Professional Documents
Culture Documents
Communications (GSM)
Nguyen Thi Mai Trang
LIP6/PHARE
Thi-Mai-Trang.Nguyen@lip6.fr
Outline
Mobile networks
First generation
Second generation
Third generation
3G+ and 4G
Cell
Cell size
meters
tens of meters
hundreds of meters
tens of kilometers
hundreds of kilometers
UPMC/PUF - M2 Networks - PTEL
Cellular networks
Handover
Cell 2
Cell 1
Handover zone
UPMC/PUF - M2 Networks - PTEL
Frequency reuse
F3
F2
F3
F3
F1
F1
F2
F2
F2
F3
F3
Air interface
10
11
FDMA
Channel
time
UPMC/PUF - M2 Networks - PTEL
12
TDMA
time
UPMC/PUF - M2 Networks - PTEL
13
CDMA
The mobiles in a cell share the same radio channel by using a code
assigned by the system which determines the frequencies and the power
levels used
Allow the reuse of the same frequencies in adjacent cells
frequency
Simultaneous transmissions
over the whole band but with
different codes between clients
time
UPMC/PUF - M2 Networks - PTEL
14
AuC
Authentication Center
Abis
BTS
VLR
MSC
HLR
BSC
RTC
GMSC
Gateway MSC
VLR
MSC
Visitor Location Register
Mobile service Switching Center
BTS
BTS
BSC
Base Station Controller
MSC VLR
Radio Sub-System
Network Sub-System
15
Radio Sub-System
Network Sub-System
Mobile terminal
16
Radio sub-system
Channel allocation
Analyze the measurements realized by the BTSs to control the power of
the mobiles or the BTSs
Handover decision
17
Switching matrix
Call establishment between a mobile and another MSC
MSC level handover execution
Mobility management (VLR look-up for outgoing call,
transfer of location information)
Gateway for the calls towards fixed users
18
Contain the secret key of each subscriber for the authentication and
the encryption of the communications
19
Mobile terminal
SIM card
IMSI
(International Mobile Subscriber Identity)
Ex: 208 01 314159
User
MSISDN
(Mobile Station ISDN Number)
Ex: 33 6 07 62 17 73
Terminal
IMEI
(International Mobile Equipment Identity)
UPMC/PUF - M2 Networks - PTEL
20
10
Addressing
IMSI
TMSI
MSISDN
MSRN
21
IMSI
22
11
TMSI
23
MSISDN
SN (Subscriber Number)
24
12
Identity exchanges
25
IMEI
Spare (SP)
26
13
Use TMSI
The mapping TMSI - IMSI is managed at the VLR level
TMSI is sent to the mobile in the encrypted mode
Radio interface
Encryption procedure
of
save
release
of
27
Elements
Principles
Each subscriber has a key Ki stored in the SIM card together with the IMSI,
and in the AuC of the network operator
For encryption
For authentication
The encryption key Kc is generated by the A8 algorithm from the Ki key and the
random number RAND
The A5 algorithm uses the Kc key for data encryption
The A3 algorithm generates a number SRES from the Ki key and the random
number RAND
28
14
Authentication Center
AuC
Ki
HLR
SIM Card
Ki
Challenge (RAND)
RAND
A3
A8
RES
Kc
RAND
Response (RES)
RES
Kc
Non
X
Oui
Authenticated
Kc
Kc
A5
A8
RES = RES : ?
Encryption/
Decryption
A3
Encypted communication
A5
Encryption/
Decryption
29
no
yes
Subscriber
authenticated
UPMC/PUF - M2 Networks - PTEL
Subscriber
forbidden
30
15
Data confidentiality
Kc key establishment
radio interface
network
31
Triplet
The network using the triplets to authenticate and activate the encryption
dont need to know the A3 and A8 algorithms
The triplets are calculated by the AuC and sent to the MSC/VLR
Each operator can have their own A3 and A8 algorithms
Subscriber is always authenticated by the algorithms of their home
network
Generate
de 1 to n
32
16
33
Location management
34
17
cell
35
36
18
search
by
37
38
19
Paging procedure
39
Air interface
Frequency bands
40
20
TDMA in GSM
41
TDMA frame
0 1
Slot (~577 s)
2 3
4 5
6 7
42
21
Duplexing
, 1 n 124
43
Duplex interval
fd
Downlink
0 1
2 3
4 5
6 7
Uplink
fu
0 1
2 3
4 5
6 7
time
44
22
45
Speech coding
Unprotected voice
Channel coding
Protected voice
Interleaving
TDMA frame
Voice frame
TDMA frame
Duration of a voice frame
UPMC/PUF - M2 Networks - PTEL
46
23
Speech coding
Full-rate
13 Kbps
Voice is sampled at 8 kHz to form 20 ms frames
The codec RPE-LTP (Regular Pulse Excitation Long
Term Prediction) transforms the 20 ms voice segments
into 260 bits blocks
Half-rate
5,6 Kbps
47
48
24
49
bits
50
CRC
53
132
Class I.b
4
tail bits
189 bits
Convolutional code
378 bits
78 bits of class II
+
456 bits
UPMC/PUF - M2 Networks - PTEL
50
25
Interleaving (1)
51
Interleaving (2)
Reading
Writing
b0
b1
b2
b3
b4
b5
b6
b7
b8
b9
b10
b11
b12
b13
b14
b15
..
57
8 half-blocs
b440
b441
b442
b443
b444
b445
b446
b447
b448
b449
b450
b451
b452
b453
b454
b455
A0
A1
A2
A3
A4
A5
A6
A7
52
26
Interleaving (3)
B0 B1 B2 B3 B4 B5 B6 B7
A0 A1 A2 A3 A4 A5 A6 A7
C0 C1 C2 C3 C4 C5 C6 C7
Burst (odd bit : A0 even bits: B4)
58 bits
3 bits
58 bits
26 bits
53
Burst structure
TDMA frame
0 1
3 bits
58 bits
2 3
4 5
6 7
26 bits
58 bits
Training sequence
Coded data
UPMC/PUF - M2 Networks - PTEL
54
27
55
56
28
Multiframe
multiframe
57
Multiframe of 26 frames
Duration of 235,8 ms
Superframe
Duration of 120 ms
Multiframe of 51 frames
Hyperframe
58
29
multiframe
multiframe
superframe
hyperframe
59
60
30
1 voice bloc is of 20 ms
61
SACCH
62
31
FACCH
Normal burst
Sequence
63
64
32
65
Information
System information
Mobile terminal
Turned on
Standby
Monitor in permanence the beacon channels of the current and neighbor
cells to change the cell if necessary
Under communication
66
33
When the mobile want to make an control operation with the network
(location update, call request, etc.), it must inform the network by
sending a request over the RACH channel
When the network receive a request, it allocate a dedicated signalling
channel by sending an allocation message over the AGCH channel
containing the carrier number and the slot number
Paging CHannel
67
Network planning
Blocking probability
Erlang-B table
68
34
Example (1)
69
Example (2)
Pattern K = 12
70
35
Example (3)
71
Example (4)
72
36
References
73
37