SlideShare a Scribd company logo
GSM Channel Concept
Md Mustafizur Rahman
RNPO Engineer
Grameenphone Ltd.
AIR INTERFACE
Frequency Allocation
Radio Channel
DOWNLINK
935 - 960 MHz
1805-1880 MHz
UPLINK
890-915 MHz
1710-1785 MHz
Air Interface
Cell Site
Mobile
GSM: TRX/TDMA Frame
25 MHZ: 890 to 915 MHz (UL)
935 to 960 MHz (DL)
Channel 1
200kHz
Channel 2
200kHz
Channel 124
200kHz
Time
Slot 0
Time
Slot 1
Time
Slot 7
TDMA Frame (4.616 ms)
57 bits
(interleaved sub block)
from a 20ms Voice frame
26 bit TSC
for error prediction
57 bits
(interleaved sub block )
from another 20ms Voice
frame
3 tail
bits
3 tail
bits
1 bit
flag
1 bit
flag
148+8.25=156.25 bits
8.25
guard
bits
Frequency band
Channels
TRX/TS
TS/bit stream
1800MHz Band : 1710-1785MHz(UL)
1805-1880MHz(DL)
Total no. of Channel is 374.
1TS=0.577ms
1bit=3.69ms
9
Superframe and Hyperframe
11
3 Broadcast
Channels
1) FCCH
2) SCH
3) BCCH
3 Common Control
Channels
1) PCH
2) RACH
3) AGCH
3 Dedicated Control
Channels
1) SDCCH
2) SACCH
3) FACCH
TCH
CBCH
LOGICAL CHANNELS
Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s
Half rate => Used for speech at 6.5 Kbits/s
or sending data at 4.8 Kbits/s
Enhanced Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s but
with almost Land line quality
TCH = TRAFFIC CHANNEL
FCCH = FREQUENCY CORRECTION CHANNEL (Downlink only)
•To tell the Mobile that this is the BCCH carrier
•To able the Mobile to synchronize to the frequency
•bursts only containing zeroes are transmitted.
SCH = SYNCHRONISATION CHANNEL (Downlink only)
•Used for sending BSIC (Base station Identity Code)
•Give TDMA frame number to the Mobile
BCCH = BROADCAST CONTROL CHANNEL (Downlink only)
•Used for sending information to the mobile like-
•CGI (Cell Global identity)
•LAI (Location Area Identity)
•BCCH carriers of the neighboring cells
•maximum output power allowed in the cell
•Other broadcast messages like barred cell
BROADCAST CHANNELS
PCH = PAGING CHANNEL
=> Used for paging the Mobile. (Downlink only)
Reason could be an incoming call or an incoming Short Message.
RACH = RANDOM ACCESS CHANNEL
=> Used for responding to the paging (terminating), Location updating
or to make call access (originating) by asking for a signaling channel.
(Uplink only)
AGCH = ACCESS GRANT CHANNEL
=> Used to allocate SDCCH to the mobile.
(Downlink only)
COMMON CONTROL CHANNELS
SDCCH = STAND ALONE DEDICATED CONTROL CHANNEL
=> Used for allocating voice channel (TCH) to the mobile (call setup) and
Location updating.
=> Send Short Text message to Idle Mobile
(Uplink & Downlink)
SACCH = SLOW ASSOCIATED CONTROL CHANNEL
=> Used for sending information to the mobile like
CGI (Cell Global identity), LAI (Location Area Identity),
BCCH of all the neighbors and TA (Timing Advance)
=> Send Short Text message to Busy Mobile
(Downlink
=> Used for sending signal strength & bit error rate measurement of the
serving cell and signal strength of the BCCHs of the neighboring cells.
(Uplink)
FACCH = FAST ASSOCIATED CONTROL CHANNEL
=> Used for handover. (Uplink & Downlink)
DEDICATED CONTROL CHANNELS
=> SMS messages are short TEXT messages up to 160 characters in length that you
can send or receive. The messages are not sent straight to the other mobile but is
sent to message centre operated by the Network provider.
=> If the mobile was switched off or is at outside of the coverage area,
the message is stored in the Message Service Center. The message
will be offered to the subscriber when the mobile is switched on again
or has reentered the coverage area again.
=> If the mobile is in the Idle mode the short message will be send through
the SDCCH. If the mobile is Busy the short message will send through
the SACCH.
CBCH = CELL BROADCAST CHANNEL
=> Used for sending short messages to all the mobiles within a geographic area.
Typical example is Traffic congestion in a major road or a major accident
in an area. Up to 93 characters can be sent.
=> If the mobile is in the Idle mode then the short message will be send through
the CBCH. If the mobile is Busy, it will not be sent.
NOT TO BE CONFUSED WITH SMS !!!!!!!!
(SHORT MESSAGE SERVICE)
21
Channel combinations
The following combinations of logical channel types are allowed for the
radio timeslots and specified by GSM (Rec. 05.02):
a) TCH/F + FACCH/F + SACCH/TF
b) TCH/H + FACCH/H + SACCH/TH
c) SDCCH/8 + SACCH/C8
d) FCCH + SCH + BCCH + CCCH (TS 0)-Uncombined
e) FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/C4 (TS 0)-combined
f) BCCH + CCCH
g) SDCCH/8 + SACCH/8 + CBCH
h) FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/C4 + CBCH (TS 0)
***A "+" indicates that the channels are used simultaneously.
22
a) TCH/F + FACCH/F + SACCH/TF
T-TCH/FACCH
A-SACCH
24
b) TCH/H + FACCH/H + SACCH/TH
25
c) SDCCH/8 + SACCH/C8
Note that the uplink and downlink patterns are time shifted, so that SDCCH subchannel 0 is sent
in frames 0-3 on downlink and in frames 15-18 on uplink. The reason for this is to achieve more
efficient communication, by giving the MS time to calculate its answers to the requests received
on downlink SDCCH.
26
d) FCCH + SCH + BCCH + CCCH (TS 0)-Uncombined
F (FCCH) Frequency Correction Channel, S (SCH) Synchronization Channel,
B (BCCH - Norm) Broadcast Control Channel, C (CCCH) Common Control CHannel: Paging CHannel(PCH) or
Access Grant CHannel (AGCH), I Idle
F D T T T T T T
S D T T T T T T
B D T T T T T T
B D T T T T T T
B D T T T T T T
B D T T T T T T
C D T T T T T T
C D T T T T T T
C D T T T T T T
C D T T T T T T
F D T T T T T T
S D T T T T T T
C D A T A T A T
C D T T T T T T
C D T T T T T T
C D T T T T T T
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7
4.615 ms
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1 Frame
(Downlink - BTS transmit)
1 carrier = 200 kHz
F = FCCH
S = SCH
B = BCCH
C = PCH or
AGCH
D = SDCCH
A = SACCH
T = TCH
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D A I A I A I
R D T T T T T T
R D T T T T T T
R D T T T T T T
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7
4.615 ms
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1 Frame
(Uplink - Mobile transmit)
1 carrier = 200 kHz
R = RACH
A = SACCH
T = TCH
TS 0 TS 1 TS 2 TS 3 TS 4 TS 5 TS 6 TS 7
200 kHz
4.615 ms
0.577 ms
FCCH,
SCH,
BCCH
PCH,
RACH,
AGCH
SDCCH,
SACCH
CBCH
TCH,
SACCH
FACCH
TCH,
SACCH
FACCH
TCH,
SACCH
FACCH
TCH,
SACCH
FACCH
TCH,
SACCH
FACCH
TCH,
SACCH
FACCH
1 TDMA FRAME
3 TIMESLOT
3 * 0.577ms = 1.73ms
Downlink
Uplink
TCH UP-DOWNLINK OFFSET
3 TIMESLOT
3 * 0.577ms = 1.73ms
3 TIMESLOT
3 * 0.577ms = 1.73ms
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 75 6 7
….
…..
…...
…..
This means that the mobile does not transmit and receive at the same time.
Also note that :
in TS 0 : All the Logical Channels will repeat itself after 51 frames
in TS 1 : All the Logical Channels will repeat itself after 102 frames
in TS 2 to 7 : All the Logical Channels will repeat itself after 26 frames
MOBILE STATIONS ISDN NUMBER (MSISDN)
=> Is the mobile number used in a GSM PLMN (Public Land Mobile Network)
MSISDN = Country Code + National Destination Code + Subscriber number
e.x. 63 + 0918 + 8889999
Maximum length is 15 digits.
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
=> Is the subscriber number used over radio path for all signaling in the GSM PLMN.
This number is stored in SIM (Subscriber Identity Module), HLR (Home Location Register,
and VLR (Visitor Location Register).
IMSI = MCC + MNC + MSIN
= Mobile Country Code + Mobile Network Code + Mobile Identification Number
[ 3 digit ] [ 2 digit ] [ 11 digit ]
e.x. 502 + 19 + 2345451
TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
=> Is used for the subscriber's confidentiality. Since the TMSI has only local significance
(within MSC/VLR) the structure of the TMSI can be chosen by the Vendor.
But the size must be 1/2 of the size of IMSI. Each time a mobile request for location
updating or call setup, MSC/VLR allocates to the IMSI a new TMSI, so the TMSI
is used on the signaling path, protecting the IMSI identity. Plus since the TMSI is half
the size of IMSI, we can page twice the amount compared to IMSI.
LOCATION AREA IDENTITY (LAI)
=> Is used to uniquely identify each location area in the GSM PLMN. When the system
receives an incoming call it knows in which location area it should page the mobile
and does not page the entire network.
LAI = MCC + MNC + LAC
Mobile Country Code + Mobile Network Code + Location Area Code
[ 3 digit ] [ 2 digit ] [ 1 to 65 536 ]
e.x. = 502 + 20 + 60001
CELL GLOBAL IDENTITY (CGI)
=> Is used for cell identification within the GSM network.
LAI = MCC + MNC + LAC + CI
Mobile Country Code + Mobile Network Code + Location Area Code + Cell Identity
[ 3 digit ] [ 2 digit ] [ 1 to 65 536 ] [ 1 to 65 536 ]
e.x. = 502 + 20 + 60001 + 50001
BASE STATION IDENTITY CODE (BSIC)
=> Is used to distinguish co channel Frequency used in the neighboring cell.
BSIC = NCC + BCC
Network Color Code + Base Station Color Code
[ 1 to 7 ] [ 1 to 7 ]
SUBSCRIBER IDENTITY MODULE (SIM)
SIM is used to provide storage on subscriber related information as following :
• IMSI (International Mobile Subscriber Identity).
• Temporary network data like TMSI, LAI, Location update status.
• Subscriber Authentication Key (Ki) and Ciphering Key (Kc) which are used for security purposes.
• BCCH information : List of carrier frequencies to be used for cell selection.
• Forbidden PLMN.
• Language preference.
• PIN number (Personal Identification Number) and PIN error counter.
• PUK number (Personal Unlock Key) and PUK error counter.
PIN management
The PIN number consist of 4 to 8 digit and it is loaded by the service activator an subscription time. Afterwards
the PIN number can be changed as many times an user wishes including the length of the PIN number.
The user can disable the PIN function but again can be inhibited at subscription time by a authorized
person. If an incorrect PIN is entered, an indication is given to the user. After 3 consecutive entries
the SIM is blocked, even if if the SIM is removed or the mobile is switch off and on.
If the SIM card is blocked the user cannot access the network. The unblocking of the SIM card can only be
done by keying in the PUK (Personal Unlock Key). PUK is 8 digit and is given to the user at subscription
time. If an incorrect PUK is entered more than 10 times then the PUK will not work anymore and the
SIM card will continue to be blocked until taken to the mobile vendor service center.
GSM Channel Concept

More Related Content

What's hot

2G Optimization
2G Optimization2G Optimization
2G Optimization
Melika Poursamar
 
Gsm interview question
Gsm interview questionGsm interview question
Gsm interview question
Abhishek Pathak
 
2G Handover Details (Huawei)
2G Handover Details (Huawei)2G Handover Details (Huawei)
2G Handover Details (Huawei)
Md Mustafizur Rahman
 
gsm layer 3 messages
 gsm layer 3 messages gsm layer 3 messages
gsm layer 3 messages
Jorge Genes Forcadell
 
Drive testing in mobile networks
Drive testing in mobile networksDrive testing in mobile networks
Drive testing in mobile networks
Naveen Jakhar, I.T.S
 
GSM Location area update
GSM Location area updateGSM Location area update
GSM Location area update
Telebeansolutions
 
TEMS PARAMETERS
TEMS PARAMETERSTEMS PARAMETERS
TEMS PARAMETERS
Tempus Telcosys
 
Dt parameters
Dt parametersDt parameters
Dt parameterssangwa85
 
2G optimization_with_optima
2G optimization_with_optima2G optimization_with_optima
2G optimization_with_optima
ZIZI Yahia
 
Systesm information layer 3 messages
Systesm information layer 3 messagesSystesm information layer 3 messages
Systesm information layer 3 messages
Telebeansolutions
 
GSM RF Interview Q&A
GSM RF Interview Q&AGSM RF Interview Q&A
GSM RF Interview Q&A
Yayvo.com
 
Call Setup Success Rate Definition and Troubleshooting
Call Setup Success Rate Definition and Troubleshooting Call Setup Success Rate Definition and Troubleshooting
Call Setup Success Rate Definition and Troubleshooting
Assim Mubder
 
Radio network overview
Radio network overviewRadio network overview
Radio network overview
Md Mustafizur Rahman
 
Rf planning for lte using atoll v1
Rf planning for lte using atoll v1Rf planning for lte using atoll v1
Rf planning for lte using atoll v1
Muhammad Rizki
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
Mohd Nazir Shakeel
 
Training material umts cell selection and reselection
Training material umts cell selection and reselectionTraining material umts cell selection and reselection
Training material umts cell selection and reselection
tositoru
 

What's hot (20)

2G Optimization
2G Optimization2G Optimization
2G Optimization
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
 
TEMS PARAMETER (3G)
TEMS PARAMETER (3G)TEMS PARAMETER (3G)
TEMS PARAMETER (3G)
 
Gsm interview question
Gsm interview questionGsm interview question
Gsm interview question
 
2G Handover Details (Huawei)
2G Handover Details (Huawei)2G Handover Details (Huawei)
2G Handover Details (Huawei)
 
gsm layer 3 messages
 gsm layer 3 messages gsm layer 3 messages
gsm layer 3 messages
 
Drive testing in mobile networks
Drive testing in mobile networksDrive testing in mobile networks
Drive testing in mobile networks
 
GSM Location area update
GSM Location area updateGSM Location area update
GSM Location area update
 
TEMS PARAMETERS
TEMS PARAMETERSTEMS PARAMETERS
TEMS PARAMETERS
 
Dt parameters
Dt parametersDt parameters
Dt parameters
 
2G optimization_with_optima
2G optimization_with_optima2G optimization_with_optima
2G optimization_with_optima
 
Systesm information layer 3 messages
Systesm information layer 3 messagesSystesm information layer 3 messages
Systesm information layer 3 messages
 
Sdcch
SdcchSdcch
Sdcch
 
GSM RF Interview Q&A
GSM RF Interview Q&AGSM RF Interview Q&A
GSM RF Interview Q&A
 
Call Setup Success Rate Definition and Troubleshooting
Call Setup Success Rate Definition and Troubleshooting Call Setup Success Rate Definition and Troubleshooting
Call Setup Success Rate Definition and Troubleshooting
 
Radio network overview
Radio network overviewRadio network overview
Radio network overview
 
Rf planning for lte using atoll v1
Rf planning for lte using atoll v1Rf planning for lte using atoll v1
Rf planning for lte using atoll v1
 
Wcdma channels
Wcdma channels Wcdma channels
Wcdma channels
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
Training material umts cell selection and reselection
Training material umts cell selection and reselectionTraining material umts cell selection and reselection
Training material umts cell selection and reselection
 

Similar to GSM Channel Concept

BASIC GSM
BASIC GSMBASIC GSM
BASIC GSM
Tempus Telcosys
 
Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principlesSupper Mario
 
Channel
ChannelChannel
Channel
vishnu lamba
 
2 g
2 g2 g
2 g
Korirj
 
Gsm (3)
Gsm (3)Gsm (3)
Definitions gsm
Definitions gsmDefinitions gsm
Definitions gsm
Desmond Chewe
 
GSM Air Interface
GSM Air InterfaceGSM Air Interface
GSM Air Interface
Ahmed Khaled
 
Gsm By Aziz
Gsm By AzizGsm By Aziz
Gsm By Aziz
Aziz Zoaib
 
39540950 gsm-ion-course-130814024028-phpapp01
39540950 gsm-ion-course-130814024028-phpapp0139540950 gsm-ion-course-130814024028-phpapp01
39540950 gsm-ion-course-130814024028-phpapp01
Ahlem DRIRA
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
Naveen Jakhar, I.T.S
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
Yubraj C.
 
6 Weeks Industrial Training In Telecom In Chandigarh
6 Weeks Industrial Training In Telecom In Chandigarh6 Weeks Industrial Training In Telecom In Chandigarh
6 Weeks Industrial Training In Telecom In ChandigarhArcadian Learning
 
02 channel concept
02 channel concept02 channel concept
02 channel concept
Tempus Telcosys
 
Sdcch 12704657711474-phpapp02
Sdcch 12704657711474-phpapp02Sdcch 12704657711474-phpapp02
Sdcch 12704657711474-phpapp02
Tapiwa Munetsi
 
Skg gsm channel concept ; call processing
Skg gsm channel concept ; call processingSkg gsm channel concept ; call processing
Skg gsm channel concept ; call processing
Saroj Kumar Gochhayat
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
Pawan Kumar
 
GSM FRAME STRUCTURE.pptx
GSM FRAME STRUCTURE.pptxGSM FRAME STRUCTURE.pptx
GSM FRAME STRUCTURE.pptx
Rasufsd
 
SDCCH channel.ppt
SDCCH channel.pptSDCCH channel.ppt
SDCCH channel.ppt
VahidZibakalam3
 

Similar to GSM Channel Concept (20)

BASIC GSM
BASIC GSMBASIC GSM
BASIC GSM
 
Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principles
 
Channel
ChannelChannel
Channel
 
2 g
2 g2 g
2 g
 
Gsm (3)
Gsm (3)Gsm (3)
Gsm (3)
 
Gsm basics
Gsm basicsGsm basics
Gsm basics
 
Definitions gsm
Definitions gsmDefinitions gsm
Definitions gsm
 
GSM Air Interface
GSM Air InterfaceGSM Air Interface
GSM Air Interface
 
Gsm By Aziz
Gsm By AzizGsm By Aziz
Gsm By Aziz
 
39540950 gsm-ion-course-130814024028-phpapp01
39540950 gsm-ion-course-130814024028-phpapp0139540950 gsm-ion-course-130814024028-phpapp01
39540950 gsm-ion-course-130814024028-phpapp01
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
 
6 Weeks Industrial Training In Telecom In Chandigarh
6 Weeks Industrial Training In Telecom In Chandigarh6 Weeks Industrial Training In Telecom In Chandigarh
6 Weeks Industrial Training In Telecom In Chandigarh
 
02 channel concept
02 channel concept02 channel concept
02 channel concept
 
Ch3 air interface
Ch3 air interfaceCh3 air interface
Ch3 air interface
 
Sdcch 12704657711474-phpapp02
Sdcch 12704657711474-phpapp02Sdcch 12704657711474-phpapp02
Sdcch 12704657711474-phpapp02
 
Skg gsm channel concept ; call processing
Skg gsm channel concept ; call processingSkg gsm channel concept ; call processing
Skg gsm channel concept ; call processing
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
 
GSM FRAME STRUCTURE.pptx
GSM FRAME STRUCTURE.pptxGSM FRAME STRUCTURE.pptx
GSM FRAME STRUCTURE.pptx
 
SDCCH channel.ppt
SDCCH channel.pptSDCCH channel.ppt
SDCCH channel.ppt
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

GSM Channel Concept

  • 1. GSM Channel Concept Md Mustafizur Rahman RNPO Engineer Grameenphone Ltd.
  • 2. AIR INTERFACE Frequency Allocation Radio Channel DOWNLINK 935 - 960 MHz 1805-1880 MHz UPLINK 890-915 MHz 1710-1785 MHz Air Interface Cell Site Mobile
  • 3.
  • 4.
  • 5.
  • 6. GSM: TRX/TDMA Frame 25 MHZ: 890 to 915 MHz (UL) 935 to 960 MHz (DL) Channel 1 200kHz Channel 2 200kHz Channel 124 200kHz Time Slot 0 Time Slot 1 Time Slot 7 TDMA Frame (4.616 ms) 57 bits (interleaved sub block) from a 20ms Voice frame 26 bit TSC for error prediction 57 bits (interleaved sub block ) from another 20ms Voice frame 3 tail bits 3 tail bits 1 bit flag 1 bit flag 148+8.25=156.25 bits 8.25 guard bits Frequency band Channels TRX/TS TS/bit stream 1800MHz Band : 1710-1785MHz(UL) 1805-1880MHz(DL) Total no. of Channel is 374. 1TS=0.577ms 1bit=3.69ms
  • 7.
  • 8.
  • 10.
  • 11. 11 3 Broadcast Channels 1) FCCH 2) SCH 3) BCCH 3 Common Control Channels 1) PCH 2) RACH 3) AGCH 3 Dedicated Control Channels 1) SDCCH 2) SACCH 3) FACCH TCH CBCH LOGICAL CHANNELS
  • 12.
  • 13. Full rate => Used for speech at 13 Kbits/s or sending data at 9.6 Kbits/s Half rate => Used for speech at 6.5 Kbits/s or sending data at 4.8 Kbits/s Enhanced Full rate => Used for speech at 13 Kbits/s or sending data at 9.6 Kbits/s but with almost Land line quality TCH = TRAFFIC CHANNEL
  • 14.
  • 15.
  • 16.
  • 17. FCCH = FREQUENCY CORRECTION CHANNEL (Downlink only) •To tell the Mobile that this is the BCCH carrier •To able the Mobile to synchronize to the frequency •bursts only containing zeroes are transmitted. SCH = SYNCHRONISATION CHANNEL (Downlink only) •Used for sending BSIC (Base station Identity Code) •Give TDMA frame number to the Mobile BCCH = BROADCAST CONTROL CHANNEL (Downlink only) •Used for sending information to the mobile like- •CGI (Cell Global identity) •LAI (Location Area Identity) •BCCH carriers of the neighboring cells •maximum output power allowed in the cell •Other broadcast messages like barred cell BROADCAST CHANNELS
  • 18. PCH = PAGING CHANNEL => Used for paging the Mobile. (Downlink only) Reason could be an incoming call or an incoming Short Message. RACH = RANDOM ACCESS CHANNEL => Used for responding to the paging (terminating), Location updating or to make call access (originating) by asking for a signaling channel. (Uplink only) AGCH = ACCESS GRANT CHANNEL => Used to allocate SDCCH to the mobile. (Downlink only) COMMON CONTROL CHANNELS
  • 19. SDCCH = STAND ALONE DEDICATED CONTROL CHANNEL => Used for allocating voice channel (TCH) to the mobile (call setup) and Location updating. => Send Short Text message to Idle Mobile (Uplink & Downlink) SACCH = SLOW ASSOCIATED CONTROL CHANNEL => Used for sending information to the mobile like CGI (Cell Global identity), LAI (Location Area Identity), BCCH of all the neighbors and TA (Timing Advance) => Send Short Text message to Busy Mobile (Downlink => Used for sending signal strength & bit error rate measurement of the serving cell and signal strength of the BCCHs of the neighboring cells. (Uplink) FACCH = FAST ASSOCIATED CONTROL CHANNEL => Used for handover. (Uplink & Downlink) DEDICATED CONTROL CHANNELS
  • 20. => SMS messages are short TEXT messages up to 160 characters in length that you can send or receive. The messages are not sent straight to the other mobile but is sent to message centre operated by the Network provider. => If the mobile was switched off or is at outside of the coverage area, the message is stored in the Message Service Center. The message will be offered to the subscriber when the mobile is switched on again or has reentered the coverage area again. => If the mobile is in the Idle mode the short message will be send through the SDCCH. If the mobile is Busy the short message will send through the SACCH. CBCH = CELL BROADCAST CHANNEL => Used for sending short messages to all the mobiles within a geographic area. Typical example is Traffic congestion in a major road or a major accident in an area. Up to 93 characters can be sent. => If the mobile is in the Idle mode then the short message will be send through the CBCH. If the mobile is Busy, it will not be sent. NOT TO BE CONFUSED WITH SMS !!!!!!!! (SHORT MESSAGE SERVICE)
  • 21. 21 Channel combinations The following combinations of logical channel types are allowed for the radio timeslots and specified by GSM (Rec. 05.02): a) TCH/F + FACCH/F + SACCH/TF b) TCH/H + FACCH/H + SACCH/TH c) SDCCH/8 + SACCH/C8 d) FCCH + SCH + BCCH + CCCH (TS 0)-Uncombined e) FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/C4 (TS 0)-combined f) BCCH + CCCH g) SDCCH/8 + SACCH/8 + CBCH h) FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/C4 + CBCH (TS 0) ***A "+" indicates that the channels are used simultaneously.
  • 22. 22 a) TCH/F + FACCH/F + SACCH/TF T-TCH/FACCH A-SACCH
  • 23.
  • 24. 24 b) TCH/H + FACCH/H + SACCH/TH
  • 25. 25 c) SDCCH/8 + SACCH/C8 Note that the uplink and downlink patterns are time shifted, so that SDCCH subchannel 0 is sent in frames 0-3 on downlink and in frames 15-18 on uplink. The reason for this is to achieve more efficient communication, by giving the MS time to calculate its answers to the requests received on downlink SDCCH.
  • 26. 26 d) FCCH + SCH + BCCH + CCCH (TS 0)-Uncombined F (FCCH) Frequency Correction Channel, S (SCH) Synchronization Channel, B (BCCH - Norm) Broadcast Control Channel, C (CCCH) Common Control CHannel: Paging CHannel(PCH) or Access Grant CHannel (AGCH), I Idle
  • 27.
  • 28.
  • 29. F D T T T T T T S D T T T T T T B D T T T T T T B D T T T T T T B D T T T T T T B D T T T T T T C D T T T T T T C D T T T T T T C D T T T T T T C D T T T T T T F D T T T T T T S D T T T T T T C D A T A T A T C D T T T T T T C D T T T T T T C D T T T T T T TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 4.615 ms . . . . . . . . . . . . . . . . . . . . . . . . 1 Frame (Downlink - BTS transmit) 1 carrier = 200 kHz F = FCCH S = SCH B = BCCH C = PCH or AGCH D = SDCCH A = SACCH T = TCH R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D T T T T T T R D A I A I A I R D T T T T T T R D T T T T T T R D T T T T T T TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 4.615 ms . . . . . . . . . . . . . . . . . . . . . . . . 1 Frame (Uplink - Mobile transmit) 1 carrier = 200 kHz R = RACH A = SACCH T = TCH
  • 30. TS 0 TS 1 TS 2 TS 3 TS 4 TS 5 TS 6 TS 7 200 kHz 4.615 ms 0.577 ms FCCH, SCH, BCCH PCH, RACH, AGCH SDCCH, SACCH CBCH TCH, SACCH FACCH TCH, SACCH FACCH TCH, SACCH FACCH TCH, SACCH FACCH TCH, SACCH FACCH TCH, SACCH FACCH 1 TDMA FRAME
  • 31. 3 TIMESLOT 3 * 0.577ms = 1.73ms Downlink Uplink TCH UP-DOWNLINK OFFSET 3 TIMESLOT 3 * 0.577ms = 1.73ms 3 TIMESLOT 3 * 0.577ms = 1.73ms 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 75 6 7 …. ….. …... ….. This means that the mobile does not transmit and receive at the same time. Also note that : in TS 0 : All the Logical Channels will repeat itself after 51 frames in TS 1 : All the Logical Channels will repeat itself after 102 frames in TS 2 to 7 : All the Logical Channels will repeat itself after 26 frames
  • 32. MOBILE STATIONS ISDN NUMBER (MSISDN) => Is the mobile number used in a GSM PLMN (Public Land Mobile Network) MSISDN = Country Code + National Destination Code + Subscriber number e.x. 63 + 0918 + 8889999 Maximum length is 15 digits. INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI) => Is the subscriber number used over radio path for all signaling in the GSM PLMN. This number is stored in SIM (Subscriber Identity Module), HLR (Home Location Register, and VLR (Visitor Location Register). IMSI = MCC + MNC + MSIN = Mobile Country Code + Mobile Network Code + Mobile Identification Number [ 3 digit ] [ 2 digit ] [ 11 digit ] e.x. 502 + 19 + 2345451 TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI) => Is used for the subscriber's confidentiality. Since the TMSI has only local significance (within MSC/VLR) the structure of the TMSI can be chosen by the Vendor. But the size must be 1/2 of the size of IMSI. Each time a mobile request for location updating or call setup, MSC/VLR allocates to the IMSI a new TMSI, so the TMSI is used on the signaling path, protecting the IMSI identity. Plus since the TMSI is half the size of IMSI, we can page twice the amount compared to IMSI.
  • 33. LOCATION AREA IDENTITY (LAI) => Is used to uniquely identify each location area in the GSM PLMN. When the system receives an incoming call it knows in which location area it should page the mobile and does not page the entire network. LAI = MCC + MNC + LAC Mobile Country Code + Mobile Network Code + Location Area Code [ 3 digit ] [ 2 digit ] [ 1 to 65 536 ] e.x. = 502 + 20 + 60001 CELL GLOBAL IDENTITY (CGI) => Is used for cell identification within the GSM network. LAI = MCC + MNC + LAC + CI Mobile Country Code + Mobile Network Code + Location Area Code + Cell Identity [ 3 digit ] [ 2 digit ] [ 1 to 65 536 ] [ 1 to 65 536 ] e.x. = 502 + 20 + 60001 + 50001 BASE STATION IDENTITY CODE (BSIC) => Is used to distinguish co channel Frequency used in the neighboring cell. BSIC = NCC + BCC Network Color Code + Base Station Color Code [ 1 to 7 ] [ 1 to 7 ]
  • 34. SUBSCRIBER IDENTITY MODULE (SIM) SIM is used to provide storage on subscriber related information as following : • IMSI (International Mobile Subscriber Identity). • Temporary network data like TMSI, LAI, Location update status. • Subscriber Authentication Key (Ki) and Ciphering Key (Kc) which are used for security purposes. • BCCH information : List of carrier frequencies to be used for cell selection. • Forbidden PLMN. • Language preference. • PIN number (Personal Identification Number) and PIN error counter. • PUK number (Personal Unlock Key) and PUK error counter. PIN management The PIN number consist of 4 to 8 digit and it is loaded by the service activator an subscription time. Afterwards the PIN number can be changed as many times an user wishes including the length of the PIN number. The user can disable the PIN function but again can be inhibited at subscription time by a authorized person. If an incorrect PIN is entered, an indication is given to the user. After 3 consecutive entries the SIM is blocked, even if if the SIM is removed or the mobile is switch off and on. If the SIM card is blocked the user cannot access the network. The unblocking of the SIM card can only be done by keying in the PUK (Personal Unlock Key). PUK is 8 digit and is given to the user at subscription time. If an incorrect PUK is entered more than 10 times then the PUK will not work anymore and the SIM card will continue to be blocked until taken to the mobile vendor service center.