Unit 2 Mobile Telecommunication Systems Medium Access Control (MAC) Address Is A Hardware Address Use To Uniquely Identify Each
Unit 2 Mobile Telecommunication Systems Medium Access Control (MAC) Address Is A Hardware Address Use To Uniquely Identify Each
Unit 2 Mobile Telecommunication Systems Medium Access Control (MAC) Address Is A Hardware Address Use To Uniquely Identify Each
Medium Access Control (MAC) address is a hardware address use to uniquely identify each
node of a network. It provides addressing and channel access control mechanisms to enable
the several terminals or network nodes to communicate in a specified network. Medium
Access Control of data communication protocol is also named as Media Access Control. In
IEEE 802 OSI Reference model of computer networking, the Data Link Control (DLC) layer
is subdivided into two sub-layers:
The MAC sublayer acts as a direct interface between the logical link control (LLC) Ethernet
sublayer and the physical layer of reference model. Consequently, each different type of
network medium requires a different MAC layer. On networks that don’t conform they are
part of IEEE 802 standards but they do conform that they participate OSI Reference Model
then the node address is named the Data Link Control (DLC) address. The MAC sublayer
emulates a full-duplex logical communication channel in a multipoint network system. These
communication channels may provide unicast, multicast and/or broadcast communication
services.
One of the most commonly used of MAC sublayer for wired networks i.e. Carrier Sense
Multiple Access with Collision Detection (CSMA/CD). Through MAC schema, a sender
senses the medium (a wire or coaxial cable) before transmission of data to check whether the
medium is free or not. If MAC senses that the medium is busy, the sender waits until it is
free. When medium becomes free, the sender starts transmitting of data and continues to
listen into the medium. If any kind of collision detected by sender while sending data, it stops
at once and sends a jamming signal. But this scheme doest work well with wireless networks.
Some of the problems that occur when it uses to transfer data through wireless networks are
as follow;
A significant difference between wired and wireless LANs is the fact that, in general a fully
connected topology between the WLAN nodes cannot b assumed. This problem gives rise to
‘hidden’ and ‘exposed’ station problems.
Hidden terminals
A sends to B, C cannot hear A
C wants to send to B, C senses a “free” medium (CS fails) and starts transmitting
Collision at B occurs, A cannot detect this collision (CD fails) and continues with its
transmission to B
A is “hidden” from C and vice versa
Exposed terminals
B sends to A, C wants to send to another terminal (not A or B) outside the range
C senses the carrier and detects that the carrier is busy.
C postpones its transmission until it detects the medium as being idle again
but A is outside radio range of C, waiting is not necessary
C is “exposed” to B
Hidden terminals cause collisions, where as Exposed terminals causes unnecessary delay.
(Qp33) How does the near and far effect influence TDMA systems?
What happens in CDMA systems?(5)
Near and far terminals
Consider the situation shown below. A and B are both sending with the same transmission
power.
Signal strength decreases proportional to the square of the distance
So, B’s signal drowns out A’s signal making C unable to receive A’s transmission
If C is an arbiter for sending rights, B drown out A’s signal on the physical layer making
C unable to hear out A.
The near/far effect is a severe problem of wireless networks using CDM. All signals should
arrive at the receiver with more or less the same strength for which Precise power control is
to be implemented.
Spread Spectrum
A collective class of signalling techniques are employed before transmitting a signal to
provide a secure communication, known as the Spread Spectrum Modulation. The main
advantage of spread spectrum communication technique is to prevent “interference” whether
it is intentional or unintentional.
The signals modulated with these techniques are hard to interfere and cannot be jammed. An
intruder with no official access is never allowed to crack them. Hence, these techniques are
used for military purposes. These spread spectrum signals transmit at low power density and
has a wide spread of signals.
Pseudo-Noise Sequence
Both the Narrow band and Spread spectrum signals can be understood easily by observing
their frequency spectrum as shown in the following figures.
Narrow-band Signals
The Narrow-band signals have the signal strength concentrated as shown in the following
frequency spectrum figure.
Following are some of its features −
The spread spectrum signals have the signal strength distributed as shown in the following
frequency spectrum figure.
Input is fed into a channel encoder that produces an analog signal with a relatively
narrow bandwidth.
This signal is further modulated using a sequence of digits known as a spreading code .
The spreading code is generated by a pseudonoise generator.
This increases the bandwidth (spread the spectrum) of the signal to be transmitted.
On the receiving end, the same digit sequence is used to demodulate the spread spectrum
signal.
Finally, the signal is fed into a channel decoder to recover the data.
Spread spectrum multiple access techniques uses signals which have a transmission
bandwidth of a magnitude greater than the minimum required RF bandwidth.
These are of two types.
This is frequency hopping technique, where the users are made to change the frequencies of
usage, from one to another in a specified time interval, hence called as frequency hopping.
For example, a frequency was allotted to sender 1 for a particular period of time. Now, after
a while, sender 1 hops to the other frequency and sender 2 uses the first frequency, which
was previously used by sender 1. This is called as frequency reuse.
The frequencies of the data are hopped from one to another in order to provide a secure
transmission. The amount of time spent on each frequency hop is called as Dwell time.
There are two types of Frequency hopping
In slow-frequency hopping there is one or more symbols per hop while in fast hop there are
several frequency hops per message symbol.Slow hop is more susceptible to jamming than
fast hopping.
The following figure shows the general layout for FHSS. A pseudorandom code generator,
called pseudorandom noise (PN), creates a k-bit pattern for every hopping period Th•
The frequency table uses the pattern to find the frequency to be used for this hopping period
and passes it to the frequency synthesizer. The frequency synthesizer creates a carrier signal
of that frequency, and the source signal modulates the carrier signal.
For Example M is 8 and k is 3. The pseudorandom code generator will create eight different
3-bit patterns. These are mapped to eight different frequencies in the frequency table as
shown in the following figure.
The pattern for this station is 101, 111, 001, 000, 010, all, 100. Note that the pattern is
pseudorandom it is repeated after eight hoppings. This means that at hopping period 1, the
pattern is 101. The frequency selected is 700 kHz, the source signal modulates this carrier
frequency.
The second k-bit pattern selected is 111, which selects the 900-kHz carrier; the eighth pattern
is 100, the frequency is 600 kHz. After eight hoppings, the pattern repeats, starting from 101
again.
If there are many k-bit patterns and the hopping period is short, a sender and receiver can
have privacy. If an intruder tries to intercept the transmitted signal, she can only access a
small piece of data because she does not know the spreading sequence to quickly adapt
herself to the next hop. The scheme has also an anti-jamming effect. A malicious sender may
be able to send noise to jam the signal for one hopping period (randomly), but not for the
whole period.
(QP 36) With an example brief about the direct sequence spread
spectrum(5)
Direct Sequence Spread Spectrum DSSSDSSS
Whenever a user wants to send data using this DSSS technique, each and every bit of the
user data is multiplied by a secret code, called as chipping code. This chipping code is
nothing but the spreading code which is multiplied with the original message and
transmitted. The receiver uses the same code to retrieve the original message.
The direct sequence spread spectrum (nSSS) technique also expands the bandwidth of the
original signal, but the process is different. In DSSS, we replace each data bit with n bits
using a spreading code. In other words, each bit is assigned a code of n bits, called chips,
where the chip rate is n times that of the data bit. The following figure shows the concept of
DSSS.
As an example, let us consider the sequence used in a wireless LAN, the famous Barker
sequence where n is 11. We assume that the original signal and the chips in the chip generator
use polar NRZ encoding. The following figure shows the chips and the result of multiplying
the original data by the chips to get the spread signal.
In the figure, the spreading code is 11 chips having the pattern 10110111000 (in this case). If
the original signal rate is N, the rate of the spread signal is 11N. This means that the required
bandwidth for the spread signal is 11 times larger than the bandwidth of the original signal.
The spread signal can provide privacy if the intruder does not know the code. It can also
provide immunity against interference if each station uses a different code.
Both the spread spectrum techniques are popular for their characteristics. To have a clear
understanding, let us take a look at their comparisons.
FHSS DSSS / CDMA
Hard to find the user’s frequency at any instant of User frequency, once allotted is always the
time same
Sender need not wait Sender has to wait if the spectrum is busy
Power strength of the signal is high Power strength of the signal is low
It is cheaper It is expensive
This is the commonly used technique This technique is not frequently used
Cross-talk elimination
Better output with data integrity
Reduced effect of multipath fading
Better security
Reduction in noise
Co-existence with other systems
Longer operative distances
Hard to detect
Not easy to demodulate/decode
Difficult to jam the signals
Although spread spectrum techniques were originally designed for military uses, they are
now being used widely for commercial purpose.
ACCESS METHODS
Access methods are multiplexing techniques that provide communications services to
multiple users in a single-bandwidth wired or wireless medium. Communications channels,
whether they’re wireless spectrum segments or cable connections, are expensive.
Communications services providers must engage multiple paid users over limited resources
to make a profit. Access methods allow many users to share these limited channels to provide
the economy of scale necessary for a successful communications business. There are five
basic access or multiplexing methods: frequency division multiple access (FDMA), time
division multiple access (TDMA), code division multiple access (CDMA), orthogonal
frequency division multiple access (OFDMA), and spatial division multiple access (SDMA).
Access Method
FDMA
TDMA
CDMA
OFDMA
SDMA
Other Methods
References
(QP 7) How does GSM use both FDMA and TDMA technologies?
State where use FDMA and TDMA(5).
FDMA
FDMA is the process of dividing one channel or bandwidth into multiple individual bands,
each for use by a single user (Fig. 1). Each individual band or channel is wide enough to
accommodate the signal spectra of the transmissions to be propagated. The data to be
transmitted is modulated on to each subcarrier, and all of them are linearly mixed together.
1. FDMA divides the shared medium bandwidth into individual channels. Subcarriers
modulated by the information to be transmitted occupy each subchannel.
The best example of this is the cable television system. The medium is a single coax cable
that is used to broadcast hundreds of channels of video/audio programming to homes. The
coax cable has a useful bandwidth from about 4 MHz to 1 GHz. This bandwidth is divided up
into 6-MHz wide channels. Initially, one TV station or channel used a single 6-MHz band.
But with digital techniques, multiple TV channels may share a single band today thanks to
compression and multiplexing techniques used in each channel.
This technique is also used in fiber optic communications systems. A single fiber optic cable
has enormous bandwidth that can be subdivided to provide FDMA. Different data or
information sources are each assigned a different light frequency for transmission. Light
generally isn’t referred to by frequency but by its wavelength (λ). As a result, fiber optic
FDMA is called wavelength division multiple access (WDMA) or just wavelength division
multiplexing (WDM).
One of the older FDMA systems is the original analog telephone system, which used a
hierarchy of frequency multiplex techniques to put multiple telephone calls on single line.
The analog 300-Hz to 3400-Hz voice signals were used to modulate subcarriers in 12
channels from 60 kHz to 108 kHz. Modulator/mixers created single sideband (SSB) signals,
both upper and lower sidebands. These subcarriers were then further frequency multiplexed
on subcarriers in the 312-kHz to 552-kHz range using the same modulation methods. At the
receiving end of the system, the signals were sorted out and recovered with filters and
demodulators.
TDMA is a digital technique that divides a single channel or band into time slots. Each time
slot is used to transmit one byte or another digital segment of each signal in sequential serial
data format. This technique works well with slow voice data signals, but it’s also useful for
compressed video and other high-speed data.
A good example is the widely used T1 transmission system, which has been used for years in
the telecom industry. T1 lines carry up to 24 individual voice telephone calls on a single
line (Fig. 2). Each voice signal usually covers 300 Hz to 3000 Hz and is digitized at an 8-kHz
rate, which is just a bit more than the minimal Nyquist rate of two times the highest-
frequency component needed to retain all the analog content.
2. This T1 digital telephony frame illustrates TDM and TDMA. Each time slot is allocated to
one user. The high data rate makes the user unaware of the lack of simultaneity.
The digitized voice appears as individual serial bytes that occur at a 64-kHz rate, and 24 of
these bytes are interleaved, producing one T1 frame of data. The frame occurs at a 1.536-
MHz rate (24 by 64 kHz) for a total of 192 bits. A single synchronizing bit is added for
timing purposes for an overall data rate of 1.544 Mbits/s. At the receiving end, the individual
voice bytes are recovered at the 64-kHz rate and passed through a digital-to-analog converter
(DAC) that reproduces the analog voice.
The basic GSM (Global System of Mobile Communications) cellular phone system is
TDMA-based. It divides up the radio spectrum into 200-kHz bands and then uses time
division techniques to put eight voice calls into one channel. Figure 3 shows one frame of a
GSM TDMA signal. The eight time slots can be voice signals or data such as texts or e-mails.
The frame is transmitted at a 270-kbit/s rate using Gaussian minimum shift keying (GMSK),
which is a form of frequency shift keying (FSK) modulation.
3. This GSM digital cellular method shows how up to eight users can share a 200-kHz
channel in different time slots within a frame of 1248 bits.
CDMA
CDMA is another pure digital technique. It is also known as spread spectrum because it takes
the digitized version of an analog signal and spreads it out over a wider bandwidth at a lower
power level. This method is called direct sequence spread spectrum (DSSS) as well (Fig. 4).
The digitized and compressed voice signal in serial data form is spread by processing it in an
XOR circuit along with a chipping signal at a much higher frequency. In the cdma IS-95
standard, a 1.2288-Mbit/s chipping signal spreads the digitized compressed voice at 13
kbits/s.
The third generation (3G) cell-phone technology called wideband CDMA (WCDMA) uses a
similar method with compressed voice and 3.84-Mbit/s chipping codes in a 5-MHz channel to
allow multiple users to share the same band.
OFDMA
OFDMA is the access technique used in Long-Term Evolution (LTE) cellular systems to
accommodate multiple users in a given bandwidth. Orthogonal frequency division
multiplexing (OFDM) is a modulation method that divides a channel into multiple narrow
orthogonal bands that are spaced so they don’t interfere with one another. Each band is
divided into hundreds or even thousands of 15-kHz wide subcarriers.
The data to be transmitted is divided into many lower-speed bit streams and modulated onto
the subcarriers. Time slots within each subchannel data stream are used to package the data to
be transmitted (Fig. 5). This technique is very spectrally efficient, so it provides very high
data rates. It also is less affected by multipath propagation effects.
To implement OFDMA, each user is assigned a group of subchannels and related time slots.
The smallest group of subchannels assigned is 12 and called a resource block (RB). The
system assigns the number of RBs to each user as needed.
SDMA
SDMA uses physical separation methods that permit the sharing of wireless channels. For
instance, a single channel may be used simultaneously if the users are spaced far enough from
one another to avoid interference. Known as frequency reuse, the method is widely used in
cellular radio systems. Cell sites are spaced from one another to minimize interference.
In addition to spacing, directional antennas are used to avoid interference. Most cell sites use
three antennas to create 120° sectors that allow frequency sharing (Fig. 6a). New
technologies like smart antennas or adaptive arrays use dynamic beamforming to shrink
signals into narrow beams that can be focused on specific users, excluding all others (Fig.
6b).
(QP39) Tabulate the comparison between SDMA, TDMA, FDMA,
and CDMA used in wireless networks (10)
What is GSM?
If you are in Europe or Asia and using a mobile phone, then most probably you are using
GSM technology in your mobile phone.
GSM stands for Global System for Mobile Communication. It is a digital cellular
technology used for transmitting mobile voice and data services.
The concept of GSM emerged from a cell-based mobile radio system at Bell
Laboratories in the early 1970s.
GSM is the name of a standardization group established in 1982 to create a common
European mobile telephone standard.
GSM is the most widely accepted standard in telecommunications and it is
implemented globally.
GSM is a circuit-switched system that divides each 200 kHz channel into eight 25
kHz time-slots. GSM operates on the mobile communication bands 900 MHz and
1800 MHz in most parts of the world. In the US, GSM operates in the bands 850
MHz and 1900 MHz.
GSM owns a market share of more than 70 percent of the world's digital cellular
subscribers.
GSM makes use of narrowband Time Division Multiple Access (TDMA) technique
for transmitting signals.
GSM was developed using digital technology. It has an ability to carry 64 kbps to
120 Mbps of data rates.
Presently GSM supports more than one billion mobile subscribers in more than 210
countries throughout the world.
GSM provides basic to advanced voice and data services including roaming service.
Roaming is the ability to use your GSM phone number in another GSM network.
GSM digitizes and compresses data, then sends it down through a channel with two other
streams of user data, each in its own timeslot.
GSM offers much more than just voice telephony. Contact your local GSM network
operator to the specific services that you can avail.
GSM offers three basic types of services:
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These services
are further transited in the following ways:
Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes full-rate speech at
13 kbps and emergency calls, where the nearest emergency-service provider is notified by
dialing three digits.
Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive and send data is
the essential building block leading to widespread mobile Internet access and mobile data
transfer. GSM currently has a data transfer rate of 9.6k. New developments that will push up
data transfer rates for GSM users are HSCSD (high speed circuit switched data) and GPRS
(general packet radio service) are now available.
Supplementary Services
Supplementary services are additional services that are provided in addition to teleservices
and bearer services. These services include caller identification, call forwarding, call
waiting, multi-party conversations, and barring of outgoing (international) calls, among
others. A brief description of supplementary services is given here:
Conferencing : It allows a mobile subscriber to establish a multiparty conversation,
i.e., a simultaneous conversation between three or more subscribers to setup a
conference call. This service is only applicable to normal telephony.
Call Waiting : This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.
Call Hold : This service allows a subscriber to put an incoming call on hold and
resume after a while. The call hold service is applicable to normal telephony.
Call Forwarding : Call Forwarding is used to divert calls from the original recipient
to another number. It is normally set up by the subscriber himself. It can be used by
the subscriber to divert calls from the Mobile Station when the subscriber is not
available, and so to ensure that calls are not lost.
Call Barring : Call Barring is useful to restrict certain types of outgoing calls such as
ISD or stop incoming calls from undesired numbers. Call barring is a flexible service
that enables the subscriber to conditionally bar calls.
Number Identification : There are following supplementary services related to
number identification:
o Calling Line Identification Presentation : This service displays the
telephone number of the calling party on your screen.
o Calling Line Identification Restriction : A person not wishing their number
to be presented to others subscribes to this service.
o Connected Line Identification Presentation : This service is provided to
give the calling party the telephone number of the person to whom they are
connected. This service is useful in situations such as forwarding's where the
number connected is not the number dialled.
o Connected Line Identification Restriction : There are times when the
person called does not wish to have their number presented and so they
would subscribe to this person. Normally, this overrides the presentation
service.
o Malicious Call Identification : The malicious call identification service was
provided to combat the spread of obscene or annoying calls. The victim
should subscribe to this service, and then they could cause known malicious
calls to be identified in the GSM network, using a simple command.
Advice of Charge (AoC) : This service was designed to give the subscriber an
indication of the cost of the services as they are used. Furthermore, those service
providers who wish to offer rental services to subscribers without their own SIM can
also utilize this service in a slightly different form. AoC for data calls is provided on
the basis of time measurements.
Closed User Groups (CUGs) : This service is meant for groups of subscribers who
wish to call only each other and no one else.
Unstructured supplementary services data (USSD) : This allows operator-defined
individual services.
The GSM architecture consists of three major interconnected subsystems that interact with
themselves and with users through certain network interface. The subsystems are Base
Station Subsystem (BSS), Network Switching Subsystem (NSS) and Operational Support
Subsystem (OSS). Mobile Station (MS) is also a subsystem but it is considered as a part of
BSS.
1. Mobile Station (MS): Mobile Station is made up of two entities.
A. Mobile equipment (ME):
It is a smart card that contains the International Mobile Subscriber Identity (IMSI)
number.
It allows users to send and receive calls and receive other subscriber services. - It is
protected by password or PIN.
It contains encoded network identification details. it has key information to activate
the phone.
It can be moved from one mobile to another.
2. Base Station Subsystem (BSS): It is also known as radio subsystem, provides and
manages radio transmission paths between the mobile station and the Mobile Switching
Centre (MSC). BSS also manages interface between the mobile station and all other
subsystems of GSM. It consists of two parts.
A. Base Transceiver Station (BTS):
It encodes, encrypts, multiplexes, modulates and feeds the RF signal to the antenna.
It consists of transceiver units.
It communicates with mobile stations via radio air interface and also communicates
with BSC via Abis interface.
It manages radio resources for BTS. It assigns frequency and time slots for all mobile
stations in its area.
It handles call set up, transcoding and adaptation functionality handover for each MS
radio power control.
It communicates with MSC via A interface and also with BTS.
3. Network Switching Subsystem (NSS): it manages the switching functions of the system
and allows MSCs to communicate with other networks such as PSTN and ISDN. It consist of
A. Mobile switching Centre:
MS Protocols
Based on the interface, the GSM signaling protocol is assembled into three general layers:
Layer 1 : The physical layer. It uses the channel structures over the air interface.
Layer 2 : The data-link layer. Across the Um interface, the data-link layer is a
modified version of the Link access protocol for the D channel (LAP-D) protocol
used in ISDN, called Link access protocol on the Dm channel (LAP-Dm). Across the
A interface, the Message Transfer Part (MTP), Layer 2 of SS7 is used.
Layer 3 : GSM signalling protocol’s third layer is divided into three sublayers:
o Radio Resource Management (RR),
o Mobility Management (MM), and
o Connection Management (CM).
MS to BTS Protocols
The RR layer is the lower layer that manages a link, both radio and fixed, between the MS
and the MSC. For this formation, the main components involved are the MS, BSS, and
MSC. The responsibility of the RR layer is to manage the RR-session, the time when a
mobile is in a dedicated mode, and the radio channels including the allocation of dedicated
channels.
The MM layer is stacked above the RR layer. It handles the functions that arise from the
mobility of the subscriber, as well as the authentication and security aspects. Location
management is concerned with the procedures that enable the system to know the current
location of a powered-on MS so that incoming call routing can be completed.
The CM layer is the topmost layer of the GSM protocol stack. This layer is responsible for
Call Control, Supplementary Service Management, and Short Message Service
Management. Each of these services are treated as individual layer within the CM layer.
Other functions of the CC sublayer include call establishment, selection of the type of
service (including alternating between services during a call), and call release.
BSC Protocols
The BSC uses a different set of protocols after receiving the data from the BTS. The Abis
interface is used between the BTS and BSC. At this level, the radio resources at the lower
portion of Layer 3 are changed from the RR to the Base Transceiver Station Management
(BTSM). The BTS management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels
between the MS and the BTS. These services include controlling the initial access to the
system, paging for MT calls, the handover of calls between cell sites, power control, and call
termination. The BSC still has some radio resource management in place for the frequency
coordination, frequency allocation, and the management of the overall network layer for the
Layer 2 interfaces.
To transit from the BSC to the MSC, the BSS mobile application part or the direct
application part is used, and SS7 protocols is applied by the relay, so that the MTP 1-3 can
be used as the prime architecture.
MSC Protocols
(QP19) What are HLR and VLR? Describe its functions in call
routing and roaming.(5)
At the MSC, starting from the BSC, the information is mapped across the A interface to the
MTP Layers 1 through 3. Here, Base Station System Management Application Part (BSS
MAP) is said to be the equivalent set of radio resources. The relay process is finished by the
layers that are stacked on top of Layer 3 protocols, they are BSS MAP/DTAP, MM, and
CM. This completes the relay process. To find and connect to the users across the network,
MSCs interact using the control-signalling network. Location registers are included in the
MSC databases to assist in the role of determining how and whether connections are to be
made to roaming users.
Each GSM MS user is given a HLR that in turn comprises of the user’s location and
subscribed services. VLR is a separate register that is used to track the location of a user.
When the users move out of the HLR covered area, the VLR is notified by the MS to find
the location of the user. The VLR in turn, with the help of the control network, signals the
HLR of the MS’s new location. With the help of location information contained in the user’s
HLR, the MT calls can be routed to the user.
MSISDN (Mobile Station International ISDN Number)16. The only important number for the
user of GSM is the phone number, due to the fact that the phone number is only associated
with the SIM, rather than a certain MS. The MSISDN follows the E.164, this standard is also
used in fixed ISDN networks.
IMSI (International Mobile Subscriber Identity). GSM uses the IMSI for internal unique
identification of a subscriber.
TMSI (Temporary Mobile Subscriber Identity). To disguise the IMSI that would give the
exact identity of the user which is signaling over the radio air interface, GSM uses the 4 byte
TMSI for local subscriber identification. The TMSI is selected by the VLR and only has
temporary validity within the location area of the VLR. In addition to that the VLR will
change the TMSI periodically.
MSRN (Mobile Station [Subscriber] Roaming Number)17. This is another temporary address
that disguises the identity and location of the subscriber. The VLR generates this address
upon request from the MSC and the address is also stored in the HLR. The MSRN is
comprised of the current VCC (Visitor Country Code), the VNDC (Visitor National
Destination Code) and the identification of the current MSC together with the subscriber
number, hence the MSRN is essential to help the HLR to find a subscriber for an incoming
call.
For a mobile terminated call (MTC), the following figure shows the different steps that take
place:
Mobile Terminated Call (MTC)
step 1: User dials the phone number of a GSM subscriber.
step 2: The fixed network (PSTN) identifies the number belongs to a user in GSM network
and forwards the call setup to the Gateway MSC (GMSC).
step 3: The GMSC identifies the HLR for the subscriber and signals the call setup to HLR
step 4: The HLR checks for number existence and its subscribed services and requests an
MSRN from the current VLR.
step 5: VLR sends the MSRN to HLR
step 6: Upon receiving MSRN, the HLR determines the MSC responsible for MS and
forwards
the information to the GMSC
step 7: The GMSC can now forward the call setup request to the MSC indicated
step 8: The MSC requests the VLR for the current status of the MS
step 9: VLR sends the requested information
step 10: If MS is available, the MSC initiates paging in all cells it is responsible for.
step 11: The BTSs of all BSSs transmit the paging signal to the MS
step 12: Step 13: If MS answers, VLR performs security checks
step 15: Till step 17: Then the VLR signals to the MSC to setup a connection to the MS
(QP14) Show how an IP packet reaches a mobile node using a
sequence diagram of call origination process?(10)
Message flow for MTC and MOC
Cellular systems require handover procedures, as single cells do not cover the whole service
area. However, a handover should not cause a cut-off, also called call drop. GSM aims at
maximum handover duration of 60 ms. There are two basic reasons for a handover:
1. The mobile station moves out of the range of a BTS, decreasing the received signal
level increasing the error rate thereby diminishing the quality of the radio link.
2. Handover may be due to load balancing, when an MSC/BSC decides the traffic is too
high in one cell and shifts some MS to other cells with a lower load.
Within the GSM system there are four types of handover that can be performed for GSM only
systems:
Intra-BTS handover: This form of GSM handover occurs if it is required to change
the frequency or slot being used by a mobile because of interference, or other reasons. In
this form of GSM handover, the mobile remains attached to the same base station
transceiver, but changes the channel or slot.
Inter-BTS Intra BSC handover: This for of GSM handover or GSM handoff occurs
when the mobile moves out of the coverage area of one BTS but into another controlled
by the same BSC. In this instance the BSC is able to perform the handover and it assigns a
new channel and slot to the mobile, before releasing the old BTS from communicating
with the mobile.
Inter-BSC handover: When the mobile moves out of the range of cells controlled by
one BSC, a more involved form of handover has to be performed, handing over not only
from one BTS to another but one BSC to another. For this the handover is controlled by
the MSC.
Inter-MSC handover: This form of handover occurs when changing between
networks. The two MSCs involved negotiate to control the handover.
(QP) Discuss the process of subscriber authentication used in GSM to ensure security(5)
The GSM network authenticates the identity of the subscriber through the use of a
challenge-response mechanism. A 128-bit Random Number (RAND) is sent to the MS. The
MS computes the 32-bit Signed Response (SRES) based on the encryption of the RAND
with the authentication algorithm (A3) using the individual subscriber authentication key
(Ki). Upon receiving the SRES from the subscriber, the GSM network repeats the
calculation to verify the identity of the subscriber.
The individual subscriber authentication key (Ki) is never transmitted over the radio
channel, as it is present in the subscriber's SIM, as well as the AUC, HLR, and VLR
databases. If the received SRES agrees with the calculated value, the MS has been
successfully authenticated and may continue. If the values do not match, the connection is
terminated and an authentication failure is indicated to the MS.
The calculation of the signed response is processed within the SIM. It provides enhanced
security, as confidential subscriber information such as the IMSI or the individual subscriber
authentication key (Ki) is never released from the SIM during the authentication process.
The SIM contains the ciphering key generating algorithm (A8) that is used to produce the
64-bit ciphering key (Kc). This key is computed by applying the same random number
(RAND) used in the authentication process to ciphering key generating algorithm (A8) with
the individual subscriber authentication key (Ki).
GSM provides an additional level of security by having a way to change the ciphering key,
making the system more resistant to eavesdropping. The ciphering key may be changed at
regular intervals as required. As in case of the authentication process, the computation of the
ciphering key (Kc) takes place internally within the SIM. Therefore, sensitive information
such as the individual subscriber authentication key (Ki) is never revealed by the SIM.
Encrypted voice and data communications between the MS and the network is accomplished
by using the ciphering algorithm A5. Encrypted communication is initiated by a ciphering
mode request command from the GSM network. Upon receipt of this command, the mobile
station begins encryption and decryption of data using the ciphering algorithm (A5) and the
ciphering key (Kc).
Subscriber Identity Confidentiality
HSCSD operates across a GSM network, and therefore no extra hardware is required by a
mobile communications operator to offer the service, just a network software upgrade. In a
GSM network single slots are allocated to each user, which has a standard data transfer rate
of 9.6Kbps, although some networks are now being upgraded to 14.4Kbps, an increase of
50%. In HSCSD, users are allocated multiple slots so that the transmission speed can be
drastically increased, with some service providers offering rates of up to 57.6Kbps. This
enables internet access at the same speed of many dial-up modem services across fixed line
networks.
High Speed Circuit Switched Data (HSCSD) is an enhancement in the data rate of circuit
switched data in a GSM network. HSCSD uses two techniques to increase the data rate. First,
HSCSD makes it possible to use more than one time slot. GSM uses time division multiple
access (TDMA). Each radio channel is divided in eight time slots. Each time slot is allocated
to a different user. This makes it possible to serve eight customers on one radio channel.
HSCSD makes it possible to allocate more than one time slot to a user.
The second technique used by HSCSD is that the error correction can be adapted to the
quality of the radio channel. A standard slot can carry 9.6 kbps. HSCSD makes it possible to
increase this to 14.4 kbps. the quality of the rado channel must be good enough to do so.
The maximum data rate of a HSCSD configuration with 14.4-kbps channel coding is 115.2
kbps, if all eight time slots are allocated to the same user. In practice, is the number of time
slots allocated to a user limited to three, limiting the data rate to 43.2 kbps. Another point is
that the core network is based on circuit switched data with data channels of 64 kbps.
The main benefit of HSCSD compared to other data enhancements introduced later is that it
is an inexpensive way to implement higher data rates in GSM networks. There
modifications to be made are relatively small. Users need to have a new terminal that
supports HSCSD.
GPRS
General Packet Radio System is also known as GPRS is a third-generation step toward
internet access. GPRS is also known as GSM-IP that is a Global-System Mobile
Communications Internet Protocol as it keeps the users of this system online, allows to make
voice calls, and access internet on-the-go. Even Time-Division Multiple Access (TDMA)
users benefit from this system as it provides packet radio access.
GPRS also permits the network operators to execute an Internet Protocol (IP) based core
architecture for integrated voice and data applications that will continue to be used and
expanded for 3G services.
GPRS supersedes the wired connections, as this system has simplified access to the packet
data networks like the internet. The packet radio principle is employed by GPRS to transport
user data packets in a structure way between GSM mobile stations and external packet data
networks. These packets can be directly routed to the packet switched networks from the
GPRS mobile stations.
In the current versions of GPRS, networks based on the Internet Protocol (IP) like the global
internet or private/corporate intranets and X.25 networks are supported.
Key Features
Goals of GPRS
GPRS is the first step toward an end-to-end wireless infrastructure and has the following
goals:
Open architecture
Consistent IP services
Same infrastructure for different air interfaces
Integrated telephony and Internet infrastructure
Leverage industry investment in IP
Service innovation independent of infrastructure
Benefits of GPRS
GPRS benefits the users in many ways, one of which is higher data rates in turn of shorter
access times. In the typical GSM mobile, setup alone is a lengthy process and equally, rates
for data permission are restrained to 9.6 kbit/s. The session establishment time offered while
GPRS is in practice is lower than one second and ISDN-line data rates are up to many 10
kbit/s.
Easy Billing
GPRS packet transmission offers a more user-friendly billing than that offered by circuit
switched services. In circuit switched services, billing is based on the duration of the
connection. This is unsuitable for applications with bursty traffic. The user must pay for the
entire airtime, even for idle periods when no packets are sent (e.g., when the user reads a
Web page).
In contrast to this, with packet switched services, billing can be based on the amount of
transmitted data. The advantage for the user is that he or she can be "online" over a long
period of time but will be billed based on the transmitted data volume.
GPRS has opened a wide range of unique services to the mobile wireless subscriber. Some
of the characteristics that have opened a market full of enhanced value services to the users.
Below are some of the characteristics:
Mobility - The ability to maintain constant voice and data communications while on
the move.
Immediacy - Allows subscribers to obtain connectivity when needed, regardless of
location and without a lengthy login session.
Localization - Allows subscribers to obtain information relevant to their current
location.
Using the above three characteristics varied possible applications are being developed to
offer to the mobile subscribers. These applications, in general, can be divided into two high-
level categories:
Corporation
Consumer
These two levels further include:
Communications - E-mail, fax, unified messaging and intranet/internet access, etc.
Value-added services - Information services and games, etc.
E-commerce - Retail, ticket purchasing, banking and financial trading, etc.
Location-based applications - Navigation, traffic conditions, airline/rail schedules
and location finder, etc.
Vertical applications - Freight delivery, fleet management and sales-force
automation.
Advertising - Advertising may be location sensitive. For example, a user entering a
mall can receive advertisements specific to the stores in that mall.
Along with the above applications, non-voice services like SMS, MMS and voice calls are
also possible with GPRS. Closed User Group (CUG) is a common term used after GPRS is
in the market, in addition, it is planned to implement supplementary services, such as Call
Forwarding Unconditional (CFU), and Call Forwarding on Mobile subscriber Not Reachable
(CFNRc), and closed user group (CUG).
GPRS attempts to reuse the existing GSM network elements as much as possible, but to
effectively build a packet-based mobile cellular network, some new network elements,
interfaces, and protocols for handling packet traffic are required.
Mobile Station (MS) New Mobile Station is required to access GPRS services. These
new terminals will be backward compatible with GSM for voice
calls.
BSC The Base Station Controller (BSC) requires a software upgrade and
the installation of new hardware called the packet control unit
(PCU). The PCU directs the data traffic to the GPRS network and
can be a separate hardware element associated with the BSC.
GPRS Support Nodes (GSNs) The deployment of GPRS requires the installation of new core
network elements called the serving GPRS support node (SGSN)
and gateway GPRS support node (GGSN).
Databases (HLR, VLR, etc.) All the databases involved in the network will require software
upgrades to handle the new call models and functions introduced by
GPRS.
New Mobile Stations (MS) are required to use GPRS services because existing GSM phones
do not handle the enhanced air interface or packet data. A variety of MS can exist, including
a high-speed version of current phones to support high-speed data access, a new PDA device
with an embedded GSM phone, and PC cards for laptop computers. These mobile stations
are backward compatible for making voice calls using GSM.
Each BSC requires the installation of one or more Packet Control Units (PCUs) and a
software upgrade. The PCU provides a physical and logical data interface to the Base
Station Subsystem (BSS) for packet data traffic. The BTS can also require a software
upgrade but typically does not require hardware enhancements.
When either voice or data traffic is originated at the subscriber mobile, it is transported over
the air interface to the BTS, and from the BTS to the BSC in the same way as a standard
GSM call. However, at the output of the BSC, the traffic is separated; voice is sent to the
Mobile Switching Center (MSC) per standard GSM, and data is sent to a new device called
the SGSN via the PCU over a Frame Relay interface.
Following two new components, called Gateway GPRS Support Nodes (GSNs) and, Serving
GPRS Support Node (SGSN) are added:
Gateway GPRS Support Node (GGSN)
The Gateway GPRS Support Node acts as an interface and a router to external networks. It
contains routing information for GPRS mobiles, which is used to tunnel packets through the
IP based internal backbone to the correct Serving GPRS Support Node. The GGSN also
collects charging information connected to the use of the external data networks and can act
as a packet filter for incoming traffic.
The Serving GPRS Support Node is responsible for authentication of GPRS mobiles,
registration of mobiles in the network, mobility management, and collecting information on
charging for the use of the air interface.
Internal Backbone
The internal backbone is an IP based network used to carry packets between different GSNs.
Tunnelling is used between SGSNs and GGSNs, so the internal backbone does not need any
information about domains outside the GPRS network. Signalling from a GSN to a MSC,
HLR or EIR is done using SS7.
Routing Area
GPRS introduces the concept of a Routing Area. This concept is similar to Location Area in
GSM, except that it generally contains fewer cells. Because routing areas are smaller than
location areas, less radio resources are used While broadcasting a page message.
The flow of GPRS protocol stack and end-to-end message from MS to the GGSN is
displayed in the below diagram. GTP is the protocol used between the SGSN and GGSN
using the Gn interface. This is a Layer 3 tunneling protocol.
The process that takes place in the application looks like a normal IP sub-network for the
users both inside and outside the network. The vital thing that needs attention is, the
application communicates via standard IP, that is carried through the GPRS network and out
through the gateway GPRS. The packets that are mobile between the GGSN and the SGSN
use the GPRS tunneling protocol, this way the IP addresses located on the external side of
the GPRS network do not have deal with the internal backbone. UDP and IP are run by
GTP.
SubNetwork Dependent Convergence Protocol (SNDCP) and Logical Link Control (LLC)
combination used in between the SGSN and the MS. The SNDCP flattens data to reduce the
load on the radio channel. A safe logical link by encrypting packets is provided by LLC and
the same LLC link is used as long as a mobile is under a single SGSN.
In case, the mobile moves to a new routing area that lies under a different SGSN; then, the
old LLC link is removed and a new link is established with the new Serving GSN X.25.
Services are provided by running X.25 on top of TCP/IP in the internal backbone.
Distance coverage for DECT based system is between about 30-100 meters. It operates at
about 1.88GHz to 1.9GHz Radio frequency carrier band, providing a bandwidth of about
20MHz. The access technology for resource allocation here is TDD/TDMA/FDMA. For
know more on TDD,TDMA and FDMA refer following links. Data transmission rate of about
1.152 Mbps is achieved.
Specification or
Feature DECT system support
RF Carrier frequency 1.88 to 1.9GHz
Access TDD/TDMA/FDMA
No. of carriers 10
Sync field is used by receiver to synchronize with the start of the frame. A field carries
control or management signals. B field carries user data/information. The figure-1 depicts the
DECT frame structure as explained.
DECT ULE is the latest standard upgradation of legacy DECT standard described above. It
supports many additional features which were not available/supported by DECT standard. It
supports low power consumption and delivers long range compare to DECT. It supports
moderate data rate and lower latency based applications.
The 3G UMTS core network architecture is a migration of that used for GSM with further
elements overlaid to enable the additional functionality demanded by UMTS.
In view of the different ways in which data may be carried, the UMTS core network may be
split into two different areas:
Circuit switched elements: These elements are primarily based on the GSM network
entities and carry data in a circuit switched manner, i.e. a permanent channel for the
duration of the call.
Packet switched elements: These network entities are designed to carry packet data.
This enables much higher network usage as the capacity can be shared and data is carried
as packets which are routed according to their destination.
Some network elements, particularly those that are associated with registration are shared by
both domains and operate in the same way that they did with GSM.
Cellular generation
A. First Generation, 1G
These phones were the first mobile phones to be used, which was introduced in 1982
and completed in early 1990.
It was used for voice services and was based on technology called as Advanced
Mobile Phone System (AMPS).
The AMPS system was frequency modulated and used frequency division multiple
access (FDMA) with a channel capacity of 30 KHz and frequency band of 824-
894MHz.
Its basic features are:
Speed-2.4 kbps
Allows voice calls in 1 country
Use analog signal.
Poor voice quality
Poor battery life
Large phone size
Limited capacity
Poor handoff reliability
Poor security
Offered very low level of spectrum efficiency It introduces mobile technologies
such as Mobile Telephone System (MTS), Advanced Mobile Telephone System
(AMTS), Improved Mobile Telephone Service (IMTS), and Push to Talk (PTT).
It has low capacity, unreliable handoff, poor voice links, and no security at all since
voice calls were played back in radio towers, making these calls susceptible to
unwanted eavesdropping by third parties
B. Second Generation (2G)
2G refers to the second generation based on GSM and was emerged in late 1980s.
It uses digital signals for voice transmission.
Main focus of this technology was on digital signals and provides services to deliver
text and picture message at low speed (in kbps).
It use the bandwidth of 30 to 200 KHz.
Next to 2G, 2.5G system uses packet switched and circuit switched domain and
provide data rate up to 144 kbps. e.g. GPRS, CDMA and EDGE. [5].
The main features of 2G and 2.5G are : Second generation, 2G:
Data speed was upto 64kbps
Use digital signals
Enables services such as text messages, picture messages and MMS(Multimedia
message) Provides better quality and capacity
Unable to handle complex data such as videos.
Required strong digital signals to help mobile phones work. If there is no network
coverage in any specific area, digital signals would weak. 2.5 G : The GSM
technology was continuously improved to provide better services which led to
development of advanced Technology between 2g and 3g
Provides phone calls
Send/receive e-mail messages
Web browsing
Speed : 64-144 kbps
Camera phones
Take a time of 6-9 mins. to download a 3 mins. MP3 song.
Third Generation (3G) 3G is based on GSM and was launched in 2000. The aim of this
technology was to offer high speed data. The original technology was improved to allow data
up to 14 Mbps and more using packet switching. It uses Wide Band Wireless Network with
which clarity is increased. It also offers data services, access to television/video, new services
like Global Roaming. It operates at a range of 2100MHz and has a bandwidth of 15-20MHz
used for High-speed internet service, video chatting. [5].
Speed 2 Mbps
Typically called smart phones
Increased bandwidth and data transfer rates to accommodate web-based applications and
audio and video files.
Provides faster communication
Send/receive large email messages
High speed web/more security/video conferencing/3D gaming
Large capacities and broadband capabilities
TV streaming/mobile TV/Phone calls
To download a 3 minute MP3 song only 11 sec-1.5 mins time required.
Expensive fees for 3G licenses services
It was challenge to build the infrastructure for 3G
High bandwidth requirement
Expensive 3G phones
Large cell phones 3G mobile system was called as UMTS(Universal Mobile
Telecommunication System) in Europe, while CDMA2000 is the name of American 3G
variant.
Also the IMT2000 has accepted a new 3G standard from China, i.e TD-SCDMA. WCDMA
is the air-interface technology for UMTS.
Fourth Generation (4G) 4G offers a downloading speed of 100Mbps. 4G provides same
feature as 3G and additional services like Multi-Media Newspapers, to watch T.V programs
with more clarity and send Data much faster than previous generations [3]. LTE (Long Term
Evolution) is considered as 4G technology. 4G is being developed to accommodate the QoS
and rate requirements set by forthcoming applications like wireless broadband access,
Multimedia Messaging Service (MMS), video chat, mobile TV, HDTV content, Digital
Video Broadcasting (DVB), minimal services like voice and data, and other services that
utilize bandwidth. [2]. The main features of 4G are : Capable of provide 10Mbps-1Gbps
speed High quality streaming video Combination of Wi-Fi and Wi-Max High security
Provide any kind of service at any time as per user requirements anywhere Expanded
multimedia services Low cost per-bit Battery uses is more Hard to implement Need
complicated hardware Expensive equipment required to implement next generation network