`
`I I
`
`,iit;" *¿'-"
`
`,(. - @l'-
`
`I
`
`-ô
`
`¡
`
`ll
`
`-
`
`'
`
`It&
`
`',å
`
`.'*,tlt
`...-i;.âïã
`
`,ffi
`f::.r..t$ '-ryfrT{
`i l¿{ iùrft{
`;.:,f i'P-f'.ffi
`,,
`.i
`¡.it :"
`":'
`
`-mrü8ffi
`!ryøâbffi
`ffï
`; ¿.¡1,
`'" ."\t...
`
`'i
`
`',1
`
`ìqsrjli
`:'¡- *!l,
`it ,.: ilql
`:'
`l'.9
`i,ì- .t¡
`
`i. , .,'Tl:
`
`Mobile Handset
`DgSign
`
`¡'¡ij;:l i'trrì t¡r Das
`
`t8)WILEY
`
`EXHIB}T 5
`WILLIAMS
`7t26t16
`
`Anne Torreano, CSR 10520
`
`Sierra Wireless EX 1018 p 1
`
`
`
`MOBILE HAI{DSE,T
`DESIGI\
`
`Sa.ial Kumar Das
`Nokia R&D Center, Indict
`
`1l
`
`''
`:¡
`:l
`
`I 4 å!
`
`l
`1.
`
`I,t Ti
`
`t:
`I
`
`,1!
`
`.|.
`,l
`
`c
`
`I'
`il
`I¡
`
`I! t Ii
`
`.
`
`John Wiley & Sons (Asia) pte Lrd
`
`,l
`
`t
`
`,l
`
`Sierra Wireless EX 1018 p 2
`
`
`
`copyright @ 2010
`
`John wiley & sons (Asia) pte Lrd, 2 clementi Loop. # ()2-0t,
`Singapore 129809
`
`Visit our Home Page on wwwwiley.cont
`
`All Rights Reserved No part of this publication may be repro<.lucecl, stored in a retrieval systen or transmitted in
`any f'ornr or by any means. electronic, mechanical, photocopying. recording. scanning, or otherwise, excepr as
`expressly permitted by law, without either the prior written permission of the publisher. or autho¡ization rhrough
`payment of the appropria'" lln,:::fy fee to the copyright clearance cenrer. Requesrs fbr permission shoul<l be
`addressed ro the Publisher. John Wiley & Sons tAsiai pie ¡-t¿. Z Clementi Loop, #02-01. Singapore 129g09,
`tel : 6-5-64632400. f ax: 65 -6464691 2, email : enquiry @wi ley.corn.
`
`Designations used by companies to rlistinguish their products are ofien claimecl as trademarks. All brand names
`and product names used in this book are trade names. service marks, trademarks or registerecl trademarks ofi
`their respective owners' The Publisher is not associated with any proiluct or vendor mentionecl in this book. Àll
`trademarks referred to in the text of this publication are the prup.ity of their respective owners.
`This publication is clesigned to provìde accurate and authoritative information in regard to the subject mâtter
`covered' It is sold on the understanding that the Publisher is nor engaged in rendenigprotessional services. If
`professional advice or other expert assistance is required, the servicà ãf,
`"o,np.t"n, iåt"r*iun"t sirould be sought.
`Other Wíley Editoriat OÍrtces
`
`John wiley & s.ns, Ltd, The Atrium, Southern Gate, chichester, wesr sussex, porg tìse, LIK
`John Wiley & Sons lnc., I I I River Streer, Hoboken, NJ 07030, USA
`Jossey-Bass,989 Market Street. San Francisco, CA 94103_1741, USA
`Wiley-VCH Verlag GmbH, Boschsrrasse lZ,D-6g46g Weinheim, Gernrany
`John wiley & Sons Austrari aLtd,42 McDougalr Street, Milton, eueensland 4064, Ausrraria
`John Wiley & Sons Canada Lrd, 5353 Dunclas Srreer West, Suite 400, Toronro, ONT, MgB 6Hg, Canarla
`wiley also publishes its books in a variety ofelectronic formats. some content that appears in print nray nrf be
`uvailable in electronic books.
`
`Library of Congress Cataloging-in- publication Data
`Das, Sajal K.
`Mobile handset design / Sajal Kurnar Das.
`p. cm.
`ISBN 978-0-470 -8246't -2 (ctoth)
`l Mobile communication systems. 2. wireless communication systems. 3. cellular telephones. I. Title.
`TKós70.M6D35 2009
`621.3845'64c22
`
`2009018?t4
`
`rsB N 978-0-470 _fa246.7 _? (HB)
`
`Typeset in 9/l lpt Times by Thomson Digital, Noida, Inc.lia.
`l:rlt:d and bound in Singapore by Markono prinr Mectia pte Ltd, Singapore.
`This book is printed on acitl-fiee paper responsibly nranut'actured tiom sustainable f<lrestry in which at least
`two trees are planted for each one used i.or paper procluction.
`
`Sierra Wireless EX 1018 p 3
`
`
`
`20
`
`Mobile Handset Des lgn
`
`power P, is spl'ead over the surt'ace o{'a sphele whose raclius is r., so the power density will be p,/.lnrr.
`Taking this energy, the fìux lines will nrove away fionr the transmitting on,.nnn. Now, as they move away
`tì.onttheantenua'thesizeofthesphereincrea.es.rincreasesbutthesarnepower(p,)iscontaineclwithinit.
`Thus the porver density Pr/4n'i clecreases as it travels firr tì'onr the transnritting antenna (tìlr exarnple.
`increase in r )' and the problenr of transnrission of electrical energy via air/fiee-space is solvecl.
`How ís Ettcrgy Receioed on the olher síde? - Again, the anteina helps to solve this pr.oblem too. It
`transfirrms the received EM wave into an electrical signal. when the transmittecl wave arrives at the
`receiving end' it tries to penetrate via anothel the nletallic antenna. we know that the EM wave consists of
`an electl'ic fìeltl and a nlagnetic fìekl and that these are perpendicular to each other, and also that they are
`perpendicular to the direction of propagation. Thus when the EM wave touches the metallic antenna (fio'r
`Maxwell's third equation) the rragnetic tìeld (É/ )will generate a surf.ace current on the nletallic antenna,
`which will try to penetrate via the lnetal (as it is a sood conductor). Hr¡wever. it will die clown afÌer
`traveling a thickness ofthe skin clepth, ancl. the EM wave will generate an electrical current in the rnetal
`body of the antenna. Similarly (fì.orn Maxwell's fourth equation). the electric fìeld will generare an electric
`voltase in tlte antenna. as shown in Figure Ll9.
`This phenrmenon can be experience<l by pracing a radio inside a crose, metal
`that it does not play. as the EM wave can noip.n.,roì. uia the thick meta¡ jc wa'.
`through a concrete wall' For the same ,.n.n,,. o mobile telephone call disconnects inside an enclosecl
`"'.',t-ti:iiîrîi#ÍÏ:
`nretallic lifÌ due to the <iegradation of the signal strength.
`Thus we have convertecl the transmittecl energy {which was transmitted using the carrier of the EM
`waves) back into the electrical signal through the help of another antenna. so the antenna helped in
`transmitting and receiving the infbrnlation through the air. As the user wants to sencl and receive the
`infonnation' ideally the user should have both tranJnitting and receiving onr.nnor. However, in general. in
`a ntobile device' the sanle antenna is usecl fìrr transmission as well as r.eceìving purposes ( ret'er to chapter 4).
`Thus we ntlw kltow how to transmit and receive the infbrmation uio tt. nî, tft)r example. via a wireless
`nredium) using antenna However. the problem at this stage is whether the baseband signal is transmittecl
`its lrequencv is low (-KHz), ancl so it can nor be senr directly via the air clue ro rhe rbilowing
`iïi::íìl'
`
`A lalger antenna length (-1./4) is required.
`Much less BW is available at the lower frequency region.
`
`I 2
`
`The soltrtion kl this is to up-convert the baseband signal to a high frequency RF signal at the transmitter.
`and then sirnilarly down-convert at the receiver fbr exanrple. *rricrr råqul,-e. RF conver.sion techniqr:es.
`How is the baseband signal up-converted/down-converted'J The solution fbr up-conversion is the use of
`analog or digital modulation and nrixing techniques (on a transmitter block) and the solution lbr down-
`conversio¡r is the use of demodulation_ nrixing techniques (on a receiver block). These wi ll be discussed in
`nrore detail in chapter 4' Next we will establish whaì else, apaff from the anten¡ra, is require¿ insi¿e the
`transmitter and receiver to franstnit or receive the information.
`
`1.2.3 Bqsic: Building Blocks of ct wireless Transmiîter (tnd Receiver
`we know that a iligital system is more imnune to noise, and that in adclition to this thele are rnany such
`advantages ol'digital systems over the olcl analog systems. So, from th. r..nnd g.n"ration onwarcls *ir.l"rl
`systems have been designed with digital technology. However, there is o i-ur.r, in that voice and
`video signals are inherently analog in nature. so ¡o*.on these signals be interf'aceil with a ¿igital system,l
`These signals have to be brought into the digital domain. for procelsing ,ring on onurog-to-digital converter
`( ADC) and then again reverred back into an analog signal using a aigita't-to-aiaiof lonu.n., inAC) ancl rhen
`sentviaanantenna'Atypical
`transmitterblockãiagranrol'awirelesssysternisshownintheFigure
`
`1.20.
`
`Sierra Wireless EX 1018 p 4
`
`
`
`lntroduction to Mobile Handsets
`
`t',l
`
`,o
`
`2l
`
`to digital
`converslon
`(AUDTO CODEC)
`
`Date source
`
`Digital modulation
`(convert digital
`data to analog
`signal)
`
`Channel coding
`(EFìFIOR coding)
`
`Data
`segmentation
`
`Analog
`modulation
`(RF up
`convertion)
`
`Power ampl
`
`Antenna
`
`EM waveltt/
`
`lnterleaving
`
`Ciphering
`
`Duplexer
`
`Digital baseband unil
`
`Transmltter
`
`RF frontend
`
`Irigure 1.20 Transrnitter system block tliagrarn
`
`As sht>wn in the Figure 1.20, on the transmitter side, when the user speaks in front of a rnie ruphotrc, it
`generates an electrical signal. This signal is sampted and converted into digital data and then tèd to the
`i..,¡rce coclec, for ex¿mple. a speech codec unit (this is discussed in more details in Chapter tì)' which
`rcrnoves the reclgndant ciata and generates the intbrmation bits. These data are then tècl into the channel
`coder unit. When the signal travels via the metlium, during this time it can be ¿ffected by signal noise, so
`rve need sorre type of protection against this. The channel coder unit inserts some extra redundant clat¿ bits
`tusing an algorithm, which helps the receiver to detect and correct the receivecl data (this is cliscussecl in
`n¡,r.",l.tnil in Chapter 3). Next. it is fèd to nn interleaving block. When data pass through the channel. this
`tirne there miry be some type of burst noise in the channel. which can acttlally colrupt the entire clata during
`rhis b¡rst period. Although the burst lasts tbr only a short duration, its anrplitude is very high. so it corrupts
`the clata enf irely fbr that duration. In order to protect the tlata tìrrm btrrst en'of, we rreed to randomize the
`tlata signal (separate consecutive bits¡ over the entire data tïlinle, so th¿tt dûta citn be recovel'ed' althottgh
`sorne p¿ìrt will be corrupted completely. An interleaving block helps in this respect (this is (liscussed in
`tlctail in Chapters -3 untl 8). Next, it is passetl to a ciphering block, rvhere the clata ale cipherecl using a
`spec'ifìc algorithrr. This is basically clone for rlata security purposes, so that un¿tuthorizecl boclies cannot
`.leõíicle tlre intbrrnation (ciphering is rliscussecl in Chapters 7 and 9). Then the data are put together in a
`hlock and segnrentecl tccorcling to the dlltx frame length.
`T¡e clata processing is now over, and next we have to pass it fbr transmission. This tlata signll can lrot he
`scnt dir.ectly using an ¿lntenn¿ì. becuuse, it will be conrpletely distorted- Also, the lrctlttcncy and anlplitucle
`olthe clata signal is less. as we know the length olthe transmitting iìntenna shotrld bc ¿ nlinimurï ol'the
`orrler of Z/4. So, the ret¡uirecl size of the antenn¿ will have to he very large, which is not t'easible. This is
`tvhy we neetl t1¡ co¡vert it into a high tiequency analog signal usiltg rnodulation techniclues.'Ihe digital
`rloclulator h|rck transt'ers the digitîl signal into a krw anrplittrde lnalog signal. As the fiec¡trency ol this
`arrakre siqnal n-ray be less. lve therefbre rray need to convert it into a hi-uh fret¡uency IìF signal. where tlre
`rvavelength is slrlll ancl the requirecl antenna length will also be snlall. The analog lltotlulittor block helps
`to up-convert the analog signal frequency to rì high RF carrier fret¡rtcncy (the nloclulation technitlue is
`tliscussetl in Chapter 5). It is then t'ed into ¿r power amplilìer to increase the porver olthe signal. ittrtl al'ter
`that it is passed to rluplexer unit. We know that uur telephr)ne ilcts as ir transmitter as well its a rcceiver. so it
`
`Sierra Wireless EX 1018 p 5
`
`
`
`+ !
`
`,.
`
`'l
`:'.
`
`,,.,
`
`Mobile Handset Design
`
`should have both a transmission and a reception block inside. As we wa¡lt Jo use the same antenna for
`transmission and for reception purposes, so we c<-rnnect a duplexer unit to separare out the transrnitting and
`receiving signals' The transmitted signal goes to an antenna and this antenna racliates the signal through
`airltiee space.
`As shown in Figure l'21, the reverse sequence happens in the receiver, once it receives the signal. The
`antenna actua¡ly receives many such EM waves. which are ofdifferent frequencies. Now, ofthese signals,
`the receiver should receive oly
`lh: desired frequency band signal that is transmitted by rhe transmirrer.
`This is done by passing the signal fiom the dupËxer uia a bunã-puss fìlter. This filrer will allow only rhe
`desired frequency band signal to pass through ii and the remiander will be blocked. Afrer rhis, ir passes via
`the low noise amplifìer to increase the power of the feeble signal that is received. Then it is RF down-
`converted (analog demodulated)' digital demodulated, de-interleaved, a"-"ipi.."a, decoded and the
`information blocks are recovered. Next, it is passed to the source decoder and ulrirnutaly converted back
`into ¿rn analog voice signal by the DAC andpassed to the speaker to create the speech signal.
`
`1',
`
`Antenna
`
`l'
`d
`
`Digital to analog
`conversion
`(AUDtO CODEC)
`
`Channel decoding
`
`Digital
`demodulalion
`(generate
`data)
`
`Data
`concatenation
`
`De-interleaving
`
`De-ciphering
`
`Dig¡tal baseband unit
`
`Receiver
`
`Analog
`demodulation
`(RF down
`conversion)
`
`Low noise
`ampl
`
`filter
`
`Duplexer
`
`BF fronfend
`
`Figure 1.21 Receiver system block diagram
`
`In this figure the front blocks dealswith the analog signals. This fiont-encl part that deals with the analog
`signal is called the RF front-end or RF transceiver. Sometimes the digital modulation/de-modulation unit
`is also put together with the RFtransceiverunit (the design of the RF tiansmitterand receiver are discussed
`in detail in chapter4)' The back-end part, where the baseband cligital signal (baseband signal) is processed
`and the signaring and protocol aspects are dealt with is known as the baseband module.
`
`1.2.4 The Need for e Communication protocol
`we have seen how the sender and receiver communicate via a wireless channel using a transmitter an¿ a
`receiver To set up, maintain and release any communication between the users, we need to follow certain
`
`'¡
`
`I'
`
`|I
`
`Sierra Wireless EX 1018 p 6
`
`
`
`Introduction to Mobile Handsets
`
`23
`
`protocols, which will govern the communication between the various entities in the system. The Open
`Sysrem Interconnection (OSI) retèrence model was specified by ITU, in cooperation with ISO (lntema-
`tional Organization for Standardization) and IEC (International ElectrochemicaI Commission). The OSI
`reference model breaks down or separates the communication process into seven independent layers, as
`shown in Figure 1.22. Generally, in wireless communication systems, similar to the ISO-OSI model, a
`tayered protocol architecture is used. However, in most instances, only the lower three layers (physical.
`data link and netwofk) are modified according to the needs of the various wireless systems. A layer is
`composed of subsystems of the same rank of all the interconnected systems. The functions in a l¡yer are
`perfbrmed by hardware or software subsystems, and are known as entities. The entities in the peer layers
`(sender side and receiver side) communicate using a defìned protocol. Peer entities communicate using
`peer protocols. Data exchange between peer entities is in the tbrm of protocol data units (PDUs)' All
`messages exchanged between layer N and layer (N - I ) are called primitives. All message exchange on
`the sâme level (or layer) between two network elements, A and B, is <letermined by what is known as peer-
`to-peer protocol.
`
`SYSTEM.A
`
`Applicat¡on
`
`Presentation
`
`Session
`
`Transport
`
`Network
`
`Data link
`
`Physical
`
`Communicalion link
`
`SYSTEM.B
`
`Application
`
`Presentation
`
`Session
`
`Transport
`
`Network
`
`Data l¡nk
`
`Physical
`
`Figrre 1.22 Peer to peer protocol layers
`
`Various wireless standarcls, such as CSM (Clobal Systems fbr Mobile Communication) and UMTS
`(Universal Mobile Telecommunications System) have been developed tbllowing ditlerent sets of protocols
`as required for the communications. This is discussed later in more detail in the appropriate chapters.
`
`1.3 Evolution of Wireless Communication Systems
`Since the invention of the radio, wireless communication systems have been evolving in various w¿Iys to cater
`to the neecl tbr communications in a virriety ol segments. These are broadly t.tivided into two categories:
`
`Broadcast communication systems - This is typically simplex in nature, which Ineans that one sicle
`transmits and other side receives the infbrmation, and there is no ièedback from the receiver sitle.
`Typically raclio lnd TV transmissions are of this nature. This is generally point-to-rnulti-point in
`nature. The transnlitter broadcasts the inibrmation and all the intended receivers receive that
`inlbrmation by tuning the receiver.
`
`Sierra Wireless EX 1018 p 7
`
`
`
`c
`
`L
`
`L:i
`
`arc
`of;
`(
`
`a. I
`
`i i t
`
`b.I
`
`c s
`
`c.I
`ir
`(i
`
`The
`
`8.4
`
`Insir
`co¡T'
`Diffi
`Layt
`envi:
`dyne
`base
`
`DL(
`RR(
`
`C{
`
`dr
`
`256
`
`Mobile Handset Design
`
`User process
`
`Device drivers
`
`Linux kernel
`
`vo
`
`Software interrupt
`
`Beal time tasks
`
`RT Linux plugin
`
`RT scheduler
`
`vo
`
`Hardware interrrupt
`
`Direct
`hardware
`access
`
`Hardware
`
`Figure E.2 RT-Linux kernel
`
`î:
`
`8.3 Device Driver Software
`Protocol software, radio modem processing software (layer-l part), and application software usually run
`on processors on top of an RTOS and there are several hardware blocks, which are meant to perform
`specific tasks (such as keypad, microphone, display, RF HW module, etc.). These hardware blocks are
`configured and controlled by the processors að required. It is risky to work with bare hardware and also
`difficult to make the hardware work according to the command. Device driver is a software program that
`controls devices such as the keyboard, LCD, camera, USB, and so on. A device driver acts like a translator
`between the device and programs that use the device. Each device has its own set of specialized commands
`that are known to its driver. In contrast, most programs access devices by using generic commands. The
`driver, therefore, accepts generic commands from a program and then translates them into specialized
`commands for that device. Now, instead of putting code in each application, we write conrols for each
`device and then share the code between different applications in order to share the same hardware among
`the various applications.
`
`8.4 GSM System Protocol Software
`As mentioned earlier, for various reasons (for example, to connect to the Retwork, to set up, maintain,
`release a call, and to route a call seamlessly), there is a need to define a set of rules or protocols between
`various network entities, which should be followed for communicating or passing infonnation among the
`entities. For the GSM system these are called GSM protocols. The protocol stack for GSM follows the
`same basic concepts ofISO OSI-7 layer architecture, but this has been modified at the lower three layers to
`sui-t the specific requirements. The very first aim of communication is to transport user information, but in
`order to suppott this, in parallel there is also a need for signaling data transmission. We have discussed
`earlier, for GSM, that the TCH is used for user specific traffic information sending and the SACCH and
`FACCH channels are mainly used to transmit the signaling information during the call (for example, along
`with the TCH) and SDCCH is used outside a call, for example, when the call is not established.
`The overall protocol architecture can be broadly divided into three planes: ( I ) userplane (speech, data);
`(2) control plane (signaling); and (3) management plane (management of network elements, such as
`configuration, faults, and so on). Within a GSM network, different protocols are needed to enable the flow
`ofdata and signaling between the varioust GSM subsystems. Figure 8.3 shows the interfaces that link
`different GSM subsystems and the protocols used to communicate on each interface. The GSM protocol
`
`Sierra Wireless EX 1018 p 8
`
`
`
`ilgn
`
`GSM Mobile Phone Software Design
`
`257
`
`Um
`
`A¡'"
`
`A
`
`MM
`
`RH
`
`LAPDM
`
`RFI'
`
`BTSM
`
`LAPDM
`
`LAPD
`
`PHY procsssing
`
`L1
`
`proc€ssing
`
`PCM
`
`MS
`
`Radio
`interlace
`
`BTS
`
`BSC
`
`16.64 kbps
`
`LAPD
`
`PCM
`
`ss7
`
`PCM
`
`MTP
`
`I
`
`G723
`
`ss7
`
`PCM
`MSC / HLR GMSC
`VLR
`
`64 kbps
`2.048 Mbps
`
`Figure 8.3 GSM system entities and protocol interfaces
`
`architecture is designed such that the MS communicates with various protocol entities at different levels
`of abstraction.
`CSM speciflc protocols are mainly divided into three layers:
`a. Layer-L is the physical layer, which uses the channel structures over the air interface (Um) as discussed
`in chapter ó, Section o.r.i on¿ chapter 7. This is responsible lor channel encoding/decoding''
`interleaving, ciphering, burst fbrming, for example, bit (or symbol) transmission and reception over
`the air link.
`b. Layer-Zis the data link layer. The functionalities of this layer are: multiplexing of one or more layer-2
`connections on controvsignaling channels, error detection (based on HDLC), flow control' transmis-
`sion quality assurance, routing, and so on I l l'
`c. Layer-3 is the network layei. the functionalities of this layer are: connection management (air
`interface),subscriberi<lentification,managementoflocationdata,andmanagementofadtiedserviccs
`(SMS. call fbrwarding, conference calls. etc')'
`
`The user plane protocol architecture is much simpler ancl involves only physical layer and data-link layers'
`
`8.4.1 GSM Mobile Hctncl,set (MS) Protocol Stack
`Insicle a GSM mobile handset, enrities tbr all the layers are resicling and interacting with their
`corresponcÌing counterparts, which are spread across the GSM subsystems as shown in Figure 8'3'
`Different sub-layers in layer-2 ancl layer-3 of the GSM phone protocol stack are shown in Figure 8'4'
`Layer-Zand tayer-3 consists of r"veral entities ancl generally, entities run as sep¿ìrate threacls in an OS
`environment ancl use a queue basecl communication motlel, where the primitive contents are stored in
`tlynamically allocated partition fnemory sections. Generally, the interf'ace to L I consists of the primitive
`based service access ptlints.
`
`DL (data link layer) - This provides layer-2 f unctionality to the RR on clitferent logical GSM channels'
`RR (radio resource) -This .sub-layer makes sure that a suitable cell is selected, the surrounding neighbor
`cells are observed and the serving cell with the best radio quality is used. in iclle mode ancl in a call or
`rlata connection.
`
`y run
`form
`.s are
`I also
`r that
`ilator
`rands
`. The
`rlized
`each
`-llong
`
`ntain,
`.ween
`rg the
`vs the
`,ers to
`but in
`ussed
`H and
`along
`
`data);
`rch as
`e flow
`rt link
`otocol
`
`Sierra Wireless EX 1018 p 9
`
`
`
`2-slì
`
`Mobilc Handset Design
`
`GSM
`
`stack
`
`LU
`
`DL
`
`ALR
`
`srM
`
`l'igure 8.4 Mobile phone CSM prorocol srack (L2lL-1) archirecrurc
`
`ALR (adaptation layer) - TIris is an adaptation sub-layer that exists between the RR and L I lncl h'el¡rs ro
`support the RR in cell-selection/r'e-selecrion, sl pre-processing, aniì paging detection.
`MIVI (mobility managenrent) * This is ¿ì user protocol between the mobile station ancl the network
`switching subsystem (NSS ). fbr which the base station subsystem (BSS) is transparent. This sub-layer.
`makes sure that the mobile stavs in the registered state in the honle or roaming network. It is
`responsible for the fìrnctions relating to location registration, paging. attachrnent/detachlnent.
`handover. dynanric channel allocation ancl nranagement. MM nraintains the full or limited servicc
`of the phone. The niessages defined in MM allow lbr roaming and security funcrions in GSM.
`CC (call control) - This is in charge of circuit switched call handling. It perfbrms the required signaling
`between MS and network in order to establish, receive, maintain, and end a call. Han<Jling ol
`conferences and a second call is also in the scope of this entity. CC is part of the connection
`lnanagement (cM) layer.
`SS (supplementary service) - This is in charge of getting/setting ancl querying services in the
`network. such as call-fbrwarding, call-deflection, and call-barring. SS is part of rhe connecrion
`munagement layer'.
`Si\{S lsh¡rrt message service) - This provides the capability kr send and reccive SMS. The rcception ol a
`cell bl'oadcast messages (CBM) is also handled here. SMS is part of the connection lnanagement layer'.
`SII (sr:ssion management) - This sub-layer controls the activation/deactivation and nroditication of rlre
`PDP (packet data profìle) context in the CPRS system (discussed in Chapter I3). A context clefìnes the
`QoS fbr a packet oriented connection. the used NSAPVSAPI (service access point identifìer'), the IP
`adclresses of the MS, gateway and the DNS. Up to seven contexts carì be handled by SM. It is part of tlre
`connectiorì nranagernent layer.
`
`Each entity consists of several state machines, which process incorning events such as primitives,
`tilneouts, events. and use static storage to stoÍe state relevant data between events. Entities can intelact
`with other entities by sending events or prirnitives and they could lnaintain their own timers. Several
`entities could be grouped and run in a single OS thread as: CC - SMS - SS - SM.
`As the real-ti lne requirentelrts and the protocol itselfallow that only one entity of the gloups is active at a
`p¿ìrticular time. the entities can thus share tlre same input queue and the sanle stack.
`
`SIM (st¡bscriber identity module) * This entity controls the SIM dlivel that manages the âccess to
`different SIM data fields and provides an SAP (service access point is the interfirce point between two
`layers) towards MM. GMM. ancl ACI.
`
`Sierra Wireless EX 1018 p 10
`
`
`
`GSM Mobile Phone Software Desi gn
`
`259
`
`ACI (application control interface) - The application conrrol intertàce consists of several srate
`machines. which are triggered by AT-commands or incoming primitives from the underlying L23
`entities. ACI cont¡ols theL23 functions also by primitive exchange on rhe connected SAps.
`ùIMI (man-machine interface) - MMI is used to inreract with the user. It takes the input from the
`user through a touch screen or key pad and displays the output on the LCD screen or invokes the
`proper operations.
`
`In the next sections, the protocols and message structure used in different layers for communication
`among different entities in the system are described.
`
`8.4.2 Air Interface (IJm) Protocol
`In the Figure 8'5, the interfaces between Ll,Lz,and L3 layers are shown. In the signaling plane, as RR is
`an L3 enrity, it can interact with Ll and L2.
`
`User plane
`(data)
`
`Traffic channel
`TCH
`
`Physlcal fayer
`
`(,
`
`oC
`
`)
`
`I
`
`Signaling plane
`
`Flad¡o resourc6 managemgnl
`L3
`
`Data
`
`layer
`
`L2
`
`+
`
`Figure 8.5 Ll, L2, and L3 interfhces
`
`8.4.2,1 Layer-l
`The physical properties of the um intert'ace have already been described in cletail in the previous chapter
`
`8.4.2.2 Layer2
`The main functionalities of the link layer are structuring in the frame, segmentation and reassembly, error
`detection and correction. multiplexing and flow control. Across the um intert'ace, the data Iink layer usecl
`is the LAPDm (modified LAPD). This is a modifìecl version of the LAPD (link access protocol fbr ISDN
`"D" channel) protocol' which is used in ISDN. This LAPDm protocol is related to two other layer-2
`protocols, such as HDLC and LAPB. For the clevelopment of the LAPDm prorocol. rhe LApD protocol is
`taken and all dispensable parts were removed to save resources. The frame f'onnats defined for LApDm
`are based on those clefined f'or LAPD. However, there are some important ilitl'erences between LApDm
`and LAPD, in particular with regarcl to fiame clelimitation methods ànd trnnsparency mechanisms. These
`dif'ferences are necessary fbr operation within the constraints set by the ra.tio path. LApDm supports
`tivo modes of operation: (l) unacknowleclgecl mode operation using UI tiames (no flow control and
`error control); and (2) acknowledged mocle operation using the multiple tiame procedure (positive
`
`Sierra Wireless EX 1018 p 11
`
`
`
`I u
`
`s
`(r\
`(s
`
`SE
`le
`th
`th
`S€
`
`st
`in
`at
`c(
`in
`fi:
`di
`
`I L C n s
`
`260
`
`Mobile Handset Design
`
`acknowledgment, error co¡rection based on ARQ). For BCCHs and CCCHs only the unacknowledged
`mode of operation is implemented. LAPDm is used for information sent on the control channels BCCH,
`AGCH, NCH, PCH, FACCH, SACCH, and SDCCH as defined in the GSM standard.
`LAPDm use$ three frame formats:
`
`t . A'format - This lrame format can be used for any DCCH and it does not carry any higher layer data (no
`information field), but is is used for filling.
`2. B-format - This frame carries the actual signaling data on the radio interface. It is transmitted in every
`DCCH and ACCH. The maximum length of layer-3 information is restricted based on the logical
`channel and is defined by parameter N201. A-format and B-format frames are sent both in uplink and
`downlink. SACCH, FACCH, SDCCH uses frame types A or B.
`3. Bbis-format - This frame does not have any address field, as this is not required on a broadcast channel
`and this frame format is used for transmission on BCCH, PCH, and AGCH. These frames are only sent
`on the downlink.
`The maximum frame length is 23 bytes : 184 bits, which is the length of the layer-2 data block passed
`to the layer- I channel coding unit. Figure 8.6 shows the LAPDm frame format and coding of fields for
`the several message types used by the protocol. The LAPDm address field has as its main element the
`SAPI, through which the layer-3 message is received. On the radio interface rwo values of SApI are
`
`Bit number
`<-
`876 54321
`
`Address
`
`Control
`
`Length ind¡cator
`
`lnlormation
`
`-to, I
`¡ll
`EI5lcl
`otol
`+
`
`{Dl
`
`I
`
`k
`k+f
`k+2
`
`n
`n+1
`
`w
`IV+l
`
`N201+n
`TYPE'B
`Bit number
`87654321
`
`Length ind¡cator
`
`m
`m+1
`
`-t0)l
`.c¡lEI
`PIõl
`ot"j
`
`N2O1+m
`
`F¡ll bits
`
`Type-Abis
`
`Bil number
`a-
`876 84321
`
`Address
`
`Control
`
`Length ¡ndicator
`
`Fill bits
`
`TYPE.A
`Bit number
`{-
`7654321
`
`I
`
`indicator
`
`lnformation
`
`Fill bits
`
`Type-Bbis
`
`1
`
`k
`k+1
`k+2
`
`n
`n+l
`
`o¡
`Ëtc
`
`ooo
`
`N2O1+n
`
`-tol
`¡l
`
`EIrlclõl
`0tol
`Y
`
`m
`m+1
`
`tv
`fV+1
`
`N2O1+m
`
`Figure 8.ó LAPDm frame formar
`
`¡ 1 I I t i II
`
`Sierra Wireless EX 1018 p 12
`
`
`
`Èt
`
`'.
`t,
`t,
`
`'i
`
`I
`
`il
`
`L
`
`ì I t
`
`ì
`
`ll
`i:
`J:
`
`i i
`
`lìj
`ìi
`:l
`:i
`l!
`iì
`
`i!
`rl
`it
`ii
`
`tl
`
`ii
`
`1
`
`GSM Mobile Phone Software Design
`
`261
`
`used: (l) sAPI : 0 for messages from the radio resource management (RR)' mobility management
`(MM), and call control (cc); un¿ (z) sepl = 3 for messages from the sMS and supplementary services
`iSS¡ ,nr.rug"r. The control freld is used in the same fashion as in HDLC or LAPB and contains the
`à"qi"n." aid retransmission counters N(S) andN(R), respectively. The frame length freld contains the
`tengttr of the layer.3 message within the information field of the LAPDm frame' If the message is less
`thaã the length specified inlarameterN201 ofthe radio interface, frll-in octets are used to make up for
`the space. tithe iayer-l message to be transmitted is longer than N201, segmentation occurs. Whether
`segmentation has occurred or not, is indicated in the M-bit of the length field.
`îor ünk layer signaling, two physical layer channels are used (SACçH and FACCH). The frame
`structure of the SACCH *"rrug" it iho*n in Figure 8.7. The important functionality of a link layer is to
`improve the quality of transmisiion, by detecting frames that have been subjected to transmission errors'
`anå probably asking for repetition. It supports both acknowledgment (acknowledged back indicating
`conectly reached) and un-acknowledgment modes. The link layer offers the possibility of multiplexing
`indepenient flows on the same channil. On theradio interface, two independent flows can co-exist' The
`first Lne is devoted to transfer of signaling messages and the second one is for SMS- These two flows are
`distinguished by a link identifier SAPI, as discussed earlier'
`
`Bit number
`t-
`87 6 5 4321
`Power level
`Free
`
`Free
`
`Timing advance
`
`Layer 2 data (2'l octets)
`
`El 1
`EIel 2
`-td, I8+i
`
`23
`
`Figure 8.7 Frame structure for SACCH block
`
`8.4.2.3 Layer-3
`Layer-3 contains several sub-layers (Figure 8.8), which control signaling channel functions (BCH'
`C|CU, and dedicated channels). These sub-layers are radio resoufce management (RR), mobility
`management (MM), call control (CC) as well as short message service (SMS) management, and
`supplementary services (SS) management.
`
`l. Radio Resource (RR) Sub'LaYer
`RR is the heart ofthe protocol. This controls the setup, maintenance, andtermination ofradio and fixed
`phannels, supporß measurements and handovers. The main procedures in anRR layer are:channel
`àlrigo*"nr, l|unnet release; channel change and handover, change of channel frequencies, hopping
`,.q,i.n.., (algorithms) and frequency tables, measurement reports from the MS, power control
`ctiscontinuous transmission reception, time advance, modification ofchannel modes (speech and data)'
`and cipher mode setting.
`An RR session is always initiated by an MS, tt[ough the access procedure, either for an outgoing call, or
`in response to a paging message. The access and paging procedure