Chapter-2 GSM Shared

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 59

Agnel Charities

Fr. C. Rodrigues Institute of Technology, Vashi, Navi-Mumbai


Department of Computer Engineering

Mobile Communication and


Computing

May 9, 2024 MRITUNJAY OJHA 1


Chapter - 2

GSM

May 9, 2024 MRITUNJAY OJHA 2


Roadmap

1.1

 Performance Characteristics of GSM


 Mobile Services
•Bearer Services
•Tele Services
•Supplementary Service
2.1

2.2

2.3

May 9, 2024 MRITUNJAY OJHA 3


Mobile Phone Subscribers Worldwide
1200

1000

GSM total
800
Subscribers [million]

TDMA total
CDMA total
600 PDC total
Analogue total
Total wireless
400
Prediction (1998)

200

0
year
1996 1997 1998 1999 2000 2001 2002

May 9, 2024 MRITUNJAY OJHA 4


Internet Subscribers Worldwide

May 9, 2024 MRITUNJAY OJHA 5


Difference Between GSM and CDMA
BASIS FOR GSM CDMA
COMPARISON
Basic GSM is SIM specific. CDMA is Handset specific.

Full Form Global System for Mobile communication. Code Division Multiple Access.

Technology FDMA and TDMA CDMA


Network Network Tower in each cell serves the mobile There are a physical channel and a
phone of that area. dedicated code for each device in the
network.
Transmission Voice and data transmission at the same time. Can not do voice and data transmission
simultaneously.
Roaming Worldwide. Limited.
Data Rate Slower. Faster.

May 9, 2024 MRITUNJAY OJHA 6


GSM: Overview
GSM: Global System for Mobile (GSM) is a second generation cellular standard developed to
cater voice services and data delivery using digital modulation
 Formerly: Groupe Spéciale Mobile (founded 1982)
 Now: Global System for Mobile Communication

 Primary Goal: Provide a mobile system that allow users to roam throughout and provide
voice services compatible to ISDN and other PSTN systems
• Simultaneous introduction of essential services in three phases (1991, 1994, 1996) by the
European telecommunication administrations
• Today many providers all over the world use GSM (more than 190 countries in Asia, Africa,
Europe, Australia, America)
• More than 1300 million subscribers in world & 45 million subscriber in India.
May 9, 2024 MRITUNJAY OJHA 7
GSM Developments
 GSM 900
Mobile to BTS (uplink): 890-915 Mhz BTS to
Mobile(downlink):935-960 Mhz

GSM 1800 (DCS – Digital Cellular System)


Mobile to BTS (uplink): 1710-1785 Mhz BTS to
Mobile(downlink) 1805-1880 Mhz

GSM 1900 (PCS – Personal Communication Service)


Mobile to BTS (uplink): 1850-1910 Mhz BTS to
Mobile(downlink) 1930-1990 Mhz
May 9, 2024 MRITUNJAY OJHA 8
Performance Characteristics of GSM
Communication
• Mobile, wireless communication; support for voice and data services
Total mobility
• International access, chip-card enables use of access points of different providers
Worldwide connectivity
• One number, the network handles localization
High capacity
Better frequency efficiency, smaller cells, more customers per cell
High transmission quality
• High audio quality and reliability for wireless, uninterrupted phone calls at higher speeds (e.g.,
from cars, trains)
Security functions
• Access control, authentication via chip-card and PIN

May 9, 2024 MRITUNJAY OJHA 9


GSM: Mobile Services
GSM offers
• Several types of connections
• Voice connections, data connections, short message service
• Multi-service options (combination of basic services)
Three service domains
• Bearer Services
• Tele Services
• Supplementary Services

• PLMN- Public land mobile network


• MT- Mobile termination performs all network related tasks (TDMA,FDMA, Coding) and provides interface for data
transmission to terminal TE bearer services
MS
transit source/
TE MT GSM-PLMN network destination TE
R, S Um (PSTN, ISDN) network (U, S, R)

tele services

May 9, 2024 MRITUNJAY OJHA 10


Bearer Services
Comprise of all services that enable transparent transmission of data between the interfaces to the network,
It provides transparent and non transparent, synchronous and asynchronous data transmissions
Telecommunication services to transfer data between access points
 R and S interfaces – interfaces that provide network independent data transmission from end device to mobile
termination point.
 U interface – provides the interface to the network (TDMS, FDMA, etc.)
Transparent bearer services uses functions of physical layer to transmit data.
Non transparent bearer services use protocols of layers two and three to implement error correction and flow
control.
Different data rates for voice and data (original standard)
 Data service (circuit switched)
• Synchronous: 2.4, 4.8 or 9.6 Kbit/s
• Asynchronous: 300 - 1200 bit/s
 Data service (packet switched)
• Synchronous: 2.4, 4.8 or 9.6 Kbit/s
• Asynchronous: 300 - 9600 bit/s
May 9, 2024 MRITUNJAY OJHA 11
Tele Services
Telecommunication services that enable voice communication via mobile phones
All these basic services have to obey cellular functions, security measurements etc.
Offered services
• Mobile telephony: Primary goal of GSM was to enable high quality voice
transmission offering the traditional bandwidth of 3.1 kHz
• Emergency number: Common number throughout Europe (112); mandatory
for all service providers; free of charge; connection with the highest priority
(preemption of other connections possible)
• Multi numbering:
several ISDN phone numbers per user possible

May 9, 2024 MRITUNJAY OJHA 12


Tele Services
Additional Services:

Non-Voice-Teleservices:
• Group 3 fax : Fax data is transmitted like digital data over analog telephone
network
• Voice mailbox : (implemented in the fixed network supporting the mobile
terminals)
• Electronic mail : (MHS, Message Handling System, implemented in the fixed
network)
• Short Message Service (SMS): Alphanumeric data transmission to/from the
mobile terminal using the signaling channel,
thus allowing simultaneous use of basic
services and SMS

May 9, 2024 MRITUNJAY OJHA 13


Supplementary Services
Services in addition to the basic services
Similar to ISDN services besides lower bandwidth due to the radio link
May differ between different service providers, countries and protocol
versions
Important services
• Identification: forwarding of caller number
• Automatic call-back
• Conferencing with up to 7 participants
• Locking of the mobile terminal (incoming or outgoing calls)

May 9, 2024 MRITUNJAY OJHA 14


Roadmap

1.
1

 GSM Architecture

2.
1

2.
2

2.
3

May 9, 2024 MRITUNJAY OJHA 15


Architecture of the GSM system
GSM is a PLMN (Public Land Mobile Network)
• Several providers setup mobile networks following the GSM standard within each
country
 Components
• MS (Mobile Station)
• BS (Base Station)
• MSC (Mobile Switching Center)
• LR (Location Register)
Subsystems
• RSS (Radio subsystem): covers all radio aspects
• NSS (Network and switching subsystem): call forwarding, handover,
switching
• OSS (Operation subsystem): Management of the network

May 9, 2024 MRITUNJAY OJHA 16


GSM: overview
OMC, EIR,
AUC
HLR
GMSC
NSS fixed network
with OSS

VLR MSC MSC


VLR

BSC

BSC

RSS

(AUC) -Authentication Center


(EIR) Equipment Identity Register

May 9, 2024
Operation and Maintenance Center (OMC)
MRITUNJAY OJHA 17
GSM: Elements and Interfaces
radio cell
BSS
MS MS

Um radio cell
RSS-Radio subsystem
RSS BTS MS

BTS
NSS-Network and
Abis
switching subsystem
BSC BSC
A

MSC MSC OSS-Operation Subsystem

NSS signaling
VLR VLR
ISDN, PSTN
HLR GMSC
PDN
IWF
O

OSS
EIR AUC OMC

May 9, 2024 MRITUNJAY OJHA 18


System Architecture: Radio Subsystem
radio network and switching  Components
subsystem subsystem • MS (Mobile Station)
• BSS (Base Station Subsystem):
MS MS
Performs all functions necessary to maintain
radio connections to an MS. It consisting of
Um • BTS (Base Transceiver Station):
BTS Abis Comprises all radio equipment e.g. antennas,
BSC MSC amplifiers necessary for radio transmission
BTS
sender and receiver
• BSC (Base Station Controller):
manages the BTS’s, reserves radio frequencies,
handles handover from one BTS to another
 Interfaces
A
BTS • Um : Radio interface
BSC MSC
BTS • Abis : Standardized, open interface with
BSS 16 kbit/s user channels
• A: Standardized, open interface with
64 kbit/s user channels

May 9, 2024 MRITUNJAY OJHA 19


Radio Subsystem
The Radio Subsystem (RSS) comprises the cellular mobile network up to the
switching centers
Components
Base Station Subsystem (BSS): Each BSS is controlled by a base station controller.
Base Transceiver Station (BTS): Radio components including sender, receiver,
antenna - if directed antennas are used one BTS can cover several cells
Base Station Controller (BSC): switching between BTSs, controlling BTSs,
managing of network resources, mapping of radio channels (Um) onto terrestrial
channels (A interface)
BSS = BSC + sum(BTS) + interconnection
 Mobile Stations (MS)

May 9, 2024 MRITUNJAY OJHA 20


Base Transceiver Station and Base Station Controller
• Tasks of a BSS are distributed over BSC and BTS
• BTS comprises radio specific functions
• BSC is the switching center for radio channels
Functions BTS BSC
Management of radio channels X
Frequency hopping (FH) X X
Management of terrestrial channels X
Mapping of terrestrial onto radio channels X
Channel coding and decoding X
Rate adaptation X
Encryption and decryption X X
Paging X X
Uplink signal measurements X
Traffic measurement X
Authentication X
Location registry, location update X
Handover management X

May 9, 2024 MRITUNJAY OJHA 21


System Architecture: Network and Switching Subsystem

network fixed partner


subsystem networks  Components
• MSC (Mobile Services Switching Center):
ISDN • IWF (Interworking Functions) allow MSC to
PSTN
MSC PDN.

EIR
 Databases
• HLR (Home Location Register)-Stores user
relevant information. Static information
SS7

HLR
• VLR (Visitor Location Register)-Dynamic
information
VLR
ISDN
MSC
PSTN
IWF
PSPDN
CSPDN

May 9, 2024 MRITUNJAY OJHA 22


Network and Switching Subsystem
NSS is the main component of the public mobile network GSM switching, mobility
management, interconnection to other networks, system control
Components
Mobile Services Switching Center (MSC)
Controls all connections via a separated network to/from a mobile terminal within the
domain of the MSC - several BSC can belong to a MSC
Databases
Home Location Register (HLR)
Central master database containing user data, permanent and semi-permanent data
of all subscribers assigned to the HLR
 Visitor Location Register (VLR)
local database for a subset of user data, including data about all user currently in the
domain of the VLR

May 9, 2024 MRITUNJAY OJHA 23


Mobile Services Switching Center
The MSC (mobile switching center) plays a central role in GSM
• Switching functions
• Additional functions for mobility support
• Management of network resources
• Interworking functions via Gateway MSC (GMSC)
• Integration of several databases
Functions of a MSC
• Specific functions for paging and call forwarding
• Termination of SS7 (signaling system no. 7)
• Mobility specific signaling
• Location registration and forwarding of location information
• Provision of new services (fax, data calls)
• Support of short message service (SMS)
• Generation and forwarding of accounting and billing information
May 9, 2024 MRITUNJAY OJHA 24
Operation Subsystem
The OSS (Operation Subsystem) enables centralized operation, management, and
maintenance of all GSM subsystems
 Components
Authentication Center (AUC)
•Generates user specific authentication parameters on request of a VLR
•Authentication parameters used for authentication of mobile terminals and encryption of user data
on the air interface within the GSM system
Equipment Identity Register (EIR)
•Registers GSM mobile stations and user rights
•Stolen or malfunctioning mobile stations can be locked and sometimes even localized
Operation and Maintenance Center (OMC)
•Different control capabilities for the radio subsystem and the network subsystem

May 9, 2024 MRITUNJAY OJHA 25


Roadmap

1.
1

 GSM Protocol Architecture


 Localization & Calling
 GSM Hierarchy structure
 GSM Logical Channels
2.
1

2.
2

2.
3

May 9, 2024 MRITUNJAY OJHA 26


GSM Protocol layers for Signaling

Um Abis A
MS BTS BSC MSC

CM CM

MM MM

BSSAP
BSSAP
RR RR’
RR’ BTSM BTSM
SS7 SS7
LAPDm LAPDm LAPD LAPD

radio radio PCM PCM PCM PCM

16/64 kbit/s 64 kbit/s /


2.048 Mbit/s

May 9, 2024 MRITUNJAY OJHA 27


GSM Protocol Architecture
 Layer1: Physical Layer handles all Radio specific functions.
This includes the creation of bursts (data is transmitted in small portion called burst)
according to five different format :
1. Multiplexing of bursts into a TDMA frame
2. Synchronization with BTS
3. Detection of idle channels
4. Measurement of the channel quality on downlink
5. Encryption / decryption of data

 Layer 2: Data link layer is LAPDm ,as the name derived from link access
procedure for the D-channel(LAPD) in ISDN system, which is version
of HDLC(high level data link control). LAPDm is lightweight because it does
not need synchronization flags or check summing for
error detection .
May 9, 2024 MRITUNJAY OJHA 28
Frame format (LAPDm)

• Address field: Is used to carry the service access point identifier (SAPI), protocol revision
type, nature of the message
• SAPI : When using command/control frames, the SAPI identifies the user for which a
command frame is intended, and the user transmitting a response frame
• Control field: Is used to carry Sequence number and to specify the types of the frame
(command or response)
• Length indicator: Identifies the length of the information field that is used to distinguish
the information carrying filed from fill-in bits
• Information Field: Carries the Layer III payload
• Fill-in bits: All “1” bits to extend the length to the desired 184 bits

May 9, 2024 MRITUNJAY OJHA 29


GSM Protocol Architecture
 LAPDm provides following services:
• Reliable data transfer connections
• Re-sequencing of data frames & flow control
• Segmentation
• Reassembled of data
• Data acknowledged /unacknowledged data transfer.

• The network layer 3 is divided into several sub layers:


• The lowest sub layer is the radio resource management(RR) only the part of RR is
implemented in BTS remainder is situated in the BSC. The function of RR are
supported by BSC via the BTS management(BTSM)
• The main task of RR are setup, maintenance & release of radio channels , also
reliable connection to the next higher layer.

May 9, 2024 MRITUNJAY OJHA 30


GSM Protocol Architecture
Mobility management (MM) : Contains functions for registration , authentication ,
identification , location updating & the provision of a temporary subscriber identity
(TMSI) that replaces the International mobile subscriber identity(IMSI)

Call management(CM) : It has three entities


• Call control(CC)
• Short message service(SMS)
• Supplementary service(SS)
SMS: Allows for message transfer using the control channels SDCCH &SACCH (SACCH stands for
Slow Associated Control Channel and SDCCH stands for Stand Alone Dedicated Control Channel) .
SS : Offers point to point connection between two terminals & used by higher layers
for call establishment. It also provides functions to send in-band tones , called Dual tone
multiple frequency (DTMF). It is used in remote control of answering m/c’s or the entry
of PIN in electronic banking
May 9, 2024 MRITUNJAY OJHA 31
Localization & Calling
 Mobile station international ISDN number (MSISDN)
• Country code (CC)
• National destination code (NDC)
• Subscriber number (SN)
• E.g.: +49 179 1234567 with 49 for Germany
 International mobile subscriber identity(IMSI)
• Mobile country code (MCC)
• Mobile network code(MNC)
• Mobile subscriber identity number (MSIN)
 Temporary mobile subscriber identity(TMSI)
 Mobile station roaming number(MSRN)
• Visitor country code(VCC)
• Visitor national destination code(VNDC)
May 9, 2024 MRITUNJAY OJHA 32
GSM Call Classification

 It is divided into two types :

1. Mobile-terminated call : A terminated call in the GSM network is a call received on a mobile
device. For an MT to be
placed, it is necessary to locate the network to
which the called subscriber is currently connected, and, once this is
done, to route the call towards the
destination MS.

2. Mobile-originated call : A call originating from a mobile device (MS) in the GSM network is
routed through the core network to the
destination party.

May 9, 2024 MRITUNJAY OJHA 33


Mobile Terminated Call
1: Calling a GSM subscriber
2: Forwarding call to GMSC 4
VLR
HLR
5
3: Signal call setup to HLR 8 9
3 6 14 15
4, 5: Request MSRN from VLR
calling 7
PSTN GMSC MSC
6: Forward responsible MSC to GMSC station 1 2
7: Forward call to 10 10 13 10
16
current MSC BSS BSS BSS
8, 9: Get current status of MS 11 11 11

10, 11: Paging all cells responsible for MS 11 12


17
12, 13: MS answers
MS
14, 15: Security checks
16, 17: Set up connection

4.26.1
May 9, 2024 MRITUNJAY OJHA 34
Mobile Originated Call

1, 2: Connection request
VLR
3, 4: Security check
3 4
5-8: Check resources (free 6 5
circuit) PSTN GMSC MSC
7 8
9-10: Set up call 2 9
1
MS BSS
10

May 9, 2024 MRITUNJAY OJHA 35


MTC/MOC

MS MTC BTS MS MOC BTS


paging request
channel request channel request
immediate assignment immediate assignment
paging response service request
authentication request authentication request
authentication response authentication response
ciphering command ciphering command
ciphering complete ciphering complete
setup setup
call confirmed call confirmed
assignment command assignment command
assignment complete assignment complete
alerting alerting
connect connect
connect acknowledge connect acknowledge
data/speech exchange data/speech exchange

May 9, 2024 MRITUNJAY OJHA 36


Roadmap

 1
.

 Handovers
1

 Security in GSM
 Disadvantages of GSM
 Data Services in GSM II
 2
.
1

 2
.
2
 2
.
3

May 9, 2024 MRITUNJAY OJHA 37


Handovers
 Handovers are required in Cellular systems as a single cells do not cover the entire
service area .
 The number of handovers that need to be performed that depends on two factors:
1. Cell size: smaller the cell size more are the handovers required.
2. Speed of MS: the faster the MS moves , more are the handovers required.
 The maximum handover allowed in GSM is 60ms.
 There are two reasons for a handover : Range & load balancing
 More handovers of ongoing calls are required.
 The mobile station moves out of the range of a BTS or a certain antenna.
 The wired infrastructure may decide that the traffic in one cell is too high & shift some
MS to other cells with lower load .
May 9, 2024 MRITUNJAY OJHA 38
Handover
There are four possible scenarios:
Intra-cell handover: within a cell , narrow-band interference could make transmission
at a certain frequency impossible. The BSC could then decide to change the carrier
frequency.(Scenario 1)

Inter –cell intra –BSC handover: The mobile station moves from one cell to another ,
but stays within the control of the same BSC. The BSC then performs a handover ,
assigns a new radio channel in the new cell and releases the old one ( scenario 2) .

Inter –BSC intra –MSC handover : As a BSC only controls a limited number of
cells , GSM also has to perform handovers between cells controlled by different BSCs .
this handover then has to be controlled by the MSC (Scenario 3 ) .

Inter MSC handover: a handover could be required between two cells belonging to
different MSCs . Now both MSCs perform the handover together(scenario 4).
May 9, 2024 MRITUNJAY OJHA 39
Types of Handover
1)Intracell 2)Intercell 3)Inter BSC 4)Inter MSC

1
2 3 4
MS MS MS MS

BTS BTS BTS BTS

BSC BSC BSC

MSC MSC

May 9, 2024 MRITUNJAY OJHA 40


Handover Decision

receive level receive level


BTSold BTSold

HO_MARGIN

MS MS

BTSold BTSnew

May 9, 2024 MRITUNJAY OJHA 41


Handover Procedure

MS BTSold BSCold MSC BSCnew BTSnew


measurement measurement
report result

HO decision
HO required HO request
resource allocation
ch. activation

HO command HO request ack ch. activation ack


HO command HO command
HO access
Link establishment

HO complete HO complete
clear command clear command
clear complete clear complete

May 9, 2024 MRITUNJAY OJHA 42


Security in GSM
Security services

 Access control/Authentication
 This includes user authentication i.e. SIM (Subscriber Identity Module):
user must enter secret PIN (personal identification number) to access the
SIM.
 Confidentiality
 The entire user related data need to be encrypted . encryption is applied to
voice , data and signaling.
 This Confidentiality exists between MS & BTS, it may not exist end to end
or within whole GSM & PSTN network.

May 9, 2024 MRITUNJAY OJHA 43


Security in GSM

Anonymity
 The identity of user is always hidden to the air i.e. TMSI
(Temporary Mobile Subscriber Identity)’
 To provide anonymity , the user data is encrypted before transmission.

3 Algorithms specified in GSM

 A3 for authentication (“secret”, open interface)


 A5 for encryption (standardized)
 A8 for key generation (“secret”, open interface)

May 9, 2024 MRITUNJAY OJHA 44


GSM - Authentication

Any GSM subscriber need Authentication before he /she can access the GSM services.
The authentication based on SIM. SIM stores the authentication key Ki , the user
identification number IMSI & authentication algorithm A3.
Authentication involves the following steps:
• The Access control (AC) generates a 128 bit Random number(RAND) as a challenge.
• The VLR sends the RAND to SIM.
• The SIM now calculate a signed response(SRES) from the RAND and authentication key
Ki by applying authentication algorithm A3.
• Similarly the access response also calculates a signed response SRES*.
• The MSC compares the value of SRES & SRES*. if these values are same then the
subscriber is accepted otherwise rejected.

May 9, 2024 MRITUNJAY OJHA 45


GSM - Authentication

mobile network SIM

RAND
Ki RAND RAND Ki

AC 128 bit 128 bit 128 bit 128 bit

A3 A3
SIM
SRES* 32 bit SRES 32 bit

SRES
MSC SRES* =? SRES SRES
32 bit

Ki: individual subscriber authentication key SRES: signed response


AC:Acess control

May 9, 2024 MRITUNJAY OJHA 46


GSM - key Generation and Encryption
 Ones the Authentication done the MS & BTS starts encryption.

 Encryption involves the following steps:


 The SIM & Access control (AC) generates cipher key Kc, from the
authentication key Ki & 128 bit Random number(RAND) by applying the
algorithm A8 .
 The MS & BTS can now encrypt & decrypt data by using 64 bit cipher key
(Kc) & encryption algorithm A5 .

May 9, 2024 MRITUNJAY OJHA 47


GSM - key Generation and Encryption

mobile network (BTS) MS with SIM

RAND
Ki RAND RAND Ki
AC 128 bit 128 bit 128 bit 128 bit SIM

A8 A8

cipher Kc
key 64 bit Kc
64 bit
data encrypted SRES
data
BTS
data MS
A5 A5

May 9, 2024 MRITUNJAY OJHA 48


Disadvantages of GSM
 There is no perfect system.
 No end-to-end encryption of user data
 No full ISDN bandwidth of 64 Kbit/s to the user, no transparent B-channel
 Reduced concentration while driving
 Electromagnetic radiation
 Abuse of private data possible
 Roaming profiles accessible
 High complexity of the system
 Several incompatibilities within the GSM standards

May 9, 2024 MRITUNJAY OJHA 49


Roadmap

 1
.

 Data Services in GSM II(GPRS)


1

 Advantages and Disadvantages of GPRS


 GPRS protocol Architecture
 2
.
1
 2
.
2
 2
.
3

May 9, 2024 MRITUNJAY OJHA 50


Data Services in GSM II
 GPRS (General Packet Radio Service)
• Standardization 1998, introduction 2000
• Packet switching
• Using free slots only if data packets ready to send (e.g., 115 Kbit/s using 8 slots temporarily)
• General Packet Radio Service is an overlay on top of GSM physical layer and network
entities.
• It extends data capabilities of GSM and provides connection to external packet data
networks through the GSM infrastructure.
• Short access time to the network for independent short packets (500 – 1000 bytes) .
• No hardware changes to the BTS/BSC .
• Easy to scale
• Support for both voice/data and data only terminals .
• High throughput (up to 200 kbps) .
• User-friendly billing.

May 9, 2024 MRITUNJAY OJHA 51


General Packet Radio Service
Advantages of GPRS
• Very flexible.
• Fully packet oriented.
• Better quality of Data services.
• No connection needed to setup prior to data transfer

Disadvantages of GPRS
• Additional network elements required to implement GPRS .
• GPRS exhibits large jitters ( up to several 100ms) as compared fixed network.
• The real available data rates depends heavily on network load as GPRS typically uses only
idle time slot.

May 9, 2024 MRITUNJAY OJHA 53


Data Services in GSM II

GPRS (General Packet Radio Service):

 GPRS network elements


• GSN (GPRS Support Nodes): GGSN and SGSN

• GGSN (Gateway GSN): Interworking unit between GPRS and PDN (Packet Data Network)

• SGSN (Serving GSN): Supports the MS (location, billing, security)

• GR (GPRS Register): User addresses

May 9, 2024 MRITUNJAY OJHA 54


GPRS Architecture and Interfaces

SGSN

Gn

BSS SGSN GGSN PDN


MS

Um Gb Gn Gi

MSC HLR/
GR

VLR EIR

PDN-packet
data network

May 9, 2024 MRITUNJAY OJHA 55


GPRS Architecture and Interfaces
The GPRS architecture consists of
Gateway GPRS support node(GGSN):
• Is the interworking unit between the GPRS network and external packet data networks(PDN)
• This node contains routing information for GPRS users, performs address conversion, and
tunnels
data to a user via encapsulation
Serving GPRS support node(SGSN):
• Supports the MS via Gb interface.
• It requests user addresses from GPRS register(GR)
• Track of the individual MS’s location
• Collects billing information and security functions such as access control.

May 9, 2024 MRITUNJAY OJHA 56


GPRS Protocol Architecture

MS Um BSS Gb SGSN Gn GGSN Gi


apps.

IP/X.25 IP/X.25

SNDCP GTP
SNDCP GTP
LLC LLC UDP/TCP UDP/TCP

RLC BSSGP IP IP
RLC BSSGP
MAC MAC
FR FR L1/L2 L1/L2
radio radio

May 9, 2024 MRITUNJAY OJHA 57


GPRS Protocol Architecture
The various protocols are involved are :

GPRS tunneling protocol (GTP) : It is responsible for all the data transfer
 between the GSNs.

2. TCP/UDP : Depending on the requirement , GTP can use either TCP or UDP as
the transport layer protocol.
 TCP is used in reliable data transfer is required (X.25 packet transfer).
 UDP is used in non-reliable data transfer is required ( IP packet transfer).

May 9, 2024 MRITUNJAY OJHA 58


GPRS Protocol Architecture
3. Sub network dependent Convergence Protocol (SNDCP): It is used between SGSN
& MS to adopt to the characteristics of the underlying network.
• The user data packet is tunneled between the MS & GGSN on top of SDCP & GTP.

4. Logical Link Control: It is used to provide the reliable data transfer between MS &
SGSN.

5. Base station subsystem GPRS protocols (BSSGP): This protocol is used to convey
the QoS & routing related information the BSS & SGSN.
• It works on top of the frame relay (FR) network.
• It does not perform any error correction.
May 9, 2024 MRITUNJAY OJHA 59
GPRS Protocol Architecture
6. Radio link protocol (RLP): It is used to provide the reliable link data transfer
between MS & BSS.

7. Medium Access Control: Responsible for controlling the medium access & the
signaling procedures for the radio channels .Performs the mapping of LLC frames on
to the GSM physical channels.

May 9, 2024 MRITUNJAY OJHA 60

You might also like