Imp Questions For Second Internal

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

INTERNAL-2: QUESTIONS AND ANSWERS

1. Explain the generation of CDMA paging channel

Paging Channels used to page the SDs when there is a mobile-terminated call and to send
control messages to the SDs when call setup is taking place. Figure 3.14 shows the generation of
a Paging control channel message.
Walsh codes are used for this purpose. The Paging channel undergoes an additional scrambling
operation using the long PN spreading code sequence. The long PN code is generated by a 42-
bit linear feedback shift register that gives a sequence of length. This message also goes through
a convolutional encoding process symbol repetition and block interleaving before being
scrambled by a slower version of the long PN code.
2. With the help of block diagram explain the different interfaces used in GSM
The network structure is defined within the GSM standards. Additionally each interface between
the different elements of the GSM network is also defined. This facilitates the information
interchanges can take place. It also enables to a large degree that network elements from
different manufacturers can be used. However as many of these interfaces were not fully defined
until after many networks had been deployed, the level of standardization may not be quite as
high as many people might like. Figure 2.5 shows the GSM network interfaces and GSM
Signalling model is depicted in figure 2.6. The network structure is defined within the GSM
standards. Additionally each interface between the different elements of the GSM network is
also defined. This facilitates the information interchanges can take place. It also enables to a
large degree that network elements from different manufacturers can be used. Um interface :
The "air" or radio interface standard that is used for exchanges between a mobile (ME) and a
base station (BTS / BSC).
3. Explain with neat flow diagram the authentication and ciphering mode operation in a GSM
call setup operation

GSM Authentication Operations 128 bit Random Number (RAND) CKSN: Ciphering Key
Sequence Number SRES: Signed Responses Data request and indication is are used to pass
Layer 3 message A timer is set in MSC/VLR. If timer expires a second time, radio resources are
released.
IF authentication unsuccessful, the GSM initiates a Procedure to identity the MS. MS is barred or
sent Message that :IMSI is in unknown VLR or PLMN not allowed.
It is up to the network operator to use network or not.not allowed to use network Grey listed
allowed to use network Black listed  Equipment Identity Register Three modes White listed 
stored in VLR IMEI Check EIR stored in MS IMSIFig: GSM Ciphering Mode setting
operations BSSMAP: contains the value of Kc (key) CKSN: Ciphering Key Sequence Number
CKSN

4. Explain the CDMA basic spectrum spreading operation with necessary sketches
Ans:Cellular telephone networks use various control and traffic channels to carry out the
operations to setup subscriber radio link for the transmission of data or voice conversation and
subscriber’s mobility. The cdmaOne and cdma2000 cellular systems are based on Code Division
Multiple Access (CDMA) technology. This is attained using a spread spectrum encoding
technique. For this Walsh spreading codes are used for channel encoding. Walsh code consists
of a binary combination of sixty-four 0s and 1s and all these are orthogonal to one another. This
creates 64 distinct communication channels that can all exist in the same frequency spectrum. All
other Walsh encoded signals will appear as broadband noise to the CDMA receiver except for
the unique signal that was created with the same Walsh code as the one the receiver uses for
demodulation.
Two types of Pseudorandom Noise (PN) codes are used by the system, short and long PN
codes Spreading code increases the number of bits sent in the same time interval as the original
digital signal, so increases the overall signal bandwidth. Figure 3.10 shows the basic principle
of an 8-bit Walsh orthogonal spreading code to create distinct signal.
5. Explain CDMA mobile station initialization and call processing states
Initialization/Registration CDMA system registration procedures are dependent upon the status
of the mobile station. The mobile may be in a detached condition (powered off or out of the
system range) or in an attached condition. When first turned on, the mobile goes through a
power-up state, during which it selects a CDMA system and then acquires the pilot and sync
channels which allows it to synchronize its timing to the CDMA system.
figure 3.22 shows the mobile station initialization. When attached, the mobile may be in one of
the three states as shown in Figure 3.23. The three states are:
Mobile station idle state
The system access state
Mobile station control on the traffic channel state
In the Idle state, the mobile monitors the paging channel. In the System Access state, the mobile
station communicates with the CDMA base station, sending and receiving messages as shown in
the Figure 3.24, while performing various operation dictated by the different System Access sub
states. In the Mobile Station Control on the Traffic Channel state, the mobile communicates
with the base station using the forward and the reverse traffic channels while in various traffic
channel sub states as shown in the Figure 3.25. The mobile may move back and forth between
these three states depending upon the movement of the subscriber and the use of the mobile.
6.Explain typical components of cdmaOne network
The first form of CDMA, IS-95, specified a dual mode of operation in 800-MHz cellular band
for both AMPS and CDMA. First standard defined mobile station and base station requirements
that would ensure the compatibility for both AMPS and CDMA. The next standard IS-95A
describes the structure of wideband 1.25MHz CDMA channels and the operations necessary to
provide power control, call processing, handoffs and registration procedures for proper system
operations. Along with the voice, circuit switched data services were provided at 14.4 kbps over
these first CDMA systems. With additional features, new standard, TIA/EIA-95-B accepted in
1999, provided the compatibility of 1.8 to 2.0-GHz CDMA PCS systems with IS-95A.
These systems provided packet-switched data service at rates up to 64 kbps known as 2.5G
CDMA technology. These early forms of CDMA are grouped together called cdmaOne,
trademark of the CDMA Development Group.
Figure 3.1 shows the cdmaOne network and standards associated with various network
components.
7. Explain the types of GSM location updating
8. Explain the steps involved during Intra-BSC handover
The process that occurs during the handover intra BSC as follows:
A). During the call, MS will measure the strength and quality of the signal on the TCH and the
signal strength from the neighboring cell. MS to evaluate and assess the average for each cell.
MS send the results to the BTS measurements every two times in one second cell not only on
their own but also the results of measurements from the BTS neighboring cell.
B). The BTS will send the results of measurements on the TCH to the BSC. In the BSC, the
function is activated when the placement is required to handover to another cell.
C). When the handover is done, BSC will check whether the channel had requested be met by
another cell, if not the BSC will be the new BTS to enable TCH.
D). BSC will ask the BTS for a long time to send a message to MS with information about the
frequency, time slot, and the output power for the change.
E). MS choose a new frequency handover and access to the appropriate time slot.
F). When the BTS to detect the handover, the BTS will send the information contains the
physical "timing advance" (the distance between MS to the BTS) to MS. BTS also inform the
BSC to send a "message HO detection" so that point on the new GS is connected.
G). MS send a "HO complete message."
H). Last time the BTS ordered not to activate the old TCH.
9. Explain TDMA timing offset between uplink and downlink
Time slot burst The transmission of a normal (traffic and control channels) burst and the other
types of burst signals are shown in figure 2.15. GSM Traffic and control signal bursts has five
types namely
Normal burst
Frequency correction burst
Synchronization burst
Access burst
Dummy burst
Normal burst
Here two groups of 57 encrypted bits are transmitted on either side of a training sequence of
bits. Three tail bits precede the first group of traffic bits and 3 tails bits the last group of traffic
bits. It has 8.25 bit long guard period (GP) at end where no transmission activity take place.
Frequency correction burst (FCB) It is used by the mobile to obtain the frequency
synchronization. It consists of 142 fixed bits and followed by 3 tail bits. It has 8.25 bit long
guard period (GP) at end. The repetition of FCB by the BTS within the GSM frame structure
becomes the frequency correction channel (FCCH).
Synchronization burst it is used by the mobile to obtain the timing synchronization. It consists of
three tail bit followed by 39 encrypted bits, a 64 bit synchronisation sequence 39 more encrypted
bits, 3 tail bits, and the same 8.25 bit long guard period. the reputation of synchronising
sequence was by the BTS within the GSM frame structure becomes the synchronising
channel(SCH)
Access burst It is used by the mobile to facilitate random access request by the mobile and
handover operations. It consists of 8 tails with followed by 41-bits synchronization sequence ,
then 36 encrypted bits and 3 3 tail bits. The length of the guard bit time period is equal to 252 μs
or 68.25 bits. The access bus is used on both the Random Access channel on the fast associated
control channel during handover.
Dummy burst The dummy bus is transmitted on the radio frequency designated as C0 when no
other type of burst signal is being transmitted. It consists of 3 tail bits, 58 mixed bits, a- 26 bits
training sequence, 58 more mixed bits, three tail with the same 8.25 bit longer period. The
dummy purpose is used to ensure that the base station is always transmitting on the frequency
carrying system information it helps for the power measurement on the strongest BTS.

10. Explain GSM System Operations


Registration, call setup, and Location Updating
various states of MS
The MS can be powered off, or
card can be removed from the mobile, or
The mobile can be ON but located in an area without service.
In all these cases, The MS is considered to be in the detached condition. Otherwise, the MS can
be powered ON with in the GSM system and will subsequently enter into an attached
relationship with the system. Registration, call setup, and Location Updating
The mobile can be in either of two states
a (1) the idle state in which the MS has no dedicated channel allocated to it and it just listens to
the broadcast control channels (BCCH) and the paging channels (PCH) b(2) the active or
dedicated state in the MS has a dedicated connection to the GSM network. While in the attached
mode, the MS may change from the idle to the active mode as the result of call setup, short
message service transfers, location updating or supplementary service procedures. Also if the
MS is in the active mode and changes cells, this operation is referred as GSM handover

11.Explain with a neat block diagram, the network nodes found in a CDMA2000 Wireless
system

ANS:
Mobile-Services Switching Centre and Visitor Location Register
The CDMA Mobile-Services Switching Center (MSC) serves as the interface between the Public
Switched Telephone Network (PSTN) and the Base Station Subsystem(BSS)
MSC performs the functions necessary for the establishment of calls to and fro m the system’s
mobile subscribers
The Visitor Location Register (VLR) functions is collocated with the MSC.
Its function is to provide a database containing temporary information about registered
subscribers that may needed by the MSC
Interworking Function
In the early CDMA systems, the Inter Working Function (IWF) node is the only gateway
It provides a direct connection to the PDN for packet twork (PDN)
It also supports circuit-switched data calls by providing internal modems for connections to dial-
up Internet Service Providers
Mobile Positioning System (MPS)
The ability to locate the caller is known as Enhanced 911 or E911. Other used of this system are
“location-based services” or location-specific marketing tools.
For Phase 1 of the wireless E911 program, the cellular system must be able to tell a location
Public Safety Answering Point (PSAP) the location of the cellular antenna that is handling the
emergency call.
For Phase 2 implementation, the MPS uses a form of mobile-assisted GPS and triangulation to
determine the latitude and longitude of the mobile.
Unified Messaging/Voice Mail Service (UM/VMS)
This node provides messaging waiting indication using Short Message Service (SMS) and
multiple message retrieval modes including the use of Dual Tone Multi Frequency (DTMF) or
either a Web or Wireless Application Protocol (WAP) browser .
In CDMA2000, the IWFs packet data transfer function is augmented by the Packet Core to dial-
up Internet Service Providers It also supports circuit-switched data calls by providing internal
modems for connections In the early CDMA systems, the Inter Working Function (IWF) node is
the only gateway This node connects to the PDN and the MSC.
This node integrates e-mail and voice mail access.
HLR/AC
It includes the SD Electronic Serial Number (ESN), details of subscriber’s service plan, any
service restrictions (no overseas access) and identification of the MSC where the mobile was last
registered.
The AC uses Shared Secret Data (SSD) for authentication calculations. Both the AC and SD
calculate SSD based on the authentication key or A-key, the ESN, and a random number
provided by the AC and broadcast to the SD.
The A-key is stored in the SD and also at the AC and never transmitted over the air.
The AC or MSC/VLR compares the values calculated by the AC and the SD to determine the
mobile’s status with the system
PPCS and Other Nodes
The Pre-Paid Calling Service (PPCS) node provides a prepaid calling service using subscriber’s
home location area MSC.
Also associated with a prepaid administration computer system that provides the necessary
database to store subscriber information and update it as needed.
The Pre-Paid Administration System (PPAS) provides the subscriber account balance
information to the PPCS system.
The MSC sends information about subscriber time used to PPAS for account updating.
Base Station Subsystem (BSS)
BSS provides the mobile subscriber with an interface to the circuit switched core network
through the MSC and an interface to the Pubic Data Network (PDN) through the Packet Core
Network (PCN).
There can be more than one BSS in a cdma2000 system. The combination of all the CDMA
BSSs and radio network management system that oversees their operation is known as the
CDMA Radio Access Network or C-RAN.
Base Station Controller (BSC)
BSC is the interface between the MSC, Packet Core Network (PCN), other BSSs in the same
system and all radio base stations that it controls.
Radio Base Station (RBS)
Typical RBS contains an integrated GPS antenna and receiver that is used to provide system
timing and frequency references, a computer-based control system that monitors and manages
the operations of the RBS and provides alarm indications as needed, Also contains
communication links for the transmission of both system signals and subscriber traffic between
itself and the BSC, and power supplies and environmental control units as needed.
PLMN Subnetwork
A cdma2000 Public Land Mobile Network (PLMN) provides mobile wireless communication
services to subscribers and typically consists of several functional subnetworks. These
subnetworks are known as the Circuit Core Network (CCN), the Packet Core Network (PCN),
the Service Node Network (SNN) and the CDMA Radio Access Network (C-RAN). The
cdma2000 PLMN subscriber has access to the PSTN and the PDN through these subnetworks.
These subnetworks facilitates the management of the system.
12. With a neat diagram, explain the elements of the CDMA2000 packet core network

Packet Data Serving Node


The Packet Data Serving Node (PDSN) provides the needed IP transport capability to connect
the C-RAN (i.e., subscriber to Public Data Network). It connects the C-RAN through the
Aquater interface(also called Radio-Packet (R-P) interface). It also interfaces the C-RAN with
the home agent and the authentication, authorization and accounting nodes. It sets up, maintains
and terminates secure communications with the home agent and the authentication, authorization
and accounting nodes. Serves as point of connection to the radio network and the IP network
and provides IP service management to offered IP traffic. Facilitates wireless mobile IP
functionality, and also serves as a foreign agent to register network visitors.
Authentication, Authorization and Accounting (AAA)
AAA server authenticates and authorizes the subscriber device to employ the available network
services and applications. For this, it manages a database that contains user profiles. The user
profile information includes information about Quality of Service (QoS) for the PDSN.
Home Agent (HA)

The Home Agent has the task of forwarding all packets that are destined for the Subscriber
Device (SD) to the PDSN over an IP network. The PDSN then sends the packets to the SD via
the C-RAN and the common air interface. For this operation, the HA in conjunction with the
PDSN authenticates mobile IP registrations from the mobile subscriber, performs SD
registration, maintains current location information for the SD, and performs the necessary
packet tunneling. Tunneling means IP packets destined for a particular SD’s permanent address
are rerouted to the SD’s temporary address. If the SD is registered in a foreign network, then the
SD has been assigned a temporary dynamic IP address by the Foreign Agent and this temporary
address is sent to the HA.
Network Management System
Modern wireless cellular systems employ sophisticated network management systems to oversee
the operation of an entire network. Most of the service providers have one or several Network
Operations Centers (NOCs) that serve as control points for nationwide cellular networks. A
typical network management system has several layers that deal with various levels of network
infrastructure. The different levels are: Network Management System (at highest level), Sub
Network Management System, Network Element Management System (at the lowest level). The
highest level of Network Management gives an overview of the entire network including all the
subnetworks that it comprises. This computer-based system provides a platform to monitor the
overall network. The system provides integrated graphical views of the complete network and
modular software applications that support the operation and maintenance of the entire network.
Subnetwork Management
Subnetwork Management provides the management of the circuit, packet and radio networks that
compose the typical CDMA system. The Circuit Core Network Management System is mainly
concerned with the CDMA mobile-services switching center. Provides fault, performance
configuration, software and hardware management functions at the subnetwork level. The
computer system used for this function provides an operator with access to one or more MSCs
for the performance of the various functions.

13. Explain the generation of CDMA forward traffic/ power control channel with block diagram
The CDMA Forward Traffic Channels carry the actual user information. The digitally encoded
voice or data can be transmitted at several different data rates. Rate Set 1(RS1) supports 9.6kbps
maximum and slower rates of 4.8, 2.4, 1.2kbps. Rate Set 2(RS2) supports 14.4, 7.2, 3.6, 1.8kbps.
Figure 3.15 shows generation of Forward Traffic Channel. All the CDMA system’s unused
Walsh codes may be used to generate forward traffic channels. The Traffic Channels are further
scrambled with both the short PN sequence codes and the long PN sequence codes before
transmission.
Power control information is transmitted to the mobile stations within the cell over the Traffic
Channels as shown in Figure 3.16. This information is used to set the output power of the mobile
on the reverse link and is multiplexed with the scrambled voice bits at the rate of 800bps or 1 bit
every 1.25msec.
14. Explain the TDMA hyperframe structure with diagram in detail
Figure 2.12 shows frame, super frame, and multiframe and hyper frame structure. A hyperframe
is a multiframe sequence that is composed of 2048 superframes and is largest time interval in the
GSM system (3 hours, 28 minutes, 53 seconds). Every time slot during a hyperframe has a
sequential number (represented by an 11 bit counter) that is composed of a frame number and a
time slot number. This counter allows the hyperframe to synchronize frequency hopping
sequence, encryption processes for voice privacy of subscribers' conversations. The hyperframe
in an IS-136 TDMA system consists of 192 frames.

15 Explain the basic spreading procedure used on CDMA forward channels


The IS-95 CDMA Forward Channels exist between the CDMA base station and the subscriber
devices. The IS-95 signal occupies a bandwidth of approximately 1.25MHz. The spreading
procedure for Forward CDMA Channels is shown in the Figure 3.11. The digital signal is spread
by first Ex-oring with a particular Walsh code. Then it is further scrambled in the In-phase (I)
and Quadrature phase (Q) lines by two different short PN spreading codes. The short PN codes
have excellent cross-correlation and auto-correlation properties that make them useful for this
application.
The outputs of the In-phase and Quadrature phase signals are passed through baseband filters and
then applied to an RF quadrature modulator integrated circuit that upconverts the final output
signal to the UHF frequency bands. This is combined with other forward channel element
signals, amplified and the composite signal is transmitted over the air interface.
The four types of logical channels in the forward direction are:
Pilot channel
Synchronization channel
Paging channel
Traffic/Power Control channel
16. Explain the types of Handoff used in CDMA

Ans:
Call Handoff
Handoffs can occur during three mobile station states: They are idle state, access state and
traffic state. The procedures used and the type of handoff performed will depend upon the
mobile’s present state. In all cases, the handoffs are mobile assisted since the mobile station is
tasked with reporting signal-strength measurements of various pilot channels to the network.
Handoffs occur when the serving sector/cell is no longer capable of supporting communications
between the mobile and itself. CDMA supports soft/softer handoffs
Idle/Access Handoff
If the mobile is in the idle state and moves from the coverage area of one sector/cell into
another, an idle handoff can occur. When the received signal strength of a different Pilot Channel
(PC) is determined to be twice as strong than the current PC, the mobile will start listening to the
paging channel associated with the stronger PC. This is known as form of hard handoff because
there is a brief interruption of the communication link. The access handoff may occur before the
mobile begins sending access probes, during access probes and even after it receives an access
probe acknowledgement. An access entry handoff allows the mobile to perform a hard idle
handoff from one Paging Channel to another in the best signal-strength sector/cell just after the
mobile enters the access state
Soft Handoff
A soft handoff occurs when the mobile is able to communicate simultaneously with several new
cells or a new sector of the current cell over a Forward Traffic Channel (FTC) while still
maintaining communications over the FTC of the current cell or sector. The mobile station can
only perform a soft handoff while in the traffic state to a new cell or sector that has the same
frequency carrier. The use of soft handoff is associated with the near-far problem and power
control mechanism. If the mobile moves away from a base station and continually increases its
output power to compensate for the signal attenuation encountered at the greater distance, it will
cause interference to mobiles in neighboring cells and raise the level of background noise in its
own cell or sector. The optimal CDMA system operation will occur when each mobile is
connected to the nearest base station (the base station with a strongest signal) and is transmitting
with a lowest output power necessary for proper operation.To overcome this problem and to
make sure that the mobile is connected to the base station with the greatest RSS, a strategy for
soft handoffs has been designed. A carefully implemented soft handover process can enhance
system performance by increasing call quality, improving coverage and increasing capacity. The
three types of soft handoffs defined are: 1.Softer handoff 2.Soft handoff 3. Soft Softer handoff
17. Draw and describe the structure of TDMA frame, multiframe, superframe and hyperframe

• GSM has 8 Timeslots in one TDMA frame.


• The System assigns numbers to frames sequentially from 0 to 2,715,648nand the process
repeats it self.
The grouping of successive TDMA frames is known as Hyper frame
TDMA Hyper Frame structure
Figure 2.12 shows frame, super frame, and multiframe and hyper frame structure. A hyperframe
is a multiframe sequence that is composed of 2048 superframes and is largest time interval in the
GSM system (3 hours, 28 minutes, 53 seconds). Every time slot during a hyperframe has a
sequential number (represented by an 11 bit counter) that is composed of a frame number and a
time slot number. This counter allows the hyperframe to synchronize frequency hopping
sequence, encryption processes for voice privacy of subscribers' conversations. The hyperframe
in an IS-136 TDMA system consists of 192 frames.
GSM multiframe
The GSM frames are grouped together to form multiframes and in this way it is possible to
establish a time schedule for their operation and the network can be synchronised. There are
several GSM multiframe structures:
Traffic multiframe: The Traffic Channel frames are organised into multiframes consisting of 26
bursts and taking 120 ms. In a traffic multiframe, 24 bursts are used for traffic. These are
numbered 0 to 11 and 13 to 24. One of the remaining bursts is then used to accommodate the
SACCH, the remaining frame remaining free. The actual position used alternates between
position 12 and 25.
Control multiframe: the Control Channel multiframe that comprises 51 bursts and occupies 235.4
ms. This always occurs on the beacon frequency in time slot zero and it may also occur within
slots 2, 4 and 6 of the beacon frequency as well. This multiframe is subdivided into logical
channels which are time-scheduled.
Superframe
Multiframes are then constructed into superframes taking 6.12 seconds. These consist of 51
traffic multiframes or 26 control multiframes. As the traffic multiframes are 26 bursts long and
the control multiframes are 51 bursts long, the different number of traffic and control
multiframes within the superframe, brings them back into line again taking exactly the same
interval.
18. Define Handoff. With a neat diagram, explain the steps involved during intra-BSC handover
operation in GSM

The process that occurs during the handover intra BSC as follows: A). During the call, MS will
measure the strength and quality of the signal on the TCH and the signal strength from the
neighboring cell. MS to evaluate and assess the average for each cell. MS send the results to the
BTS measurements every two times in one second cell not only on their own but also the results
of measurements from the BTS neighboring cell. B). The BTS will send the results of
measurements on the TCH to the BSC. In the BSC, the function is activated when the placement
is required to handover to another cell. C). When the handover is done, BSC will check whether
the channel had requested be met by another cell, if not the BSC will be the new BTS to enable
TCH. D). BSC will ask the BTS for a long time to send a message to MS with information about
the frequency, time slot, and the output power for the change. E). MS choose a new frequency
handover and access to the appropriate time slot. F). When the BTS to detect the handover, the
BTS will send the information contains the physical "timing advance" (the distance between MS
to the BTS) to MS. BTS also inform the BSC to send a "message HO detection" so that point on
the new GS is connected. G). MS send a "HO complete message." H). Last time the BTS ordered
not to activate the old TCH.

In this case BSC1, (old BSC) does not control the better cell which is the target for the handover.
This means that the MSC will be part of the link procedure between BSC1 and BSC2 (new
BSC). Handover request - BSC1 will use the MSC to send a handover request to BSC2. The
MSC will know which BSC controls that cell. Activation of new channel - BSC2 will allocate a
TCH in the targetcell and then order the BTS to activate it. The chosen HO ref. no. will be part
of the activation message. The BTS will acknowledge that the activation has been made.
Handover command - After the activation the new BSC commands the MS to change to the new
channel. The message is sent on FACCH via the old channel and will contain a full description
of the new channel and the HO ref. no. 3. Handover bursts - When the MS has changed to the
new channel, it will send handover bursts on the new channel. The information content is the HO
ref. no.The bursts are as short as the access bursts. This is because the MS does not know the
new Timing Advance (TA) value yet. On the detection of the handover bursts, and check of HO
ref. no., the new BTS will send the new TA. 4. Handover complete - Now the MS is ready to
continue the traffic and will send a handover complete message, which will be addressed to the
old BSC asa clear command. 5. Release of old channel - When the old BSC receives the clear
command from the MSC, the BSC knows that the handover was successful. The BSC orders the
BTS to release the TCH and the BTS will acknowledge.
19 Explain in detail about GSM network identities
GSM Identities Mobile Subscriber ISDN Number (MSISDN) The authentic telephone number
of a mobile station is the Mobile Subscriber ISDN Number (MSISDN). Based on the SIM, a
mobile station can have many MSISDNs, as each subscriber is assigned with a separate
MSISDN to their SIM respectively. Listed below is the structure followed by MSISDN
categories, as they are defined based on international ISDN number plan
The LAI hierarchy is based on international standard and structured in a unique format as
mentioned below • Country Code (CC) − 3 decimal places. • Mobile Network Code (MNC) − 2
decimal places. • Location CGI is used for cell identification within a location area.  The LAI
is used for MS paging and location updating.  GSM has both LAI (Location area identity) and
CGI (Cell global Identity) Network Numbering Plans Area Code (LAC) − maximum 5 decimal
places or maximum twice 8 bits coded in hexadecimal (LAC < FFFF).
20. Explain GSM call setup using the MSRN
Step1: Initial address message
Step2: Send routing Information
Step3: HLR uses MSISDN to find the subscriber data in the data base.
Step4: Provide Roaming Number
Step5: VLR asks MSC to reserve idle MSRN number
Step6: the MSC/VLR sends the MSRN back to HLR
Step7: HLR sends the MSRN back to GMSC
Step8: GMSC uses the MSRN to route the call to the Correct MSC. IMSI is used by MSC for
final establishment of call.
IMSI International Mobile Subscriber Identity, GMSC Gateway Mobile Switching
Centre ,MSRN Mobile Station Roaming Number Formulation of GSM MSRN

You might also like