Beruflich Dokumente
Kultur Dokumente
EE 737
Digital Spread Spectrum
Dr. James Stephens
May 24, 2004
Submitted by,
Sohel K. Baramatiwala
1
INDEX
1. Objective3
2. History....3
3. Basics and Specifications of GSM.3
4. Architecture and Building Blocks..5
5. Signaling schemes and Ciphering codes used7
5.1 Ciphering Codes...8
5.1.1 A3/8 Algorithm.9
5.1.2 A3/1 Algorithm.10
6. Two Main Interfaces..10
6.1 Air Interface.10
6.2 Abis Interface...11
7. Summary12
8. Future Enhancements.12
9. SUGGESTIONS FOR FURTHER STUDY..13
10. References..13
FIGURES
Fig1. Representation of a GSM signal using TDMA and FDMA with respect to the
transmitted power.
Fig 2. The Basic Blocks of the whole GSM system
Fig 3. Transmitter for the voice signal
Fig 4. Receiver for voice signal
1. OBJECTIVE
In this paper I have outlined the reasons GSM started and how, the architecture
that the GSM is built on, the signaling and ciphering codes used, the Air and Abis
Interface and last but not the least future prospects and enhancements possible.
2. HISTORY
In 1980s the analog cellular telephone systems were growing rapidly all
throughout Europe, France and Germany. Each country defined its own protocols and
frequencies to work on. For example UK used the Total Access Communication System
(TACS), USA used the AMPS technology and Germany used the C-netz technology.
None of these systems were interoperable and also they were analog in nature.
In 1982 the Conference of European Posts and Telegraphs (CEPT) formed a study
group called the GROUPE SPECIAL MOBILE (GSM) The main area this focused on
was to get the cellular system working throughout the world, and ISDN compatibility
with the ability to incorporate any future enhancements. In 1989 the GSM transferred the
work to the European Telecommunications Standards Institute (ETSI.) the ETS defined
all the standards used in GSM.
TDMA / FDMA
933-960 (basic GSM)
890-915 (basic GSM)
FDD
200
GMSK
1000 / 125
Yes
RPE-LTP / 13
8
270.833
Rate 1/2 convolutional
4.615
GSM was originally defined for the 900 Mhz range but after some time even the 1800
Mhz range was used for cellular technology. The 1800 MHz range has its architecture and
specifications almost same to that of the 900 Mhz GSM technology but building the
Mobile exchanges is easier and the high frequency Synergy effects add to the advantages
of the 1800 Mhz range.
GSM Radio Network This is concerned with the signaling of the system. Handovers occur in the radio network. Each BTS is allocated a set of frequency
channels.
GSM Mobile switching Network This network is concerned with the storage of
data required for routing and service provision.
(TRAU)
Mobile Services Switching Center The BSC is connected to the MSC. The MSC
routes the incoming and outgoing calls and
(MSC)
Home Location
Visitor
Location
Resigter
Equipment Identity Register (EIR) The IMEI no. is allocated by the manufacturer
and is stored on the network in the EIR. A stolen
phone can be made completely useless by the
coder also has a Voice activity detector (VAD) and comfort noise synthesizer. The VAD
decides whether the current speech frame contains speech or pause, this is turn is used to
decide whether to turn on or off the transmitter under the control of the Discontinuous
Transmission (DTX). This transmission takes advantage of the fact that during a phone
conversation both the parties rarely speak at the same time. Thus the DTX helps in
reducing the power consumption and prolonging battery life. The missing speech frames
are replaced by synthetic background noise generated by the comfort noise synthesize in
a Silence Descriptor (SID) frame. Suppose a loss off speech frame occurs due to noisy
transmission and it cannot be corrected by the channel coding protection mechanism then
the decoder flags such frames with a bad frame indicator (BFI) In such a case the speech
frame is discarded and using a technique called error concealment which calculates the
next frame based on the previous frame.
The A5 algorithm is the stream cipher used to encrypt over the air
transmissions. The stream cipher is initialized for every frame sent with
the session key Kc and the no. of frames being decrypted / encrypted. The
same Kc key is used throughout the call but different 22-bit frame is used.
6.1AIR INTERFACE
The air interface is like the physical layer in the model. The signaling schemes
used in the AIR interface are as follows
10
Used for signaling between the BSS and MS when there is no active
connection between them.
o SLOW ASSOCIATED CONTROL CHANNEL (SACCH)
This channel had to continuously transfer data because it is considered as
proof of existence of a physical radio connection.
o FAST ASSOCIATED CONTROL CHANNEL (FACCH)
This channel is used to make additional band-width available for
signaling.
11
7. SUMMARY
In this paper I have tried to explain the basic working of the GSM system.
Although this paper might be missing many details of a detailed GSM explanation I
believe I have explained the philosophy behind GSM. GSM operates at 900 MHz and
1800 MHz and is truly an international system which is compatible with ISDN. Together
with international roaming, SMS, Data transfer etc GSM systems are coming closer to a
personal communication system, close to UMTS currently being developed in Europe.
Though 3rd generation mobile phones are taking over the market, the back-bone for most
cellular technologies will always remain GSM.
8. FUTURE ENHANCEMENTS
One major problem was number compatibility, but now this problem has been
solved and this is possible.
Another major problem is SIM card cloning which allows users to make
fraudulent calls. This can be got rid of by incorporating a more secret key in the
SIM then the currently used one which can be cracked asking a few queries.
Another possibility is making the whole GSM station design in software; this will
make upgradation of systems really easy.
3 GSM which seems to be taking over the market is an advancement in 2G and in
a few years will make 2G obsolete. The 3G system incorporates W-CDMA in it,
and makes multimedia and high speed internet access possible.
The next step is AD-HOC networks used in cellular technology. In this every MS
itself would act as a BTS. But they have a long way to go as research in this area
is still going on.
12
10. REFERENCES
GSM networks: Terminology, protocols and implementation Gunnar
Heine
GSM: Switching, Services And Protocols Jorg, Vogel and Bettstetter
GSM Technical Specification ETSI
http://ccnga.uwaterloo.ca/~jscouria/GSM/gsmreport.html
www.gsm.org
www.techmind.org
An Overview of GSM www.comms.eee.strath.ac.uk/~gozalvez/gsm/gsm
13
http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
14
15