architecture
The
Global System for Mobile communications is a digital cellular
communications system. It was developed in order to create a common
European mobile telephone standard but it has been rapidly accepted
worldwide. GSM was designed to be compatible with ISDN services.
History of the Cellular Mobile Radio and GSM
The
idea of cell-based mobile radio systems appeared at Bell Laboratories
(in USA) in the early 1970s. However, mobile cellular systems were
not introduced for commercial use until the 1980s. During the early
1980s, analog cellular telephone systems experienced a very rapid
growth in Europe, particularly in Scandinavia and the United Kingdom.
Today cellular systems still represent one of the fastest growing
telecommunications systems.
But
in the beginnings of cellular systems, each country developed its own
system, which was an undesirable situation for the following
reasons:
- The equipment was limited to operate only within the boundaries of each country.
- The market for each mobile equipment was limited.
In
order to overcome these problems, the Conference of European Posts
and Telecommunications (CEPT) formed, in 1982, the Group Special
Mobile (GSM) in order to develop a pan-European mobile cellular radio
system (the GSM acronym became later the acronym for Global System
for Mobile communications). The standardized system had to meet
certain criteria:
- Spectrum efficiency
- International roaming
- Low mobile and base stations costs
- Good subjective voice quality
- Compatibility with other systems such as ISDN (Integrated Services Digital Network)
- Ability to support new services
Unlike
the existing cellular systems, which were developed using an analog
technology, the GSM system was developed using a digital technology.
In
1989 the responsibility for the GSM specifications passed from the
CEPT to the European Telecommunications Standards Institute (ETSI).
The aim of the GSM specifications is to describe the functionality
and the interface for each component of the system, and to provide
guidance on the design of the system. These specifications will then
standardize the system in order to guarantee the proper inter-working
between the different elements of the GSM system. In 1990, the phase
I of the GSM specifications was published but the commercial use of
GSM did not start until mid-1991. The most important events in the
development of the GSM system are presented in the table 1.
|
Year
|
Events
|
|
1982
|
CEPT
establishes a GSM group in order to develop the standards for a
pan-European cellular mobile system
|
|
1985
|
Adoption
of a list of recommendations to be generated by the group
|
|
1986
|
Field
tests were performed in order to test the different radio
techniques proposed for the air interface
|
|
1987
|
TDMA
is chosen as access method (in fact, it will be used with FDMA)
Initial Memorandum of Understanding (MoU) signed by
telecommunication operators (representing 12 countries)
|
|
1988
|
Validation
of the GSM system
|
|
1989
|
The
responsibility of the GSM specifications is passed to the ETSI
|
|
1990
|
Appearance
of the phase 1 of the GSM specifications
|
|
1991
|
Commercial
launch of the GSM service
|
|
1992
|
Enlargement
of the countries that signed the GSM- MoU> Coverage of larger
cities/airports
|
|
1993
|
Coverage
of main roads GSM services start outside Europe
|
|
1995
|
Phase
2 of the GSM specifications Coverage of rural areas
|
Table
1: Events in the development of GSM
From
the evolution of GSM, it is clear that GSM is not anymore only a
European standard. GSM networks are operational or planned in over 80
countries around the world. The rapid and increasing acceptance of
the GSM system is illustrated with the following figures:
- 1.3 million GSM subscribers worldwide in the beginning of 1994.
- Over 5 million GSM subscribers worldwide in the beginning of 1995.
- Over 10 million GSM subscribers only in Europe by December 1995.
Since
the appearance of GSM, other digital mobile systems have been
developed. The table 2 charts the different mobile cellular systems
developed since the commercial launch of cellular systems.
|
Year
|
Mobile
Cellular System
|
|
1981
|
Nordic
Mobile Telephony (NMT), 450>
|
|
1983
|
American
Mobile Phone System (AMPS)
|
|
1985
|
Total
Access Communication System (TACS) Radiocom 2000 C-Netz
|
|
1986
|
Nordic
Mobile Telephony (NMT), 900>
|
|
1991
|
Global
System for Mobile communications> North American Digital
Cellular (NADC)
|
|
1992
|
Digital
Cellular System (DCS) 1800
|
|
1994
|
Personal
Digital Cellular (PDC) or Japanese Digital Cellular (JDC)
|
|
1995
|
Personal
Communications Systems (PCS) 1900- Canada>
|
|
1996
|
PCS-United
States of America>
|
Table
2: Mobile cellular systems
Cellular Systems
The Cellular Structure
In
a cellular system, the covering area of an operator is divided into
cells. A cell corresponds to the covering area of one transmitter or
a small collection of transmitters. The size of a cell is determined
by the transmitter's power.
The
concept of cellular systems is the use of low power transmitters in
order to enable the efficient reuse of the frequencies. In fact, if
the transmitters used are very powerful, the frequencies can not be
reused for hundred of kilometers as they are limited to the covering
area of the transmitter.
The
frequency band allocated to a cellular mobile radio system is
distributed over a group of cells and this distribution is repeated
in all the covering area of an operator. The whole number of radio
channels available can then be used in each group of cells that form
the covering area of an operator. Frequencies used in a cell will be
reused several cells away. The distance between the cells using the
same frequency must be sufficient to avoid interference. The
frequency reuse will increase considerably the capacity in number of
users.
In
order to work properly, a cellular system must verify the following
two main conditions:
- The power level of a transmitter within a single cell must be limited in order to reduce the interference with the transmitters of neighboring cells. The interference will not produce any damage to the system if a distance of about 2.5 to 3 times the diameter of a cell is reserved between transmitters. The receiver filters must also be very performant.
- Neighboring cells can not share the same channels. In order to reduce the interference, the frequencies must be reused only within a certain pattern.
In
order to exchange the information needed to maintain the
communication links within the cellular network, several radio
channels are reserved for the signaling information.
Cluster
The
cells are grouped into clusters. The number of cells in a cluster
must be determined so that the cluster can be repeated continuously
within the covering area of an operator. The typical clusters contain
4, 7, 12 or 21 cells. The number of cells in each cluster is very
important. The smaller the number of cells per cluster is, the bigger
the number of channels per cell will be. The capacity of each cell
will be therefore increased. However a balance must be found in order
to avoid the interference that could occur between neighboring
clusters. This interference is produced by the small size of the
clusters (the size of the cluster is defined by the number of cells
per cluster). The total number of channels per cell depends on the
number of available channels and the type of cluster used.
Types Of Cells
The
density of population in a country is so varied that different types
of cells are used:
Macro cells
The
macro cells are large cells for remote and sparsely populated areas
Micro cells
These
cells are used for densely populated areas. By splitting the existing
areas into smaller cells, the number of channels available is
increased as well as the capacity of the cells. The power level of
the transmitters used in these cells is then decreased, reducing the
possibility of interference between neighboring cells.
Selective cells
It
is not always useful to define a cell with a full coverage of 360
degrees. In some cases, cells with a particular shape and coverage
are needed. These cells are called selective cells. Typical examples
of selective cells are the cells that may be located at the entrances
of tunnels where coverage of 360 degrees is not needed. In this case,
a selective cell with coverage of 120 degrees is used.
Umbrella cells
A
freeway crossing very small cells produces an important number of
handovers among the different small neighboring cells. In order to
solve this problem, the concept of umbrella cells is introduced. An
umbrella cell covers several micro cells. The power level inside an
umbrella cell is increased comparing to the power levels used in the
micro cells that form the umbrella cell. When the speed of the mobile
is too high, the mobile is handed off to the umbrella cell. The
mobile will then stay longer in the same cell (in this case the
umbrella cell). This will reduce the number of handovers and the work
of the network.
A
too important number of handover demands and the propagation
characteristics of a mobile can help to detect its high speed.
The Transition From Analog To Digital Technology
In
the 1980s most mobile cellular systems were based on analog systems.
The GSM system can be considered as the first digital cellular
system. The different reasons that explain this transition from
analog to digital technology are presented in this section.
The Capacity of the System
As
it is explained in section 1, cellular systems have experienced a
very important growth. Analog systems were not able to cope with this
increasing demand. In order to overcome this problem, new frequency
bands and new technologies were proposed. But the possibility of
using new frequency bands was rejected by a big number of countries
because of the restricted spectrum (even if later on, other frequency
bands have been allocated for the development of mobile cellular
radio). The new analog technologies proposed were able to overcome
the problem to a certain degree but the costs were too important.
The
digital radio was, therefore, the best option (but not the perfect
one) to handle the capacity needs in a cost-efficiency way.
Compatibility with other Systems such as ISDN
The
decision of adopting a digital technology for GSM was made in the
course of developing the standard. During the development of GSM, the
telecommunications industry converted to digital methods. The ISDN
network is an example of this evolution. In order to make GSM
compatible with the services offered by ISDN, it was decide that the
digital technology was the best option.
Additionally,
a digital system allows, easily than an analog one, the
implementation of future improvements and the change of its own
characteristics.
Aspects of Quality
The
quality of the service can be considerably improved using a digital
technology rather than an analog one. In fact, analog systems pass
the physical disturbances in radio transmission (such as fades,
multi-path reception, spurious signals or interferences) to the
receiver. These disturbances decrease the quality of the
communication because they produce effects such as fadeouts,
cross-talks, hisses, etc. On the other hand, digital systems avoid
these effects transforming the signal into bits. These
transformations combined with other techniques, such as digital
coding, improve the quality of the transmission. The improvement of
digital systems comparing to analog systems is more noticeable under
difficult reception conditions than under good reception conditions.
The GSM Network
Architecture of the GSM Network
The
GSM technical specifications define the different entities that form
the GSM network by defining their functions and interface
requirements.
The
GSM network can be divided into four main parts:
The
architecture of the GSM network is presented in figure 1.
- Architecture of the GSM network
Mobile Station
A
Mobile Station consists of two main elements:
The Terminal
There
are different types of terminals distinguished principally by their
power and application:
- The `fixed' terminals are the ones installed in cars. Their maximum allowed output power is 20 W.
- The GSM portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W.
- The handheld terminals have experienced the biggest success thanks to the weight and volume, which are continuously decreasing. These terminals can emit up to 2 W. The evolution of technologies allows decreasing the maximum allowed power to 0.8 W.
The SIM
The
SIM is a smart card that identifies the terminal. By inserting the
SIM card into the terminal, the user can have access to all the
subscribed services. Without the SIM card, the terminal is not
operational.
The
SIM card is protected by a four-digit Personal Identification Number
(PIN). In order to identify the subscriber to the system, the SIM
card contains some parameters of the user such as its International
Mobile Subscriber Identity (IMSI).
Another
advantage of the SIM card is the mobility of the users. In fact, the
only element that personalizes a terminal is the SIM card. Therefore,
the user can have access to its subscribed services in any terminal
using its SIM card.
The geographical areas of the GSM network
The
figure 2 presents the different areas that form a GSM network.
- GSM network areas
As
it has already been explained a cell, identified by its Cell Global
Identity number (CGI), corresponds to the radio coverage of a base
transceiver station. A Location Area (LA), identified by its Location
Area Identity (LAI) number, is a group of cells served by a single
MSC/VLR. A group of location areas under the control of the same
MSC/VLR defines the MSC/VLR area. A Public Land Mobile Network (PLMN)
is the area served by one network operator.
The GSM functions
In
this paragraph, the description of the GSM network is focused on the
different functions to fulfill by the network and not on its physical
components. In GSM, five main functions can be defined:
Transmission
The
transmission function includes two sub-functions:
- The first one is related to the means needed for the transmission of user information.
- The second one is related to the means needed for the transmission of signaling information.
Not
all the components of the GSM network are strongly related with the
transmission functions. The MS, the BTS and the BSC, among others,
are deeply concerned with transmission. But other components, such as
the registers HLR, VLR or EIR, are only concerned with the
transmission for their signaling needs with other components of the
GSM network. Some of the most important aspects of the transmission
are described in section 5.
Radio Resources management (RR)
The
role of the RR function is to establish, maintain and release
communication links between mobile stations and the MSC. The elements
that are mainly concerned with the RR function are the mobile station
and the base station. However, as the RR function is also in charge
of maintaining a connection even if the user moves from one cell to
another, the MSC, in charge of handovers, is also concerned with the
RR functions.
The
RR is also responsible for the management of the frequency spectrum
and the reaction of the network to changing radio environment
conditions. Some of the main RR procedures that assure its
responsibilities are:
- Channel assignment, change and release.
- Handover.
- Frequency hopping.
- Power-level control.
- Discontinuous transmission and reception.
- Timing advance.
Some
of these procedures are described in section 5. In this paragraph
only the handover, which represents one of the most important
responsibilities of the RR, is described.
Handover
The
user movements can produce the need to change the channel or cell,
especially when the quality of the communication is decreasing. This
procedure of changing the resources is called handover. Four
different types of handovers can be distinguished:
- Handover of channels in the same cell.
- Handover of cells controlled by the same BSC.
- Handover of cells belonging to the same MSC but controlled by different BSCs.
- Handover of cells controlled by different MSCs.
Handovers
are mainly controlled by the MSC. However in order to avoid
unnecessary signaling information, the first two types of handovers
are managed by the concerned BSC (in this case, the MSC is only
notified of the handover).
The
mobile station is the active participant in this procedure. In order
to perform the handover, the mobile station controls continuously its
own signal strength and the signal strength of the neighboring cells.
The list of cells that must be monitored by the mobile station is
given by the base station. The power measurements allow deciding
which the best cell is in order to maintain the quality of the
communication link. Two basic algorithms are used for the handover:
- The `minimum acceptable performance' algorithm. When the quality of the transmission decreases (i.e. the signal is deteriorated), the power level of the mobile is increased. This is done until the increase of the power level has no effect on the quality of the signal. When this happens, a handover is performed.
- The `power budget' algorithm. This algorithm performs a handover, instead of continuously increasing the power level, in order to obtain a good communication quality.
Mobility Management
The
MM function is in charge of all the aspects related with the mobility
of the user, specially the location management and the authentication
and security.
Location management
When
a mobile station is powered on, it performs a location update
procedure by indicating its IMSI to the network. The first location
update procedure is called the IMSI attach procedure.
The
mobile station also performs location updating, in order to indicate
its current location, when it moves to a new Location Area or a
different PLMN. This location updating message is sent to the new
MSC/VLR, which gives the location information to the subscriber's
HLR. If the mobile station is authorized in the new MSC/VLR, the
subscriber's HLR cancels the registration of the mobile station with
the old MSC/VLR.
A
location updating is also performed periodically. If after the
updating time period, the mobile station has not registered, it is
then deregistered.
When
a mobile station is powered off, it performs an IMSI detach procedure
in order to tell the network that it is no longer connected.
Authentication and security
The
authentication procedure involves the SIM card and the Authentication
Center. A secret key, stored in the SIM card and the AuC, and a
ciphering algorithm called A3 are used in order to verify the
authenticity of the user. The mobile station and the AuC compute a
SRES using the secret key, the algorithm A3 and a random number
generated by the AuC. If the two computed SRES are the same, the
subscriber is authenticated. The different services to which the
subscriber has access are also checked.
Another
security procedure is to check the equipment identity. If the IMEI
number of the mobile is authorized in the EIR, the mobile station is
allowed to connect the network.
In
order to assure user confidentiality, the user is registered with a
Temporary Mobile Subscriber Identity (TMSI) after its first location
update procedure.
Enciphering
is another option to guarantee a very strong security but this
procedure is going to be described in section 5.
Communication Management (CM)
The
CM function is responsible for:
- Call control.
- Supplementary Services management.
- Short Message Services management.
Call Control (CC)
The
CC is responsible for call establishing, maintaining and releasing as
well as for selecting the type of service. One of the most important
functions of the CC is the call routing. In order to reach a mobile
subscriber, a user dials the Mobile Subscriber ISDN (MSISDN) number,
which includes:
- a country code
- a national destination code identifying the subscriber's operator
- a code corresponding to the subscriber's HLR
The
call is then passed to the GMSC (if the call is originated from a
fixed network) which knows the HLR corresponding to a certain MISDN
number. The GMSC asks the HLR for information helping to the call
routing. The HLR requests this information from the subscriber's
current VLR. This VLR allocates temporarily a Mobile Station Roaming
Number (MSRN) for the call. The MSRN number is the information
returned by the HLR to the GMSC. Thanks to the MSRN number, the call
is routed to subscriber's current MSC/VLR. In the subscriber's
current LA, the mobile is paged.
Supplementary Services management
The
mobile station and the HLR are the only components of the GSM network
involved with this function. The different Supplementary Services
(SS) to which the users have access are presented in section 6.3.
Short Message Services management
In
order to support these services, a GSM network is in contact with a
Short Message Service Center through the two following interfaces:
- The SMS-GMSC for Mobile Terminating Short Messages (SMS-MT/PP). It has the same role as the GMSC.
- The SMS-IWMSC for Mobile Originating Short Messages (SMS-MO/PP).
Operation, Administration and Maintenance (OAM)
The
OAM function allows the operator to monitor and control the system as
well as to modify the configuration of the elements of the system.
Not only the OSS is part of the OAM, also the BSS and NSS participate
in its functions as it is shown in the following examples:
- The components of the BSS and NSS provide the operator with all the information it needs. This information is then passed to the OSS which is in charge of analyzing it and control the network.
- The self test tasks, usually incorporated in the components of the BSS and NSS, also contribute to the OAM functions.
- The BSC, in charge of controlling several BTSs, is another example of an OAM function performed outside the OSS.
The GSM Radio Interface
The
radio interface is the interface between the mobile stations and the
fixed infrastructure. It is one of the most important interfaces of
the GSM system.
One
of the main objectives of GSM is roaming. Therefore, in order to
obtain a complete compatibility between mobile stations and networks
of different manufacturers and operators, the radio interface must be
completely defined.
The
spectrum efficiency depends on the radio interface and the
transmission, more particularly in aspects such as the capacity of
the system and the techniques used in order to decrease the
interference and to improve the frequency reuse scheme. The
specification of the radio interface has then an important influence
on the spectrum efficiency.
Frequency Allocation
Two
frequency bands, of 25 MHz each one, have been allocated for the GSM
system:
- The band 890-915 MHz has been allocated for the uplink direction (transmitting from the mobile station to the base station).
- The band 935-960 MHz has been allocated for the downlink direction (transmitting from the base station to the mobile station).
But
not all the countries can use the whole GSM frequency bands. This is
due principally to military reasons and to the existence of previous
analog systems using part of the two 25 MHz frequency bands.
From source information to radio waves
The
figure 4 presents the different operations that have to be performed
in order to pass from the speech source to radio waves and vice
versa.
Speech coding
The
transmission of speech is, at the moment, the most important service
of a mobile cellular system. The GSM speech codec, which will
transform the analog signal (voice) into a digital representation,
has to meet the following criteria:
- From speech source to radio waves
If
the source of information is data and not speech, the speech coding
will not be performed
- A good speech quality, at least as good as the one obtained with previous cellular systems.
- To reduce the redundancy in the sounds of the voice. This reduction is essential due to the limited capacity of transmission of a radio channel.
- The speech codec must not be very complex because complexity is equivalent to high costs.
The
final choice for the GSM speech codec is a codec named RPE-LTP
(Regular Pulse Excitation Long-Term Prediction). This codec uses the
information from previous samples (this information does not change
very quickly) in order to predict the current sample. The speech
signal is divided into blocks of 20 ms. These blocks are then passed
to the speech codec, which has a rate of 13 kbps, in order to obtain
blocks of 260 bits.
Channel coding
Channel
coding adds redundancy bits to the original information in order to
detect and correct, if possible, errors occurred during the
transmission.
Channel coding for the GSM data TCH channels
The
channel coding is performed using two codes: a block code and a
convolution code.
The
block code corresponds to the block code defined in the GSM
Recommendations 05.03. The block code receives an input block of 240
bits and adds four zero tail bits at the end of the input block. The
output of the block code is consequently a block of 244 bits.
A
convolution code adds redundancy bits in order to protect the
information. A convolution encoder contains memory. This property
differentiates a convolution code from a block code. A convolution
code can be defined by three variables: n, k and K. The value n
corresponds to the number of bits at the output of the encoder, k to
the number of bits at the input of the block and K to the memory of
the encoder. The ratio, R, of the code is defined as follows: R =
k/n. Let's consider a convolution code with the following values: k
is equal to 1, n to 2 and K to 5. This convolution code uses then a
rate of R = 1/2 and a delay of K = 5, which means that it will add a
redundant bit for each input bit. The convolution code uses 5
consecutive bits in order to compute the redundancy bit. As the
convolution code is a 1/2 rate convolution code, a block of 488 bits
is generated. These 488 bits are punctured in order to produce a
block of 456 bits. Thirty two bits, obtained as follows, are not
transmitted:
C (11 + 15 j) for j = 0, 1, 31
The
block of 456 bits produced by the convolution code is then passed to
the interleaver.
Channel coding for the GSM speech channels
Before
applying the channel coding, the 260 bits of a GSM speech frame are
divided in three different classes according to their function and
importance. The most important class is the class Ia containing 50
bits. Next in importance is the class Ib, which contains 132 bits.
The least important is the class II, which contains the remaining 78
bits. The different classes are coded differently. First of all, the
class Ia bits are block-coded. Three parity bits, used for error
detection, are added to the 50 class Ia bits. The resultant 53 bits
are added to the class Ib bits. Four zero bits are added to this
block of 185 bits (50+3+132). A convolution code, with r = 1/2 and K
= 5, is then applied, obtaining an output block of 378 bits. The
class II bits are added, without any protection, to the output block
of the convolution coder. An output block of 456 bits is finally
obtained.
Channel coding for the GSM control channels
In
GSM the signaling information is just contained in 184 bits. Forty
parity bits, obtained using a fire code, and four zero bits are added
to the 184 bits before applying the convolution code (r = 1/2 and K =
5). The output of the convolution code is then a block of 456 bits,
which does not need to be punctured.
Interleaving
An
interleaving rearranges a group of bits in a particular way. It is
used in combination with FEC codes in order to improve the
performance of the error correction mechanisms. The interleaving
decreases the possibility of losing whole bursts during the
transmission, by dispersing the errors. Being the errors less
concentrated, it is then easier to correct them.
Interleaving for the GSM control channels
A
burst in GSM transmits two blocks of 57 data bits each. Therefore the
456 bits corresponding to the output of the channel coder fit into
four bursts (4*114 = 456). The 456 bits are divided into eight blocks
of 57 bits. The first block of 57 bits contains the bit numbers (0,
8, 16,448), the second one the bit numbers (1, 9, 17,455). The first
four blocks of 57 bits are placed in the even-numbered bits of four
bursts. The other four blocks of 57 bits are placed in the
odd-numbered bits of the same four bursts. Therefore the interleaving
depth of the GSM interleaving for control channels is four and a new
data block starts every four bursts. The interleaver for control
channels is called a block rectangular interleaver.
Interleaving for the GSM speech channels
The
block of 456 bits, obtained after the channel coding, is then divided
in eight blocks of 57 bits in the same way as it is explained in the
previous paragraph. But these eight blocks of 57 bits are distributed
differently. The first four blocks of 57 bits are placed in the
even-numbered bits of four consecutive bursts. The other four blocks
of 57 bits are placed in the odd-numbered bits of the next four
bursts. The interleaving depth of the GSM interleaving for speech
channels is then eight. A new data block also starts every four
bursts. The interleaver for speech channels is called a block
diagonal interleaver.
Interleaving for the GSM data TCH channels
A
particular interleaving scheme, with an interleaving depth equal to
22, is applied to the block of 456 bits obtained after the channel
coding. The block is divided into 16 blocks of 24 bits each, 2 blocks
of 18 bits each, 2 blocks of 12 bits each and 2 blocks of 6 bits
each. It is spread over 22 bursts in the following way:
- the first and the twenty-second bursts carry one block of 6 bits each
- the second and the twenty-first bursts carry one block of 12 bits each
- the third and the twentieth bursts carry one block of 18 bits each
- from the fourth to the nineteenth burst, a block of 24 bits is placed in each burst
A
burst will then carry information from five or six consecutive data
blocks. The data blocks are said to be interleaved diagonally. A new
data block starts every four bursts.
Burst assembling
The
burst assembling procedure is in charge of grouping the bits into
bursts. Section 5.2.3 presents the different bursts structures and
describes in detail the structure of the normal burst
Ciphering
Ciphering
is used to protect signaling and user data. First of all, a ciphering
key is computed using the algorithm A8 stored on the SIM card, the
subscriber key and a random number delivered by the network (this
random number is the same as the one used for the authentication
procedure). Secondly, a 114 bit sequence is produced using the
ciphering key, an algorithm called A5 and the burst numbers. This bit
sequence is then XORed with the two 57 bit blocks of data included in
a normal burst.
In
order to decipher correctly, the receiver has to use the same
algorithm A5 for the deciphering procedure.
Modulation
The
modulation chosen for the GSM system is the Gaussian Modulation Shift
Keying (GMSK).
The
aim of this section is not to describe precisely the GMSK modulation
as it is too long and it implies the presentation of too many
mathematical concepts. Therefore, only brief aspects of the GMSK
modulation are presented in this section.
The
GMSK modulation has been chosen as a compromise between spectrum
efficiency, complexity and low spurious radiations (that reduce the
possibilities of adjacent channel interference). The GMSK modulation
has a rate of 270 5/6 kbauds and a BT product equal to 0.3. Figure 5
presents the principle of a GMSK modulator.
- GMSK modulator
Discontinuous transmission (DTX)
This
is another aspect of GSM that could have been included as one of the
requirements of the GSM speech codec. The function of the DTX is to
suspend the radio transmission during the silence periods. This can
become quite interesting if we take into consideration the fact that
a person speaks less than 40 or 50 percent during a conversation. The
DTX helps then to reduce interference between different cells and to
increase the capacity of the system. It also extends the life of a
mobile's battery. The DTX function is performed thanks to two main
features:
- The Voice Activity Detection (VAD), which has to determine whether the sound represents speech or noise, even if the background noise is very important. If the voice signal is considered as noise, the transmitter is turned off producing then, an unpleasant effect called clipping.
- The comfort noise. An inconvenient of the DTX function is that when the signal is considered as noise, the transmitter is turned off and therefore, a total silence is heard at the receiver. This can be very annoying to the user at the reception because it seems that the connection is dead. In order to overcome this problem, the receiver creates a minimum of background noise called comfort noise. The comfort noise eliminates the impression that the connection is dead.
Timing advance
The
timing of the bursts transmissions is very important. Mobiles are at
different distances from the base stations. Their delay depends,
consequently, on their distance. The aim of the timing advance is
that the signals coming from the different mobile stations arrive to
the base station at the right time. The base station measures the
timing delay of the mobile stations. If the bursts corresponding to a
mobile station arrive too late and overlap with other bursts, the
base station tells, this mobile, to advance the transmission of its
bursts.
Power Control
At
the same time the base stations perform the timing measurements, they
also perform measurements on the power level of the different mobile
stations. These power levels are adjusted so that the power is nearly
the same for each burst.
A
base station also controls its power level. The mobile station
measures the strength and the quality of the signal between itself
and the base station. If the mobile station does not receive
correctly the signal, the base station changes its power level.
Discontinuous Reception
It
is a method used to conserve the mobile station's power. The paging
channel is divided into sub channels corresponding to single mobile
stations. Each mobile station will then only 'listen' to its sub
channel and will stay in the sleep mode during the other sub channels
of the paging channel.
Multipath and Equalisation
At
the GSM frequency bands, radio waves reflect from buildings, cars,
hills, etc. So not only the 'right' signal (the output signal of the
emitter) is received by an antenna, but also many reflected signals,
which corrupt the information, with different phases.
An
equalizer is in charge of extracting the 'right' signal from the
received signal. It estimates the channel impulse response of the GSM
system and then constructs an inverse filter. The receiver knows
which training sequence it must wait for. The equalizer will then,
comparing the received training sequence with the training sequence
it was expecting, compute the coefficients of the channel impulse
response. In order to extract the 'right' signal, the received signal
is passed through the inverse filter.
GSM Reference Model
System entities
The GSM system entities represent groupings of specific wireless functionality.The following figure shows the GSM reference Model.
Mapping Model to Network
Example of a GSM network is shown.Conclusion
The
aim of this paper was to give an overview of the GSM system and not
to provide a complete and exhaustive guide.
As
it is shown in this chapter, GSM is a very complex standard. It can
be considered as the first serious attempt to fulfill the
requirements for a universal personal communication system. GSM is
then used as a basis for the development of the Universal Mobile
Telecommunication System (UMTS).
No comments:
Post a Comment