0% found this document useful (0 votes)
19 views47 pages

Module 2 GSM

The document outlines the Mobile Computing course at Fr. Conceicao Rodrigues College of Engineering, detailing its objectives, outcomes, and specific modules related to GSM mobile services. It covers the architecture, features, and security aspects of GSM, as well as the General Packet Radio Service (GPRS) and its functionalities. Additionally, it explains the operation of GSM systems, including call processes and the GSM protocol stack.

Uploaded by

71-Chirag Adve
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views47 pages

Module 2 GSM

The document outlines the Mobile Computing course at Fr. Conceicao Rodrigues College of Engineering, detailing its objectives, outcomes, and specific modules related to GSM mobile services. It covers the architecture, features, and security aspects of GSM, as well as the General Packet Radio Service (GPRS) and its functionalities. Additionally, it explains the operation of GSM systems, including call processes and the GSM protocol stack.

Uploaded by

71-Chirag Adve
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Fr.

Conceicao Rodrigues College of Engineering


Fr. Agnel Ashram , Bandstand Bandra (West)

Mobile Computing
Course Code: CSC 603
SEM VI
Department of Computer Engineering
2024-2025
Course Objectives

1. To introduce the basic concepts and principles in mobile


computing. This includes major techniques involved, and networks
& systems issues for the design and implementation of mobile
computing systems and applications.

2. To explore both theoretical and practical issues of mobile


computing.
3. To provide an opportunity for students to understand the key
components and technologies involved and to gain hands-on
experiences in building mobile applications.
Course Outcome

On successful completion of course learner will be able


1.To identify basic concepts and principles in
mobile communication & computing, cellular architecture.
2.To describe the components and functioning of mobile networking.
3.To classify variety of security techniques in mobile network.
4.To apply the concepts of WLAN for local as well as remote
applications.
5.To describe and apply the concepts of mobility management
6.To describe Long Term Evolution (LTE) architecture and its interfaces.
Module 2:GSM Mobile services [8 Hrs]

2.1 GSM Mobile services, System Architecture, Radio


interface, Protocols, Localization and Calling, Handover,
security (A3, A5 & A8)

2.2 GPRS system and protocol architecture

2.3 UTRAN, UMTS core network; Improvements on


Core Network
GSM in Wireless Communication
GSM stands for Global System for Mobile Communication.
GSM is an open and digital cellular technology used for
mobile communication. It uses 4 different frequency bands of
850 MHz, 900 MHz, 1800 MHz and 1900 MHz. It uses the
combination of FDMA and TDMA. This article includes all
the concepts of GSM architecture and how it works.

GSM is having 4 different sizes of cells are used in GSM:


1.Macro : In this size of cell, Base Station antenna is installed.
2.Micro : In this size of cell, antenna height is less than the average
roof level.
3.Pico : Small cells’ diameter of few meters.
4.Umbrella : It covers the shadowed (Fill the gaps between cells)
regions.
5G signal relay tower on the Mountain
Antenna Cluster (Array)
Features of GSM are:

1.Supports international roaming


2.Clear voice clarity
3.Ability to support multiple handheld devices.
4.Spectral / frequency efficiency
5.Low powered handheld devices.
6.Ease of accessing network
7.International Integrated Services Digital Network (ISDN)
compatibility.
GSM is nothing but a larger system which is divided into
further 3 subsystems
1.BSS: BSS stands for Base Station Subsystem. BSS handles traffic
and signaling between a mobile phone and the network switching
subsystem. BSS having two components BTS (Base Transceiver
Station) and BSC(Base Station Controller).

2.NSS: NSS stands for Network and Switching Subsystem. NSS is


the core network of GSM. That carried out call and mobility
management functions for mobile phone present in network. NSS have
different components like VLR, HLR and EIR (Equipment Identity
Register).

3.OSS: OSS stands for Operating Subsystem. OSS is a functional


entity which the network operator monitor and control the system.
OMC is the part of OSS. Purpose of OSS is to offer the customer cost-
effective support for all GSM related maintenance services.
GSM Architecture
GSM Architecture
Functionality of different components

1. MS: MS stands for Mobile System. MS comprises user equipment and


software needed for communication with a mobile network.
Mobile Station (MS) = Mobile Equipment(ME) + Subscriber Identity
Module (SIM).
Now, these mobile stations are connected to tower and that tower
connected with BTS through TRX. TRX is a transceiver which comprises
transmitter and receiver. Transceiver has two performance of sending and
receiving.

2. BTS: BTS stands for Base Transceiver Station which facilitates


wireless communication between user equipment and a network. Every
tower has BTS.

3. BSC: BSC stands for Base Station Controller. BSC has multiple BTS.
You can consider the BSC as a local exchange of your area which has
4. MSC: MSC stands for Mobile Switching Center. MSC is
associated with communication switching functions such as call
setup, call release and routing. Call tracing, call forwarding all
functions are performed at the MSC level. MSC is having further
components like VLR, HLR, AUC, EIR and PSTN.

VLR: VLR stands for Visitor Location Register. VLR is a


database which contains the exact location of all mobile subscribers
currently present in the service area of MSC.
If you are going from one state to another state then your entry is
marked into the database of VLR.

HLR: HLR stands for Home Location Register. HLR is a database


containing pertinent data regarding subscribers authorized to use a
GSM network. If you purchase SIM card from in the HLR.
HLR is like a home which contains all data like your ID proof,
which plan you are taking, which caller tune you are using etc.
OMC: OMC stands for Operation Maintenance Center. OMC
monitor and maintain the performance of each MS, BSC and MSC
within a GSM system.

AUC: AUC stands for Authentication Center. AUC authenticates the


mobile subscriber that wants to connect in the network.

EIR: EIR stands for Equipment Identity Register. EIR is a database


that keeps the record of all allowed or banned in the network. If you are
banned in the network them you can’t enter the network, and you can’t
make the calls.

PSTN: PSTN stands for Public Switched Telephone Network. PSTN


connects with MSC. PSTN originally a network of fixed line analog
telephone systems. Now almost entirely digital in its core network and
includes mobile and other networks as well as fixed telephones. The
earlier landline phones which places at our home is nothing but PSTN.
Three subsystem BSS, NSS and OSS are connected with
each other via some interfaces.
Total three interfaces are there:

1.Air Interface: Air interface is also known as UM


interface. Interface between MS and BTS is called as UM
interface because it is mobile analog to the U interface of
ISDN.

2.Abis Interface: It is a BSS internal interface linking


with BTS and BSC.

3.A interface: It provides communication between BSS


and MSC.
General Packet Radio Service (GPRS)

• GPRS is an expansion Global System for Mobile Communication.


• It is basically a packet-oriented mobile data standard on the 2G and
3G cellular communication network’s global system for mobile
communication.
• GPRS was built up by European Telecommunications Standards
Institute (ETSI).
• GPRS overrides the wired associations, as this framework has
streamlined access to the packet information’s network like the
web.
• The packet radio standard is utilized by GPRS to transport client
information packets in a structured route between GSM versatile
stations and external packet information networks.
• These packets can be straightforwardly directed to the packet
changed systems from the GPRS portable stations.
History of GPRS:
• GPRS was one of the main advances that empowered a cell system
to interface with Internet Protocol systems, accomplishing across the
board reception in the mid-2000s.
• The capacity to peruse the web from a telephone whenever through
“dependably on” data networking, while underestimated in a great
part of the world today, was as yet an oddity when it was introduced.
• Indeed, even now, GPRS keeps on being utilized in parts of the
world where it has been too expensive even to consider upgrading
cell organize framework to move up to newer alternatives.
• According to a study on the history of GPRS development Bernhard
Walke and his student, Peter Decker (RWTH Aachen University in
Germany.), are the inventors of GPRS – the first system providing
universal mobile Internet access.
Goals of GPRS:
1.Consistent IP services
2.Leverage industry investment in IP
3.Open Architecture
4.Service innovation independent of infrastructure

Services Offered:
1.SMS messaging and broadcasting
2.Push-to-talk over cellular
3.Instant messaging and presence
4.Multimedia messaging service
5.Point-to-Point and Point-to-Multipoint services
Protocols supported:
1.Internet Protocol (IP)
2.Point-To-Point Protocol (PPP)

Benefits of GPRS:
• Mobility:
The capacity to keep up consistent voice and information interchanges
while moving.
• Cost Efficient:
Communication via GPRS is cheaper than through the regular GSM
network.
• Immediacy:
Allows customers to obtain connectivity when needed, regardless of
location and without a lengthy login session.
• Localization:
Enables customers to acquire data applicable to their present area.
• Easy Billing:
GPRS packet transmission offers an easier to use billing than that
offered by circuit switched administrations.
GPRS architecture in wireless communication

• GPRS stands for General Packet Radio Service.

• It is the modified version of GSM architecture service.

• In GSM architecture we can only transport the voice signal.

• But if signal consists of the data then only GSM architecture


cannot use.

• For that there are two more software components are used, SGSN
(Serving GPRS supporting Node) and GGSN (Gateway GPRS
supporting Node).
GPRS Architecture
GPRS Architecture
• In GSM architecture there is one component called BSC.

• But in GPRS there is one component is added to BSC called


PCU. PCU stands for Packet Control Unit.

• If signal comes to BSC and that signal contains data, then


PCU routes to the SGSN.

• Interface is used between BSC and PCU is FRI interface.


After signal comes to SGSN, it delivers the data packet to
the GGSN.

• GGSN routes the data packet to the data network (PDN-


Predefined Data Network).
Task of SGSN (Serving GPRS
Supporting Node)
1.Packet Delivery

2.Mobility management
Apply/ sign off of terminals
Localization

3.LLC (Logical Link Control)


Management

4.Authentication

5.Billing
Task of GGSN (Gateway GPRS
supporting Node)

1.Mediator between GPRS between


backbone and external data networks.

2.Saves current data for the SGSN address


of the participant as well as their profile and
data for authentication and invoice.
GSM - Security and Encryption

• GSM is the most secured cellular telecommunications system


available today.

• GSM has its security methods standardized. GSM maintains end-


to-end security by retaining the confidentiality of calls and
anonymity of the GSM subscriber.

• Temporary identification numbers are assigned to the subscriber’s


number to maintain the privacy of the user.

• The privacy of the communication is maintained by applying


encryption algorithms and frequency hopping that can be enabled
using digital systems and signalling.
Mobile Station Authentication
The GSM network authenticates the identity of the subscriber through
the use of a challenge-response mechanism.

A 128-bit Random Number (RAND) is sent to the MS.

The MS computes the 32-bit Signed Response (SRES) based on the


encryption of the RAND with the authentication algorithm (A3) using
the individual subscriber authentication key (Ki).

Upon receiving the SRES from the subscriber, the GSM network
repeats the calculation to verify the identity of the subscriber.
Mobile Station Authentication
The individual subscriber authentication key (Ki) is never transmitted
over the radio channel, as it is present in the subscriber's SIM, as well
as the AUC, HLR, and VLR databases.

If the received SRES agrees with the calculated value, the MS has
been successfully authenticated and may continue.

If the values do not match, the connection is terminated and an


authentication failure is indicated to the MS.

The calculation of the signed response is processed within the SIM.

It provides enhanced security, as confidential subscriber information


such as the IMSI or the individual subscriber authentication key (Ki)
is never released from the SIM during the authentication process.
Signalling and Data Confidentiality

The SIM contains the ciphering key generating algorithm (A8) that is
used to produce the 64-bit ciphering key (Kc).

This key is computed by applying the same random number (RAND)


used in the authentication process to ciphering key generating
algorithm (A8) with the individual subscriber authentication key (Ki).

GSM provides an additional level of security by having a way to


change the ciphering key, making the system more resistant to
eavesdropping.
Signalling and Data Confidentiality

The ciphering key may be changed at regular intervals as required.


As in case of the authentication process, the computation of the
ciphering key (Kc) takes place internally within the SIM.

Therefore, sensitive information such as the individual subscriber


authentication key (Ki) is never revealed by the SIM.

Encrypted voice and data communications between the MS and the


network is accomplished by using the ciphering algorithm A5.

Encrypted communication is initiated by a ciphering mode request


command from the GSM network.

Upon receipt of this command, the mobile station begins encryption


and decryption of data using the ciphering algorithm (A5) and the
ciphering key (Kc).
Signalling and Data Confidentiality

The ciphering key may be changed at regular intervals as required.


As in case of the authentication process, the computation of the
ciphering key (Kc) takes place internally within the SIM.

Therefore, sensitive information such as the individual subscriber


authentication key (Ki) is never revealed by the SIM.

Encrypted voice and data communications between the MS and the


network is accomplished by using the ciphering algorithm A5.

Encrypted communication is initiated by a ciphering mode request


command from the GSM network.

Upon receipt of this command, the mobile station begins encryption


and decryption of data using the ciphering algorithm (A5) and the
ciphering key (Kc).
GSM Operation

Once a Mobile Station initiates a call, a series of events takes place.


Analyzing these events can give an insight into the operation of the
GSM system.

Mobile Phone to Public Switched Telephone Network (PSTN)

When a mobile subscriber makes a call to a PSTN telephone


subscriber, the following sequence of events takes place −

• The MSC/VLR receives the message of a call request.

• The MSC/VLR checks if the mobile station is authorized to access


the network. If so, the mobile station is activated. If the mobile
station is not authorized, then the service will be denied.
GSM Operation

• MSC/VLR analyzes the number and initiates a call setup with the
PSTN.

• MSC/VLR asks the corresponding BSC to allocate a traffic channel (a


radio channel and a time slot).

• The BSC allocates the traffic channel and passes the information to the
mobile station.

• The called party answers the call and the conversation takes place.

• The mobile station keeps on taking measurements of the radio channels


in the present cell and the neighbouring cells and passes the
information to the BSC. The BSC decides if a handover is required. If
so, a new traffic channel is allocated to the mobile station and the
handover takes place. If handover is not required, the mobile station
GSM Operation

PSTN to Mobile Phone

• When a PSTN subscriber calls a mobile station, the following sequence


of events takes place −

• The Gateway MSC receives the call and queries the HLR for the
information needed to route the call to the serving MSC/VLR.

• The Gateway MSC (GMSC) routes the call to the MSC/VLR.

• The MSC checks the VLR for the location area of the MS.

• The MSC contacts the MS via the BSC through a broadcast message,
that is, through a paging request.
GSM Operation

PSTN to Mobile Phone

• The MS responds to the page request.

• The BSC allocates a traffic channel and sends a message to the MS to


tune to the channel. The MS generates a ringing signal and, after the
subscriber answers, the speech connection is established.

• Handover, if required, takes place

• To transmit the speech over the radio channel in the stipulated time, the
MS codes it at the rate of 13 Kbps. The BSC transcodes the speech to
64 Kbps and sends it over a land link or a radio link to the MSC. The
MSC then forwards the speech data to the PSTN. In the reverse
direction, the speech is received at 64 Kbps at the BSC and the BSC
transcodes it to 13 Kbps for radio transmission.
GSM Protocol Stack

GSM architecture is a layered model that is designed to allow


communications between two different systems.

The lower layers assure the services of the upper-layer protocols.

Each layer passes suitable notifications to ensure the transmitted data has
been formatted, transmitted, and received accurately.
GSM Protocol Stack

The GMS protocol stacks diagram is shown below −GSM supports 9.6
Kbps data that can be channelled in one TDMA timeslot.
GSM Protocol Stack
MS Protocols
Based on the interface, the GSM signaling protocol is assembled into
three general layers −

Layer 1 − The physical layer. It uses the channel structures over the air
interface.

Layer 2 − The data-link layer. Across the Um interface, the data-link


layer is a modified version of the Link access protocol for the D channel
(LAP-D) protocol used in ISDN, called Link access protocol on the Dm
channel (LAP-Dm). Across the A interface, the Message Transfer Part
(MTP), Layer 2 of Signalling System-7 (SS7) is used.

Layer 3 − GSM signalling protocol’s third layer is divided into three


sublayers −
Radio Resource Management (RR), Mobility Management (MM), and
Connection Management (CM).
GSM Protocol Stack
MS to BTS Protocols

The RR layer is the lower layer that manages a link, both radio and
fixed, between the MS and the MSC.
For this formation, the main components involved are the MS, BSS, and
MSC.
The responsibility of the RR layer is to manage the RR-session, the time
when a mobile is in a dedicated mode, and the radio channels including
the allocation of dedicated channels.

The MM layer is stacked above the RR layer.


It handles the functions that arise from the mobility of the subscriber, as
well as the authentication and security aspects. Location management is
concerned with the procedures that enable the system to know the
current location of a powered-on MS so that incoming call routing can
be completed.
GSM Protocol Stack
MS to BTS Protocols

The CM layer is the topmost layer of the GSM protocol stack.


This layer is responsible for Call Control, Supplementary Service
Management, and Short Message Service Management.
Each of these services are treated as individual layer within the CM
layer.
Other functions of the CC sublayer include call establishment, selection
of the type of service (including alternating between services during a
call), and call release.
GSM Protocol Stack
BSC Protocols
The BSC uses a different set of protocols after receiving the data from
the BTS. The Abis interface is used between the BTS and BSC.
At this level, the radio resources at the lower portion of Layer 3 are
changed from the RR to the Base Transceiver Station Management
(BTSM).
The BTS management layer is a relay function at the BTS to the BSC.

The RR protocols are responsible for the allocation and reallocation of


traffic channels between the MS and the BTS.
These services include controlling the initial access to the system,
paging for MT calls, the handover of calls between cell sites, power
control, and call termination.
GSM Protocol Stack
BSC Protocols

The BSC still has some radio resource management in place for the
frequency coordination, frequency allocation, and the management of
the overall network layer for the Layer 2 interfaces.

To transit from the BSC to the MSC, the BSS mobile application part or
the direct application part is used, and SS7 protocols is applied by the
relay, so that the MTP 1-3 can be used as the prime architecture.
GSM Protocol Stack
MSC Protocols
At the MSC, starting from the BSC, the information is mapped across
the A interface to the MTP Layers 1 through 3.

Here, Base Station System Management Application Part (BSS MAP)


is said to be the equivalent set of radio resources.

The relay process is finished by the layers that are stacked on top of
Layer 3 protocols, they are BSS MAP/DTAP, MM, and CM.

This completes the relay process. To find and connect to the users
across the network, MSCs interact using the control-signalling network.

Location registers are included in the MSC databases to assist in the


role of determining how and whether connections are to be made to
roaming users.
GSM Protocol Stack
MSC Protocols

Each GSM MS user is given a HLR that in turn comprises of the user’s
location and subscribed services.
VLR is a separate register that is used to track the location of a user.
When the users move out of the HLR covered area, the VLR is notified
by the MS to find the location of the user.
The VLR in turn, with the help of the control network, signals the HLR
of the MS’s new location.
With the help of location information contained in the user’s HLR, the
MT calls can be routed to the user.
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy