GSM Services
A mobile communication standard
GSM communication─ uses cellular networks
The GSM standard operates in the frequency ranges
of 900, 1800, and 1900 MHz
Tri-band (operable in GSM 900/1800/1900) phones
enable easy international roaming in GSM networks
GSM─ a second generation (2G) communication
standard
Teleservices
Supplementary services
Bearer services
Establishes between two TEs—source and destination
The TE at destination may or may not belong to a
GSM network
Data transmission
Transparent
Non transparent
Means that the interface for the service is using only
physical layer protocol
Physical layer means the layer which transmits or
receives data after formatting or multiplexing using a
wired (wire or fibre) or wireless (radio or microwave)
medium
The physical layer protocol in a GSM bearer service─
provides for FEC (forward error correction)
Entails insertion of redundant bits along with the
transmitted data
Redundant data allows the receiver to detect and
correct errors
Also enables broadcast to multiple destinations from a
single source
Advantageous in situations where retransmission is not
convenient though FEC requires higher bandwidths─
more bits per second
Helps in broadcasting without handshaking and at FEC
transmission reduced data rates
Assume m redundant bits appended in a data stream
of n bits
Total numbers of data bits transmitted from the
sender’s end = (n + m) bits
At the receiving end, an algorithm employed to detect
and correct transmission errors (error means 0
received as 1 or 1 received as 0)
The algorithm extracts the original n bit streams from
the received (n + m) bit sequences
Therefore, for every (n + m) bits sent by the sender,
the receiver receives only n bits of actual data
Means that if the transmission channel offers a data
rate r, then the actual data transmission rate with FEC
is r n (n + m)
When data transmits at GSM 9.6 kbps the data error
rates are high
This is because when non-transparent data is
transmitted at GSM 9.6 kbps, there is no retransmission
and erroneous data just gets rejected
Data above 9.6 kbps, non-transparent data-transfer used
Non-transparent means the service interface uses
physical layer or special physical layer radio-link
protocol or data link layer, and flow control layer
protocols
Provide for (i) error detection and correction and (ii)
selecting, rejecting, and re-transmitting the data,
respectively
Data link layer— the layer which frames the data and
appends additional bits plus performing other functions
Framing refers to combining and appending the
additional bits and header
Flow control layer controls the flow of data by
selecting or rejecting erroneous data transmitted and by
re-transmitting erroneous data
Becomes negligibly small at slow data rates (300 bps)
Because when non-transparent data transmits at 300
bps, then the erroneous data is corrected or gets
retransmitted at data link and flow control layers
A special error correction facility called RLP (radio
link protocol), used in GSM networks, is an example of
a non-transparent communication protocol
RLP results in more robust transmission with very
small BER (bit error rate)
Non-transparent communication protocol RLP results
in more robust transmission
Very small BER
Synchronous data transfer
Asynchronous data transfer
Synchronous data packet transfer
Data transmitted from a transceiver at a fixed rate
Constant phase differences (and thus time intervals)
maintained between data bursts or frames
Receiver must synchronize the clock rate according to
the incoming data bit rates
Receiver also synchronize data bits coming in from
multiple paths or stations and compensate for the
varied delays in received signals
Handshaking is not required in synchronous
transmission of data
Synchronous data transmission fast
No waiting period during data transfer
Voice converted into bits after coding in a GSM system
and the bits are transferred at data rates of 13 kbps as
synchronous data
There are no in-between acknowledgements or waiting
periods in this faithful transmission of bits
An SMS is transmitted through a GSM channel as
synchronous data
There are no in-between acknowledgements and any
transmission errors are corrected using FEC
Data transmitted by the transceiver at variable rates and
constant time intervals are not maintained between
consecutive bursts or frames
There is usually handshaking or acknowledgement of
data in asynchronous data transfer
But even if there is no acknowledgement, data flow
maintained by using the FEC plus buffers can still be
asynchronous
Use of buffers causes variable delays in reception
receiver ready
receiver not ready
unnumbered acknowledgement of acceptance of data
at the receiver, rejects, set asynchronous balance
mode, or disconnect
Program files containing middleware for mobile
devices have to be transmitted by the mobile service
while maintaining full data integrity
In file transfer cases the in-between acknowledgements
of faithful transmission of bits and reporting of errors
during transmission important
Non-transparent Flow
An acknowledgement is sent by the receiver for each
data set to the effect that the data set received is
identical to the one transmitted
Time is, therefore, spent in implementing appropriate
algorithms for data set integrity checks and
acknowledgements
This results in asynchronous data transmission
After formation of packets
Different packets transmitted through different
interfaces, routes, channels, or time-slots to reach a
common destination
At the destination, various packets are arranged in their
original sequence
A sequence number transmitted along with each packet
helps in sequential arrangement of packets at the
receiver
Each packet flow transmitted as synchronous data
There is no handshaking or acknowledgement of the
data during the flow of packets
N bits of data are to be transmitted as packet switched
data
The packets can have a maximum of n bits each
The data transmission rate is n T
The time taken to complete the synchronous packet
transmission = (T n) n = T
Assume formatted into 4 packets A, B, C, and D
Three different routes available for transmission
Time taken = 2 T
1 T for three packets by three routes at the same
instance plus 1 T when fourth packet transmits
separately because N > 3 n
To transmit the same data through one single path
time taken would have been = 4 T
GSM System Architecture
A mobile station, MS, communicates with a GSM
public land mobile network (PLMN)
In turn, may connect to a PSTN network
The PSTN connects to a source–destination network
which acts as an interface for the destination terminal,
TE
Radio subsystem (RSS)
Network subsystem (NSS)
Operation subsystem (OSS)
A mobile device or phone
Connects to GSM network
Radio transmission system used in mobile phones)
Hardware and software to transmit and receive GSM
data, and a user terminal (TE) through which the user
receives and sends the data
Transmits through the interface Um at a power of 1–2
W
Consists of a number of base station controllers
(BSC)
Each BSC connects to a number of base transceiver
stations (BTS) which, in turn, provide radio
interfaces for mobile devices
Consists of a number of mobile services switching
centres (MSC)
Each MSC of the NSS interfaces to a number of
BSCs in the RSS
Home location registers (HLR)
Visitor location registers (VLR)
OMC
When a mobile station MSx communicates to another
mobile station MSy, a switching center MSCi
establishes (switches) a connection (channel) between
(i) MSx interfaced to the BTSp, then to the BSCq, then
to MSCr and (ii) MSy interfaced to the BTSu, BSCV, and
MSCw
RSS and NSS for communication
MSCs must have location registries to enable the NSS
to discover a path (route or channel) between MSx and
MSy
The OSS facilitates the operations of MSCs
An inserted card
Provided by the GSM service provider
Uniquely identifies the user to the service
Enables the MS to connect to the GSM network
When the MS connects to the GSM subsystems, the
SIM saves a temporary mobile (dynamic) cipher key
for encryption, temporary mobile subscriber identity
(TMSI), and location area identification (LAI)
Information which does not change when the MS
moves into another location
(i) international mobile subscriber identity (IMSI)
(ii) card serial number and type
Contains a PIN (personal identification number)
Using the PIN, the MS is unlocked when it seeks
connection to another MS
The user can use the PIN to lock or unlock the MS
Stores the PUK (PIN unblocking key) which enables
the subscriber to unlock the SIM if it is accidentally
locked due to some reason
Stores a 128-bit authentication key provided by the
service provider
The MS authenticates by a switching centre through an
algorithm using this key and a 128-bit random number
dynamically sent by authentication centre
If the MS is not authenticated, the service to that
number is blocked
Also stores the international mobile subscriber identity
(IMSI)
IMSI─ a unique 15 digit number allocated to each
mobile user
IMSI three parts— a three digit mobile country code
(MCC), a mobile network code (MNC) consisting of
two digits, and the mobile subscriber identity number
(MSIN) with up to 10 digits
Same IMSI all over the globe
Identical coding scheme
Helps service providers in identifying and locating an
MS
Helps the MS in obtaining the cipher key, TMSI, and
LAI from the mobile service provider during
connection setup
TMSI used to identify an MS during a connection for
protecting the user ID from hackers or eavesdroppers
Connects to a number of mobile stations (MSs)
Each MS establishes connection through the user
interface Um [(1,8)]
Um is the ISDN U interface for mobile
The BTS to MS connection through Um
A BTS is also connected to a BSC at through the A
bis
interface
Formation of cells using appropriately directed
antennae
Processing of signals
Amplification of signals to acceptable strength so that
they can be transmitted without loss of data
Encryption and decryption of data
Paging
Channel coding and decoding (for example, coding
voice into bits so that it can be transmitted at 13 kbps
and decoding received coded signals back to voice)
Frequency hopping so that multiple channels for
various mobile stations can operate simultaneously
using different channel band frequencies
Adapting to the rate of data synchronous data
transmission
The receiver clock of the transceiver at one end of an
interface adapts itself according to transmitter clock of
the transceiver at the other end)
Transmits and receives data with four multiplexed
channels of 16 kbps or with a 64 kbps channel
Usually a BTS is used to manage one cell in the GSM
cellular network, but using a sectorized antenna, a
single BTS can be used to manage many cells
Manages a number of BTSs
Uses the A interface to connect to BTSs
bis
BSCs reserve radio frequencies for communication and
manage handovers between BTSs
A BSC along with the BTSs connected to it and the
mobile stations managed through it forms a base station
system (BSS)
Also connected to an MSC in the networking and
switching layer using an interface A
Processing of signals
Controlling signals to the connected BTSs and control
of handover of signals from one BTS to another within
a BSS
Control and handover of the signals from BSC to MSC
Mapping the signals of a channel─ at given instant
receives signals from a BTS at 16 kbps through Abis and
interfaces them to an MSC at 16 kbps
Alternatively, may have to interface to a PSTN
switching centre at 64 kbps through a fixed line
network─ mapped by assigning a 16 kbps channel for
64 kbps signals and vice versa
Reserving radio frequencies
Frequency hopping (For example, multiple BTSs
operate simultaneously by using the different
frequencies at a given instant
Traffic control by continuous measurement of the
frequency channel spectrum being used at a given
instant
Authentication, encryption, and decryption of data
Updating location registry for the MSs
Paging
Acts as an interface between wireless and fixed
networks
Mainly consists of switches and databases and
manages functions such as handovers between BSS’s,
worldwide user localization, maintenance of user
accounts and call charges, and management of
roaming
The interface between the NSS components and the
AuC and the OMC in the OSS
Consists of l mobile services switching centres (MSC),
m and n home and visitor location registers, gateway
MSCs (GMSC), and inter-working functions (IWFs)
with the mobile switching centres
GMSCs and IWFs connect to the other networks (for
example, PSTN, ISDN, or PSPDN)
Each MSC in the NSS can manage several base station
systems
Every MSC has a home location register (HLR) and a
visitor location register (VLR)
An MSC can connect to another MSC, GMSC, and
IWF
An HLR connects to an AUC in the OSS.
A GMSC can connect to an OMC in the OSS.
GMSCs─ also used to connect to a PSTN, ISDN, or
PSPDN network
Consists mainly of high-performance digital ISDN
switches
Connects to a number of BSCs over the A interface
Connect to other MSCs and to fixed-line networks
through GMSCs
Used to manage BSCs in a geographical area
Processing of signals
Establishing and terminating the connection between
various mobile stations via BSCs
The mobile stations to be connected may fall in a given
MSCs own area or in the area assigned to another
MSC, in which case the communication path has to be
via the other MSC
Establishing and terminating the connection between
an MS and a fixed line phone via a GMSC or IWF
Monitoring of calls made to and from an MS
Call charging, multi-way calling, call forwarding, and
other supplementary services
A special node which handles connections to other
fixed networks
These other networks may be ISDN, PSTN, PSPDN, or
other PLMN networks
Special IWFs may be used by a GMSC to connect to
public data networks such as the X.25
A dynamic real-time database that stores both
permanent and temporary subscriber data which is
required for communication between the MSs in the
coverage area of the MSC associated with that VLR.
The VLR is an integral part of the MSC
Has the MT databases
Stores all the relevant subscriber data including mobile
subscriber ISDN number (MSISDN), details of
subscription permissions such as call forwarding,
roaming, etc., subscriber’s ISMI, user’s location area,
user’s current VLR and MSC status
. Each mobile user has only one HLR record
worldwide, which is updated constantly on a real-time
basis
Each MS must register at a specific HLR of a specific
MSC
The HLR contacts AuC in the OSS for authentication
Each HLR is associated to an MSC so that when an MS
registered at a certain HLR moves to another location
area (LA), serviced by another MSC, the user’s home
MSC update the user’s current VLR
Administers the operation and maintenance of the
entire network
Each AuC associates with an HLR in the NSS and each
EIR connects to an MSC
An OMC at OSS can connect to an MSC or a GMSC in
the NSS and to a BSC at RSS
Monitors and controls all other network entities
through the O interface
Management of status reports
Traffic monitoring
Subscriber security management
Accounting and billing
AuC calculation of authentication parameters and then
conveying these to the HLR
Used by the HLR to authenticate a user
The AuC may also be a secured partitioned part of the
HLR itself
Since mobile networks quite vulnerable to attacks, the
GSM standard specifies that the algorithms for key
generation should be separated out as an OSS network
entity. This entity is the AuC
Protocol Layers in GSM
physical (layer 1)
data link (layer 2)
network (layer 3)
transport (layer 4)
session (layer 5)
presentation (layer 6)
application (layer 7)
Receives signals
Signals processed at the different layers arranged in
order from layer 1 to layer 7
Transmits the signals
Signals processed at the different layers arranged in
order from layer 7 to layer 1
In specific formats so that these layer headers for each
layer can be stripped by the transceiver at the receiving
end
Various operations can be performed on the received
data
TCP/IP or GSM, a transceiver need not define
protocols for all 7 layers
Some layers perform the functions of neighbouring
layer(s)
The MS, BTS, BSC, and MSC, for example, have just
3 layers—physical, data link, and network
Transport and session layer functions are taken care of
by network layer protocols
The tasks of the presentation layer are performed by
other layers
TE (user) application at either end (caller and
connected ends) controls the application layer protocols
Controls the flow of packets to and from the network
layer and provides access to the various services
LAPDm (link access protocol D-channel modified) for
Um─ data link layer protocol between the MS and BTS
For accessing the D-channel link by GSM
A modified version of the LAPD protocol for the D-
channel of ISDN (integrated services digital network)
No need of appending and stripping of synchronization
bits, S flag, and error correction bits to and from the
layer in LAPDm because the radio interface (Um)
performs these functions at the physical layer itself
Communicates by wireless across the radio interface as
opposed to the guided transmission of ISDN signals in
case of the LAPD
Three sub layers—call (connection) management
(CM), mobility management (MM), and radio resource
management (RRM)
Supports call establishment, maintenance, and
termination
The CM sub layer also controls and supports the
functioning of the SMS and supplementary services
The CM also supports DTMF (dual tone multiple
frequency) signalling
Controls issues regarding mobility management when
an MS moves into another cell (location area). The
RRM manages the radio resources. The BTS
implements only RRM′ (a part of RRM) as the BSC
handles the handover.
Defines protocols for implementation of addressed
messages received from the data link layer
Defines addresses of the messages
Performs the following functions:
Defines protocols for implementation of addressed
messages received from the data link layer,
Defines addresses of the messages
Abis interface (of the PSTN, ISDN, or PSPDN networks)
The connection between the BTS and the BSC through
a wired network (PSTN, ISDN, or PSPDN)
Voice coded in the 64 kbps PCM (pulse code
modulation) format in a PSTN network
The A interface between BTS and BSC, therefore,
bis
uses the 64 kbps PCM (or four multiplexed 16 kbps
channels) format
Different from the 22.8 kbps TCH radio interface Um
(between MS and BTS)
Translation between these coding formats performed
by recoding the TCH bits received from the caller MS
to 64 kbps PCM and from PCM to TCH for the
receiver MS
This translation and retranslation from one coding
format to another may affect voice quality
Therefore, a procedure called TFO (tandem free
operation) adopted at the BTSs, BSCs, and MSCs
TFO means without performing translation and back
retranslation processes repeatedly
LAPD (link access protocol D-channel) for Abis
The protocol prescribes the standard procedure for the
D-channel of ISDN (integrated services digital network
BTSM (BTS management)
MTP (message transfer protocol) and SCCP (signalling
connection control protocol).
MTP and SCCP are parts of the SS7 (signalling system
No. 7) used by interface A
The layer protocol prescribes a standard procedure for
the MTP and SCCP for SS7 transmission and reception
in a 2 Mbps CCITT PSTN/ISDN/PSPDN network
Network layer protocol sub layers at the MSC are CM,
MM, and BSSAP
BSSAP (base subsystem application part
Localization and Calling
A process by which a mobile station is identified,
authenticated, and provided service by a mobile
switching centre through the base station controller
and base transceiver either at the home location of the
MS or at a visiting location
Users want instantaneous connection setup for a call
and want service on demand even while they are on the
move
The mobile service providers, on the other hand, will
provide service(s) to the user only after identification
of MS and verification of services subscribed
Only after identifying the mobile station (MS) of the
user
Only Verifying the services subscribed
Periodically updates the location of those MSs which
not switched off and are not struck off (or blocked)
from the list of subscribers to the given mobile service
The SIM in a mobile station MS stores location-area
i
identification (LAI)
LAI
updated by
VLR
through
MSC
Location information which is updated by the MSC
which covers the MS’s current location area
The SIM also saves a assigned by the VLR associated
to the current MSC
The location update recorded at the VLR (visitor
location register) and the LAI is updated at the SIM
card in MSi via the MSC, BSC, and BTS covering its
current location (interfaces j, 7b, 7a, and 8a)
For
Mobile
station
and BTS
a TMSI
Registration of information regarding IMSI
(international mobile subscriber identity)
MSISDN (mobile station international subscriber ISDN
number)
Roaming restrictions
Call forwarding
Mobile subscriber roaming number (MSRN)
Present VLR
Present MSC
Internationally used code of the country followed
destination area code in a country and subscriber
number
The identical coding scheme for address used in the
ISDN network employing a fixed wire or fiber line)
Can change when the user MS moves into another
location area but the HLR which stores this information
remains the same
Registration of information pertaining to currently
associated MSs
The information about their HLR, IMSI, and MSISDN
Storing information of the MSs which are in its
location area and to which the MSC (associated with
the given VLR) is currently network services
Registration of any new MS that moves into the VLR’s
location area. It copies the information from the HLR
of that MS
Deregistration of an MS, if the MS dissociates from the
MSC associated with the given VLR and moves out to
another location area
The other TE could be a mobile station TE or other TE
(such as a PSTN phone)
The caller TE to be an MS communicating to the other
TE via the path 1–2–3–4–5–6–7–8
The caller TE can also be a PSTN phone
Different methods and protocols are used for
establishing connection and maintaining
communication in calling to and from mobile devices
in a GSM PLMN network
Calls originating from a mobile TE to a PSTN
destination TE (Mobile→ PSTN Calls)
Calls originating from a mobile TE to a mobile
destination TE (Mobile → Mobile Calls)
Calls originating from a PSTN TE to a mobile
destination TE (PSTN → Mobile Calls)
Message exchanges between the mobile station and the
base transceiver (Mobile station ↔ Base transceiver
message exchanges)
Refer Section 3.5.1 to 3.5.4 for additional details
Handover
Process of transferring a call (or data transfer) in
progress from one channel to another
The core network performs handovers at various levels
of the system architecture or
May handover the call to another network altogether
If the mobile device moves out of the range of one cell
(base station) and a different base station can provide it
with a stronger signal
If all channels of one base station are busy then a
nearby base station can provide service to the device
Important one in any cellular network
Must be completed efficiently and without
inconvenience to the user
Different networks use different types of handover
techniques
Hard handover─ GSM systems
Soft handover ─ CDMA systems
Existing radio link must be dropped for a small period
of time
Then taken over by another base station
A call in progress redirected not only from a base
station to another base station but also from its current
transmit–receive frequency pair to another frequency
pair
An ongoing call can not exchange data or voice for this
duration
Break in call transmission
Handover takes place in a few ms (at best in 60 ms)
Interruption is hardly discernible by the user
Handover to another cell is required when the signal
strength is low and error rate is high. GSM systems
perform hard handovers
Measurement continuously performed at the RRM
(radio resource management) sub layers in the Mobile
station, BTS, and BSC
The RRM responsible for handover management
When the signal strength goes weak due to several
reasons (for example, the mobile moving away from
the cell in which it is presently localized to the
boundary region of another cell), there is handover
from a cell to another
Handover also takes place for load balancing when the
traffic from the cells and BSCs high
An ongoing call, which is being handled by a cell, may
be handed over to another MSC
Since the two MSCs are interfaced through PCM the
handover performed over a wired line
Handover for load balancing when the traffic from the
cells and BTSs high
The BSCs connect to an MSC
A call, which is ongoing in a cell through a BTS, may
be handed over to another BSC connected to the same
MSC
Since the BSCs connect to the MSC interfaces by
PCM, the handover is over a wired line
For load balancing when the traffic from the cells and
BTSs as well as BSCs high
Due to interference at certain frequencies, the signal
quality poor
The BSC can handover the call to another frequency of
the cell in such cases
When an MS moves to a neighbouring cell and suffers
poor signal quality, the BSC can handover the call to a
different BTS channel of the same BSC
1. The RRM sub layer transmits a signal report from
MSi to BTSi and from BTSi to BSCi. In case a
handover is necessary, BSCi signals the handover
requirement to MSCi.
2. MSCi signals the handover requirement to
another BSCj and BSCj allocates radio resources and
transmits the activated channel to another BTSk.
3. BTSk sends acknowledgement of the channel to BSCj
and BSCj acknowledges the handover request grant
via message to MSCi
4. MSCi transmits handover command to BSCi, BSCi to
BTSi, and BTSi to the MSi’s RRM layer
The RRM directs the MS radio interface to operate at
another channel linked to BTSk
New handover methods have also evolved and are used
in addition to the older techniques
3G standards and technology makes it possible for
several mobile phones to use the same channel and for
neighbouring cells to use the same frequency bands
Mobile station at the boundary of two adjacent cells─
does not suffer call drops due to handover in the
boundary region
Gives seamless connectivity to a Mobile station
An offset to pseudo noise code─ method of soft
handover
Soft handover does not require breaking of the radio
link for cell-to-cell transfer of a call. A mobile device
can be simultaneously connected to several base
stations
Ensure mobility by handover not only among the
BTSs, BSCs, or MSCs but also among the in-between
LANs
Ensures seamless (uninterrupted) connectivity to the
user
Security in GSM Services
A wireless radio based network system quite sensitive
to the unauthorized use of resources
Designed to protect subscriber privacy
Secured network against misuse of resources by
unregistered users
Controlled access to the network by Mobile station
Required to use a PIN before it can access the network
through Um interface
An AuC (authentication centre) for the operation and
maintenance subsystem of the GSM network
Authentication of the Mobile station
The AuC first authenticates the subscriber Mobile
station and only then does the MSC provide the
switching service
to another terminal TE, which is also authenticated in
case it is a Mobile station)
Cipher key
for Mobile
station
For BTS
a Random
Number
Use a random number sent by the AuC during the
connection set up
An authentication key which is already saved in the
SIM
Authentication algorithm used differs for different
mobile service providers
Its public identity
TMSI is the identity granted on moving to a particular
location
When a Mobile station moves to a new location area,
the VLR (visitor location register) assigns a TMSI
which is stored in the SIM of the Mobile station
The identification of the subscriber during
communication done not using the IMSI but the TMSI
Ensures anonymous call number identity transmission
over the radio channels
The VLR assigned TMSI generates that ID
This protects the Mobile station against eavesdropping
from external sources
Caller line identification provision is a supplementary
service
For
Mobile
station
and BTS
a TMSI
The BTS and the Mobile station perform ciphering
before call initiation or before connecting for receiving
a call
The Mobile station uses a cipher (encryption key) for
encryption
Only encrypted voice and data traffic and control
channel data transmit to the BTS
A result of performing mathematical operations on (a)
the cipher key saved in the SIM and (b) the cipher
number received from the BTS when the call setup is
initiated
The BTS transmits the cipher number before a call is
set up or transmitted
The encryption algorithm identical for all mobile
service providers
This ensures compatibility of the BTS, BSC, and MSC
units made by different manufacturers
The BTS deciphers the voice and data channel data by
running a deciphering algorithm before communicating
over the wired PCM (pulse code modulation) lines
Random numbers used in authentication and ciphering
processes
Challenge to the mobile station to generate the results
(responses) of the algorithms
If these results are correct only then do the BTS and
other units grant access to the challenged Mobile
station
GPRS
Circuit Switching
Packet switching
A connection first sets up
Then the entire data transmits through the path that has
been set up during the connection
Packets of data at any given instant can take multiple
(time slots or channels or paths or routes)
Depending on the idle slots at that instant
Receiver assembles the packets into the original
sequence in the data
A packet-oriented service for mobile stations’ data
transmission and their access to the Internet
A speed enhanced data transmission service designed
for GSM systems
Speed enhanced data transmission─ by packetizing
data and simultaneous transmission of packets over
different channels
Uses the unused slots and channels in TDMA mode of
a GSM network for packetized transmission from a
mobile station
Data-packets of a single mobile station transmit
through a number of time slots
GPRS employing the GSM physical layer
Connects mobile stations for voice-data transmission
Connects the mobile stations to the Internet
Packet data networks at higher data rates
SGSN interfaces to BSCs (base station controllers) on
one hand and to other SGSNs on the other hand
To the SGSN on one hand
A packet data network like the Internet on other hand
The BSCs also connect to the MSCs (mobile services
switching centres) as in case of the GSM system
Each SGSN and each MSC in the NSS layer connects
to a number of BSCs at the RSS layer
The SGSNs use the frame relay protocol for connection
to BSCs
Consists of the SGSNs and GGSNs
Provides GPRS connections to the Internet and other
PDNs (public data networks)
Creates and stores in the Mobile station as well as in
the SGSN
Has information of the status of Mobile station, data
compression flag, identifiers for the cell and channel
for the packet data and routing area information
Stores the equipment data through the SGSN
Helps the authentication, operation, and maintenance
subsystems
GPRS protocol layers similar to the GSM protocol
layers
The Mobile station has four layers—physical, data link,
network, and application
Session presentation and transport layer issues are
taken care of by the lower layers
Has just three layers physical, data link, and network
Transport and session layer functions taken care of by
network layer protocols
Physical, data link, network and transport
Presentation layer functions are performed by the lower
layers
Provides end-to-end applications like voice and
Internet
For transmission and reception of data and network
information between the BSS
and SGSN
Also implements several functions for the data logical
link
Physical interface between BSS and SGSN employs a
wired or fibre network
Layer 2 (L2) protocols of the Internet or other PDN
(PSTN, ISDN, and PSPDN)
IP layer 3 (L3) protocols of the Internet or other PDN
TCP (or UDP) and GTP (GPRS tunnelling protocol)
TCP for X.25 protocol at layer 3
UDP for the IP protocol at layer 3
Uses another protocol to transmit and receive the data
and information
The information for tunnelling protocol is hidden in
other protocol data
Uses TCP and IP or UDP and IP
The GTP facilitates flow of packets from multiple
protocols
GTP information of TID (Tunnel ID) helps in
transmitting and assembling the packets for each
session of the Mobile station