Introduction to GSM Basic Concept

download Introduction to GSM Basic Concept

of 35

Transcript of Introduction to GSM Basic Concept

  • 7/31/2019 Introduction to GSM Basic Concept

    1/35

    RF TrainingMicrowave Link Engineering

    A communication system that utilizes the radio frequency band spanning 2 to 60

    GHz. As per IEEE, electromagnetic waves between 30 and 300 GHz are calledmillimeter waves (MMW) instead of microwaves as their wavelengths are about 1to 10mm

    Small capacity systems generally employ the frequencies less than 3 GHz whilemedium and large capacity systems utilize frequencies ranging from 3 to 15 GHz.Frequencies > 15 GHz are essentially used for short-haul transmission.

    Advantages:

    Less affected by natural calamities

    Less prone to accidental damage

    Links across mountains and rivers are more economically feasible

    Single point installation and maintenance

    Single point security

    They are quickly deployed

    Line of Sight Characteristic

    Highly directive

    Pencil like beam width

    EM wave follow straight line

    Link Engineering

    Site selection

    Frequency selection

    o G = 20 log F + 20 log D 52.6

    o Frequency increase ~ Diameter decreases

    o While choosing frequency, two things should be noted

    o interference, 2) Regulatory Issues

    o f = c/ (f mean mean rain attenuation decreases)

    o loss = 36.6 + 20 log f + 20 log D

    o loss = 32.4 + 20 log f + 20 log D

    o f mean loss mean distance

    Tower Heights profile

    Free Space phenomenon

    o Reflection

    o Refraction

    o Diffraction

    o Attenuation

    Terrain Survey Equipment Selection (depends on choice of frequency and antenna)

  • 7/31/2019 Introduction to GSM Basic Concept

    2/35

    ICT (Installation, Commissioning and Testing)

    Fresnel Zone

    Wave front has expanding properties as it travels through space. These propertiesresult in phase transition and reflection as wave passes over an obstacle. Thisresults in increase or decrease of signal. The amount of additional clearness that

    must be allowed to avoid Fresnel Phenomenon is called Fresnel Zone.

    Earth Bulge: K = effective radius of earth / true radius of earth

    Fading

    Weakening of RF signal

    Is due to Reflection, Refraction, Diffraction, Attenuation

    Type:

    o Multi path fading: interference between a direct wave and reflectedwave. Caused by reflection from grounds and atmospheric sheets andlayers. Temperature inversion of earth surface. Trees and water bodies.

    o Flat fading: A fade where all frequencies in the channel are equallyaffected. There is barely noticeable variation of the amplitude of the signalacross the channel bandwidth

    o Frequency selective fading: that disturb selected frequency

    o Fast Fading: rapid fluctuation of signal over small areas.

    o Slow fading: result of shadowing, mountain, hills and other non-movingobjects.

    o Rain fading: rain attenuates the signal, caused by scattering andabsorption of EM waves by rain drops. It start increasing at 10 GHz andabove 15GHz

    Fade Margin

    The amount by which the received signal may be reduced without causing thesystem performance to fall is call Fade Margin

    Path Loss

    The reduction of power density of EM wave as it travel thorough space

    Causes: FSL, Diffraction, Absorption, Distance between Tx and Rx, height,location of Antennas

    Diversity

    Used to removed fading

    Method of improving of reliability of message signal by using two or morecommunication channel.

    Provide equipment reliability

    Types:

    o Frequency diversity: two Tx and two Rx both are tuned at differentfrequencies with same information is being transmitted over bothfrequencies so one of them provides sufficient signal strength. A bitexpensive.

    o Space diversity: if two antennas are placed many wavelength apart, it

    has been observed that fading can not occur. One of the antennasprovides sufficient signal strength.

  • 7/31/2019 Introduction to GSM Basic Concept

    3/35

    o Time diversity: A time delay of two identical signals on parallel paths

    o Path diversity: signal arrives on geographically separate paths.

    Diversity Combiner

    o Combiner combines two or more diversity paths

    o Types:

    Selection combiner

    Equal gain combiner

    Maximal ratio combiner

  • 7/31/2019 Introduction to GSM Basic Concept

    4/35

    AntennaAn electrical conductor used to transmit and receive EM wave

    Types

    Isotropic

    o Ideal antenna, radiate power equally in all direction.

    o Gain ___

    Parabolic

    o High gain reflector antenna used in radio, television and datacommunication

    Directional

    o Radiate greater power in one or more direction, allowing for increaseperformance on Tx and Rx and reduce interference from unwanted

    sources. Dipole

    o Simplest practical antenna with center fed element for transmission andreception of RF energy.

    Pattern or antenna pattern or antenna radiation pattern

    The directional function characterizing the relative distribution of power radiatedby antenna

    Polarization

    Physical orientation of electric field

    Vertical and horizontal

    Transmitter and receiver antenna should have same polarization.

    Directivity

    Maximum value of directive gain is called directivity depend on shape of radiationpattern.

    Efficiency

    Ration of total power radiated to the input power of antenna.

    = power radiated / input power

    Gain

    Power output in a particular direction to that produced in any direction byisotropic antenna

    G = power output by antenna / power output by isotropic antenna

    Product of efficiency and directivity

    G = D

    Reciprocity

    Antenna ability which shows that same radiation pattern for transmission andreception

    Beam width

    Angular separation of half power points of radiation pattern

  • 7/31/2019 Introduction to GSM Basic Concept

    5/35

    Reflection Coefficient

    Ratio of reflected wave to incident wave

    + = V0

    - / V

    0

    VSWR / SWR (Voltage Standing Wave Ration) The SWR have max and min voltages

    The ratio of max voltage to min voltage of SW is called standing wave ratio and ifwe are dealing in term of voltage then it is called VSWR

    VSWR = V max/ V min= (1 + ) / (1 - )

    Antenna performance [calculated by site master]

    VSWR

    Distance to fault

    Insertion lose

    Reflection mean power transferred mean return lose

  • 7/31/2019 Introduction to GSM Basic Concept

    6/35

    NetworkingFunction of OSI Layers

    Layer # 1 (Physical Layer)

    o Physical characteristics of interfaces and media

    o Representation of bits (types of encoding)

    o Date rate (transmission rate (duration of bits))

    o Synchronization of bits

    o Line configuration (point-to-point configuration, multipoint configuration)

    o Physical topology (mesh, ring, bus topology etc)

    o Transmission mode (simplex, half/full duplex)

    Layer # 2 (Data Link Layer)

    o

    Frameso Framing

    o Physical addressing (source/destination address)

    o Flow control (prevent overwhelming)

    o Error control

    o Access control

    Layer # 3 (Network Layer)

    o Packets

    o Source to destination delivery of packets

    o Logical addressing

    o Routing

    Layer # 4 (Transport Layer)

    o Segment

    o Source to destination (end-to-end) delivery of entire message

    o Service point addressing

    o Segmentation and reassembly

    o Connection control (connection oriented / connection less)

    o Flow control (perform end to end)

    o Error control (perform end to end)

    Layer # 5 (Session Layer)

    o Establish, maintain, synchronize and terminates session between twocommunication systems

    o Dialog control

    o Synchronization

    Layer # 6 (Presentation Layer)

    o Translationo Encryption / decryption

  • 7/31/2019 Introduction to GSM Basic Concept

    7/35

    o Compression

    Layer # 7 (Application Layer)

    o Network virtual terminal

    o File transfer, access and management (FTAM)

    o Mail services

    o Directory services

    Network:

    Two or more than two computers that are attached to each other andcommunication with each others.

    Protocol

    Set of rules that governs the communication for each layer

    Difference between Protocol and Standard

    Protocol is Software (Data Link Layer)

    Standard is Hardware (Physical Layer)

    Every protocol may be standard but every standard is not a protocol

    Unicast

    an individual or device can be addressed to a single one

    Multicast

    an individual or device can be addressed to a group

    Broadcast

    an individual or device can be addressed to all

    Simplex

    Communication is unidirectional (TV, Radio)

    Half Duplex

    Each station can receive and transmit but not at the same time (Walky talky)

    Full Duplex

    Both station can receive and transmit simultaneously (Telephone)

    Broadband

    The generating frequency is different from is different from transmission

    frequencyBaseband

    The generating and transmission frequency are same

    LAN (Local Area Network)

    A network system which deals within one premise or same premises.

    LAN Technologies

    o Ethernet: 802.3, Access Method: CSMA/CD

    o Token Ring: 802.5, Access Method: Token Passing

    o FDDI: Fiber Distributed Data Interface, Access Method: Token Passing

  • 7/31/2019 Introduction to GSM Basic Concept

    8/35

    There are four basic types of media are used in local-area networks.

    o Coaxial Cable, Twisted Pair Cable, Optical Fiber, Wireless (WiFi)

    Topology:

    o Topology is a physical layout or distribution of network.

    o There are four basic types Topologies in LAN. Bus, Ring, Star, Mesh

    LAN Devices:

    o Repeaters:

    A repeater is a physical layer (layer 1) device

    Receive a digital signal and retransmit at high power

    o Hub:

    A hub is a physical layer (layer 1) device

    Used to connect multiple devices

    Internally Bus topology

    One broadcast domain and one collision domain

    o Bridge:

    A bridge is a Data Link layer (layer 2) device

    Connect multiple network segments

    One broadcast domain

    No. of ports = collision domain (max 16 ports)

    Software based

    o

    Switch: A Switch is a Data Link layer (layer 2) device

    Some switches also work on Network Layer (layer 3)

    Connect multiple network segments

    One broadcast domain

    Contain more Ethernet ports

    Hardware based

    WAN

    Wide Area Network is a computer network that covers a broad area i.e. any

    network whose communications links cross metropolitan, regional or nationalboundaries

    Router

    o Network layer device (layer 3)

    o Works on IP

    o Device that extracts a destination of packet, select the best path fordestination and forward packet to next device on selective path

    o No broadcast domain

    o Used to connect different networks

  • 7/31/2019 Introduction to GSM Basic Concept

    9/35

    o Principles of Router

    Routing is always done on the network portion of destination IPaddress

    Routing is always done on next hop basis

    Packets from unknown destination are ignored by router

    There are two types of routing.

    o Static Routing

    Static routing used fixed tables. It is also called default routingbecause there is only one destination network where we want tosend a message.

    o Dynamic Routing

    Router selects the best path for packet or data from routing tableand also depends upon metric based calculation and hop count.Routing tables hold the data for making forwarding decisions. In

    order to route packets, a router communicates with other routersusing routing protocols and using this information creates andmaintains a routing table. The routing table stores the best routesto certain network destinations, the "routing metrics" associatedwith those routes, and the path to the next hop router

    Switching protocol

    Layer 2 protocol

    o ARP (Address resolution protocol)

    Conversion of IP to MAC address

    o RARP (reverse Address resolution protocol)

    Conversion of MAC to IP address

    Metric

    Criteria through which path selection is made

    Administrative Distance

    Assigned by CISCO

    Varies between 0 ~ 255

    Can be changed except directly connected network

    Protocol

    Administrative

    DistanceRIP 120

    ISIS 115

    OSPF 110

    IGRP 100

    EIGRP 90

    BGP 20

    Static Route 1

    Directly Connected 0

    Routing protocol

    Used for the selection of best path

    Operates on routers only

  • 7/31/2019 Introduction to GSM Basic Concept

    10/35

    RIP, IGRP, EIGRP, OSPF, BGP

    Distance Vector Routing Protocol

    o Maintain routing table

    o Update routing information after every 30 seconds

    o Transmit routing table to neighboring node

    o RIP, IGRP

    Link State Routing Protocol

    o Contain routing table, topology table and neighboring table

    o Forward the routing table whenever change occur in network topology

    o Fast convergence and better performance

    o OSPF

    RIP (Routing information protocol)

    o Distance vector routing protocolo Metric is hop count

    o Maximum hop count is 15

    o Administrative distance is 120

    IGRP (Interior Gateway Routing protocol)

    o CISCO proprietary protocol and run on CISCO Routers

    o Distance vector routing protocol

    o Metric is Bandwidth, delay, reliability, load, MTU

    o

    By default is BW and delayo Administrative distance is 100

    EIGRP (Extended Interior Gateway Routing protocol)

    o CISCO proprietary protocol

    o Hybrid protocol (contain functionality of both Link State and DistanceVector routing protocol)

    o Metric is Bandwidth, delay

    o Support IP, IPx, Apple Talk

    o Administrative distance is 90

    OSPF (Open Shortest Path First)

    o Defined by IETF (Internet Engineering Task Force)

    o Metric is Cost based on BW (cost = 108 / BW)

    o Link State routing protocol

    o Deployed in hierarchical design

    o Suitable for large network

    o Administrative distance is 110

    o Decrease network overhead due to introduction of areas

    BGP (Border Gateway Protocol)

  • 7/31/2019 Introduction to GSM Basic Concept

    11/35

    Routed protocol

    Used to carry the data and reached to destination according to the best path.

    Operate all over the network

    IP, Apple Talk, IPx (internet packet exchange)

    IP Addressing

    Numeric identified assigned to each machine on a IP network

    Network address uniquely identifies the network

    Node address uniquely identifies each machine

    Classes of IP Addressing

    o Class A (1 126) used for data communication

    o Class B (128 191) -do-

    o Class C (192 223) -do-

    o Class D (224 239) used for multi casting

    o Class E (240 255) research and testing purposes

    Class A

    o N . H . H . H

    0 xxx xxxx

    o Sub net mast 255.0.0.0

    o Private IP 10.0.0.0

    o 27-2 (128-2=126) networks

    0 000 0000 00 111 1111 127

    o 224-2 (16,777,216-2= 16,777,214) hosts

    Class B

    o N . N . H . H

    10 xx xxxx

    o Sub net mast 255.255.0.0

    o Private IP 172.16.0.0

    o 214 (16,384) networks

    10 00 0000 12810 11 1111 191

    o 216-2 (65,536-2= 65,534) hosts

    Class C

    o N . N . N . H

    110 x xxxx110 0 0000 192110 1 1111 223

    o Sub net mast 255.255.255.0

    o Private IP 192.168.0.0

    o 221 (2,097,152) networks

    o 28-2 (256-2= 254) hosts

  • 7/31/2019 Introduction to GSM Basic Concept

    12/35

    Subnetting

    To create subnetworks, take bits from host portion to network i.e. subnet

    Determine the required network ID

    Determine the host required per subnet

    One subnet mast for entire network

    Range of host ID

    Default subnet mask is used to determine the part of host address in IP address

    TCP / IP Model

    Layer 5 (Application Layer)

    The application layer is used by most programs for network communication. Datais passed from the program in an application-specific format, and thenencapsulated into a transport layer protocol.

    DNS (Domain Name System)

    o Translation from Host Name to IP and vice versa.

    DHCP (Dynamic Host Configuration Protocol)

    o Client-Server protocol that automatically provide an IP host with its IPaddress and other related configuration information such as subnet maskand default gateway.

    o Dynamic allocation of IP: Network administrator assigns a range of IPaddress to DHCP. During network initialization an IP is assigned to client.

    o Automatic Allocation: Permanently assign an IP from the pool of IPaddresses to client.

    o

    Manual Allocation: Allocate IP on base of table of MAC address File Transfer Protocol

    o Use to transfer data from one computer to another over the internet orthrough a network.

    H.323

    o Is an umbrella recommended by ITU-T defines the protocol to provideaudio-visual communication session on any packet network.

    o Use for real time application.

    o Commonly used in VoIP

    o Developed for transporting multimedia applications.

    RTP (Real-Time Transport Protocol)

    o Defines standardized packet format for delivering audio and video overinternet.

    o Port used 16384-32767

    o Less sensitive for packet loss but sensitive for delay

    o Uses UDP

    o Header is normally of 12 bytes

    o Header fields are:

    Payload (7 bits): type of audio or video encoding

  • 7/31/2019 Introduction to GSM Basic Concept

    13/35

    Sequence No. (16 bits)

    Time Stamp (32 bits): for sampling instance

    SSRC (32 bits): Synchronous Source Identifier used foridentification of RTP source

    RTCP (Real Time Control Protocol)o Multimedia application use with conjunction with RTP.

    o RTCP Packets are sent periodically and contain sender and receiver reportsthat announce statistics.

    o Used to increase QoS

    o RTP/RTCP protocols are commonly used to transport audio or audio/videodata. Separate sessions are used for each media content (e.g. audio andvideo). The main advantage of this separation is to make it possible toreceive only one part of the transmission, commonly audio data, whichlowers the total bandwidth

    RTSP (Real Time Streaming Protocol)

    o RTSP is a protocol for use in streaming media systems which allows aclient to remotely control a streaming media server, issuing VCR-likecommands such as play and pause, and allowing time-based access tofiles on a server.

    o Out of band protocol

    o Use both TCP or UDP

    o Does not define compression for audio and video

    o Does not define how audio and video encapsulated

    o Does not restrict how media player buffer audio/video SIP (Session Initiation Protocol)

    o Used for creating, modifying and terminating session

    o Port no is 5060

    o SIP client uses UDP and TCP

    o Commonly used in VoIP with H.323

    o Provide signaling similar to HTTP (Human readable)

  • 7/31/2019 Introduction to GSM Basic Concept

    14/35

    Layer 4 (Transport Layer)

    The transport layer's responsibilities include end-to-end message transfercapabilities independent of the underlying network, along with error control,fragmentation and flow control. End to end message transmission or connectingapplications at the transport layer can be categorized as either: Connection

    oriented or Connectionless TCP (Transmission Control Protocol) o

    Connection oriented, acknowledge

    o Reliable

    o 20 byte header contain:

    Source port (16 bits): identifies the sending port

    Destination port (16 bits): identifies the receiving port

    Sequence number (32 bits): has a dual role

    If the SYN flag is present then this is the initial sequencenumber and the first data byte is the sequence number plus

    1

    if the SYN flag is not present then the first data byte is thesequence number

    Acknowledgment number (32 bits): if the ACK flag is set thenthe value of this field is the sequence number that the sender ofthe acknowledgment expects next.

    Data offset (4 bits): specifies the size of the TCP header in 32-bitwords. The minimum size header is 5 words and the maximum is15 words thus giving the minimum size of 20 bytes and maximumof 60 bytes. This field gets its name from the fact that it is also theoffset from the start of the TCP packet to the data.

    Reserved (4 bits): for future use and should be set to zero

    Flags (aka Control bits) contains 8 bit flags

    CWR Congestion Window Reduced (CWR) flag is set by thesending host to indicate that it received a TCP segment withthe ECE flag set (added to header by RFC 3168).

    ECE (ECN-Echo) indicate that the TCP peer is ECN capableduring 3-way handshake (added to header by RFC 3168).

  • 7/31/2019 Introduction to GSM Basic Concept

    15/35

    URG indicates that the URGent pointer field is significant

    ACK indicates that the ACKnowledgment field is significant

    PSH Push function

    RST Reset the connection

    SYN Synchronize sequence numbers

    FIN No more data from sender

    Window (16 bits): the number of bytes that may be received onthe receiving side before being halted from sliding any further andreceiving any more bytes as a result of a packet at the beginning ofthe sliding window not having been acknowledged or received.Starts at acknowledgement field.

    UDP (User Datagram Protocol)

    o Connection less, unacknowledged

    o Not Reliable

    o No hand shaking between Tx and Rx

    o Small packet overhead

    o DNS, RIP and SNMP use UDP

    o Used with multimedia, voice application

    o Depend upper layer protocol for reliability

    o Source port

    This field identifies the sending port when meaningful and shouldbe assumed to be the port to reply to if needed. If not used, then itshould be zero.

    o Destination port

    This field identifies the destination port and is required.

    o Length

    A 16-bit field that specifies the length in bytes of the entiredatagram: header and data. The minimum length is 8 bytes sincethat's the length of the header. The field size sets a theoretical limitof 65,527 bytes for the data carried by a single UDP datagram. Thepractical limit for the data length which is imposed by theunderlying IPv4 protocol is 65,507 bytes.

  • 7/31/2019 Introduction to GSM Basic Concept

    16/35

    ICMP (Internet Control Message Protocol)

    o Ping

    o Error reporting

    o Used by host and routers to communicate network layer information with

    otherLayer 3 (Internet Layer)

    Internet Protocol

    o Unreliable, connection less

    o Provide no error checking or tracking o

    Packet in IP layer is called Datagram

    o Length is variable (up to 65536 bytes)

    o Header is of 20 to 60 byte

    o Header contain:

    version (IPv4 or IPv6) 4 bits

    Internet Header Length (IHL): The second field is a 4-bit InternetHeader Length (IHL) telling the number of 32-bit words in theheader. Since an IPv4 header may contain a variable number ofoptions, this field specifies the size of the header (this alsocoincides with the offset to the data). The minimum value for thisfield is 5 (rfc791), which is a length of 532 = 160 bits. Being a 4-bit field the maximum length is 15 words or 480 bits.

    Type of Service (TOS)

    Total Length: This 16-bit field defines the entire datagram size,including header and data, in bytes. The minimum-length datagramis 20 bytes (20 bytes header + 0 bytes data) and the maximum is

    65,535 the maximum value of a 16-bit word. The minimum sizedatagram that any host is required to be able to handle is 576bytes, but most modern hosts handle much larger packets.Sometimes subnetworks impose further restrictions on the size, inwhich case datagrams must be fragmented. Fragmentation ishandled in either the host or packet switch in IPv4 (seeFragmentation and reassembly).

    Identification: This field is an identification field and is primarilyused for uniquely identifying fragments of an original IP datagram.

    Some experimental work has suggested using the ID field for otherpurposes, such as for adding packet-tracing information to

  • 7/31/2019 Introduction to GSM Basic Concept

    17/35

    datagrams in order to help trace back datagrams with spoofedsource addresses

    Flags: A 3-bit field follows and is used to control or identifyfragments. They are (in order, from high order to low order):

    Reserved; must be zero.

    Don't Fragment (DF)

    More Fragments (MF)

    If the DF flag is set and fragmentation is required to routethe packet then the packet will be dropped. This can beused when sending packets to a host that does not havesufficient resources to handle fragmentation.

    When a packet is fragmented all fragments have the MF flagset except the last fragment, which does not have the MFflag set. The MF flag is also not set on packets that are notfragmented clearly an unfragmented packet can be

    considered the last fragment.

    Fragment Offset: The fragment offset field, measured in units of 8-byte blocks, is 13-bits long and specifies the offset of a particularfragment relative to the beginning of the original unfragmented IPdatagram. The first fragment has an offset of 0. This allows amaximum offset of 65,528 () which would exceed the maximum IPpacket length of 65,535 with the header length included.

    Time To Live (TTL): An 8-bit time to live (TTL) field helps preventdatagrams from persisting (e.g. going in circles) on an internetwork.Historically the TTL field limited a datagram's lifetime in seconds,but has come to be a hop count field. Each packet switch (or router)

    that a datagram crosses decrements the TTL field by one. When theTTL field hits zero, the packet is no longer forwarded by a packetswitch and is discarded. Typically, an ICMP message (specifically thetime exceeded) is sent back to the sender that it has beendiscarded. The reception of these ICMP messages

    is at the heart of how traceroute works.

    Layer 2 & 1 (Data Link / Physical Layer)

    Cell Relay: fix length packets called Cell to be transported between nodes.

    ATM is Cell Relay

    No error correction or flow control

    ATM (Asynchronous Transfer Mode) High speed connection oriented and multiplexing technology for transmitting

    information across a wide area network

    53 bytes of cell (48 byte data, 5 byte header)

    Different from IP or Ethernet where variable size packet is used.

    Mostly used in WAN

    ADSL implements ATM

    Eliminates varying delay time associated with different packet size

    Can use permanent virtual circuit or switched virtual circuit

    ATM standard defines three layers

  • 7/31/2019 Introduction to GSM Basic Concept

    18/35

    o AAL (Application Adaptation Layer): accept transmission from upper

    layer services and mapped them into ATM cell

    AAL is divided into two sublayer:

    Convergence sublayer (CS):

    o add overhead and manipulates the data stream atthe sending station

    o Perform the opposite function at receiving end

    Segmentation and reassembling (SAR):

    o At sending station, segment the bit stream in samesized packet, add header and trailer

    o Perform the opposite function at receiving end

    Four different AAL

    o AAL1: constant bit rate stream

    o AAL2: variable bit rate stream

    o AAL3/4: conventional packet switching

    o AAL5: packet requiring no information from SARLayer

    o ATM Layer: provide routing traffic management, switching andmultiplexing services

    o Physical Layer: define the transmission medium bit transmissionencoding to electrical to optical transformation

    FR (Frame Relay)

    Cost effective technology that connects LAN

    Used as encapsulation technique for voice and data by network service providersbetween LAN and WAN

    Can handle bursty data

    Eliminate extensive error checking

    PVC (permanent virtual circuit) and SVC (switched virtual circuit) connections areused

    DLCI (data link connection identifier) identifies VC in FR

    Operate at layer 1 & 2

    At layer 2, use a simplified version of HDLC (High level data link control)

    Routing and switching are function of data link layer

    Flow control is handled through BECN (backward explicit congestion notification)

    or FECN (forward explicit congestion notification)

    56 kbps, 64 kbps, 128 kbps, 256 kbps, 512 kbps and 1.5 Mbps

  • 7/31/2019 Introduction to GSM Basic Concept

    19/35

    Global System for Mobile CommunicationGSM Band

    GSM 900

    o Uplink 890-915 MHz

    o Downlink 935-960 MHz

    o Sub band 25 MHz with 200kHz guard band

    o No. of carriers 125

    GSM 1800 (DCS-Digital Cellular System)

    o Uplink 1710-1785 MHz

    o Downlink 1805-1880 MHz

    o Sub band 75 MHz with 200kHz guard band

    o No. of carriers 375

    ARFCN (Absolute Radio Frequency Channel Number)

    It is a number scheme used to identify RF channels in GSM radio system

    BW (Bandwidth)

    Information carrying capacity of a communication channel

    Express in Hz for analog and bps for digital (data rate)

    BER (bit error rate)

    Number of bits corrupted bits / total number of bits (for digital system)

    Cell

    The geographic area encompassing the signal range from one base station (a sitecontaining radio transmitter/receiver and network communication equipment).Wireless transmission networks are comprised of many hexagonal, overlappingcell sites to efficiently use radio spectrum for wireless transmissions. Also, thebasis for the term "cellular phone."

    Cluster

    A group of cell with no frequency reuse in adjacent cell

    Sector

    Physical coverage area associated with base station having its own antenna, radioports and control channel.

    Sec t oriz at ion

  • 7/31/2019 Introduction to GSM Basic Concept

    20/35

    Co channel interference

    Unwanted interference within a radio channel from another transmitter using thesame channel at a different location. It is a dominant factor in frequency reusesystem.

    Cell Splitting

    Process of splitting cell into smaller cell.

    Usually done to accommodate more traffic

    Spectral Efficiency

    Traffic in earlang per sq. km per MHz

    GSM Architecture

    MS

    Physical equipment use by subscriber. Normally handheld wireless phone contain

    SIM that carry all information of subscriber.

    SIM The SIM carriers the following information:

    o Authentication Key (Ki)

    o Subscriber information

    o Cipher key (Kc)

    o Additional GSM Services

    o IMSI: The IMSI is assigned to an MS at subscription time. It uniquelyidentifies a given MS. The IMSI will be transmitted over the radio interfaceonly if necessary. The IMSI contains 15 digits and includes

    Mobile Country Code (MCC)-3 digits (home country) Mobile Network Code (MNC)-2 digits (home GSM PLMN)

    Mobile Subscriber Identification (MSIN)

    Nation Mobile Subscriber Identity (NMSI)

    o TMSI: Temporary Mobile Subscriber identity is assigned to an MS by theVLR. The TMSI uniquely identifies an MS within the area controlled by agiven VLR. The maximum number of bits that can be used for TMSI is 32.

  • 7/31/2019 Introduction to GSM Basic Concept

    21/35

    OMC

    G

    VLROther MSCs

    VLR

    D

    BSS

    BAbis

    Um A C

    BM

    BT S

    SSS C

    MSC HLR AUC

    E F

    Other MSC Other

    NetworkEIR

    BSS (Base Station Subsystem)

    The Base Station Subsystem is composed of two parts:BTS (Base Transceiver Station) & BSC (Base Station Controller)

    These communicate across the standardized Abis interface

    BTS (Base Transceiver Station)

    o The Base Transceiver Station houses the radio transceivers that define acell and handles the radio-link protocols with the Mobile Station.

    o This is the radio gear that passes all calls coming in and going out of a cellsite.

    o The base station is under direction of a base station controller

    o BTS contain TRAU (Transcoder Rate Adaptation Unit)

    o TRAU is used for speech encoding, decoding and allow lower data ratesover Abis Channel.

    o TRAU can be located in MSC for more compressed transmission

    BSC (Base Station Controller)

    o The Base Station Controller manages the radio resources for one or more

    BTSs.

    o It handles radio-channel setup, frequency hopping, and handovers.

    o The BSC is the connection between the mobile station and the Mobileservice Switching Center (MSC).

    o One BSC may handle multiple BTSs (more than 40)

    NSS (Network Switching Subsystem)

    The Network Switching Subsystem, also referred to as the GSM core network

    NSS carries out switching functions and manages the communications between

    mobile phones and the PSTN.

  • 7/31/2019 Introduction to GSM Basic Concept

    22/35

    It is owned and deployed by mobile phone operators and allows mobile phones tocommunicate with each other and telephones in the wider telecommunicationsnetwork.

    The architecture closely resembles a telephone exchange, but there are additionalfunctions which are needed because the phones are not fixed in one location.

    MSC (Mobile Switching Center)

    o MSC is a sophisticated telephone exchange which provides circuit-switchedcalling, mobility management, and GSM services to the mobile phonesroaming within the area that it serves. This means voice, data and faxservices, as well as SMS and call divert.

    o MSC is basically is an ISDN switch coordinating and setting up calls to andfrom the mobile station.

    GMSC (Gateway MSC)

    o GMSC is the MSC that determines which visited MSC the subscriber who isbeing called is currently located.

    o It also interfaces with the PSTN. All mobile to mobile calls and PSTN tomobile calls are routed through a GMSC.

    HLR (Home Location Register)

    o HLR is a central database that contains details of each mobile phonesubscriber that is authorized to use the GSM core network.

    o There is one logical HLR per PLMN.

    o The HLR stores details of every SIM card issued by the mobile phoneoperator.

    o The HLR stores the IMSI, MS ISDN number, VLR address, and subscriber

    data on supplementary services.

    AUC (Authentication Center)

    o It is a protected database that contain security information of subscriber

    o Usually interacts with the HLR

    VLR (Visitor Location Register)

    o The Visitor Location Register or VLR is a temporary database of thesubscribers who have roamed into the particular area which it serves.

    o Each Base Station in the network is served by exactly one VLR; hence asubscriber cannot be present in more than one VLR at a time.

    o The data stored in the VLR has either been received from the HLR, orcollected from the MS.

    o The VLR stores the MSRN, TMSI, the location area, data on supplementaryservices, IMSI, MS ISDN number, HLR address or GT, and local MSidentity, if used.

    EIR (Equipment Identity Register)

    o EIR is a list of valid mobile equipment on the network.

    o IMEI (international mobile equipment identity) used to interrogate EIR.

  • 7/31/2019 Introduction to GSM Basic Concept

    23/35

    GSM Interfaces

    Um Radio Interfaces (MS to BTS)

    o This interface uses LAPDm protocol for signaling, to conduct call control,measurement reporting, Handover, Power control, Authentication,Authorization, Location Update and so on.

    o Data rate is 13 kbps (RPE-LP)

    Abis Interface (BTS to BSC)

    o Generally carried by a DS1, ES1 or E1.

    o Data rate 64kbps for user data or speech and 16 kbps for signaling

    A interface (BSC to MSC)

    o It is used for carrying Traffic channels.

    o Data rate 2 Mbps or more

    Security Algorithm

    Authentication (A3)

    Encryption (A5)

    Privacy key generation (A8)

    Ki is the 128-bit Individual Subscriber Authentication Key utilized as a secret keyshared between the Mobile Station and the Home Location Register of thesubscriber's home network.

    RAND is 128-bit random challenge generated by the Home Location Register.

    SRES is the 32-bit Signed Response generated by the Mobile Station and the

    Mobile Services Switching Center.

    Kc is the 64-bit ciphering key used as a Session Key for encryption of the over-the-air channel. Kc is generated by the Mobile Station from the random challengepresented by the GSM network and the Ki from the SIM utilizing the A8 algorithm

    Authentication and Key Generation Mechanism

    The Mobile Station (MS) signs into the network.

    The Mobile Services Switching Center (MSC) requests 5 triples from the Home

    Location Register (HLR).

    The Home Location Register creates five triples utilizing the A8 algorithm. Thesefive triples each contain:

    o A 128-bit random challenge (RAND)

    o A 32-bit matching Signed Response (SRES)

    o A 64-bit ciphering key used as a Session Key (Kc)

    The Home Location Register sends the Mobile Services Switching Center the fivetriples.

    The Mobile Services Switching Center sends the random challenge from the firsttriple to the Base Transceiver Station (BTS).

    The Base Transceiver Station sends the random challenge from the first triple tothe Mobile Station.

  • 7/31/2019 Introduction to GSM Basic Concept

    24/35

    The Mobile Station receives the random challenge from the Base TransceiverStation and encrypts it with the Individual Subscriber Authentication Key (Ki)assigned to the Mobile Station utilizing the A3 algorithm.

    The Mobile Station sends the Signed Response to the Base Transceiver Station.

    The Base Transceiver Station sends the Signed Response to the Mobile Services

    Switching Center.

    The Mobile Services Switching Center verifies the Signed Response.

    The Mobile Station generates a Session Key (Kc) utilizing the A8 algorithm, theIndividual Subscriber Authentication Key (Ki) assigned to the Mobile Station, andthe random challenge received from the Base Transceiver Station.

    The Mobile Station sends the Session Key (Kc) to the Base Transceiver Station.

    The Mobile Services Switching Center sends the Session Key (Kc) to the Base

    Transceiver Station.

    The Base Transceiver Station receives the Session Key (Kc) from the Mobile

    Services Switching Center.

    The Base Transceiver Station receives the Session Key (Kc) from the Mobile

    Station.

    The Base Transceiver Station verifies the Session Keys from the Mobile Stationand the Mobile Services switching Center.

    The A5 algorithm is initialized with the Session Key (Kc) and the number of theframe to be encrypted.

    Over-the-air communication channel between the Mobile Station and BaseTransceiver Station can now be encrypted utilizing the A5 algorithm.

    GSM Services

    Bearer services

    o These services give the subscriber the capacity required to transmitappropriate signals between certain access points (i.e. user-networkinterface).

    o SMS, UMS (Unified message services), Group 3 Fax, Voice mail box, Email

    Teleservices

    o These services provide the subscriber with necessary capabilities includingterminal equipment functions to communicate with other subscribers.

    o Mobile telephony, Emergency calling

    Supplementary services

    o These services modify or supplement basic telecommunications servicesand are offered together or in association with basic telecommunicationsservices.

    o Call waiting, call hold, call forwarding

    Speech Coding

    Speech coding is a process of reducing bit rate of digital speech for transmission

    and storage while maintaining speech quality. Speech coding method are:

  • 7/31/2019 Introduction to GSM Basic Concept

    25/35

    o Wave form coding (low capacity, low delay)

    o Source coding (vocoding)

    o Hybrid coding (high capacity, high delay)

    Speech codec attributes:

    o Delay, Complexity, Bandwidth, Quality, Transmission bit rate

    PCM (Pulse Code Modulation) 64 kbps

    ADPCM (Adaptive Differential PCM) 32 kbps

    CELP (Code Excited Linear Prediction): 16 kbps

    RPE-LP (Regular Pulse Excited Linear Prediction): 13 kbps

    VSELP (Vector Sum Excited Linear Prediction): 8 6.7 kbps

    Quadruple-mode VSELP: 5.6 kbps

    PSI (Pitch Synchronous Innovation) 3.45 kbps

    Channel Coding

    Used to reduces BER of channel

    Convolutional coding is used as channel coding in GSM

  • 7/31/2019 Introduction to GSM Basic Concept

    26/35

    Channels

  • 7/31/2019 Introduction to GSM Basic Concept

    27/35

    Control Channel Channel Type Usage

    Continually broadcasts, on the

    Broadcast ControlChannel (BCCH)

    Frequency CorrectionChannel (FCCH)

    Synchronization Channel(SCH)

    Random Access Channel(RACH)

    Paging Channel (PCH)

    Access Grant Channel

    Broadcast downlink(Base station to

    mobile)

    Broadcast downlink

    Common uplink

    (Mobile to basestation)

    Common downlink(Base station to

    mobile)

    downlink, information includingbase station identity, frequencyallocations, and frequency-

    hopping sequences.Used to synchronies the mobileto the time slot structure of acell by defining the boundariesof burst periods, and the timeslot numbering. Every cell in aGSM network broadcasts exactlyone FCCH and one SCH, whichare by definition on time slotnumber 0 (within a TDMAframe).

    Slotted Aloha channel used by

    the mobile to request access tothe network.

    Used to alert the mobile stationof an incoming call.

    Used to allocate an SDCCH to amobile for signaling (in order to

    (AGCH)Broadcast downlink

    Slow Associated Control

    Channel (SACCH)Uplink and downlink

    Fast Associated Control

    Channel (FACCH)Uplink and downlink

    obtain a dedicated channel),

    following a request on theRACH.

    In every traffic channel. Usedfor low rate, non criticalsignaling.

    A high rate signaling channel,used during call establishment,subscriber authentication, andfor handover commands

    Handover

    The passing of call signal from one BS to other as user move out of the range

    Handoffs between time slots or frequencies in the same cell (intra-BTS);

    Handoffs from BTS to BTS under control of the same BSC (inter-BTS);

    BTS under one BSC to BTS of another BSC, but all under the same MSC (inter-BSC);

    BTS in one network to BTS of another network, under different MSCs (inter-MSC)

  • 7/31/2019 Introduction to GSM Basic Concept

    28/35

    Which modulation scheme is used in GSM?

    GMSK (Guassian Minimum Shift Keying)

    What is AMR?

    AMR is Adaptive Multi Rate Codec

    AMR is a codec that can change the encoding technique according to the SNR

    If SNR is better, less bits should be used for error control

    If SNR is not good, error control bits may be increased

    AMR is used to reduced interference

    What is Equalization?

    Measure taken to reduce distortion effects in a radio channel.

    What is interleaving?

    The process of spreading of block of data over a wider time frame by placing bitsfrom other data block in between the original data bits in original data block.

    Interleaving avoid bursty fading and interference phenomenon.

    What is Frequency Re-use?

    A technique of reusing frequencies and channels within a communications systemto improve capacity and spectral efficiency. Frequency reuse generally utilizesregular reuse patterns.

    What is DTX?

    Discontinuous Transmission

    Means that the transmitter is powered on only when the user is actively talkingand power should be off when is there is no burst transmitted.

    What is SHF?

    Slow frequency hoping

    In SHF, operating frequency is changed in every TDMA frame

    The mobile transmitting at one frequency during the time slot, hop to differentfrequency before the next time slot.

    Used to improve signal quality in GSM

    What is APC?

    Adaptive Power Control

    The purpose of APC is to adjust the radio transmitter and adapt to the need of anactual radio link between the BTS and MS

    If MS is very near to BTS, MS should transmit less power then the MS which is atthe boundary of Cell.

  • 7/31/2019 Introduction to GSM Basic Concept

    29/35

    Communication FundamentalSignal Encoding Scheme

    Bit Rate

    Number of bits per second

    Bit rate = sampling rate x number of bits / sample

    Baud Rate

    Number of symbol per second

    Baud rate = bit rate / number of bits per sample

    Digital Data, Digital Signals

    NRZ

    Multilevel Binary

    Biphase

    Scrambling Scheme

    Digital Data, Analog Signals

    ASK (Amplitude Shift Keying)

    PSK (Phase Shift Keying)

    FSK (Frequency Shift Keying)

    QAM (Quadrature Amplitude Modulation)

    o Logical extension of QPSK

    o Combination of ASK and PSKo Two signals can be transmitted with phase quadrature

    Analog Data, Digital Signals

    Steps involved for converting A/D

    o Sampling

    o Quantization

    o Encoding

    PCM (Pulse Code Modulation)

    o It is a digital representation of analog signal where the magnitude of signalis sampled regular intervals (twice the BW) then quantized a series tosymbol in binary code

    o [Step size] = 2mp/ L

    L = Number of Levels

    o L = 2R

    R = Number of bits used to encode one sample

    o For PCM; L = 256 (R = 8 L = 28 = 256)

    o Data rate = 64 kbps

    o Aliasing

  • 7/31/2019 Introduction to GSM Basic Concept

    30/35

  • 7/31/2019 Introduction to GSM Basic Concept

    31/35

    WiMAXWorldwide Interoperability for Microwave Access

    Describes WiMAX as "a standards-based technology enabling the delivery of lastmile wireless broadband access as an alternative to cable and DSL."

    Wireless is point to point and WiMAX is point to multipoint

    Range 30 miles Radius from the Base Station for LOS

    Range 4 6 miles Radius from the Base Station for NLOS

    Maximum data speed supported is 70 Mbps

    Line of Sight is not needed between user and the base station unless very highdata rates are required at the user premises.

    Licensed Frequency band: 2 11 GHz

    Unlicensed Frequency band: 10 to 66 GHz

    Uses Cyclic Prefix (CP) to eliminate ISI

    Two main types of spectrum allocation:

    o Licensed: Licensed frequencies are typically awarded through an auctionor beauty contest

    o Unlicensed: Unlicensed frequencies allow multiple service providers toutilize the same section of the spectrum

    802.16 Wireless MAN (WiMAX ) [Unlicensed, Licensed]

    802.11 Wireless LAN WiFi (Wireless Fidelity) [unlicensed 2.4GHz, 5GHz]

    802.15 Wireless PAN Bluetooth

    WiFi (2.4GHz and 5GHz) are the free of cost frequencies i.e. Unlicensed

    WiMAX (2GHz to 6GHz) contain both licensed and unlicensed frequencies

    Aims and Objectives of WiMAX 802.16

    o Superior Performance: To achieve superior throughputs in delivering IPdata services compared to other 3G technologies

    o Flexibility: Allow operators to offer both fixed and mobile access inmultiple spectrum bands

    o Attractive Economics: Eliminating the need for extensive and expensivewire line infrastructure and providing highly flexible and cost-effective last-

    mile solutionso QoS: Defines Service Flows which can map to DiffServ code points or

    MPLS flow labels that enable end-to-end IP based QoS.

    Multipoint Broadband Wireless Access (BWA) systems are composed of two keyelements

    o Base station and

    o Subscriber equipment

    CPE: customer premises equipment

  • 7/31/2019 Introduction to GSM Basic Concept

    32/35

    802.16a 802.16REVd 802.16e Fixed

    Outdoor Fixed Outdoor Mobility

    Applications Applications Applications

    E1/T1 service for enterprises Indoor Broadband access for "Portable" Broadband accessBackhaul for Hotspots residential users (High Speed for consumersLimited residential Internet, VoIP,) Always Best ConnectedBroadband access

    CPE CPE CPE

    External box connected to PC External box connected to PC PC Cardwith outside antenna with built-in antenna

  • 7/31/2019 Introduction to GSM Basic Concept

    33/35

    Network Architecture: Access solution comprises of

    o CPE (talks to the Access point )

    o Access Point (a kind of BTS for CPE) also called DAP (diversity accesspoint) which combats fading.

    o Microwave Backhaul Key Differences between 802.16d & 802.16e

    802.16d 802.16e

    Spectrum < 11GHz

  • 7/31/2019 Introduction to GSM Basic Concept

    34/35

    o BPSK is the least data efficient Method and it employed where the SS is

    farthest from BASE Station

    o 64QAM offers high data efficiency, requiring less Tx power.

    WiMAX is broadband but nature is baseband

    How to transmit a signal in wireless

    o 3 techniques to avoid interference

    FHSS (Frequency Hopping (jumping) Spread Spectrum)

    o Channel jumping is more.

    o In addition to your knowledge GSM uses slow frequency

    hopping to mitigate the multipath fading and this slow

    frequency hopping comes in BCH (Broadcast channel).

    DSSS (Direct Sequence Spread Spectrum)

    o extra chip-pin code is used

    o If 1bit=10 bit chipping code

    OFDM (Orthogonal Frequency Division Multiplexing)

    o 1 channel is divided into 256 sub-channels and every carrier has

    to modulate. OFDM in fact the technique that made WiMAX

    broadband.

    Range 30 miles Radius from the Base Station for LOS

    Range 4 6 miles Radius from the Base Station for NLOS

    Maximum data speed supported is 70 Mbps

    Line of Sight is not needed between user and the base station unlessvery high data rates are required at the user premises.

    Licensed Frequency band: 2 11 GHz

    Unlicensed Frequency band: 10 to 66 GHz

  • 7/31/2019 Introduction to GSM Basic Concept

    35/35

    Multiplexing

    o Sharing of medium by number of users without overlapping

    Data Rates E1 = 32 x 64 kbps = 2.04 Mbps

    E3 = 16 x T1

    ****************************

    T1 = 24 x 64 kbps = 1.544 Mbps

    T2 = 4 T1

    T3 = 28 T1

    T4 = 168 T1

    ****************************

    DS0 = 64 kbps DS1 = 24 x DS0

    DS3 = 28 DS1

    ****************************

    OC-3 = 155.52 Mbps

    OC-12 = 622 Mbps

    OC-48 = 2.448 Gbps