Chapter-2 GSM Shared
Chapter-2 GSM Shared
Chapter-2 GSM Shared
GSM
1.1
2.2
2.3
1000
GSM total
800
Subscribers [million]
TDMA total
CDMA total
600 PDC total
Analogue total
Total wireless
400
Prediction (1998)
200
0
year
1996 1997 1998 1999 2000 2001 2002
Full Form Global System for Mobile communication. Code Division Multiple Access.
Primary Goal: Provide a mobile system that allow users to roam throughout and provide
voice services compatible to ISDN and other PSTN systems
• Simultaneous introduction of essential services in three phases (1991, 1994, 1996) by the
European telecommunication administrations
• Today many providers all over the world use GSM (more than 190 countries in Asia, Africa,
Europe, Australia, America)
• More than 1300 million subscribers in world & 45 million subscriber in India.
May 9, 2024 MRITUNJAY OJHA 7
GSM Developments
GSM 900
Mobile to BTS (uplink): 890-915 Mhz BTS to
Mobile(downlink):935-960 Mhz
tele services
Non-Voice-Teleservices:
• Group 3 fax : Fax data is transmitted like digital data over analog telephone
network
• Voice mailbox : (implemented in the fixed network supporting the mobile
terminals)
• Electronic mail : (MHS, Message Handling System, implemented in the fixed
network)
• Short Message Service (SMS): Alphanumeric data transmission to/from the
mobile terminal using the signaling channel,
thus allowing simultaneous use of basic
services and SMS
1.
1
GSM Architecture
2.
1
2.
2
2.
3
BSC
BSC
RSS
May 9, 2024
Operation and Maintenance Center (OMC)
MRITUNJAY OJHA 17
GSM: Elements and Interfaces
radio cell
BSS
MS MS
Um radio cell
RSS-Radio subsystem
RSS BTS MS
BTS
NSS-Network and
Abis
switching subsystem
BSC BSC
A
NSS signaling
VLR VLR
ISDN, PSTN
HLR GMSC
PDN
IWF
O
OSS
EIR AUC OMC
EIR
Databases
• HLR (Home Location Register)-Stores user
relevant information. Static information
SS7
HLR
• VLR (Visitor Location Register)-Dynamic
information
VLR
ISDN
MSC
PSTN
IWF
PSPDN
CSPDN
1.
1
2.
2
2.
3
Um Abis A
MS BTS BSC MSC
CM CM
MM MM
BSSAP
BSSAP
RR RR’
RR’ BTSM BTSM
SS7 SS7
LAPDm LAPDm LAPD LAPD
Layer 2: Data link layer is LAPDm ,as the name derived from link access
procedure for the D-channel(LAPD) in ISDN system, which is version
of HDLC(high level data link control). LAPDm is lightweight because it does
not need synchronization flags or check summing for
error detection .
May 9, 2024 MRITUNJAY OJHA 28
Frame format (LAPDm)
• Address field: Is used to carry the service access point identifier (SAPI), protocol revision
type, nature of the message
• SAPI : When using command/control frames, the SAPI identifies the user for which a
command frame is intended, and the user transmitting a response frame
• Control field: Is used to carry Sequence number and to specify the types of the frame
(command or response)
• Length indicator: Identifies the length of the information field that is used to distinguish
the information carrying filed from fill-in bits
• Information Field: Carries the Layer III payload
• Fill-in bits: All “1” bits to extend the length to the desired 184 bits
1. Mobile-terminated call : A terminated call in the GSM network is a call received on a mobile
device. For an MT to be
placed, it is necessary to locate the network to
which the called subscriber is currently connected, and, once this is
done, to route the call towards the
destination MS.
2. Mobile-originated call : A call originating from a mobile device (MS) in the GSM network is
routed through the core network to the
destination party.
4.26.1
May 9, 2024 MRITUNJAY OJHA 34
Mobile Originated Call
1, 2: Connection request
VLR
3, 4: Security check
3 4
5-8: Check resources (free 6 5
circuit) PSTN GMSC MSC
7 8
9-10: Set up call 2 9
1
MS BSS
10
1
.
Handovers
1
Security in GSM
Disadvantages of GSM
Data Services in GSM II
2
.
1
2
.
2
2
.
3
Inter –cell intra –BSC handover: The mobile station moves from one cell to another ,
but stays within the control of the same BSC. The BSC then performs a handover ,
assigns a new radio channel in the new cell and releases the old one ( scenario 2) .
Inter –BSC intra –MSC handover : As a BSC only controls a limited number of
cells , GSM also has to perform handovers between cells controlled by different BSCs .
this handover then has to be controlled by the MSC (Scenario 3 ) .
Inter MSC handover: a handover could be required between two cells belonging to
different MSCs . Now both MSCs perform the handover together(scenario 4).
May 9, 2024 MRITUNJAY OJHA 39
Types of Handover
1)Intracell 2)Intercell 3)Inter BSC 4)Inter MSC
1
2 3 4
MS MS MS MS
MSC MSC
HO_MARGIN
MS MS
BTSold BTSnew
HO decision
HO required HO request
resource allocation
ch. activation
HO complete HO complete
clear command clear command
clear complete clear complete
Access control/Authentication
This includes user authentication i.e. SIM (Subscriber Identity Module):
user must enter secret PIN (personal identification number) to access the
SIM.
Confidentiality
The entire user related data need to be encrypted . encryption is applied to
voice , data and signaling.
This Confidentiality exists between MS & BTS, it may not exist end to end
or within whole GSM & PSTN network.
Anonymity
The identity of user is always hidden to the air i.e. TMSI
(Temporary Mobile Subscriber Identity)’
To provide anonymity , the user data is encrypted before transmission.
Any GSM subscriber need Authentication before he /she can access the GSM services.
The authentication based on SIM. SIM stores the authentication key Ki , the user
identification number IMSI & authentication algorithm A3.
Authentication involves the following steps:
• The Access control (AC) generates a 128 bit Random number(RAND) as a challenge.
• The VLR sends the RAND to SIM.
• The SIM now calculate a signed response(SRES) from the RAND and authentication key
Ki by applying authentication algorithm A3.
• Similarly the access response also calculates a signed response SRES*.
• The MSC compares the value of SRES & SRES*. if these values are same then the
subscriber is accepted otherwise rejected.
RAND
Ki RAND RAND Ki
A3 A3
SIM
SRES* 32 bit SRES 32 bit
SRES
MSC SRES* =? SRES SRES
32 bit
RAND
Ki RAND RAND Ki
AC 128 bit 128 bit 128 bit 128 bit SIM
A8 A8
cipher Kc
key 64 bit Kc
64 bit
data encrypted SRES
data
BTS
data MS
A5 A5
1
.
Disadvantages of GPRS
• Additional network elements required to implement GPRS .
• GPRS exhibits large jitters ( up to several 100ms) as compared fixed network.
• The real available data rates depends heavily on network load as GPRS typically uses only
idle time slot.
• GGSN (Gateway GSN): Interworking unit between GPRS and PDN (Packet Data Network)
SGSN
Gn
Um Gb Gn Gi
MSC HLR/
GR
VLR EIR
PDN-packet
data network
IP/X.25 IP/X.25
SNDCP GTP
SNDCP GTP
LLC LLC UDP/TCP UDP/TCP
RLC BSSGP IP IP
RLC BSSGP
MAC MAC
FR FR L1/L2 L1/L2
radio radio
GPRS tunneling protocol (GTP) : It is responsible for all the data transfer
between the GSNs.
2. TCP/UDP : Depending on the requirement , GTP can use either TCP or UDP as
the transport layer protocol.
TCP is used in reliable data transfer is required (X.25 packet transfer).
UDP is used in non-reliable data transfer is required ( IP packet transfer).
4. Logical Link Control: It is used to provide the reliable data transfer between MS &
SGSN.
5. Base station subsystem GPRS protocols (BSSGP): This protocol is used to convey
the QoS & routing related information the BSS & SGSN.
• It works on top of the frame relay (FR) network.
• It does not perform any error correction.
May 9, 2024 MRITUNJAY OJHA 59
GPRS Protocol Architecture
6. Radio link protocol (RLP): It is used to provide the reliable link data transfer
between MS & BSS.
7. Medium Access Control: Responsible for controlling the medium access & the
signaling procedures for the radio channels .Performs the mapping of LLC frames on
to the GSM physical channels.