GSM Technique

Embed Size (px)

Citation preview

  • 7/27/2019 GSM Technique

    1/121

    DIPLOMARBEIT

    Interference Reductionin a GSM Handset

    ausgefhrt zum Zwecke der Erlangung des akademischen Gradeseines Diplom-Ingenieurs unter Zusammenarbeit von

    INSTITUTFR NACHRICHTENTECHNIKUND HOCHFREQUENZTECHNK

    TECHNISCE UNIVERSITT WIENAUSTRIA

    Center For PersonKommunikationAalborg University, Denmark

    eingereicht an der Technischen Universitt WienFakultt fr Elektrotechnik

    von

    Thomas Baumgartner

    Gr. Kadolz 94A-2062 Seefeld-Kadolz

    Matr.Nr.: 9426012e-mail: [email protected]

    Wien, im August 1999

  • 7/27/2019 GSM Technique

    2/121

    i

    Supervisors:M.SC.E.E. Gert F. Pedersen, CPK-Aalborg University

    M.SC.E.E. Mikael B. Knudsen, Bosch Telekom Danmark A/So.Univ.Prof. Dipl.-Ing. Dr. Ernst Bonek, INTHFT/TU-Wien

    Dipl.-Ing. Thomas Neubauer, INTHFT/TU-Wien

  • 7/27/2019 GSM Technique

    3/121

  • 7/27/2019 GSM Technique

    4/121

    iii

    Zusammenfassung

    In den letzten Jahren erregten adaptive Antennen fr Basisstationenen regesInteresse. Verschiedene Hersteller, Netzwerkbetreiber und Universitten fhrtenFeldversuche durch um mehr Informationen ber die Leistungsfhigkeit dieser

    Systeme zu erhalten. Feldversuche in GSM Netzwerken haben gezeigt, da fr denDownlink sowohl in Makro- als auch Mikrozellen eine bemerkenswerteVerbesserung fr C/N (Carrier zu Noise Verhltnis) und C/I (Carrier zuInterference Verhltnis). Fr den Downlink wurden signifikante Verbesserungen inMakrozellenumgebungen festgestellt. In Mikrozellenumgebungen wurde jedochnur ein kleiner Gewinn fr C/N und so gut wie keine C/I Verbesserung gemessen.

    Diese Diplomarbeit ist darauf ausgerichtet einen passenden Algorithmus fr einAntennensystem mit geringer Komplexitt, das in einem Mobiltelefon eingesetztwerden kann, zu finden und zu simulieren. Dieses System soll das C/I imDownlink in einer Mikrozellenumgebung mit sich langsam bewegenden Bentzernverbessern.

    Es gibt verschiedene Methoden ein Antennensystem fr diesen Zweck zuimplementieren. Fr diese Arbeit wurde ein Antennensystem mit 2Antennenelementen, wo die Amplitude und die Phase eines Antennenzweiges mitHilfe eines variablen Verstrkers und eines Phasenschiebers adaptiert wird, bevordie Antennensignale zusammengefhrt werden. Die Komplexitt dieses System istgering genug um es in einem Mobiltelefon einzusetzen, da lediglich einezustzliche Antenne, ein variabler Verstrker, ein Phasenschieber und einSummierglied bentigt werden.

    Unter Bercksichtigung der Resultate von Hagerman [Hag95] und der groenKohrenzbandbreite der gemessenen Kanaldaten wurde die Simulation des

    gefundenen Algorithmus auf einen Gleichkanalstrer und einen Kanal mit flachemFading beschrnkt.

  • 7/27/2019 GSM Technique

    5/121

  • 7/27/2019 GSM Technique

    6/121

    v

    Abstract

    Adaptive antennas for base stations have obtained great interest over the past fewyears and at present. Several manufacturers, operators and universities have and areperforming field test to get more detailed information about the performance of

    such systems. GSM field tests have shown a significant improvement of the uplinkperformance for both C/N (Carrier to Noise ratio) and C/I (Carrier to Interferenceratio) in both macro cell and micro cell applications. For the downlink significantimprovements are observed for macro cell environments, but for micro cellenvironments only small gains for C/N and almost no C/I improvements areobserved.

    This project is concentrated about finding and simulating a suitable combiningalgorithm for a low complexity antenna system for a GSM mobile handset, whichcan improve the downlink C/I performance in a micro cell environment with slowmoving users.

    There are several methods for implementing an antenna system to improve thedownlink C/I performance. For this project an antenna system consisting of 2antenna elements, where the amplitude and phase of the received signals from oneof the antennas are altered prior to a combining by use of a variable gain block anda phase shifter right after the antenna element. The complexity of this antennasystem is low enough to be suitable for a mobile handset, hence it only requires anextra antenna element, a phase shifter and a combiner compared to a standardmobile handset without any antenna system.

    Taking the results of Hagerman [Hag95] and the huge coherence bandwidth of themeasured channel data into account the simulations are limited to 1 co-channelinterferer and a flat fading channel.

  • 7/27/2019 GSM Technique

    7/121

  • 7/27/2019 GSM Technique

    8/121

    vii

    Preface

    This thesis presents the research work done at the Department of CommunicationsTechnology at Aalborg University. It is part of an ERASMUS student exchangeprogram with my home university, Technische Universitt Wien, Austria.

    The thesis is divided into the following parts:

    A description of the GSM system. A brief description of radio wave propagation. A description of different diversity schemes and combining techniques. An explanation of how the necessary parameters for the chosen combining

    algorithm can be estimated from the received signal. A description of the receiver structure in GSM and the necessary changes in

    order to implement the proposed combining method. A description of the simulated algorithm. A presentation of the simulation results. A suggestion for a real time test configuration.

    Appendices are placed in the last part, their purpose is to give supplementaryinformation when reading the report.

  • 7/27/2019 GSM Technique

    9/121

  • 7/27/2019 GSM Technique

    10/121

    ix

    Acknowledgement

    I want to thank my supervisors, Gert Frlund Pedersen and Mikael BergholzKnudsen for the fruitful discussions and their invaluable expert advice. Thanks toThomas Neubauer who gave me a lot of useful advice for my stay in Aalborg.

    Thanks are also extended to Nina Nielsen at CPK.

    I am pleased to acknowledge the financial support of the SOKRATES/ERASMUSexchange program and of the Siegfried Ludwig-Fonds fr universitreEinrichtungen in Niedersterreich, who made my stay in Aalborg possible.

    Special thanks to Dieter Schafhuber for solving bureaucratic problems in Viennaduring my stay in Denmark and to Martin Pillwatsch for his friendship. Thanks toSabine for her love understanding and patience during my long absence fromhome.

    Aalborg, June 1999

    Thomas Baumgartner

  • 7/27/2019 GSM Technique

    11/121

    vii

    Table of Contents

    CHAPTER 1 GSM SYSTEM....................................................................................... 1

    1.1 Historical Note .......................................................................................................................................1

    1.2 Cell Structure.........................................................................................................................................2

    1.3 GSM Network ........................................................................................................................................2

    1.4 The Radio Interface...............................................................................................................................31.4.1 Bursts and Synchronisation .............................................................................................................41.4.2 Logical channels ..............................................................................................................................51.4.3 Frequency Hopping..........................................................................................................................61.4.4 Discontinuous Transmission............................................................................................................81.4.5 Power Control..................................................................................................................................8

    1.5 Frame Structure.....................................................................................................................................8

    1.6 Channel Coding .....................................................................................................................................91.6.1 Coding .............................................................................................................................................9

    1.6.2 Interleaving......................................................................................................................................91.6.3 Modulation.....................................................................................................................................10

    CHAPTER 2 RADIO WAVE PROPAGATION.......................................................... 11

    2.1 The Physics of Radio Wave Propagation...........................................................................................112.1.1 Reflection.......................................................................................................................................112.1.2 Diffraction......................................................................................................................................132.1.3 Scattering.......................................................................................................................................132.1.4 Free Space Propagation .................................................................................................................14

    2.2 Multipath Propagation........................................................................................................................15

    2.2.1 Slow Fading...................................................................................................................................152.2.2 Fast Fading.....................................................................................................................................162.2.3 Doppler Shift .................................................................................................................................202.2.4 Delay Spread..................................................................................................................................22

    CHAPTER 3 DIVERSITY AND COMBINING METHODS........................................ 25

    3.1 Different Diversity Schemes................................................................................................................253.1.1 Space Diversity..............................................................................................................................253.1.2 Polarisation Diversity ....................................................................................................................263.1.3 Pattern Diversity ............................................................................................................................273.1.4 Frequency Diversity.......................................................................................................................27

    3.1.5 Time Diversity...............................................................................................................................28

    3.2 Combining Techniques........................................................................................................................283.2.1 Switched Combining......................................................................................................................28

  • 7/27/2019 GSM Technique

    12/121

    Table of Contents viii

    3.2.2 Selection Combining......................................................................................................................293.2.3 Maximum Ratio Combining ..........................................................................................................293.2.4 Equal Gain Combining ..................................................................................................................293.2.5 Optimum Combining.....................................................................................................................29

    3.3 Model For Optimum Combining........................................................................................................30

    3.3.1 Algorithm A...................................................................................................................................333.3.2 Algorithm B...................................................................................................................................33

    CHAPTER 4 SIGNAL ESTIMATION........................................................................ 35

    4.1 Signal Composition..............................................................................................................................35

    4.2 Propagation Vector of Wanted Signal ...............................................................................................38

    4.3 Propagation Vector of Interfering Signal ..........................................................................................40

    4.4 Detection of Interferer Position ..........................................................................................................42

    4.5 Problematic Positions of the Bursts....................................................................................................434.5.1 Only a part of the interfering training sequence overlaps with the wanted burst...........................444.5.2 Change of interferer power during wanted time slot .....................................................................47

    4.6 Noise Power..........................................................................................................................................47

    CHAPTER 5 RECEIVER STRUCTURE................................................................... 49

    5.1 Classical GSM Receiver ......................................................................................................................495.1.1 RF Stage ........................................................................................................................................505.1.2 IF Stage..........................................................................................................................................50

    5.1.3 Quadrature Stage ...........................................................................................................................505.1.4 Digitalisation stage ........................................................................................................................505.1.5 Detection stage...............................................................................................................................505.1.6 Decoding Stage..............................................................................................................................52

    5.2 Necessary Changes in the Receiver ....................................................................................................52

    CHAPTER 6 TRACKING ALGORITHM................................................................... 55

    6.1 Introduction .........................................................................................................................................55

    6.2 Block Diagram of Algorithm...............................................................................................................57

    CHAPTER 7 SIMULATION RESULTS .................................................................... 61

    7.1 Optimal Case........................................................................................................................................61

    7.2 Different Antenna Powers...................................................................................................................64

    7.3 Effect of Unsynchronised Network.....................................................................................................667.3.1 Overlapping Training Sequences...................................................................................................667.3.2 Overlapping Guard Period.............................................................................................................677.3.3 Gain Over Position of Interfering Training Sequence ...................................................................68

    CHAPTER 8 REAL TIME TEST............................................................................... 71

    8.1 Test Setup.............................................................................................................................................71

  • 7/27/2019 GSM Technique

    13/121

    Table of Contents ix

    8.2 Test Procedure .....................................................................................................................................72

    CONCLUSION.......................................................................................................... 73

    ABBREVIATIONS.................................................................................................... 75

    BIBLIOGRAPHY ...................................................................................................... 77

    APPENDIX A GENERATION OF A GSM BURST..................................................A-1

    APPENDIX B DATA USED FOR THE SIMULATIONS...........................................B-1

    B.1 Measurements ....................................................................................................................................B-1

    B.2 Data Processing..................................................................................................................................B-3B.2.1 Data Used for Determining the Weight Set .................................................................................B-3B.2.2 Data Used for All Other Simulations...........................................................................................B-3

    APPENDIX C TRAINING SEQUENCES IN GSM ...................................................C-1

    APPENDIX D WEIGHT SET ...................................................................................D-1

    APPENDIX E ESTIMATION OF INPUT SIGNAL....................................................E-1

    E.1 Estimation Necessary for Algorithm A............................................................................................E-2

    E.2 Estimation Necessary for Algorithm B ............................................................................................E-5

    APPENDIX F COMPARISON ALGORITHM A AND B........................................... F-1

    F.1 Ideal Conditions.................................................................................................................................F-1

    F.2 Real Conditions.................................................................................................................................. F-3

  • 7/27/2019 GSM Technique

    14/121

    1

    Chapter 1

    GSM System

    This chapter gives a brief overview of the GSM system. The GSM family contains GSM900,DCS1800 and PCS1900 whose main difference is the used frequency band.The first part of this chapter (Section 1.1 to 1.3) give an overall description of the GSM system and thefollowing sections deal with more detailed information about the burst structure and the channelcoding.

    1.1 Historical NoteIn the early 1980s there were several different, to each other incompatible analog cellular phonesystems in Europe. International roaming was nearly impossible because each country developed itsown system. Therefore the costs for the equipment were very high due to the small market for eachsystem type.This was recognised very early and in 1982 the Conference of European Posts and Telegraphs (CEPT)formed the Groupe Spcial Mobile (GSM). The task for this group was to develop a pan-Europeanpublic land mobile system. The system had to meet certain criteria [Ste92]:

    spectrum efficiency

    subjective voice quality low mobile cost hand-portable feasibility low base station cost ability to support new services co-existence with current systems

    In 1989 the responsibility for GSM was transferred to the European Telecommunications StandardInstitute (ETSI). Phase 1 of the GSM specification was published 1990 and the first commercial GSMnetwork started their services mid 91. Since that time point the number of GSM networks and theirusers increased rapidly. At the end of 1998 there were more than 320 GSM Networks (includingDCS1800 and PCS1900) in 129 countries. Figure 1-1 shows the number of the subscribers from 1992

    to 1998.

    0

    20

    40

    60

    80

    100

    120

    140

    160

    Dec 92 Dec 93 Dec 94 Dec 95 Dec 96 Dec 97 Dec 98

    millionsubscribers

    Figure 1-1: The number of GSM subscribers from 1992 to 1998 [GSM99]

  • 7/27/2019 GSM Technique

    15/121

    1.2 Cell Structure 2

    1.2 Cell StructureIn GSM the covered area is divided into cells. A base station transceiver (BTS) is placed in each cell.

    A certain number of cells is grouped into cell clusters. The cells of one cluster share the available

    carrier frequencies. The same carrier frequencies are reused in the cells of other clusters. Figure 1-2

    shows a cluster with seven cells, numbered 1-7. Cells with the same number are called co-channel

    cells because they use the same frequency sets.

    Figure 1-2: The cellular structure

    In rural areas with very low traffic is the size of the cells limited by the propagation loss, the

    maximum transmitting power of the mobile stations (MS) and the propagation time. In urban areas

    with high traffic volume it is tried to make the cells small in order to have a high number of traffic

    channels per area. In this case the minimum cell size is given by the co-channel interference and thecosts which arise by having a lot of base stations with low transmitting power. Co-channel interference

    means interference by a cell in a neighbouring cluster using the same frequencies.

    It is optional whether the time base counters of different base stations are synchronised together. The

    frequency accuracy of the frequency source of the base stations should be better than 0,05 ppm for RF

    frequency generation and clocking the time base [GSM0510]

    1.3 GSM NetworkThe GSM network can be divided into several functional parts whose functions and interfaces are

    defined in the GSM specification. Figure 1-3 shows the general architecture of a GSM network.

    The network can be divided into the operation subsystem, the radio subsystem and the network

    subsystem. The radio subsystem consists of the mobile stations (MS) and one BTS for each cell. Theoperation subsystem contains the Operation and Maintenance Center (OMC) which handles

    administrative tasks like billing and updating of the system. The network subsystem consists of the

    Mobile Switching Center (MSC), the Visitor Location Register (VLR), the Home Location Register

    (HLR), the Authentication Center (AC) and the Equipment Identifier Register (EIR).

    The main part of the network system is the MSC which does the switching between mobile users and

    between mobile users and users of other networks. The mobility management is although handled by

    the MSC together with the MS, HLR and VLR.

    In the HLR is subscriber specific data like subscribed services, mobile subscriber identity, directory

    number, authentication code and the address of the VLR of all to the MSC subscribed users stored.

    Data which is necessary for managing the MS is stored in the VLR for all MS which are in the area of

    the MSC.

    The EIR contains a list of all registered MSs by their International Mobile Equipment Identity (IMEI).With the help of this list lost, stolen or defect equipment can be recognised. In Dublin is the Central

    Equipment Identity Register (CEIR) placed, where the identities of all mobile stations notified as

  • 7/27/2019 GSM Technique

    16/121

    1.4 The Radio Interface 3

    approved, lost or stolen are stored in the "white" and "black" lists. From this location can all GSM

    operators update their EIRs.

    VLR HLR AuC EIR

    MSC BSC BTS

    BTS

    OMC

    PSTN/ISDN

    datanetworks

    Operation Subsystem Radio SubsystemOther Networks

    physical connection logical connection

    AuC Authentication CentreBSC Base Station ControllerBTS Base Transceiver StationEIR Equipment Identity RegisterHLR Home Location Register

    MS Mobile StationMSC Mobile Switching CentreOMC Operation and Maintenance C.PSTN Public Switched Teleph. NetworkVLR Visitor Location Register

    Network Subsystem

    Figure 1-3: General architecture of a GSM network [Dav96]

    1.4 The Radio InterfaceThe GSM system uses a combination of FDMA and TDMA with 8 time slots per carrier (see Figure

    1-4). For the separation of up- and downlink Frequency Division Duplex (FDD) and Time Division

    Duplex (TDD) are used. The time shift between the bursts of up- and downlink is 3 time slots. The

    time shift was introduced in order to simplify the equipment because it is not necessary to send and

    receive at the same time. The lower frequency band where attenuation in the channel is lower, was

    chosen for the uplink. In the time between sending and receiving the MS monitors the power of other

    Base Stations (BS).

    Channel 4Channel 3

    Channel 2Channel 1

    Frequency

    TDMA-Frame

    Downlink

    Uplink

    TDD

    (3 Slos)

    FDD

    (45MHz)

    FDD Frequency Division Duplex

    TDD Time Division Duplex

    Channel 124

    Figure 1-4: Schematic structure of the FDMA/TDMA radio interface [Dav96]

  • 7/27/2019 GSM Technique

    17/121

    1.4 The Radio Interface 4

    1.4.1 Bursts and SynchronisationDuring the time slots the data is transmitted in packets with a given structure the so called bursts. As

    shown in Figure 1-5 there are five types of bursts with a duration of

    156,25 bits or 0,577 ms.

    3 57 1 26 1 57 3 8,25

    TB Data Bits SBTraining

    SequenceSB Data Bits TB GP

    Time Slot 156,25 bit

    3 142 38,25

    TB Fixed Bits TB GP

    3 39 64 39 38,25

    TB Data BitsTraining

    SequenceData Bits TB GP

    3 58 26 58 38,25

    TB Mixed BitsTraining

    SequenceMixed Bits TB GP

    8 41 36 3 68,25

    TB Training Sequence Data Bits TB GP

    TB Tail BitsSB Stealing Bits

    GP Guard Period

    Normal Burst

    Frequency Correction Channel Burst

    Synchronisation Burst

    Dummy Burst

    Access Burst

    Figure 1-5: The different bursts in GSM [Meh97]

    Except the normal burst are all other bursts dedicated to a special function.

    The Frequency Correction Channel Burst (FCCH) contains a plain sinus wave which is used to match

    the carrier frequencies of the MS and the BS.

    The Synchronisation Channel Burst (SCH) is used to achieve synchronisation in the time domain. The

    64 bit long training sequence is known by the MS. The exact position of the bits can be recognised

    through correlating the received training sequence with the stored version of this sequence. Then the

    78 data bits are decoded which contain information about the actual frame number.

    The normal burst is transmitted during a call-in-progress. The two blocks of 57 data bits contain

    ciphered information. The 26 bit long training sequence is used for estimating the channel properties.

    Another function of the training sequence is to distinct between signals from the wanted and the

    interfering signal. In each cell cluster one of eight available training sequences is used. Therefore it is

    possible to detect co-channel interferer by the different training sequence. The stealing bits which

    guard the training sequence indicate if the information bits contain data or control information.

    The dummy burst has the same structure like the normal burst with the difference that no useful data is

    transmitted. The dummy burst is necessary because the MS monitors the signal strength of

    neighbouring BSs during a call in order to get information for handovers. For this reason every BS has

    to transmit all the time on the broadcast channel with full power.

    The transmitted power during a burst has to fit in a time mask in order not to interfere data transmitted

    from other MS using neighbouring time slots. In Figure 1-6 you can see the time mask for the normal

  • 7/27/2019 GSM Technique

    18/121

    1.4 The Radio Interface 5

    duration bursts how it is specified by ETSI. The time mask for the access burst is shorter because

    when the mobile sends this burst the timing advance is not adjusted.

    Figure 1-6: Time mask for the normal duration bursts [Dav96]

    1.4.2 Logical channelsIn order to work properly a mobile radio system has to transmit several informations over the radio

    channel. Because of its specific functions this information can be classed into several logical channels.

    There is a principal differentiation between Traffic Channels (TCH) and Control Channels (CCH).

    Further the CCH is divided into Broadcast Control Channel (BCCH), Common Control Channel

    (CCCH) and Dedicated Control Channel (DCCH). The DCCH serves similar tasks like the ISDN

    D-Channel, whereas the other two channels have mobile radio specific tasks. An overview over all

    traffic and control channels is given in Table 1-1.

    Logical Channels

    TCH(Traffic Channel, duplex) CCH(Control Channel)

    FEC1-coded

    Speech

    FEC-coded

    Data

    BCCH

    Broadcast

    CCH

    CCCH

    Common

    CCH

    DCCH

    Dedicated CCH

    BSMS BSMS BSMS SDCCHStand-Alone

    DCCH

    BSMS

    ACCH

    Associated

    CCH

    BSMSTCH/F

    22,8 kbit/s

    TCH/F9,6

    TCH/F4,8

    TCH/F2,4

    22,8 kbit/s

    FCCH

    Frequency

    Correction

    Channel

    PCH

    Paging

    Channel

    BSMS

    SDCCH/4 Fast ACCH

    FACCH/F

    FACCH/H

    TCH/H

    11,4 kbit/s

    TCH/H4,8

    TCH/H2,4

    11,4 kbit/s

    SCH

    Synchron.

    Channel

    RACH

    Random

    Access Ch.

    MSBS

    SDCCH/8 Slow ACCH

    SACCH/TF

    SACCH/TH

    SACCH/C4

    SACCH/C8

    AGCH

    Access Grant

    Channel

    BSMSTable 1-1: Overview Traffic- (TCH) and Control Channels (CCH) [Dav96]

    1Forward Error Correction

  • 7/27/2019 GSM Technique

    19/121

    1.4 The Radio Interface 6

    The TCHcarries digitally encoded speech or data. Full and half rate TCHs are specified in GSM. The

    different data rates for data transmission (9,6 kbit/s, 4,8 kbit/s and 2,4 kbit/s) are achieved by using

    different coding algorithms for error detection and correction.

    The BCCHis unidirectional from the BS to the MS and supplies the MS with following data neededfor the communication with the BS:

    Configuration of the Common Control Channel Information about the frequency mapping at the BS Information about the location of the BCCH in neighbour cells Optional information about Frequency Hopping (FH), Voice Activity Detection (VAD) and power

    control

    Radio criterions for the cell selection, e.g. minimum received field strength.The BCCH is organised in a multiframe consisting of 51 frames (see Figure 1-5) and is transmitted in

    the zeroth time slot of a carrier without frequency hopping and without power control. The reason why

    for this carrier no power control is used is that MS located in other cells listen to the BCCH and the

    strength of its carrier is a measure of the path loss which is needed for handovers.

    Further the BCCH carries the Frequency Control Channel (FCCH) for frequency correction using the

    frequency correction burst and the Synchronisation Channel (SCH) for synchronisation using the

    synchronisation burst [Dav96].The CCCH is used for setting up calls. The MS initiates a call by sending an access burst on theRandom Access Channel (RACH). If there are free resources the MS is informed on the Access Grant

    Channel (AGCH) which Traffic Channel (TCH) and Slow Dedicated Control Channel (SDCCH) to

    use.

    Is there a incoming call for a MS the BS sends this information on the Paging Channel (PCH).

    The DCCHserves similar functions like the ISDN D-Channel and some mobile radio specific taskslike transmitting of measurement data. It is divided into the Stand Alone DCCH (SDCCH) and the

    Associated Control Channel (ACCH).

    The SDCCH is always used when there is no TCH assigned to the MS. His tasks are

    Informing the MS which channel to use Transmitting of billing data Location updating and call forwarding Call set up

    The ACCHis used when a TCH is assigned. It is divided into the Fast ACCH (FACCH) and the SlowACCH (SACCH). The FACCH is used when control information has to be transmitted at a high rate

    (e.g. during a handover). For transmitting the FACCH the TCH is used which is marked by setting the

    stealing bits. The SACCH is used for exchanging control information at a low rate (e.g. power control,

    timing advance and quality measures).

    1.4.3 Frequency HoppingAn option for GSM network operators is to implement slow Frequency Hopping. In contrast to fast

    frequency hopping as it is used for military proposals where the hopping frequency is higher than the

    bit rate allows the specified frequency hopping in GSM only a change of the frequency after eachburst.

    There are two benefits using frequency hopping. First there is frequency diversity. As discussed in

    Section 1.6 is the transmitted information spread over several bursts and even if one burst has a very

    high bit error rate due to a deep fade is it possible to determine the correct data bits due to the

    information in the other bursts. This can be used for diversity. Since the chosen frequencies have to be

    uncorrelated is the probability very high that a slow moving user who is in a deep fade during one

    burst using one frequency will not be in a deep fade in the following burst where another frequency is

    used. In order that the fast fading faced by two frequencies is uncorrelated the frequencies must be

    separated at least by the coherence bandwidth. The coherence bandwidth is defined as the maximum

    frequency difference for which two signals have a certain value of correlation [Par92]. The coherence

    bandwidth in an indoor environment for a correlation coefficient of 0,5 is approximately 5MHz which

    limits the possibility of using frequency hopping in GSM as frequency diversity scheme as the whole

    downlink band in EGSM is just 25MHz wide.

  • 7/27/2019 GSM Technique

    20/121

    1.4 The Radio Interface 7

    The second benefit of frequency hopping is interferer diversity. Here is a frequency channel with a

    very weak C/I-ratio shared by many calls which use the weak channel cyclical. So the mean C/I-ratio

    for all calls is lower but this is for capacity reasons better than having a lower number of calls with a

    very good C/I-ratio whereas a whole carrier cannot be used through its bad C/I-ratio.

    Figure 1-7 shows the algorithm used for determining the hopping sequence in GSM. There are several

    input variables for this algorithm. First there is MA the set of RF-channels called mobile allocation.

    The MA contains N radio frequencies with 1N64. The mobile allocation index offset(1MAIO1). A Further input is the frame number (FN) in terms of T1, T2, T3 which aredetermined using equations 1.1 to 1.3 (mod stands for the modulo operation).

    64modFN1T = (1.1)

    26modFN2T = (1.2)

    51modFN3T = (1.3)

    The Hopping Sequence Number (0HSN64) specifies the hopping sequence to use. All this

    information is broadcast over the BCCH and the SCH.The function RNTable simply assigns one out of 114 pseudo-random numbers specified by GSM

    according to its argument. NB stands for the number of bits which are necessary to express the number

    of RF-channels N. The XOR operator means bit wise exclusive OR, while the remaining functions are

    self explaining.

    M=T2+RNTable[(HSN XOR T1)+T3]

    M'=M mod 2NB

    T'=T3 mod 2NB

    HSN=0?

    No

    Yes

    M'

  • 7/27/2019 GSM Technique

    21/121

    1.5 Frame Structure 8

    1.4.4 Discontinuous TransmissionIn order to reduce interference and to lengthen the battery life-time of handsets Discontinuous

    Transmission (DTX) is specified as an option for up and downlink in GSM. This means that the

    network operator can decide if they want to use DTX or not. If DTX is activated transmits the

    transmitter in every burst only if the user is speaking. Otherwise is the data transmission reduced to 1

    burst every 480ms. These 2 bursts per second describe the background noise. The background noisehas to be transmitted in order that the listener at the other end of the line does not feel like having an

    interrupted connection. Therefore the noise information is fed into a noise generator which creates the

    so called comfort noise.

    1.4.5 Power ControlAnother possibility to increase the battery life-time of the handsets and to reduce interference on the

    radio channel is to control the transmitting power of the base station and the mobile station. Like

    frequency hopping and discontinuous transmission is it up to the network operator to decide whether

    power control is implemented on the up or downlink or in both directions.

    If power control for the downlink is used, the BTS should be able to reduce its transmitting power

    down to 30dB of the maximum transmitting power in 15 2dB steps. Also the MS should be able tocontrol the RF-power between its maximum and minimum in 2dB steps.

    The decision with which power to send is made in the base station system according to quality

    measures made in the BS and MS. The transmitting power must not change more than 2dB every

    60ms. Therefore if e.g. a change from 17dBm to 37dBm is requested this will need 600ms. Figure 1-8

    shows the adjusting of the mobile's transmitting power through commands of the base station system.

    The initial power levels to use in the MS are transmitted in the BCCH.

    transmission level(dBm)

    39

    13 time(60ms intervals)

    commands: 17dBm 37dBm 35dBm

    Figure 1-8: Transmission power adaptation

    1.5 Frame StructureThe in Section 1.4.2 defined logical channels are transmitted over one physical channel. Hereby the

    logical channels are arranged in a frame structure where the number of bursts during a frame used byone logical channel depends on the data rate of the logical channel.

    The frame hierarchy in GSM knows 4 types of frames (shown in Figure 1-9):

    TDMA frame Multiframe Superframe Hyperframe

    The TDMA frame consists of 8 time slots, which are dedicated to one channel. 26 or 51 TDMA

    frames form one multiframe. Note that the 25thframe of the 26 multiframe is not used. This idle frame

    can be used for measuring noise and interfering signals.

    A superframe is built of 51 26 multiframesor 26 51 multiframesand 2048 superframes build onehyperframe with a duration of 3h 28min 52s 716ms.

  • 7/27/2019 GSM Technique

    22/121

    1.6 Channel Coding 9

    Figure 1-9: The hierarchical structure and duration of the different frames in GSM

    1.6 Channel CodingThe term channel coding means the adapting of the data bits to be transmitted to the transmission

    channel. This contains actions for error correction and modulation.

    Actions for error correction are coding and interleaving.

    1.6.1 CodingIn GSM there are 3 different codes:

    Convolutional codes are used for error correction purposes. The specified convolutional code hasa length of 5 and code rate .

    Fire codes are used to detect bursty errors. These are errors which occur in groups. The fire codeused in GSM is able to correct 11 consecutive faulty bits [Mou92].

    The parity code is a simple block code which is used for error detection [Meh97].

    1.6.2 InterleavingIt is necessary to spread related data blocks over several bursts because error correcting codes are

    better in detecting single bit errors whereas in a mobile communication environment mainly burst

    errors due to fading occur. In GSM speech data is spread over 8 bursts and data traffic channels arespread over up to 19 bursts.

    Figure 1-10 shows the interleaving for a speech channel. The 456 coded data bits of a block are

    written row by row in a 8 column by 57 row matrix. In this way 8 subblocks with 57 bits each are

    created. In Figure 1-10 there are shown 3 consecutive data blocks (A, B and C) whose bits are grouped

    into 8 subblocks with 57 bits each (marked in block B). The numbering scheme for the subblocks can

    be seen at data block A. Note that consecutive bits in the original blocks are in different subblocks.

    The subblocks are spread over 8 consecutive bursts using a technique called diagonal interleaving.

    This results in bursts containing 2 subblocks of different data blocks. The bits of the subblocks 0 to 3

    use even bit positions in the data bursts and the bits of the subblocks 4 to 7 use the odd bit positions.

    So the 4 first bursts share data block B with the previous data block (block A) and the last 4 bursts are

    shared with the consecutive data block (block C).

  • 7/27/2019 GSM Technique

    23/121

  • 7/27/2019 GSM Technique

    24/121

    11

    Chapter 2

    Radio Wave Propagation

    This chapter gives a brief theoretical description of radio wave propagation where the main interest is

    on the physical behaviour of the signals in the mobile channel. A few effects are not described very

    deeply as they have only a slight influence to the problem investigated in this project.

    The term radio wave is used generic in this chapter and means a TEM-wave in the far-field as far as

    nothing else appears from the context. I.e. the distance to the emitting antenna is further than

    =

    2D2

    R (2.1)

    where D and are the largest dimension of the antenna and the wave length, respectively. R is knownas Rayleigh distance in the literature [Bon97].

    There are many modes of propagation which mainly depend on the used frequency (E.g: ionospheric-,

    tropospheric- or ground waves).

    Frequencies in the range from 880MHz to 2GHz are interesting for this project as this frequency band

    covers the frequency bands of GSM900, DCS1800 and PCS1900. This frequency band belongs to the

    UHF band which covers the frequency range from 300MHz to 3GHz [Par92]. UHF waves propagate

    normally as ground waves [Par92].

    2.1 The Physics of Radio Wave PropagationThis section deals with the physics of radio propagation which is quite similar to the behaviour of

    light. This is not very surprising as the only difference between radio waves and light is the higher

    frequency of the light.

    First the concepts of reflection, diffraction and scattering are discussed and then the free space

    propagation will be discussed.

    2.1.1 Reflection

    If a radio wave which propagates in one medium impinges on another medium having differentproperties then a part of the wave will be reflected and another part will continue the propagation in

    the other medium. Is the second medium a perfect dielectric (conductivity =0) than there will be nolosses through absorption in the second medium. Is the second medium a perfect conductor

    (conductivity =) than the entire impinging wave will be reflected to the first medium.

  • 7/27/2019 GSM Technique

    25/121

    2.1 The Physics of Radio Wave Propagation 12

    Figure 2-1: Geometry for calculating the reflection coefficients between two dielectrics. The subscripts i, r, t,

    refer to the incident, reflected, and transmitted fields. Parameters 1, 1, 1and 2, 2, 2represent the

    permittivity, permeability and conductance of the two media.

    Figure 2-1shows a radio wave impinging on the boundary between medium 1 and 2. A part of the

    energy is reflected into medium 1 with the angle

    ir = . (2.2)

    Another part is refracted with the angle tto medium 2. The angle tis given by Snell's law [Rap96]

    ( )][

    90sinarcsin90

    22

    i11t

    = (2.3)

    where 1, 1, 2and 2are the permeability and permittivity of the two media, respectively. The fieldstrength of the transmitted and reflected wave (Etand Er) are given by [Rap96]

    ir EE = (2.4)

    ( ) it E1E += (2.5)

    where is the reflection factor or || according to the orientation of the E-field. The reflectioncoefficient is a function of the angle of incident, the polarisation of the impinging wave and the

    properties of the two media. The reflection factor for the two cases of parallel and perpendicular

    E-field polarisation at the boundary of two dielectrics are given by [Rap96]

    ( ) ( )

    ( ) ( )t1

    1i

    2

    2

    i

    1

    1t

    2

    2

    ||

    sinsin

    sinsin

    +

    = (E-field in plane of incidence) (2.6)

    ( ) ( )

    ( ) ( )t11

    i2

    2

    t

    1

    1i

    2

    2

    sinsin

    sinsin

    +

    = (E-field not in plane of incidence) (2.7)

  • 7/27/2019 GSM Technique

    26/121

    2.1 The Physics of Radio Wave Propagation 13

    2.1.2 DiffractionBecause of diffraction is it possible that radio waves propagate along the curved surface of the earth

    beyond the horizon or in shadowed areas. This phenomena can be explained with the help of Huygen's

    principle which says that every point of a wave front is the source of a secondary spherical wave. The

    field strength in a shadowed area is the vector sum of all secondary waves. Figure 2-2 shows this

    phenomena.

    Figure 2-2:Principle of diffraction [Bla93]

    2.1.3 ScatteringIf a plane radio wave impinges on a rough surface then is it spread out in all directions. In this case is

    equation 2.2 still valid. Since the surface has a lots of different orientations is the incident wave

    reflected in different directions (see Figure 2-3).

    Figure 2-3:Principle of scattering [Bla93]

    If a surface is rough or smooth can be tested with the help of the Rayleigh criterion, where the critical

    height of the surface protuberances (hc) is given by [Rap96]

    ( )ic

    sin8h

    = . (2.8)

    A surface is called smooth if its minimum to maximum protuberance are smaller than h c. Otherwise

    the surface is called rough. The reflection factor for smooth surfaces has to be multiplied by anscattering loss factor if the surface is rough [Rap96].

  • 7/27/2019 GSM Technique

    27/121

    2.1 The Physics of Radio Wave Propagation 14

    2.1.4 Free Space PropagationThe easiest mathematical describable propagation form is the free space propagation. In this case is

    assumed that the transmitting antenna is placed in free space. It is assumed that the antenna has a gain

    GTin the direction of the receiving antenna which is also placed in free space. The power density per

    unit area in a point with the distance d is then

    2

    TT

    d4

    GPW

    = (2.9)

    where PTrepresents the transmitting power. If the receiving antenna has an effective area A then is the

    received power

    =

    =

    4

    G

    d4

    GPA

    d4

    GPP R

    2

    2

    TT

    2

    TTR

    (2.10)

    where GRrepresents the gain of the receiving antenna in the direction of the transmitting antenna. The

    relationship between transmitted and received power is given by

    2

    RT

    T

    R

    d4GG

    P

    P

    = (2.11)

    This is a fundamental relationship which is known in literature as Friis equation [Par92]. The free

    space propagation loss obeys an quadratic square law with range d.

    Figure 2-4: Propagation over a plane earth (T and R stand for transmitting and receiving antenna)

    Figure 2-4shows the configuration when the antennas are mounted in a height hTand hR(superscript T

    and R stand for transmitting and receiving antenna) over plane earth. Assuming that the earth is an

    ideal conductor and that d>>hT, hRfollows the relationship between transmitted and received power as

    [Par92]

    2

    2

    RTRT

    T

    R

    d

    hhGG

    P

    P

    = (2.12)

    This a equation shows an inverse fourth-power law with the range. This is very close to what can be

    measured in real environment where the path loss PL can be expressed as a function of distance by the

    power law using a path loss exponent [Rap96]

    0d

    dPL (2.13)

    where d0 is the close-in reference distance which is determined from measurements close to the

    transmitter and d is the separation between receiver and transmitter. In urban environments is the path

    loss exponent typically between 3 and 5.

  • 7/27/2019 GSM Technique

    28/121

    2.2 Multipath Propagation 15

    The real mobile environment is too complicated to calculate the path loss deterministic. Therefore is

    the path loss described by models which are derived by analytical and empirical methods. The

    empirical approach is based on fitting curves or analytical expressions that recreate a set of measured

    data. This has the advantage of implicitly taking into account all propagation factors, both known and

    unknown, through actual field measurements. Several models have established and are used to predict

    large-scale coverage for mobile communication systems design (e.g. Egli model, JRC method,

    Blomquist-Ladell model to name some). A detailed description of these models is beyond the scope of

    this report. The interested reader is referenced to [Par92].

    2.2 Multipath PropagationIf a radio wave propagates through the mobile environment then the signal received at a receiving

    antenna is composed of components which origin to different phenomena like diffraction, reflection

    and refraction. The term for this is multipath fading.

    Figure 2-5 shows the received signal strength which was measured in an indoor environment with a

    handset moving on a predefined path. The path losses can be split up into two parts. First there are the

    losses according to shadowing which is called slow fading. On the other hand the signal strength

    varies because the incoming waves have travelled over different distances and therefore they have

    different phases. These signal components can interfere in a constructive or destructive way which is

    called fast fading.

    0 1 2 3 4 5-12

    -10

    -8

    -6

    -4

    -2

    0

    2

    4

    6

    Time [s]

    ReceivedP

    ower[dBovermean]

    measured signal strengthslow fading

    Figure 2-5: Received signal strength and slow fading in an indoor environment

    2.2.1 Slow FadingSlow fading is often called shadowing because hills and buildings are shadowing the radio wave. As

    the mean path loss is log-normal distributed another often used term for this kind of fading is log-

    normal fading. The dashed line in Figure 2-5 shows the trend of the slow fading in an indoor

    environment.

    The received signal can be expressed as

    )t(r)t(m)t(E o= (2.14)

    where m(t) and ro(t) represent the slow and fast fading, respectively.

    The slow fading is extracted of the measured signal strength by building the local mean over a certain

    length. The length of the averaging window has to be adjusted to the environment. If the windowlength is chosen to short then the slow fading will still contain some parts of the fast fading. Otherwise

    if the window length is to long then the calculated fast fading will still contain parts of the slow fading,

  • 7/27/2019 GSM Technique

    29/121

    2.2 Multipath Propagation 16

    which will change the probability distribution of the signal. E.g. a Rayleigh distribution will be

    changed into another distribution.

    2.2.2 Fast FadingFast fading is also known as short-term fading because due to the fast fading the signal strength at an

    antenna can change dramatically when the antenna is moved over a very short distance. The fastfading is caused by signal components coming to the receiving antenna from different directions. As

    they have travelled over different distances the phase of the signals at a certain receiving point will be

    randomly distributed. These signals will interfere constructively or destructively according to their

    phase relations. A typical distance between constructive and destructive interference is /2 where isthe wavelength of the radio wave.

    The fast fading rois calculated using equation 2.15

    )t(m)t(r)t(ro = [dB] (2.15)

    where r(t) and m(t) are the measured signal and the slow fading, respectively. Figure 2-6 shows the

    fast fading in an indoor environment.

    0 1 2 3 4 5-8

    -6

    -4

    -2

    0

    2

    4

    6

    Time [s]

    astFading[dB]

    Figure 2-6: Fast fading in an indoor environment

    Figure 2-7: The co-ordinate system of the scattering model

  • 7/27/2019 GSM Technique

    30/121

    2.2 Multipath Propagation 17

    The distribution of amplitude and phase of the received signal can be deviated using the scattering

    model. Figure 2-7 shows the co-ordinates of the scattering model. In this model it is assumed that the

    received signal is composed of a big number of components with amplitude Cn, phase nand spatialangles nand nwhich are random and statistical independent. The quadratic mean amplitude is givenby

    [ ]N

    ECE 0

    2n = (2.16)

    where E0 is a positive constant and N represents the number of incoming waves. The received field

    strength E(t) is

    =

    =N

    1n

    n )t(E)t(E (2.17)

    with

    ( ) ( ) ( ) ( ) ( )[ ]nn0nn0nn0onn sinzcossinycoscosx2

    tcosC)t(E +++

    = (2.18)

    where x0, y0 and z0 represent the position of the receiving antenna in the co-ordinate system and

    0=2f0, where f0is the frequency of the radio waves.If we assume that the receiver is moving with the speed v in the xy-plane in a direction enclosing the

    angle with the x-axis then the co-ordinates of the receiver are given by

    ( )

    ( )

    .constz

    sinvy

    cosvx

    0

    0

    0

    =

    =

    =

    (2.19)

    The received field strength can be written as

    ( ) ( )tsin)t(Qtcos)t(I)t(E 00 += (2.20)

    where I(t) and Q(t) are the in-phase and quadrature components that could be received by a suitable

    receiver.

    ( )=

    +=N

    1n

    nnn tcosC)t(I (2.21)

    ( )=

    +=N

    1n

    nnn tsinC)t(Q (2.22)

    with

    ( ) ( )nnn coscosv2

    = (2.23)

    ( ) nn0

    n sinz2

    +

    = . (2.24)

    n=2fnis the Doppler shift experienced by the n thcomponent. If z0is different from 0 then the firstpart of equation 2.24 is the projection of the phase into the phase reference lying in the xy-plane.

    If there is a high number of incoming waves and there is no dominating wave then follows by thecentral limit theorem that I(t) and Q(t) are independent Gaussian processes. As the mean values of I(t)

    and Q(t) are zero, follows that the mean value of the envelope is also zero. I(t) and Q(t) have the same

  • 7/27/2019 GSM Technique

    31/121

    2.2 Multipath Propagation 18

    variance 2which is equal to their mean power. The PDF of the in-phase and quadrature componentcan be written as

    2

    2

    2

    x

    x e2

    1)x(p

    = (2.25)

    where x = I(t) or Q(t) and 2=E0/N.The envelope r(t) and the phase (t) are given by equations 2.26 and 2.27.

    )t(Q)t(I)t(r22 += (2.26)

    =

    )t(I

    )t(Qarctan)t( (2.27)

    Since like mentioned before I(t) and Q(t) have zero mean and the same variance is the joint probability

    density function pIQ:

    QIIQ ppp = (2.28)

    2

    22

    2

    QI

    2IQe

    2

    1)Q,I(p

    +

    = (2.29)

    Applying a co-ordinate transformation from pIQ(I,Q) to pr(r,) we get the joint PDF pr(r,)

    22

    1

    2re

    2

    r),r(p

    = . (2.30)

    The PDF of the phase pis derived by integrating pr(r,) over the envelope r.

    ==0

    r

    otherwise0

    202

    1

    dr),r(p)(p (2.31)

    As you can see is the incoming phase uniform distributed. In the same way we get the PDF of the

    envelope pr.

    2

    2r2

    02rre

    rd),r(p)r(p

    ==(2.32)

    Equation 2.32 is well known as Rayleigh distribution. The mean value E[r], the mean square value

    E[r] and the standard deviation Aof the Rayleigh distribution are given by

    [ ]

    ==

    0

    r2

    dr)r(rprE (2.33)

    [ ] 20

    r22

    2dr)r(prrE ==

    (2.34)

    [ ] [ ] ==2

    2rErE22

    A . (2.35)

  • 7/27/2019 GSM Technique

    32/121

    2.2 Multipath Propagation 19

    Figure 2-8shows the PDF of the Rayleigh distribution.

    Figure 2-8: PDF of the Rayleigh distribution; 1=median (50% value), 1,1774, 2=mean value, 1,2533,

    3=RMS value, 1,41

    Rician FadingIn the deviation above we assumed that there is no dominating signal like it is in a non line of sightsituation. Is there a line of sight between transmitting and receiving antenna then there will be one

    dominating signal. Therefore the mean I(t) and Q(t) will be different from zero and there will be less

    deep fades. In this case the joint PDF of pr(r,) is according to [Par92]

    ( )2

    s2s

    2

    2

    cosrr2rr

    2re

    2

    r),r(p

    +

    = (2.36)

    where rsis the envelope of the dominant signal. By integrating over we get the PDF of the envelopepr(r).

    = +

    2

    s0

    2

    rr

    2r

    rrIe

    r)r(p

    2

    2s

    2

    (2.37)

    I0(.) is the modified Bessel function of the first kind and zero order, which is given by

    =

    =0n

    n2

    n2

    0!n!n2

    x)x(I . (2.38)

    The distribution function defined in equation 2.37 is called Rician distribution. Therefore this kind of

    fading is often referred to as Rician fading.An alternative form of the Rician distribution is given by equation 2.40, where the Rician factor K

    (equation 2.39) represents the ratio of the power in the dominant signal to the power in the multipath

    (random) components.

    =

    2

    2s

    2

    rlog10K (2.39)

    ( )

    =+

    2s

    10

    K

    0

    rrr

    10

    2s

    10

    K

    rr

    10r2Ie

    r

    10r2)r(p

    2s

    2

    2s

    10

    K

    (2.40)

  • 7/27/2019 GSM Technique

    33/121

    2.2 Multipath Propagation 20

    Figure 2-9shows the PDF of the Rician distribution for different values of K. If K goes to 0 the PDF

    becomes the form of the Rayleigh distribution and if K>>1 then the Rician distribution looks like a

    Gaussian distribution with mean rs.

    Figure 2-9: PDF of Rician distribution; (a) K

    0, (b) K 1, (c) K >> 1

    The PDF of the phase p() at the presence of a dominating signal results by integrating equation 2.36over the envelope r [Par92].

    ( ) ( ) ( )

    +

    +

    =

    2

    cosrerf1e

    cosr

    21e

    2

    1)(p s2

    cosr

    s2

    r2

    22s

    2

    2s

    (2.41)

    erf(.) stands for the error function which is given by

    =x

    0

    tdte

    2)x(erf

    2

    . (2.42)

    If rs/ tends to zero then the resulting phase will be uniform distributed in the interval [0;2[. If

    rs/>>1 then the phase will be determined by the phase of the dominating signal.

    2.2.3 Doppler ShiftIf the distance between transmitter and receiver changes then the phase position of the received signal

    will also change. Figure 2-10 shows a mobile receiver which is moving with the speed v from A to B.

    During the time t travels the receiver a distance d=vt. This leads to a change of the path lengthbetween transmitter and receiver of l=dcos(). The received phase changes in the time t by

    ( )

    = costv2

    . (2.43)

    This means that the phase changes over the time, which can be expressed by a frequency shift. Thisfrequency shift fDis called Doppler frequency and can be expressed by

    ( )=

    = cosf

    dt

    d

    2

    1f mD (2.44)

    where fmis the maximum Doppler frequency given by

    =

    vfm (2.45)

  • 7/27/2019 GSM Technique

    34/121

    2.2 Multipath Propagation 21

    Figure 2-10: Illustration Doppler effect [Dav96]

    The extreme values of the Doppler frequency (fD=+fm and fD=-fm) result when the mobile station is

    moving directly towards the transmitting antenna or in the opposite direction.

    In the case that the moving mobile station receives a lot of different signal components from different

    directions then the signal components will experience a different frequency shift according to their

    direction . Because of this a continuous wave transmitted from a base station will have a spreadedspectrum of the bandwidth 2fmat the moving receiver. This spectrum has a specific form according to

    the environment and the antenna characteristics and is called Doppler spectrum.

    Assuming that the received signal is composed of many components (like in the chapter before) so that

    the power density is continuous distributed in the area [,+ d] then is the power coming from thisdirection p(). Using a receiving antenna with a horizontal directivity pattern G2() results in areceived power S()in the angle area d

    = d)(p)(AGd)(S2

    (2.46)

    where A is a constant which depends on the path loss and the transmitting power of the base station.

    The power spectrum

    2

    m

    0m

    2

    f

    ff1f

    )(G)(Ap)f(S

    =

    (2.47)

    results by a variable transformation. f0 in equation 2.47 is the transmitting frequency. Assuming the

    incoming components are uniformly distributed over the angle area =[0; 2[ and a vertical monopolewith an omnidirecitonal horizontal directivity pattern G

    2()=1.5 as receiving antenna the Doppler

    spectrum is given by equation 2.48 and will have the bath tube form shown in Figure 2-11.

    2

    m

    0m

    f

    ff1f4

    A3)f(S

    =(2.48)

    The deviation above is assumed on the Clark model, where uniformly distributed incoming signals

    over the angle area =[0; 2[ with an elevation angle =0 (horizontally waves) are assumed. Models

    with more complicated distributions of the incoming signals can be found in [Par92] page 116 to 120.

  • 7/27/2019 GSM Technique

    35/121

    2.2 Multipath Propagation 22

    Figure 2-11: Doppler spectrum of a non-modulated carrier

    2.2.4 Delay SpreadBecause of the multipath propagation will the mobile station receive signals with different delays

    which means that there is time dispersion. A short impulse (t) transmitted from a base station willlead to a certain number of impulses with different attenuation at the mobile station. The channel

    impulse response h(t) can be written as

    =

    =N

    1n

    nn )t(a)t(h (2.49)

    where anand n is the attenuation and the delay of the n thsignal. N is the total number of incomingsignals. Typical channel impulse responses for different areas are shown in Figure 2-12. If the nhaveabout the length of the bit duration there will be inter symbol interference which makes it more

    difficult to detect the transmitted information. Equalisers are used to reduce this problem. For example

    the equaliser in a GSM handset must be able to deal with delays of up to 16 s or 4 bits.

    A measure for the in a channel impulse response occurring delays is the delay spread which isdefined as the second central moment of the delay power spectrum |h(t)|

    2:

    ( )

    =

    dt)t(h

    dt)t(htt

    2

    22

    (2.50)

    with the mean access delay

    =

    dt)t(h

    dt)t(htt

    2

    22

    . (2.51)

  • 7/27/2019 GSM Technique

    36/121

  • 7/27/2019 GSM Technique

    37/121

  • 7/27/2019 GSM Technique

    38/121

    25

    Chapter 3

    Diversity and Combining Methods

    The term diversity means the quality of having variety. In the context of radio signals this means

    having choice between different signals. The basic idea is to get the transmitted information from

    different statistical independent fading channels. The probability that there is a deep fade at the same

    time in two uncorrelated propagation paths is very low. This can be seen in Figure 3-1.

    0 0.5 1 1.5 2 2.5-12

    -10

    -8

    -6

    -4

    -2

    0

    Time [s]

    ReceivedPower[dBbelowmaximum]

    Patch AntennaDipol Antenna

    Figure 3-1: Received signal strength of patch and dipol antenna in an indoor environment (correlation

    coefficient of the fast fading FF=-0,2)

    Some diversity schemes are mentioned in the following section.

    3.1 Different Diversity Schemes

    3.1.1 Space DiversitySpace Diversity can be used in base stations and in mobile equipment. The idea is that the fast fading

    at two separated antennas is uncorrelated if the antennas have a certain distance. The necessary

    distance between the antennas is significantly larger for base stations due to the different surroundings

    of mobile and base station. Normally the antenna of a base station is mounted much higher than the

    height of the mobile antenna. Therefore the base station antenna is clear of its surroundings whereas

    the mobile unit antenna is embedded in them. Figure 3-2 show the different environments for base and

    mobile station.

  • 7/27/2019 GSM Technique

    39/121

    3.1 Different Diversity Schemes 26

    Figure 3-2: The different environments at the base station and the mobile station

    The correlation of the signal envelope r(d) between two separated antennas is [Lee98]

    =

    d2J)d(

    20r (3.1)

    where d is the distance between the antennas, is the wavelength of the radio wave and J0(.) is theBessel function of the first kind zeroth order. In Figure 3-3 r(d) is plotted over d/. The firstminimum of r(d) is at d0,4. This means that two identical antennas with the same polarisation of amobile operating in the 1800 MHz band should be separated by 6 cm.

    0 0.5 1 1.5 20

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    Normalisedcorrelationcoeff

    icient

    d/Figure 3-3: The normalised correlation coefficient over the separation of the antennas

    3.1.2 Polarisation DiversitySignals transmitted in different polarisations will exhibit uncorrelated fading statistics in a mobile

    radio environment. This can be used in a diversity scheme. Therefor the mobile unit needs two

    antennas which are orthogonally polarised. Using polarisation diversity does the distance between the

    two antennas not matter. In non line of sight conditions it is not necessary to transmit in both

    polarisation because there will exist both possible polarisations at the mobile station through the cross

    coupling in the mobile radio environment.

  • 7/27/2019 GSM Technique

    40/121

    3.1 Different Diversity Schemes 27

    3.1.3 Pattern DiversityAnother possibility to get uncorrelated signals at the mobile station is to use antennas with different

    antenna patterns. Figure 3-4 shows the antenna patterns in the XY-plane for the dipole and patch

    antenna of the handset used for measuring the channel data for this project. It can be seen that the

    antenna patterns for both polarisations are quite different.The correlation of the fast fading will be low because the incoming signals will be weighted in a

    different way according to their angel of arrival and polarisation.

    a)

    5

    10

    15

    20

    25

    30

    35

    30

    210

    60

    240

    90

    270

    120

    300

    150

    330

    180 0

    30 correspond to 0dB

    b)

    5

    10

    15

    20

    25

    30

    35

    30

    210

    60

    240

    90

    270

    120

    300

    150

    330

    180 0

    30 correspond to 0dB

    Figure 3-4: XY-plane of the simulated antenna patterns of the dipole (a) and patch (b) antenna of the modified

    test handset; dashed line represents polarisation E, solid line represents polarisation Eand dotted line

    represents |E|+|E|; (user present looking towards 270, handset inclined by 60)

    3.1.4 Frequency DiversityWhen frequency diversity is used the same information is transmitted over several carriers with

    different frequencies. If the used radio environment is frequency selective then the sufficiently spaced

    carriers will face uncorrelated fading. The correlation of the transmission coefficient for two

    frequencies is statistical dependent on their distance. This dependency can be evaluated by applying

    the Fourier transformation to the auto correlation of the mean impulse response [Par92]. Figure 3-5

    shows the frequency correlation over frequency separation in an indoor environment. In this case the

    frequency separation should be at least 4,6 MHz if a correlation of 0,5 is assumed to be less enough to

    achieve a sufficient diversity gain.

    One benefit of frequency hopping which is used by some GSM network operators is frequency

    diversity. As discussed in Section 1.6.2 is the transmitted information spread over several bursts and

    even if one burst has a very high bit error rate due to a deep fade is it possible to determine the correct

    data bits due to the information in the other bursts. Since the chosen frequencies have to be

    uncorrelated is the probability very high that a slow moving user who is in a deep fade during one

    burst using one frequency will not be in a deep fade in the following burst where another frequency is

    used.

  • 7/27/2019 GSM Technique

    41/121

    3.2 Combining Techniques 28

    0 5 10 15 200

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    Frequency separation [MHz]

    Frequencycorrelation

    Figure 3-5: Frequency correlation over frequency separation in an indoor environment

    3.1.5 Time DiversityIn a system using time diversity the same information is transmitted at different times. The channel is

    uncorrelated for two different time points when the mobile station is moving because the distance

    between two fades is very short. The performance of time diversity increases with increasing speed of

    the mobile unit. Note that no additional hardware is necessary for using time diversity.

    3.2 Combining TechniquesThe gain achieved by using a diversity scheme depends a lot on the method used for combining the

    received signals. For the discussion of the different combining techniques we assume space,

    polarisation or pattern diversity where a several number of antennas is used.

    3.2.1 Switched CombiningSwitched Combining is the combining technique with the lowest effort in hardware. Only an antenna

    switch is needed. The algorithm switches to another antenna if the signal quality falls below a certain

    threshold. The threshold is determined as a kind of local mean.

    Antennas

    Switch

    ReceiverRX

    Antennas

    Switch

    Receiver

    Output

    Figure 3-6: Switched Combining

  • 7/27/2019 GSM Technique

    42/121

    3.2 Combining Techniques 29

    3.2.2 Selection CombiningA receiver for each antenna is necessary if selection combining is used. The signal with the highest

    signal to noise ratio (SNR) is selected in the base band for further use. The SNR of selection

    combining is never higher than the SNR of the best signal because the signals of the non-chosen

    antennas are discarded.

    Antennas

    ReceiverRXRX RX RX

    Selection Logic

    Output

    ...

    Figure 3-7: Selection Combining

    3.2.3 Maximum Ratio CombiningA system using maximum ratio combining weights the signals of the antennas according to their SNR,

    aligns their phases in the base band and adds them. This method is the best combining technique if

    only noise is present. A drawback of maximum ratio combining is the huge amount of calculations

    which are necessary to determine the correct weight setting.

    Antennas

    Adjustable Amplifiers

    RXRX RX RX

    Output

    ...

    phase correctsummation and

    weight generation

    Receiver

    Figure 3-8: Selection Combining

    3.2.4 Equal Gain CombiningA simpler method than maximum ratio combining with nearly the same performance is equal gain

    combining. This combining method aligns only the phases of the base band signals before addingthem.

    3.2.5 Optimum CombiningAll the combining techniques mentioned above improve only the SNR. Optimum combining has the

    same structure like maximum ratio combining. The difference is that in optimum combining the

    weights are chosen in that way that the signal to interferer and noise ratio (SINR) is maximised.

  • 7/27/2019 GSM Technique

    43/121

    3.3 Model For Optimum Combining 30

    3.3 Model For Optimum CombiningIn this paragraph the principle of optimum combining is explained and a mathematical relation for the

    weights is derived.

    In Figure 3-9 a block diagram of an M antenna element adaptive array can be seen. The complex

    baseband signal received by the i thantenna element in the kthsampling interval xi(k) is multiplied by acontrollable complex weight wi. The array output y(k) is then formed by summing the weighted

    signals.

    The optimum weights are the ones that minimise the SINR (Signal to Interferer and Noise Ratio).

    WeightGeneration

    r(k)

    y(k) ArrayOutput

    ReferenceSignal

    (k)- +

    wM(k)

    w1(k)

    x1(k)

    xM(k)

    ...

    ...

    Figure 3-9: Block diagram of an M-element adaptive array

    Let the complex weight vector wbe given by

    =

    M

    2

    1

    w

    w

    w

    w (3.2)

    and the received complex signal vector xis given by:

    =

    M

    2

    1

    x

    x

    x

    x (3.3)

    The received signal consists of the desired signal, thermal noise and interfering signals. This can be

    expressed as:

    =

    ++=L

    1j

    jnd xxxx (3.4)

    where xd, xnand x

    are the received desired signal, noise, and jthinterfering signal vectors, respectively,

    and L is the number of interferers. Furthermore, let sd(k) and s

    (k) be the desired and jth interfering

    signals as they are transmitted, respectively, with

    [ ] 1sE 2d = (3.5)

  • 7/27/2019 GSM Technique

    44/121

    3.3 Model For Optimum Combining 31

    [ ] .Lj1for1sE 2j = (3.6)

    Then xcan be expressed as

    =

    ++=L

    1j

    jjndd )k(s)k(s uxux (3.7)

    where udand u

    are the desired and jthinterfering signal propagation vectors, respectively.

    The error signal (k) is given by

    )k(y)k(r)k( = (3.8)

    where r(k) is the kthsample of the reference signal and y(k) is the output of the antenna array at the k

    th

    sample. Writing y(k) as the weighted sum of the input signals (3.8) becomes

    )k()k(r)k(Txw= (3.9)

    where superscript T denotes transpose. The square absolute value of (k) is:

    ( ) wxxwxw )k()k()k()k(r2)k(r)k(r)k( T*T*T*2 += (3.10)

    where the superscripts * denotes conjugate. Taking the expected values of2

    )k( gives

    [ ] wRwrw xxTxrT*2 2)k(r)k(r)k(E += (3.11)

    where the line above r(k)r*(k) means the mean value of this expression andrxris

    =

    )k(r)k(x

    )k(r)k(x

    )k(r)k(x

    *M

    *2

    *1

    xr

    r (3.12)

    and Rxxis the received signals (desired and interfering signals plus noise) correlation matrix and whichis given by

    ++

    ++=

    ==

    TL

    1j

    jnd

    *L

    1j

    jndxx E xxxxxxR (3.13)

    Assuming the noise and interfering signals are uncorrelated, it can be shown that

    [ ]=

    ++=L

    1j

    Tj

    *j

    2Td

    *dxx E uuIuuR (3.14)

    where 2 is the noise power and Iis the identity matrix.

  • 7/27/2019 GSM Technique

    45/121

    3.3 Model For Optimum Combining 32

    The weights which minimise2

    )k( and maximise the SINR are found by solving

    [ ]( ) 0)k(E 2w = . (3.15)

    Since

    [ ]( ) wRr xxxr2w 2)k(E += (3.16)

    follows that the optimum choice for the weights must satisfy

    xr1

    xxrRw = (3.17)

    where superscript 1 denotes the inverse of the matrix. In the optimal case where the cross correlationbetween the desired signal and noise and interfering signal is zero, is

    *dxr ur (3.18)

    Remembering that multiplying wwith a constant does not affect the SINR at the array output we canwrite the equation for the optimum weights

    *d

    1xxu= Rw . (3.19)

    where is a constant.

    [Win84] comes up with a slightly different formula for calculating the optimum weights which results

    in another scaling of the weights which does not affect the output SINR of the antenna array [Boc99].Winters suggests the use of a noise and interferer correlation matrix which is given by

    [ ]=

    +=L

    1j

    Tj

    *j

    2nn E uuIR (3.20)

    Using this matrix Winters calculates the optimum weights by

    *d

    1nnu= Rw (3.21)

    where

    is a constant again.

    Two different algorithms to gain the optimum weights are mentioned in this project. The first called

    algorithm A is based on equations 3.14 and 3.17 whereas the second called algorithm B is based on the

    weight formulas from Winters (equations 3.20 and 3.21).

  • 7/27/2019 GSM Technique

    46/121

    3.3 Model For Optimum Combining 33

    3.3.1 Algorithm AAlgorithm A is based on equations 3.14 and 3.17. The optimum weights calculated by algorithm A are

    given by

    xr1xx rRw = (3.22)

    where the estimated received signal correlation matrix is given by

    )j()j(K

    1 TK

    1j

    *xx xxR

    =

    = (3.23)

    where K is the number of samples used. The estimated received signal cross correlation vector is given

    by

    )j(r)j(K1

    K

    1j

    *xr == xr (3.24)

    The only available reference signal in GSM is the 26 bit long training sequence. As a GMSK

    modulated bit has an impulse response which is at least 3 bit long (see Appendix A) are the first two

    bits of the received training sequence distorted by the two preceding bits. Therefore is it not possible

    to use the first two bits of the training sequence as part of the reference signal. So the reference signal

    is just 24 bits long.

    Note that algorithm A does not need any information about the interfering signal in order to calculate

    the optimum weights but it is necessary to know the received signals at all antennas in order to

    calculate xxR and xrr . This makes two complete receiver chains necessary (see Appendix E). The aim

    of this project is to find an algorithm which needs only one receiver. Therefore is it not possible to usealgorithm A for this project.

    3.3.2 Algorithm BTo deal with the problem mentioned above the following on the formula of Winters [Win84] based

    method is used. The estimated noise and interferer matrix is given by

    =

    +=L

    1j

    Tj

    *j

    2nn uuIR (3.25)

    and the weights are calculated by

    *d

    1nn u= Rw (3.26)

    where estimated noise power 2 , the estimated propagation vector of the wanted signal d and theestimated propagation vector of the interfering signal jare determined from the output of the antenna

    array as described in Chapter 4 Signal Estimation.

    In the case of only two antennas is it possible to scale the weights using equation 3.27 in that way that

    one weight equals always one. Doing this demands only one controllable amplifier and one phase

    shifter in the receiver.

    =

    = 21

    12 w

    w

    w

    1

    w~

    1~w . (3.27)

    The performance of this algorithm and algorithm A is compared in Appendix F.

  • 7/27/2019 GSM Technique

    47/121

  • 7/27/2019 GSM Technique

    48/121

    35

    Chapter 4

    Signal Estimation

    In the Section 3.3.2 Algorithm B which describes the Algorithm B is shown that it is necessary to

    know the noise power and the propagation vectors of wanted and interfering signal at the input of the

    antenna system in order to calculate the optimum weights. As these parameters cannot be measured

    exactly they have to be estimated. In the first part of this section it is described, how the signal looks

    like and how it is composed for the simulation. Then in Sections 4.2 to 4.6 it is mentioned how the

    different parameters of the received signal can be estimated and which estimation error is made by

    using these methods.

    4.1 Signal CompositionThe signal used in the receiver for estimating the parameters needed for calculating the weights

    consists of the wanted burst, the signal from the interfering base station and white gaussian noise. The

    amplitude and phase of the wanted and interfering signals will be different because both base stations

    can transmit with different powers and the propagation channels are different. The amplitude of the

    interfering signal will with a high probability be lower than that of the wanted because the distance to

    the interfering base station is larger. The bursts of the wanted and the interfering base station will start

    at different times because the base stations in GSM systems are not synchronised.

    For evaluating the estimation errors by the suggested algorithms, the signals are modelled as follows.

    For the interfering and wanted signal are GMSK modulated GSM bursts with 4 samples per bit with

    different training sequences used. Figure 4-1 shows the structure and the phase course of one GSM

    Burst. The 2 blocks with the 58 random bits stand for the 57 data bits and the stealing bit of a normal

    burst in GSM.

    Since the base stations in the GSM system are not synchronised it is unlikely that the training

    sequences of the wanted signal and the interferer occur at the same time. To take this into account is

    the burst of the interfering signal shifted by 50 Bits (see Figure 4-2). If the training sequences of

    wanted and interfering signal would overlap the estimation of the signals would be disturbed by the

    same bit sequence every time which leads to the same estimation error especially when the noise level

    is very low. In this case it is no use to average over a number of bursts to get a realistic measure for the

    estimation errors.The noise is modelled by a random signal which has a Gaussian distributed amplitude and a zero mean

    value. The phase of the noise is uniformly distributed between 0 and 2.Figure 4-3 shows how the input signal of the estimators is composed of wanted signal, attenuated

    interfering signal and noise.

  • 7/27/2019 GSM Technique

    49/121

    4.1 Signal Composition 36

    0 50 100 150

    -900

    -720

    -540

    -360

    -180

    0

    180

    360

    Bit Number

    Phase[]

    26 bit TS58 random bits 58 random bits

    3 tail bits 3 tail bits GP

    b)

    a)

    TS Training SequenceGP Guard Period (shortened to 2 bits)

    Figure 4-1: a) Structure and b) phase course of one GSM Burst1

    26 bit TS58 random bits 58 random bits

    3 tail bits 3 tail bits GP

    58 random bits

    26 bit TS58 random bits 58 random bits 58 random bits

    50 bit

    26 bit TS 58 random bits

    TS Training SequenceGP Guard Period (shortened to 2 bits)RB Random Bits

    3 tail bits

    random bitsRB

    Original Burst:

    Shifted Burst:

    Figure 4-2: Construction of the shifted interfering signal

    1The sequence of the 148 transmitted bits (3 tail bits + 57 data bits + 1 steeling bit + 26 bit training sequence +

    1 steeling bit + 57 data bits +3 tail bits) has the duration of 150 bits because the impulse response of the GMSK

    modulator (which lasts several bits) is 3 bits long in the GSM transceiver (see Appendix A for details). So the

    last tail bit (bit number 148) will although cause an output at bit number 149 and 150 where actually no data istransmitted. In order to show this are the first two bits of the 8,25 bit long guard period also plotted in the graph.

    The guard period does not influence the quality of the results in this chapter because the estimation algorithmuses only the areas where the training sequences are located.

  • 7/27/2019 GSM Technique

    50/121

    4.1 Signal Composition 37

    0 50 100 1500

    0.5

    1

    1.5

    Bit NumberAmplitude

    0 50 100 150-180-90

    090

    180

    Bit NumberPhase[]

    Trainingsequence 0

    (26 Bit)58 random bits 58 random bits

    3 tail bits 3 tail bits GP

    Wante

    dBurst

    0 50 100 1500

    0.25

    0.5

    Bit NumberAm

    plitude

    0 50 100 150-180

    -900

    90180

    Bit NumberPhase[]

    Noise

    +

    +

    =

    Burst

    Structure

    0 50 100 1500

    0.25

    0.5

    Amplitude

    Bit Number

    0 50 100 150-180-90

    090

    180

    Bit NumberPhase[]

    3 tail bits3 tail bits GP

    InterferingB

    urst

    0 50 100 1500

    0.51

    1.5

    Bit NumberAmplitude

    0 50 100 150-180

    -900

    90180

    Bit NumberPhase[]

    EntireBurst

    GP Guard Period (shortened to 2 bits)

    Trainingsequence 0

    (26 Bit)46 random bits58 random bits

    12rand.bits

    Figure 4-3: Composition of input signal for estimators (C/I=10dB, C/N=20dB)2

    (the phase is limited to 180)

    2In reality the power of the interfering burst can change after bit number 101 (e. g. when the interfering base

    station is not transmitting in this time slot or power control is implemented). In this chapter we are onlyinterested in the parts of the bursts, where the training sequences are placed, so there is no effect on the

    estimation error if the power of the interferer is chosen equal for both overlapping time slots. The case ofdifferent interferer powers is mentioned in Section 4.5.2.

  • 7/27/2019 GSM Technique

    51/121

    4.2 Propagation Vector of Wanted Signal 38

    4.2 Propagation Vector of Wanted SignalThe propagation vector (amplitude and phase) of the wanted signal is calculated by correlating the

    received signal with the modulated training sequence from the wanted base station. The phase and

    amplitude of the highest correlation peak is taken as an estimate for the propagation vector of thewanted signal.

    The received