Professional Documents
Culture Documents
Engineering Management
Project Planning & Control
GSM
Global System
for Mobile communication
Presented by:
Zeeshan Zia
10-ECT-41
Khaleel Ahmad Khan 10ECT-83
C
O
N
T
E
N
T
S
Introduction
Advantages, Characteristics & Future
Architecture
Specifications
Operation
Applications
Introduction to GSM
1G (1st generation) cellular standard
2G (2nd generation) cellular standard
cater voice services and data delivery
using digital modulation
provide functional basis for 3G mobile
system
Future of GSM
2nd Generation
GSM -9.6 Kbps (data rate)
2.5 Generation ( Future of GSM)
HSCSD (High Speed ckt Switched data)
3 Generation
WCDMA(Wide band CDMA)
GSM Architecture
GSM Architecture
Mobile Station (MS)
Mobile Equipment (ME)
Subscriber Identity Module (SIM)
Alarm
Fault Management
Performance Management
Configuration Management
Software Version Management
Network Status Control
GSM Specifications-I
RF Spectrum
GSM 900
Mobile to BTS (uplink):
890-915 MHz
BTS to Mobile(downlink):
935-960 MHz
Bandwidth:
2* 25 MHz
GSM 1800
Mobile to BTS (uplink):
1710-1785 MHz
BTS to Mobile(downlink):
1805-1880 MHz
Bandwidth:
2* 75 MHz
GSM Specification-II
Carrier Separation:
200 KHz
Duplex Frequency Spacing:
45 MHz
No. of RF carriers / channels:
124
Access Method:
TDMA/FDMA
Voice Coder Bit Rate:
13kbps
Modulation Method:
GMSK
Modulation(air transmission) data rate: 270.833
Kbps
Speech
Analog>digital
Speech
Residually Excited Linear Predictive Coder (RELPC)
coding
decoding
13.0 Kbps
addition for data & control signals
Channel CodingBit
Bit error detection & correction
Channel decoding
22.8 Kbps
Interleaving Spreading successive bits over several data blocks
De-interleaving
22.8 Kbps
Burst FormattingSynchronization & equalization of signals
Burst Formatting
33.6 Kbps
Ciphering
33.6 Kbps
Modulation
Radio Interface
binary>analog
GMSK technique
270.83 Kbps
De-ciphering
Demodulation
GSM Channels
Physical Channel
One timeslot of a TDMA-frame on one carrier is referred to
as a physical channel. There are 8 physical channels per
carrier in GSM (channel 0-7(timeslot 0-7))
Logical Channel:
A great variety of information must be transmitted
between BTS and the MS e.g. user data and control
signaling. Depending on the kind of information
transmitted we refer to different logical channels. These
logical channels are mapped on physical channel.
Bursts:
Normal Burst
Freq. Correction Burst
Synchronization Burst
Access Burst
Dummy Burst
Logical Channel
Half Rate TCH = 11.4kbps
TCH
(traffic)
Broadcast
CCH
CCH
(contro
Common
l)
CCH
SCH(Synchronization)
PCH(Paging)
RACH(Random Access)
AGCH(Access Grant)
Dedicated
CCH
Codecs:
FR = 13kb/s
HR = 5.6kb/s
EFR = 12.2kb/s
AMR (Adaptive Multirate)
SDCCH(Stand Alone)
SACCH(Slow-associated)
FACCH(Fast-associated)
Call Routing
Call termination to MS (Incoming Calls)
Call Originating from MS (Outgoing Calls)
Incoming Calls
Calling
a
GSM
subscribers[1]
Forwarding
call
to
GSMC[2]
Signal Setup to HLR[3]
Request
MSRN
from
VLR[4,5]
Forward
responsible
MSC to GMSC[6]
Forward Call to current
MSC[7]
Get current status of
MS[8,9]
Paging of MS[10,11]
MS answers[12,13]
Security checks[14,15]
Set
up
connection[16,17]
Outgoing Calls
MS sends dialed number
to BSS[1]
BSS sends dialed number
to MSC[2]
MSC checks VLR if MS is
allowed the requested
service. If so, MSC asks
BSS to allocate resources
for call[3,4]
MSC routes the call to
GMSC[5]
GMSC routes the call to
local exchange of called
user[6]
Answer back(ring back)
tone
is
routed
from
called user to MS via
GMSC,
MSC,
BSS[7,8,9,10]
Handover
1 Intra BTS / Cell
Between 1 and 2
Inter BTS / Intra BSC
Between 1 and 3
Inter BSC/ Intra MSC
Between 1 and 4
Inter MSC
Security in GSM
On air interface, GSM uses encryption and TMSI
instead of IMSI.
SIM is provided 4-8 digit PIN to validate the
ownership of SIM
3 algorithms are specified:
- A3 algorithm for authentication
- A5 algorithm for encryption
- A8 algorithm for key generation
Authentication
GSM Applications
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG
sets
Value Added Services
Th
Yo
To be prepared is half
the victory!
Miguel de Cervantes Saavedra