SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
3 Air Interface

    Objectives
    After this chapter the student will:
    • be able to describe the structure of the air interface.
    • be able to understand the build-up of a burst.
    • be able to recognise the different logical channels and their functions.
    • be able to understand how the different logical channels are mapped on
      physical ones.




     3.1 INTRODUCTION ........................................................................2

     3.2 ACCESS THEORY ......................................................................2
       FDMA - Frequency Division Multiple Access .............................2
       TDMA - Time Division Multiple Access ......................................2
       CDMA - Code Division Multiple Access .....................................3
       The International Cocktail Party ................................................3

     3.3 STRUCTURE .............................................................................4

     3.4 BURSTS ...................................................................................6
       Normal burst ..............................................................................6
       Access Burst ...............................................................................6

     3.5 LOGICAL CHANNELS ................................................................7

     3.6 MAPPING ON PHYSICAL CHANNELS ...........................................9
       The Broadcast and Common Control CHannels..........................9
       The Dedicated Control CHannels .............................................10
       The Traffic channels .................................................................12

     3.7 APPENDIX..............................................................................14




Michael Quek                                                                                           1
3.1 Introduction
          The air interface, called ”Um” in the specification, is the most important
          interface in the GSM specification for two reasons:
          • It needs to be completely specified to enable a mix of manufacturers of
             mobile stations to be used in a mix of systems from different suppliers.
          • Spectral efficiency is absolutely fundamental to get economy in a
             system. Spectral efficiency is dependant on the number of simultaneous
             calls that can be made using a certain frequency band, but also on the
             resistance to interference which determines reuse distance and thereby
             the capacity limit of the network.



  3.2 Access theory
          This will be a brief description of the fundamental differences between a
          Frequency Division Multiple Access (FDMA), a Time Division Multiple
          Access (TDMA) and a Code Division Multiple Access (CDMA)
          technology.

          FDMA - Frequency Division Multiple Access
          FDMA is used for standard analogue mobile telephony. Each user is
          assigned a discrete slice of the RF spectrum. FDMA permits only one user
          per channel since it allows the user to use the channel 100% of the time.
          Therefore, only the frequency dimension is used to define channels.
          Spacing between the frequencies used is normally around 25-30 kHz for
          most of the analogue cellular system (25 kHz for NMT and TACS, 30 kHz
          for AMPS).

          TDMA - Time Division Multiple Access
          In TDMA the users are still assigned a discrete slice of RF spectrum, but
          multiple users now share that RF carrier on a time slot basis. Each of the
          users alternates their use of the RF channel. Frequency division is still
          employed, but these carriers are now further sub-divided into some
          number of time slots per carrier (3 for TDMA-AMPS, 8 for full rate GSM,
          16 for half rate GSM).

          A user is assigned a particular time slot on a carrier whether the other time
          slots are being used or not. The information flow is not continuous for any
          user, but is sent in burst. The bursts are re-assembled at the receiving end,
          and appear to provide continuous sound because of the speed of the
          process.




Michael Quek                                                                              2
CDMA - Code Division Multiple Access
          In CDMA there is no time division, and all users use the entire carrier, all
          the time. The allocated frequency segment for a CDMA carrier is
          considerably larger than for a carrier used in FDMA or TDMA (1.25 MHz
          per carrier). To distinguish the different users occupying the same
          frequency band simultaneously, each user is assigned a binary code.



                             Code      Time




                                                          Freq
                                              FDMA
                      Code
                                       Time




                                                        Freq
                                              TDMA


                    Code

                                Time




                                                        Freq
                                          CDMA


          FDMA, TDMA and CDMA



          The International Cocktail Party
          To illustrate the conceptual differences among the multiple access
          technologies, the “International Cocktail Party” analogy can be used.
          Picture a large room with a number of people, in pairs, who would like to
          hold conversations. The people in each pair only want to talk and listen to
          each other, and have no interest in what is being said in other pairs. In
          order for these conversations to keep place, however, it is necessary to
          define the environment for each conversation.

          Dividing one large room into a number of small rooms creates the FDMA
          environment. A single pair of people would enter each small room for a
          conversation. When that conversation is complete, they would leave and
          another pair would be able to enter.



Michael Quek                                                                             3
In a TDMA environment, each of these small rooms would be able to
          accommodate multiple conversations simultaneously. For example, with a
          8 slot TDMA system each room would contain up to 8 pairs of people,
          with each pair taking turns talking. Think of each pair having the right to
          speak for 125 m seconds during each second.

          In CDMA, pairs of people will enter the single large room. However if
          every pair uses a different language, the can all use the air in the room as a
          carrier for their voices. The analogy here is that the air in the room is the
          wideband “carrier” and the languages the codes used to identify the
          CDMA user.

          Theoretically, we can continue adding pairs, each speaking a unique
          language (as defined by the unique code) until the overall background
          noise (interference from other users) makes it too difficult for some of the
          people to understand the other in the pair.

          Therefore, the maximum number of users, or effective traffic channels, per
          carrier depends on the amount of activity that is going on in each channel.
          Additional user (or conversation, in our analogy) may be accommodated,
          but at the cost of more interference to the other users.



  3.3 Structure
          The frequency band specified for GSM is 890-915 MHz for the uplink (up
          to the base station) and 935-960 MHz for the downlink (down from base
          station). The corresponding bands used for GSM 1800 are 1710-1785 for
          the uplink and 1805-1880. One full duplex channel is made up of a pair of
          frequencies; one frequency for the uplink and one frequency for the
          downlink. The distance between the frequencies used for up- and
          downlink, the duplex distance, is 45 M Hz for GSM and 95 M Hz for the
          GSM 1800 system.

          The frequencies on the up link are separated by 200 k Hz. The same goes
          for down link frequencies. This distance is called carrier spacing and will
          give us 124 carriers for GSM 900 and 374 for GSM 1800 in the frequency
          band stated above. Each of these carriers will fit 8 multiplexed time slots
          in the full rate version.

          Let us define two types of channels used in the GSM vocabulary, a
          ”Physical Channel” and a ”Logical Channel”:




               a physical channel is one time slot on one carrier



Michael Quek                                                                               4
a logical channel is specific type of information carried
               by a physical channel


          This means that all the different sorts of information, whether it is traffic
          or control signalling, will be sent on different logical channels. The logical
          channels are then mapped or multiplexed on the physical channels
          according to a certain structure. This structure will set the rules concerning
          when and on which physical channel the information will be sent.

          To define a ”Burst” one would say that:


               a burst is a formatted sequence of bits sent during one time slot


          Due to the TDMA structure with timeslots, we do not send continuously
          but only in the designated time slots. The information sent during one time
          slot is formatted into a burst.


                                                   4,615 ms

                              0     1      2        3        4       5      6     7




                                   Data             Training             Data

                          3          57        1        26       1        57          3


                                                     Burst
                                                    148 Bits
                                                   156.25 Bits
                                                     0.577 ms

          The burst is the formatted sequence of bits sent during one time slot




Michael Quek                                                                               5
3.4 Bursts
          The information is structured slightly different depending on what kind of
          logical channel it belongs to.

          The bursts are of five types;
             • normal burst
             • access burst
             • frequency correction burst
             • synchronisation burst
             • dummy burst

          Normal burst
          The normal burst is used for transmission of traffic and for some control
          signalling. The normal burst contains;
          • 2 information fields, each with 57 bits, used for encrypted speech or
             data
          • a training sequence to be used by the equaliser in the receiver
          • 2 bits to indicate whether the burst is "stolen" to be used as a FACCH
             (see Logical Channels) or “non stolen” to be used for TCH.
          • 3 bits in each end to serve as start and stop bits.


               TB   Encrypted bits    1 Training sequence 1   Encrypted bits   TB   GP
                3       57                     26                 57            3    8.25
          The normal burst



          Access Burst
          The access burst is used whenever the MS wants to get in contact with the
          network. At that time it is not known how far away the MS is from the
          base station. If the mobile is far away, the access burst might arrive too
          late to fit in the assigned time slot. Therefore the access burst is as short as
          possible, to allow a certain delay without interfering with the next time
          slot.

               TB                    Information                        Guard Period
               8                                                          68.25
          The access burst




Michael Quek                                                                                 6
The other types of bursts are only sent downlink from the base station.
         • The synchronisation burst is used to let the mobiles synchronise to the
            TDMA-structure, i.e. to know when certain information is broadcasted.
         • The frequency correction burst is sent so that the MSs can tune their
            frequencies to the frequency sent out from the base station.
         • The dummy burst is used when the base station is forced to transmit
            although it has no information to send. As a fact, there is a need for
            transmission in all time slots on certain carriers. The reason is that the
            MS uses those carriers for measurements in order to rank the base
            stations according to the received signal strength.



  3.5 Logical channels
          If we could we would probably want to fill all our available physical
          channels with traffic. However, control channels are required for setting up
          a radio connection, for setting up a call or controlling an MS during
          conversation.

          These are the logical channels for control signalling;
          ô FCCH, (Frequency Correction CHannel), On this channel a pure sine
          wave is transmitted. The first purpose is orientation for the mobile among
          all the yet incomprehensible information sent, a perfect sine wave could be
          found by the mobile. This will indicate where in the information flow it is
          listening. The second purpose is for the mobile to tune its frequency. Here
          the frequency correction burst is used.

          ô  SCH, (Synchronisation CHannel), This channel contains information
          about the number of the TDMA-frame monitored by the MS. SCH also
          contains the so called BSIC ( Base Station Identity Code ) that will inform
          the mobile station if it is listening to the correct frequency and aloud
          PLMN . The logical channel SCH is carried by a synchronisation burst.

          ô  BCCH, (Broadcast Control CHannel), contains general information
          about the cell, so that the MS knows how to behave. The information
          supplied could be maximum output power allowed at access, the
          frequencies of neighbouring cells for the MS to monitor, Location Area
          Identity, or whether the cell is barred etc. BCCH is transmitted downlink,
          point-to-multipoint.

          ô PCH, (Paging CHannel), is monitored at certain intervals by every idle
          MS. If there is an incoming call, or a Short Message, the network will
          page the MS, using the PCH in all cells in the location area where the MS
          is registered. The PCH contains the MS identity number, the IMSI or
          TMSI. PCH is transmitted downlink, point-to-point.




Michael Quek                                                                             7
ö  RACH, (Random Access CHannel), is used by the mobile when
          making its first access to the system. By making that access, the MS is
          requesting a signalling channel. The reason for the access could be a page
          response, or initiation of a call. Since the distance between the MS and the
          base station is unknown, the access burst will be kept as short as possible
          so as not to interfere with the adjacent time slot. RACH is sent uplink,
          point-to-point.

          ô  AGCH, (Access Granted CHannel), is used for the acknowledgement
          of the access attempt sent on RACH. On this channel the MS will be
          assigned a signalling channel (SDCCH/SACCH) to continue the signalling
          according to the reason for the access. AGCH is sent downlink, point-to-
          point.

          ôö  SDCCH, (Stand-alone Dedicated Control CHannel), is the channel on
          which the actual signalling will take place. This may be used for call set-
          up, authentication, ciphering or transmission of text messages (Short
          Message and Cell Broadcast). This bi-directional channel is subdivided
          into eight (in some cases four) sub-channels so that each can handle the
          signalling needed by one MS. Thus, eight (or four) calls can be set up
          simultaneously. At call set-up, the MS will be assigned a TCH after the
          signalling on SDCCH is completed. SDCCH is transmitted up- and
          downlink, point-to-point.

          ôö SACCH, (Slow Associated Control CHannel), is used to transfer
          signalling data while we have an ongoing conversation on a TCH or while
          the SDCCH is being used. This channel can carry about two messages per
          second in each direction. It is used for non-urgent procedures. On the
          downlink the MS is informed about what neighbouring cells to measure on
          for handover purposes. The MS is also ordered to use a certain power and
          timing advance. On the uplink the MS will report about measurements
          done. SACCH is transmitted up- and downlink, point-to-point.

          ôö  FACCH, (Fast Associated Control CHannel), is used when there is a
          need for higher capacity signalling in parallel with on-going traffic.
          FACCH works in "stealing mode", meaning that the transmitting side
          throws away a 20 ms segment of speech to fill the bursts with signalling
          information instead. When doing so, the transmitting side must set the
          "stolen bit indicator" to 1. When noting, on the receiving side, that the
          stolen bit indicator is set to 1, the bursts will be handled as signalling
          information. To lessen the disturbance of the speech, the last speech
          segment will be repeated. The FACCH is mainly used for handover
          commands. FACCH is transmitted both up- and downlink, point-to-point.




Michael Quek                                                                             8
This is the logical channel for traffic:
          ôö TCH, Traffic CHannel. The TCH could be of two types, full rate
          (TCH/F) and half rate (TCH/H). The TCH/F could be used for speech or
          for data. The bit rate for speech is 13 kbit/s (gross rate 22.8 kbit/s) while
          the corresponding rate for data is a maximum of 9.6 kbit/s. One TCH/F
          occupies one physical channel, while TCH/H occupies half a physical
          channel (i.e. every second time slot). This TCH/H may be used for approx.
          5.6 kbit/s (gross rate 11.4 kbit/s) speech or data at 4.8 kbit/s or lower.



  3.6 Mapping on physical channels
          The control channels mentioned above are transmitted according to certain
          rules concerning what physical channel (frequency and time slot) to use
          and how often they are to be repeated. We say that logical channels are
          mapped, or multiplexed on the physical channels.

          The TDMA-frames are grouped together into multi-frames that are then
          repeated cyclically. There are basically two types of multi frames; the 26
          TDMA multi-frame used for traffic and the 51 TDMA multi-frame used
          for control signalling.

          At a base station with n carriers, the carriers are called c0, c1, c2,...cn-1, all
          having eight time slots. On time slot 0 on the c0 carrier, we map a channel
          combination of only control channels

          The Broadcast and Common Control CHannels
          TS0 on c0 are grouping the information into a 51 TDMA multi-frame. It
          contains:

          • BCH, Broadcast channels
            FCCH, in the figure denoted F, always starts the multi-frame. It will be
            repeated every 10 TDMA-frames.
            SCH, here-denoted S, always follows FCCH. It will be repeated every
            10 TDMA frames, just like FCCH.
            BCCH, here-denoted B, will come next. It needs 4 consecutive TDMA
            frames to transmit the information.
          • CCCH, Common Control CHannels, that here are denoted by C. CCCH
            downlink could be either PCH or AGCH. Whatever it is, it will use a
            block of four consecutive TDMA frames. As shown in the figure, nine
            CCCH-blocks can be fitted in one 51 TDMA multi-frame.
          • I stand for Idle, even though in this case it is really a dummy burst
            being transmitted. Since other MSs might be measuring signal strength
            by monitoring this physical channel, something must always be
            transmitted. Therefore, in TDMA frame 51, when we have nothing to
            send, a dummy burst will nevertheless be sent.




Michael Quek                                                                                   9
F : FCCH
               TDMA                                                           S : SCH
                         0 1 2           7 0 1 2           7 0 1 2            B : BCCH
               frames
                                                                              C : CCCH (PCH or AGCH)
                                                                              I : Idle



                          F S    B      C   1 F S   C          C   F S   C     C     F S   C       C    F S    C       C       I




          Mapping of logical channels on TS0 on c0 downlink.


          Next we will take a look at TS0 on c0, but uplink. The only logical channel
          to be mapped here is the access channel RACH.


               TDMA 0 1 2                                                                  R : RACH
                                     7 01 2             70 1
               frames




                        R R RR R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R



          Mapping on TS0 on c0 uplink.



          The Dedicated Control CHannels
          The Dedicated Control CHannels are usually mapped on TS1 on c0, up- as
          well as downlink the information is grouped into 102 TDMA multi-
          frames. In these frames we will find:

          • SDCCH, here denoted as D, is divided into eight sub-channels. Each
            SDCCH sub-channel is occupying a block of four consecutive TDMA
            frames. As soon as the MS has finished using a certain SDCCH sub-
            channel, it can be used by another MS.
          • SACCH, here denoted as A. For each SDCCH sub-channel there is a
            corresponding SACCH. This channel is used to transfer signalling
            information concerning measurements during call set-up.

          The uplink looks similar to the downlink for TS1, c0 . The only difference
          is that the uplink is a number of TDMA frames delayed in relation to
          downlink.




Michael Quek                                                                                                                       10
0 1 2                  7 0 1 2                    70 1 2                         TDMA                      Dx : SDCCH no.x
                                                                                                        frames                    Ax : SACCH no.x
                                                                                                                                   I : Idle


                                                                                                                                                                                        *
                          D0             D1          D2             D3        D4         D5         D6        D7          A0       A1             A2          A3            I I I


               *
                          D0             D1          D2             D3        D4         D5         D6        D7          A4       A5              A6         A7            I I I

                        SDCCH + SACCH (Downlink)




                       0 1 2                   7 0 1 2                       70 1 2                 TDMA                               Dx : SDCCH no.x
                                                                                                                                       Ax : SACCH no.x
                                                                                                    frames
                                                                                                                                        I : Idle



                                                                I I I                  D1                                                                                   A0          *
                           A5            A6              A7                  D0                    D2         D3         D4        D5             D6        D7


                   *
                           A1             A2             A3     I I I        D0        D1          D2         D3         D4       D5              D6        D7              A4


                         SDCCH + SACCH (uplink)


          Mapping on TS1 on C0 downlink and uplink.


          Also specified is a channel combination that combines all the control
          channels into one time slot, following a 102 TDMA frame repeating
          pattern. This combination is mostly used in cells with only one frequency.


                         F S        B          C         F S        C         C    F S        D0         D1    F S       D2       D3        F S        A0         A1        I       *


               *                                     1
                         F S        B          C         F S        C         C    F S        D0         D1    F S       D2       D3        F S        A2         A3        I


                         BCCH + CCCH + SDCCH + SACCH (downlink)




                               D3       R R     A2             A3        R         R           R          R          R    R R R        D0          D1       R R        D2           *


               *
                               D3       R R     A0             A1        R         R           R          R          R    R R R        D0          D1       R R        D2


                         BCCH + CCCH + SDCCH + SACCH (uplink)



          Alternative mapping on TS0 on C0 downlink and uplink.




Michael Quek                                                                                                                                                                                11
The Traffic channels
          On TS2-TS7 on the c0 and on TS0-TS7 on all the other carriers, the
          information is grouped into 26 TDMA multi-frames. In these multi-frames
          we will find;
          • TCH, denoted as T, containing data or speech.
          • SACCH, denoted A, carrying the control signalling necessary during
             traffic, for instance measurement data, power orders, or timing advance
             orders.
          • Idle frames, denoted I. This is not a logical channel. This is only to
             indicate that the transmitter is off during this particular TDMA frame.
             This short period of silence is used by the MS to read BSIC, sent out
             from one of the neighboring cells base stations.



                 T : TCH               TDMA
                                                 0 1 2        7 0 1 2         70 1 2
                 A : SACCH             frames
                 I : Idle


                            TCH
                                       T T T T T T T T T T T T A T T T T T T T T T T T T I
                          D ownlink

          Mapping on TS2-7 on c0 or TS0-TS7 on any other carrier, downlink.


          The half rate Traffic channels
          For half rate the bit rate needed per traffic channel will be cut from 13 k
          bit/s down to approximately half to enable up to twice as much traffic.

          To keep the structure of the air interface unchanged, the half rate channels
          will still use a burst of the same structure, fitted in a time slot of the same
          size. Since only half the capacity is needed for speech in a half rate MS, it
          will use only every second time slot. This means that the MS is left with
          plenty of time to do other things, such as measuring the signal strength of
          the neighbouring base stations.




Michael Quek                                                                                 12
TDMA-frame

                      T T T T T T T T T T T T A T T T T T T T T T T T T I

                                                                    26 frames = 120 ms


                                          Multiframe for half-rate channels for MS0 and MS1

                      T0        T0        T0        T0        T0        T0        A0 T0        T0        T0        T0        T0        T0
                           T1        T1        T1        T1        T1        T1           T1        T1        T1        T1        T1        T1 A1

                                                                   26 frames = 120 ms


          Mapping of full and half rate traffic channels


          One half rate MS can also be assigned both half rate channels in a physical
          channel. This is if the MS is using one channel for speech and one for data.




Michael Quek                                                                                                                                        13
3.7 Appendix




                                                     1 hyperframe = 2048 superframes = 2 715 648 TDMA frames (3 H 28 min 53 sec 760 ms)


                0           1       2        3                                                                                                                      2047    2047     2047        2047




                                                                                 1 superframe 0 1326 TDMA frames (6.12 sec)
                                                                       ( = 51 (26-frame) multiframes or 26 (51-frame) multiframes)
                        0       1       2                                                                                                                              48       49          50

                            0           1                                                                                                                             24               25




                    1 (26-frame) multiframe = 26 TDMA frames (120 ms)                                                                      1 (51 frame) multiframe = 51 TDMA frames (3060/13 ms)


      0    1        2       3                                                   22       23   24       25                      0       1     2   3                                                47    48   49   50



                                                                                         1 TDMA frame = 8 time slots (4.615 ms)

                                                                            0            1         2        3     4        5       6         7


                                                                          1 time slot = 156.25 bit durations (0.577 ms)


 Normal burst                           TB            Encrypted bits                          Training sequence                Encrypted bits           TB GP       TB: Tail bits
                                         3                 57                        1               26               1             57                   3 8.25
 Flag is relevant only for TCH                                                                                                                                      GP. guard period


                                        TB                                                         Fixed bits                                           TB GP
 Frequency correction burst
                                         3                                                            142                                                3 8.25



                                        TB            Encrypted bits                      Synchronization sequence             Encrypted bits           TB GP
 Synchronization burst
                                         3                 39                                       64                              39                   3 8.25



 Access burst
                                        TB       Synchronization sequence                     Encrypted bits          TB                      GP
                                         8                 41                                      36                  3                     68.25



                                        TB                Mixed bits                          Training sequence                Mixed bits               TB GP
 Dummy burst
                                         3                   58                                       26                          58                     3 8.25




Summary of frames and bursts




          Michael Quek                                                                                                                                                                                       14
Downlink                                     Uplink
                  0   1    2    3     4    5       6   7   0   1    2     3      4   5   6    7
TDMA frame 0      F   D0   T    T     T    T       T   T   R   A5   T     T      T   T   T    T
                  S   D0   T    T     T    T       T   T   R   A5   T     T      T   T   T    T
                  B   D0   T    T     T    T       T   T   R   A5   T     T      T   T   T    T
                  B   D0   T    T     T    T       T   T   R   A5   T     T      T   T   T    T
                  B   D1   T    T     T    T       T   T   R   A6   T     T      T   T   T    T
                  B   D1   T    T     T    T       T   T   R   A6   T     T      T   T   T    T
                  C   D1   T    T     T    T       T   T   R   A6   T     T      T   T   T    T
                  C   D1   T    T     T    T       T   T   R   A6   T     T      T   T   T    T
                  C   D2   T    T     T    T       T   T   R   A7   T     T      T   T   T    T
                  C   D2   T    T     T    T       T   T   R   A7   T     T      T   T   T    T
                  F   D2   T    T     T    T       T   T   R   A7   T     T      T   T   T    T
                  S   D2   T    T     T    T       T   T   R   A7   T     T      T   T   T    T
          12      C   D3   A    I     A    I       A   I   R   I    A     I      A   I   A    I
                  C   D3   T    T     T    T       T   T   R   I    T     T      T   T   T    T
                  C   D3   T    T     T    T       T   T   R   I    T     T      T   T   T    T
                  C   D3   T    T     T    T       T   T   R   D0   T     T      T   T   T    T
                  C   D4   T    T     T    T       T   T   R   D0   T     T      T   T   T    T
                  C   D4   T    T     T    T       T   T   R   D0   T     T      T   T   T    T
                  C   D4   T    T     T    T       T   T   R   D0   T     T      T   T   T    T
                  C   D4   T    T     T    T       T   T   R   D1   T     T      T   T   T    T
                  F   D5   T    T     T    T       T   T   R   D1   T     T      T   T   T    T
                  S   D5   T    T     T    T       T   T   R   D1   T     T      T   T   T    T
                  C   D5   T    T     T    T       T   T   R   D1   T     T      T   T   T    T
                  C   D5   T    T     T    T       T   T   R   D2   T     T      T   T   T    T
                  C   D6   T    T     T    T       T   T   R   D2   T     T      T   T   T    T
          25      C   D6   I    A     I    A       I   A   R   D2   I     A      I   A   I    A
                  C   D6   T    T     T    T       T   T   R   D2   T     T      T   T   T    T
                  C   D6   T    T     T    T       T   T   R   D3   T     T      T   T   T    T
                  C   D7   T    T     T    T       T   T   R   D3   T     T      T   T   T    T
                  C   D7   T    T     T    T       T   T   R   D3   T     T      T   T   T    T
                  F   D7   T    T     T    T       T   T   R   D3   T     T      T   T   T    T
                  S   D7   T    T     T    T       T   T   R   D4   T     T      T   T   T    T
                  C   A0   T    T     T    T       T   T   R   D4   T     T      T   T   T    T
                  C   A0   T    T     T    T       T   T   R   D4   T     T      T   T   T    T
                  C   A0   T    T     T    T       T   T   R   D4   T     T      T   T   T    T
                  C   A0   T    T     T    T       T   T   R   D5   T     T      T   T   T    T
                  C   A1   T    T     T    T       T   T   R   D5   T     T      T   T   T    T
                  C   A1   T    T     T    T       T   T   R   D5   T     T      T   T   T    T
          38      C   A1   A    I     A    I       A   I   R   D5   A     I      A   I   A    I
                  C   A1   T    T     T    T       T   T   R   D6   T     T      T   T   T    T
                  F   A2   T    T     T    T       T   T   R   D6   T     T      T   T   T    T
                  S   A2   T    T     T    T       T   T   R   D6   T     T      T   T   T    T
                  C   A2   T    T     T    T       T   T   R   D6   T     T      T   T   T    T
                  C   A2   T    T     T    T       T   T   R   D7   T     T      T   T   T    T
                  C   A3   T    T     T    T       T   T   R   D7   T     T      T   T   T    T
                  C   A3   T    T     T    T       T   T   R   D7   T     T      T   T   T    T
                  C   A3   T    T     T    T       T   T   R   D7   T     T      T   T   T    T
                  C   A3   T    T     T    T       T   T   R   A0   T     T      T   T   T    T
                  C   I    T    T     T    T       T   T   R   A0   T     T      T   T   T    T
                  C   I    T    T     T    T       T   T   R   A0   T     T      T   T   T    T
          50      I   I    T    T     T    T       T   T   R   A0   T     T      T   T   T    T
                           I    A     I    A       I   A            I     A      I   A   I    A


               Mapping of logical channels on C0




   Michael Quek                                                                          15
3 Air Interface Structure and Logical Channels

Mais conteúdo relacionado

Mais procurados

TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessvish0110
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite CommunicationZunAib Ali
 
multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communicationSajid ali
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communicationDr.Umadevi V
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)bheemsain
 
Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G ruikarsachin
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniquesggpriya me
 
Common protocols
Common protocolsCommon protocols
Common protocolsMr SMAK
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessGowriLatha1
 
03 time division-multiplexing
03 time division-multiplexing03 time division-multiplexing
03 time division-multiplexingRafeek Mohamed
 

Mais procurados (20)

three
threethree
three
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communication
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Test
TestTest
Test
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
Tdm & fdm
Tdm & fdmTdm & fdm
Tdm & fdm
 
Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
 
03 time division-multiplexing
03 time division-multiplexing03 time division-multiplexing
03 time division-multiplexing
 

Semelhante a 3 Air Interface Structure and Logical Channels

Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access proceduresabishajesus
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxNAVAMISURESH2
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532kassayemamo
 
Assignment of wireless c ommunication
Assignment of wireless c ommunicationAssignment of wireless c ommunication
Assignment of wireless c ommunicationvish0110
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...NadaAAmin
 
wireless communication
wireless  communicationwireless  communication
wireless communicationcosmic123
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptxSaemaAzim
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 

Semelhante a 3 Air Interface Structure and Logical Channels (20)

Apr7.pdf
Apr7.pdfApr7.pdf
Apr7.pdf
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
 
Tdm and fdm
Tdm and fdmTdm and fdm
Tdm and fdm
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
WCN U5.pptx
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
MA Presentation.pptx
MA Presentation.pptxMA Presentation.pptx
MA Presentation.pptx
 
Assignment of wireless c ommunication
Assignment of wireless c ommunicationAssignment of wireless c ommunication
Assignment of wireless c ommunication
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
doc_raj.docx
doc_raj.docxdoc_raj.docx
doc_raj.docx
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
wireless communication
wireless  communicationwireless  communication
wireless communication
 
4.fdm,tdm,tfm
4.fdm,tdm,tfm 4.fdm,tdm,tfm
4.fdm,tdm,tfm
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptx
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD  FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD  FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD FILE )
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
 

Mais de Sokunth Che

Authentication and Ciphering
Authentication and CipheringAuthentication and Ciphering
Authentication and CipheringSokunth Che
 
Location Updating
Location UpdatingLocation Updating
Location UpdatingSokunth Che
 
Switching System
Switching SystemSwitching System
Switching SystemSokunth Che
 
Base Station System
Base Station SystemBase Station System
Base Station SystemSokunth Che
 
Access And Radio Theory
Access And Radio TheoryAccess And Radio Theory
Access And Radio TheorySokunth Che
 
System Introduction
System IntroductionSystem Introduction
System IntroductionSokunth Che
 
GSM Among Other Systems
GSM Among Other SystemsGSM Among Other Systems
GSM Among Other SystemsSokunth Che
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesSokunth Che
 
Basic english usage
Basic english usageBasic english usage
Basic english usageSokunth Che
 

Mais de Sokunth Che (14)

Authentication and Ciphering
Authentication and CipheringAuthentication and Ciphering
Authentication and Ciphering
 
SMS
SMSSMS
SMS
 
Handover
HandoverHandover
Handover
 
Call Setup
Call SetupCall Setup
Call Setup
 
Location Updating
Location UpdatingLocation Updating
Location Updating
 
Switching System
Switching SystemSwitching System
Switching System
 
Base Station System
Base Station SystemBase Station System
Base Station System
 
Mobile Station
Mobile StationMobile Station
Mobile Station
 
Cell Planning
Cell PlanningCell Planning
Cell Planning
 
Access And Radio Theory
Access And Radio TheoryAccess And Radio Theory
Access And Radio Theory
 
System Introduction
System IntroductionSystem Introduction
System Introduction
 
GSM Among Other Systems
GSM Among Other SystemsGSM Among Other Systems
GSM Among Other Systems
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologies
 
Basic english usage
Basic english usageBasic english usage
Basic english usage
 

Último

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Último (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

3 Air Interface Structure and Logical Channels

  • 1. 3 Air Interface Objectives After this chapter the student will: • be able to describe the structure of the air interface. • be able to understand the build-up of a burst. • be able to recognise the different logical channels and their functions. • be able to understand how the different logical channels are mapped on physical ones. 3.1 INTRODUCTION ........................................................................2 3.2 ACCESS THEORY ......................................................................2 FDMA - Frequency Division Multiple Access .............................2 TDMA - Time Division Multiple Access ......................................2 CDMA - Code Division Multiple Access .....................................3 The International Cocktail Party ................................................3 3.3 STRUCTURE .............................................................................4 3.4 BURSTS ...................................................................................6 Normal burst ..............................................................................6 Access Burst ...............................................................................6 3.5 LOGICAL CHANNELS ................................................................7 3.6 MAPPING ON PHYSICAL CHANNELS ...........................................9 The Broadcast and Common Control CHannels..........................9 The Dedicated Control CHannels .............................................10 The Traffic channels .................................................................12 3.7 APPENDIX..............................................................................14 Michael Quek 1
  • 2. 3.1 Introduction The air interface, called ”Um” in the specification, is the most important interface in the GSM specification for two reasons: • It needs to be completely specified to enable a mix of manufacturers of mobile stations to be used in a mix of systems from different suppliers. • Spectral efficiency is absolutely fundamental to get economy in a system. Spectral efficiency is dependant on the number of simultaneous calls that can be made using a certain frequency band, but also on the resistance to interference which determines reuse distance and thereby the capacity limit of the network. 3.2 Access theory This will be a brief description of the fundamental differences between a Frequency Division Multiple Access (FDMA), a Time Division Multiple Access (TDMA) and a Code Division Multiple Access (CDMA) technology. FDMA - Frequency Division Multiple Access FDMA is used for standard analogue mobile telephony. Each user is assigned a discrete slice of the RF spectrum. FDMA permits only one user per channel since it allows the user to use the channel 100% of the time. Therefore, only the frequency dimension is used to define channels. Spacing between the frequencies used is normally around 25-30 kHz for most of the analogue cellular system (25 kHz for NMT and TACS, 30 kHz for AMPS). TDMA - Time Division Multiple Access In TDMA the users are still assigned a discrete slice of RF spectrum, but multiple users now share that RF carrier on a time slot basis. Each of the users alternates their use of the RF channel. Frequency division is still employed, but these carriers are now further sub-divided into some number of time slots per carrier (3 for TDMA-AMPS, 8 for full rate GSM, 16 for half rate GSM). A user is assigned a particular time slot on a carrier whether the other time slots are being used or not. The information flow is not continuous for any user, but is sent in burst. The bursts are re-assembled at the receiving end, and appear to provide continuous sound because of the speed of the process. Michael Quek 2
  • 3. CDMA - Code Division Multiple Access In CDMA there is no time division, and all users use the entire carrier, all the time. The allocated frequency segment for a CDMA carrier is considerably larger than for a carrier used in FDMA or TDMA (1.25 MHz per carrier). To distinguish the different users occupying the same frequency band simultaneously, each user is assigned a binary code. Code Time Freq FDMA Code Time Freq TDMA Code Time Freq CDMA FDMA, TDMA and CDMA The International Cocktail Party To illustrate the conceptual differences among the multiple access technologies, the “International Cocktail Party” analogy can be used. Picture a large room with a number of people, in pairs, who would like to hold conversations. The people in each pair only want to talk and listen to each other, and have no interest in what is being said in other pairs. In order for these conversations to keep place, however, it is necessary to define the environment for each conversation. Dividing one large room into a number of small rooms creates the FDMA environment. A single pair of people would enter each small room for a conversation. When that conversation is complete, they would leave and another pair would be able to enter. Michael Quek 3
  • 4. In a TDMA environment, each of these small rooms would be able to accommodate multiple conversations simultaneously. For example, with a 8 slot TDMA system each room would contain up to 8 pairs of people, with each pair taking turns talking. Think of each pair having the right to speak for 125 m seconds during each second. In CDMA, pairs of people will enter the single large room. However if every pair uses a different language, the can all use the air in the room as a carrier for their voices. The analogy here is that the air in the room is the wideband “carrier” and the languages the codes used to identify the CDMA user. Theoretically, we can continue adding pairs, each speaking a unique language (as defined by the unique code) until the overall background noise (interference from other users) makes it too difficult for some of the people to understand the other in the pair. Therefore, the maximum number of users, or effective traffic channels, per carrier depends on the amount of activity that is going on in each channel. Additional user (or conversation, in our analogy) may be accommodated, but at the cost of more interference to the other users. 3.3 Structure The frequency band specified for GSM is 890-915 MHz for the uplink (up to the base station) and 935-960 MHz for the downlink (down from base station). The corresponding bands used for GSM 1800 are 1710-1785 for the uplink and 1805-1880. One full duplex channel is made up of a pair of frequencies; one frequency for the uplink and one frequency for the downlink. The distance between the frequencies used for up- and downlink, the duplex distance, is 45 M Hz for GSM and 95 M Hz for the GSM 1800 system. The frequencies on the up link are separated by 200 k Hz. The same goes for down link frequencies. This distance is called carrier spacing and will give us 124 carriers for GSM 900 and 374 for GSM 1800 in the frequency band stated above. Each of these carriers will fit 8 multiplexed time slots in the full rate version. Let us define two types of channels used in the GSM vocabulary, a ”Physical Channel” and a ”Logical Channel”: a physical channel is one time slot on one carrier Michael Quek 4
  • 5. a logical channel is specific type of information carried by a physical channel This means that all the different sorts of information, whether it is traffic or control signalling, will be sent on different logical channels. The logical channels are then mapped or multiplexed on the physical channels according to a certain structure. This structure will set the rules concerning when and on which physical channel the information will be sent. To define a ”Burst” one would say that: a burst is a formatted sequence of bits sent during one time slot Due to the TDMA structure with timeslots, we do not send continuously but only in the designated time slots. The information sent during one time slot is formatted into a burst. 4,615 ms 0 1 2 3 4 5 6 7 Data Training Data 3 57 1 26 1 57 3 Burst 148 Bits 156.25 Bits 0.577 ms The burst is the formatted sequence of bits sent during one time slot Michael Quek 5
  • 6. 3.4 Bursts The information is structured slightly different depending on what kind of logical channel it belongs to. The bursts are of five types; • normal burst • access burst • frequency correction burst • synchronisation burst • dummy burst Normal burst The normal burst is used for transmission of traffic and for some control signalling. The normal burst contains; • 2 information fields, each with 57 bits, used for encrypted speech or data • a training sequence to be used by the equaliser in the receiver • 2 bits to indicate whether the burst is "stolen" to be used as a FACCH (see Logical Channels) or “non stolen” to be used for TCH. • 3 bits in each end to serve as start and stop bits. TB Encrypted bits 1 Training sequence 1 Encrypted bits TB GP 3 57 26 57 3 8.25 The normal burst Access Burst The access burst is used whenever the MS wants to get in contact with the network. At that time it is not known how far away the MS is from the base station. If the mobile is far away, the access burst might arrive too late to fit in the assigned time slot. Therefore the access burst is as short as possible, to allow a certain delay without interfering with the next time slot. TB Information Guard Period 8 68.25 The access burst Michael Quek 6
  • 7. The other types of bursts are only sent downlink from the base station. • The synchronisation burst is used to let the mobiles synchronise to the TDMA-structure, i.e. to know when certain information is broadcasted. • The frequency correction burst is sent so that the MSs can tune their frequencies to the frequency sent out from the base station. • The dummy burst is used when the base station is forced to transmit although it has no information to send. As a fact, there is a need for transmission in all time slots on certain carriers. The reason is that the MS uses those carriers for measurements in order to rank the base stations according to the received signal strength. 3.5 Logical channels If we could we would probably want to fill all our available physical channels with traffic. However, control channels are required for setting up a radio connection, for setting up a call or controlling an MS during conversation. These are the logical channels for control signalling; ô FCCH, (Frequency Correction CHannel), On this channel a pure sine wave is transmitted. The first purpose is orientation for the mobile among all the yet incomprehensible information sent, a perfect sine wave could be found by the mobile. This will indicate where in the information flow it is listening. The second purpose is for the mobile to tune its frequency. Here the frequency correction burst is used. ô SCH, (Synchronisation CHannel), This channel contains information about the number of the TDMA-frame monitored by the MS. SCH also contains the so called BSIC ( Base Station Identity Code ) that will inform the mobile station if it is listening to the correct frequency and aloud PLMN . The logical channel SCH is carried by a synchronisation burst. ô BCCH, (Broadcast Control CHannel), contains general information about the cell, so that the MS knows how to behave. The information supplied could be maximum output power allowed at access, the frequencies of neighbouring cells for the MS to monitor, Location Area Identity, or whether the cell is barred etc. BCCH is transmitted downlink, point-to-multipoint. ô PCH, (Paging CHannel), is monitored at certain intervals by every idle MS. If there is an incoming call, or a Short Message, the network will page the MS, using the PCH in all cells in the location area where the MS is registered. The PCH contains the MS identity number, the IMSI or TMSI. PCH is transmitted downlink, point-to-point. Michael Quek 7
  • 8. ö RACH, (Random Access CHannel), is used by the mobile when making its first access to the system. By making that access, the MS is requesting a signalling channel. The reason for the access could be a page response, or initiation of a call. Since the distance between the MS and the base station is unknown, the access burst will be kept as short as possible so as not to interfere with the adjacent time slot. RACH is sent uplink, point-to-point. ô AGCH, (Access Granted CHannel), is used for the acknowledgement of the access attempt sent on RACH. On this channel the MS will be assigned a signalling channel (SDCCH/SACCH) to continue the signalling according to the reason for the access. AGCH is sent downlink, point-to- point. ôö SDCCH, (Stand-alone Dedicated Control CHannel), is the channel on which the actual signalling will take place. This may be used for call set- up, authentication, ciphering or transmission of text messages (Short Message and Cell Broadcast). This bi-directional channel is subdivided into eight (in some cases four) sub-channels so that each can handle the signalling needed by one MS. Thus, eight (or four) calls can be set up simultaneously. At call set-up, the MS will be assigned a TCH after the signalling on SDCCH is completed. SDCCH is transmitted up- and downlink, point-to-point. ôö SACCH, (Slow Associated Control CHannel), is used to transfer signalling data while we have an ongoing conversation on a TCH or while the SDCCH is being used. This channel can carry about two messages per second in each direction. It is used for non-urgent procedures. On the downlink the MS is informed about what neighbouring cells to measure on for handover purposes. The MS is also ordered to use a certain power and timing advance. On the uplink the MS will report about measurements done. SACCH is transmitted up- and downlink, point-to-point. ôö FACCH, (Fast Associated Control CHannel), is used when there is a need for higher capacity signalling in parallel with on-going traffic. FACCH works in "stealing mode", meaning that the transmitting side throws away a 20 ms segment of speech to fill the bursts with signalling information instead. When doing so, the transmitting side must set the "stolen bit indicator" to 1. When noting, on the receiving side, that the stolen bit indicator is set to 1, the bursts will be handled as signalling information. To lessen the disturbance of the speech, the last speech segment will be repeated. The FACCH is mainly used for handover commands. FACCH is transmitted both up- and downlink, point-to-point. Michael Quek 8
  • 9. This is the logical channel for traffic: ôö TCH, Traffic CHannel. The TCH could be of two types, full rate (TCH/F) and half rate (TCH/H). The TCH/F could be used for speech or for data. The bit rate for speech is 13 kbit/s (gross rate 22.8 kbit/s) while the corresponding rate for data is a maximum of 9.6 kbit/s. One TCH/F occupies one physical channel, while TCH/H occupies half a physical channel (i.e. every second time slot). This TCH/H may be used for approx. 5.6 kbit/s (gross rate 11.4 kbit/s) speech or data at 4.8 kbit/s or lower. 3.6 Mapping on physical channels The control channels mentioned above are transmitted according to certain rules concerning what physical channel (frequency and time slot) to use and how often they are to be repeated. We say that logical channels are mapped, or multiplexed on the physical channels. The TDMA-frames are grouped together into multi-frames that are then repeated cyclically. There are basically two types of multi frames; the 26 TDMA multi-frame used for traffic and the 51 TDMA multi-frame used for control signalling. At a base station with n carriers, the carriers are called c0, c1, c2,...cn-1, all having eight time slots. On time slot 0 on the c0 carrier, we map a channel combination of only control channels The Broadcast and Common Control CHannels TS0 on c0 are grouping the information into a 51 TDMA multi-frame. It contains: • BCH, Broadcast channels FCCH, in the figure denoted F, always starts the multi-frame. It will be repeated every 10 TDMA-frames. SCH, here-denoted S, always follows FCCH. It will be repeated every 10 TDMA frames, just like FCCH. BCCH, here-denoted B, will come next. It needs 4 consecutive TDMA frames to transmit the information. • CCCH, Common Control CHannels, that here are denoted by C. CCCH downlink could be either PCH or AGCH. Whatever it is, it will use a block of four consecutive TDMA frames. As shown in the figure, nine CCCH-blocks can be fitted in one 51 TDMA multi-frame. • I stand for Idle, even though in this case it is really a dummy burst being transmitted. Since other MSs might be measuring signal strength by monitoring this physical channel, something must always be transmitted. Therefore, in TDMA frame 51, when we have nothing to send, a dummy burst will nevertheless be sent. Michael Quek 9
  • 10. F : FCCH TDMA S : SCH 0 1 2 7 0 1 2 7 0 1 2 B : BCCH frames C : CCCH (PCH or AGCH) I : Idle F S B C 1 F S C C F S C C F S C C F S C C I Mapping of logical channels on TS0 on c0 downlink. Next we will take a look at TS0 on c0, but uplink. The only logical channel to be mapped here is the access channel RACH. TDMA 0 1 2 R : RACH 7 01 2 70 1 frames R R RR R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R Mapping on TS0 on c0 uplink. The Dedicated Control CHannels The Dedicated Control CHannels are usually mapped on TS1 on c0, up- as well as downlink the information is grouped into 102 TDMA multi- frames. In these frames we will find: • SDCCH, here denoted as D, is divided into eight sub-channels. Each SDCCH sub-channel is occupying a block of four consecutive TDMA frames. As soon as the MS has finished using a certain SDCCH sub- channel, it can be used by another MS. • SACCH, here denoted as A. For each SDCCH sub-channel there is a corresponding SACCH. This channel is used to transfer signalling information concerning measurements during call set-up. The uplink looks similar to the downlink for TS1, c0 . The only difference is that the uplink is a number of TDMA frames delayed in relation to downlink. Michael Quek 10
  • 11. 0 1 2 7 0 1 2 70 1 2 TDMA Dx : SDCCH no.x frames Ax : SACCH no.x I : Idle * D0 D1 D2 D3 D4 D5 D6 D7 A0 A1 A2 A3 I I I * D0 D1 D2 D3 D4 D5 D6 D7 A4 A5 A6 A7 I I I SDCCH + SACCH (Downlink) 0 1 2 7 0 1 2 70 1 2 TDMA Dx : SDCCH no.x Ax : SACCH no.x frames I : Idle I I I D1 A0 * A5 A6 A7 D0 D2 D3 D4 D5 D6 D7 * A1 A2 A3 I I I D0 D1 D2 D3 D4 D5 D6 D7 A4 SDCCH + SACCH (uplink) Mapping on TS1 on C0 downlink and uplink. Also specified is a channel combination that combines all the control channels into one time slot, following a 102 TDMA frame repeating pattern. This combination is mostly used in cells with only one frequency. F S B C F S C C F S D0 D1 F S D2 D3 F S A0 A1 I * * 1 F S B C F S C C F S D0 D1 F S D2 D3 F S A2 A3 I BCCH + CCCH + SDCCH + SACCH (downlink) D3 R R A2 A3 R R R R R R R R D0 D1 R R D2 * * D3 R R A0 A1 R R R R R R R R D0 D1 R R D2 BCCH + CCCH + SDCCH + SACCH (uplink) Alternative mapping on TS0 on C0 downlink and uplink. Michael Quek 11
  • 12. The Traffic channels On TS2-TS7 on the c0 and on TS0-TS7 on all the other carriers, the information is grouped into 26 TDMA multi-frames. In these multi-frames we will find; • TCH, denoted as T, containing data or speech. • SACCH, denoted A, carrying the control signalling necessary during traffic, for instance measurement data, power orders, or timing advance orders. • Idle frames, denoted I. This is not a logical channel. This is only to indicate that the transmitter is off during this particular TDMA frame. This short period of silence is used by the MS to read BSIC, sent out from one of the neighboring cells base stations. T : TCH TDMA 0 1 2 7 0 1 2 70 1 2 A : SACCH frames I : Idle TCH T T T T T T T T T T T T A T T T T T T T T T T T T I D ownlink Mapping on TS2-7 on c0 or TS0-TS7 on any other carrier, downlink. The half rate Traffic channels For half rate the bit rate needed per traffic channel will be cut from 13 k bit/s down to approximately half to enable up to twice as much traffic. To keep the structure of the air interface unchanged, the half rate channels will still use a burst of the same structure, fitted in a time slot of the same size. Since only half the capacity is needed for speech in a half rate MS, it will use only every second time slot. This means that the MS is left with plenty of time to do other things, such as measuring the signal strength of the neighbouring base stations. Michael Quek 12
  • 13. TDMA-frame T T T T T T T T T T T T A T T T T T T T T T T T T I 26 frames = 120 ms Multiframe for half-rate channels for MS0 and MS1 T0 T0 T0 T0 T0 T0 A0 T0 T0 T0 T0 T0 T0 T1 T1 T1 T1 T1 T1 T1 T1 T1 T1 T1 T1 A1 26 frames = 120 ms Mapping of full and half rate traffic channels One half rate MS can also be assigned both half rate channels in a physical channel. This is if the MS is using one channel for speech and one for data. Michael Quek 13
  • 14. 3.7 Appendix 1 hyperframe = 2048 superframes = 2 715 648 TDMA frames (3 H 28 min 53 sec 760 ms) 0 1 2 3 2047 2047 2047 2047 1 superframe 0 1326 TDMA frames (6.12 sec) ( = 51 (26-frame) multiframes or 26 (51-frame) multiframes) 0 1 2 48 49 50 0 1 24 25 1 (26-frame) multiframe = 26 TDMA frames (120 ms) 1 (51 frame) multiframe = 51 TDMA frames (3060/13 ms) 0 1 2 3 22 23 24 25 0 1 2 3 47 48 49 50 1 TDMA frame = 8 time slots (4.615 ms) 0 1 2 3 4 5 6 7 1 time slot = 156.25 bit durations (0.577 ms) Normal burst TB Encrypted bits Training sequence Encrypted bits TB GP TB: Tail bits 3 57 1 26 1 57 3 8.25 Flag is relevant only for TCH GP. guard period TB Fixed bits TB GP Frequency correction burst 3 142 3 8.25 TB Encrypted bits Synchronization sequence Encrypted bits TB GP Synchronization burst 3 39 64 39 3 8.25 Access burst TB Synchronization sequence Encrypted bits TB GP 8 41 36 3 68.25 TB Mixed bits Training sequence Mixed bits TB GP Dummy burst 3 58 26 58 3 8.25 Summary of frames and bursts Michael Quek 14
  • 15. Downlink Uplink 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 TDMA frame 0 F D0 T T T T T T R A5 T T T T T T S D0 T T T T T T R A5 T T T T T T B D0 T T T T T T R A5 T T T T T T B D0 T T T T T T R A5 T T T T T T B D1 T T T T T T R A6 T T T T T T B D1 T T T T T T R A6 T T T T T T C D1 T T T T T T R A6 T T T T T T C D1 T T T T T T R A6 T T T T T T C D2 T T T T T T R A7 T T T T T T C D2 T T T T T T R A7 T T T T T T F D2 T T T T T T R A7 T T T T T T S D2 T T T T T T R A7 T T T T T T 12 C D3 A I A I A I R I A I A I A I C D3 T T T T T T R I T T T T T T C D3 T T T T T T R I T T T T T T C D3 T T T T T T R D0 T T T T T T C D4 T T T T T T R D0 T T T T T T C D4 T T T T T T R D0 T T T T T T C D4 T T T T T T R D0 T T T T T T C D4 T T T T T T R D1 T T T T T T F D5 T T T T T T R D1 T T T T T T S D5 T T T T T T R D1 T T T T T T C D5 T T T T T T R D1 T T T T T T C D5 T T T T T T R D2 T T T T T T C D6 T T T T T T R D2 T T T T T T 25 C D6 I A I A I A R D2 I A I A I A C D6 T T T T T T R D2 T T T T T T C D6 T T T T T T R D3 T T T T T T C D7 T T T T T T R D3 T T T T T T C D7 T T T T T T R D3 T T T T T T F D7 T T T T T T R D3 T T T T T T S D7 T T T T T T R D4 T T T T T T C A0 T T T T T T R D4 T T T T T T C A0 T T T T T T R D4 T T T T T T C A0 T T T T T T R D4 T T T T T T C A0 T T T T T T R D5 T T T T T T C A1 T T T T T T R D5 T T T T T T C A1 T T T T T T R D5 T T T T T T 38 C A1 A I A I A I R D5 A I A I A I C A1 T T T T T T R D6 T T T T T T F A2 T T T T T T R D6 T T T T T T S A2 T T T T T T R D6 T T T T T T C A2 T T T T T T R D6 T T T T T T C A2 T T T T T T R D7 T T T T T T C A3 T T T T T T R D7 T T T T T T C A3 T T T T T T R D7 T T T T T T C A3 T T T T T T R D7 T T T T T T C A3 T T T T T T R A0 T T T T T T C I T T T T T T R A0 T T T T T T C I T T T T T T R A0 T T T T T T 50 I I T T T T T T R A0 T T T T T T I A I A I A I A I A I A Mapping of logical channels on C0 Michael Quek 15