2G ARCHITECURE Presentation
2G ARCHITECURE Presentation
PRESENTED BY
REJOICE
RUTH
NORMAN
SHAWN
INTRODUCTION
• Cell phones received their first major upgrade when they went from 1G to 2G.
• The main difference between the two mobile telephone systems (1G and 2G), is that the Radio
signals used by 1G network are analog, while in 2G networks they are digital.
• Second generation , 2G cellular telecom networks were commercially launched on the GSM
standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991.
• Main motive of this generation was to provide secure and reliable communication channel.
• 2G was based on GSM (Global System for Mobile Communication) technology.
• 2G system used combination of TDMA (Time Division Multiple Access) and FDMA (Frequency
Division Multiple Access).
• Due to this more users were able to connect at a time in a given frequency band.
2
INTRODUCTION
As shown in the figure, a specific frequency slot was divided into time slots, so
multiple user can use a specific frequency slot.
• The GSM system used 25 MHz frequency spectrum in a 900 MHz band. A
speed of around 14.4 Kbps was obtained in basic 2G network.
• The core network used in 2G was PSTN (Public Switched Telephone
Network) and Circuit switching was also used in GSM.
3
2G SERVICES
4
SERVICES OFFERED BY 2G/GSM
Base Services :
Bearer services
Tele-services
Then:
• Supplementary services
5
BEARER SERVICES
6
TELE-SERVICES
• Enable communication between users based on protocols agreed on by the network operators.
• They affect final link in the communication process- the end users
• They include telephone services, emergency calls, short message services, email and fax.
• They provide voice and non-voice services:
• Voice services include speech telephony and Emergency calls
• Non-voice services include Short Message Services (SMS) which can be received even over an ongoing call
and are transmitted over signalling channels. It also includes Normal messages which are stored in the
SMSC – Short Message Services Centre.
7
SUPPLEMENTARY SERVICES
Modify or add to the base services (bearer and tele services) like line identification and call
forwarding.
Controlled by both the subscriber (customer) and network operators
There are 2 groups of services:
• 1 Services from service provider and made available to a customer
• 2 Services invoked by customers - the desired service is activated by a customer pressing a
certain key.
8
SUPPLEMENTARY SERVICES
9
SUPPLEMENTARY SERVICES
Call Offering Services – Allow customers to forward incoming calls to other target
numbers.
Call Forwarding Unconditional (CFU) – ensures all incoming calls are diverted to a
number provided by the customer independent of the conditions of the call.
Call Forwarding on mobile subscriber Busy (CFB) – diverts calls only if the called
subscriber is already making a call and the line is busy and also if the called party can’t
be reached because of no or poor network access and if phone is switched off or if call
is not accepted (i.e. ignored).
Optimal Routing Services (SOR) – calls are routed directly to called party current
location based on information provided by its home network and thus eliminating the
call forwarding part. Not yet implemented.
10
SUPPLEMENTARY SERVICES
Call Completion Services – Allow customer to postpone incoming calls they’re currently
not able to answer or hold calls while simultaneously making another call.
Call Waiting (CW) – notifies customer of incoming call for up to 2 minutes before answering.
Call Holding Service (HOLD) – holds interrupted call while on another one.
11
4.VALUE ADDED SERVICES
12
2G ARCHITECTURE
13
2G ARCHITECTURE COMPONENTS
14
IMPORTANT DEFINITIONS
15
2G/GSM ARCHITECTURE DIAGRAM
16
ANOTHER DIAGRAM
17
1. MOBILE STATION (MS)
18
2.BASE TRANSCEIVER STATION (BTS)
• It facilitates wireless communication between the mobile device and the network
• it possesses the radio transmitter-receivers and antenna that tends to communicate directly
with the mobile phones
• it receives the radio waves from the Mobile Station and converts them into a digital format
with an aim to transmit them to the BSC (Base Station Controller)
• it also takes the digital signals from BSC (Base Station Controller) and convert the same into
radio waves which are then transmitted to the mobile station
19
3.BASE STATION CONTROLLER (BSC)
20
MOBILE SWITCHING CENTRE (MSC)
• This is a type of Mobile Switching Centre (MSC) that is used to route calls outside the mobile
network.
• Whenever a call for a mobile subscriber comes from outside the mobile network, or the
subscriber wants to make a call to somebody outside the mobile network the call is routed
through the GMSC.
• It connects the Mobile Station to other networks e.g. PSTN, ISDN and PDN
22
HOME LOCATION REGISTER (HLR)
• it acts a permanent database for all kind of subscription information until that subscription is
cancelled
• The subscription information stored in the home location register include:
1. Subscriber identity (i.e. IMSI, MSISDN) – (IMSI is used to identify a subscriber by the operator
(e.g. Econet )But MSISDN is the number which is used for dialing(your telephone number))
2. Supplementary Services Subscribed to (Caller Tone, Missed Call Alert, Any Other Services
etc.)
3. Subscriber Current Location
23
7. VISITOR LOCATION REGISTER
(VLR)
• This is temporary storage database integrated(combined , joined) with the Mobile Switching
Centre
• The VLR contains the exact location of all mobile subscribers currently present in the service
area of the MSC.
• This information is necessary to route a call to the right base station.
• The database entry of the subscriber is deleted when the subscriber leaves the service area
of the MSC .
24
8. EQUIPMENT IDENTITY REGISTER (EIR)
• It uses the IMEI of the Mobile Station to ensure if the Mobile Station is valid
• The Mobile Station sends its IMEI to the EIR
• On reception of the IMEI number, the EIR examines three lists:
1. A black list containing all equipment that should be denied access because it has been reported as either stolen
or lost
2. The whitelist contains all the equipment identities that are permitted access to a network and services .
3. The grey list contains all equipment that has not been barred from the network but are tracked by the
network(for evaluation and other reasons).They are blacklisted if they continuously cause problems for the
Network Operator
• The result is sent to MSC/VLR, which then decides whether or not to allow network access for the
terminal equipment ( Mobile station)
25
9.AUTHENTICATION CENTRE (AUC)
• It is regarded as the protected database which contains the secret key in the SIM card
• When the user wants to use the network the Authentication Centre compares the key from
the SIM with its stored key
• If the key from the SIM matches the secret key stored in the Authentication Center then the
user is granted access to the network
• This ensures than unauthorized users cannot access the network
26
MOBILE TO PSTN USER CALL
27
DIAGRAM
28
DESCRIPTION
1. The MS sends the dialed number indicating service requested to the MSC (via BSC)
2. The MSC checks from the VLR if the MS is allowed the requested service. If so,
MSC asks BSC to allocate necessary resources for the call.
3. If the call is allowed, the MSC routes the call to GMSC.
4. The GMSC routes the call to the local exchange of called user.
5. The LE alerts (applies ringing) the called terminal.
6. Answer back (ring back tone) from the called terminal to LE.
29
ADVANTAGES AND DISADVANTAGES OF 2G
30
ADVANTAGES OF 2G/GSM
31
DISADVANTAGES OF 2G/GSM
GSM provides limited data rate capability, for higher data rate GSM
advanced version devices are used.
GSM uses pulse based burst transmission technology and hence it
interferes with certain electronics. Due to this fact airplanes, petrol bunks
and hospitals prevent use of GSM based mobile or other gadgets.
In order to increase the coverage repeaters are required to be installed.
32
33