The document discusses GSM architecture and frequency planning. It describes the key components of GSM including the base station subsystem (BSS) with base transceiver stations (BTS) and base station controllers (BSC), and the network switching subsystem (NSS) with mobile switching centers (MSC). It also covers GSM frequency bands and channel allocation using frequency reuse patterns like 4/12 layout to maximize capacity while minimizing interference between cells. Sectorization is discussed as a way to increase capacity by splitting each cell site into multiple sectors.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
Drive Tests and Propagation Prediction software are the two methods that are used to check the coverage area of a particular wireless system. Generally prediction software is used in conjunction with the radio signal measurements in order to determine an accurate picture of signal propagation. In some cases, field measurements may be needed to be taken in order to calibrate the prediction software.
Obra realizada polo departamento de Turismo do Concello de Dumbría en colaboración coa familia do Señor Pepe e as guías de turismo do Concello.
Nel explícase a ruta levada a cabo cos turistas, pero seguindo as historias que nos transmitíu o Señor Pepe, así como os nomes antigos de cada un dos puntos do roteiro. Nel tamén se fala un pouco da vida do señor Pepe e están plasmadas as súas poesías.
Drive Tests and Propagation Prediction software are the two methods that are used to check the coverage area of a particular wireless system. Generally prediction software is used in conjunction with the radio signal measurements in order to determine an accurate picture of signal propagation. In some cases, field measurements may be needed to be taken in order to calibrate the prediction software.
Obra realizada polo departamento de Turismo do Concello de Dumbría en colaboración coa familia do Señor Pepe e as guías de turismo do Concello.
Nel explícase a ruta levada a cabo cos turistas, pero seguindo as historias que nos transmitíu o Señor Pepe, así como os nomes antigos de cada un dos puntos do roteiro. Nel tamén se fala un pouco da vida do señor Pepe e están plasmadas as súas poesías.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Enabling embedded security for the Internet of Thingsteam-WIBU
Innovators, manufacturers, and economists agree on one crucial vision for our future: Industry 4.0 is a huge potential for value creation waiting to be tapped. The payoff is enormous: third party sources predict that global investment in the industrial Internet of Things will reach USD 500 billion by 2020, a 2,500 percent increase from the USD 20 billion spent in 2012.
The pervasive connectivity of the Internet of Things (IoT) exposes embedded devices to more security risks than ever before. As a result, safeguarding devices, data, and intellectual property becomes a key requirement embedded device manufacturers must meet to succeed in IoT.
The strategic partnership between Wind River® and Wibu-Systems aims at offering modern techniques to tackle the security risks associated with vulnerabilities of interconnected cyber-physical systems. Together, we have developed a scalable protection and licensing system for VxWorks-based applications that grows along with your needs.
Learn:
• Ways to protect connected embedded devices, data, and intellectual property in the Internet of Things
• Software-based security features delivered by the VxWorks® 7 Real-Time Operating System together with Security Profile for VxWorks
• Complementary hardware-based CodeMeter® Security solution by Wibu-Systems
• Benefits of a joint integrated solution featuring software- and hardware-based security for security-sensitive applications.
Watch the webinar: https://youtu.be/NrZrAs9uOEQ
********************************
Request CodeMeter SDK and try out Wibu-Systems' premier technology for yourself
http://www.wibu.com/cm
********************************
Introduction to Radar, Radar classification, The simple form of the Radar equation, Radar block diagram and operation, The Doppler Effect, Simple CW Radar Block Diagram, Block diagram of CW doppler radar with nonzero IF receiver, Applications of CW radar, Block Diagram of Frequency Modulated CW Radar
radar range equation
Fundamental of Radio Frequency communications.pptginanjaradi2
Fundamentals of Radio Frequency (RF) communications encompass the principles and techniques used to transmit and receive information wirelessly using electromagnetic waves within the radio frequency spectrum. Here's a breakdown of the key components:
1. **Electromagnetic Spectrum**: RF communications utilize a portion of the electromagnetic spectrum. This spectrum ranges from low frequencies used for power transmission to high frequencies used in technologies like microwaves and beyond. RF typically occupies the frequency range from about 3 kHz to 300 GHz.
2. **Modulation**: Modulation is the process of impressing information onto a radio wave by varying one or more of its properties such as amplitude, frequency, or phase. Common modulation techniques include Amplitude Modulation (AM), Frequency Modulation (FM), and Phase Modulation (PM).
3. **Transmitters**: Transmitters generate radio frequency signals carrying the information to be transmitted. They typically consist of an oscillator to produce the carrier frequency, modulation circuitry to impress the information onto the carrier, and amplifiers to boost the signal for transmission.
4. **Receivers**: Receivers capture radio frequency signals, extract the desired information, and convert it into a usable form. Receivers include components such as antennas to capture the incoming signal, amplifiers to boost weak signals, demodulators to extract the information from the carrier, and filters to remove unwanted noise and interference.
5. **Antennas**: Antennas are crucial components for both transmitting and receiving RF signals. They convert electrical signals into electromagnetic waves for transmission and vice versa for reception. Antennas come in various designs optimized for different applications, such as dipole antennas, patch antennas, and parabolic antennas.
6. **Propagation**: RF signals propagate through the atmosphere, and their behavior is influenced by factors such as frequency, distance, terrain, and environmental conditions. Understanding propagation characteristics is essential for designing efficient communication systems.
7. **Propagation Models**: Propagation models describe how RF signals propagate in different environments. These models help engineers predict signal strength, coverage areas, and potential sources of interference. Common models include free-space path loss, multipath fading, and terrain-based models.
8. **Spectrum Management**: Since the radio frequency spectrum is a finite and shared resource, its allocation and usage are regulated by government agencies such as the Federal Communications Commission (FCC) in the United States. Spectrum management involves allocating frequency bands to different users, enforcing regulations to prevent interference, and promoting efficient spectrum utilization.
9. **Applications**: RF communications find applications in various fields, including broadcasting, telecommunications, wireless networking.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
4. GSM Frequency Spectrum
1] GSM 900
1] GSM 900
Uplink
Uplink : 890 MHz to 915 MHz
: 890 MHz to 915 MHz
GSM Spectrum
Downlink : 935 MHz to 960 MHz
Downlink : 935 MHz to 960 MHz
ARFCN
ARFCN : 124
: 124
2] EGSM 900
2] EGSM 900
Uplink
Uplink : 880 MHz to 915 MHz
: 880 MHz to 915 MHz 3] GSM 1800 (DCS 1800)
3] GSM 1800 (DCS 1800)
Downlink : 925 MHz to 960 MHz
Downlink : 925 MHz to 960 MHz Uplink
Uplink : 1710 MHz to 1795 MHz
: 1710 MHz to 1795 MHz
ARFCNs : 174
ARFCNs : 174 Downlink : 1805 MHz to 1880 MHz
Downlink : 1805 MHz to 1880 MHz
ARFCNs : 374
ARFCNs : 374
Absolute Radio Frequency Channels : 4] PCS 1900
4] PCS 1900
BW - 200 KHz, TDMA Slots - 8 Uplink
Uplink : 1850 MHz to 1910 MHz
: 1850 MHz to 1910 MHz
Downlink : 1930 MHz to 1990 MHz
Downlink : 1930 MHz to 1990 MHz
ARFCNs : 299
ARFCNs : 299 GGRajan
5. GSM Frequency Spectrum
GSM Spectrum [900 MHz]
Time
Code
• UL band : 890 - 915 MHz
• DL band : 935 - 960 MHz TS-8
• Duplex spacing: 45 MHz
A
FDMA structure: 124 RFs (ARFCN) TS-2
M
•
TD
TS-1
• RF Band width: 200 KHz
Freq
• TDMA structure: 8 Timeslots/ RF RF-1 RF-2 RF-3
FDMA
960 Mhz
124
•
•
RF • 1 2 3 4 5 6 7 8
•
2 TDMA structure of each ARFCN
1
935 Mhz
GGRajan
6. GSM Frequency Spectrum
B
T
S
890 MHz 915 MHz 935 MHz 960 MHz
1 2 3 124 1 2 3 124
UPLINK FREQUENCY DOWNLINK FREQUENCY
GGRajan
7. Cell Principles
CELL : a Base Station
(Transmitter) having number
of RF channels. Usually a
Hexagonal shape.
2
7 3
CLUSTER: Group of cells. 1
Size > 3, 4, 7, 9 or 12 6 4
5
GGRajan
8. Cell Principles
COVERAGE AREA
Each Cell covers a
limited number of
- 70 dBm Mobile Subs within the
Cell boundaries.
- 80 dBm
- 90 dBm
- 100 dBm
GGRajan
9. Cell Principles
CELL RADIUS : Radial distance of a Cell
Approximately : 25 KMs ( Start up )
1 KM ( Mature )
CELL SIZE :
Large Cells are employed in:
Remote areas
Coastal regions
Areas with few subscribers
Small cells are used in:
Urban areas
Areas with high subscriber density
GGRajan
10. Cell Principles
Frequency Reuse
GSM has 124 frequencies for use in network
Allocated to more than one network operator
If 4 operators, then each will get only 31 frequencies
Maximum cell radius is approximately 35 KMs
Network provider must re-use the same frequencies
2
7 3
Q = D/R = 3N (if all cells
1
with same Radius) R
6 4
N - Cluster size, R - Cell Radius
D - Distance between two co-channels 5 D
High Q > Less interference – Less Traffic capacity 1
Low Q > Higher interference – Higher capacity
GGRajan
11. Cell Sectorisation
Omni Antenna 3 Sectored Cell Site 6 Sectored Cell Site
F2
1 1
6 2
3 F1
5 3
2
4
F3
Sectorisation splits a single site into a number of cells
Each sector cell has TX and RX antennas
Each sector behaves as an independent cell
GSM = 4/12 : 4 Cell Sites, each with 3 Sectors
DAMPS = 7/21 : 7 Cell Sites, each with 3 Sectors
CDMA = 1/3 : 1 Cell Site, each with 3 Sectors
GGRajan
17. GSM Architecture
GSM SYSTEM
Base Station Switching OMC /NMC
Subsystem Subsystem Subsystem
Base Station Mobile Switching
Controller (BSC) Centre (MSC)
Base Transceiver Registers AUC
Station (BTS) HLR
VLR
EIR
GGRajan
18. GSM Architecture
NSS
MSC/VLR
BSS Architecture
BSC BSC
Abis
BTS
BTS
BTS
BTS
MS
MS MS
MS
GGRajan
19. GSM Architecture
BTS: Base Transceiver Station
NSS Architecture BSC: Base Station Controller
MSC: Mobile Switching Center
PSTN
PSTN VLR: Visiting Location Register
HLR: Home Location Register
GMSC NSS IWF: InterWorking Function
HLR /
AuC
SS7
SS7
VLR STP
MSC EIR
CSE
IWF
SM-SC MSC / VLR
VMS Internet
Internet
BSS BSC
BTS BTS
MS GGRajan
20. GSM Architecture
BTS Functions
◄Encodes, Encrypts, Multiplexes, Modulates and
feeds RF to Antenna
◄Received signals is Decoded, Decrypted and
Demodulate
◄Trans-coding and Rate Adoption Functionality
◄11 power classes from .01 watts (Micro cell) to 320
watts
◄Frequency hopping
NOKIA BTS
◄Up-link radio channel measurements
◄Multiple Antennas for Diversity
LUCENT BTS
GGRajan
21. GSM Architecture
BSC Functions
Allocation of radio
channels
Receives MS
measurements
Inter-cell handovers
from BTS to BTS
Concentrator for low
capacity BTSs
Reduce the number
of connections to MSC
Data stored in BSC
►Carrier frequencies
►Frequency hopping lists
►Power reduction levels
►Levels for cell border calculation
GGRajan
22. GSM Architecture
MSC Functions
Paging, specifically call handling
Dynamic allocation of resources in coordination with BSS
Location registration
Handover management
Billing for all subscribers based in its area
Reallocation of frequencies to BTSs to meet heavy demands
Signaling interface to databases like HLR, VLR.
Gateway to SMS between SMS centers and subscribers
Handle inter working function while working as GMSC
GGRajan
23. GSM Architecture
Visitor Location Register
IMSI & TMSI
IMSI & TMSI MSISDN
MSISDN
VLR Data MSRN
MSRN Location Area
Location Area
MS category
MS category Authentication Key
Authentication Key
Main task of VLR is to reduce the number of queries to HLR
Controls those mobiles Roaming in its area.
One VLR may be in-charge of one or more LA.
VLR gets updated from HLR, whenever a new MS enters its area.
Authentication along with HLR and AUC.
Relays ciphering key from HLR to BSS.
Assign TMSI and periodically changes to secure MS’s identity.
IMSI detach and attach operation
GGRajan
24. GSM Architecture
Home Location Register
►Stores
►Stores MS
MS Parameters,
Parameters, Numbers,
Numbers,
Authentication & Encryption values.
Authentication & Encryption values.
►Current MS status and associated VLR.
►Current MS status and associated VLR.
►One PLMN may contain one or several HLR.
►One PLMN may contain one or several HLR.
Authentication Centre
►Protect against intruders in air interface
►Protect against intruders in air interface
►Authentication (Ki) and Ciphering (Kc) keys stored
►Authentication (Ki) and Ciphering (Kc) keys stored
securely
securely
►Cipher key changes randomly with each phone call
►Cipher key changes randomly with each phone call
►A separate entity and physically included in HLR
►A separate entity and physically included in HLR
GGRajan
25. GSM Architecture
Equipment Identity Register
Stores IMEI for all registered MS and is unique to every MS.
Only one EIR per PLMN.
White list : IMEI, assigned to valid MS.
Black list : IMEI reported stolen
Gray list : IMEI having problems like faulty software,
wrong make of equipment etc.
GGRajan
26. SIM Anatomy
SIM
(Subscriber Identification Module)
A removable card.
Contains an IC chip with a microprocessor.
Contains RAM and ROM.
It is inserted in ME at the time of making or receiving a call.
GGRajan
27. SIM Anatomy
Programs in SIM
1 . IMSI (International Mobile Station Identity)
2 . Ki (Individual Subscriber authentication Key)
3 . A3 (Authentication Algorithm )
4 . A8 [ Cipher Key (Kc) Algorithm ]
IMSI
Ki
5 . A5 (Encryption Algorithm ) A3
A8
• IMSI & Ki are specific to each MS A5
• A3 & A8 can be different for different operators
• A5 - Unique, used across GSM operators
GGRajan
28. SIM Anatomy
SIM Authentication Process
VLR
IMSI
RAND
RAND
Ki Ki Ki Ki
A3 A8 A3 A8
Kc Kc
SRES SRES
SIM in MS NET WORK
GGRajan
29. SIM Anatomy
MSISDN
Numbering for Cellular Mobile Network
ACCESS MSC CODE MOBILE
CODE NUMBER
2-digit 3-digit 5-digit
98/94 etc. ABC XXXXX
GGRajan
31. Physical & Logical Channels
Traffic & Control Channels
TDMA Frames
Super & Hyper Frames
GGRajan
32. GSM Channels
Physical Channels
GSM RF carrier can support up to 8 MS simultaneously
Each MS occupy 1 Time Slot
Information carried in TS is “BURST”
Each TS carrying Burst is a “Physical Channel”
8 Time Slots forms 1 TDMA Frame
GGRajan
33. GSM Channels
Logical Channels
One or more logical channels are transmitted on a Physical channel.
Determined by the information transmitted over it.
Types of Logical Channels
Logical Channels
Logical Channels
Traffic Channels Control Channels
Broadcast
Common Control
Dedicated Control
GGRajan
34. GSM Channels
Traffic Channels on Air Interface
TCH (Traffic Channel)
TCH (Traffic Channel)
NB NB
SPEECH
SPEECH DATA
DATA
TCH/FS
TCH/FS TCH/HS
TCH/HS TCH/9.6
TCH/9.6 TCH/2.4
TCH/2.4
TCH/EFR
TCH/EFR TCH/4.8
TCH/4.8
SACCH
SACCH
NB:
NB: Normal Burst
Normal Burst
TCH
TCH SACCH: Slow Associated Control Chl.
SACCH: Slow Associated Control Chl.
FACCH: Fast Associated Control Chl.
FACCH: Fast Associated Control Chl.
FACCH
FACCH
GGRajan
35. GSM Channels
Traffic channel Types
Traffic channels are used to send Speech or Data services.
May also be used for sending information.
Example: call forwarding and short messages
Traffic channel Types based on transmission rates
TCH/FS (Full rate Speech) - gross bit rate of 22.8 kbps
TCH/HS (Half rate Speech) - gross bit rate of 11.4 kbps
GGRajan
37. GSM Channels
BCCH
Broadcast Control Channel
Parameters, LAI, CI, Neighbor Cells, Frequencies used in cell etc
are transmitted to MS.
FCCH
(Frequency Correction Channel)
BCCH-
BCCH-
FCCH transmits a constant frequency Downlink Only
Downlink Only
shift of the RF carrier that can be used NB/DB
by the MS for frequency correction. BCCH SYNC. CHLS.
BCCH SYNC. CHLS.
SB FB
SCH SCH
SCH FCCH
FCCH
Synchronization Channel
SCH is used to time synchronize the MSs,
carries TDMA frame number and BSIC
(Base Station Identity Code).
GGRajan
38. GSM Channels
CCCH Types
RACH
Used in uplink by MSs for requesting
a channel for a connection.
CCCH
CCCH
CBCH
AB NB
Used for the transmission of Short
RACH
RACH CBCH
CBCH
Messages as broadcast messages to Uplink
Uplink Downlink
Downlink
all MSs.
PCH PCH/AGCH
PCH/AGCH
Downlink
Downlink
Used in Down link by BTS to page
IMSI, TMSI or IMEI to the MS.
AGCH
Used in downlink to allot DCCH, if MS
requested via RACH.
GGRajan
39. GSM Channels
DCCH
DCCH
DCCH
Dedicated Control CHannel SDCCH ACCH
SDCCH ACCH
Fully duplex, Point to Point channels. FACCH SACCH
FACCH SACCH
Used for signaling between BTS and a certain MS.
Assigned to a single MS for call setup & subs. validation.
DCCH, a single TS on an RF carrier used to convey 8 SDCCHs.
SDCCH
Stand-alone Dedicated Control Channel
A duplex channel which is always allocated to a TCH or SDCCH.
Used for transmission of signaling data, radio link supervision
measurements, TX power control and timing advance data.
GGRajan
40. GSM Channels
ACCH ACCH
ACCH
Associated Control Channel
Can be associated with either SDCCH or TCH. FACCH SACCH
FACCH SACCH
Used for carrying information associated with the process being
carried out on either SDCCH or the TCH.
SACCH
Slow Associated Control CHannel
Conveys power control & timing information in downlink.
SACCH is used for non urgent procedures.
FACCH
Fast Associated Control Channel
Used for handovers, assignments, for call set-up and release.
GGRajan
42. GSM Frames
TDMA Multi Frame
26-TDMA multi-frame
Succession of 26 TDMA frames, and corresponds to the 26 x 8 BP
or 120 ms.
51-TDMA multi-frame
Succession of 51 TDMA frames, and corresponds to the 51 x 8 BP
cycle.
Superframe
Sccession of 51 x 26 TDMA frames (6.12 sec).
Hyperframe
Numbering period, 2048 x 51 x 26 x 8 Broadcast Period long, or 3
hours, 28 minutes, 53 seconds and 760 milliseconds.
GGRajan
49. Mobile Call Phases
Phases of Mobile Originated Call
/ Setup phase.
/ Ringing phase.
/ Conversation phase.
/ Release phase.
Phases of Mobile Terminated Call
Routing analysis
Paging.
Call setup.
Call release.
GGRajan
50. GSM Call flow
Base Station Subsystem BSC-1 Voice Call
Switching Centre
HLR
VLR
VLR
MSC
AUC
AUC
EIR
EIR
FIBER LINK
BTS-1
NK
LI
W
M
BTS-2
BTS-1 BSC-2 PSTN
BTS contains TX and RX
BSC Manages Radio resources, Radio channels
and Local connection management GGRajan
51. GSM Call flow
Circuit-Switched Data Call
Public
Switched
Telephone
Network
HLR
MS
MSC /
BSC VLR
BTS Wireless
Network
Internet
IWF
MS
GGRajan
52. Handover Management
Mobile Hand-off
Signal Strength
Handoff Zone
B
B T
T S
S
Distance
GGRajan
53. Handover Management
Four types of handovers in GSM
..Channels (TS) in the same Cell
Channels (TS) in the same Cell (Intra-BTS)
(Intra-BTS)
..Cells under the control of same BSC
Cells under the control of same BSC (Inter-BTS)
(Inter-BTS)
..Cells under the control of different BSCs
Cells under the control of different BSCs (Intra-MSC)
(Intra-MSC)
..Cells under the control of different MSCs
Cells under the control of different MSCs (Inter-MSC)
(Inter-MSC)
GGRajan
54. Handover Management
MSC MSC
BSC BSC BSC
LAI-B
LAI-A
Inter MSC hand Off Intra BSC handoff
Inter BSC hand Off
GGRajan
55. Handover Management
BSC MSCVLR
BTS-A
HLR
BTS-B BSC MSC VLR
•BSC-A informs MSC-A that MS needs handover from BTS-A to BTS-B
•MSC-A informs MSC-B that a handover from BTS-A to BTS-B is underway
•MSC-A commands BSC/BTS-A to proceed with handover to BTS-B. Hanover
from BTS-A to BTS-B is underway
•BTS-A commands MS to change to a specified channel on BTS-B
•BTS-B informs BSC/MSC that hand over is complete
• MSC-B informs the old MSC-A that hand over to BTS-B is complete
GGRajan
56. General Packet Radio Service (GPRS)
Enhanced Data rate for GSM Evolution (EDGE)
GGRajan
57. What is GPRS ?
/ GPRS is a new bearer service for GSM
/ Packet Data Network (PDN) to the Internet.
GPRS benefit from shorter access times and higher data rates.
“online” over a long period of time, but billed for data volume.
GPRS improves the utilization of the radio resources,
Offers volume-based billing,
Higher data transfer rates,
Shorter access times,
Simplifies the access to packet data networks.
GPRS includes GSNs
SGSN : Serving GPRS Support Node
GGSN : Gateway GPRS Support Node
GPRS Register
GGRajan
58. GSM vs GPRS
GPRS Architecture
GSM Core
BSC Network PSTN/ISP
Air Interface Solution GPRS Core
Network IP
SGSN IP GGSN
PDN
Network Solution
GGRajan
59. GPRS System Architecture
GPRS in GSM Networks
Packets Same Radio
BSS for Packet
and Circuit
Traffic
Circuit
BSC
IP
GPRS GGSN
PLMN
SGSN
MSC/VLR Intra
PLMN IP
HLR SS7 Backbone
SGSN
GGSN
GSM PLMN X.25
MSC
GGRajan
60. EDGE Features
EDGE acts as a bolt-on enhancement to 2G and 2.5G, ie GPRS
EDGE is also known as Enhanced GPRS, a superset to GPRS
Can carry data speeds up to 384 Kbps in packet mode
Meet the ITU's requirement for a 3G network
EDGE requires no H/W changes in GSM core networks
BSSs must be modified
EDGE can be introduced in two ways :
1) Packet-switched enhancement (called EGPRS)
2) Circuit-switched data enhancement (called ECSD).
GGRajan
61. GPRS - EDGE compared
Technical Differences - GPRS and EDGE
Technology Data Rates Spectrum Services
Voice and circuit data
GSM/HSCSD 9.6 to 57.6 kbps 200 kHz
services
GPRS 171.6 kpbs 200 kHz Packet data services
EDGE 473.6 kbps 200 kHz Packet data services
GGRajan