Global System For Mobile Communication (GSM)
Global System For Mobile Communication (GSM)
Global System For Mobile Communication (GSM)
1
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
2
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
GSM characteristics
Previous standard in cellular communication were
restrictive
GSM – global digital standard for cellular phones that
offered roaming facility
First named Groupe Special Mobile and used in
Europe; then usage extended to other continents
GSM operate in frequency bands: 900MHz, 1800 MHz,
1900 MHz
GSM provides voice and data services
3
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
4
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
5
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
MS
BTS
BTS MS
BSC
BTS MS
BTS MS
BTS
MSC BSC
BTS
BTS
BSC BTS
BTS
7
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
8
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
9
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
10
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
11
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
12
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
13
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
14
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
15
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Interfaces in GSM
RF , uses TDMA
UM Transmit & receive info/ traffic
MS Air
Transmit traffic/ info between BSC &BTS
Call handling
A
LAP(link Access Protocol) Mobility Mgt
MSC
2mbps
16
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Mobile Station
The mobile station (MS) consists of the physical equipment, such as the
radio transceiver.
A smart card is called Subscriber Identity Module (SIM).
The SIM provides personal mobility, so that the user can have access
to all subscribed services irrespective of both the location of the
terminal and the use of a specific terminal.
By inserting the SIM card into another GSM cellular phone, the user is
able to receive calls at that phone, make calls from that phone, or
receive other subscribed services.
17
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Mobile Station
The mobile equipment is uniquely identified by the International Mobile
Equipment Identity (IMEI).
The SIM card contains the International Mobile Subscriber Identity
(IMSI), identifying the subscriber, a secret key for authentication, and
other user information.
The IMEI and the IMSI are independent, thereby providing personal
mobility. The SIM card may be protected against unauthorized use by
a password or personal identity number.
18
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Base Station Subsystem
BSC
BSS
19
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Base Station Subsystem
Network Substation
21
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Network Substation
These services are provided in conjunction with several
functional entities, which together form the Network Subsystem.
22
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
23
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
24
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
25
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
27
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
28
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
29
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
30
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Broadcast Channel
Type of control channel used for the initial synchronization
between the cell phone and the BTS
is composed from:
Frequency Correction Channel (FCCH) – is composed from a
sequence of 148 zeros transmitted by the BTS
Synchronization Channel (SCH) – follows the FCCH and contains
BTS identification and location information
Broadcast Control Channel (BCCH) – contains the frequency
allocation information used by cell phones to adjust their
frequency to that of the network; is continuously broadcasted by
the BTS
31
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Making a call
33
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Initializing a call
1. When the cell phone is turned on it scans all the available frequencies for
the control channel
2. All the BTS in the area transmit the FCCH, SCH and BCCH that contain the
BTS identification and location
3. Out of available frequencies from the neighboring BTSs, the cell phone
chooses the strongest signal
4. Based on the FCCH of the strongest signal, the cell phone tunes itself to the
frequency of the network
5. The phone send a registration request to the BTS
6. The BTS sends this registration request to the MSC via the BSC
7. The MSC queries the AUC and EIR databases and based on the reply it
authenticates the cell phone
8. The MSC also queries the HLR and VLR databases to check whether the cell
is in its home area or outside
9. If the cell phone is in its home area the MSC gets all the necessary
information from the HLR if it is not in its home area, the VLR gets the
information from the corresponding HLR via MSCs
10. Then the cell phone is ready to receive or make calls. 34
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Making a call
1. when the phone needs to make a call it sends an access request
(containing phone identification, number) using REACH to the BTS;
if another cell phone tries to send an access request at the same
time the messages might get corrupted, in this case both cell
phones wait a random time interval before trying to send again
2. Then the BTS authenticates the cell phone and sends an
acknowledgement to the cell phone
3. The BTS assigns a specific voice channel and time slot to the cell
phone and transmits the cell phone request to the MSC via BSC
4. The MSC queries HLR and VLR and based on the information
obtained it routes the call to the receiver’s BSC and BTS
5. The cell phone uses the voice channel and time slot assigned to it by
the BTS to communicate with the receiver
35
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Receiving a call
1. when a request to deliver a call is made in the network, the MSC or
the receiver’s home area queries the HLR; if the cell phone is
located in its home area the call is transferred to the receiver; if the
cell phone is located outside its home area, the HLR maintains a
record of the VLR attached to the cell phone
2. based on this record, the MSC notes the location of the VLR and
indicated the corresponding BSC about the incoming call
3. the BSC routes the call to the particular BTS which uses the paging
channel to alert the phone
4. the receiver cell phone monitors the paging channel periodically and
once it receives the call alert from the BTS it responds to the BTS
5. the BTS communicates a channel and a time slot for the cell phone
to communicate
6. now the call is established
36
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
37
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
38
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
39
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Transmitted
Power
Time
40
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
41
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
42
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
43
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
45
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
BSC Protocols
After the information is passed from the BTS to the BSC, a different set of
interfaces is used. The Abis interface is used between the BTS and BSC.
At this level, the radio resources at the lower portion of Layer 3 are
changed from the RR to the Base Transceiver Station Management
(BTSM). The BTS management layer is a relay function at the BTS to the
BSC.
The BSC still has some radio resource management in place
for the frequency coordination, frequency allocation, and the
management of the overall network layer for the Layer 2
interfaces.
46
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
MSC Protocols
At the MSC, the information is mapped across the A
interface to the MTP Layers 1 through 3 from the BSC.
Here, the equivalent set of radio resources is called the
BSS MAP. The BSS MAP/DTAP and the MM and CM are at
the upper layers of Layer 3 protocols.
Each user of a GSM MS is assigned a HLR that is used to
contain the user's location and subscribed services. A
separate register, the VLR, is used to track the location of a
user. As the users roam out of the area covered by the
HLR, the MS notifies a new VLR of its whereabouts.
47
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
48
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
49
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
operators’ networks
50
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Network Signals
Network access control
a process used by a network provider to determine whether a
user
51
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
itself
an IP terminal’s IP address
identifies an attachment point to an IP network
52
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
technology
each radio interface may need to have its own IP address
53
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
terminal’s addresses
e.g., IETF has defined Network Access Identifier
54
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
55
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Impact of Naming and Addressing
on Mobility Management(cont..)
Terminal-independent user names have become increasingly
common in mobile networks, example,
GSM
56
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Impact of Naming and Addressing
on Mobility Management(cont..)
Today’s IP Networks, applications provide their own naming
schemes for users, example
e-mail users are identified by their e-mail addresses
57
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Location Management
Location update strategies
Location discovery (paging)
Interactions between location update and
paging
58
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
59
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Location Update
Strategies(cont..)
when mobiles change their network attachment points frequently,
maintaining precise locations of all mobiles could lead to heavy
location update traffic, which wastes limited radio bandwidth
to save scarce resources on the mobile and in the wireless network,
a network can group network attachment points into location areas
only keeps track of which location area each mobile is likely in
when the user and the network have no traffic to send to each other
the network tries to determine a mobile’s precise location only
60
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Location Update
Time-based update
update periodically at a constant interval (called update
interval)
Movement-based update
update whenever it traverses a predefined number of
61
AMITY INSTITUTE OF ENGINEERING AND TECHNOLOGY
Distance-based update
Distance-based update
update whenever it has traveled a predefined distance
62