ETSI GSM 05 03-1992 See PRI-ETS 300 031《参见PRI-ETS 300 031》.pdf
《ETSI GSM 05 03-1992 See PRI-ETS 300 031《参见PRI-ETS 300 031》.pdf》由会员分享,可在线阅读,更多相关《ETSI GSM 05 03-1992 See PRI-ETS 300 031《参见PRI-ETS 300 031》.pdf(23页珍藏版)》请在麦多课文档分享上搜索。
1、m 3404583 0071550 TOT m ETSI/TC SMG Released by : ETSI/PT 12 Release date: February 1992 RELEASE NOTE Recommendation GSM 05.03 Channel Coding Previously distributed version : 3.5.1 (Release 3/90) New Release version February 92 : 3.5.1 (Release 92, Phase 1) 1. Reason for chancres No changes since th
2、e previously distributed version. 4 m 3404583 0073553 946 m ETSI/GSM GSM REC. 05.03/1 version 3.5.1 GSM Recommendation: 05.03 Title: CHANNEL CODING Release Date: February, 1992 CONTENTS : 1. 2. 2.1 2.2 3. 3.1 3.2 3.3 3.4 3.5 3.6 3.7 4. 4.1 4.2 4.3 4.4 4.5 4.6 4.7 SCOPE GENERAL General Organization N
3、aming Convention TRAFFIC CHANNELS (TCH) Speech channel at full rate (TCH/FS) Speech channel at half rate (TCH/HS) (tba) Data channel at full rate, 9.6 kbit/s services (TCH/F9.6) Data channel at full rate, 4.8 kbit/s services (TCH/F4.8) Data channel at half rate, 4.8 kbit/s services (TCH/H4.8) Data c
4、hannel at full rate, I2.4 kbit/s services (TCH/F2.4) Data channel at half rate, 5 2.4 kbit/s services (TCH/H2.4) CONTROL CHANNELS Slow associated control channel (SACCH) Fast associated control channel (FACCH) Broadcast, paging and access grant channels (BCCH, PCH and AGCH) Stand-alone dedicated con
5、trol channel (SDCCH) Random access channel (RACH) Synchronization channel (SCH) Handover Access Burst ANNEXES: 1. Summary of channel types 2. Summary of polynomials for convolutional codes 3. Examples (to be added) Number of pages: 22 Note: (tba) indicates a section to be added later. W 3404583 0073
6、552 882 1. ETSI/GSM GSM REC. 05.03/2 version 3.5.1 Recommendation 05.03 CHANNEL CODING SCOPE : A reference configuration of the transmission chain is shown in Rec.05.01. According to this reference configuration, this recommendation specifies the data blocks given to the encryption unit. It includes
7、 the specification of encoding, reordering, interleaving and the stealing flag. It does not specify the channel decoding method. The definition is given for each kind of logical channel, starting from the data provided to the channel encoder by the speech coder, the data terminal equipment, or the c
8、ontroller of the MS or BS. The definitions of the logical channel types used in this recornendation are given in Rec.05.02, a summary is in annex i. 2. GENERAL 2.1 GENERAL ORGANIZATION: Each channel has its own coding and interleaving scheme. However, the channel coding and interleaving is organized
9、 in order to have as much as possible a unified decoder structure. Each channel uses, in this order, the following sequence of operations: - The information bits are coded with a systematic block code, building words of information + parity bits. - These information + parity bits are encoded with a
10、convolutional code, building the coded bits. - Reordering and interleaving the coded bits, and adding a stealing flag, gives the interleaved bits. All those operations are made block by block, the size of which depends on the channel. However, most of the channels use at one point a comon structure
11、which is a block of 456 coded bits, interleaved and mapped onto bursts in a very similar way for all of them. Figure 1 gives a diagram showing the general structure of the channel coding. This block of 456 coded bits is the basic structure of the channel coding scheme. In the case of speech TCH, thi
12、s block carries the information of one speech frame. In case of control channels, it carries one message. W 3YOY583 O073553 739 W class 1 cyclic code FIRE code cyclic code +tail +tail +tail in : 260 bits in : 184 bits in : PO bits out : 267 bits out : 228 bits out : P1 bits 3.1.1 4.n.l 4.5/4.6 ETSI/
13、GSM GSM REC. 05.03/3 version 3.5.1 cyclic code +tail in : NO bits out : N1 bits 3 .n.2 in : 228 bits out : 456 bits 4.11.3 convolutional code K=5, 2 classes 3.1.2 in : P1 bits out : 2*P1 bits 4.5/4.6 3 7- - I I - reordering and partitioning + stealing flag in : 456 bits out : 8 sub-blocks convolutio
14、nal code K=5, rate r in : N1 bits out : 456 bits 3.n.3 I I block diagonal interleaving out : pairs of sub-blocks 3.1.3.b in : 8 sub-blocks 1-1- block rectangular interleaving out : pairs of sub-blocks 4.1.4.b in : 8 sub-blocks diagonal interleaving + stealing flags out sub-blocks intra-burst interle
15、aving in : pairs of sub-blocks out : pairs of sub-blocks 3.1.3.c I 1 Encryption Unit 4 I Figure 1: CHANNEL CODING AND INTERLEAVING ORGANIZATION In the case of DATA TCHS. NO, N1. n depends on the type of data TCH. In each box, the last line indicates the chapter defining the function. interface 1 : I
16、nformation bits (d) 3 : coded bits (c) 2 : Information + parity bits (u) 4 : interleaved bits (e) 3404583 00711554 655 2.2 ETSI/GSM GSM REC. 05.03/4 version 3.5.1 In the case of fast ACCH, such a block is stolen from the TCH, used for an ACCH message, and is inserted in the TCH interleaving structur
17、e. Each block of 456 coded bits has in addition a stealing flag (8 bits), indicating if the block belongs to the TCH or to the fast ACCH. In case of slow ACCH, BCCH or CCCH, this stealing flag is dummy. Some cases do not fit in the general organization, and do not use the block of 456 coded bits. Th
18、ey are the random access messages of the RACH on uplink and the synchronization information broadcast on the SCH. Naming Convention For ease of understanding a naming convention for bits is given for use throughout the recommendation : - General naming “k“ and ,jn for numbering of bits in data block
19、s and bursts. “KxW gives the amount of bits in one block, where “x“ refers to the data type “nn is used for numbering of delivered data blocks where “Nn marks a certain data block .Bn is used for numbering of bursts or blocks where “BO“ marks the first burst or block carrying bits from the data bloc
20、k with n = O (first data block in the transmission) - Data delivered to the encoding unit (interface 1 in fig. 1) : d (n, k) or d (k) for k = 0,1, ., Kd-1 n = 0,1, ., N,N+1, - Data after the first encoding step (block code, cyclic code ; interface 2 in fig. 1) : u(n,k) or u (k) for k = 0,1, ., Q-1 n
21、 = 0, ,., N,N+1, . - Data after the second encoding step (convolutional code ; interface 3 in fig. 1) : c(n,k) or c(k) for k = 0,1, ., ,-l n = 0,1, ., N,N+1, 3404583 0073555 573 3 ETSI/GSM GSM REC. 05.03/5 version 3.5.1 - Interleaved data : i(B,k) for k = 0,l , ,Ki-l B = Bo, B0+1, - Bits in one burs
22、t (interface 4 in fig. 1) : e(B,k) for k = 0,1, ,114,115 B = BO, Bo + 1, TRAFFIC CHANNELS (TCH): Two kinds of traffic channels are considered: speech and data, Both of them use the same general structure (see fig.l), and in both cases, a piece of information can be stolen by the fast ACCH. 3-1 Speec
23、h channel at full rate (TCH/FS) : The speech coder delivers to the channel encoder a sequence of blocks of data. In case of a full rate speech TCH, one block of data corresponds to one speech frame. Each block contains 260 information bitstincluding 182 bits of class 1 (protected bits), and 78 bits
24、of class 2 (no protection), (see Tables 2 and 3) The bits delivered by the speech codec are labelled d(O), d(l), ., d(259), defined in the order of decreasing importance, as specified in 06.10. 3.1.1 Parity and tailing for a speech frame: a) Parity bits: The 50 first bits of class 1 are protected by
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGSM05031992SEEPRIETS300031 参见 PRIETS300031PDF

链接地址:http://www.mydoc123.com/p-733838.html