Documente Academic
Documente Profesional
Documente Cultură
for
S. Shankarnarayan
Revision 2
19th April 2001
1.
Introduction to GSM
HLR
MAP
MAP
VLR
MAP
PSTN /
ISDN
MSC
HLR
MAP
ISUP/MAP
MAP/ISUP
MSC
EIR
MAP
PLMN
BSSAP
BSC
BSS
LAPD/Q.931
BTS
LAPDm/Q.931
MS
Figure 1.1 - GSM system model - signaling view
-------------------------------------------------------------------------------------------------3
Radio interface
Um
Abis
BSC
MSC
-------------------------------------------------------------------------------------------------4
MSC
H
L
R
V
L
R
MSC
Location Area
Location Area
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
-------------------------------------------------------------------------------------------------5
Uplink:
Downlink:
Duplex distance
45 MHz
Carrier separation
Number of carriers
124
Modulation
GMSK
Transmission rate
270 Kbps
Access method
TDMA
Time-slots
8 per carrier
Speech coding
RPE-LTP-LPC
Regular Pulse ExcitationLong Term Prediction
Linear Predictive Coding
Diversity
Channel coding
Interleaving
Adaptive equalization
Frequency hopping
up-link
Downlink
-------------------------------------------------------------------------------------------------6
4) Co-channel Interference
I, Interferer f1
strength in dB
C, Carrier f1
strength in dB
A, Interferer f2
strength in dB
D
C
C
G
E
H
B
I
B
A
C
D
B
A
D
C
H
G
B
A
F
C
D
C
H
G
H
G
F
B
A
D
H
I
D
A
I
E
D
D
C
B
A
G
F
G
I
-------------------------------------------------------------------------------------------------9
A
A
A
A
A
A
A
-------------------------------------------------------------------------------------------------10
Location area
MSC/VLR
MSC/VLR
A2
A1
BTS site
A3
D
1
D
3
D
1
D
2
A
1
A
3
C
3
A
2
B
3
A
1
A
3
C
1
C
3
A
2
B
3
A
2
D
3
C
2
B
1
B
1
D
2
D
3
B
2
C
1
C
3
A
2
C
2
B
1
B
3
D
1
C
2
B
3
A
1
A
3
B
2
C
3
D
1
B
2
C
1
D
2
C
3
D
1
D
3
A
3
C
2
B
1
B
3
D
2
A
1
B
2
C
1
A
2
D
2
A
1
C
2
B
1
D
2
A
3
D
3
D
3
A
1
D
1
A
3
C
1
B
2
C
1
C
3
C
2
A
2
-------------------------------------------------------------------------------------------------12
B1 C1 D1 A2
B2
C2
D2 A3
B3 C3 D3
C0
f1
f2
f3
f4
f5
f6
F7
f8
f9
10
11
12
C1
13
14
15
16
17
18
19
20
21
22
23
24
C2
25
26
27
28
29
30
31
32
33
34
35
36
C1
C1
C3
A1
C1
C3
A1
A3
B1
B3
A2
C1
B2
B3
B2
A2
A3
A1
A3
A1
B1
C2
C3
B1
C2
C3
B2
B3
A2
A3
C2
B1
C2
B3
B2
A2
Cell sizes
Large
Small
Micro
Pico
10 - 30 Km
1 - 3 Km
100-300 m
10 - 30 m (Used in DECT, 3G)
Layer 2
1
Layer 2
1
14
7) Traffic calculations
Traffic per subscriber
A = n T / 3600 Erlang (E)
Where,
e.g.,
if n = 2 & T = 90 then,
A = 2 * 90 / 3600 = 0.050 E or 50 mE
Number of 3-sector sites
Given,
Traffic per subscriber:
Total subscribers:
Available frequencies:
Cell pattern:
Grade of Service:
50 mE
50,000
36
4/12
0.02 or 2%
22 [(3 * 8) - 2 (Control)]
Number of cells:
3-sector sites:
56 (168 / 3)
--------------------------------------------------------------------------------------------------
15
TDMA
(Digital)
CDMA
(Digital)
--------------------------------------------------------------------------------------------------
16
2) First generation 1G technologies based on FDMA
-------------------------------------------------------------------------------------------------17
-------------------------------------------------------------------------------------------------18
f2
TDMA
7
f4
6
TDMA
3
-------------------------------------------------------------------------------------------------19
Propagation delays & radio burst
It is not possible to transmit one PCM voice sample per timeslot
in digital TDMA over air as in the wire-line point to point digital
transmission.
We need to accumulate a number of PCM voice samples (say,
32, 64 or 128) before sending them all together as a burst from
one mobile. This will allow us to provide sufficient gap
between bursts from two mobiles located at different distances.
The gap will take care of some delay differences. 160 samples
for a period of 20ms are accumulated in GSM before the burst
transmission.
Round trip delay & echo
The burst method of a block of speech introduces long round
trip delays on an established voice connection. This will result
in echo on a connection to a POTS subscriber. GSM network
should take care to provide an echo canceller on such a
connection.
Low bit-rate coding of speech
Since the voice samples are buffered, it opens up the possibility
of digital processing of voice samples to reduce the bit rate for
voice transmission and number of bits per block of speech.
The speech coders defined for GSM use a hybrid approach of
combining the speech quality of waveform coders & low bit-rate
capability of vocoders. The speech is reduced to 13 Kbps in
GSM, known as full rate. There is provision for half rate.
3) Timing advance control
To reduce the gap between adjacent bursts from nearer &
farther mobile stations, GSM uses a technique of timing
advance. The mobiles moving away from the base station are
periodically asked to advance their burst transmission in terms
of a number of bit times. The mobiles moving towards the
base station are asked periodically to reduce the timing
advance (TA).
-------------------------------------------------------------------------------------------------20
Uplink
Downlink
6
5
Receive
Transmit with
Timing Advance
-------------------------------------------------------------------------------------------------21
Increase power - m dB
Figure 1.22 - Obstacles in the radio path & the shadowing effect
Log-normal fading
Log (distance)
Figure 1.23 - Log-normal fading due to shadowing effect on a moving MS
-------------------------------------------------------------------------------------------------22
If logarithm of the signal strength is measured along the path of
a mobile, the curve will take the form of a normal distribution
around a mean value that represents the path loss. The fading
dips are situated about 10 to 20 meters apart.
6) Rayleigh or multi-path fading
This occurs when the transmitted radio signal takes more than
one path to reach the mobile receiver. When the mobile is in
the direct line-of-sight path, it may receive the signal as several
reflections against big buildings.
Rayleigh fading
Path loss
Log-normal fading
Log (distance)
Figure 1.25 - Rayleigh fading over log-normal fading
-------------------------------------------------------------------------------------------------23
This means that the received signal is a sum of many identical
signals differing mainly in phase. Two received signals that are
1800 out of phase may cancel each other out. Smaller phase
differences cause steep dips in the received signal.
7) Time dispersion of received signal bits
Time dispersion causes inter-symbol-interference between
consecutive bits received at a mobile.
1
0
1
1
2
1
1
0
3
Figure 1.26 - Inter-symbol-interference due to time dispersion
-------------------------------------------------------------------------------------------------24
Bit rate in GSM
270 Kbps
3.7 microseconds
1.1 Km
2.2 Km
RPE-LTP-LPC
Speech
coder
-------------------------------------------------------------------------------------------------25
9) Coding of speech for error control
Error control codes
Log normal fading, multi-path fading, time dispersion, etc. result
in bit errors in the received bit stream. Bit error ratio or BER of
the received bit stream is a measure of the transmission quality.
By using redundancy & spreading out the information bits, It is
possible to reduce BER and also be able to detect as well as
correct errors. These are known as Error Control codes.
Error control codes can be divided into Block Codes and
Convolution Codes.
Block coding
INFO
Block
coder
-------------------------------------------------------------------------------------------------26
Convolution coding
Info
Info
Convolution
coder
Coded info
50 VI bits
Block
coder
53
Convolution
coder
456 bits
-------------------------------------------------------------------------------------------------27
First step:
Second step:
Third step:
The two-step approach is used in GSM both for speech & data.
The schemes for speech and data are somewhat different.
We are able to correct errors as far as possible by convolution
coding. The block coding helps to detect errors and determine
if the information block is too damaged to use and if so to
ignore it.
Channel coding is effective in detecting and correcting single
errors and very short burst errors. What if the burst errors are
too long?
10)Segmentation & interleaving for burst error control
Principle of Interleaving for Burst Error control
-------------------------------------------------------------------------------------------------28
Interleaving is a way of separating consecutive bits that would
be affected by burst errors and sending them in a nonconsecutive way by spreading them out over long periods.
Interleaving is a way of separating consecutive bits that would
be affected by burst errors and sending them in a nonconsecutive way by spreading them out over long periods.
In figure 1.28 a), blocks of speech are segmented into four
parts numbered 1 to 4. At the time of sending, segments
numbered 1 from four consecutive blocks together sent as a
frame. Similarly, frames 2, 3 & 4 are transmitted consecutively.
-------------------------------------------------------------------------------------------------29
1
9
17
25
.
.
.
.
.
.
441
449
2
10
18
26
.
.
.
.
.
.
442
450
3
11
19
27
.
.
.
.
.
.
443
451
4
12
20
28
.
.
.
.
.
.
444
452
5
13
21
29
.
.
.
.
.
.
445
453
6
14
22
30
.
.
.
.
.
.
446
454
7
15
23
31
.
.
.
.
.
.
447
455
8
16
24
32
.
.
.
.
.
.
448
456
Speech block
B
8 segments
Speech block
C
8 segments
Speech block
D
8 segments
Figure 1.33 a) - Four channel coded speech blocks with 1st level of
interleaving
Speech block
A
8 segments
Speech block
B
8 segments
Speech block
C
8 segments
Speech block
D
8 segments
-------------------------------------------------------------------------------------------------30
Speech segments
3
57
26
57
Figure 1.34 - Normal burst over air in GSM containing 2 speech segments
Figure 2.34 shows a normal radio burst that has space for two
segments of 57 bits of speech.
A - S1
Z - S5
A - S2
Z - S6
A - S3
Z - S7
A - S4
Z - S8
B - S1
A - S5
B - S2
A - S6
B - S3
A - S7
B - S4
A - S8
C - S1
C - S2
B - S5
B - S6
C - S3
B - S7
C - S4
B - S8
D - S1
C - S5
D - S2
C - S6
D - S3
C - S7
D - S4
C - S8
31
A (S1-S4)
B (S1-S4)
C (S1-S4)
D (S1-S4)
Z (S5-S8)
A (S5-S8)
B (S5-S8)
C (S5-S8)
A-S1/Z-S5
A-S2/Z-S6
A-S2/Z-S6
A-S3/Z-S7
A-S3Z-S7
A-S4/Z-S8
A-S4/Z-S8
B-S1/A-S5
B-S1/A-S5
B-S2/A-S6
B-S2/A-S6
B-S3/A-S7
B-S3/A-S7
B-S4/A-S8
B-S4/A-S8
C-S1/B-S5
C-S1/B-S5
C-S2/B-S6
C-S2/B-S6
C-S3/B-S7
C-S3/B-S7
C-S4/B-S8
C-S4/B-S8
D-S1/C-S5
D-S1/C-S5
D-S2/C-S6
D-S2/C-S6
D-S3/C-S7
D-S3/C-S7
D-S4/C-S8
D-S4/C-S8
B-S1/A-S5
B-S1/A-S5
32
Each burst in GSM actually holds two segments from two
consecutive speech blocks. In other words, eight segments of
a speech block are spread over eight consecutive bursts with
interleaving of consecutive bits from the two segments.
See figure 2.36
Each burst shown is sent in consecutive TDMA frames in the
allocated timeslot or the physical channel.
Round trip delay
The duration of a TDMA frame is about 5 ms each. As the
speech block is spread over 8 TDMA frames, there is a delay of
40 ms over the radio for the entire block to be sent.
Speech coding itself introduces a delay of 20 ms due to
buffering of 160 samples.
In the base station system, these interleaved segments are
accumulated, trascoded into PCM format and sent forward as
PCM samples over a period of 20 ms thereon.
Thus the various coding & interleaving schemes introduce a
one-way delay of 80 ms or a round trip delay of 160 ms on a
speech connection.
Therefore we need an echo canceller on a connection from a
mobile to a POTS subscriber involving a two-wire to four-wire
converter to avoid talker echo for the mobile user.
11) Modulation of carrier in GSM
GSM uses GMSK (Gaussian Minimum Shift Keying) modulation
scheme. This is a BPSK Phase Shift Keying technique with
two phases wherein the phase shift is controlled to be smooth
rather than abrupt as in the conventional method.
GMSK reduces the carrier bandwidth requirements at the cost
of lesser resistance to noise.
-------------------------------------------------------------------------------------------------33
12)Frequency hopping (slow) & Rayleigh fading
The Rayleigh fading pattern mentioned earlier is frequencydependent. This means that the fading dips will occur at
different places for different frequencies. If we keep changing
the frequencies during a call and if only one of them has a
fading dip, we lose only a fraction of the information. With
complex signal processing, it may be possible to restore the
information. Se figure 1.33 for frequency hopping in GSM.
0
2 3
5 6
7 0
3 4
5 6
Carrier, C1
Uplink
3 4
2 3
5 6
5 6 7
7 0
0 1 2
3 4
Downlink
5 6
5 6
5 6
Carrier, C2
0
3 4
5 6 7 0 1
-------------------------------------------------------------------------------------------------34
Time
Figure 1.38 - Antenna diversity
14)The Viterbi equalizer & time dispersion
The equalizer in GSM is to reduce the effect of time dispersion
causing adjacent inter-symbol-interference. The principle is
based on creating a mathematical model of the air interface
channel and calculating the most probable transmitted data.
Received burst
Data
T'
Correlator
Data
Difference
Channel
model
Chose
? pattern
so that the
difference
is
minimized
-------------------------------------------------------------------------------------------------35
A pattern known as the training sequence is included in the
middle of the burst in the GSM for this purpose. The GSM
specification prescribes an equalizer capable of handling a
reflected signal delayed upto four bit times. This corresponds
to 15 microseconds or a path difference of 4.5 Km between the
direct and reflected signals.
How the Viterbi equalizer works?
-------------------------------------------------------------------------------------------------36
17)Digital transmission summary
Block schematic of a Mobile Station (MS)
Figure 1.36 shows the different signal processing parts involved
in the transmission and reception of speech.
Antenna
Antenna
Transmitter
Modulator
Receiver
Demodulator
33.8 Kbps
Burst formatting
Viterbi equalizer
Ciphering
Deciphering
Interleaving
Deinterleaving
22.8 Kbps
Channel coding
Viterbi decoding
13 Kbps
Speech coding
Speech decoding
Speech blocking
8 KHz, 13 bits
A/D conversion
D/A conversion
Microphone
Earphone
Transmitter
Modulator
Receiver
Demodulator
33.8 Kbps
Burst formatting
Viterbi equalizer
Ciphering
Deciphering
Interleaving
Deinterleaving
22.8 Kbps
Channel coding
Viterbi decoding
13 Kbps
Speech coding
13 Kbps
Speech decoding
Speech blocking
TRAU
8 KHz, 13 bits
Transcoding
8 KHz, 8 bits
64 Kbps, PCM
-------------------------------------------------------------------------------------------------38
Transcoder
The network has a transcoder for D/D conversion between
PCM samples & linear-coded 13 bit samples.
18)Transcoder & rate adaptation unit or TRAU
TRAU functionally belongs to BTS but can be remotely located
in the BSC as is the normal practice or even the MSC. But a
remote TRAU is still controlled by the BTS.
TRAU
Abis
B
S
C
M
A
BTS
S
C
16 Kbps channels
13 Kbps speech + 3 Kbps
BTS-TRAU signaling
BTS-TRAU signaling
Synchronization of the 20ms blocks
Time alignment i.e., BTS control of the phasing of
incoming 20ms blocks from the TRAU
Speech/data discrimination and the type of adaptation
needed for data
Bad frame indication to TRAU by BTS
Indication whether DTX is to be applied on the downlink
Silence Descriptor (SID) indication on the uplink
-------------------------------------------------------------------------------------------------39
4 channels
of 64 Kbps
ET
TRAU
BTS
G.703
Abis
ET
G.703
A
MSC
4 channels of 16 Kbps
in one 64 Kbps channel
-------------------------------------------------------------------------------------------------40
f) GSM Components
1) GSM system model
Switching System (SS)
AUC
SM-SC
SMS
Gateway
HLR
GMSC
GMSC
MSC/VLR
MSC/VLR
EIR
GMSC
To/from
PSTN/ISDN
MSC/VLR
GIWU
BSC
BTS
Base station system (BSS)
Operation &
Support
System
(OSS)
-------------------------------------------------------------------------------------------------42
Short Message Service Centre or SM-SC is a store and - forward centre for short messages.
-------------------------------------------------------------------------------------------------45
g) GSM Identities
1) Mobile Station ISDN Number (MSISDN) (E.164)
International MSISDN (15 digits)
CC
NDC
SN
Country Code
(1~3 digits)
National Destination code
(2-3 digits)
Identifies the GSM PLMN Area Code
Subscriber Number
MCC
MNC
MSIN
National MSI
MCC
MNC
MSIN
CC
SN
NDC
SN
TAC
FAC
SNR
Sp
TAC
6 digits
FAC
2 digits
SNR
Serial Number
6 digits
Unique number within a TAC + FAC
Sp
Spare
(Future Use)
1 digit
MCC
MNC
LAC
MCC
3 digits
MNC
2 digits
LAC
16 bits
LAI
-------------------------------------------------------------------------------------------------47
7) Cell Global Identity (CGI) (GSM Rec.)
MCC
MNC
CI
LAC
CI
Cell Identity
(PLMN Operator)
16 bits
NCC
BCC
NCC
BCC
CC
NDC
SN
CC
NDC
E.164
MSIN
MSIN
E.212
CC/NDC identifies the country & the PLMN & possibly the HLR
where the MS is registered.
IMSI & MGT
When an MS is turned on in (or enters) the MSC/VLR service
area of a PLMN, the MS has to be registered as a new visitor in
the VLR. VLR needs to address the HLR where the
subscription information of the mobile subscriber is registered.
The information obtained from the MS for this purpose is IMSI
consisting of MCC + MNC + MSIN. There are two possibilities.
IMSI
MCC
MNC
MSIN
MGT
CC
NDC
MSIN
-------------------------------------------------------------------------------------------------49
Translation of IMSI to MGT in the VLR
Downlink
Uplink
Logical channel
Using multi-frame mode, different logical channels can be
mapped independently in either direction. These "logical
channels" carrying control information are generally mapped on
to one or two timeslots of one carrier, C0, in a cell. The
remaining "logical channels" are used to carry traffic such as
voice.
-------------------------------------------------------------------------------------------------50
Logical
channel
s
Control
channel
s
Traffic
channel
s
CCC
H
BCH
DCC
H
FCC
H
BCC
H
SCH
PCH
CCC
H
BCH
RAC
H
AGCH
DCC
H
Control
channel
s
CCC
H
BCH
SDCC
H
DCC
H
SACC
H
FACCH
C0
C1
C2
C0, C1 & C2
C
T
Carriers in a cell
Control channels on timeslot 0 & 1 of C0
Traffic channels on remaining timeslots of
C0, C1 & C2
57 bits
26 bits
57 bits
Training
Data
Data
22
- - -
23
24
25
47
- - -
48
49
50
22
- - -
23
24
25
47
- - -
48
49
50
2044
2045 2046
2047
1322
1323 1324
1325
0 1 2
0 1 2
F S
B
B
F S
F S
FCCH
SCH
BCCH
PCH /
AGCH
IDLE
0 1 2
0 1 2
RACH
-------------------------------------------------------------------------------------------------57
Uplink & downlink, C0, timeslot 1 - Multiframe mapping
TDMA frame - 4.615 ms
0 1 2
0 1 2
D0
D7
A0
A3
D7
A5
A7
A4
D0
A7
D7
A0
A1
D0
D7
A0
A7
I
I
SDCCH 0
SDCCH 7
SACCH 0
SACCH 7
IDLE
D0
D7
A4
-------------------------------------------------------------------------------------------------58
4) Mapping of logical traffic channels on physical channels
Timeslots 0 & 1 on C0
Timeslots 2 ~ 7 on C0
Timeslots 0 ~ 7 on C1 ~ C3
1 2 3
1 2 3
TDMA fra
7 0
1 2 3
TCH
SACCH
IDLE
Traffic channel
Slow associated control channel
-------------------------------------------------------------------------------------------------59
TDMA frame - n
0 1 2 3
TDMA
4 5 6 7
0 1 2 3
4 5 6 7 0 1 2 3
4 5 6 7 0 1 2 3
TDMA frame - n
4 5 6 7 0 1 2 3
Downlink
TDMA
Uplink
TDMA frame - 25
7
1
0
3
2
TDMA frame - 24
4
3
TDMA frame - 25
Downlink
-------------------------------------------------------------------------------------------------60
C
B
B
B
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
B
B
B
-------------------------------------------------------------------------------------------------61
Synch
INFO
Tail
Guard period
41
36
60 + 8.25
Frame 1, ts1
Access burst
Frame 1, ts0
AB 1
Frame 2, ts0
Arrival time
& delay
AB 2
Figure 1.61 Different arrival times of bursts & delays on the RACH
-------------------------------------------------------------------------------------------------62
3) Channel request & information in the Access Burst
Establishment cause
Random discriminator
RACH
BTS
Channel request
Random
timer
Channel request
2b
2a
2c
VLR
BSC
MSC
HLR
4a
3
4b
6
7b
5a
5b
7a
1)
2)
3)
4)
5)
6)
7)
System information
RR connection establishment
Service indication
Authentication
Updating
Acceptance
Channel release
-------------------------------------------------------------------------------------------------64
2) IMSI detach
BSC
MSC
VLR
3
2
Figure 1.66 - IMSI detach
BSC
MSC
VLR
3
2
5
HLR
4
-------------------------------------------------------------------------------------------------65
4) Call from MS
1b
1a
1c
BSC
MSC
VLR
2
3
4
5
6
7
8
1a-c)
2)
3)
4)
5)
6)
7)
8)
RR connection establishment
Service indication
Authentication
Ciphering mode setting
Call initiation
Assignment of a TCH
Call confirmation
Call accepted
-------------------------------------------------------------------------------------------------66
MS
Network
CHAN REQ
IMM ASSIGN
SERV REQ
AUTH REQ
RR - Connection
Establishment
Service indication
Authentication
AUTH RESP
CIPH MODE CMD
CIPH MODE COM
SETUP
CALL PROC
Call initiation
ASSIGN CMD
ASSIGN COM
Assignment of a
Traffic channel
ALERT
Call confirmation
CONNECT
CONNECT ACK
Call accepted
-------------------------------------------------------------------------------------------------67
5) Call to MS from PSTN/ISDN
Translation of
MSISDN to IMSI
2 MSISDN
1 MSISDN
GMSC
MSC/VLR
6 MSRN (IAM)
HLR
5 MSRN
2 MSRN
MSC /
VLR 2
MSC /
VLR 3
7
BSC
8
9
8
9
2 IMSI
-------------------------------------------------------------------------------------------------68
MS
PAGING REQ
Network
Paging the MS
CHAN REQ
IMM ASSIGN
PAGING RESP
AUTH REQ
RR - Connection
Establishment
Service indication
Authentication
AUTH RESP
CIPH MODE CMD
CIPH MODE COM
SETUP
CALL CONFIRM
Call initiation
ASSIGN CMD
ASSIGN COM
Assignment of a
Traffic channel
ALERT
CONNECT
Call confirmation
CONNECT ACK
Call accepted
-------------------------------------------------------------------------------------------------69
-------------------------------------------------------------------------------------------------70
3) Location updating - periodic registration - idle mode
It is possible that the IMSI detach was not registered in the VLR
due to poor radio link quality and the system may continue to
assume that the MS is still in the same LA.
To avoid ambiguity, MS carries out periodic registration
procedure once every 30 minutes. If there is no response to
the request for a channel, MS will make repeated attempts.
The system information on the BCCH tells all MSs about the
frequency of periodic registration.
4) Implicit detach - idle mode
If the periodic registration does not take place and a timer times
out, the MS is marked as detached in the VLR. This can
happen when the MS has been turned off outside the radio
coverage area.
-------------------------------------------------------------------------------------------------71
Security features
Authentication algorithm, A3
Subscriber authentication key, KI
Ciphering key generation algorithm, A8
Ciphering key, Kc
Control of access to data stored & performed in the SIM
-------------------------------------------------------------------------------------------------72
Unblocking of SIM & PUK
Unblocking of SIM is possible under the control of PUK.
PUK is an 8-digit numeric only code. Indication is given if an
incorrect PUK is entered. After 10 repeated incorrect entries,
SIM is blocked.
l) Authentication of an MS
1) The authentication key, Ki
This is allocated at the time of subscription and stored in the
SIM as well as the authentication centre that provides the
system with so-called Triplets. The IMSI allocated to the
subscriber is also stored in the SIM & the HLR.
2) The Triplets
Against each registered IMSI, the HLR keeps a stock of triplets.
Whenever it is exhausted, the HLR requests for triplets against
an IMSI. See figure 1.57.
Request for
triplets
HLR
IMSI
AUC
3 or 5 triplets
Figure 1.72 - Request from HLR & response from AUC.
-------------------------------------------------------------------------------------------------73
RAND
generator
RAND
Database
A3
SRES (32 bits)
Authentication
Algorithm
A3
A8
IMSI - KI
IMSI - KI
IMSI - Ki
IMSI - Ki
RAND
SRES
IMSI
KI
Kc
A8
Ciphering
Algorithm
Kc (64 bits)
Random number
Signed Response
International mobile subscriber identity
Subscriber authentication key
Ciphering key
RAND
SRES
MSC/VLR
4
Calculates
SRES & Kc
Compares received
SRES with that in
the triplet
Encrypted
4
M
M + Kc
MSC /
VLR
TDMA
frame No.
M'
Kc
+
+
114 bits
Kc
Cipher
mode
completed
A5
A5
TDMA
frame No.
Decryption
of M'
successful?
Kc (64)
MS
BTS
Kc (64)
FN (22)
A5
A5
FN (22)
S1 (114)
S2 (114)
S1 (114)
S2 (114)
-------------------------------------------------------------------------------------------------75
On successful completion of cipher mode command, all
information over the air interface will be ciphered and all data,
speech & signaling information are protected.
IMEI
IMSI (except at the time of registration as a new visitor)
Calling & called party addresses in the SETUP message
All information during conversation
Equipment identification
IMEI
request
IMEI
4
MSC
/
VLR 3
Access /
barred
Check
EIR
-------------------------------------------------------------------------------------------------76