Documente Academic
Documente Profesional
Documente Cultură
SUBMITTED BY
ACKNOWLEDGEMENT
MTNL HISTORY
CONCLUSION
2
ACKNOWLEDGEMENT
The industrial exposure that I have experienced as a trainee in MAHANAGAR
TELEPHONE NIGAM LIMITED (BKC) has helped me a lot not only in improving my
theoretical knowledge but also to understand the working of a large industry.
I would like to express my deepest gratitude towards Mr. Sandeep Keshkar (Dy. General
Manager, NSS-1, MS) for associating me in this training. I also express my sincere
gratitude & thanks to my mentor Mr.Vikalp Maurya (Asst Manager) for making timely
guidance and encouraging me at various stages during my training. He also helped me a
lot on my personal front as far as my studies were concerned, by giving me tips to
improve my performance. My experience with him as his subordinate is memorable.
I am also thankful to Mrs. J.Wilson(SDE) and Mr. A.G.Pal(SDE) for their positive support,
coordination & guidance.
And last but not the least I thank all the people of the department, for their kind co-
operation and support.
3
MTNL HISTORY
MTNL provides fixed line telephones, cellular connection of both GSM — Dolphin
(Postpaid) and Trump (prepaid) and WLL (CDMA) — Garuda-FW and Garuda-Mobile and
internet services through dialup and DSL — Broadband internet TriBand. MTNL has also
started Games on demand, video on demand and IPTV services in India through its
Broadband Internet service called Triband. Phone numbers belonging to MTNL start with
the prefix 2 infixed line telephones and WLL & in GSM Mobile services its start from
9869/9969/9868/9968/9757. MTNL also provides other services such as VPN, Internet
Telephony- VOIP and leased lines through BSNL and VSNL.MTNL has been actively
providing connections in both Mumbai and New Delhi areas and the efficiency of the
company has drastically improved from the days when one had to wait years to get a
phone connection to now when one can get a connection in even hours. Pre-activated
Mobile connections are available at many places across both Metros. MTNL has also
unveiled very cost-effective Broadband Internet access plans (TriBand) targeted at
homes and small businesses. At present MTNL enjoys the largest of the market share of
ISP services in Mumbai and Delhi.
With the market opened to competition in 2001, MTNL has been facing rivalry for its
share of the market and declining long-distance call rates. To diversify its revenue base,
the cash rich company has expanded into GSM and CDMA cellular services and is
developing its Internet related services, including ADSL, Intelligent Network services, call
centers and IDCs. The company is expanding beyond its traditional areas to offer
Internet services nationwide, and to provide basic services in Nepal. MTNL is considered
a likely candidate for further divestment by the government.
4
MOBILE
TECHNOLOGY
OVERVIEW
5
Introduction
One of the finest things that happened in 20th century is the use of radio channels for
personal mobile communication systems. Considered to be a revolution of sorts in
telecommunications, mobile communication is the fastest growing market segment and
the field of intense research. Mobile communication today is, perhaps, the most
powerful catalyst for change in lifestyle of the people all over the world. Mobile
communication slowly, but surely is evolving as the backbone for business transactions,
efficiency and success silently taking over the role of the elder cousin PSTN.
Basic to the design of a mobile communication system is the ability of the user to
liberate himself from the confines of a wired line and therefore his freedom to move
anywhere he wants. Mobile communication systems therefore are required to provide
seamless service while the customers are on move transcending geographical and
network borders. Provision of service under such environment throws a number of
challenging issues and the way these issues are addressed and resolved makes each
system different from all others.
The first mobile telephone service started in 1946 in St. Louis, Missouri, USA as a
manually operated system. Between 1950 and 1960, it evolved as an automatic system,
but small subscriber base. Mobile telephony service in its useful form appeared in
1960s.
The 1st generation mobile communication systems appeared in 1970s and remained till
1980s. They used analog transmission techniques for the radio link and confined its
users to their respective system areas for which the mobile phone was designed.
Capacity of the system was very limited and roaming between the coverage areas of the
different systems was impossible. Apart from being very expensive, these systems
provided poor QoS and supported only voice communication.
The 2nd generation mobile communication systems grew out of the limitations of the
1st generation systems. They supported large subscriber base, carried both voice and
data and have capability to design and deliver new value added services (VAS). The radio
link became digital enabling use of versatile signaling capabilities and cross-network
6
roaming. However, multiple standards made seamless roaming across all the networks
impossible. GSM and CDMA emerged as the trend setting technologies. The domination
of the 2G systems in the mobile communication market became apparent in second half
of 1990s.
The design objectives of the 3rd generation mobile systems are to provide high
functionality with seamless global roaming. Apart from providing very high data rates,
3G systems seek to integrate the wire lines systems with mobile systems. 3G would
provide users consistent voice, data, graphical, multi-media and video-based
information service regardless of their location in the network (Cordless, Cellular,
Satellite, Fixed/Wire line and so on….). The 3G system is an I.P. based system. 3G
systems would also integrate the Intelligent Network (IN) capabilities into mobile
systems.
7
2G
2G (or 2-G) is short for second-generation wireless telephone technology. Second
generation 2G cellular telecom networks were commercially launched on the GSM
standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991. Three primary benefits
of 2G networks over their predecessors were that phone conversations were digitally
encrypted, 2G systems were significantly more efficient on the spectrum allowing for far
greater mobile phone penetration levels; and 2G introduced data services for mobile,
starting with SMS text messages.
After 2G was launched, the previous mobile telephone systems were retrospectively
dubbed 1G. While radio signals on 1G networks are analog, and on 2G networks are
digital, both systems use digital signaling to connect the radio towers (which listen to
the handsets) to the rest of the telephone system.
2G technologies
GSM (TDMA-based), originally from Europe but used in almost all countries on all six
inhabited continents (Time Division Multiple Access). Today accounts for over 80% of all
subscribers around the world.
IS-95 aka cdmaOne, (CDMA-based, commonly referred as simply CDMA in the US), used
in the Americas and parts of Asia. Today accounts for about 17% of all subscribers
globally. Over a dozen CDMA operators have migrated to GSM including operators in
Mexico, India, Australia and South Korea.
iDEN (TDMA-based), proprietary network used by Nextel in the United States and Telus
Mobility in Canada
IS-136 aka D-AMPS, (TDMA-based, simply TDMA in the US), was once prevalent in the
Americas but most have migrated to GSM.
8
Capacity
Using digital signals between the handsets and the towers increases system capacity in
two key ways:
Digital voice data can be compressed and multiplexed much more effectively than
analog voice encodings through the use of various codecs, allowing more calls to be
packed into the same amount of radio bandwidth.
The digital systems were designed to emit less radio power from the handsets. This
meant that cells could be smaller, so more cells could be placed in the same amount
of space. This was also made possible by cell towers and related equipment getting
less expensive.
Advantages
The lower powered radio signals require less battery power, so phones last much
longer between charges, and batteries can be smaller.
The digital voice encoding allowed digital error checking which could increase sound
quality by increasing dynamic range and lowering the noise floor.
Going all-digital allowed introduction of digital data services, such as SMS and
email.
Greatly reduced fraud. With analog systems it was possible to have two or more
"cloned" handsets that had the same phone number.
Enhanced privacy. A key digital advantage not often mentioned is that digital
cellular calls are much harder to eavesdrop on by use of radio scanners. While the
security algorithms used have proved not to be as secure as initially advertised, 2G
phones are immensely more private than 1G phones, which have no protection
against eavesdropping.
9
Disadvantages
• In less populous areas, the weaker digital signal may not be sufficient to reach a cell
tower. This tends to be a particular problem on 2G systems deployed on higher
frequencies, but is mostly not a problem on 2G systems deployed on lower
frequencies. National regulations differ greatly among countries which dictate
where 2G can be deployed.
• Analog has a smooth decay curve, digital a jagged steppy one. This can be both an
advantage and a disadvantage. Under good conditions, digital will sound better.
Under slightly worse conditions, analog will experience static, while digital has
occasional dropouts. As conditions worsen, though, digital will start to completely
fail, by dropping calls or being unintelligible, while analog slowly gets worse,
generally holding a call longer and allowing at least a few words to get through.
• While digital calls tend to be free of static and background noise, the lossy
compression used by the codecs takes a toll; the range of sound that they convey is
reduced. You'll hear less of the tonality of someone's voice talking on a digital
cellphone, but you will hear it more clearly.
10
GSM
The ubiquity of the GSM standard has been an advantage to both consumers (who
benefit from the ability to roam and switch carriers without switching phones) and also
to network operators (who can choose equipment from any of the many vendors
implementing GSM). GSM also pioneered a low-cost (to the network carrier) alternative
to voice calls, the Short message service (SMS, also called "text messaging"), which is
now supported on other mobile standards as well. Another advantage is that the
standard includes one worldwide Emergency telephone number, 112. This makes it
easier for international travellers to connect to emergency services without knowing the
local emergency number.
GSM security
GSM was designed with a moderate level of security. The system was designed to
authenticate the subscriber using a pre-shared key and challenge-response.
Communications between the subscriber and the base station can be encrypted. GSM
only authenticates the user to the network (and not vice versa). The security model
therefore offers confidentiality and authentication, but limited authorization
capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for
11
security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice
privacy.
Advantages of GSM
GSM uses radio frequencies efficiently and, because of the digital radio path, the
system tolerates more inter cell disturbances.
The average quality of speech achieved is better than that in existing analogue
systems.
Due to ISDN compatibility, new services are offered as compared to the analogue
systems.
The large market toughens the competition and lowers the prices both for
investments and usage.
GSM Frequencies
GSM networks operate in a number of different frequency ranges (separated into GSM
frequency ranges for 2G and UMTS frequency bands for 3G). Most 2G GSM networks
operate in the 900 MHz or 1800 MHz bands. Some countries in the Americas (including
Canada and the United States) use the 850 MHz and 1900 MHz bands because the 900
and 1800 MHz frequency bands were already allocated. Most 3G GSM networks in
Europe operate in the 2100 MHz frequency band
GSM-900 uses 890–915 MHz to send information from the mobile station to the base
station (uplink) and 935–960 MHz for the other direction (downlink), providing 124 RF
channels (channel numbers 1 to 124) spaced at 200 kHz. Duplex spacing of 45 MHz is
12
used. This band of frequencies may be allocated equally for up to 4 operators in a
telecom circle.
13
Evolution from 2G to 3G
From 2G to 2.5G (GPRS) The first major step in the evolution to 3G occurred
with the introduction of General Packet Radio Service (GPRS). So the cellular services
combined with GPRS became 2.5G.GPRS could provide data rates from 56 Kbit/s up to
114 Kbit/s. It can be used for services such as Wireless Application Protocol (WAP)
access, Short Message Service (SMS), Multimedia Messaging Service (MMS), and for
Internet communication services such as email and World Wide Web access. GPRS data
transfer is typically charged per megabyte of traffic transferred, while data
communication via traditional circuit switching is billed per minute of connection time,
independent of whether the user actually is utilizing the capacity or is in an idle state.
EDGE is standardized by 3GPP as part of the GSM family, and it is an upgrade that
provides a potential three-fold increase in capacity of GSM/GPRS networks. The
specification achieves higher data-rates by switching to more sophisticated methods of
coding (8PSK), within existing GSM timeslots. EDGE can be used for any packet switched
application, such as an Internet, video and other multimedia.
14
GSM
NETWORK
ARCHITECTURE
15
Network structure
The network behind the GSM seen by the customer is large and complicated in order to
provide all of the services which are required. It is divided into a number of sections and
these are each covered in separate articles.
The Base Station Subsystem (the base stations and their controllers).
The Network and Switching Subsystem (the part of the network most similar to a
fixed network). This is sometimes also just called the core network.
The GPRS Core Network (the optional part which allows packet based Internet
connections).
All of the elements in the system combine to produce many GSM services such as voice
calls and SMS.
16
MOBILE STATION (MS)
The MS consist of two parts, the Mobile Equipment (ME) and an electronic smart card
called as Subscriber Identity Module (SIM).
The ME is the hardware used by the subscriber to access the network. The hardware has
an identity number associated with it, which is unique for that particular device and
permanently stored in it. This identity number is called the International Mobile
Equipment Identity (IMEI) and enables the network operator to identity mobile
equipment which may be causing problems on the system.
The SIM is a card which plugs into the ME. This card identifies the MS subscriber and
also provides other information regarding the service that subscriber should receive.
The subscriber is identified by an identity number called the International Mobile
Subscriber Identity (IMSI).
Mobile Equipment may be purchased from any store but the SIM must be obtained from
the GSM network provider. Without the SIM inserted, the ME will only be able to make
emergency calls. By making a distinction between the subscriber identity, GSM can
route calls and perform billing based on the identity of the subscriber rather than the
equipment or its location.
The ME is the only part of the GSM network which the subscribers really see. There are
three main type of ME, these are listed below:
• Vehicle Mounted: These devices are mounted in a vehicle and the antenna is
physically mounted on the outside of the vehicle.
• Portable Mobile Unit: This equipment can be handheld when in operation, but
the antenna is not connected to the handset of the unit.
• Hand portable Unit: This element comprises of a small telephone handset not
much bigger than a calculator. The antenna is connected to the handset.
17
The ME is capable of operating at a certain maximum power output dependent on its
type and use. These mobile types have distinct features which must be known by the
network, for example their maximum transmission power and the services they support.
The ME is therefore identified by means of classmark. The classmark is sent by the ME in
its initial message.
Most of the data contained within the SIM is protected against reading (KI) or
alternations (IMSI). Some of the parameters (LAI) will be continuously updated to reflect
the current location of the subscriber.
The SIM card and the high degree of inbuilt system security provide protection of the
subscriber's information and protection of networks against fraudulent access. SIM
cards are designed to be difficult to duplicate. The SIM can be protected by use of
Personal Identity Number (PIN) password, similar to bank/credit charge cards, to
prevent unauthorized use of the card. The SIM is capable of storing additional such as
accumulated call charges. This information will be accessible to the customer via
handset/keyboard key entry. The SIM also executes the Authentication Algorithm.
18
Subscriber Authentication Key (Ki)
A3(Authentication Algorithm)
A5 (Encryption Algorithm)
Functions of MS
The primary functions of MS are to transmit and receive voice and data over the air
interface of the GSM system. MS performs the signal processing function of digitizing,
encoding, error protecting, encrypting, and modulating the transmitted signals. It also
performs the inverse functions on the received signals from the BS.
In order to transmit voice and data signals, the mobile must be in synchronization with
the system so that the messages are the transmitted and received by the mobile at the
correct instant. To achieve this, the MS automatically tunes and synchronizes to the
frequency and TDMA timeslot specified by the BSC. This message is received over a
dedicated timeslot several times within a multi frame period of 51 frames. The exact
synchronization will also include adjusting the timing advance to compensate for varying
distance of the mobile from the BTS.
MS keeps the GSM network informed of its location during both national and
international roaming, even when it is inactive. This enables the System to page in its
present LA.
Finally, the MS can store and display short received alphanumeric messages on the
liquid crystal display (LCD) that is used to show call dialing and status in formation.
These messages are limited to 160 characters in length (varies from mobile to mobile).
19
Mobile Station ISDN (MSISDN)
MSISDN Stands for Mobile Station international Subscriber Dialing Number. It is a Logical
Identity. The MS international number must be dialed after the international prefix in
order to obtain a mobile subscriber in another country. The MSISDN numbers is
composed of the country code (CC) followed by the National Destination Code (NDC),
Subscriber Number (SN), which shall not exceed 15 digits. Here too the first two digits of
the SN identify the HLR where the mobile subscriber is administrated. MSISDN must be
registered in the telephone directory. It is used by the calling party for dialing. It is used
to support Call routing to destination terminal or to the MSC/HLR of the called MS.
IMSI stands for International Mobile Subscriber Identity. It is the Software Identity. An
IMSI is assigned to each authorized GSM user. It consists of a mobile country code
(MCC), mobile network code (MNC) (to identify the PLMN), and a PLMN unique mobile
subscriber identification number (MSIN) and shall not exceed 15 digits. The IMSI is the
only absolute identity that a subscriber has within the GSM system. It is used in the case
of system-internal signaling transactions in order to identify a subscriber. The first two
digits of the MSIN identify the HLR where the mobile subscriber is administrated.
20
International Mobile Equipment Identity (IMEI)
IMEI stands for International Mobile Equipment Identity. It is the Hardware Identity. The
IMEI is the unique identity of the equipment used by a subscriber by each PLMN and is
used to determine authorized (white), unauthorized (black), and malfunctioning (gray)
GSM hardware. In conjunction with the IMSI, it is used to ensure that only authorized
users are granted access to the system.
It is used for identification & addressing of the visiting MS. The VLR assigns a TMSI to
each subscriber entering into VLR area. It is assigned only after successful subscriber
authentication. The correlation of a TMSI to an IMSI only occurs during a mobile
subscriber’s initial transaction with an MSC (for example, location updating). TMSI is
stored in MS’s SIM and VLR and is not stored in HLR.
The MSRN is allocated on temporary basis when the MS roams into another numbering
area. The MSRN number is used by the HLR for rerouting calls to the MS. It is assigned
upon demand by the HLR on a per-call basis. The MSRN for PSTN/ISDN routing shall have
the same structure as international ISDN numbers in the area in which the MSRN is
allocated. The HLR knows in what MSC/VLR service area the subscriber is located. At the
reception of the MSRN, HLR sends it to the GMSC, which can now route the call to the
MSC/VLR exchange where the called subscriber is currently registered.
21
BASE STATION SUBSYSTEM (BSS)
The base station subsystem (BSS) is the section of a traditional cellular telephone
network which is responsible for handling traffic and signaling between a mobile phone
and the network switching subsystem. The BSS carries out transcoding of speech
channels, allocation of radio channels to mobile phones, paging, quality management of
transmission and reception over the air interface and many other tasks related to the
radio network.
Base transceiver station (BTS): The BTS contains the RF components that provide
the air interface for a particular cell. This is the part of the GSM network which
communicates with the MS. The antenna is included as part of the BTS.
Base station controller (BSC): The BSC as its name implies provides the
control for the BSS. The BSC communicates directly with the MSC. The BSC may control
single or multiple BTSs.
Transcoder (XCDR): The Transcoder is used to compact the signals from the MS
so that they are more efficiently sent over the terrestrial interfaces. Although the
transcoder is considered to be a part of the BSS, it is very often located closer to the
MSC. The transcoder is used to reduce the rate at which the traffic (voice/data) is
transmitted over the air interface. Although the transcoder is part of the BSS, it is often
found physically closer to the NSS to allow more efficient use of the terrestrial links.
22
CELL PRINCIPLES
MS within the cellular network are located in "CELLS", these cells are provided by the
BSS. Each BSS can provide one or more cells, dependent on the manufacturer’s
equipment. The cells are normally represented by a hexagon, but in practice they are
irregular in shape. This is as a result of the influence of the surrounding terrain, or of
design by the network planners.
Frequency reuse
23
NETWORK SWITCHING SYSTEM (NSS)
The MSC is included in the GSM system for call switching. Its overall purpose is the same
as that of any telephone exchange. However, because of the addition complications
involved in the control and security aspects of the GSM cellular system and the wide
range of subscriber facilities that it offers, the MSC has to be capable of fulfilling many
additional functions.
The MSC will carry out several different functions depending upon its position in the
network. When the MSC provides the interface between the PSTN and BSSs in the GSM
network it will be known as a gateway MSC. In this position it will provide the switching
required for all MS originated or terminated traffic.
Each MSC provides service to MSs located within a defined geographic coverage area,
the network typically contains more than one MSC. One MSC is capable of supporting a
regional capital with approximately one million inhabitants. An MSC of this size will be
contained in about half a dozen racks.
24
The functions carried out by the MSC are listed below:
• Call Processing
• Internetwork Interworking
• Billing
The HLR is the reference database for subscriber parameters. Various identification
numbers and addresses are stored as well as authentication parameters. Thos
information is entered into the database by the network provider when new subscriber
added to the system. The parameters stored in the HLR are listed opposite:
The HLR database contains the master database of all the subscribers to a GSM PLMN.
The data it contains is remotely accessed by all the MSCs and the VLRs in the network
and although the network may contain more than one HLR, there is only one database
record per subscriber each HLR is therefore handling a portion of the total subscriber
database. The subscriber data may be accessed by either the IMSI or the MSISDN
Number. The data can also be accessed by MSC or a VLR in a different PLMN, to allow
intersystem and inter country roaming.
25
3. Visitor Locations Register (VLR)
The VLR contains a copy of most of the data stored at the HLR. It is however temporary
data which exists for only as long as the subscriber is “Active” in the particular area
covered by VLR. The VLR database will therefore contain some duplicate data as well as
more precise data relevant to the subscriber remaining within the VLR coverage.
The VLR provides a local database for the subscriber wherever they are physically
located within a PLMN; this may or may not be the home system. This function
eliminates the need for excessive and time consuming reference to the "home" HLR
database.
The EIR contains A centralized database for validity the international mobile equipment
identity (IMEI). This database is concerned solely with MS equipment and not with the
subscriber who is using it to make or receive a call. The EIR database consists of lists of
IMEIs (or ranges of IMEIs) organized as follows:
White list: Contains those IMEIs which are known to have been assigned to valid MS
equipment.
Black list: Contains IMEIs of MS which have been reported stolen or which are to be
denied service for some other reason.
Grey list: Contains IMEIs of MS which have problems (for example, faulty software).
These are not, however, sufficiently significant to warrant a "black listing".
26
The EIR database is remotely accessed by the MSCs in the network and can also be
accessed by an MSC in a different PLMN.As in the case of the HLR; a network may well
contain more than one EIR with each EIR controlling certain blocks of IMIE numbers. The
MSC contains a translation facility, which when given an IMEI, returns the address of the
EIR controlling the appropriate section of the equipment database.
The AUC is a processor system; it performs the "Authentication" function. It will be co-
located with the Home Location Register (HLR) as it will be required to continuously
access and update, as necessary, the system subscriber records. The AUC/HLR center
can be co-located with the MSC or located remote from the MSC. The authentication
process will be usually take place each time the subscriber "initializes" on the system.
Authentication Procedure
Set-up or registration will not be accepted until authentication has been performed.
Using the mobile's IMSI, the MSC fetches the corresponding RAND and SRES from the
HLR. RAND is sent to the mobile, which uses its stored Ki value to calculate SRES. It then
returns the calculated SRES to the MSC, where it is compared with the SRES value
27
received from the HLR. If the values tally, the set-up is accepted; if not, set-up is
rejected.
The GMSC is responsible for the same tasks as the MSC, except for paging. It is needed
in case of mobile terminated calls. In fixed networks, a call is established to the local
exchange, to which the telephone is connected. But in GSM, the MSC, which is serving
the MS, changes with the subscriber’s mobility. Therefore, in a mobile terminated call,
the call is set up to a well defined exchange in the subscriber’s home PLMN. This
exchange is called GMSC. The GMSC than interacts with a database called Home
Location Register, which holds the information about the MSC, which is currently serving
the MS. The process of requesting location information from the HLR is called HLR
Interrogation. Given the information about the serving MSC, the GMSC then continues
the call establishment process.
In many real life implementations, the MSC functionality and the GMSC functionality are
implemented in the same equipment, which is then just called MSC. Many operators use
GMSCs for breakout to external networks such as PSTNs.
28
GSM TELECOMMUNICATION SERVICES
The ETSI Standards define the telecommunication services. With D900/D1800 the GSM
telecommunication services offered to the GSM subscriber are subdivided as follows:
• Supplementary services
Bearer services and tele-services are also called basic telecommunication services. The
use of GSM telecommunication services is subject to subscription. A basic subscription
permits participation in those GSM telecommunication services that are generally
available.
If a GSM subscriber roams out of the entitled area there is no possibility of establishing
communication (roaming not allowed), except the use of the tele-service emergency
call.
The bearer services are pure transport services for data. Some of the transmission
modes and rates already used in modern data networks are implemented; others are
planned.
29
• Data CDA (circuit duplex asynchronous) + basic PAD (packet assembler
Disassembler)
Tele-services use both low layer and high layer functions for the control of
communication from terminal to terminal. The following tele- services have already
been realized:
• Telephony
• Emergency call
30
Supplementary Services Supplementary Services modify or supplement a basic
telecommunication service. Consequently, they cannot be offered to a customer as a
stand-alone service. They must be offered together or in association with a basic
telecommunication service. The same supplementary service may be applicable to a
number of telecommunication services. Most supplementary services are directly
inherited from a fixed network, with minor modifications (when needed) to adapt to
mobility. Supplementary services extend beyond the normal bearer services and tele-
services (basic telecommunication services) and can be subscribed to separately. In the
following a supplementary service is called simply service, in contrast to basic
telecommunication service.
31
ACCESSING A GSM NETWORK
A subscription with a mobile phone operator. This is usually either a Pay As You Go
arrangement, where all GSM services are paid for in advance (commercially called
"prepaid"), or a Pay Monthly option where a bill is issued each month for line rental,
normally paid for a month in advance, and for services used in the previous month
(commercially called "postpaid").
A mobile phone which is GSM compliant and operates at the same frequency as the
operator. Most phone companies sell phones from third-party manufacturers.
A SIM ("Subscriber Identity Module") card which is activated by the operator once
the subscription is granted. After activation the card is then programmed with the
subscriber's MSISDN ("Mobile Subscriber Integrated Services Digital Network
Number") (the telephone number). Personal information such as contact numbers
of friends and family can also be stored on the SIM by the subscriber.
After subscribers sign up, information about their identity (telephone number) and what
services they are allowed to access are stored in a "SIM record" in the Home Location
Register (HLR).
Once the SIM card is loaded into the phone and the phone is powered on, it will search
for the nearest mobile phone mast, also called a Base Transceiver Station or BTS. If a
mast can be successfully contacted, then there is said to be coverage in the area.
The key feature of a mobile phone is the ability to receive and make calls in any area
where coverage is available. This is generally called roaming from a customer
perspective, but also called visiting when describing the underlying technical process.
Each geographic area has a database called the Visitor Location Register (VLR) which
contains details of all the mobiles currently in that area. Whenever a phone attaches, or
visits, a new area, the Visitor Location Register must contact the Home Location Register
to obtain the details for that phone. The current cellular location of the phone (i.e.
32
which BTS it is at) is entered into the VLR record and will be used during a process called
paging when the GSM network wishes to locate the mobile phone.
Every SIM card contains a secret key, called the Ki, which is used to provide
authentication and encryption services. This is useful to prevent theft of service, and
also to prevent "over the air" snooping of a users activity. The network does this by
utilizing the Authentication Center and is accomplished without transmitting the key
directly.
Every GSM phone contains a unique identifier (different from the phone number), called
the International Mobile Equipment Identity (IMEI). This can be found by dialing " *#06#
". When a phone contacts the network, its IMEI may be checked against the Equipment
Identity Register to locate stolen phones and facilitate monitoring.
33
VOICE CALLS
Once a mobile phone has successfully attached to a GSM network as described above,
calls may be made from the phone to any other phone on the global Public Switched
Telephone Network.
The users dials the telephone number, presses the send or talk key, and the mobile
phone sends a call setup request message to the mobile phone network via the nearest
mobile phone mast (BTS).
The call setup request message is handled next by the Mobile Switching Center, which
checks the subscriber's record held in the Visitor Location Register to see if the outgoing
call is allowed. If so, the MSC then routes the call in the same way that a telephone
exchange does in a fixed network.
If the subscriber is on a Pay As You Go tariff (sometimes known as Prepaid (for example,
in Australia and India)), then an additional check is made to see if the subscriber has
enough credit to proceed. If not, the call is rejected. If the call is allowed to continue,
then it is continually monitored and the appropriate amount is decremented from the
subscriber's account. When the credit reaches zero, the call is cut off by the network.
The systems that monitor and provide the prepaid services are not part of the GSM
standard services, but instead an example of intelligent network services that a mobile
phone operator may decide to implement in addition to the standard GSM ones.
34
How incoming calls are made to a mobile
When someone places a call to a mobile phone, they dial the telephone number (also
called a MSISDN) associated with the phone user and the call is routed to the mobile
phone operator's Gateway Mobile Switching Centre. The Gateway MSC, as the name
suggests, acts as the "entrance" from exterior portions of the Public Switched Telephone
Network onto the provider's network.
As noted above, the phone is free to roam anywhere in the operator's network or on the
networks of roaming partners, including in other countries. So the first job of the
Gateway MSC is to determine the current location of the mobile phone in order to
connect the call. It does this by consulting the Home Location Register (HLR), which, as
described above, knows which Visitor Location Register (VLR) the phone is associated
with, if any.
When the HLR receives this query message, it determines whether the call should be
routed to another number (called a divert), or if it is to be routed directly to the mobile.
If the owner of the phone has previously requested that all incoming calls be diverted to
another number, known as the Call Forward Unconditional (CFU) Number, then this
number is stored in the Home Location Register. If that is the case, then the CFU number
is returned to the Gateway MSC for immediate routing to that destination.
If the mobile phone is not currently associated with a Visited Location Register (because
the phone has been turned off) then the Home Location Register returns a number
known as the Call Forward Not Reachable (CFNRc) number to the Gateway MSC, and the
call is forwarded there. Many operators may set this value automatically to the phone's
voice mail number, so that callers may leave a message. The mobile phone may
sometimes override the default setting.
Finally, if the Home Location Register knows that the phone is roaming in a particular
Visited Location Register area, then it will request a temporary number (called an MSRN)
35
from that VLR. This number is relayed back to the Gateway MSC, and then used to route
the call to the MSC where the called phone is roaming.
When the call arrives at the Visiting MSC, the MSRN is used to determine which phone is
being called. The MSC then pages all the mobile phone masts in the area in order to
inform the phone that there is an incoming call for it. If the subscriber answers, a speech
path is created through the Visiting MSC and Gateway MSC back to the network of the
person making the call, and a normal telephone call follows.
It is also possible that the phone call is not answered. If the subscriber is busy on
another call (and call waiting is not being used) the Visited MSC routes the call to a pre-
determined Call Forward Busy (CFB) number. Similarly, if the subscriber does not answer
the call after a period of time (typically 30 seconds) then the Visited MSC routes the call
to a pre-determined Call Forward No Reply (CFNRy) number. Once again, the operator
may decide to set this value by default to the voice mail of the mobile so that callers can
leave a message.
During a GSM call, speech is converted from analogue sound waves to digital data by the
phone itself, and transmitted through the mobile phone network by digital means.
(Though older parts of the fixed Public Switched Telephone Network may use analog
transmission.)
The digital algorithm used to encode speech signals is called a codec. The speech codec
used in GSM are called Half-Rate (HR), Full-Rate (FR), Enhanced Full-Rate (EFR) and
Adaptive Multirate (AMR). All codec except AMR operate with a fixed data rate and
error correction level.
36
VOICE CHARGES
Mobile networks in Europe, Asia, Australia & Argentina only charge their subscribers for
outgoing calls. Incoming calls are free to the mobile subscriber; however, callers
typically pay a higher rate when calling mobile phones. Special prefixes are used to
designate mobile numbers so that callers are aware they are calling a mobile phone and
therefore will be charged a higher rate.
In the United States and Canada, callers pay the cost of connecting to the Gateway MSC
of the subscriber's phone company, regardless of the actual location of the phone. As
mobile numbers are given standard geographic numbers according to the North
American Numbering Plan, callers pay the same to reach fixed phones and mobile
phones in a given geographic area. Mobile subscribers pay for the connection time
(typically using in-plan or prepaid minutes) for both incoming and outgoing calls. For
outgoing calls, any long distance charges are billed as if they originate at the GMSC, even
though it is the Visiting MSC which completes the connection to the PSTN. Plans that
include nationwide long distance and/or nationwide roaming at no additional charge
over "local" outgoing calls are popular.
From the caller's point of view, it does not matter where the mobile subscriber is, as the
technical process of connecting the call is the same. If a subscriber is roaming on a
different company's network, the subscriber, instead of the caller, may pay a surcharge
for the connection time. International roaming calls are often quite expensive, and as a
result some companies require subscribers to grant explicit permission to receive calls
while roaming to certain countries.
When a subscriber is roaming internationally and a call is forwarded to his or her voice
mail, such as when his or her phone is off, busy, or not answered, he or she may actually
be charged for two simultaneous international phone calls—the first to get from the
GMSC to the VMSC and the second to get from the VMSC to the Call Forward Busy or
Call Forward No Reply number (typically the voice mailbox) in the subscriber's country.
37
Network Management Subsystem (NMS)
The Network Management Subsystem (NMS) is the third subsystem of the GSM network
in addition to the Network Switching Subsystem (NSS) and Base Station Subsystem
(BSS), which we have already discussed. The purpose of the NMS is to monitor various
functions and elements of the network.
• Fault management
• Configuration management
• Performance management
These functions cover the whole of the GSM network elements from the level of
individual BTSs, up to MSCs and HLRs.
38
1. Fault management
The purpose of fault management is to ensure the smooth operation of the network and
rapid correction of any kind of problems that are detected. Fault
management provides the network operator with information about the current status
of alarm events and maintains a history database of alarms.
The alarms are stored in the NMS database and this database can be searched according
to criteria specified by the network operator.
2. Configuration management
3. Performance management
39
GPRS
NETWORK
ARCHITECTURE
40
INTRODUCTION
GPRS provides mobile users access to value-added WAP services and different external
packet switched networks. These networks can be, for example, the Internet or
corporate intranets. The GSM-BSS provides the radio interface, and the GPRS core
network handles mobility and access to external packet networks and services.
The GPRS network acts in parallel with the GSM network, providing packet switched
connections to the external networks. The requirements of a GPRS network are the
following:
41
The GPRS network must use as much of the existing GSM infrastructure with the
smallest number of modifications to it.
Since a GPRS user may be on more than one data session, GPRS should be able to
support one or more packet switched connections.
To support the budgets of various GPRS users, it must be able to support different
Quality of Service (QoS) subscriptions of the user.
The GPRS network architecture has to be compatible with future 3rd and 4th
generation mobile communication systems.
A GPRS network must provide all of the functionality of a GSM network for packet
switched networks and more. The GPRS is expected to perform the functions of a
traditional mobile communication network and a traditional packet switched computer
network.
42
Network elements
The GPRS system brings some new network elements to an existing GSM network. Not
all of the network elements are compulsory for every GPRS network. These elements
are:
Serving GPRS Support Node (SGSN): the MSC of the GPRS network
43
Packet Control Unit (PCU) The PCU separates the circuit switched and packet
switched traffic from the user and sends them to the GSM and GPRS networks
respectively. It also performs most of the radio resource management functions of the
GPRS network. The PCU can be either located in the BTS, BSC, or some other point
between the MS and the MSC. There will be at least one PCU that serves a cell in which
GPRS services will be available. Frame Relay technology is being used at present to
interconnect the PCU to the GPRS core.
Channel Codec Unit (CCU) The CCU is realized in the BTS to perform the Channel
Coding (including the coding scheme algorithms), power control and timing advance
procedures.
Serving GPRS Support Node (SGSN) The SGSN is the most important element of
the GPRS network. The SGSN of the GPRS network is equivalent to the MSC of the GSM
network. There must at least one SGSN in a GPRS network. There is a coverage area
associated with a SGSN. As the network expands and the number of subscribers
increases, there may be more than one SGSN in a network. The SGSN has the following
functions:
• Mobility management as the subscriber moves from one area to another, and
possibly one SGSN to another
• Interaction with the NSS (that is, MSC/VLR, HLR, EIR) via the SS7 network in order to
retrieve subscription information
44
Gateway GPRS Support Node (GGSN) The GGSN is the gateway to external
networks. Every connection to a fixed external data network has to go through a GGSN.
The GGSN acts as the anchor point in a GPRS data connection even when the subscriber
moves to another SGSN during roaming. The GGSN may accept connection request from
SGSN that is in another PLMN. Hence, the concept of coverage area does not apply to
GGSN. There are usually two or more GGSNs in a network for redundancy purposes, and
they back up each other up in case of failure. The functions of a GGSN are given below:
• Allocates dynamic or static IP addresses to mobiles either by itself or with the help
of a DHCP or a RADIUS server
• Involved in the establishment of tunnels with the SGSN and with other external
networks and VPN.
From the external network's point of view, the GGSN is simply a router to an IP sub-
network. This is shown below. When the GGSN receives data addressed to a specific
user in the mobile network, it first checks if the address is active. If it is, the GGSN
forwards the data to the SGSN serving the mobile. If the address is inactive, the data is
discarded. The GGSN also routes mobile originated packets to the correct external
network.
45
GPRS MS Different GPRS MS classes were introduced to cope with the different
needs of future subscribers. The mobiles differ in their capabilities.
Domain Name Servers These devices convert IP names into IP addresses, for
example, server.nokia.com to 133.44.15.5. There is a primary DNS server and a
secondary DNS server. In the specifications, the DNS functionality is included in the
SGSN. However, the main vendors have chosen to separate the DNS functions from the
SGSN.
46
included. It is however included here due to the fact that operators usually need to
implement firewalls in their GPRS network (for security reasons).
Border Gateway The Border Gateway (BG) is a router that can provide a direct
GPRS tunnel between different operators' GPRS networks. This is referred to as an inter-
PLMN data network. It is more secure to transfer data between two operators' PLMN
networks through a direct connection rather than via the public Internet. The Border
Gateway will commence operation once the GPRS roaming agreements between various
operators have been signed. It will essentially allow a roaming subscriber to connect to
company intranet through the Home
Charging Gateway GPRS users have to be charged for the use of the network. In a
GSM network, charging is based on the destination, duration, and time of call. However,
GPRS offers connectionless service to users, so it not possible to charge subscribers on
the connection duration. Charging has to be based on the volume, destination, QoS, and
other parameters of a connectionless data transfer. These GPRS charging data are
generated by all the SGSNs and GGSNs in the network. This data is referred to as
Charging Data Records or CDRs. One data session may generate a number of CDRs, so
these needs to be collected and processed. The Charging Gateway (CG) collects all of
these records, sorts them, processes it, and passes it on to the Billing System. Here the
GPRS subscriber is billed for the data transaction. All CDRs contain unique subscriber
and connection identifiers to distinguish it. A protocol called GTP' (pronounced GTP
prime) is used for the transfer of data records between GSNs and the Charging Gateway.
47
ROAMING
SERVICES
IN GSM SYSTEM
48
ROAMING
“Roaming is defined as the ability for wireless customers to automatically make and
receive voice calls, send and receive data, or access other services when travelling
outside the geographical coverage area of their own home network, by means of using a
visited network.”
(International) Roaming enables the clients of one network operator to use the services
of another operator where both networks have a commercial agreement in place to
permit this, once all testing and technical implementation are completed.
The roaming process is split into two main phases where different activities are carried
out. In the pre-commercial phase the agreement is negotiated plus the network and IT
elements are implemented and tested. When these activities are successfully
completed, then commercial roaming can begin and customers can use each other’s
networks.
While in most cases roaming involves bi lateral, two-way roaming, in some cases,
unilateral or one way roaming takes place either for technical or commercial reasons.
Roaming Functions
The following functions are common within operators who have launched Roaming.
Usually you within the Roaming department find a “Roaming Manager” who is in charge
of Agreements, overall coordination between various functions and strategy. The
responsibility of producing the company Inter Operator Tariff (IOT) is most likely to be
placed here. The Roaming Department may also have responsibility for managing
outbound roaming which may include pricing, marketing, and promotion. Increasingly,
companies are recognizing the value of roaming to their business and that roaming is no
49
longer simply an implementation and management function. Increasingly, companies
are splitting the work between “operational” roaming and “Commercial” roaming.
Typically one group will look after the implementation and ongoing management whilst
the other will focus on strategy, pricing, commercial inter-operator activities etc.
Sometimes, both are within the same group, other times they are divided between
different departments.
The second role you are most likely to find in this department is the “Roaming
Assistant”. This is the person who has most of the day-to-day contact with the Roaming
partners. As a result this person is the one most likely to collate the IOT information of
the Roaming partners. This information is then published within the company. As the
roaming department often has to interface with every department within the company
and have overall visibility of the status of Roaming, it is often compared to the spider in
the centre of the web.
2. Marketing The role of the Marketing team within Roaming is to design effective
promotional initiatives for your customers travelling outside their home country.
3. Test SIM Card Administrator The person responsible for the test SIM cards is
usually a representative from Customer Services or Network Department; however, it
can often be the responsibility of the Roaming department itself. The role requires
providing all Roaming partners with their requested amount of test SIM (Subscriber
Identity Module) cards, and upon confirmation of receipt of the test SIMs will activate
them accordingly.
50
5. TADIG (Transferred Account Data Interchange Group) This function will (on the
basis of the data produced when performing the technical roaming testing) perform
billing tests. They will be responsible for TAP (Transferred Account Procedure) formats,
liaison with Data Clearing House (if used) and managing the TAP file flows between
networks on a daily basis.
6. Finance The functions of the Finance department can be divided into two when it
comes to Roaming.
• One part is to produce invoices (based on TAP file data) for any traffic generated in
your network by the customer of a Roaming partner.
• The other part is to ensure that you receive invoices from your roaming partners for
any traffic your customers have generated in their network.
The final responsibility will be to ensure payment and collection for all the invoices.
Many operators use the services of a Financial Clearing House for parts or all of this
process.
7. Fraud This function assumes responsibility for the creation and management of
High Usage Reports. They are responsible for supplying data in the event of an actual
fraud case. Many operators contract a Data Clearing House for parts, or all of this
process. All email addresses deployed as part of the High Usage Reports process must be
on company (operator or clearing house) domains. Domains like yahoo.com;
hotmail.com etc may not be used. This email address must be exclusively used for
receiving HURs, to enable automated processing of the incoming HUR emails. This will
ensure that all emails are processed as potential fraud alerts rather than personal
emails.
The Fraud department also supplies IMEIs (International Mobile Equipment Identity) to
either to their own national EIR (Equipment Identity Register) or to the CEIR (Central
Equipment Identity Register), preferably both.
51
8. Roaming Customer Care This function can be divided in two parts, one responsible
for assisting inter operator issues and the second one responsible for assisting in
Roaming Customer Queries.
CAMEL
The importance of CAMEL grew during the last few years, as many operators decided to
offer IN-based Pre-paid services abroad, abandoning the old call-back platform (e.g.
USSD based) and launching a more elegant solution which allows direct connection
towards the home network, with real-time billing. The above described service is just
one component contained in the different features offered with CAMEL phase 1 and 2.
Further CAMEL phases will enable for example services like GPRS Roaming and UMTS
Roaming. CAMEL can also be used to support the above mentioned value added services
to Post-Paid subscribers.
52
Services
The main reason to incorporate Camel services within your existing Roaming Portfolio is
indicated below. There are number of key benefits:
Prepaid Roaming Using a CAMEL platform Prepaid customers can roam in a similar
way to postpaid, and via CAMEL the home network can qualify the action the customer
does.
Home Routing Roaming Using Camel it’s possible for Pre-Paid or Post-Paid
customers to set-up a call that is then routed to the home network, and then routed
onwards.
VPN roaming / short codes The Pre-paid or Post-paid customer dials the short code,
and via CAMEL, the home network is requested to tell the long code associated. This can
be as detailed as per IMSI, thus allowing VPN to be used when roaming.
53
CONCLUSION
It has been a great opportunity for me to work in one of the most illustrious
telephone company existing in India. This not only help me to bridge the gap between
engineering & industry, but also aids me in having a few of an industry, it's
environment & functioning of various departments for achievements of the company
objective.
Since I was placed in MAHANAGAR TELEPHONE NIGAM LIMITED (BKC), I learned the
importance of teamwork. I also had experience about how to analyze a problem & solve
it.
We have to touch the right chords of the people & get the work done without
hurting their feelings. I was able to learn some of these skills during our training.
Thus I can confidentially conclude that this training is memorable and a fruitful one for
me.
54