Sunteți pe pagina 1din 65

GSM (Global System for Mobile Communication) is a digital cellular technology used for transmitting mobile voice and

data services.
Good subjective speech quality Low terminal and service cost Support for international roaming Support for range of new services and facilities Spectral efficiency ISDN compatibility

The development of GSM started in 1982, when the formed a study group called
Groupe Speciale Mobile created within CEPT

Field tests are performed to test the different radio techniques


GSM system is validated Phase 1 of the GSM specifications is delivered GSM is launched for commercial operations

Coverage spreads to larger cities and airports

Uplink

Downlink

Due to the requirements set for the GSM system, many advantages will be achieved.These advantages can be summarized as follows: GSM uses radio frequencies efficiently, and due to the digital radio path, the system tolerates more inter-cell disturbances. The average quality of speech achieved is better than in analogue cellular systems. Data transmission is supported throughout the GSM system. Speech is encrypted and subscriber information security is guaranteed. Due to the ISDN compatibility, new services are offered compared to the analogue systems. International roaming is technically possible within all countries using the GSM system.

CDMA uses a system in which all signals are sent at the same time, but each is spread across multiple frequencies. Servers assign an individual code to each transmission so that the signals don't interfere with each other and can be matched up between the sender and receiver. Originally, the two protocols differed in signal quality, consistency, and voice distortion, among other features. They Differ in terms of GSM phones are slightly more likely to drop calls as a user moves between cell towers, but they have better coverage in places with a lot of mountains. This technology also allows for voice and data transmission at the same time, which most CDMA phones cannot do.

GSM is the older service, and is found in most places around the world, while CDMA is most common in the US and Asia. Some other differences:

Voice telephony Basic fax/data services (up to 9.6 Kbits/s) Call forwarding Short Message Service(SMS)

Calling line identification Call waiting Call hold Conference calling Additional data communications capabilities
Multiple service profiles Private numbering plans

Divert if all calls


Busy PSTN Phone Another Mobile Not Reachable No Answer

Incoming Call

Call in Progress

PSTN Phone

1. Call in Progress 2. Put on Hold

3. Calls another Mobile

The GSM frame structure is designated as , , and . The minimum unit being frame (or ) is made of 8 time slots. One GSM hyperframe composed of 2048 superframes. Each GSM superframe composed of multiframes (either 26 or 51) Each GSM multiframe composed of frames (either 51 or 26) Each frame composed of 8 time slots. Hence there will be total of 2715648 TDMA frames available in GSM and the same cycle continues.

200KHz

1 2 3 4 5 890MHz

Uplink Freq

124 915Mhz

Total Frequency range(Uplink)=25Mhz Spacing between two carriers= 200kHz No. of Carriers=25MHz/200KHz = 124

TDMA Frame is divided into 8 time slots.

Freq

Down Link carrier Up Link carrier

Time slots 0 1 2 3 4 5 6 7 45MHz 200 KHz

03 1 2 3 3 4 5 6 7
4.6 ms 0.57ms Time

Burst is the information contained in one time slot. Types of


Trail bits=3 Guard time=8.25 Trail bits=8 Guard time=8.25 for Synchronization to avoid overlap of different bursts

GSM can be broadly divided into three parts :

Each subsystem is comprised of functional entities which communicate through the various interfaces using specified protocols.

GSM Network Structure: Concept


Mobile terminal device

Um
Air Interface

Fixed network
PSTN
BSS
Base Station Subsystem

Public Switched Telephone Network

NSS
BSS MS
Mobile Station
Base Station Subsystem

Network Switching Subsystem

ISDN
Integrated Services Digital Network

control/switching of mobile services

BSS
Base Station Subsystem

PDN
Public Data Network

Mobile components

Fixed network components

GSM Network
Radio SubSystem RSS =
Mobile Base Station Station + Subsystem MS BSS BTS T R A U

Network Switching Subsystem NSS


AC HLR VLR EIR

other networks

PSTN ISDN Data Networks

BSC OMC- B
MS = ME + SIM

MSC OMC- S

Operation SubSystem OSS

The purpose behind the GSM specifications is to define several Open interfaces, which then are limiting certain parts of the GSM system. There are several interfaces in the GSM system: MS-BTS Interface : Um Interface BTS-BSC Interface : A-bis Interface BSC-MSC Interface : GSM A-Interface MSC-VLR Interface : GSM B-Interface MSC-HLR Interface : GSM C-Interface VLR-HLR Interface : GSM D-Interface MSC-MSC Interface : GSM E-Interface MSC-EIR Interface : GSM F-interface VLR-VLR Interface : GSM G-Interface HLR-AUC Interface BSS-OMC Interface MSC-Billing Center

The purpose behind the GSM specifications is to define several Open interfaces, which then are limiting certain parts of the GSM system.
MS-BTS Interface

Universal use of any compatible mobile station in a GSM network A maximum spectral efficiency
BTS-BSC Interface Voice-data traffic exchange Signaling exchange between the BSC and the BTS Transporting synchronization information from the BSC to the BTS. BSS-MSC Interface carry the 64 Kbit/s speech data & signaling information between the BSC & MSC.

Explanation: The speech data is transferred from the MSC to the BSC in a 64Kbit/s. After the speech data is processed in the BSC , it is compressed to a 13 Kbit/s speech data is received at the BTS. The BTS transferred the data via a Um interface.

The VLR is an integral part of the MSC and each MSC in PLMN has its own VLR. Although the B-Interface in the GSM reference modal ,it is implemented as an internal interface since the VLR always reside with in the serving MSC.
The C-Interface uses the map protocol to retrieve routing information when calls to MSS are being set up through the MSC. The MAP protocol is used independent of the physical location of the HLR.

The D-interface uses MAP protocol to support the transfer of subscriber information and instructions relative to the cancellation or modification subscriber information. The MAP protocol is used independent of the relative location of the associated VLR and HLR. The signaling on the E-interface consists of two components : Trunk signaling - ITU-T Signaling system No. 7 - ISUP signaling. Inter-Entity signaling -Uses the Mobile Application part (MAP) protocol for inter - MSC handovers and SMS.

The F-Interface uses the MAP protocol to retrieve MS equipment identity related information from the EIR to determine whether or not to provide service to the MS.
The g-interface uses the MAP protocol to support the transfer of subscriber information between VLRs when the associated MS moves from one VLR service area to another.

Access to the authentication database is always accomplished through the HLR. This is not a GSM defined open interface. The HLR interface to the AuC is implemented as an interface in the MSC. The OMC is connected to the BSS via an X.25 interface.

Each MSC writes call accounting records to disk and the Billing center can poll the MSC disks for the billing data or the MSC can initiate transfer of the billing data using the FTMA/X.25 protocol.

MS = ME + SIM
Vehicle Mounted Portable Mobile Unit Hand-Portable Unit

Subscriber Parameters Personal Data for identifying Subscriber to the Network.

SIM

Space reserved for TMSI & LAI

Advantages:
Cheap Easy to Implement
Disadvantages: One Link failure isolates several BTSs

BSC
BTS

BTS BTS

Most popular configuration for 1st GSM System


Disadvantages: Expensive as each BTS has its own link One link failure always results in loss of BTS

BTS

BTS

BSC
BTS

BTS

Advantage: Redundancy gives some protection if a link fails Disadvantages: Expensive as each BTS has its own link One link failure always results in loss of BTS

BTS

BTS

BSC
BTS

BTS

other

MSC/VLRs
AC
Authentication Center

NSS
Network & Switching Subsystem EIR
Equipment Identity Register

HLR
Home Location Register

VLR
Visitor Location Register

MSC
Mobile services Switching Center

other

networks

The purpose of the Network Subsystem ( NSS ) is to monitor various functions and elements of the network

MSC
Mobile services Switching Center

NSS heart & center Serves several BSS (BSC) Set-up & switching of user traffic & signaling Always associated with VLR Association with HLR/AC and EIR possible Gateway MSC: Gateway to external networks Visited MSC: MSC serving certain MS

EIR

VLR

HLR/ AC

NSS

MSC

OMC
Operation & Maintenance Center

Subscriber and equipment data management


e.g. clearing services, bills

Network operation, configuration & management BSC Collecting network load information & compiling statistics Error detection & correction

BSS
BTS

Security management Performance control

37

Functionality of the NMC


Monitors Nodes on the Network Monitors Network Element Statistics Monitors OMC regions & provides information to OMC staff Enables Long Term Planning for entire network.

NMC
OMC OMC REGION 2 NETWORK REGION 3 REGION 1 OMC

Authentication is a procedure used in checking the validity and integrity of subscriber data. With the help of the authentication procedure the operator prevents the use of false SIM modules in the network. This procedure is based on an identity key, Ki that is issued to each subscriber when his data are established in the HLR. Air A
SIM card
MSC

AC

* I MSI * Ki

VLR

* I MSI * Ki

The GSM system uses three algorithms for the purposes of authentication and ciphering. These algorithms are A3, A5 and A8. A3 is used in authentication, A8 is used in generating a ciphering key and A5 is used in ciphering.
Air A

AC
A3
BTS BSC TC

A8

MSC

VLR

ME + SIM

A5

A5

A3

A8

Before an operator starts to use the security functions, the mobile subscriber is created in the Authentication Center. The following information is required in creating the subscriber: IMSI of the Subscriber Ki of the subscriber Algorithm Version Used

The basic principle of GSM security functions is to compare the data stored by the network to the data stored in the subscribers SIM. Ki is an authentication key with a length of 32 hexadecimal digits.

Authentication Triplet: The Authentication Center generates information that can be used for all the security purposes during one transaction. The authentication triplet consists of three numbers: is a Random number (Signed Response) is a result that the algorithm A3 produces on the basis of certain source information. is a ciphering key that A8 generates on the basis of certain source information.

Random Number Generator

Ki

AC
RAND

A3

A8

SRES

Kc

Authentication Triplet

VLR

RAND

SRES

Kc

Authentication Triplet

Authentication Triplet

VLR

RAND

SRES

Kc

Comparison

BSC

BTS
MS
RAND

Kc

SIM
A3

SRES Kc

Ki

A8

Ciphering: is used across the Air interface to provides speech BTS and signaling encryption. The speech of the user and the ciphering key, Kc, are processed by the ciphering algorithm (A5) which produces the coded speech signal.

SPEECH/DATA

A5
Kc TDMA

A5

ENCRYPTED SPEECH/DATA

A5
Kc TDMA

A5

SPEECH/DATA

Sequence:

1. The MSC/VLR receives the message of a call request. 2. The MSC/VLR checks if the mobile station is authorized to access the network. If so, the mobile station is activated. If the mobile station is not authorized, service will be denied. 3. MSC/VLR analyzes the number and initiates a call setup with the PSTN. 4. MSC/VLR asks the corresponding BSC to allocate a traffic channel (a radio channel and a time slot). 5. The BSC allocates the traffic channel and passes the information to the mobile station. 6. The called party answers the call and the conversation takes place. 7. The mobile station keeps on taking measurements of the radio channels in the present cell and neighboring cells and passes the information to the BSC. The BSC decides if handover is required, if so, a new traffic channel is allocated to the mobile station and the handover is performed. If handover is not required, the mobile station continues to transmit in the same frequency.

Sequence:

1. The Gateway MSC receives the call and queries the HLR for the information needed to route the call to the serving MSC/VLR. 2. The GMSC routes the call to the MSC/VLR. 3. The MSC checks the VLR for the location area of the MS. 4. The MSC contacts the MS via the BSC through a broadcast message, that is, through a paging request. 5. The MS responds to the page request. 6. The BSC allocates a traffic channel and sends a message to the MS to tune to the channel. The MS generates a ringing signal and, after the subscriber answers, the speech connection is established. 7. Handover, if required, takes place, as discussed in the earlier case.

Channels help maintain GSM network. GSM mobile phone connect to GSM network. Maintain the connection and help tear down the connection.

Physical channel is the medium over which the information is carried. Logical channels consists of the information carried over the Physical Channel.

Traffic channels carry speech or data.


Full rate 22.8 kb/s Half rate 11.4 kb/s

9.6kb/s 4.8kb/s 2.4kb/s

Control channels used to for control / command / signaling. Three Categories:

Frequency correction control channel , transmitted by BTS to MS. Helps MS tune its local oscillator to exact RF carrier freq of BTS. Frequency=67.7075 KHz. synchronization channel, this carry BSIC(Base transceiver station identity code) and Frame number which helps MS tune to specific physical slot on TDMA frame in GSM network.

Broadcast control channel, carry CGI,MNC,MCC which is received by MS. It is compared with SIM information, once verified OK connection is established with the network

Paging channel, When someone is calling mobile phone, this channel sent information on downlink to alert called mobile phone. Random Access channel, When mobile wants to call some other mobile phone, control information is sent on this channel. Access Grant Channel, transmitted by BTS to MS once network approves request of mobile by RACH Cell Broadcast channel, Used to carry the short message service cell broadcast

Stand alone dedicated control channel, used for call setup. authentication, location update. Slow associated control channel, is used for control and supervisory signals associated with the traffic channels.

Fast associated control channel, is used for control requirements such as

The signaling protocol in GSM is structured into three general layers , depending on the interface. is the physical layer, which uses the channel structures discussed above over the air interface. is the data link layer. Across the Um interface, the data link layer is a modified version of the LAPD protocol used in ISDN, called LAPDm. Across the A interface, the Message Transfer Part layer 2 of Signaling System Number 7 is used.

Layer 3 of the GSM signalling protocol is itself divided into 3 sub-layers. Controls the setup, maintenance, and termination of radio and fixed channels, including handovers. Manages the location updating and registration procedures, as well as security and authentication. Handles general call control, Similar to CCITT Recommendation Q.931, and manages Supplementary Services and the Short Message Service.

GMSC
MSC MSC

BSC

BSC

BSC

Handover is the process of automatically switching a call in progress from one traffic channel to another to neutralize the adverse effects of user movements.

The smallest of the handovers is the intra cell handover where the subscriber is handed over to another traffic channel within the same cell. BSC controlling the cell makes the decision to perform handover.

The subscriber moves from cell 1 to cell 2.In this case the handover process is controlled by BSC. The traffic connection with cell 1 is released when the connection with cell 2 is set up successfully.

Air
BTS BSC TC

BTS

Old Cell / BTS

New Cell / BTS

The subscriber moves from cell 1 to cell 2, which is served by another BSC. In this case the handover process is carried out by the MSC, but, the decision to make the handover is still done by the first BSC.

The subscriber moves from a cell controlled by one MSC to a cell in the domain of another MSC. This case is a bit more complicated.

S-ar putea să vă placă și