Documente Academic
Documente Profesional
Documente Cultură
data services.
Good subjective speech quality Low terminal and service cost Support for international roaming Support for range of new services and facilities Spectral efficiency ISDN compatibility
The development of GSM started in 1982, when the formed a study group called
Groupe Speciale Mobile created within CEPT
Uplink
Downlink
Due to the requirements set for the GSM system, many advantages will be achieved.These advantages can be summarized as follows: GSM uses radio frequencies efficiently, and due to the digital radio path, the system tolerates more inter-cell disturbances. The average quality of speech achieved is better than in analogue cellular systems. Data transmission is supported throughout the GSM system. Speech is encrypted and subscriber information security is guaranteed. Due to the ISDN compatibility, new services are offered compared to the analogue systems. International roaming is technically possible within all countries using the GSM system.
CDMA uses a system in which all signals are sent at the same time, but each is spread across multiple frequencies. Servers assign an individual code to each transmission so that the signals don't interfere with each other and can be matched up between the sender and receiver. Originally, the two protocols differed in signal quality, consistency, and voice distortion, among other features. They Differ in terms of GSM phones are slightly more likely to drop calls as a user moves between cell towers, but they have better coverage in places with a lot of mountains. This technology also allows for voice and data transmission at the same time, which most CDMA phones cannot do.
GSM is the older service, and is found in most places around the world, while CDMA is most common in the US and Asia. Some other differences:
Voice telephony Basic fax/data services (up to 9.6 Kbits/s) Call forwarding Short Message Service(SMS)
Calling line identification Call waiting Call hold Conference calling Additional data communications capabilities
Multiple service profiles Private numbering plans
Incoming Call
Call in Progress
PSTN Phone
The GSM frame structure is designated as , , and . The minimum unit being frame (or ) is made of 8 time slots. One GSM hyperframe composed of 2048 superframes. Each GSM superframe composed of multiframes (either 26 or 51) Each GSM multiframe composed of frames (either 51 or 26) Each frame composed of 8 time slots. Hence there will be total of 2715648 TDMA frames available in GSM and the same cycle continues.
200KHz
1 2 3 4 5 890MHz
Uplink Freq
124 915Mhz
Total Frequency range(Uplink)=25Mhz Spacing between two carriers= 200kHz No. of Carriers=25MHz/200KHz = 124
Freq
03 1 2 3 3 4 5 6 7
4.6 ms 0.57ms Time
Each subsystem is comprised of functional entities which communicate through the various interfaces using specified protocols.
Um
Air Interface
Fixed network
PSTN
BSS
Base Station Subsystem
NSS
BSS MS
Mobile Station
Base Station Subsystem
ISDN
Integrated Services Digital Network
BSS
Base Station Subsystem
PDN
Public Data Network
Mobile components
GSM Network
Radio SubSystem RSS =
Mobile Base Station Station + Subsystem MS BSS BTS T R A U
other networks
BSC OMC- B
MS = ME + SIM
MSC OMC- S
The purpose behind the GSM specifications is to define several Open interfaces, which then are limiting certain parts of the GSM system. There are several interfaces in the GSM system: MS-BTS Interface : Um Interface BTS-BSC Interface : A-bis Interface BSC-MSC Interface : GSM A-Interface MSC-VLR Interface : GSM B-Interface MSC-HLR Interface : GSM C-Interface VLR-HLR Interface : GSM D-Interface MSC-MSC Interface : GSM E-Interface MSC-EIR Interface : GSM F-interface VLR-VLR Interface : GSM G-Interface HLR-AUC Interface BSS-OMC Interface MSC-Billing Center
The purpose behind the GSM specifications is to define several Open interfaces, which then are limiting certain parts of the GSM system.
MS-BTS Interface
Universal use of any compatible mobile station in a GSM network A maximum spectral efficiency
BTS-BSC Interface Voice-data traffic exchange Signaling exchange between the BSC and the BTS Transporting synchronization information from the BSC to the BTS. BSS-MSC Interface carry the 64 Kbit/s speech data & signaling information between the BSC & MSC.
Explanation: The speech data is transferred from the MSC to the BSC in a 64Kbit/s. After the speech data is processed in the BSC , it is compressed to a 13 Kbit/s speech data is received at the BTS. The BTS transferred the data via a Um interface.
The VLR is an integral part of the MSC and each MSC in PLMN has its own VLR. Although the B-Interface in the GSM reference modal ,it is implemented as an internal interface since the VLR always reside with in the serving MSC.
The C-Interface uses the map protocol to retrieve routing information when calls to MSS are being set up through the MSC. The MAP protocol is used independent of the physical location of the HLR.
The D-interface uses MAP protocol to support the transfer of subscriber information and instructions relative to the cancellation or modification subscriber information. The MAP protocol is used independent of the relative location of the associated VLR and HLR. The signaling on the E-interface consists of two components : Trunk signaling - ITU-T Signaling system No. 7 - ISUP signaling. Inter-Entity signaling -Uses the Mobile Application part (MAP) protocol for inter - MSC handovers and SMS.
The F-Interface uses the MAP protocol to retrieve MS equipment identity related information from the EIR to determine whether or not to provide service to the MS.
The g-interface uses the MAP protocol to support the transfer of subscriber information between VLRs when the associated MS moves from one VLR service area to another.
Access to the authentication database is always accomplished through the HLR. This is not a GSM defined open interface. The HLR interface to the AuC is implemented as an interface in the MSC. The OMC is connected to the BSS via an X.25 interface.
Each MSC writes call accounting records to disk and the Billing center can poll the MSC disks for the billing data or the MSC can initiate transfer of the billing data using the FTMA/X.25 protocol.
MS = ME + SIM
Vehicle Mounted Portable Mobile Unit Hand-Portable Unit
SIM
Advantages:
Cheap Easy to Implement
Disadvantages: One Link failure isolates several BTSs
BSC
BTS
BTS BTS
BTS
BTS
BSC
BTS
BTS
Advantage: Redundancy gives some protection if a link fails Disadvantages: Expensive as each BTS has its own link One link failure always results in loss of BTS
BTS
BTS
BSC
BTS
BTS
other
MSC/VLRs
AC
Authentication Center
NSS
Network & Switching Subsystem EIR
Equipment Identity Register
HLR
Home Location Register
VLR
Visitor Location Register
MSC
Mobile services Switching Center
other
networks
The purpose of the Network Subsystem ( NSS ) is to monitor various functions and elements of the network
MSC
Mobile services Switching Center
NSS heart & center Serves several BSS (BSC) Set-up & switching of user traffic & signaling Always associated with VLR Association with HLR/AC and EIR possible Gateway MSC: Gateway to external networks Visited MSC: MSC serving certain MS
EIR
VLR
HLR/ AC
NSS
MSC
OMC
Operation & Maintenance Center
Network operation, configuration & management BSC Collecting network load information & compiling statistics Error detection & correction
BSS
BTS
37
NMC
OMC OMC REGION 2 NETWORK REGION 3 REGION 1 OMC
Authentication is a procedure used in checking the validity and integrity of subscriber data. With the help of the authentication procedure the operator prevents the use of false SIM modules in the network. This procedure is based on an identity key, Ki that is issued to each subscriber when his data are established in the HLR. Air A
SIM card
MSC
AC
* I MSI * Ki
VLR
* I MSI * Ki
The GSM system uses three algorithms for the purposes of authentication and ciphering. These algorithms are A3, A5 and A8. A3 is used in authentication, A8 is used in generating a ciphering key and A5 is used in ciphering.
Air A
AC
A3
BTS BSC TC
A8
MSC
VLR
ME + SIM
A5
A5
A3
A8
Before an operator starts to use the security functions, the mobile subscriber is created in the Authentication Center. The following information is required in creating the subscriber: IMSI of the Subscriber Ki of the subscriber Algorithm Version Used
The basic principle of GSM security functions is to compare the data stored by the network to the data stored in the subscribers SIM. Ki is an authentication key with a length of 32 hexadecimal digits.
Authentication Triplet: The Authentication Center generates information that can be used for all the security purposes during one transaction. The authentication triplet consists of three numbers: is a Random number (Signed Response) is a result that the algorithm A3 produces on the basis of certain source information. is a ciphering key that A8 generates on the basis of certain source information.
Ki
AC
RAND
A3
A8
SRES
Kc
Authentication Triplet
VLR
RAND
SRES
Kc
Authentication Triplet
Authentication Triplet
VLR
RAND
SRES
Kc
Comparison
BSC
BTS
MS
RAND
Kc
SIM
A3
SRES Kc
Ki
A8
Ciphering: is used across the Air interface to provides speech BTS and signaling encryption. The speech of the user and the ciphering key, Kc, are processed by the ciphering algorithm (A5) which produces the coded speech signal.
SPEECH/DATA
A5
Kc TDMA
A5
ENCRYPTED SPEECH/DATA
A5
Kc TDMA
A5
SPEECH/DATA
Sequence:
1. The MSC/VLR receives the message of a call request. 2. The MSC/VLR checks if the mobile station is authorized to access the network. If so, the mobile station is activated. If the mobile station is not authorized, service will be denied. 3. MSC/VLR analyzes the number and initiates a call setup with the PSTN. 4. MSC/VLR asks the corresponding BSC to allocate a traffic channel (a radio channel and a time slot). 5. The BSC allocates the traffic channel and passes the information to the mobile station. 6. The called party answers the call and the conversation takes place. 7. The mobile station keeps on taking measurements of the radio channels in the present cell and neighboring cells and passes the information to the BSC. The BSC decides if handover is required, if so, a new traffic channel is allocated to the mobile station and the handover is performed. If handover is not required, the mobile station continues to transmit in the same frequency.
Sequence:
1. The Gateway MSC receives the call and queries the HLR for the information needed to route the call to the serving MSC/VLR. 2. The GMSC routes the call to the MSC/VLR. 3. The MSC checks the VLR for the location area of the MS. 4. The MSC contacts the MS via the BSC through a broadcast message, that is, through a paging request. 5. The MS responds to the page request. 6. The BSC allocates a traffic channel and sends a message to the MS to tune to the channel. The MS generates a ringing signal and, after the subscriber answers, the speech connection is established. 7. Handover, if required, takes place, as discussed in the earlier case.
Channels help maintain GSM network. GSM mobile phone connect to GSM network. Maintain the connection and help tear down the connection.
Physical channel is the medium over which the information is carried. Logical channels consists of the information carried over the Physical Channel.
Frequency correction control channel , transmitted by BTS to MS. Helps MS tune its local oscillator to exact RF carrier freq of BTS. Frequency=67.7075 KHz. synchronization channel, this carry BSIC(Base transceiver station identity code) and Frame number which helps MS tune to specific physical slot on TDMA frame in GSM network.
Broadcast control channel, carry CGI,MNC,MCC which is received by MS. It is compared with SIM information, once verified OK connection is established with the network
Paging channel, When someone is calling mobile phone, this channel sent information on downlink to alert called mobile phone. Random Access channel, When mobile wants to call some other mobile phone, control information is sent on this channel. Access Grant Channel, transmitted by BTS to MS once network approves request of mobile by RACH Cell Broadcast channel, Used to carry the short message service cell broadcast
Stand alone dedicated control channel, used for call setup. authentication, location update. Slow associated control channel, is used for control and supervisory signals associated with the traffic channels.
The signaling protocol in GSM is structured into three general layers , depending on the interface. is the physical layer, which uses the channel structures discussed above over the air interface. is the data link layer. Across the Um interface, the data link layer is a modified version of the LAPD protocol used in ISDN, called LAPDm. Across the A interface, the Message Transfer Part layer 2 of Signaling System Number 7 is used.
Layer 3 of the GSM signalling protocol is itself divided into 3 sub-layers. Controls the setup, maintenance, and termination of radio and fixed channels, including handovers. Manages the location updating and registration procedures, as well as security and authentication. Handles general call control, Similar to CCITT Recommendation Q.931, and manages Supplementary Services and the Short Message Service.
GMSC
MSC MSC
BSC
BSC
BSC
Handover is the process of automatically switching a call in progress from one traffic channel to another to neutralize the adverse effects of user movements.
The smallest of the handovers is the intra cell handover where the subscriber is handed over to another traffic channel within the same cell. BSC controlling the cell makes the decision to perform handover.
The subscriber moves from cell 1 to cell 2.In this case the handover process is controlled by BSC. The traffic connection with cell 1 is released when the connection with cell 2 is set up successfully.
Air
BTS BSC TC
BTS
The subscriber moves from cell 1 to cell 2, which is served by another BSC. In this case the handover process is carried out by the MSC, but, the decision to make the handover is still done by the first BSC.
The subscriber moves from a cell controlled by one MSC to a cell in the domain of another MSC. This case is a bit more complicated.