Professional Documents
Culture Documents
By:
Eng\ WALEED ELSAFOURY
13 kbps
Channel
encoder
Microphone
Acoustic
signal
22.8 kbps
Analog
electrical
speech
signal
Digital
speech
signal
Interleaver
22.8 kbps
Ciphering
22.8 kbps
Burst assembling
and multiplexing
33.85 kbps
Modulator
Channel
Demodulator
33.85 kbps
Burst Deassembling
and demultiplexing
22.8 kbps
Deciphering
22.8 kbps
De-Interleaver
Recovered speech
Speech
decoder
22.8 kbps
13 kbps
Channel
decoder
2- Sampling
4- Encoding
-Bandlimiting
F(f)
H(f)
Baseband signal
F(f)
f
Low-pass filter
fX
Bandlimited signal
fs(t)
f(t)
Analog signal
fs(t)
Ts
t
Sampling
fs = 2 fx sample/sec
Sampled signal
Ts
t
f(t)
f(t)
Analog signal
Sampling
Low
Low
Pass
Pass
Filter
Filter
3.4 kHz
t
Bandlimited
to 3.4 kHz
Electronic
Electronic
Switch
Switch
fs= 8 ksample/s
fs(t)
t
PAM sampled signal
Sampled
value
Quantized value
Quantized error
q4
q3
time
q2
q1
q0
Encoder
Encoder
Quantized Samples
0 1 0 1 1 0 0 1
8 : 1 compression
13 kb/sec
260 bit
01000101111010
01000101111010
Predictive coding
1. We send information about noise not the voice itself
(pitch, tone,.etc)
2. Less power and less co-channel interference
Voice activity
detection
VAD
Discontinuous
Speech coder
Voice frame
Comfort noise
Noise frame
transmission
o GSM uses:
1. Block code
2. Convolutional code
Block
coder
53 b
b 378
378 b
1:2
Convolutional
coder
bits 456
4 tail bits
50
Parity
check
Class 1b
132 bits
132
Class 2
78 bits
4
Tail
bits
78
Interleaving
57 bits
1
9
17
25
2
10
18
26
3
11
19
27
4
12
20
28
5
13
21
29
6
14
22
30
7
15
23
31
8
16
24
32
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
449
450
451
452
453
45
4
455
456
20 msec speech
8x57=456 bits
20 msec speech
8x57=456 bits
57 bits
20 msec speech
8x57=456 bits
57 bits
Normal Burst
GSM security
TMSI
Authentication
IMEI check
ciphering
AUC
HLR
,IMSI, Ki
A3, A8
GSM PLMN
EIR
IMEI
A5
A5
BTS
VLR
MSC
IMEI
IMSI, Ki,
A3, A8
SIM
AUC
IMSI
Ki
Database
IMSI,Ki
RAND
A3
RAND
SRES
Triplet
A8
Kc
Request for
Triplet from
HLR,VLR
Triplet
HLR/AUC
IMSI
RAND
Ki
A3
Ki
A3
SRES
SRES
VLR
SRES
=?
Yes
No
Authentication Refused"
message
Continue
ciphering
MSC/VLR
MSC/VLR
Initiate
Initiate
Authentication
Authentication
Ciphering
Ciphering
IMEI
IMEI request
request
IMEI Request
ME
IMEI
MS
IMEI Response
BSS
MSC/VLR
EIR
Check
IMEI
Black
List
Gray
List
White
List
Network
RAND
Ki
A8
Ki
A8
Kc
Kc
MSC
2. CMC
MS
BTS
6. Ciphering
mode complete
If yes
5. Decryption of
CMC successful?
Kc
CMC
FN
Decryption
process
using A5
4.Encrypted
CMC
Kc FN
Encryption
process
using A5
3.Encrypt CMC
0 1 1 0 0 1 0
0 1 1 0 0 1 0
Kc
Kc
FN
A5
1 0 1 1 0 0 1
Cipher sequence
key flow
Cipher sequence
key flow
A5
1 0 1 1 0 0 1
1 1 0 1 0 1 1
Ciphered text
Ciphering Process
FN
Deciphering Process
Modulation
1. High bandwidth efficiency i.e. high bit rate per Hz
2. Low power drain
3. Good BER performance
4. Low implementation cost
modulator