Chapter v4
Chapter v4
09/27/2022
Outline
3
Introduction to Cellular Networks
History of Cellular Networks
Generations of Cellular Networks
Fundamentals of Cellular Networks
Cellular System Services
Components of Cellular Networks
Components of Cellular Phone
Call processing in Cellular Network
Global System for Mobile Communications
(GSM)
GSM Characteristics
GSM Architecture
Handover in GSM
GSM Roaming
Localization
Ethiopian Telecommunications Corporation
(Ethiotelecom)
GSM Call Processing
GSM Security
09/27/2022
Introduction to Cellular Network
4
Cellular Network
Is a communication network in which the link connecting two
or more devices is wireless.
Is also called mobile network.
Is a radio network distributed over land through cells where
each cell includes a fixed location transceiver known as base
station.
Is the network that is distributed over land areas called cells,
each served by at least one fixed-location transceiver, known
as a cell site or base station. This base station provides the cell
with the network coverage which can be used for transmission
of voice, data and others.
09/27/2022
Is the realisation of the “anytime, anywhere, anyone”
History of Cellular Network
5
In 1979 the first commercial cellular phone service was launched by the
Nordic Mobile Telephone (in Finland, Sweden, Norway, Denmark). Then
after;
From voice communication to voice and data communication. (service)
From circuit switching to packet switching. (In case of technology).
Circuit Switching: is a method of implementing a telecommunications
network in which two network nodes establish a dedicated communication
channel through the network. Example early day communication through
operators.
Packet Switching: a means of directing digitally encoded information in a
communication network from its source to its destination, in which
messages may be divided into smaller entities called packets, each of
which travels independently through the network in paths.
Then after the time being, Global Positioning System (GPS) and Global
System for Mobile Communications (GSM) were emerged.
Lastly, the concept of the realisation of “anytime, anywhere, anyone” came.
09/27/2022
History of Cellular Network
6
3G
1Mbps (144Kbps to 2Mbps)
100Kbps 2.5G
(10-150Kbps)
10Kbps
2G
(9.6Kbps)
1Kbps
1G
(<1Kbps)
Cell Design
Cell design (around 10 mile(16km) radius)
Served by base station consisting of transmitter, receiver,
and control unit
Base station (BS) antenna is placed in high places
(churches, high rise buildings) -
Operators pay around $500 per month
for BS
10 to 50 frequencies assigned to each cell
Cells set up such that antennas of all neighbors
are
equidistant (hexagonal pattern)
In North America, two 25-MHz bands allocated to
09/27/2022
AMPS
Fundamentals of Cellular Network
10
• Cell Design
• Cells grouped into a cluster of seven
• Letters indicate frequency use
• To add more users, smaller cells (microcells) are used
• Frequencies may not need to be different in CDMA (soft
handoff).
09/27/2022
Fundamentals of Cellular Network
11
09/27/2022
Global System for Mobile Communications (GSM)
15
09/27/2022
Performance Characteristics of GSM
16
09/27/2022
GSM Architecture
18
09/27/2022
GSM Architecture
19
09/27/2022
GSM Architecture
21
09/27/2022
GSM Architecture
24
09/27/2022
GSM Architecture
25
2. Mobile Equipment
Portable, vehicle mounted, hand held device.
Uniquely identified by an IMEI
(International Mobile Equipment Identity).
Voice and data transmission
Monitoring power and signal quality
of surrounding cells for optimum handover
Power level : 0.8W – 20 W
160 character long SMS.
09/27/2022
GSM Architecture
26
09/27/2022 Assigns Frequency and time slots for all MS’s in its area.
GSM Architecture
27
5. Equipment Identity Register (EIR) – database located near the MSC and
09/27/2022
containing information identifying cell phones.
GSM Architecture
28
A situation that occurs when mobile station switches from one radio
resources to another set.
Types of handover
Hard Handover – old connection is broken before new connection is
activated.
09/27/2022
Soft Handover – new connection is activated before the old one i1s2/7/2021
GSM Roaming
31
Suppose that he travels from Korea to Japan ,which have a GSM roaming
agreement.
Then what will happen when John makes communication with his
colleagues???
Scenarios #1
If a person in Korea call John
The caller is charged for an international call from Hong Kong to Korea
John is charged for an international call from Korea to Japan
Scenarios #3
If the caller is in Japan
09/27/2022
international call
Ethiotelecom
33
Network Information
Operator: Ethiopian Telecommunications
Corporation also known as: ETMTN
What is ETMTN???
Currently : Ethiotelecom
Technology: GSM
Frequency: 900MHz.
Initializing Call
1. when the cell phone is turned on it scans all the available frequencies for the control
channel.
2. all the BTS in the area transmit the Frequency Correction Channel (FCCH),
Synchronization Channel (SCH) and Broadcast Control Channel (BCCH) that contain
the BTS identification and location .
3. out of available beacon (A radio station that broadcasts a directional signal for
navigational purposes) frequencies from the neighboring BTSs, the cell phone
chooses the strongest signal.
4. based on the FCCH of the strongest signal, the cell phone tunes itself to the
frequency of the network.
5. the phone send a registration request to the BTS.
6. the BTS sends this registration request to the MSC via the BSC.
7. the MSC queries the AUC and EIR databases and based on the reply it authenticates
the cell phone.
8. the MSC also queries the HLR and VLR databases to check whether the cell is in its
home area or outside.
9. if the cell phone is in its home area the MSC gets all the necessary information
from
09/27/2022
corresponding HLRinvia
the HLR if it is not home area, the VLR gets the information from the 12/7/2021
itsMSCs.
GSM Call Processing
36
09/27/2022 12/7/2021
GSM Call Processing
37
Making a Call
1. when the phone needs to make a call it sends an access
request (containing phone identification number) using
Random Access Channel (RACH) to the BTS; if another cell
phone tries to send an access request at the same time the
messages might get corrupted, in this case both cell phones
wait a random time interval before trying to send again.
2. then the BTS authenticates the cell phone and sends an
acknowledgement to the cell phone.
3. the BTS assigns a specific voice channel and time slot to the
cell phone and transmits the cell phone request to the MSC
via BSC.
4. the MSC queries HLR and VLR and based on the
09/27/2022information 12/7/2021
obtained it routes the call to the receiver’s BSC and BTS.
GSM Call Processing
38
09/27/2022 12/7/2021
GSM Call Processing
39
Receiving a Call
1. when a request to deliver a call is made in the network, the MSC or
the receiver’s home area queries the HLR; if the cell phone is
located in its home area the call is transferred to the receiver; if the
cell phone is located outside its home area, the HLR maintains a
record of the VLR attached to the cell phone.
2. based on this record, the MSC notes the location of the VLR and
indicated the corresponding BSC about the incoming call.
3. the BSC routes the call to the particular BTS which uses the
paging
channel to alert the phone.
4. the receiver cell phone monitors the paging channel periodically
and once it receives the call alert from the BTS it responds to the
BTS.
5. the BTS communicates a channel and a time slot for the cell
09/27/2022 12/7/2021
6. phone
now the call is established
GSM Call Processing
40
09/27/2022
GSM Security
41
Personal Identification
Number (PIN)
User Authentication
TMSI-based Security
09/27/2022
GSM Security
42
when the cell phone is turned on, the SIM checks the PIN;
in case of 3 consecutive faulty PIN inputs a PUK (Personal
Unblocking Key) is asked for.
in case of 10 faulty PUK inputs, the SIM is locked and
the subscriber must ask a new SIM.
this security measure is within the cell phone and the
service provider is not involved.
09/27/2022
GSM Security
43
User Authentication
a mechanism for encrypting messages in a GSM network
the network sends random data to the cell phone (RAND)
each cell phone is allocated a secret key (KI)
using RAND and KI and the A3 encryption algorithm the
cell phone generates a signed result (SRES) which is then
sent to the network
a similar process takes place in the network which
generates a signed result specific to the cell phone
the network compares its SRES with the SRES generated
by the phone and in case of a match the cell phone is
connected to the network
09/27/2022
GSM Security
44
09/27/2022