalling frame when necessary. A
signalling frame is marked with one bit called stealing flag.
In idle mode (but power on), the mobile station is far from
idle. It must continuously listen to one base station, and also
monitor up to 6 other base stations.
42
Before a mobile station can communicate with a base station,
it must become and stay synchronised with it. For this
purpose, two logical channels are broadcast from each base
station: the Frequency Correction CHannel (FCCH), and
the Synchronisation CHannel (SCH).
After the mobile station has synchronised itself with the base,
it can access the network through the Random Access
CHannel (RACH).
43
The multiple access scheme
The center frequencies of the slots are placed 200 kHz apart
within the frequency band reserved for GSM, and the duration
of one slot is 15/26 ms ≈ 0.577 ms. All slots in a cell are
aligned in time.
44
The time axis is divided into 8 distinct slots, numbered
0· · · 7. The information of certain logical channels is
mapped to certain time slot number. For example, if the
shadowed burst in the previous figure belongs to certain
logical channel, the next time we can find information
belonging to the same logical channel is at least 8∗15/26 ms
later.
Transmission 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2
Reception 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
So, this is the base station viewpoint. The figure looks similar
for a mobile station very close to the base station. The purpose
of this arrangement is to avoid simultaneous transmission and
reception in the mobile station.
45
the mobile station by transmitting the bursts earlier. The
timing is adjusted with the timing advance parameter.
This timing arrangement also has an impact on the future
development of the GSM system. Think about, for example,
increasing the user data rates without changing the air
interface totally.
TCH/F + SACCH
T T T T T T T T T T T T S T T T T T T T T T T T T - ...
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0
TCH/H + SACCH
T T T T T T T T T T T T S T T T T T T T T T T T T S ...
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0
Here the slots denoted with bold and italic characters belong
to two different logical channels.
46
TCH/8 + SACCH (8 channels grouped)
T1 T1 T1 T1 T2 T2 T2 T2 T3 T3 T3 T3 T4 T4 T4 T4 T5 T5 T5 T5 T6 T6 T6 T6 T7 T7
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
T7 T7 T8 T8 T8 T8 S1 S1 S1 S1 S2 S2 S2 S2 S3 S3 S3 S3 S4 S4 S4 S4 - - -
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
T1 T1 T1 T1 T2 T2 T2 T2 T3 T3 T3 T3 T4 T4 T4 T4 T5 T5 T5 T5 T6 T6 T6 T6 T7
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
T7 T7 T7 T8 T8 T8 T8 S5 S5 S5 S5 S6 S6 S6 S6 S7 S7 S7 S7 S8 S8 S8 S8 T - - ...
76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 0
T1 T1 T1 T1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
T2 T2 T2 T2 T3 T3 T3 T3 T4 T4 T4 T4 S1 S1 S1 S1 S2 S2 S2 S2
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
T1 T1 T1
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
T1 T2 T2 T2 T2 T3 T3 T3 T3 T4 T4 T4 T4 S3 S3 S3 S3 S4 S4 S4 S4 ...
76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 0
47
The empty slots in the previous figure are used for common
channels.
FCCH + SCH
F S F S F S
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
F S F S
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
BCCH + PAGCH/3
B B B B P P P P P P P P P P P P
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
48
Some examples of possible cell configurations follow (here
TN = timeslot number).
2x8x(TCH/8+SACCH)
29x(TCH/F+SACCH)
5x8x(TCH/8+SACCH)
87x(TCH/F+SACCH)
49
The frequency band
Other bands:
In the US GSM1900
The border frequencies are usually not used, which limits the
number of frequencies to 122 in the 25 Mhz band. There may
be additional national limitations.
50
Frequency hopping
51
Frequency hopping is not used on common channels (FCCH,
SCH, BCCH, PAGCH, RACH and CBCH). The downlink
common channels all use the same frequency. Also, signal on
the frequency of the common channels is transmitted
continuously, even if no information is to be transmitted,
because mobile stations in neighboring cells continuously
measure the signal level from the base stations. When there is
not information to be transmitted, dummy frames are used.
Hopping Sequences
Two channels having the same HSN but different MAIO never
use the same frequency at the same time. On the other hand,
two channels having the same MAIO but different HSN
interfere with the probability 1/n.
Channels in one cell usually have the same HSN but different
MAIO. Adjacent cells use different set of frequencies. Distant
cells using the same frequency sets should use different HSN
to minimise interference.
52
From source data to radio waves
Speech Speech
ò ñ
Digitizing and Source decoding
source coding
ò ñ
Channel coding Channel decoding
ò ñ
Interleaving De-interleaving
ò ñ
Ciphering Deciphering
ò ñ
Burst formatting Burst decoding
ò ñ
Modulation
F Demodulation
53
The following blocks are common to all transmission modes.
54
Channel coding provides protection against bit errors in the
transmission channel. Error correction is mainly done with the
convolutional codes, and block (parity) codes are for detecting
remaining errors. In common channels, a so called Fire code
is used which is capable of correcting errors occurring in
groups.
55
TCH/EFS
(Enhanced full
rate speech TCH)
speech frame
244 bits
3.1
cyclic code
+ repetition
in: 244 bits
out: 260 bits
3.1.1 PRACH
interface PTCCH/U
0 SACCH, FACCH, RACH, PDTCH(1-4),
TCH/HS TCH/FS BCCH, CBCH, PCH SCH PBCCH, PAGCH,
(half rate (full rate AGCH, SDCCH CTSBCH-SB, PPCH, PNCH,
speech TCH) speech TCH) CTSAGCH, CTSPCH data TCHs CTSARCH PTCCH/D
speech frame speech frame message data frame message RLC block
112 bits 260 bits 184 bits N0 bits P0 bits Q0 bits
3.2 3.1 3.n.1 4.6, 4.7, 5.3.2 5.1.n.1
4.1.1
interface CS-1 others
1
cyclic code cyclic code Fire code +tail cyclic code cyclic code
+ tail + tail +tail in: N0 bits + tail + tail
in: 112 bits in: 260 bits in: 184 bits out: N1 bits in: P0 bits in: Q0 bits
out: 121 bits out: 267 bits out: 228 bits 3.n.2 out: P1 bits out: Q1 bits
3.2.1 3.1.1 4.1.2 4.6, 4.7, 5.3.2 5.1.n.2
interface others CS-4
2
convolutional convolutional convolutional convolutional convolutional convolutional
code code code code code code
k=7, 2 classes k=5, 2 classes k=5, rate 1/2 k=5, rate r k=5, rate r k=5, rate r
in: 121 bits in: 267 bits in: 228 bits in: N1 bits in: P1 in: Q1 bits
out: 228 bits out: 456 bits out: 456 bits out: 456 bits out: P2 bits out: 456 bits
3.2.2 3.1.2 4.1.3 3.n.3 4.6, 4.7, 5.3.2 5.1.n.3
interface
3
TCH/F2.4 others
reordering and partitioning reordering and partitioning reordering and partitioning
+stealing flag +stealing flag +code identifier
in: 228 bits in: 456 bits in: 456 bits
out: 4 blocks out: 8 blocks out: 8 blocks
3.2.3 3.1.3, 4.1.4, 4.3.4 4.1.4
others
TCH/FS, TCH/EFS
TCH/F2.4, FACCH diagonal interleaving
+ stealing flags
block diagonal block diagonal block rectangular in: 456 bits
interleaving interleaving interleaving out: 4 blocks
in: 4 blocks in: 8 blocks in: 8 blocks diagonally interleaved
out: pairs of out: pairs of out: pairs of to depth 19, starting
blocks blocks blocks on consecutive bursts
3.2.3 3.1.3, 4.3.4 4.1.4 3.n.4
interface
4
encryption unit
56
Bad frame substitution
57
Bursts
Normal burst
Tail Information Training Information Tail
sequence
3 58 26 58 3
Access burst
Tail Training Information Tail
sequence
3 26 36 3
Synchronisation burst
Tail Information Training sequence Information Tail
3 39 64 39 3
148
Some notes:
• When modulated, the frequency correction burst produces
almost pure sine wave signal.
• Training sequences are pseudo-random sequences with
narrow autocorrelation function.
• Adjacent base stations use different training sequences.
• The mobile station has to switch off its transmitter between
bursts. Is this a problem?
58
Modulation
Before the first bit of the bursts enters the modulator, the
modulator has an internal state as if a modulating bit stream
consisting of consecutive ones (di = 1) had entered the
differential encoder. Also after the last bit of the time slot, the
modulator has an internal state as if a modulating bit stream
consisting of consecutive ones (di = 1) had continued to enter
the differential encoder.
59
The modulating data value αi input to the modulator is:
t
g (t ) = h(t ) * rect
T
t 1 T
rect = for t <
T T 2
t
rect = 0 otherwise
T
− t2
exp 2 2
h(t ) = 2δ T
(2π ) ⋅δT
ln(2)
where δ= and BT = 0.3
2πBT
where B is the 3 dB bandwidth of the filter with impulse
response h(t), and T is the duration of one input data bit.
60
The phase of the modulated signal is:
t '−iT
ϕ( t ') = ∑αiπh ∫ g(u)du
i −∞
The time reference t' = 0 is the start of the active part of the
burst. This is also the start of the bit period of bit number 0
(the first tail bit).
2 Ec
x(t ' ) = ⋅ cos(2π f 0 t '+ϕ (t ' ) + ϕ 0 )
T
where Ec is the energy per modulating bit, f0 is the centre
frequency and ϕ0 is a random phase and is constant during one
burst.
61
The average spectrum of the GMSK modulated signal is
relatively narrow band but 100 kHz away from the center
frequency the spectrum has dropped only about 10 dB.
Is this a problem?
62
Principles of Signalling
Linking
63
Signalling messages are sent over 64 kbit/s circuits, except for
the radio interface.
0 1 1 1 1 1 1 0 · · · fram 0 1 1 1 1 1 1 0
e· · ·
One flag can be used to indicate both the end of one frame and
the start of the next one. With the flag mechanism, the frame
contents may be of variable length, without frame length
indication. There is, however, a maximum length (272 octets)
defined in the SS/ protocols which is sufficient to cover most
signalling needs.
64
In LAPDm (radio interface), the use of flags is not necessary.
Why?
65
For error detection, both LAPD and MTP-2 use the HDLC
scheme of adding 16 redundancy bits to each frame. The
generator polynomial, in this case (using the same notation as
earlier), is
g(D) = D16+D12+D5+1
66
An example of messages where non-acknowledged mode is
more appropriate than acknowledged, are the measurement
messages sent by the mobile station. It is better for the base
station to get a new up-to-date report rather than a repeated
old report, in case a report is lost.
67
However, short messages are not transmitted on the FACCH
which makes the short message transmission rather slow,
roughly 80 bytes or 600 bits per second. Upper layers reduce
this rate further.
Networking
68
PD function origin/destination
CC call control management MS <−> MSC
SS suppl. services management (and HLR)
MM location management MS <−> MSC/VLR
security management
RR radio resource management MS <−> BSC
M B B M M
S T S S S
S C C C
| | | | MAP/E |
| | | distribution | TCAP |
| | | SCCP | SCCP |
| | | MTP-3 | MTP-3 |
| | LAPD | MTP-2 | MTP-2 |
| LAPDm | 64 kbit/s | MTP-1 | MTP-1 |
radio Abis A E interface
interface interface interface
69
Initial assignment:
70
Networking in the NSS
71
Radio Resource Management
In contrast to fixed telecommunication network, in mobile
communication network the access resources are allocated to
the user only on demand and for the duration of the call.
Another cellular system specific feature is the fact that the
connection is maintained despite the movements of the user.
These are the main functions of radio resource management.
Most of the functions in the RR plane relate to the
management of transmission between MS and anchor MSC.
(Anchor MSC is the single MSC that takes care of the
management functions during the whole call. If the MS moves
to another MSC area during the call, some of the duties are
shared between this relay MSC and the anchor MSC.)
72
Access
73
Transmission mode management
Transmission modes
74
Cipher mode management
Discontinuous transmission
75
Handover preparation
76
Measurements
77
Power control
The initial power level used in access, is fixed for each cell.
This level is broadcast on the BCCH.
78
Timing advance
79
Radio channel management
Access Channels
Traffic Channels
80
Dedicated channel allocation
81
The radio resource management procedures are described here
briefly:
Reasons:
• location updating
• answer to paging
• user’s request (e.g. outgoing call)
Only after the initial message, the network knows the identity
of the MS. The MS classmark is sent here including MS
revision level, RF power capability, encryption algorithm,
frequency capability, short message capability.
82
Paging
83
Mobility & Security Management
Location management
84
Mainly for paging purposes, the PLMN area is divided into
location areas. Each location area is managed by one
MSC/VLR.
PLMN selection
85
selection automatically based on a list of preferred PLMN’s
stored on the SIM.
Cell selection
where
A = (average received level) − p1
and
B = p2 - (MS maximum RF power)
86
The criterion C1 determines two things:
• the coverage limit of each individual cell (note: this may be
different for different MS’s)
• the boundary between two adjacent cells (see figure)
These borders are not fixed but change over time depending
on weather, traffic conditions etc. Near the border between
cells, the MS might have to change back and forth between the
two cells if the decision is strictly based on which one has
better C1. This is prevented with another broadcast parameter
called cell reselect hysteresis. In the new candidate cell, C1
must be c.r.h. higher than the C1 of the serving cell before
changing to the new cell. In this case, the borderline where
handover occurs depends on the direction of movement
(figure).
87
So, when the level received from another cell becomes
considerably higher than the level of the serving cell, the MS
will start listening to the new cell. If the new cell is in another
location area, the MS initiates a location update procedure. If
there is a call in progress, handover is executed.
88
If HLR needs to be contacted, the new MSC needs to know
the identity of the subscriber in order to know which HLR to
contact. Subscribers are identified by IMSI (International
Mobile Subscriber Identity) which is as follows
89
Security management
90
Communication Management
Management functions
91
Routing of a mobile terminating call is started by first asking
the necessary information from the HLR of the called party.
The HLR, where the query should be addressed, can be
determined from the first digits of the called number.
country national
code destination subscriber number
code
e.g.
92
Therefore, the charge to the calling party is independent of the
actual location of the called party. The called party will pay
for the rest of the expenses. Examples follow:
situation charging
call within one country the calling party pays for
from PSTN to home PLMN the call to PSTN operator,
PSTN operator may
compensate to PLMN
operator (if agreed)
call to a GSM phone whose the calling party pays the
home PLMN is in the same same as above, the called
country but the user is party will pay for the
roaming in another PLMN international part to the
home PLMN operator
call to a GSM phone whose the calling party pays for
home PLMN is in another an international mobile call
country, and the GSM user to the home PLMN
is roaming in a third country, the called party
country pays the same way as
above
Note that the GSM user gets her bills only from her home
PLMN operator. The different operators involved will deal
with the compensations between themselves.
93
Short messages
94
Network Management
• maintenance
95
Service & subscriber management
Network operator
HLR info é
ê charge info
J J
96
As mentioned earlier, the subscriber receives a single bill
from the operator or service provider with which the customer
hold her subscription. The services used in other networks are
paid by the operator of the home PLMN of the user, and
naturally, the home PLMN operator will charge the user.
Service provider
(if any) ê
subscription é access to service
ê billing
J
Maintenance
97
thousands of them in a network, and some more or less serious
failures will probably occur daily.
The network may ask for the IMEI of a mobile station, for
example, if it detects a problem which may be caused by the
mobile station.
98
Lists of IMEIs are stored in the Equipment Identity Register
(EIR). The information stored in the EIR can be operator
dependent. However, for example, the control of stolen mobile
stations is effective only when operators have common IMEI
checking policy.
The GSM operators use three levels (or lists) for the status of
IMEI’s:
System engineering
Also, the traffic does not remain constant. Installing from the
start a large enough capacity for long term traffic is not cost
effective. Therefore, the system engineering needs to be
refined while in operation.
99
order to provide economically continuous coverage, and
support the required traffic density.
• handover criteria
• power control
• discontinuous transmission
• frequency hopping
100
The following table summarises the parameters which system
engineering must manage to optimise the network
configuration for a given quality of service to an expected
number of users.
Area Parameters
frequencies
Cell planning beacon frequencies
hopping sequences
power control parameters
handover parameters
cell selection parameters
BSIC
# of common channels
Dimensioning # of traffic channels
location areas
periodic location updating
Load control overload control
parameters
101
Network operation
102
Evolution of the GSM System
MS RX 0 1 2 3 4 5 6 7 0 1
MS TX 5 6 7 0 1 2 3 4 5 6
Monitor
103
If two time slots per TDMA frame is used for one connection,
which doubles the data rate, the timing is as follows.
MS RX 0 1 2 3 4 5 6 7 0 1
MS TX 5 6 7 0 1 2 3 4 5 6
Monitor
If more time slots are used in order to obtain higher data rate,
the TX/RX activity periods necessarily overlap, and more
frequency synthesizers (2 or 3) are needed for the
implementation.
MS RX 0 1 2 3 4 5 6 7 0 1
MS TX 5 6 7 0 1 2 3 4 5 6
Monitor
104
For some applications, the uplink/downlink division is useful
to be asymmetric. Usually, the downlink is required to have
more data rate. The asymmetric cases illustrated below (2+1
& 3+1 slots) can be implemented without need to transmit and
receive at the same time in the terminal device.
MS RX 0 1 2 3 4 5 6 7 0 1
MS TX 5 6 7 0 2 3 4 5 6
Monitor
MS RX 0 1 2 3 4 5 6 7 0 1
MS TX 5 6 7 1 2 3 4 5 6
Monitor
105
General Packet Radio Service (GPRS)
The GSM system was not originally designed for packet data
transfer but many data applications are bursty and it is more
efficient if the radio resource is reserved only when something
needs to be sent.
MSC PSTN
BTS BSC
GPRS Core
GPRS
SGSN Backbone GGSN Internet
IP Network
106
The new elements introduced in GPRS are the serving GPRS
support node (SGSN) and the gateway GPRS support node
(GGSN).
107
The 3 bits are mapped to a 8-PSK constellation using Gray-
code as shown in the following figure.
(1,0,1) (1,1,0)
(1,0,0)
3π
The 8-PSK symbols are continuously rotated by 8 radians
per symbol before pulse shaping.
108
CDMA Systems Intro
• detect
• receive and decode
• jam
109
In mobile cellular communications, additional advantages of
spread spectrum technology are:
110
Spectrum spreading can be accomplished by direct
sequencing or frequency hopping.
B
PG = 10 log SS
B
111
The basic DS technique is illustrated in the following figure.
112
At the receiving end, St(t − T) is received after T seconds of
propagation delay. An estimate of the delay Tˆ is obtained
with a correlator. Then
G(t − T) G(t − Tˆ ) = 1
Then
S(t − T) = x(t − T) cos[2πf0(t − T)]
113
The spreading sequences should have a few special properties
114
An example of cellular CDMA systems is IS-95 (or US-
CDMA) specified by the Telecommunications Industry
Association (TIA).
Immediately, one can see that this is very much like GSM, at
this level. Naturally, there are differences if we go to details.
One major difference is the air interface which is, of course,
based on CDMA technology instead of TDMA.
115
The frequency spectrum for cellular systems in the U.S. is
allocated (in an auction) to network operators in slices of 1.25
Mhz. An operator might get, for example, a set of ten 1.25
Mhz channels in each direction.
116
The following figure illustrates the reverse traffic channel
operations from data to continuous waves.
117
The forward channel contains traffic channels,
synchronisation channel, paging channel, and a pilot signal.
--------
Introduction to 3rd generation systems utilising CDMA will be
given in a separate presentation.
118