GSM Signaling

28
1 GSM Network and Services 2G1723 Johan Montelius GSM Network and Services Signaling protocols over Um - the air interface

description

GSM Signaling

Transcript of GSM Signaling

Page 1: GSM Signaling

1GSM Network and Services 2G1723 Johan Montelius

GSM Network and Services

Signaling protocols over Um - the air interface

Page 2: GSM Signaling

2GSM Network and Services 2G1723 Johan Montelius

ISDN

Signaling

VoiceLAPD

Layer 1 Layer 1

D B

Lay

er 2SAPI: 0,1,2...

Page 3: GSM Signaling

3GSM Network and Services 2G1723 Johan Montelius

Signaling protocols MS - BSS

LAPDm LAPDm LAPD

L1 L1 E1

LAPD

E1

RR BTSM BTSM

RRRR

MM

CC

Um Abis A

Layer 2

Layer 3

Page 4: GSM Signaling

4GSM Network and Services 2G1723 Johan Montelius

LAPDm

Signaling

VoiceLAPDm

BCH / CCCH / DCCH / TCH

Lay

er 2

SMS

SAPI:0 SAPI:3

Page 5: GSM Signaling

5GSM Network and Services 2G1723 Johan Montelius

LAPDm

• Provides:

– Segmentation and reassembly

– Frame filling; all layer one frames are of fixed length size depending on channel.

– Unacknowledge mode

– Acknowledge mode; window size = 1.

Page 6: GSM Signaling

6GSM Network and Services 2G1723 Johan Montelius

Transport of voice

Radio

Cipher

Coding

GSC

Radio

Cipher

Coding

E1 E1E1

GSC A-law

MS BTS BSC

Layer 1

GSM Source Coding (13 kb/s voice)

Page 7: GSM Signaling

7GSM Network and Services 2G1723 Johan Montelius

Transparent data

Radio

Cipher

Coding

UDI

Radio

Cipher

Coding

E1

MS BTS BSC

Layer 1 E1

MSC

E1

UDI

IWF

E1

TRAU

Unrestricted Digital Information

Page 8: GSM Signaling

8GSM Network and Services 2G1723 Johan Montelius

Non-transparent data

Radio

Cipher

Coding

UDI

Radio

Cipher

Coding

E1

MS BTS BSC

Layer 1 E1

MSC

E1

UDI

IWF

E1

RLP RLP

Radio Link Protocol

TRAU

Page 9: GSM Signaling

9GSM Network and Services 2G1723 Johan Montelius

Circuit swicthed data

• Circuit switched data, transparent or non transparent, comes in bitrates up to 14,4 kb/s.

• High Speed Circuit Switched Data (HSCSD) can combine four time slots in to one data channel of a maximum of 4x14.4 = 57.6 kb/s. Operator/terminals often limit this to 3x14.4 down link and14.4 up or 2x14.4 in both directions.

• GPRS is taking over from HSCSD.

Page 10: GSM Signaling

10GSM Network and Services 2G1723 Johan Montelius

Signaling protocols MS - BSS

LAPDm LAPDm LAPD

L1 L1 E1

LAPD

E1

RR BTSM BTSM

RRRR

MM

CC

Um Abis A

Layer 2

Layer 3

Page 11: GSM Signaling

11GSM Network and Services 2G1723 Johan Montelius

LAPDm

SAPI: 0 SAPI: 3

RA UI UI/I UI/I UI UI/I UI/I

Mux

RA

CH

BC

CH

FAC

CH

SDC

CH

PCH

/A

GC

H

SAC

CH

Page 12: GSM Signaling

12GSM Network and Services 2G1723 Johan Montelius

LAPDm

• UI-frames (Unnumbered Information) are unacknowldedge frames used for broadcasting and common control messages (who should acknowledge?). Also used by messages on the SACCH.

• I-frames (information) are acknowledged by the reciever. The window size is set to 1 so we only send one frame at a time. Used by SDCCH and FACCH (handover).

Page 13: GSM Signaling

13GSM Network and Services 2G1723 Johan Montelius

Layer 3 RR/MM/CM

SAPI 3 SAPI 0

CC SS SMS

MM

RR

Page 14: GSM Signaling

14GSM Network and Services 2G1723 Johan Montelius

Radio Resource Management

• Administration of frequencies and channels.

• Monitor BCCH and PCH of the current cell.

• Monitor neighboring cells for cell re-selection.

• Request/setup/take down dedicated channels.

• Monitor and report signal quality of dedicated channels.

• Handover (initiated by BSS).

• Encryption/decryption.

Page 15: GSM Signaling

15GSM Network and Services 2G1723 Johan Montelius

Radio Resource Management

• In idle mode: the BSS sends System Information Type 1-4 on the BCCH. This will give the mobile information about current cell and neighbors.

• In dedicated mode: The BSS sends System Information Type 5-6 on the SACCH. The mobile sends measurement reports on the SACCH (TA is piggy-backing on SACCH layer 1 frame)

• Monitoring of neighbors can be done between bursts. Monitoring of BCH can be done in the idle frame.

Page 16: GSM Signaling

16GSM Network and Services 2G1723 Johan Montelius

Mobility Management

• Attach and detach of subscribers (SIM).

• Localization of subscriber (paging)

• Location updating (mobile station is responsible).

• Authentication of subscriber.

• Confidentiality of subscriber

– allocating TMSI

Page 17: GSM Signaling

17GSM Network and Services 2G1723 Johan Montelius

Connection Management

• Call Control

– establish and terminate calls

– call related supplementary services

• Supplementary Services

– call forwarding / barring

– Number identification

– Charging

• SMS

– Sending and receiving of short messages

Page 18: GSM Signaling

18GSM Network and Services 2G1723 Johan Montelius

RR procedures – connection setup

MS BSSChannel Request

Immediate Assignment

RACH

AGCH

How does the mobile identify himself?

How do we know it's our assignment?

Channel Request

Page 19: GSM Signaling

19GSM Network and Services 2G1723 Johan Montelius

RR procedures – connection setup

MS BSS

Channel Request

Immediate Assignment

PCH

AGCH

How do we know it's our page?

Paging Response

Paging Request

SDCCH

LAPDm Connection setup

Do we have to listen all the time?

RACH

Page 20: GSM Signaling

20GSM Network and Services 2G1723 Johan Montelius

RR procedures – connection release

MS BSS

SDCCH

Always sent by the BSS.

Connection Release

Mobile returns to idle state.

LAPDm Connection release

Page 21: GSM Signaling

21GSM Network and Services 2G1723 Johan Montelius

RR procedures – handover

MS BSS

Handover Access

Physical Information

FACCH:

How does the new BSS know it's us??

Handover Complete

Handover Command

Switch to new Channel

Handover Access

(access burst)

Page 22: GSM Signaling

22GSM Network and Services 2G1723 Johan Montelius

RR procedures – ciphering

MS BSS

Cipher Mode Compleet

SDCCH:

From where do we get the keys?

Cipher Mode Command

Start encryption

Page 23: GSM Signaling

23GSM Network and Services 2G1723 Johan Montelius

MM procedures – authentication

MS BSS

Authentication response

SDCCH

Authentication is done by encrypting a challenge (RAND) with a shared key (Ki) and sending back the result (SRES)?

Authentication Request

Page 24: GSM Signaling

24GSM Network and Services 2G1723 Johan Montelius

MM procedures – confidentiality

MS BSS

TMSI Reallocation complete

SDCCHTMSI reallocation Command

Page 25: GSM Signaling

25GSM Network and Services 2G1723 Johan Montelius

MM procedures

• Procedures are divided into:

– Common: can be performed anytime

– Specific: one at a time

– MM Connection Management: requests by CM procedures for establishment of services.

Page 26: GSM Signaling

26GSM Network and Services 2G1723 Johan Montelius

MM procedures – location update

MS BSS

Location Update request

Location Update Accept

SDCCH

TMSI reallocation complete

identification

authentication

cipher mode

Page 27: GSM Signaling

27GSM Network and Services 2G1723 Johan Montelius

MM procedures – connection management

MS BSS

CM - Service Request

CM – Service Accept

SDCCH

identification

authentication

cipher mode

Page 28: GSM Signaling

28GSM Network and Services 2G1723 Johan Montelius

Incomming callMS BSS

paging (PCH)

assigned (AGCH)

channel req (RACH)

paging resp (SDCCH)

auth req and resp (SDCCH)

cipher setup (SDCCH)

call setup (SDCCH)

call connect (FACCH)

talk (TCH)