SlideShare une entreprise Scribd logo
1  sur  44
GSM Protocol
Architecture
Shariful Hasan Shaikot
Graduate Student
Computer Science Department
Oklahoma State University
2
Outline
 What is GSM?
 Nomenclature
 GSM Protocol Architecture
 Overview of Interfaces
 GSM Protocol Stack
 Overview of Layer-I
 Overview of Layer-II
 Overview of Layer-III
3
What is GSM?
 GSM, the Global System for Mobile
Communications, is a digital cellular
communications system
 GSM provides –

Digital Transmission

ISDN compatibility

Worldwide roaming in other GSM networks

Provides a model for 3G Cellular systems (UMTS)
4
Nomenclature
 MS (Mobile Station) = ME (Mobile Equipment )
+SIM (Subscriber Identity Module)
 BSS (Base Station Subsystem) = BTS (Base
Transceiver Station) + BSC (Base Station
Controller)
 NSS (Network Switching Subsystem)
 MSC (Mobile Switching Center): telephony
switching function and authentication of user
5
GSM Protocol Stack
 Layer 1: Physical Layer

Radio Transmission
 Layer 2: Data Link Layer (DLL)

provides error-free transmission between adjacent entities, based on the
ISDN’s LAPD protocol for the Um and Abis interfaces, and on SS7’s
Message Transfer Protocol (MTP) for the other Layer interfaces
 Layer 3: Networking or Messaging Layer

Responsible for the communication of network resources, mobility, code
format and call-related management messages between various network
entities
- In any telecommunication system, signalling is required to coordinate the necessarily distributed
functional entities of the network.
- The transfer of signalling information in GSM follows the layered OSI model
6
GSM Protocol Architecture
Layer 1
Layer 2
Layer 3
TDMA/FDM
A
7
Overview of Interfaces
 Um

Radio interface between
MS and BTS

each physical channel
supports a number of
logical channels
 Abis

between BTS and BSC

primary functions: traffic channel transmission, terrestrial
channel management, and radio channel management A

between BSC and MSC

primary functions: message transfer between different
BSCs to the MSC
8
The data link layer (layer 2)
over the radio link is based
on a modified LAPD (Link
Access Protocol for the D
channel) referred to as
LAPDm (m like mobile).
On the A-bis interface, the layer 2 protocol is based on the LAPD
from ISDN.
The Message Transfer Protocol (MTP) level 2 of the SS7 protocol
is used at the A interface.
9
User Data and Control at Air
Interface
Two types of ISDN "channels" or
communication paths:
B-channel
The Bearer ("B") channel: a 64
kbps channel used for voice,
video, data, or multimedia calls.
D-channel
The Delta ("D") channel: a 16 kbps
or 64 kbps channel used primarily
for communications (or "signaling")
between switching equipment in
the ISDN network and the ISDN
equipment
10
User Data and Control at Air
Interface
In GSM:
• Bm channel for traffic / user data
• Dm channel for signaling
As in ISDN the Dm channel in
GSM can be used for user data if
capacity is available.
GSM’s Short Message Service
(SMS) uses this.
11
Layer I:
Physical Layer
Radio transmission forms this Layer
12
Layer I: Physical Layer
 Modulation Techniques – Gaussian Minimum Shift Keying (GMSK)
 Channel Coding

Block Code

Convolutional Code
 Interleaving

To distribute burst error
 Power control methodology – to minimize the co-channel interference
 Time synchronization approaches
13
GSM Protocol Architecture for Speech –
Air IF
14
GSM Physical Layer (MS
Side)
Speech in GSM is digitally coded at a rate of 13 kbps
456 bits every 20 ms
260 bits every 20 ms
8 57 bits block
GMSK
Convolutional Encoder
184 bits
( 20 ms)
15
GSM Speech Transmission
16
GSM Normal Burst Formatting
17
GSM Frame Hierarchy
18
Physical Vs. Logical Channel
19
Logical Channels in GSM
 Two major classes of logical channels
 Traffic Channels (TCHs)
 Control Channels (CCHs)
20
Traffic Channels in GSM
 Two types of TCHs
 Full-rate traffic channel (TCH/F)
 Half-rate traffic channel (TCH/H)
21
Control Channels in GSM
 Three classes of control channels
 Broadcast Channels (BCH)
 Common Control Channels (CCCH)
 Dedicated Control Channels (DCCH)
22
Layer II:
Data Link Layer (DLL)
Error-free transmission between adjacent entities
23
GSM – Layer II
 Connection-based Network
 Traffic
 Signaling and Control
 Signaling and control data are conveyed through Layer II and
Layer III messages in GSM
 Purpose of Layer II is to check the flow of packets for Layer III
 DLL checks the address and sequence # for Layer III
 Also manages Acks for transmission of the packets
 Allows two SAPs for signaling and SMS
 SMS traffic is carried through a fake signaling packet that carries
user information over signaling channels
 DLL allows SMS data to be multiplexed into signaling streams
24
GSM – Layer II
 Signaling packet delivered to the physical layer
is 184 bits which conforms with the length of the
DLL packets in the LAPD protocol used in ISDN
network
 The LAPD protocol is used for A and A-bis
interface
 The DLL for the Um interface is LAPDm
25
LAPDm
 The Link Access Procedure on the Dm channel
(LAPDm) is the protocol for use by the data link layer on
the radio interface.
 Functions
– organization of Layer 3 information into frames
– peer-to-peer transmission of signaling data
in defined frame formats
– recognition of frame formats
– establishment, maintenance, and
termination of one or more (parallel) data
links on signaling channels
26
Frame format (LAPD)
27
Frame format (LAPDm)
Address field: is used to carry the service access point identifier (SAPI),
protocol revision type, nature of the message
SAPI: When using command/control frames, the SAPI identifies the user
for which a command frame is intended, and the user transmitting a
response frame
Control field: is used to carry Sequence number and to specify the types of
the frame (command or response)
Length indicator: Identifies the length of the information field that is used to
distinguish the information carrying filed from fill-in bits
Information Field: Carries the Layer III payload
Fill-in bits: all “1” bits to extend the length to the desired 184 bits
28
Types of Frame of LAPDm
 Three types of frames for

Supervisory functions

Unnumbered information transfer and control functions

Numbered information transfer
29
Address field format of LAPDm
Link Protocol Discriminator: is used to specify a
particular recommendation of the use of LAPDm
C/R: Specifies a command or response frame
Extended Address : is used to extend the address field
to more than one octet (the EA bit in the last octet of the
address should be set to 1, otherwise 0)
Spare: reserved for future use
30
LAPD Vs. LAPDm
 LAPDm uses no cyclic redundancy check bits for error
detection

WHY?
 Error correction and detection mechanism are
provided by a combination of block and convolutional
coding used (in conjunction with bit interleaving) in the
physical layer
31
Layer II Messages
- Set asynchronous balanced mode
- Disconnect
- Unnumbered acknowledgement
- Receiver ready
- Receiver not ready
- Reject
- These messages are sent in peer-to-peer Layer II communications,
DLL ack.
- These messages do not have Layer III information bits
- Fill-in bits cover the “information bits” field
32
Layer II Messages (contd…)
- The Paging Channel (PCH) is 176 bits.
- The DLL packet for this signaling channel only have an EIGHT bit
length of the field
- 184 bits encoded into 456 bits
- The 456 bits transmitted over 8 physical NBs
- The Stand-alone Dedicated Control Channel (SDCCH) is 160 bits.
- The DLL packet for this signaling channel has 3 8-bits used for
address, control and length of the information field
- The Slow Associated Control Channel (SACCH) is 144 bits.
- The DLL packet for this signaling channel has 16 fill-in bits and 3 8-bits
used for address, control and length of the information field
33
Layer III:
Networking or Messaging Layer
The layer 3 protocols are used for the communication of network
resources, mobility, code format and call-related management
messages between various network entities
34
Layer III
 A number of mechanisms needed to establish, maintain and
terminate a mobile communication session
 Layer III implements the protocols needed to support these
mechanisms
 A signaling protocol, the registration process, is composed of a
sequence of communication events or messages
 Layer III defines the details of implementation of messages on
the logical channels encapsulated in DLL frames
35
Layer III Message Format
Transaction Identifier (TI): to identify a protocol that consists of a
sequence of message, allows multiple protocols to operate in parallel
Protocol Discriminator (PD): Identifies the category of the operation
(management, supplementary services, call control)
Message Type (MT): Identifies the type of messages for a given PD
Information Elements (IE): An optional field for the time that an instruction
carries some information that is specified by an IE identifier (IEI).
36
MM Message Type
37
Layer III Message
 Radio Resource Management (RR),
 Mobility Management (MM) and
 Connection Management (CM).
38
Radio Resource Management (RR)
39
Mobility Management (MM)
- Assumes a reliable RR connection
- Responsible for
- location management and
- Security
40
Mobility Management (MM)
- Location management involves the procedures and
signaling for location updating, so that the mobile’s current
location is stored at the HLR, allowing incoming calls to
be properly routed.
- Security involves the authentication of the mobile, to prevent
unauthorized access to the network, as well as the encryption of
all radio link traffic.
- The protocols in the MM layer involve the SIM, MSC, VLR, and
the HLR, as well as the AuC (which is closely tied with
the HLR).
41
Connection Management (CM)
The CM functional layer is divided into three sub
layers.
- Call Control (CC)
- Supplementary Services
- Short Message Service
Call Control (CC) sub layer
- manages call routing, establishment, maintenance,
and release, and is closely related to ISDN call
control.
42
Connection Management
(CM)
Supplementary Services sub layer
- manages the implementation of the various
supplementary services (Call Forwarding/waiting/hold ),
and also allows users to access and modify their
service subscription.
Short Message Service sub layer
- handles the routing and delivery of short messages,
both from and to the mobile subscriber.
43
References
 1. Principles of Wireless Networks: A Unified
Approach, K. Pahlavan, P. Krishnamurthy
 2. www.chu.edu.tw/~lhyen/wc/gsm.pdf
 3. www.hit.bme.hu/~mihaly/mobil.hir/gsmbase.pdf
 4. www-rp.lip6.fr/maitrise/articles/Rahnema.pdf
 5.opetus.stadia.fi/kurki/Courses/DigMobile/2006_Spri
ng_Course_materilas/DM_7_GSM_Protocol_Architect
ure.pdf
 6. Moe Rahnema, Overview of the GSM System and
Protocol Architecture, IEEE Communications
Magazine, April 1993
44
The END
The slide is available at www.cs.okstate.edu/~shaikot
Thank You

Contenu connexe

Tendances

Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansTelebeansolutions
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network ArchitectureAhmed Khaled
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryaliZaryal Social
 
Handover &mobility in 4g5g
Handover &mobility in 4g5gHandover &mobility in 4g5g
Handover &mobility in 4g5gabolfazlzakeri
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTEmanish_sapra
 
Long term evolution (lte) technology
Long term evolution (lte) technologyLong term evolution (lte) technology
Long term evolution (lte) technologykonan23
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Hamidreza Bolhasani
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency Maulik Patel
 
08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algoherobinh
 

Tendances (20)

Gsm channels
Gsm channelsGsm channels
Gsm channels
 
GSM Location area update
GSM Location area updateGSM Location area update
GSM Location area update
 
GSM Traffic Cases
GSM Traffic CasesGSM Traffic Cases
GSM Traffic Cases
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
Sdcch
SdcchSdcch
Sdcch
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network Architecture
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryali
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Wcdma channels
Wcdma channels Wcdma channels
Wcdma channels
 
Handover &mobility in 4g5g
Handover &mobility in 4g5gHandover &mobility in 4g5g
Handover &mobility in 4g5g
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
 
GSM CALL FLOW
GSM CALL FLOWGSM CALL FLOW
GSM CALL FLOW
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
Long term evolution (lte) technology
Long term evolution (lte) technologyLong term evolution (lte) technology
Long term evolution (lte) technology
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
 
08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo
 

En vedette

Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocolPratit Khare
 
Cellular network planning_and_optimization_part5
Cellular network planning_and_optimization_part5Cellular network planning_and_optimization_part5
Cellular network planning_and_optimization_part5Azzam Ayoub
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umtssivakumar D
 
GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service ModelReni Sagayaraj
 
LTE Protocol Primer
LTE Protocol PrimerLTE Protocol Primer
LTE Protocol Primerguest973afc
 
04 umts traffic managementnew
04 umts traffic managementnew04 umts traffic managementnew
04 umts traffic managementnewsivakumar D
 
automation of waterpump using 8051 microcontroller
automation of waterpump using 8051 microcontrollerautomation of waterpump using 8051 microcontroller
automation of waterpump using 8051 microcontrollerParth Joshi
 
Soil Moisture and Irrigation: 3 key points for summer
Soil Moisture and Irrigation: 3 key points for summerSoil Moisture and Irrigation: 3 key points for summer
Soil Moisture and Irrigation: 3 key points for summerasianturfgrass
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call FlowDeepak Sharma
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Microcontroller based irrigation
Microcontroller based irrigationMicrocontroller based irrigation
Microcontroller based irrigationkajikho9
 
Soil Moisture Monitoring
Soil Moisture MonitoringSoil Moisture Monitoring
Soil Moisture MonitoringCaleb M Carter
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flowsemyl97
 

En vedette (20)

Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocol
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Cellular network planning_and_optimization_part5
Cellular network planning_and_optimization_part5Cellular network planning_and_optimization_part5
Cellular network planning_and_optimization_part5
 
Umts call-flows
Umts call-flowsUmts call-flows
Umts call-flows
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
 
GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service Model
 
accelerometer
accelerometeraccelerometer
accelerometer
 
LTE Protocol Primer
LTE Protocol PrimerLTE Protocol Primer
LTE Protocol Primer
 
04 umts traffic managementnew
04 umts traffic managementnew04 umts traffic managementnew
04 umts traffic managementnew
 
automation of waterpump using 8051 microcontroller
automation of waterpump using 8051 microcontrollerautomation of waterpump using 8051 microcontroller
automation of waterpump using 8051 microcontroller
 
Soil Moisture and Irrigation: 3 key points for summer
Soil Moisture and Irrigation: 3 key points for summerSoil Moisture and Irrigation: 3 key points for summer
Soil Moisture and Irrigation: 3 key points for summer
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call Flow
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
Wcdma Training
Wcdma TrainingWcdma Training
Wcdma Training
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Microcontroller based irrigation
Microcontroller based irrigationMicrocontroller based irrigation
Microcontroller based irrigation
 
Soil Moisture Monitoring
Soil Moisture MonitoringSoil Moisture Monitoring
Soil Moisture Monitoring
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flows
 

Similaire à Gsm presentation shaikot

gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technologynarayana swamy
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network LayerYubraj C.
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
gsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptgsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptkavitamittal18
 
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Shahrin Ahammad
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication systemTamilarasan N
 
Mc7503 -mc-2marks
Mc7503 -mc-2marksMc7503 -mc-2marks
Mc7503 -mc-2marksDinesh K
 
An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7irjes
 
An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7IJRES Journal
 

Similaire à Gsm presentation shaikot (20)

gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technology
 
GSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame FormatingGSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame Formating
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
 
2 g
2 g2 g
2 g
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
gsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptgsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing ppt
 
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]
 
Gsm By Aziz
Gsm By AzizGsm By Aziz
Gsm By Aziz
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication system
 
14 wcdma
14 wcdma14 wcdma
14 wcdma
 
Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
2gppt410
2gppt4102gppt410
2gppt410
 
Mc7503 -mc-2marks
Mc7503 -mc-2marksMc7503 -mc-2marks
Mc7503 -mc-2marks
 
Silide.pptx
Silide.pptxSilide.pptx
Silide.pptx
 
It6601 mobile computing unit 3
It6601 mobile computing unit 3It6601 mobile computing unit 3
It6601 mobile computing unit 3
 
GSM.ppt
GSM.pptGSM.ppt
GSM.ppt
 
An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7
 
An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7An Investigation on Standards and Applications of Signalling System No.7
An Investigation on Standards and Applications of Signalling System No.7
 

Plus de sivakumar D

Nfv white paper3
Nfv white paper3Nfv white paper3
Nfv white paper3sivakumar D
 
Lzu 108-9106-lte-l13-enodeb-commissioning-course-description
Lzu 108-9106-lte-l13-enodeb-commissioning-course-descriptionLzu 108-9106-lte-l13-enodeb-commissioning-course-description
Lzu 108-9106-lte-l13-enodeb-commissioning-course-descriptionsivakumar D
 
Gs nfv inf004v010101p
Gs nfv inf004v010101pGs nfv inf004v010101p
Gs nfv inf004v010101psivakumar D
 
03 umts radio path and transmissionnew
03 umts radio path and transmissionnew03 umts radio path and transmissionnew
03 umts radio path and transmissionnewsivakumar D
 
02 umts network architecturenew
02 umts network architecturenew02 umts network architecturenew
02 umts network architecturenewsivakumar D
 
01 introduction to umt snew
01 introduction to umt snew01 introduction to umt snew
01 introduction to umt snewsivakumar D
 
Chap 5. lsm overview and practice
Chap 5. lsm overview and practiceChap 5. lsm overview and practice
Chap 5. lsm overview and practicesivakumar D
 
SON,self optimized network
SON,self optimized networkSON,self optimized network
SON,self optimized networksivakumar D
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.engsivakumar D
 
Chap 3. e nb hardware description stc_ed01_0901
Chap 3. e nb hardware description stc_ed01_0901Chap 3. e nb hardware description stc_ed01_0901
Chap 3. e nb hardware description stc_ed01_0901sivakumar D
 
Chap 2. lte channel structure .eng
Chap 2. lte  channel structure .engChap 2. lte  channel structure .eng
Chap 2. lte channel structure .engsivakumar D
 
Chap 1. stc lte e nb overview
Chap 1. stc lte e nb overviewChap 1. stc lte e nb overview
Chap 1. stc lte e nb overviewsivakumar D
 
Utran example call_flows
Utran example call_flowsUtran example call_flows
Utran example call_flowssivakumar D
 
Umts network protocols and complete call flows
Umts network protocols and complete call flowsUmts network protocols and complete call flows
Umts network protocols and complete call flowssivakumar D
 
Complete umts call flow
Complete umts call flowComplete umts call flow
Complete umts call flowsivakumar D
 
Introduction to gsm
Introduction to gsmIntroduction to gsm
Introduction to gsmsivakumar D
 
Gsm fundamental-uku
Gsm fundamental-ukuGsm fundamental-uku
Gsm fundamental-ukusivakumar D
 

Plus de sivakumar D (17)

Nfv white paper3
Nfv white paper3Nfv white paper3
Nfv white paper3
 
Lzu 108-9106-lte-l13-enodeb-commissioning-course-description
Lzu 108-9106-lte-l13-enodeb-commissioning-course-descriptionLzu 108-9106-lte-l13-enodeb-commissioning-course-description
Lzu 108-9106-lte-l13-enodeb-commissioning-course-description
 
Gs nfv inf004v010101p
Gs nfv inf004v010101pGs nfv inf004v010101p
Gs nfv inf004v010101p
 
03 umts radio path and transmissionnew
03 umts radio path and transmissionnew03 umts radio path and transmissionnew
03 umts radio path and transmissionnew
 
02 umts network architecturenew
02 umts network architecturenew02 umts network architecturenew
02 umts network architecturenew
 
01 introduction to umt snew
01 introduction to umt snew01 introduction to umt snew
01 introduction to umt snew
 
Chap 5. lsm overview and practice
Chap 5. lsm overview and practiceChap 5. lsm overview and practice
Chap 5. lsm overview and practice
 
SON,self optimized network
SON,self optimized networkSON,self optimized network
SON,self optimized network
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
Chap 3. e nb hardware description stc_ed01_0901
Chap 3. e nb hardware description stc_ed01_0901Chap 3. e nb hardware description stc_ed01_0901
Chap 3. e nb hardware description stc_ed01_0901
 
Chap 2. lte channel structure .eng
Chap 2. lte  channel structure .engChap 2. lte  channel structure .eng
Chap 2. lte channel structure .eng
 
Chap 1. stc lte e nb overview
Chap 1. stc lte e nb overviewChap 1. stc lte e nb overview
Chap 1. stc lte e nb overview
 
Utran example call_flows
Utran example call_flowsUtran example call_flows
Utran example call_flows
 
Umts network protocols and complete call flows
Umts network protocols and complete call flowsUmts network protocols and complete call flows
Umts network protocols and complete call flows
 
Complete umts call flow
Complete umts call flowComplete umts call flow
Complete umts call flow
 
Introduction to gsm
Introduction to gsmIntroduction to gsm
Introduction to gsm
 
Gsm fundamental-uku
Gsm fundamental-ukuGsm fundamental-uku
Gsm fundamental-uku
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Gsm presentation shaikot

  • 1. GSM Protocol Architecture Shariful Hasan Shaikot Graduate Student Computer Science Department Oklahoma State University
  • 2. 2 Outline  What is GSM?  Nomenclature  GSM Protocol Architecture  Overview of Interfaces  GSM Protocol Stack  Overview of Layer-I  Overview of Layer-II  Overview of Layer-III
  • 3. 3 What is GSM?  GSM, the Global System for Mobile Communications, is a digital cellular communications system  GSM provides –  Digital Transmission  ISDN compatibility  Worldwide roaming in other GSM networks  Provides a model for 3G Cellular systems (UMTS)
  • 4. 4 Nomenclature  MS (Mobile Station) = ME (Mobile Equipment ) +SIM (Subscriber Identity Module)  BSS (Base Station Subsystem) = BTS (Base Transceiver Station) + BSC (Base Station Controller)  NSS (Network Switching Subsystem)  MSC (Mobile Switching Center): telephony switching function and authentication of user
  • 5. 5 GSM Protocol Stack  Layer 1: Physical Layer  Radio Transmission  Layer 2: Data Link Layer (DLL)  provides error-free transmission between adjacent entities, based on the ISDN’s LAPD protocol for the Um and Abis interfaces, and on SS7’s Message Transfer Protocol (MTP) for the other Layer interfaces  Layer 3: Networking or Messaging Layer  Responsible for the communication of network resources, mobility, code format and call-related management messages between various network entities - In any telecommunication system, signalling is required to coordinate the necessarily distributed functional entities of the network. - The transfer of signalling information in GSM follows the layered OSI model
  • 6. 6 GSM Protocol Architecture Layer 1 Layer 2 Layer 3 TDMA/FDM A
  • 7. 7 Overview of Interfaces  Um  Radio interface between MS and BTS  each physical channel supports a number of logical channels  Abis  between BTS and BSC  primary functions: traffic channel transmission, terrestrial channel management, and radio channel management A  between BSC and MSC  primary functions: message transfer between different BSCs to the MSC
  • 8. 8 The data link layer (layer 2) over the radio link is based on a modified LAPD (Link Access Protocol for the D channel) referred to as LAPDm (m like mobile). On the A-bis interface, the layer 2 protocol is based on the LAPD from ISDN. The Message Transfer Protocol (MTP) level 2 of the SS7 protocol is used at the A interface.
  • 9. 9 User Data and Control at Air Interface Two types of ISDN "channels" or communication paths: B-channel The Bearer ("B") channel: a 64 kbps channel used for voice, video, data, or multimedia calls. D-channel The Delta ("D") channel: a 16 kbps or 64 kbps channel used primarily for communications (or "signaling") between switching equipment in the ISDN network and the ISDN equipment
  • 10. 10 User Data and Control at Air Interface In GSM: • Bm channel for traffic / user data • Dm channel for signaling As in ISDN the Dm channel in GSM can be used for user data if capacity is available. GSM’s Short Message Service (SMS) uses this.
  • 11. 11 Layer I: Physical Layer Radio transmission forms this Layer
  • 12. 12 Layer I: Physical Layer  Modulation Techniques – Gaussian Minimum Shift Keying (GMSK)  Channel Coding  Block Code  Convolutional Code  Interleaving  To distribute burst error  Power control methodology – to minimize the co-channel interference  Time synchronization approaches
  • 13. 13 GSM Protocol Architecture for Speech – Air IF
  • 14. 14 GSM Physical Layer (MS Side) Speech in GSM is digitally coded at a rate of 13 kbps 456 bits every 20 ms 260 bits every 20 ms 8 57 bits block GMSK Convolutional Encoder 184 bits ( 20 ms)
  • 16. 16 GSM Normal Burst Formatting
  • 19. 19 Logical Channels in GSM  Two major classes of logical channels  Traffic Channels (TCHs)  Control Channels (CCHs)
  • 20. 20 Traffic Channels in GSM  Two types of TCHs  Full-rate traffic channel (TCH/F)  Half-rate traffic channel (TCH/H)
  • 21. 21 Control Channels in GSM  Three classes of control channels  Broadcast Channels (BCH)  Common Control Channels (CCCH)  Dedicated Control Channels (DCCH)
  • 22. 22 Layer II: Data Link Layer (DLL) Error-free transmission between adjacent entities
  • 23. 23 GSM – Layer II  Connection-based Network  Traffic  Signaling and Control  Signaling and control data are conveyed through Layer II and Layer III messages in GSM  Purpose of Layer II is to check the flow of packets for Layer III  DLL checks the address and sequence # for Layer III  Also manages Acks for transmission of the packets  Allows two SAPs for signaling and SMS  SMS traffic is carried through a fake signaling packet that carries user information over signaling channels  DLL allows SMS data to be multiplexed into signaling streams
  • 24. 24 GSM – Layer II  Signaling packet delivered to the physical layer is 184 bits which conforms with the length of the DLL packets in the LAPD protocol used in ISDN network  The LAPD protocol is used for A and A-bis interface  The DLL for the Um interface is LAPDm
  • 25. 25 LAPDm  The Link Access Procedure on the Dm channel (LAPDm) is the protocol for use by the data link layer on the radio interface.  Functions – organization of Layer 3 information into frames – peer-to-peer transmission of signaling data in defined frame formats – recognition of frame formats – establishment, maintenance, and termination of one or more (parallel) data links on signaling channels
  • 27. 27 Frame format (LAPDm) Address field: is used to carry the service access point identifier (SAPI), protocol revision type, nature of the message SAPI: When using command/control frames, the SAPI identifies the user for which a command frame is intended, and the user transmitting a response frame Control field: is used to carry Sequence number and to specify the types of the frame (command or response) Length indicator: Identifies the length of the information field that is used to distinguish the information carrying filed from fill-in bits Information Field: Carries the Layer III payload Fill-in bits: all “1” bits to extend the length to the desired 184 bits
  • 28. 28 Types of Frame of LAPDm  Three types of frames for  Supervisory functions  Unnumbered information transfer and control functions  Numbered information transfer
  • 29. 29 Address field format of LAPDm Link Protocol Discriminator: is used to specify a particular recommendation of the use of LAPDm C/R: Specifies a command or response frame Extended Address : is used to extend the address field to more than one octet (the EA bit in the last octet of the address should be set to 1, otherwise 0) Spare: reserved for future use
  • 30. 30 LAPD Vs. LAPDm  LAPDm uses no cyclic redundancy check bits for error detection  WHY?  Error correction and detection mechanism are provided by a combination of block and convolutional coding used (in conjunction with bit interleaving) in the physical layer
  • 31. 31 Layer II Messages - Set asynchronous balanced mode - Disconnect - Unnumbered acknowledgement - Receiver ready - Receiver not ready - Reject - These messages are sent in peer-to-peer Layer II communications, DLL ack. - These messages do not have Layer III information bits - Fill-in bits cover the “information bits” field
  • 32. 32 Layer II Messages (contd…) - The Paging Channel (PCH) is 176 bits. - The DLL packet for this signaling channel only have an EIGHT bit length of the field - 184 bits encoded into 456 bits - The 456 bits transmitted over 8 physical NBs - The Stand-alone Dedicated Control Channel (SDCCH) is 160 bits. - The DLL packet for this signaling channel has 3 8-bits used for address, control and length of the information field - The Slow Associated Control Channel (SACCH) is 144 bits. - The DLL packet for this signaling channel has 16 fill-in bits and 3 8-bits used for address, control and length of the information field
  • 33. 33 Layer III: Networking or Messaging Layer The layer 3 protocols are used for the communication of network resources, mobility, code format and call-related management messages between various network entities
  • 34. 34 Layer III  A number of mechanisms needed to establish, maintain and terminate a mobile communication session  Layer III implements the protocols needed to support these mechanisms  A signaling protocol, the registration process, is composed of a sequence of communication events or messages  Layer III defines the details of implementation of messages on the logical channels encapsulated in DLL frames
  • 35. 35 Layer III Message Format Transaction Identifier (TI): to identify a protocol that consists of a sequence of message, allows multiple protocols to operate in parallel Protocol Discriminator (PD): Identifies the category of the operation (management, supplementary services, call control) Message Type (MT): Identifies the type of messages for a given PD Information Elements (IE): An optional field for the time that an instruction carries some information that is specified by an IE identifier (IEI).
  • 37. 37 Layer III Message  Radio Resource Management (RR),  Mobility Management (MM) and  Connection Management (CM).
  • 39. 39 Mobility Management (MM) - Assumes a reliable RR connection - Responsible for - location management and - Security
  • 40. 40 Mobility Management (MM) - Location management involves the procedures and signaling for location updating, so that the mobile’s current location is stored at the HLR, allowing incoming calls to be properly routed. - Security involves the authentication of the mobile, to prevent unauthorized access to the network, as well as the encryption of all radio link traffic. - The protocols in the MM layer involve the SIM, MSC, VLR, and the HLR, as well as the AuC (which is closely tied with the HLR).
  • 41. 41 Connection Management (CM) The CM functional layer is divided into three sub layers. - Call Control (CC) - Supplementary Services - Short Message Service Call Control (CC) sub layer - manages call routing, establishment, maintenance, and release, and is closely related to ISDN call control.
  • 42. 42 Connection Management (CM) Supplementary Services sub layer - manages the implementation of the various supplementary services (Call Forwarding/waiting/hold ), and also allows users to access and modify their service subscription. Short Message Service sub layer - handles the routing and delivery of short messages, both from and to the mobile subscriber.
  • 43. 43 References  1. Principles of Wireless Networks: A Unified Approach, K. Pahlavan, P. Krishnamurthy  2. www.chu.edu.tw/~lhyen/wc/gsm.pdf  3. www.hit.bme.hu/~mihaly/mobil.hir/gsmbase.pdf  4. www-rp.lip6.fr/maitrise/articles/Rahnema.pdf  5.opetus.stadia.fi/kurki/Courses/DigMobile/2006_Spri ng_Course_materilas/DM_7_GSM_Protocol_Architect ure.pdf  6. Moe Rahnema, Overview of the GSM System and Protocol Architecture, IEEE Communications Magazine, April 1993
  • 44. 44 The END The slide is available at www.cs.okstate.edu/~shaikot Thank You