OWC Mod5
OWC Mod5
M
se
M ile s i n
M ile
s i n n r ller er i n nd
s i in
en er m in en n e en er
M M
M
se s i n
e r nd s i in
s s s em
M er s s s s em
M ile
s i n
P
er s
isi r l i n re is er
en i i n en er
M M ile e i men i men iden i re is er
M s ri er iden i m d le me l i n re is er
se r ns eiver s i n P P li s i ed ele ne ne r
are controlled by a Base Station Controller (BSC). BSC is connected to the Mobile Switching Center (MSC),
which is a part of NSS. Figure 11.1 shows the key functional elements in the GSM network architecture.
Facts to Know !
In a metropolitan city, a large number
of BTSs are potentially deployed. A BTS
is usually placed in the centre of a cell
and its transmitting power defines the
size of a cell.
depending on the movements and actions performed by the subscriber. Some data are mandatory, other data
are optional. Both the HLR and the VLR can be implemented in the same equipment in an MSC (collocated).
A PLMN may contain one or several HLRs.
The VLR is a temporary database software similar to the HLR identifying the mobile subscribers visiting
inside the coverage area of an MSC. The VLR assigns a Temporary Mobile Subscriber Identity (TMSI) that is
used to avoid using IMSI on the air. The location of the mobile subscriber is determined by the VLR into which
the mobile subscriber is entered. The visitor location register maintains information about mobile subscribers that
are currently physically in the region covered by the switching centre. It records whether or not the subscriber
is active and other parameters associated with the subscriber. For a call coming to the mobile subscriber, the
system uses the mobile phone number associated to identify the home switching centre of the mobile subscriber.
The home switching centre can find in its HLR the switching centre in which the mobile subscriber is presently
located. For a call coming from the mobile subscriber, the VLR is used to initiate the call. Even if the mobile sub-
scriber is in the area covered by its home switching centre, it is also represented in the switching centre’s VLR.
A VLR is linked to one or more MSCs. The function of the VLR is to memorise temporarily information
about the mobiles which are currently located in the geographical area controlled by the linked MSC. The
VLR is a database that contains temporary information about subscribers that is needed by the MSC in order
to service visiting subscribers. The VLR supports a mobile paging-and-tracking subsystem in the local area
where the mobile is presently roaming. The VLR is always integrated with the MSC. A VLR may be in charge
of one or several MSC LAs (Location Areas).
When a mobile subscriber roams from one LA
Facts to Know ! to another, their current location is automatically
updated in their VLR. When a mobile station roams
The VLR can be considered as a temporary
copy of some of the important information into a new MSC area, if the old and new LAs are
(selected administrative information neces- under the control of two different VLRs, the VLR
sary for call control and provisioning of the connected to that MSC will request data about the
subscribed services) stored in the HLR. HLR is the persis- mobile station from the HLR. The entry on the old
tent storage whereas VLR is similar to a cache. VLR is deleted and an entry is created in the new
VLR by copying the basic data from the HLR.
Later, if the mobile station makes a call, the VLR will have the information needed for call set-up without having
to interrogate the HLR each time. The subscriber’s current VLR address, stored at the HLR, is also updated. This
provides the information necessary to complete calls to roaming mobiles. These two databases, HLR and VLR,
are used to keep track of the current location of an MS in GSM. Maintenance of two databases at home and at
the visiting location allows a mechanism to support dialing and call routing in a roaming situation where the MS
Facts to Know ! is visiting the coverage area of a different MSC.
GSM transmission is encrypted. The AuC data-
The HLR is always fixed and remains in the base holds different algorithms that are used for
home network, whereas the VLR logically
authentication and encryption of the mobile sub-
moves with the subscriber. For example, if
a subscriber of a GSM network in Mumbai scribers that verify the mobile user’s identity and
is roaming in Kolkata, the HLR data of the subscriber will ensure the confidentiality of each call. The AuC
remain in Mumbai with the home network; however, protects network cellular operators from differ-
the VLR data will be copied to the roaming network in ent types of frauds and spoofing found in today’s
Kolkata. This enables the subscribed services without cellular world. AuC holds the authentication and
needing to refer to the HLR each time a communication encryption keys for all the subscribers in both
is established. Though the visiting network in Kolkata the home and visitor location registers. A stream
will provide the user services, the billing will be done by cipher, A5, is used to encrypt the transmission
the home network in Mumbai.
from subscriber to base transceiver. However,
Global System for Mobile (GSM) 407
the conversation is in the clear in the landline network. Another cipher, A3, is used for authentication. Different
classes of SIM cards have their own algorithms, and the AuC collects all of these algorithms to allow the NSS
to operate with different mobile terminals from different geographic areas.
The EIR is another database that keeps the information about the identity of mobile equipment such as
the International Mobile Equipment Identity (IMEI) that reveals the details about the manufacturer, country
of production, and device type. This information is used to prevent calls from being misused, to prevent
unauthorised or defective MSs, to report stolen mobile phones or check if the mobile phone is operating
according to the specification of its type.
Each mobile equipment is identified by IMEI which is memorised by the manufacturer and cannot be
removed. By the registration mechanism the MS always sends the IMEI to the network, so that the EIR can
memorise and assign them to three different lists:
White List This list contains the IMEI of the phones who are allowed to enter in the network.
Black List This list on the contrary contains the IMEI of the phones who are not allowed to enter in the
network, for example because they are stolen. Those phones are not able to enter in all the GSM networks
which dispose of an EIR.
Grey List This list contains the IMEI of the phones momentarily not allowed to enter in the network, for
example because the software version is too old or because they are in repair.
By the registration mechanism, the MSC checks if the MS is contained in the black or grey list; if so, the
mobile cannot enter the network. One EIR per GSM network is enough. In the future there will be an intercon-
nection between all the EIRs to avoid the situation where a mobile stolen in one country can be used in a GSM
network from a different country. Both AuC and EIR can be implemented as individual stand-alone nodes or
as a combined AuC/EIR node. The implementation of the EIR is left optional to the service provider.
IWF-Interworking Function It is a subsystem in the PLMN that allows for non-speech communication
between the GSM and the other networks. The tasks of an IWF are particularly to adapt transmission param-
eters and protocol conversion. The physical manifestation of an IWF may be through a modem which is
activated by the MSC dependent on the bearer service and the destination network.
The SS supports operation and maintenance of the system and allows engineers to monitor, diagnose,
and troubleshoot every aspect of the GSM network. The OSS supports one or several Operation Maintenance
Centres (OMC) that are used to monitor and maintain the performance of each MS, BS, BSC, and MSC
within a GSM system. The OSS has three main functions, which are to maintain all telecommunications
hardware and network operations with a particular service area, manage all mobile equipment in the system,
and manage all charging and billing procedures. Within each GSM system, an OMC is dedicated to each of
these tasks and has provisions for adjusting all base-station parameters and billing procedures, as well as for
providing system operators with the ability to determine the performance and integrity of each unit of mobile
subscriber equipment in the system.
is
ir in er e in er e in er e
M M
MM MM
M M M M
P P
P P P P M P M P
di di 4 s 4 s 4 s 4 s
M M
M nne i n m n emen
MM M ili m n emen P in ess r l
M di res r e m n emen P i n l nne i n n r l r
P in ess r l rm ile M P Mess e r ns er r
The interface between a BSC and a MSC is called the A’ interface, which is standardised within GSM.
The A’ interface uses an SS7 protocol called the Signaling Connection Control Part (SCCP) which supports
communication between the MSC and the BSS, as well as network messages between the individual mobile
subscribers and the MSC. The A’ interface allows a service provider to use base stations and switching equip-
ment made by different manufacturers.
A number of control messages are exchanged between the key entities of GSM network architecture that
deal with radio resources, mobility management, and connection management. The protocol stack is divided
into three layers:
Layer 1 Physical Layer
Layer 2 Data Link Layer (DLL)
Layer 3 Networking or Messaging Layer
layer, a data link control protocol known as LAPDm is used where m refers to the modified version of LAPD
adapted to the mobile environment. In essence, LAPD is designed to convert a potentially unreliable physical
link into a reliable data link. It does this by using a cyclic redundancy check to perform error detection and
Automatic Repeat Request (ARQ) to retransmit damaged frames. The LAPD protocol is used for the A-bis
and A interfaces connecting the BTS to BSC and BSC to MSC, respectively.
The overall purpose of DLL is to check the flow of packets for Layer III and allow multiple Service
Access Points (SAP) with one physical layer. The remaining links use the normal LAPD protocol. The DLL
checks the address and sequence number for Layer III and manages acknowledgments for transmission of the
packets. In addition, the DLL allows two SAPs for signaling and Short Messages (SMS). The SMS traffic
channel in the GSM is not communicated through voice channels. In GSM, the SMS is transmitted through
a fake signaling packet that carries user information over signaling channels. The DLL in GSM provides this
mechanism for multiplexing the SMS data into signaling streams.
Signaling packets delivered to the physical layer are each 184 bits, same as that of the length of the DLL
packets in the LAPD protocol used in the ISDN networks. The length of the LAPDm packets, shown in
Fig. 11.3, is the same as LAPD, but the format is slightly adjusted to fit the mobile environment.
1 4 i s ixed
Since GSM has the time synchronisation and strong coding at the physical layer, the synchronisation bits
and CRC codes in LAPD are eliminated in the LAPDm. The address field is optional, and it identifies the
SAP, protocol revision type, and nature of the message. The control field is also optional, and it holds the type
of the frame (command or response) and the transmitted and received sequence numbers.
The length indicator identifies the length of the information field. Fill-in bits are all 1s bits to extend the
length to the desired 184 bits. In peer-to-peer Layer II communications, such as DLL acknowledgments, there is
no Layer III payload and fill-in bits cover this field. The information field carries the Layer III payload data.
The peer-to-peer Layer II messages are unnumbered acknowledgment, receiver ready, receiver not ready,
disconnect, and reject. These messages do not have Layer III information bits and are referred to as Layer II
messages. The information bits in Layer II packets specify Layer III operations implemented on the logical
signaling channels. These information bits are different for different operations.
11.2.3 Layer III: Networking or Signaling Layer
The networking or signaling layer implements the protocols needed to support the mechanisms required to
establish, maintain, and terminate a mobile communication session. It is also responsible for control func-
tions for supplementary and SMS services. The traffic channels are carried by normal bursts in different
formats associated with different speech or data services. The signaling information uses other bursts and
more complicated DLL packaging. A signaling procedure such as the registration process is composed of a
sequence of communication events or messages between hardware elements of the systems that are imple-
mented on the logical channels encapsulated in the DLL frames.
Layer III defines the details of implementation of messages on the logical channels encapsulated in DLL
frames. Among all messages communicated between two elements of the network only a few, such as
DLL acknowledgment, do not carry Layer III information. Information bits of the Layer II packets specify
the operation of a Layer III message. As shown in Fig. 11.4, these bits are further divided into several fields.
410 Wireless Communications
n rm i n d is
r ns i n Pr l n rm i n n rm i n
Mess e e
iden i ier dis rimin r elemen s elemen s iden i ier
The Transaction Identifier (TI) field is used to identify a procedure or protocol that consists of a sequence
of messages. This field allows multiple procedures to operate in parallel. The Protocol Discriminator (PD)
identifies the category of the operation (management, supplementary services, call control, and test proce-
dure). The Message Type (MT) identifies the type of message for a given PD. Information Elements (IE) is
an optional field for the time that an instruction carries some information that is specified by an IE Identifier
(IEI). The number of Layer III messages is much larger than the number of Layer II messages.
To further simplify the description of the Layer III messages, GSM standard divides the messages into
three sublayers that provide specific functions:
– Radio Resource Management (RRM)
– Mobility Management (MM)
– Communication Management (CM)
The RRM sublayer of Layer III manages the frequency of operation and the quality of the radio link. Radio
resource management establishes and releases connections between MSs and an MSC and maintains them
despite subscriber movements. The RRM functions are mainly performed by the MS and the BSC. The main
responsibilities of the RRM are to assign the radio channel and hop to new channels in implementation of the
slow frequency-hopping option, to manage hand-off procedure and measurement reports from MS for hand-
off decision, to implement power control procedure, and to adapt to timing advance for synchronisation.
The major functions of Mobility Management (MM) sublayer are location update, registration procedures,
authentication procedure, TMSI handling, and attachment and detachment procedures for the IMSI. This
sublayer handles mobility issues that are not directly related to the radio, and include management of security
functions. Mobility management functions are handled by the MS/SIM, the MSC/VLR, and the HLR/AuC.
The Communication Management (CM) sublayer is used to establish, maintain, and release the circuit-
switched connection between the calling and called subscribers of GSM network. Specific procedures for the
CM sublayer include mobile-originated and mobile-terminated call establishment, change of transmission
mode during the call, control of dialing using dual-tones, and call reestablishment. In addition to call manage-
ment, it includes supplementary services management and SMS management.
The Mobile Application Part (MAP) handles most of the signaling between different entities in the fixed
part of the network, such as between the HLR and VLR. It runs on top of two intermediate protocols––Signal
Connection Control Part (SCCP) and Message Transfer Part (MTP). SCCP and MTP protocols are part of
Signaling System Number 7, which is a set of protocols designed to provide control signaling within digital
circuit-switching networks.
Facts to Know !
11.2.4 SS7 Signaling
SS7 is also used for many other Common Channel Signaling System No. 7 (SS7 or CC7)
Intelligent Network Services (like
is a global standard that defines the procedures and
virtual calling card service and local
number portability) within the GSM. protocol by which network elements in PSTN exchange
information over a digital signaling network to effect
wireless (cellular) and wireline call set-up, routing and control. The SS7 signaling protocols are mainly used
for basic call set-up, call management, wireless services such as PCS, wireless roaming, mobile subscriber
Global System for Mobile (GSM) 411
authentication, local number portability, toll-free and toll wireline services, enhanced call features such as
call forwarding, calling party name/number display, and three-way calling, efficient and secure worldwide
telecommunications. The SS7 protocol provides both error correction and retransmission capabilities to allow
continued service in the event of signaling point or link failures.
SS7 messages are exchanged between network elements over 64 kbps bi-directional channels called sig-
naling links. Signaling occurs out-of-band on dedicated channels rather than in-band on voice channels.
Compared to in-band signaling, out-of-band signaling provides faster call set-up times, more efficient use
of voice circuits, support for Intelligent Network (IN) services which require signaling to network elements
without voice trunks (for example, database systems), and improved control over fraudulent network usage.
There are three kinds of signaling points in the SS7 network:
– Service Switching Point (SSP)
– Signal Transfer Point (STP)
– Service Control Point (SCP)
SSPs are switches that originate, terminate, or tandem calls. An SSP sends signaling messages to other
SSPs to set up, manage, and release voice circuits required to complete a call. An SSP may also send a query
message to a centralised database, an SCP, to determine how to route a call. An SCP sends a response to the
originating SSP containing the routing number(s) associated with the dialed number. An alternate routing
number may be used by the SSP if the primary number is busy or the call is unanswered within a specified
time. Actual call features vary from network to network and from service to service.
Network traffic between signaling points may be routed via a packet switch called STP. The STP routes
each incoming message to an outgoing signaling link based on routing information contained in the SS7 mes-
sage. Because it acts as a network hub, STP provides improved utilisation of the SS7 network by eliminating
the need for direct links between signaling points. The STP may perform global title translation, a proce-
dure by which the destination signaling point is determined from digits present in the signaling message.
The STP can also act as a firewall to screen SS7 mes-
sages exchanged with other networks. Because the SS7 Facts to Know !
network is critical to call processing, SCPs and STPs are SCPs provide the access mechanism
usually deployed in pair configurations in separate physi- required for a service. These are used
cal locations to ensure network-wide service in the event for a variety of applications such
of an isolated failure. as calling card verification, toll-free
calls, and premium tariff calls.
11.2.5 Addressing and Routing
Within the GSM network, two types of routing can be described:
– SS7 addressing and message signaling routing
– Call control/number routing
The SS7 MTP layer 3 provides the routing function. This layer is used to route within a local network using
the Signaling Point Code addressing. To interconnect all the local networks on the national SS7 networks,
the SCCP Global Title Translation (GTT) functionality is used. Global Title Translation is one of the strong
routing capabilities of SS7 SCCP layer. This SCCP functionality allows a centralised network to hold and
maintain all the addresses and routing tables, centralising the routing function. For MSC to send a message
to a particular HLR, the MSC does not need to know each Mobile’s HLR point code. Only the adjacent STP
point code and the dialed digits (MSISDN) needs to be provided to the STP in order to route the message to
the HLR. The STP will perform the translation of the dialed digits to physical point code (HLR or MSC).
The STP pair after checking the SCCP header information will determine if the message requires GTT trans-
lation. It will then extract the IMSI of the subscriber from the calling number address field in the SCCP header
412 Wireless Communications
Facts to Know ! and from a database table determine the HLR point code
where the validation/authentication should be sent. This will
STP is similar to a switch or a node in
eliminate book-keeping on every MSC and centralise the
the SS7 signaling network performing
the basic routing functions. For fault routing/translation on the SS7 STP network.
tolerance, STPs are always installed in A landline calling party dials the GSM mobile
pairs with cross-connections. directory number (MS ISDN number). The PSTN after
performing the digits translation routes the call to the
home PLMN GMSC. The GMSC contains either the routing tables to relate the MSISDN number with the
corresponding HLR, or if the GMSC is connected to the SS7 network with the GTT functionality, the SS7
network will identify the HLR. Once the GMSC interrogates the HLR with the MSISDN number, the HLR
determines the IMSI from the MSISDN number. The HLR stores the subscriber’s information based on IMSI,
not MSISDN. The HLR locates the visiting MSC/VLR point code and if the MSRN is available, it will return
the information to GMSC. If the HLR does not have the MSRN for the subscriber it will request one from
the visiting MSC/VLR. The latter can be done via GTT if an SS7 backbone with GTT (IMSI to point code)
functionality is available/supported. The GMSC once it receives the MSRN and the MSC/VLR point code,
will route the call to the VMSC/VLR. The MSC/VLR will then page the mobile subscriber.
The call-originating information including the dialed digits will be sent to the MSC/VLR. The MSC/VLR
with the subscriber’s profile information performs digits translation (if supported) and routes the call either
to the PSTN or to other MSCs. If the MSC cannot perform the digits translation it would route the call to
GMSC for translation and routing.
11.3.1 IMSI
The International Mobile Subscriber Identity (IMSI) number is usually 15 digits or less. When an MS attempts
a call, it needs to contact a BS. The BS can offer its service only if it identifies the MS as a valid subscriber. For
this, the MS needs to store certain values uniquely defined for the MS, like the country of subscription, network
type, subscriber ID, and so on. These values are called the International Mobile Subscriber Identity (IMSI). The
structure of an IMSI is shown in Fig. 11.5. The first three digits specify the country code, the next two specify the
network provider code, and the rest are the mobile subscriber identification code (the customer ID number).
Another use of IMSI is to find information about the subscriber’s home Public Land Mobile Network
(PLMN). All such information is placed on the SIM card.
15 di i s r less
3 di i s 2 di i s di i s
15 di i s r less
1 3 di i s ri le ri le
M ile nr de i n l des in i n de s ri er n m er
M
15 di i s r less
3 di i s 1 r 2 di i s di i s
e r v l de in l ssem l de eri l n m er
re 1 di i
15 di i s r less
1 3 di i s ri le ri le
M ile nr de i n l des in i n de s ri er n m er
M
1 2 3 124
rrier nnel nd id : 200 rd nd : 100
GSM uses FDD and a combination of TDMA and FDMA schemes to provide multiple access to mobile
subscribers. The available forward and reverse frequency bands are divided into 200-kHz wide channels
called ARFCNs (Absolute Radio Frequency Channel Numbers). The ARFCN denotes a forward and reverse
channel pair that is separated in frequency by 45 MHz and each channel is time shared between as many as
eight subscribers using TDMA.
The total number of available channels within a 25-MHz bandwidth is 125 (assuming no guard band).
Since each radio channel consists of eight time slots, there are thus a total of 1000 traffic channels within
a GSM. In practical implementations, a guard band of 100 kHz is provided at the upper and lower end of the
GSM spectrum, and only 124 channels are available for use.
Each carrier supports eight time slots for the TDMA operation. Each of the eight subscribers uses the
same ARFCN and occupies a unique Time Slot (TS) per frame. A guard frame of 8.25 bits is used in between
any two frames transmitted either by the BS or the MS. The data rate of each carrier is 270.833 kbps that is
provided with a modulation scheme known as GMSK (Gaussian Minimum Shift Keying) that is a variant of
FSK having a frequency deviation of ± 67.71 kHz. The channel data rate of GSM is 270.833 kbps, which is
exactly four times the RF frequency shift. This minimises the bandwidth occupied by the modulation spec-
trum and hence improves channel capacity. The MSK modulated signal is passed through a Gaussian filter
to smooth the rapid frequency transitions that would otherwise spread energy into adjacent channels. The
bandwidth-time product (B × Tb) of GMSK is standardised at 0.3, a normalised bandwidth expansion factor
where 0.3 describes the 3 dB bandwidth of the Gaussian pulse shaping filter with relation to the bit rate,
which provides the best compromise between increased bandwidth occupancy and resistance to cochannel
interference. Ninety-nine per cent of the RF power of GMSK signals so specified is confined to a bandwidth
of 250 kHz, which means that, for all practical purposes, the sidelobes of the GMSK signal are insignificant,
and outside this frequency band.
With the channel data rate of 270.833 kbps, the duration of each bit is 3.69 μs, and the effective channel
transmission rate per user is 33.854 kbps (270.833 kpbs/8 users). With overhead, user data is actually trans-
mitted at a maximum rate of 24.7 kbps. The user transmission packet burst is fixed at 577 μs, which accom-
modates information bits and a time gap between the packets for duration equivalent to 156.25 channel bits
times the bit duration of 3.69 μs.
GSM employs a moderately complicated, 13-kbps regular pulse-excited speech codec (coder/decoder) with
a long-term predictor. To provide error protection for the speech-encoded bits, concatenated convolutional
codes and multilayer interleaving are employed. An overall speech delay of 57.5 ms occurs in the system.
Global System for Mobile (GSM) 417
Control Channel Broadcast Channel (BCH) Broadcast Control Channel (BCCH) Downlink
(CCH) (BS → MS)
Frequency Correction Channel Downlink
(FCCH) (BS → MS)
Synchronisation Channel (SCH) Downlink
(BS → MS)
Common control Channel Paging Channel (PCH) Downlink
(CCCH) (BS → MS)
Random Access Channel (RACH) Uplink
(MS → BS)
Access Grant Channel (AGCH) Downlink
(BS → MS)
Dedicated control Channel Standalone Dedicated Control Uplink and Downlink
(DCCH) Channel (SDCCH) (BS ↔ MS)
Slow Associated Control Channel Uplink and Downlink
(SACCH) (BS ↔ MS)
Fast Associated Control Channel Uplink and Downlink
(FACCH) (BS ↔ MS)
Traffic Channel Traffic Channel (TCH) Full-rate Traffic Channel (TCH/F) Uplink and Downlink
(TCH) (BS ↔ MS)
Half-rate Traffic Channel (TCH/H) Uplink and Downlink
(BS ↔ MS)
418 Wireless Communications
The logical channels in the GSM network are divided into two principal categories: Control Channels
(CCHs) and Traffic Channels (TCHs). Control channels carry signaling and synchronising commands
between the base station and the mobile station. Certain types of control channels are defined for just the
forward or reverse link. Traffic channels carry digitally encoded user speech or user data and have identical
functions and formats on both the forward and reverse link. GSM system uses a variety of logical control
channels to ensure uninterrupted communication between MSs and the BS.
(c) The Synchronisation Channel (SCH) is used by the BTS to broadcast frame synchronisation signals
containing the synchronisation training sequences burst of 64 bits length to all MSs. Using SCH, MSs
will synchronise their counters to specify the location of arriving packets in the TDMA hierarchy. SCH
is broadcast in TS 0 of the frame immediately following the FCCH frame and is used to identify the
serving base station while allowing each mobile to frame-synchronise with the base station. The frame
number, which ranges from 0 to 2,715,647, is sent with the Base Station Identity Code (BSIC) during
the SCH burst. The BSIC is uniquely assigned to each BTS in a GSM system. Since a mobile may be as
far as 30 km away from a serving base station, it is often necessary to adjust the timing of a particular
mobile user such that the received signal at the base station is synchronised with the base station clock.
The BSC issues coarse timing advancement commands to the mobile stations over the SCH, as well.
The SCH is transmitted once every ten frames within the control channel multiframe. The physical
Synchronisation Burst (SB) is used to implement SCH.
The Common Control Channels (CCCH) are also one-way channels used for establishing links between the
MS and the BS, as well as for any ongoing call management. CCCHs are the most commonly used control chan-
nels and are used to page specific subscribers, assign signaling channels to specific users, and receive mobile
requests for service. On the broadcast channel ARFCN, the common control channels occupy TS 0 of every
GSM frame that is not otherwise used by the BCH or the Idle frame. There are three CCCH logical channels:
(a) The Paging Channel (PCH) is a forward link channel and is used by the BTS to page or notify a
specific individual MS for an incoming call in the cell. The PCH transmits the IMSI of the target
subscriber, along with a request for acknowledgment from the mobile unit on the RACH. Alternatively,
the PCH may be used to provide cell broadcast ASCII text messages to all subscribers, as part of the
SMS feature of GSM. The PCH is implemented on a Normal Burst (NB).
(b) The Random Access Channel (RACH) is a reverse link channel and is used by the MS either to access
the BTS requesting the dedicated channel for call establishment or to acknowledge a page from the
PCH. The RACH is used with implementation of a slotted-ALOHA protocol, which is used by MSs
to contend for one of the available slots in the GSM traffic frames. The RACH is implemented on the
short Random Access Burst (RAB). All mobiles must request access or respond to a PCH alert within
TS 0 of a GSM frame. At the BTS, every frame (even the idle frame) will accept RACH transmissions
from mobiles during TS 0. In establishing service, the GSM base station must respond to the RACH
transmission by allocating a channel and assigning a Standalone Dedicated Control Channel (SDCCH)
for signaling during a call. This connection is confirmed by the base station over the AGCH.
(c) The Access Grant Channel (AGCH) is used by the base station to provide forward link communication to
the mobile for implementation of the acknowledgement from the BTS to the MS after a successful attempt
by MS using RACH in a previous CCCH frame. AGCH is also used by the BS to send information about
timing and synchronisation to the MS. The AGCH carries data that instructs the mobile to operate in a
particular physical channel (time slot and ARFCN) with a particular dedicated control channel. The AGCH
is the final CCCH message sent by the base station before a subscriber is moved off the control channel. This
channel is implemented on a Normal Burst (NB) and indicates the TCH for access to the GSM network.
The Dedicated Control Channels (DCCH) are two-way channels having the same format and function
on both the forward and reverse links, supporting signaling and control for individual mobile subscribers,
and are used along with voice channels to serve for any control information transmission during actual voice
communication. DCCHs may exist in any time slot and on any ARFCN except TS 0 of the BCH ARFCN.
There are three DCCH logical channels:
(a) The Stand-alone Dedicated Control Channel (SDCCH) is a two-way channel allocated with SACCH to
each mobile terminal to transfer network control and signaling information for call establishment and
420 Wireless Communications
mobility management, just before a TCH assignment is issued by the base station. The SDCCH ensures
that the mobile station and the base station remain connected while the base station and MSC verify
the subscriber unit and allocate resources for the mobile. The SDCCH is used to send authentication
and alert messages (but not speech) as the mobile synchronises itself with the frame structure and waits
for a TCH. SDCCHs may be assigned their own physical channel or may occupy TS 0 of the BCH if
there is low demand for BCH or CCCH traffic. The physical channel for SDCCH occupies four slots
in every 51 control-multiframes with an approximated gross data rate of 2 kbps per mobile terminal.
(b) The Slow Associated Control Channel (SACCH) is a two-way channel always associated with a TCH
or a SDCCH and maps onto the same physical channel. The SACCH is used to exchange the necessary
parameters between the BTS and the MS during the actual transmission to maintain the communi-
cation link. Each ARFCN systematically carries SACCH data for all of its current users. The gross data
rate of the SACCH channel is half of that of the SDCCH. On the forward link, the SACCH is used to
send slow but regularly changing control information to the mobile subscriber, such as transmit power
level instructions and specific timing advance instructions for each user on the ARFCN. The reverse
SACCH carries information about the received signal strength and quality of the TCH, as well as BCH
measurement results from neighbouring cells. The SACCH is transmitted during the thirteenth frame
(and the twenty-sixth frame when half-rate traffic is used) of every speech/dedicated control channel
multiframe, and within this frame, the eight time slots are dedicated to providing SACCH data to each
of the eight full-rate (or sixteen half-rate) users on the ARFCN.
(c) The Fast Associated Control Channel (FACCH) is a two-way channel used to support fast transitions
such as a hand-off request in the channel when SACCH is not adequate. The FACCH is physically
multiplexed with the TCH or SDCCH to provide additional support to the SACCH. In fact, FACCH is
not a dedicated control channel but carries the same information as SDCCH. However, FACCH is a part
of the traffic channel, while SDCCH is a part of the control channel. To facilitate FACCH to steal certain
bursts from the TCH forward channel burst, there are 2 flag bits, called the stealing bits in the message.
If the stealing bits are set, the time slot is known to contain FACCH data, not a TCH, for that frame.
Control information in GSM is mainly on two logical channels––the Broadcast Channel (BCCH) and the
Paging Channel (PCH). As with TDMA, it is unnecessary to use a whole RF channel for this. Instead, one of
the eight time slots on one RF channel in each cell or sector is designated as a control channel. The broadcast
information is transmitted first, followed by paging information. Figure 11.11 shows the structure of a GSM
logical control channel.
The corresponding reverse channel to the forward channels BCCH and PCH is called the Random-Access
Channel (RACH). It is used by the mobile subscribers to communicate with the cell-site. Mobile subscribers
transmit on RACH channel whenever they have information. Transmissions are shorter than the duration of
the time slot to prevent interference caused by the propagation delay between the mobile and cell-site.
The mobile subscriber equipment has only one receiver. It cannot count on receiving the broadcast channel
during a call because both channels may use the same time slot. It is necessary to send control information
r d s nr l P in nnel
1 1 1 nnel P
2 r mes
= re en rre i n = n r nis i n = n en s lis
on the voice channels. There are two control channels associated with the voice channel. The slow associated
control channel uses one of every 26 bursts on the voice channel. It is used to inform the serving cell-site
about the measurements of the signal strength of adjacent cells made by the mobile subscriber. The fast asso-
ciated control channel steals bits from the voice signal and is used for urgent messages from the cell-site such
as hand-off instructions.
15 .25 i s
577 μs
0 1 2 3 4 5 7
4. 15 ms
: ime l
rm l s ee m l i r me 2 M r mes
120 ms
0 1 2 10 11 12 13 14 15 22 23 24 /
: r me
/ : dle r sl ss i ed nr l nnel r me
Figure 11.12 illustrates how the TCH data is transmitted in consecutive frames.
Furthermore, frames of TCH data are broken up every thirteenth frame by either Slow Associated Control
Channel Data (SACCH) or idle frames. Each group of twenty-six consecutive TDMA frames is called a
multiframe (or speech multiframe, to distinguish it from the control channel multiframe described later). For
every twenty-six frames, the thirteenth and twenty-sixth frames consist of Slow Associated Control Channel
(SACCH) data, or the idle frame, respectively. The twenty-sixth frame contains idle bits for the case when
full-rate TCHs are used, and contains SACCH data when half-rate TCHs are used. TCH logical channels are
implemented over the normal burst. There are two types of TCH channels:
The full-rate traffic channel (TCH/F) uses a 13 kbps speech-coding scheme and 9,600 bps, 4,800 bps,
and 2,400 bps data. After including signaling overhead, each full-rate traffic channel has a gross bit rate
422 Wireless Communications
of 22.8 kbps for the network. When transmitted as full-rate, user data is contained within one time slot per
frame. The following full-rate speech and data channels are supported:
Full-Rate Traffic Data Channel (TCH/F) The full-rate speech channel carries user speech that is digitised at a
raw data rate of 13 kbps. With GSM channel coding added to the digitised speech, the full-rate speech chan-
nel carries 22.8 kbps.
Full-Rate Data Channel at 9600 bps (TCH/F9.6) The full-rate traffic data channel carries raw user data that is
sent at 9600 bps. With additional forward-error-correction coding applied by the GSM standard, the 9600 bps
data is sent at 22.8 kbps.
Full-Rate Data Channel at 4800 bps (TCH/F4.8) The full-rate traffic data channel carries raw user data that is
sent at 4800 bps. With additional forward-error-correction coding applied by the GSM standard, the 4800 bps
is sent at 22.8 kbps.
Full-Rate Data Channel at 2400 bps (TCH/F2.4) The full-rate traffic data channel carries raw user data that is
sent at 2400 bps. With additional forward error correction coding applied by the GSM standard, the 2400 bps
is sent at 22.8 kbps.
The half-rate traffic channel (TCH/H) uses 16 time slots per frame that has a gross bit rate of 11.4 kbps
(half of gross bit rate of full-rate traffic channel). The half-rate TCH supports 4800 bps and 2400 bps data
rate only. When transmitted as half-rate, user data is mapped onto the same time slot, but is sent in alternate
frames. That is, two half-rate channel users would share the same time slot, but would alternately transmit
during every other frame. The following half-rate speech and data channels are supported:
Half-Rate Traffic Data Channel (TCH/H) The half-rate speech channel has been designed to carry digitised
speech which is sampled at a rate half that of the full-rate channel. GSM anticipates the availability of speech
coders that can digitise speech at about 6.5 kbps. With GSM channel coding added to the digitised speech,
the half-rate speech channel will carry 11.4 kbps.
Half-Rate Traffic Data Channel at 4800 bps (TCH/H4.8) The half-rate traffic data channel carries raw user data
that is sent at 4800 bps. With additional forward-error-correction coding applied by the GSM standard, the
4800 bps data is sent at 11.4 kbps.
Half-Rate Traffic Data Channel at 2400 bps (TCH/H2.4) The half-rate traffic data channel carries raw user data
that is sent at 2400 bps. With additional forward-error-correction coding applied by the GSM standard, the
2400 bps data is sent at 11.4 kbps.
The cell-site instructs the mobile subscriber to advance or retard the timing of its transmissions to com-
pensate for the changes in propagation delay as it moves about in the cell. In this way, the transmission delay
problem is avoided on the traffic channels.
Number of Logical Channels or Number of Time Slots in TDMA Frame In order to justify the additional costs of mul-
tiplexing, let the minimum number of time slots per TDMA frame be 8 so as to serve eight simultaneous users.
Channel Bandwidth The current channel bandwidth being used for analog FM cellular systems in Europe
is 25 kHz. To serve 8 mobile subscribers using TDMA technique, the channel bandwidth should not exceed
200 kHz.
Maximum Cell Radius (R) To provide radio service to high traffic in rural areas, let the maximum cell radius
be 35 km.
Maximum Vehicle Speed ( Vm ) To accommodate mobile subscriber units traveling on expressways or high-
speed trains, the maximum vehicle speed be 250 km/h.
Maximum Delay Spread (Δm ) Delay spread is the difference in propagation delay among different multipath
signals arriving at the same Rx antenna. Typical delay spread in mountainous regions is about 10 seconds.
Maximum Coding Delay To avoid unnecessary delays within the fixed wireless network, which may involve
satellite links, maximum coding delay be approximately 20 milliseconds.
Figure 11.13 suggests the general steps to be considered in designing the time slot in a TDMA frame.
ee rr r ee
s m lin rre i n l
din en din rm i n
rs in l
desi n rs
ield desi n
M xim m r inin
d r i n se en e r
s ee d ive
ield il er
In the design of time slot of a TDMA frame, an appropriate data rate of the speech coder should be decided
first. It is desirable that the speech coder must provide satisfactory speech quality at minimum data rate. The
PCM speech coder has a data rate of 64 kbps, which is undesirably high for use with wireless systems. A data
rate of 12 kbps is reasonable for reproducing good-quality speech. Since the coding delay is restricted to
20 milliseconds, the encoded speech can be formed into blocks of 20 ms duration. This converts the speech
samples of 12 kbps × 20 ms = 240 bits.
Error correction can then be applied to the 240-bit blocks. Using a convolutional error-correcting tech-
nique with a code rate of , the number of bits in a block of 20-ms speech at 12 kbps rate increases to
(2 × 240 bits =) 480-bits. With a constraint length of 5, 4 bits per block of 240 bits are added to account for
the length of the shift register. This brings the speech block length to (480 + 2 × 8 =) 488 bits. With these
parameters, the minimum bit rate for an eight-channel TDMA system can be computed as follows:
Number of bits in one channel = 488 bits
Number of channels or time sots = 8
Total number of bits in 8 time slots = 488 bits × 8 = 3904 bits
Duration of one speech block = 20 ms
Overall minimum channel bit rate =3904 bits/20 ms = 195.2 kbps
424 Wireless Communications
To take care of other design considerations, the gross channel bit rate will be slightly higher, and let it be
greater than 200 kbps in the available channel bandwidth of 200 kHz. In a mobile radio environment, such
data rates can be achieved with the use of adaptive equalisation. Adaptive equalisation will require the inclu-
sion of a new training sequence in each time slot when the mobile subscriber moves a sufficient distance
to potentially cause changes in the characteristics of transmission path. Assume that the phase angle of the
carrier signal changes by λc /20 of the maximum vehicle speed. Thus, at 900 MHz (λc = 0.333m), we have
Maximum transmission duration (one-way) = (λc / 20)/Vm
Maximum transmission duration (one-way) = (0.333m/20)/250 km/h
Maximum transmission duration (one-way) = 0.24 ms
Or, Maximum transmission duration (two-way) = 2 × 0.24 = 0.48 ms
Hence, Duration for data transmission in a time slot, d = 0.48 ms
Assuming the number of taps on the adaptive equaliser to be equal to 6 times the number of bits transmit-
ted in the maximum dispersal time (Δm = 0.01 ms), the amount of time needed for the training sequence in
the time slot, t = 0.06 ms.
To account for the differing amounts of delay between different mobile units and the base station, a guard
interval is needed at the end of each time slot. Because eight mobile subscriber units share the same TDMA frame,
it is necessary to adjust the timing of the transmissions of the mobile subscriber units so that the transmission from
one mobile subscriber does not interfere with adjacent time slots. The guard time can be computed as follows.
Let the average duration of the voice call = 120 seconds
Maximum vehicle speed of the mobile = 250 km/h
Therefore, the radial distance a mobile moving toward or away from the base station located at the centre of
the cell = (250 km/h) × (120 s) = 8333 m
The change in propagation delay = 8333 m/(3 × 108 m/s) ≈ 0.03 ms
Or, Required duration for guard interval, g = 0.03 ms
Figure 11.14 shows the tentative design of a time slot, depicting time duration of two blocks of data before
and after the training sequence and guard time.
2 0.24 s 2 0.24 s
0.0 ms 0.03 ms
M r me 4. 15 ms
0 1 2 3 4 5 7
ime sl 0.557 ms
ne rs 14 is
Stealing Bit, S (1 Bit each at the End of Two 57-Bit Data Fields in the Time Slot) It is used to indicate whether this
block contains data or is stolen for urgent control signaling purpose during the call.
Training Data (26 Bits) It is used to adapt the parameters of the receiver to the current path-propagation
characteristics and to select the strongest signal in case of multipath propagation. The training sequence is a
known bit pattern that differs for different adjacent cells. It enables the mobile subscriber units and base sta-
tions to determine that the received signal is from the desired base station and not from a strong interfering
base station. In addition, the training sequence is used for multipath equalisation, which is used to extract the
desired signal from unwanted reflections.
Guard Bits, G (8.25 Bits) It is used to avoid overlapping with other bursts due to different path delays.
The 148 bits of a data burst are used to transmit the information. Delimited by tail bits (consisting of 0s),
the frame contains 26 training bits sandwiched between two bursts of data bits. These training bits allow the
receiver to synchronise itself.
Moving up the frame format hierarchy, 8-time slots TDMA frames are typically organised into a 26-frame
multiframe. One of the frames in the multiframe is used for control/signaling and another is currently unused,
leaving 24 frames for data traffic. Thus, each traffic channel receives one slot per frame and 24 frames per
120-ms multiframe.
The gross channel data rate can be calculated as follows:
Number of data bits per time slot = 114 bits
Number of time slots per multiframe = 24
So, Number of bits per multiframe = 24 × 114 bits = 2736 bits
Time duration of one multiframe = 120 ms
So, Gross data rate = 2736 bits/120 ms = 22.8 kbps
GSM uses a complex hierarchy of TDMA frames to define logical channels, as shown in Fig. 11.16.
The GSM specification also allows half-rate traffic channels, with two traffic channels each occupying
one time slot in 12 of the 26 frames. With the use of half-rate speech coders, this effectively doubles the
capacity of the system. There is also a 51-frame multiframe used for control traffic. Thus, many frames are
combined to constitute multiframe, superframe, and hyperframes.
0 1 2 3 .. 204 2047
0 1 2 4 50 0 1 2 24 25
0 1 2 24 25 0 1 2 4 50
1 M r me = 4. 15 ms
0 1 2 3 4 5 7
T: il i s 3 : l i 1 : rd i s .25
Solution
Step 1. To find time duration of a bit, Tb
Channel data rate = 270.833 kbps (given)
Time duration of a bit, Tb = 1/Data rate
Hence, time duration of a bit, Tb = 1/270.833 kbps = 3.69 s
Step 2. To find time duration of a time slot, Tslot
No. of bits per time slot = 156.25 bits (given)
Time duration of a time slot, Tslot = 156.25 bits × Tb
Time duration of a time slot, Tslot = 156.25 bits × 3.69 μs = 577 s
Step 3. To find time duration of a TDMA frame, Tf
No. of time slots per TDMA frame = 8 (given)
Time duration of a frame, Tf = No. of time slots × Tslot
Time duration of a frame, Tf = 8 × 577 μs = 4.616 ms
Step 4. To find time duration for a user occupying a single time slot between two successive transmissions
A user occupying a single time slot between two successive transmissions has to wait for the time duration
of a frame. Hence, a user has to wait for 4.616 ms between two successive transmissions.
r is n r ed d r inin is n r ed d is rd eri d
3 5 2 5 3 .25 i s
The start bits are 000 providing a gap time for the digital radio circuitry to cover the uncertainty period to
ramp on and off for the radiated power and to initiate the convolutional decoding of the data. The 26-bit
training sequence is used to train the adaptive equaliser at the receiver. The training of the equaliser is in the
middle of the burst because the channel behaviour is constantly changing during the transmission of the data
burst. The 116 encrypted data bits include 114 bits of data and two flag bits at the end of each part of the
data that indicates whether data is user traffic or signaling and control information during the call.
The Frequency-Correction (FCCH) burst is used
in TS 0 of specific frames to broadcast the frequency
r is is rd eri d
synchronisation control messages by the BTS on 3
ixed i s ll 0s 142
3 .25 i s
the forward link. MSs use it to synchronise with the
master clock in the system. The frame format of the Fig. 11.18 The FCCH data burst in GSM
FCCH data burst is shown in Fig. 11.18.
The FCCH burst has three bits at the start and the end of the data field. The rest of the data burst contains
all 0s that allows transmission of the unmodulated carrier frequency. Guard period equivalent to 8.25-bits
duration is used between two bursts.
The synchronisation (SCH) burst, as shown in Fig. 11.19, is very similar to the normal burst except that
the training sequence is longer and the coded data are used for the specific task of identifying the network.
The SCH burst is used in TS 0 of specific frames to broadcast the frequency and time synchronisation control
messages on the forward link.
r is n r ed d r inin is n r ed d is rd eri d
3 3 4 3 3 .25 i s
The BTS broadcasts the SCH burst, and the MSs use it for initial training of the equaliser, initial learning
of the network identity and to synchronise the time slots.
The random access (RACH) burst, as shown in Fig. 11.20, is used by the MS to access the BS as it registers
to the network.
The overall structure of the RACH data burst is similar to the normal data burst except that a longer
start bits and synchronisation sequence is used to initiate the equaliser. A much longer guard period of
68.25 bits allows approximate estimation of the distance of the MS from its serving BTS. The distance can
be computed from the arrival time of the RACH burst. A guard period of 68.25 bits translates to 252 μs.
The signal transmitted from a MS should travel more than 75.5 km (at the signal speed of 300,000 km/sec)
before arriving at the BTS to exceed this guard period.
428 Wireless Communications
The dummy burst, as shown in Fig. 11.21, is used as filler information for unused time slots on the
forward link.
.12 s
1 er r me = 51 M l i r mes
120 ms
1 M l i r me = 2 r mes
4. ms
1 r me = ime sl s 0 1 2 3 4 5 7
577 μs
1 ime sl 3 57 1 2 1 57 3 .25 is
The Concept of Time Slot in GSM Channel A time slot consists of 156.25 bits that are transmitted at a rate of
270.833 kbps. In one time slot, 114 bits are encrypted data bits transmitted as two times 57 data bits each.
The training sequence in the middle of the time slot consists of 26 bits. It allows the adaptive equaliser in
the receivers of the base station and mobile unit to analyse the characteristics of the wireless channel before
decoding the user data. On either side of the training sequence, there are control bits called stealing flags.
The bit value of these two flags distinguishes the time slot to contain either the voice or control information
during the call.
The Concept of TDMA Frames in GSM Channel During a frame, one time slot is used to transmit only and
another time slot is used to receive only. The remaining six time slots of a frame can be used to measure
received signal level from its serving base station as well as that from up to five adjacent base stations.
Global System for Mobile (GSM) 429
1 er r me = 2 n r l r 51 r i m l i r mes .12 s
1 r me = 4. 15 ms
The GSM radio-interface standard provides a variety of control channels and traffic channels defined
in a hierarchy built upon the basic eight-slot TDMA transmission format. The frame hierarchy, depicted in
Fig. 11.23, shows the TDMA hierarchy of the GSM network from a normal data burst of 577 μs interval to a
hyperframe of length of around three-and-half hours.
The basic building block of the GSM frame hierarchy is a 4.615-ms TDMA frame. Each frame comprises
of eight data bursts or time slots. The time-slot interval is equivalent to the transmission time for about
156.25 bits, comprising of 114 bits user data and the remaining overhead bits. A TDMA frame contains
8 × 156.25 bits = 1250 bits. The frame rate is 270.833 kbps/1250 bits/frame = 216.66 frames per second.
The Concept of Multiframes in GSM Channel Each of the normal speech frames are grouped into larger struc-
tures called multiframes, superframes and hyperframes. The 13th or 26th frames are used for control data
only. Each 120-ms multiframe is composed of 26 frames––24 frames carry user information, and two frames
carry system control information related to individual users. The gross data rate per user is 24 × 114 bits /
120 ms = 22.8 kbps. The speech coder has a net data rate of 13 kbps, and the addition of error-correction
coding results into gross transmission data rate up to 22.8 kbps per user. The eight-slot TDMA frames may be
also organised into control multiframes. Control multiframes are used to establish several types of signaling
and control channels used for system access, call set-up, synchronisation, and other system control functions.
The control multiframes span 51 TDMA frames.
The Concept of Superframes in GSM Channel Either traffic or control multiframes are grouped into super-
frames, which are in turn grouped into hyperframes. One traffic multiframe contains 26 frames, and one traf-
fic superframe contains 51 traffic multiframes, or 1326 frames. A hyperframe contains 2048 superframes, or
2,715,648 frames. A complete hyperframe takes about every 3 hours, 28 minutes, and 54 seconds. The encryp-
tion algorithms rely on the particular frame number, and sufficient security can only be obtained by using
a large number of frames as provided by the hyperframe. Counters at the mobile subscribers need to track the
frame numbers at hyperframe, superframe, and multiframe levels to communicate with the network.
When the MS requests for any service, the MSC sends it a random number. It also uses an authenticate
algorithm to encrypt with the IMSI and the key stored in its memory. In the MS, the received random number
is encrypted using IMSI and the same key is transmitted to the system, which compares it with the original
value sent by the fixed network. If they match then the MS is authentic.
11.8.1 Registration
For an MS to operate in an MSC, it must be registered by accessing the BTS. The MSC assigns a TMSI
to the MS and updates the information in VLR and HLR. Whenever the MS is switched on, there is a
need to possibly establish a new registration with the cellular network. Sometimes a mobile subscriber is
required to connect to the cellular network at different locations through a BS that may not be owned by its
home service provider. Technically speaking, the MS passively synchronises to the frequency, bit, and frame
timings of the nearest BS to get ready for information exchange.
The MS receives the cell identity, and system parameters determine its location in the cellular network. If
the present location is not the same as before, the MS initiates a registration procedure. During a registration
procedure, the system provides the MS with a control channel for preliminary signaling. The MS provides its
own identity, and finally the system authenticates the MS.
The MS registration process is described in Table 11.3 when a mobile subscriber is switched on in a new
MSC area.
Firstly, a radio communication link is established between the MS and BTS to process the registration. It
is followed by an authentication process by the system, and assignment of TMSI. Records are updated in the
VLR and HLR. After successful registration, the temporary radio communication link is released.
In the mobile communication environment, there are two separate call-establishment procedures for
mobile-to-network and network-to-mobile calls. Mobile-to-mobile calls are a combination of these two. The
detailed procedure for both types of call establishment in the GSM network is described next.
The mobile subscriber first waits for the SACCH frame on the SDCCH, to inform the mobile subscriber of
any required timing advance and transmitter power command. The mobile subscriber is now able to transmit
normal burst messages as required for speech traffic. The SDCCH sends messages such as authentication and
user validation between the mobile subscriber and the base station. The PSTN connects the called landline sub-
scriber to the MSC. The MSC switches the voice connection to the serving base station. The mobile subscriber
receives a command by the base station via the SDCCH to retune to a new ARFCN and TS for the TCH assign-
ment. Speech data is transferred on both the forward and reverse channels, and the SDCCH is released.
M
in r s r re
M
P
subscriber. Then the called mobile subscriber is contacted through the BSS. The base station broadcasts a PCH
message on the BCH. The mobile subscriber locks on to the same ARFCN, decodes its page and responds with
an RACH message. The base station then uses the AGCH on the CCCH to assign the mobile subscriber unit to
a new channel for connection to the SDCCH and SACCH while the network and the serving base station are
connected. Once the subscriber establishes timing advance and authentication on the SDCCH, the base station
assigns the TCH. As shown in Fig. 11.29, the PSTN directs the call initiated by the calling landline telephone
subscriber to the MSC identified by the dialed phone number of the called mobile subscriber.
The MSC requests routing information from the HLR. Since the mobile subscriber is roaming in the area
of a different MSC, the gateway MSC contacts the destination MSC. The VLR initiates a paging procedure
in all BSSs under the control of the MSC. After getting response from the MS, the VLR sends the necessary
system parameters to the MSC to establish the link to the MS.
EXAMPLE 11.8 GSM Layer III sublayer categories used for call establishment
Illustrate the step-by-step procedure for mobile-initiated call-establishment procedure, giving the type of logical
channel used along with sublayer categories of GSM Layer III.
Solution
Table 11.5 shows the mobile-initiated call-establishment procedure. The second column identifies the action taken
or the message type. The third column identifies the logical channel that is used to carry the message. The fourth
column identifies the sublayer of the Layer III in which GSM standard describes the message. Note that Layer III
does not handle the traffic message, and therefore there is no sublayer associated for that part of the procedure.
Table 11.5 Layer III sublayer categories for mobile-initiated call
Step No. Message type Logical channel used Layer III sublayer category
(Continued )
Global System for Mobile (GSM) 437
Step No. Message type Logical channel used Layer III sublayer category
8. Send called number SDCCH CM
9. Routing response SDCCH CM
10. Traffic channel assigned SDCCH RRM
11. Traffic channel established FACCH RRM
12. Free/busy signal FACCH CM
13. Acceptance of call FACCH CM
14. Connection established FACCH CM
15. Conversation TCH ----
MS SS 1 MSC SS 2
Me s red si n l level
nd needed
nd re es
nd re es
nd mm nd
nd mm nd
nd rren e nd rren e
nd rren e
nd s ess l
le r nnel mm nd
offers to the mobile subscribers. As per ISDN guidelines, GSM services are classified mainly into three catego-
ries: telephone services or teleservices, data or bearer services, and supplementary ISDN services.
Teleservices provides the mobile subscribers with necessary capabilities which enable them to commu-
nicate with other subscribers. Bearer services give the mobile subscribers the capacity required to transmit
appropriate signals between network access points. Supplement services supplement basic teleservices and
are offered together or in association with other services. Table 11.6 lists the GSM services.
Telephone services provide full-duplex voice communication applications between the calling and called
subscribers according to a standard protocol.
Data or bearer services provide capabilities to transmit information among user-network-interfaces.
Traditional bearer services include a variety of asynchronous and synchronous data access to PSTN/ISDN
and packet switched public data networks either in a transparent mode (where GSM provides standard chan-
nel coding for the user data) or nontransparent mode (where GSM offers special coding efficiencies based on
the particular data interface).
Supplementary ISDN services are not standalone services but they are digital signaling services that
supplement telephone services or data services. Short Messaging Service (SMS) allows GSM subscribers
and base stations to transmit alphanumeric pages of limited length (160 7-bit ASCII characters). SMS also
provides cell broadcast, which allows GSM base stations to repetitively transmit messages with as many
as fifteen 93-character strings in a concatenated fashion. SMS may be used for advertisement, safety, and
advisory applications including broadcast of highway traffic conditions or weather information to all GSM
subscribers within reception range.
This is possible because voice/data/fax calls utilise dedicated voice channels for the duration of the call, while
short messages occupy the control channels.
SMS is basically a store and forward service. If the recipient mobile subscriber is not available, the message
can be stored with the system. Each mobile cellular network that supports SMS has one or more messaging
centres to handle and manage the short messages. This means that SMS message is not sent directly from a
sender to the receiver but always processed via an SMS centre at MSC.
440 Wireless Communications
A single SMS can be up to 160 characters of text in length. The characters may comprise of a combination
of words, numbers, or alphanumeric characters. Nontext-based SMSs (binary format) are also supported.
There are ways of sending multiple SMSs also. For example, SMSs concatenation and SMS compression
within single short message features are available.
mobile phones from +29 dBm (0.8 W) up to +44 dBm (20 W) with a 4-dB separation between consecutive
mobile classes. There are eight classes for the BTS radiated power ranging from +34 dBm (2.5 W) up to
+55 dBm (320 W) in 3-dB steps.
Power class Base station power ( Watts) Mobile phone power ( Watts)
I 320 20
II 160 8
III 80 5
IV 40 2
V 20 0.8
VI 10 ---
VII 5 ---
VIII 2.5 ---
The mobile subscriber Tx power is always controlled to its minimum required value to minimise the
interference and maximise the battery life. Power adjustments in both directions are made using closed-
loop power control. The mobile subscriber is allowed to reduce its peak output power down to 20 mW in
2 dB steps. The BSS calculates the optimum Tx power level for individual mobile subscribers by monitoring
certain metrics of performance such as the received signal power level, received signal-to-noise ratio, or received
bit error rate, and sends this information through control signaling packets to the mobile subscriber.
The maximum RF spectrum bandwidth for uplink or downlink transmission is 25 MHz. Expressed as a
percentage of the mean carrier frequency of 900 MHz, the maximum frequency hopping for the downlink is
approximately 25/900 × 100 = 2.8%.
With this percentage of maximum frequency hopping, it turns out that the time spent by a rapidly moving
mobile user in a deep fade is reduced to about 4.6 ms. This incidentally matches with the frame duration. In
the case of slowly moving mobile subscribers such as pedestrians, the frequency-hopping algorithm produces
substantial gains against fades. Each successive frame in a given channel is carried on a different carrier
frequency. Thus, the transmission frequency is changed once every 4.615 ms.
Key Terms
• Air interface • Frequency Division Multiple • Privacy
• Authentication Access • Registration
• Authentication Centre (AuC) • Frequency hopping • Short Message Service (SMS)
• Authorisation • Global System For Mobile • Subscriber Identity Module
• Base Station (BS) (GSM) (SIM)
• Base Station Subsystem (BSS) • Hand-off • Superframe
• BCCH • Mobile Station (MS) • Time Division Multiple Access
• Downlink • Network and Switching (TDMA)
• Encryption Subsystem (NSS) • Time slots
• Frame • Packet • Uplink