1.
GSM Architecture:
GSM architecture consists of three main components: Mobile
Station (MS), Base Station System (BSS), and Network
Switching System (NSS).
BSS is further divided into Base Transceiver Station (BTS),
responsible for the radio communication with mobile devices,
and Base Station Controller (BSC), which manages multiple
BTS units.
NSS includes the Mobile Switching Center (MSC), responsible
for call routing and mobility management, the Home Location
Register (HLR) for storing subscriber information, the Visitor
Location Register (VLR) for temporary storage of subscriber
data, and the Authentication Center (AuC) for authentication
and encryption key generation.
2. Mobile Station (MS):
The Mobile Station is the user's mobile device, which includes
the physical phone and the Subscriber Identity Module (SIM)
card. The SIM card contains subscriber-specific information,
such as the International Mobile Subscriber Identity (IMSI) and
the Authentication Key (Ki).
3. Base Station System (BSS):
The BSS is responsible for the radio communication between
the mobile device and the network.
The Base Transceiver Station (BTS) handles the radio
communication with the mobile device.
The Base Station Controller (BSC) manages the resources in
the BTS, including handovers and frequency hopping.
4. Switching Subsystem:
The Switching Subsystem manages call routing, call control,
and mobility management.
The Mobile Switching Center (MSC) connects calls, manages
handovers, and controls mobile registration.
The Home Location Register (HLR) stores subscriber
information, while the Visitor Location Register (VLR)
temporarily stores information about subscribers currently
within the jurisdiction of the MSC.
The Authentication Center (AuC) is responsible for security
functions, including user authentication and encryption key
generation.
5. Security:
GSM employs several security measures to protect user data
and communication.
The use of SIM cards helps in user authentication and storage
of secret keys.
Encryption algorithms such as A5/1 and A5/3 are used to
secure voice and data communication.
6. Data Services:
Initially designed for voice communication, GSM evolved to
support data services.
Short Message Service (SMS) allows the exchange of short
text messages between mobile devices.
Circuit Switched Data (CSD) enables data transmission over a
dedicated circuit.
7. HSCSD (High-Speed Circuit-Switched Data):
HSCSD is an enhancement to GSM that allows for higher data
rates by using multiple time slots for data transmission.
It provides faster data transfer rates compared to traditional
Circuit Switched Data.
8. GPRS (General Packet Radio Service):
GPRS is a packet-switched technology that allows more
efficient use of network resources for data transmission.
It enables continuous and faster internet connectivity by
transmitting data in packets, leading to the introduction of
mobile internet services.
1) GPRS System and Protocol Architecture:
System Architecture:
1. Mobile Station (MS):
The user's mobile device equipped with GPRS capabilities.
2. GPRS Support Node (GSN):
GSN is a network node that routes and forwards data packets.
It includes two entities: Serving GPRS Support Node (SGSN)
and Gateway GPRS Support Node (GGSN).
3. Serving GPRS Support Node (SGSN):
Manages the connection to the mobile station within its
service area.
Performs packet routing and forwarding, mobility
management, and session management.
4. Gateway GPRS Support Node (GGSN):
Serves as a gateway between the GPRS network and external
packet data networks (PDNs) like the internet.
Allocates IP addresses to mobile devices.
5. Border Gateway (BG):
Connects different GPRS networks.
Protocol Architecture:
1. GPRS Mobility Management (GMM):
Manages the mobility of the mobile station within the GPRS
network.
2. GPRS Session Management (SM):
Manages the data sessions for packet-switched connections.
3. GPRS BSS (GPRS BSSGP):
Provides a service for the transfer of user data packets
between BSC and SGSN.
4. GPRS NS (GPRS NSP):
Provides reliable transmission of user data between SGSN and
GGSN.
5. GPRS LLC (Logical Link Control):
Responsible for error correction and flow control.
6. SNDCP (Subnetwork Dependent Convergence Protocol):
Adapts network layer packets to the characteristics of the
underlying subnetwork.
2) UTRAN (UMTS Terrestrial Radio Access Network)
and UMTS Core Network:
UTRAN:
1. NodeB (Base Station):
Responsible for the radio transmission and reception to/from
the mobile device.
Connects to the Radio Network Controller (RNC).
2. Radio Network Controller (RNC):
Controls multiple NodeBs.
Manages handovers, radio channel setup, and allocation.
3. Iub Interface:
Connects NodeB to RNC, carrying user and control plane
traffic.
UMTS Core Network:
1. Mobile Switching Center (MSC):
Connects voice calls, manages handovers, and controls mobile
registration.
2. Visitor Location Register (VLR):
Temporarily stores information about subscribers currently
within the jurisdiction of the MSC.
3. Home Location Register (HLR):
Stores subscriber information.
4. Serving GPRS Support Node (SGSN):
In the context of UMTS, SGSN is responsible for packet-
switched data services.
5. Gateway GPRS Support Node (GGSN):
Serves as a gateway between the UMTS network and external
packet data networks.
6. Media Gateway (MGW):
Interfaces between the circuit-switched and packet-switched
networks.
7. UMTS BSS (UMTS BSSGP):
Provides a service for the transfer of user data packets
between RNC and SGSN.
8. UMTS NS (UMTS NSP):
Provides reliable transmission of user data between SGSN and
GGSN.
9. UMTS LLC (Logical Link Control):
Responsible for error correction and flow control.
1) Improvements on Core Network:
Core Network Improvements:
1G to 5G Evolution:
Each generation of mobile networks brings improvements in
data rates, latency, and connectivity.
Core network enhancements play a crucial role in supporting
these advancements.
All-IP Network Architecture:
Evolution toward an all-IP network architecture for improved
efficiency and flexibility.
Network Function Virtualization (NFV):
Implementation of NFV to virtualize network functions,
enabling more scalable and adaptable networks.
Software-Defined Networking (SDN):
SDN allows for more dynamic and programmable network
management, enhancing control and automation.
Edge Computing:
Introduction of edge computing to bring computing resources
closer to end-users, reducing latency and improving
performance.
2) 802.11 Architecture, 802.11a, and 802.11b
Standard:
802.11 Architecture:
Overview:
The 802.11 family of standards defines the specifications for
implementing wireless local area networking (WLAN)
communication.
Components:
Station (STA):
Any device equipped with the necessary hardware for
WLAN communication.
Access Point (AP):
A networking hardware device that allows a Wi-Fi device
to connect to a wired network.
Basic Service Set (BSS):
A set of STAs and an AP that communicate with each
other.
Extended Service Set (ESS):
Multiple interconnected BSSs form an ESS, allowing
users to roam between different BSSs.
802.11a Standard:
Overview:
Part of the 802.11 family, 802.11a operates in the 5 GHz
frequency band.
Key Features:
Data Rates:
Offers higher data rates compared to 802.11b.
Frequency Band:
Operates in the 5 GHz band, reducing interference.
802.11b Standard:
Overview:
Another member of the 802.11 family, 802.11b operates in
the 2.4 GHz frequency band.
Key Features:
Data Rates:
Lower data rates compared to 802.11a but introduced a
more affordable option.
Frequency Band:
Operates in the 2.4 GHz band, which is more susceptible
to interference.
Unit 4
1) GSM MAP Service Framework:
GSM MAP (Mobile Application Part) Service Framework:
Overview:
MAP is a protocol within the SS7 (Signaling System No. 7) used
in telecommunication networks to perform various functions.
It facilitates the exchange of signaling messages for services
such as call handling, mobility management, and
supplementary services.
Components:
Service Control Function (SCF):
Part of the Home Location Register (HLR) or Visitor
Location Register (VLR).
Controls the execution of services.
Service Switching Function (SSF):
Part of the Mobile Switching Center (MSC).
Performs the actual execution of services.
Service Data Function (SDF):
Stores and retrieves service data.
Part of the HLR or VLR.
2) MAP Protocol Machine:
MAP Protocol Machine:
Dialogue:
The exchange of MAP messages between peer entities.
Initiates with the 'Begin' message and concludes with
the 'End' message.
Operation:
Consists of operations like 'Send-Receive,' 'Invoke,'
'Return Result,' 'Return Error,' etc.
Describes the actions performed at each stage of the
dialogue.
Transaction:
A sequence of MAP messages related to a specific
service.
Can involve multiple peer entities in a coordinated
effort.
3) GSM Location Management:
GSM Location Management:
Overview:
Manages the location of mobile subscribers within the
network.
Involves processes like registration, updating, and paging.
Location Area (LA):
Grouping of cells for location updating purposes.
Mobile stations report their location to the network when
entering a new LA.
Tracking Area (TA):
Group of LAs.
Reduces signaling overhead by updating location information
less frequently.
Location Update:
Mobile stations periodically update their location with the
network.
Performed when a mobile station enters a new LA or TA.
Paging:
The network locates a mobile station when there is an
incoming call or message.
Paging is directed to the current LA or TA of the mobile
station.
4) Transaction Management:
Transaction Management:
Overview:
In the context of telecommunications, transaction
management involves ensuring the consistency and reliability
of operations.
ACID Properties:
Atomicity: Transactions are treated as a single, indivisible
unit of work.
Consistency: Transactions take the system from one
consistent state to another.
Isolation: Each transaction is independent and does not
interfere with others.
Durability: Once a transaction is committed, its effects
persist, even in the case of system failures.
Transaction Processing in GSM:
Ensures that operations related to call setup, handovers, and
other network activities are carried out reliably.
ACID properties play a crucial role in maintaining the integrity
of the GSM network.
1) Mobile Database:
Mobile Database Overview:
Definition:
A mobile database refers to a database system specifically
designed to support mobile computing and communication.
Characteristics:
Accessibility: Mobile databases are accessible from mobile
devices, allowing users to retrieve and update information on
the go.
Synchronization: Data in mobile databases often needs to
be synchronized between the mobile device and the central
database to ensure consistency.
Mobility Support: Mobile databases are designed to support
the unique challenges of mobile environments, such as
intermittent connectivity and varying network conditions.
Security: Security measures are crucial to protect sensitive
information, especially in mobile scenarios where devices are
more susceptible to loss or theft.
Use Cases:
Mobile databases are commonly used in applications that
involve field service, sales, healthcare, logistics, and any
scenario where users need access to data while moving.
2) Introduction to Location Management (HLR and
VLR):
HLR (Home Location Register) and VLR (Visitor Location Register):
HLR Overview:
Definition: The HLR is a central database that stores
subscriber information for each mobile device in a mobile
network.
Information Stored: Includes subscriber profiles, current
location, and subscription details.
Functions: Handles subscriber registration, call routing, and
call forwarding.
VLR Overview:
Definition: The VLR is a temporary database associated with
each MSC (Mobile Switching Center) that stores information
about subscribers currently within its coverage area.
Functions: Manages location updates, call routing, and
handovers within its coverage area.
Location Management:
Location Area (LA): Grouping of cells for location updating
purposes.
Tracking Area (TA): Group of LAs to reduce signaling
overhead.
Location Update: Mobile stations periodically update their
location with the network.
3) VLR and HLR Failure Restoration:
Failure Restoration in HLR and VLR:
HLR Failure:
Redundancy: HLRs are typically designed with redundancy to
minimize the impact of failures.
Data Replication: Subscriber data may be replicated across
multiple HLRs for fault tolerance.
Disaster Recovery: Backup systems and disaster recovery
plans are in place to restore HLR functionality in case of a
failure.
VLR Failure:
Handover to Adjacent VLR: If a VLR fails, the mobile device
can be handed over to an adjacent VLR.
Data Recovery: Replicated data or data synchronization
mechanisms help in restoring subscriber information.
Network Reconfiguration: The network reconfigures to
redirect traffic and subscriber services to functional VLRs.
Overall Network Resilience:
Distributed Architecture: The distributed architecture of
mobile networks contributes to overall resilience.
Backup Systems: Redundant systems and backup
procedures are critical for maintaining network availability.
1) VLR Identification Algorithm, O-I, O-II Algorithm,
etc.:
VLR Identification Algorithm:
Overview:
The VLR (Visitor Location Register) Identification Algorithm is
used to determine which VLR is responsible for handling the
location updates and call-related information of a mobile
subscriber.
O-I and O-II Algorithms:
O-I Algorithm (Optimization I):
Used to optimize the search for a subscriber's VLR by
considering the geographical location.
O-II Algorithm (Optimization II):
A further optimization that takes into account the load
conditions of different VLRs, ensuring efficient
distribution of subscriber data.
2) Overview of Handoff Process; Factors Affecting
Handoffs; Performance Evaluation Metrics:
Overview of Handoff Process:
Definition:
Handoff, or handover, is the process of transferring an
ongoing call or data session from one cell to another without
interruption.
Factors Affecting Handoffs:
Signal Strength: Determines when to hand off a call to a
neighboring cell with a stronger signal.
Cell Load: If a cell is heavily loaded, a handoff may be
triggered to balance the network load.
Quality of Service (QoS): Ensures a seamless user
experience by maintaining call quality during handovers.
Velocity of Mobile Device: High-speed movement may
trigger handoffs to maintain connectivity.
Performance Evaluation Metrics:
Handoff Success Rate: Percentage of successful handoffs
without call drops.
Call Drop Rate: Percentage of calls that are dropped during
handoff.
Handoff Delay: Time taken to complete a handoff.
Resource Utilization: Efficient use of network resources
during handoffs.
3) Handoff Strategies; Different Types of Handoffs
(Soft, Hard, Horizontal, Vertical):
Handoff Strategies:
Mobile-Assisted Handoff (MAHO):
Mobile devices actively assist in the handoff process by
measuring signal strengths and reporting them to the
network.
Network-Controlled Handoff (NCHO):
The network takes control of the handoff process based on
measurements and criteria without active involvement from
the mobile device.
Types of Handoffs:
Soft Handoff:
A handoff where there is overlapping coverage between the
source and target cells.
The mobile device communicates with both cells
simultaneously, providing seamless handover.
Hard Handoff:
A handoff where the mobile device disconnects from the
source cell before connecting to the target cell.
There is a brief interruption during the handover.
Horizontal Handoff:
Involves a handoff between cells within the same network or
technology (e.g., from one GSM cell to another GSM cell).
Vertical Handoff:
Involves a handoff between cells operating on different
network technologies (e.g., from a cellular network to a Wi-Fi
network).
Unit 5
1) Mobile IP:
Definition:
Mobile IP is a protocol that enables mobile devices to maintain
continuous network connectivity while moving between
different IP subnets.
Key Components:
Home Agent (HA): Manages the registration and location of
mobile devices.
Foreign Agent (FA): Facilitates communication between the
mobile device and its home network.
Care-of Address (CoA): Temporary address assigned to the
mobile device in its current location.
2) IP Packet Delivery:
Overview:
IP (Internet Protocol) is responsible for routing packets across
networks. IP packet delivery involves the process of
transmitting packets from a source to a destination.
Routing:
Routers use routing tables to determine the best path for
packet delivery.
Packet Structure:
IP packets include source and destination IP addresses, along
with payload data.
3) Tunneling and Encapsulation:
Tunneling:
In networking, tunneling is the process of encapsulating one
network protocol within another.
Encapsulation:
Encapsulation involves adding headers to data as it moves
through the network.
4) IPv6, DHCP, Vehicular Ad Hoc Networks (VANET),
MANET:
IPv6 (Internet Protocol version 6):
The latest version of the Internet Protocol, designed to
address the limitations of IPv4 by providing a larger address
space.
DHCP (Dynamic Host Configuration Protocol):
DHCP dynamically assigns IP addresses to devices on a
network.
Vehicular Ad Hoc Networks (VANET):
VANETs enable communication between vehicles and roadside
infrastructure to enhance road safety and traffic efficiency.
MANET (Mobile Ad Hoc Network):
A self-configuring network of mobile devices connected
without the need for a fixed infrastructure.
5) Traditional TCP, Snooping TCP, Mobile TCP:
Traditional TCP:
Traditional TCP (Transmission Control Protocol) is designed for
fixed networks and may face challenges in mobile
environments.
Snooping TCP:
Snooping TCP adapts to network conditions by observing the
state of the network and adjusting its behavior.
Mobile TCP:
Mobile TCP is optimized for mobile networks, considering
factors like handovers and varying network conditions.
6) 3G Wireless Network:
Overview:
3G (Third Generation) wireless networks provide higher data
transfer rates compared to 2G networks, supporting
multimedia applications.
Features:
High-speed data transmission, video calls, and advanced
mobile services.
7) Wireless Application Protocol (WAP), WDP, WTP,
WML, WTA Architecture, Cellular IP:
Wireless Application Protocol (WAP):
A set of communication protocols to standardize the way
wireless devices access and interact with information on the
internet.
WDP (Wireless Datagram Protocol):
WDP is the transport layer in the WAP architecture,
responsible for the transmission of datagrams.
WTP (Wireless Transaction Protocol):
WTP ensures reliable and secure transactions between
wireless devices and servers.
WML (Wireless Markup Language):
WML is a markup language used for creating content in the
WAP environment.
WTA Architecture (Wireless Telephony Application):
WTA provides applications for wireless telephony, including
call control and management.
Cellular IP:
Cellular IP is a protocol designed for seamless handovers
between different wireless cells, ensuring uninterrupted
connectivity.
Unit 6
1) 3G and 4G Technologies for GSM and CDMA:
W-CDMA (Wideband Code Division Multiple Access):
A 3G technology that uses a wider bandwidth compared to
CDMA.
UMTS (Universal Mobile Telecommunications System):
A 3G mobile communication standard that incorporates W-
CDMA.
HSPA (High-Speed Packet Access):
An enhancement to 3G UMTS, providing higher data rates for
mobile networks.
2) HSDPA, HSUPA, HSPA+, TD-SCDMA, LTE (E-UTRA)
3GPP2 family CDMA2000 1x, 1xRTT, EV-DO:
HSDPA (High-Speed Downlink Packet Access):
An enhancement to 3G UMTS that increases downlink data
rates.
HSUPA (High-Speed Uplink Packet Access):
An enhancement to 3G UMTS that improves uplink data rates.
HSPA+ (Evolved High-Speed Packet Access):
An enhancement to HSPA, offering higher data rates for 3G
networks.
TD-SCDMA (Time Division-Synchronous Code Division
Multiple Access):
A Chinese-developed 3G standard.
LTE (Long-Term Evolution):
A 4G technology providing higher data rates and improved
network efficiency.
3) Long Term Evolution (LTE) in 4G:
Overview:
LTE is a 4G wireless communication standard designed to
provide faster data rates and improved spectral efficiency.
Key Features:
All-IP network architecture, high data rates, low latency, and
support for multiple frequency bands.
4) Architecture of 5G:
Overview:
5G (Fifth Generation) is the latest mobile communication
standard.
Key Components:
Radio Access Network (RAN): Includes base stations and
antennas.
Core Network (CN): Manages data traffic, authentication,
and connectivity.
User Equipment (UE): 5G-enabled devices like smartphones
and IoT devices.
5) Role of 5G in IoT:
Low Latency:
5G provides low-latency communication, essential for real-
time applications in the Internet of Things (IoT).
Massive Device Connectivity:
5G supports a massive number of connected devices
simultaneously.
High Data Rates:
Enhanced data rates in 5G enable high-throughput
communication for IoT devices.
Reliability:
5G offers reliable and consistent connectivity, crucial for
critical IoT applications