Beruflich Dokumente
Kultur Dokumente
• Cellular
2 – Networking
2 7 technology that breaks
7 3 1 geographic area into
1 6 cells shaped like honey
4 comb
6 5
5 • Cell
– Area of coverage
provided by one or
more Radio terminals
ver1.1 WIPRO Global R&D 8
Cell Planning
• Traffic and Coverage Analysis
•Collection of data
•Traffic calculation
•Nominal Cell Plan
•Coverage and Interference Prediction
•Site Survey and Signal strength Measurement
•Evaluation, final Cell Plan
•Installation
•Optimization
• Uplink Transmission
– Transmission from Mobile to Radio Terminal
Power
8 8
0 0
f1 f2 FDM
ver1.1 WIPRO Global R&D 11
Access Techniques
0 1 2 3 4 5 6 7
4.616 ms
ver1.1 WIPRO Global R&D 13
GSM System specifications
Frequency band
Uplink 890 MHz-915 MHz
Downlink 935 MHz-960MHz
Duplex distance 45MHz
Carrier separation 200KHz
Modulation GMSK
Air transmission rate 270Kbps
Access method FDMA/TDMA
Speech Coder RPE-LTP-LPC
(Regular pulse excitation
-Long Term predictive
ver1.1
-linear predictive Coder)
WIPRO Global R&D 14
MS
GSM - Network Structure
Um
BSC
Abis MSC
A
MS AuC
BTS GMSC
Abis
EIR
A
MSC
BSC PSTN
Um
BTS
VLR
OMC Server
D G
Half Full
CCCH DCCH
BCH rate rate
Synchronization Channel-SCH
This is used by the MS to synchronize to the
TDMA frame structure within the particular cell.
Listening to the SCH the MS receives the TDMA
frame number and also the BSIC.
ver1.1 WIPRO Global R&D 31
Control channels Broadcast
channels BCH
0 1 2 3 4 5 6 7 0 1 2 3 ……..
TS 2-7 - TCH
Synchronization Burst
BSC
Handover Complete
LUP Reply
Req
LUP
Meas
MeasAcc
LUP Rep
Req
Rep+ Cell
Handover
Cell 1
2
1
2 to CELL 1
CELL 2
(5)Location
Cancellation
MSC/VLR VLR
BSC BTS
(ID=1)
ver1.1 WIPRO Global R&D 52
Security - Authentication
MS
Ki RAND
– Authentication center provides
RAND to Mobile
A3 – AuC generates SRES using Ki
SRES of subscriber and RAND
– Mobile generates SRES using
MS BTS AuC Ki and RAND
– Mobile transmits SRES to BTS
RAND
– BTS compares received SRES
with one generated by AuC
SRES
SRES
Auth Result
A8
– Data sent on air
interface ciphered for
security
Kc
Um interface – A5 and A8 algorithms
MS Network
Kc
used to cipher data
Kc
– Ciphering Key is
Data
A5
Ciphered
A5
Data
never transmitted on
Data
air
BSC VLR
MS AuC
BTS GMSC
Authentication response
(SDCCH) Call release
Call Setup
Connected
Exchange of
Communication EIR
Assignment
Alerting
Connected
of TCH
(AGCH) (TCH) Call
Alerting
Connected
release
Setup
MSC Exchange of
Call
Assignment
Alerting
Connected
release
Alloc
Call ofofdedicated
TCH
Authentication
Req establishment
Ciphering
for dedicated
response
command
response
request
channel
channel
request BSC Communication
Exchange
(TCH)
(AGCH)
(AGCH)of
(SDCCH) communication
for communication (RACH) PSTN
(TCH)
BTS
Query for
VLR info
MS AuC
BTS Query VLR GMSC Reply
for LAC and
Paging TMSI
the area
EIR
Route
to MSC
MSC
BSC
PSTN
BTS
Land to
Mobile call