0% found this document useful (0 votes)
10 views216 pages

Lecture 3

The document provides an overview of GSM (Global System for Mobile Communications) services, detailing its operation within cellular networks and the technical specifications such as frequency ranges and data transmission methods. It describes the system architecture, including mobile stations, base station controllers, and mobile switching centers, as well as the roles of various protocols for data integrity and error correction. Additionally, it covers the functionalities of SIM cards, authentication processes, and the management of connections between mobile and fixed networks.

Uploaded by

singh.nitrr.ik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views216 pages

Lecture 3

The document provides an overview of GSM (Global System for Mobile Communications) services, detailing its operation within cellular networks and the technical specifications such as frequency ranges and data transmission methods. It describes the system architecture, including mobile stations, base station controllers, and mobile switching centers, as well as the roles of various protocols for data integrity and error correction. Additionally, it covers the functionalities of SIM cards, authentication processes, and the management of connections between mobile and fixed networks.

Uploaded by

singh.nitrr.ik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 216

GSM Services

 A mobile communication standard


 GSM communication─ uses cellular networks
 The GSM standard operates in the frequency ranges
of 900, 1800, and 1900 MHz
 Tri-band (operable in GSM 900/1800/1900) phones
enable easy international roaming in GSM networks
 GSM─ a second generation (2G) communication
standard
 Teleservices
 Supplementary services
 Bearer services
 Establishes between two TEs—source and destination
 The TE at destination may or may not belong to a
GSM network
Data transmission
 Transparent
 Non transparent
 Means that the interface for the service is using only
physical layer protocol
 Physical layer means the layer which transmits or
receives data after formatting or multiplexing using a
wired (wire or fibre) or wireless (radio or microwave)
medium
 The physical layer protocol in a GSM bearer service─
provides for FEC (forward error correction)
 Entails insertion of redundant bits along with the
transmitted data
 Redundant data allows the receiver to detect and

correct errors
 Also enables broadcast to multiple destinations from a
single source
 Advantageous in situations where retransmission is not
convenient though FEC requires higher bandwidths─
more bits per second
 Helps in broadcasting without handshaking and at FEC
transmission reduced data rates
 Assume m redundant bits appended in a data stream
of n bits
 Total numbers of data bits transmitted from the

sender’s end = (n + m) bits


 At the receiving end, an algorithm employed to detect

and correct transmission errors (error means 0


received as 1 or 1 received as 0)
 The algorithm extracts the original n bit streams from
the received (n + m) bit sequences
 Therefore, for every (n + m) bits sent by the sender,

the receiver receives only n bits of actual data


 Means that if the transmission channel offers a data

rate r, then the actual data transmission rate with FEC


is r  n  (n + m)
 When data transmits at GSM 9.6 kbps the data error
rates are high
 This is because when non-transparent data is

transmitted at GSM 9.6 kbps, there is no retransmission


and erroneous data just gets rejected
 Data above 9.6 kbps, non-transparent data-transfer used
 Non-transparent means the service interface uses
physical layer or special physical layer radio-link
protocol or data link layer, and flow control layer
protocols
 Provide for (i) error detection and correction and (ii)
selecting, rejecting, and re-transmitting the data,
respectively
 Data link layer— the layer which frames the data and
appends additional bits plus performing other functions
 Framing refers to combining and appending the

additional bits and header


 Flow control layer controls the flow of data by
selecting or rejecting erroneous data transmitted and by
re-transmitting erroneous data
 Becomes negligibly small at slow data rates (300 bps)
 Because when non-transparent data transmits at 300

bps, then the erroneous data is corrected or gets


retransmitted at data link and flow control layers
 A special error correction facility called RLP (radio
link protocol), used in GSM networks, is an example of
a non-transparent communication protocol
 RLP results in more robust transmission with very

small BER (bit error rate)


 Non-transparent communication protocol RLP results
in more robust transmission
 Very small BER
 Synchronous data transfer
 Asynchronous data transfer
 Synchronous data packet transfer
 Data transmitted from a transceiver at a fixed rate
 Constant phase differences (and thus time intervals)

maintained between data bursts or frames


 Receiver must synchronize the clock rate according to

the incoming data bit rates


 Receiver also synchronize data bits coming in from
multiple paths or stations and compensate for the
varied delays in received signals
 Handshaking is not required in synchronous

transmission of data
 Synchronous data transmission fast
 No waiting period during data transfer
 Voice converted into bits after coding in a GSM system
and the bits are transferred at data rates of 13 kbps as
synchronous data
 There are no in-between acknowledgements or waiting

periods in this faithful transmission of bits


 An SMS is transmitted through a GSM channel as
synchronous data
 There are no in-between acknowledgements and any

transmission errors are corrected using FEC


 Data transmitted by the transceiver at variable rates and
constant time intervals are not maintained between
consecutive bursts or frames
 There is usually handshaking or acknowledgement of

data in asynchronous data transfer


 But even if there is no acknowledgement, data flow
maintained by using the FEC plus buffers can still be
asynchronous
 Use of buffers causes variable delays in reception
 receiver ready
 receiver not ready
 unnumbered acknowledgement of acceptance of data

at the receiver, rejects, set asynchronous balance


mode, or disconnect
 Program files containing middleware for mobile

devices have to be transmitted by the mobile service


while maintaining full data integrity
 In file transfer cases the in-between acknowledgements
of faithful transmission of bits and reporting of errors
during transmission important
 Non-transparent Flow
 An acknowledgement is sent by the receiver for each
data set to the effect that the data set received is
identical to the one transmitted
 Time is, therefore, spent in implementing appropriate
algorithms for data set integrity checks and
acknowledgements
 This results in asynchronous data transmission
 After formation of packets
 Different packets transmitted through different
interfaces, routes, channels, or time-slots to reach a
common destination
 At the destination, various packets are arranged in their

original sequence
 A sequence number transmitted along with each packet
helps in sequential arrangement of packets at the
receiver
 Each packet flow transmitted as synchronous data
 There is no handshaking or acknowledgement of the

data during the flow of packets


 N bits of data are to be transmitted as packet switched
data
 The packets can have a maximum of n bits each
 The data transmission rate is n  T
 The time taken to complete the synchronous packet

transmission = (T  n)  n = T
 Assume formatted into 4 packets A, B, C, and D
 Three different routes available for transmission
 Time taken = 2 T
 1 T for three packets by three routes at the same

instance plus 1 T when fourth packet transmits


separately because N > 3  n
 To transmit the same data through one single path

time taken would have been = 4  T


GSM System Architecture
 A mobile station, MS, communicates with a GSM
public land mobile network (PLMN)
 In turn, may connect to a PSTN network
 The PSTN connects to a source–destination network

which acts as an interface for the destination terminal,


TE
 Radio subsystem (RSS)
 Network subsystem (NSS)
 Operation subsystem (OSS)
 A mobile device or phone
 Connects to GSM network
 Radio transmission system used in mobile phones)
 Hardware and software to transmit and receive GSM
data, and a user terminal (TE) through which the user
receives and sends the data
 Transmits through the interface Um at a power of 1–2

W
 Consists of a number of base station controllers
(BSC)
 Each BSC connects to a number of base transceiver

stations (BTS) which, in turn, provide radio


interfaces for mobile devices
 Consists of a number of mobile services switching
centres (MSC)
 Each MSC of the NSS interfaces to a number of

BSCs in the RSS


 Home location registers (HLR)
 Visitor location registers (VLR)
OMC
 When a mobile station MSx communicates to another
mobile station MSy, a switching center MSCi
establishes (switches) a connection (channel) between
(i) MSx interfaced to the BTSp, then to the BSCq, then
to MSCr and (ii) MSy interfaced to the BTSu, BSCV, and
MSCw
 RSS and NSS for communication
 MSCs must have location registries to enable the NSS

to discover a path (route or channel) between MSx and


MSy
 The OSS facilitates the operations of MSCs
 An inserted card
 Provided by the GSM service provider
 Uniquely identifies the user to the service
 Enables the MS to connect to the GSM network
 When the MS connects to the GSM subsystems, the
SIM saves a temporary mobile (dynamic) cipher key
for encryption, temporary mobile subscriber identity
(TMSI), and location area identification (LAI)
 Information which does not change when the MS
moves into another location
 (i) international mobile subscriber identity (IMSI)
 (ii) card serial number and type
 Contains a PIN (personal identification number)
 Using the PIN, the MS is unlocked when it seeks

connection to another MS
 The user can use the PIN to lock or unlock the MS
 Stores the PUK (PIN unblocking key) which enables
the subscriber to unlock the SIM if it is accidentally
locked due to some reason
 Stores a 128-bit authentication key provided by the

service provider
 The MS authenticates by a switching centre through an
algorithm using this key and a 128-bit random number
dynamically sent by authentication centre
 If the MS is not authenticated, the service to that

number is blocked
 Also stores the international mobile subscriber identity
(IMSI)
 IMSI─ a unique 15 digit number allocated to each
mobile user
 IMSI three parts— a three digit mobile country code
(MCC), a mobile network code (MNC) consisting of
two digits, and the mobile subscriber identity number
(MSIN) with up to 10 digits
 Same IMSI all over the globe
 Identical coding scheme
 Helps service providers in identifying and locating an

MS
 Helps the MS in obtaining the cipher key, TMSI, and
LAI from the mobile service provider during
connection setup
 TMSI used to identify an MS during a connection for

protecting the user ID from hackers or eavesdroppers


 Connects to a number of mobile stations (MSs)
 Each MS establishes connection through the user

interface Um [(1,8)]
 Um is the ISDN U interface for mobile
 The BTS to MS connection through Um

 A BTS is also connected to a BSC at through the A


bis
interface
 Formation of cells using appropriately directed
antennae
 Processing of signals
 Amplification of signals to acceptable strength so that

they can be transmitted without loss of data


 Encryption and decryption of data
 Paging
 Channel coding and decoding (for example, coding
voice into bits so that it can be transmitted at 13 kbps
and decoding received coded signals back to voice)
 Frequency hopping so that multiple channels for

various mobile stations can operate simultaneously


using different channel band frequencies
 Adapting to the rate of data synchronous data
transmission
 The receiver clock of the transceiver at one end of an

interface adapts itself according to transmitter clock of


the transceiver at the other end)
 Transmits and receives data with four multiplexed
channels of 16 kbps or with a 64 kbps channel
 Usually a BTS is used to manage one cell in the GSM

cellular network, but using a sectorized antenna, a


single BTS can be used to manage many cells
 Manages a number of BTSs
 Uses the A interface to connect to BTSs
bis
 BSCs reserve radio frequencies for communication and
manage handovers between BTSs
 A BSC along with the BTSs connected to it and the
mobile stations managed through it forms a base station
system (BSS)
 Also connected to an MSC in the networking and

switching layer using an interface A


 Processing of signals
 Controlling signals to the connected BTSs and control

of handover of signals from one BTS to another within


a BSS
 Control and handover of the signals from BSC to MSC
 Mapping the signals of a channel─ at given instant
receives signals from a BTS at 16 kbps through Abis and
interfaces them to an MSC at 16 kbps
 Alternatively, may have to interface to a PSTN
switching centre at 64 kbps through a fixed line
network─ mapped by assigning a 16 kbps channel for
64 kbps signals and vice versa
 Reserving radio frequencies
 Frequency hopping (For example, multiple BTSs

operate simultaneously by using the different


frequencies at a given instant
 Traffic control by continuous measurement of the
frequency channel spectrum being used at a given
instant
 Authentication, encryption, and decryption of data
 Updating location registry for the MSs
 Paging
 Acts as an interface between wireless and fixed
networks
 Mainly consists of switches and databases and

manages functions such as handovers between BSS’s,


worldwide user localization, maintenance of user
accounts and call charges, and management of
roaming
 The interface between the NSS components and the

AuC and the OMC in the OSS


 Consists of l mobile services switching centres (MSC),
m and n home and visitor location registers, gateway
MSCs (GMSC), and inter-working functions (IWFs)
with the mobile switching centres
 GMSCs and IWFs connect to the other networks (for

example, PSTN, ISDN, or PSPDN)


 Each MSC in the NSS can manage several base station
systems
 Every MSC has a home location register (HLR) and a

visitor location register (VLR)


 An MSC can connect to another MSC, GMSC, and

IWF
 An HLR connects to an AUC in the OSS.
 A GMSC can connect to an OMC in the OSS.
 GMSCs─ also used to connect to a PSTN, ISDN, or

PSPDN network
 Consists mainly of high-performance digital ISDN
switches
 Connects to a number of BSCs over the A interface
 Connect to other MSCs and to fixed-line networks

through GMSCs
 Used to manage BSCs in a geographical area
 Processing of signals
 Establishing and terminating the connection between
various mobile stations via BSCs
 The mobile stations to be connected may fall in a given
MSCs own area or in the area assigned to another
MSC, in which case the communication path has to be
via the other MSC
 Establishing and terminating the connection between
an MS and a fixed line phone via a GMSC or IWF
 Monitoring of calls made to and from an MS
 Call charging, multi-way calling, call forwarding, and

other supplementary services


 A special node which handles connections to other
fixed networks
 These other networks may be ISDN, PSTN, PSPDN, or

other PLMN networks


 Special IWFs may be used by a GMSC to connect to

public data networks such as the X.25


 A dynamic real-time database that stores both
permanent and temporary subscriber data which is
required for communication between the MSs in the
coverage area of the MSC associated with that VLR.
The VLR is an integral part of the MSC
 Has the MT databases
 Stores all the relevant subscriber data including mobile

subscriber ISDN number (MSISDN), details of


subscription permissions such as call forwarding,
roaming, etc., subscriber’s ISMI, user’s location area,
user’s current VLR and MSC status
 . Each mobile user has only one HLR record
worldwide, which is updated constantly on a real-time
basis
 Each MS must register at a specific HLR of a specific

MSC
 The HLR contacts AuC in the OSS for authentication
 Each HLR is associated to an MSC so that when an MS
registered at a certain HLR moves to another location
area (LA), serviced by another MSC, the user’s home
MSC update the user’s current VLR
 Administers the operation and maintenance of the
entire network
 Each AuC associates with an HLR in the NSS and each

EIR connects to an MSC


 An OMC at OSS can connect to an MSC or a GMSC in

the NSS and to a BSC at RSS


 Monitors and controls all other network entities
through the O interface
 Management of status reports
 Traffic monitoring
 Subscriber security management
 Accounting and billing
 AuC calculation of authentication parameters and then
conveying these to the HLR
 Used by the HLR to authenticate a user
 The AuC may also be a secured partitioned part of the

HLR itself
 Since mobile networks quite vulnerable to attacks, the
GSM standard specifies that the algorithms for key
generation should be separated out as an OSS network
entity. This entity is the AuC
Protocol Layers in GSM
 physical (layer 1)
 data link (layer 2)
 network (layer 3)
 transport (layer 4)
 session (layer 5)
 presentation (layer 6)
 application (layer 7)
 Receives signals
 Signals processed at the different layers arranged in

order from layer 1 to layer 7


 Transmits the signals
 Signals processed at the different layers arranged in

order from layer 7 to layer 1


 In specific formats so that these layer headers for each
layer can be stripped by the transceiver at the receiving
end
 Various operations can be performed on the received

data
 TCP/IP or GSM, a transceiver need not define
protocols for all 7 layers
 Some layers perform the functions of neighbouring

layer(s)
 The MS, BTS, BSC, and MSC, for example, have just

3 layers—physical, data link, and network


 Transport and session layer functions are taken care of
by network layer protocols
 The tasks of the presentation layer are performed by

other layers
 TE (user) application at either end (caller and

connected ends) controls the application layer protocols


 Controls the flow of packets to and from the network
layer and provides access to the various services
 LAPDm (link access protocol D-channel modified) for

Um─ data link layer protocol between the MS and BTS


 For accessing the D-channel link by GSM
 A modified version of the LAPD protocol for the D-
channel of ISDN (integrated services digital network)
 No need of appending and stripping of synchronization
bits, S flag, and error correction bits to and from the
layer in LAPDm because the radio interface (Um)
performs these functions at the physical layer itself
 Communicates by wireless across the radio interface as
opposed to the guided transmission of ISDN signals in
case of the LAPD
 Three sub layers—call (connection) management
(CM), mobility management (MM), and radio resource
management (RRM)
 Supports call establishment, maintenance, and
termination
 The CM sub layer also controls and supports the

functioning of the SMS and supplementary services


 The CM also supports DTMF (dual tone multiple

frequency) signalling
 Controls issues regarding mobility management when
an MS moves into another cell (location area). The
RRM manages the radio resources. The BTS
implements only RRM′ (a part of RRM) as the BSC
handles the handover.
 Defines protocols for implementation of addressed
messages received from the data link layer
 Defines addresses of the messages
 Performs the following functions:
 Defines protocols for implementation of addressed

messages received from the data link layer,


 Defines addresses of the messages
 Abis interface (of the PSTN, ISDN, or PSPDN networks)
 The connection between the BTS and the BSC through
a wired network (PSTN, ISDN, or PSPDN)
 Voice coded in the 64 kbps PCM (pulse code
modulation) format in a PSTN network
 The A interface between BTS and BSC, therefore,
bis
uses the 64 kbps PCM (or four multiplexed 16 kbps
channels) format
 Different from the 22.8 kbps TCH radio interface Um
(between MS and BTS)
 Translation between these coding formats performed

by recoding the TCH bits received from the caller MS


to 64 kbps PCM and from PCM to TCH for the
receiver MS
 This translation and retranslation from one coding
format to another may affect voice quality
 Therefore, a procedure called TFO (tandem free
operation) adopted at the BTSs, BSCs, and MSCs
 TFO means without performing translation and back
retranslation processes repeatedly
 LAPD (link access protocol D-channel) for Abis
 The protocol prescribes the standard procedure for the
D-channel of ISDN (integrated services digital network
 BTSM (BTS management)
 MTP (message transfer protocol) and SCCP (signalling
connection control protocol).
 MTP and SCCP are parts of the SS7 (signalling system

No. 7) used by interface A


 The layer protocol prescribes a standard procedure for
the MTP and SCCP for SS7 transmission and reception
in a 2 Mbps CCITT PSTN/ISDN/PSPDN network
 Network layer protocol sub layers at the MSC are CM,
MM, and BSSAP
 BSSAP (base subsystem application part
Localization and Calling
 A process by which a mobile station is identified,
authenticated, and provided service by a mobile
switching centre through the base station controller
and base transceiver either at the home location of the
MS or at a visiting location
 Users want instantaneous connection setup for a call
and want service on demand even while they are on the
move
 The mobile service providers, on the other hand, will

provide service(s) to the user only after identification


of MS and verification of services subscribed
 Only after identifying the mobile station (MS) of the
user
 Only Verifying the services subscribed
 Periodically updates the location of those MSs which
not switched off and are not struck off (or blocked)
from the list of subscribers to the given mobile service
 The SIM in a mobile station MS stores location-area
i
identification (LAI)
LAI
updated by
VLR
through
MSC
 Location information which is updated by the MSC
which covers the MS’s current location area
 The SIM also saves a assigned by the VLR associated
to the current MSC
 The location update recorded at the VLR (visitor

location register) and the LAI is updated at the SIM


card in MSi via the MSC, BSC, and BTS covering its
current location (interfaces j, 7b, 7a, and 8a)
For
Mobile
station
and BTS
a TMSI
 Registration of information regarding IMSI
(international mobile subscriber identity)
 MSISDN (mobile station international subscriber ISDN

number)
 Roaming restrictions
 Call forwarding
 Mobile subscriber roaming number (MSRN)
 Present VLR
 Present MSC
 Internationally used code of the country followed
destination area code in a country and subscriber
number
 The identical coding scheme for address used in the

ISDN network employing a fixed wire or fiber line)


 Can change when the user MS moves into another
location area but the HLR which stores this information
remains the same
 Registration of information pertaining to currently
associated MSs
 The information about their HLR, IMSI, and MSISDN
 Storing information of the MSs which are in its

location area and to which the MSC (associated with


the given VLR) is currently network services
 Registration of any new MS that moves into the VLR’s
location area. It copies the information from the HLR
of that MS
 Deregistration of an MS, if the MS dissociates from the

MSC associated with the given VLR and moves out to


another location area
 The other TE could be a mobile station TE or other TE
(such as a PSTN phone)
 The caller TE to be an MS communicating to the other

TE via the path 1–2–3–4–5–6–7–8


 The caller TE can also be a PSTN phone
 Different methods and protocols are used for
establishing connection and maintaining
communication in calling to and from mobile devices
in a GSM PLMN network
 Calls originating from a mobile TE to a PSTN
destination TE (Mobile→ PSTN Calls)
 Calls originating from a mobile TE to a mobile

destination TE (Mobile → Mobile Calls)


 Calls originating from a PSTN TE to a mobile
destination TE (PSTN → Mobile Calls)
 Message exchanges between the mobile station and the
base transceiver (Mobile station ↔ Base transceiver
message exchanges)
 Refer Section 3.5.1 to 3.5.4 for additional details
Handover
 Process of transferring a call (or data transfer) in
progress from one channel to another
 The core network performs handovers at various levels

of the system architecture or


 May handover the call to another network altogether
 If the mobile device moves out of the range of one cell
(base station) and a different base station can provide it
with a stronger signal
 If all channels of one base station are busy then a

nearby base station can provide service to the device


 Important one in any cellular network
 Must be completed efficiently and without

inconvenience to the user


 Different networks use different types of handover

techniques
 Hard handover─ GSM systems
 Soft handover ─ CDMA systems
 Existing radio link must be dropped for a small period
of time
 Then taken over by another base station
 A call in progress redirected not only from a base
station to another base station but also from its current
transmit–receive frequency pair to another frequency
pair
 An ongoing call can not exchange data or voice for this
duration
 Break in call transmission
 Handover takes place in a few ms (at best in 60 ms)
 Interruption is hardly discernible by the user
 Handover to another cell is required when the signal
strength is low and error rate is high. GSM systems
perform hard handovers
 Measurement continuously performed at the RRM
(radio resource management) sub layers in the Mobile
station, BTS, and BSC
 The RRM responsible for handover management
 When the signal strength goes weak due to several
reasons (for example, the mobile moving away from
the cell in which it is presently localized to the
boundary region of another cell), there is handover
from a cell to another
 Handover also takes place for load balancing when the
traffic from the cells and BSCs high
 An ongoing call, which is being handled by a cell, may
be handed over to another MSC
 Since the two MSCs are interfaced through PCM the
handover performed over a wired line
 Handover for load balancing when the traffic from the
cells and BTSs high
 The BSCs connect to an MSC
 A call, which is ongoing in a cell through a BTS, may
be handed over to another BSC connected to the same
MSC
 Since the BSCs connect to the MSC interfaces by
PCM, the handover is over a wired line
 For load balancing when the traffic from the cells and
BTSs as well as BSCs high
 Due to interference at certain frequencies, the signal
quality poor
 The BSC can handover the call to another frequency of

the cell in such cases


 When an MS moves to a neighbouring cell and suffers
poor signal quality, the BSC can handover the call to a
different BTS channel of the same BSC
1. The RRM sub layer transmits a signal report from
MSi to BTSi and from BTSi to BSCi. In case a
handover is necessary, BSCi signals the handover
requirement to MSCi.
2. MSCi signals the handover requirement to
another BSCj and BSCj allocates radio resources and
transmits the activated channel to another BTSk.
3. BTSk sends acknowledgement of the channel to BSCj
and BSCj acknowledges the handover request grant
via message to MSCi
4. MSCi transmits handover command to BSCi, BSCi to
BTSi, and BTSi to the MSi’s RRM layer
 The RRM directs the MS radio interface to operate at
another channel linked to BTSk
 New handover methods have also evolved and are used
in addition to the older techniques
 3G standards and technology makes it possible for

several mobile phones to use the same channel and for


neighbouring cells to use the same frequency bands
 Mobile station at the boundary of two adjacent cells─
does not suffer call drops due to handover in the
boundary region
 Gives seamless connectivity to a Mobile station
 An offset to pseudo noise code─ method of soft

handover
 Soft handover does not require breaking of the radio
link for cell-to-cell transfer of a call. A mobile device
can be simultaneously connected to several base
stations
 Ensure mobility by handover not only among the
BTSs, BSCs, or MSCs but also among the in-between
LANs
 Ensures seamless (uninterrupted) connectivity to the

user
Security in GSM Services
 A wireless radio based network system quite sensitive
to the unauthorized use of resources
 Designed to protect subscriber privacy
 Secured network against misuse of resources by

unregistered users
 Controlled access to the network by Mobile station
 Required to use a PIN before it can access the network

through Um interface
 An AuC (authentication centre) for the operation and
maintenance subsystem of the GSM network
 Authentication of the Mobile station
 The AuC first authenticates the subscriber Mobile
station and only then does the MSC provide the
switching service
 to another terminal TE, which is also authenticated in
case it is a Mobile station)
Cipher key
for Mobile
station

For BTS
a Random
Number
 Use a random number sent by the AuC during the
connection set up
 An authentication key which is already saved in the

SIM
 Authentication algorithm used differs for different

mobile service providers


 Its public identity
 TMSI is the identity granted on moving to a particular

location
 When a Mobile station moves to a new location area,

the VLR (visitor location register) assigns a TMSI


which is stored in the SIM of the Mobile station
 The identification of the subscriber during
communication done not using the IMSI but the TMSI
 Ensures anonymous call number identity transmission

over the radio channels


 The VLR assigned TMSI generates that ID
 This protects the Mobile station against eavesdropping

from external sources


 Caller line identification provision is a supplementary

service
For
Mobile
station
and BTS
a TMSI
 The BTS and the Mobile station perform ciphering
before call initiation or before connecting for receiving
a call
 The Mobile station uses a cipher (encryption key) for

encryption
 Only encrypted voice and data traffic and control

channel data transmit to the BTS


 A result of performing mathematical operations on (a)
the cipher key saved in the SIM and (b) the cipher
number received from the BTS when the call setup is
initiated
 The BTS transmits the cipher number before a call is

set up or transmitted
 The encryption algorithm identical for all mobile
service providers
 This ensures compatibility of the BTS, BSC, and MSC
units made by different manufacturers
 The BTS deciphers the voice and data channel data by
running a deciphering algorithm before communicating
over the wired PCM (pulse code modulation) lines
 Random numbers used in authentication and ciphering
processes
 Challenge to the mobile station to generate the results

(responses) of the algorithms


 If these results are correct only then do the BTS and

other units grant access to the challenged Mobile


station
GPRS
 Circuit Switching
 Packet switching
 A connection first sets up
 Then the entire data transmits through the path that has

been set up during the connection


 Packets of data at any given instant can take multiple
(time slots or channels or paths or routes)
 Depending on the idle slots at that instant
 Receiver assembles the packets into the original

sequence in the data


 A packet-oriented service for mobile stations’ data
transmission and their access to the Internet
 A speed enhanced data transmission service designed
for GSM systems
 Speed enhanced data transmission─ by packetizing
data and simultaneous transmission of packets over
different channels
 Uses the unused slots and channels in TDMA mode of
a GSM network for packetized transmission from a
mobile station
 Data-packets of a single mobile station transmit

through a number of time slots


 GPRS employing the GSM physical layer
 Connects mobile stations for voice-data transmission
 Connects the mobile stations to the Internet
 Packet data networks at higher data rates
 SGSN interfaces to BSCs (base station controllers) on
one hand and to other SGSNs on the other hand
 To the SGSN on one hand
 A packet data network like the Internet on other hand
 The BSCs also connect to the MSCs (mobile services

switching centres) as in case of the GSM system


 Each SGSN and each MSC in the NSS layer connects
to a number of BSCs at the RSS layer
 The SGSNs use the frame relay protocol for connection

to BSCs
 Consists of the SGSNs and GGSNs
 Provides GPRS connections to the Internet and other

PDNs (public data networks)


 Creates and stores in the Mobile station as well as in
the SGSN
 Has information of the status of Mobile station, data

compression flag, identifiers for the cell and channel


for the packet data and routing area information
 Stores the equipment data through the SGSN
 Helps the authentication, operation, and maintenance

subsystems
 GPRS protocol layers similar to the GSM protocol
layers
 The Mobile station has four layers—physical, data link,

network, and application


 Session presentation and transport layer issues are

taken care of by the lower layers


 Has just three layers  physical, data link, and network
 Transport and session layer functions taken care of by

network layer protocols


 Physical, data link, network and transport
 Presentation layer functions are performed by the lower

layers
 Provides end-to-end applications like voice and
Internet
 For transmission and reception of data and network
information between the BSS
 and SGSN
 Also implements several functions for the data logical

link
 Physical interface between BSS and SGSN employs a

wired or fibre network


 Layer 2 (L2) protocols of the Internet or other PDN
(PSTN, ISDN, and PSPDN)
 IP layer 3 (L3) protocols of the Internet or other PDN
 TCP (or UDP) and GTP (GPRS tunnelling protocol)
 TCP for X.25 protocol at layer 3
 UDP for the IP protocol at layer 3
 Uses another protocol to transmit and receive the data
and information
 The information for tunnelling protocol is hidden in

other protocol data


 Uses TCP and IP or UDP and IP
 The GTP facilitates flow of packets from multiple

protocols
 GTP information of TID (Tunnel ID) helps in

transmitting and assembling the packets for each


session of the Mobile station

You might also like