You are on page 1of 5

Mobile station structure: TE Terminal network independent MT Mobile termination performs all network specific tasks, medium access,

coding etc. GSM-PLMN GSM Public land mobile network ISDN Integrated services digital network PSTN public switched telephone network S interface for data transmission R interface also defined for some terminals, all of them are defined in ISDN Salient features of gsm Roaming Better transmission quality Security Higher capacity Device independence Gsm channels DCS 1800 digital cellular system , 1710-1785MHz uplink, 1805-1880M downlink GSM 900 890-915 MHZ uplink, 935-960M downlink PCS 1900 personal communication service 1850-1910MHz uplink,1930-1990MHZ downlink Some terminologies GSM global system for mobile communication. VLR visitor location register is updated as you move from one cell to another , it saves your location HLR home locaton register which saves the information of our services activated. EIR equipment identity register saves the imei number ISDN is the network like PTCL. AUC register saves the authentication information like our sim validity and balance information. When a gsm subscriber asks for call. hlr always saves the informations about the current location of user, the vlr which is responsible for call setups updates hlr for location changes, and asks hlr for user data needed for call setup. How to locate a gsm subscriber to locate the ms, several numbers are needed for example, mobile station international isdn number, the only important number for user of gsm is phone number, note that it is the sim no associated with the ms.

Calling structure when calling station calls a mobile station mobile terminated call MTC.in which a calling station calls to a mobile station, the calling station can be a gsm subscriber or any other station. A user dials the number of a gsm subscriber The fixed network pstn notices that the number belongs to a gsm network by looking at the destination code, thus forwards the call to Gateway MSC. Gmsc gateway mobile switching center identifies the hlr for the number by the code and forwards it to the relevant hlr hlr now checks whether the number exists and that the user has subscribed for the services, for which it requests vlr to generate msrn number mobile station roaming number which includes the country code, subscriber number, visitor national destination code etc. The HLR then identifies the MSC responsible for the call and forwards this information to the GMSC, GMSC then directs the call to the MSC indicated. Now msc asks the current status of MS from VLR, if it is available, MSC will start paging in all cells it is responsible for. A ll BSS will start paging the signals .Basically BTS of all BSS transmits paging signals to MS. MS answers, then VLR does security check (encryption is done here), then VLR asks MSC to setup connection to MS. mobile originated call MOC the MS asks for call setup. the BSS sends request to MSC. The MSC then checks whether the user is allowed for that call or not.and checks the availability of resources through gsm network. if all the resources are available, msc sets up call with MS.

handover: if a mobile station is moving at speed of 350km/hr or the cell area is very large, more handovers of ongoing call are required for efficient call. however there should not be cut off called call drop.

there are two reasons for handover: the mobile station moves out of the range of bts or a certain area of bts . the received signal strength falls below the minimal requirement and inerference affects the quality of call until the radio transmission becomes impossible in these circumstances.

handover may be due to load balancing. the MSC, BSC may decide that the traffic in one cell is too high so as to shift some MS to another cell.

typical radius for a cell is 35 km in country side and 100m in cities because in cities, the reflections from the buildings and other objects may fake the signal. For handover decisions, average value of signals is observed rather than the instantaneous value, a threshold is set to avoid ping pong effect, too high a threshold may cause call drop and too low a threshold may cause too many handovers. types of handover intra cell handover: within the cell, narrow band interference could make transmission at certain frequencies difficult. the bsc then decides to shift the carrier at some other frequency. inter cell intra bsc handover; the mobile station moves from one cell to another, but stays within the control of same bsc, the bsc then performs handover, assigns new radio channel in the new cell and leaves the old one. inter bsc intra msc as bsc can control only limited no of cells, gsm may have to perform handover between two cells controlled by different bsc then handover is controlled by msc. inter msc a handover may be required between the two cells of different msc, then both the msc perform handover together. interleaving means to map the adjacent bits to non adjacent carrier frequencies for mitigation of frequency fading . gsm operations: speech digitizing and source coding channel coding interleaving burst formatting ciphering modulation radio channel

demodulation di ciphering burst formatting de interleaving channel decoding source decoding speech

security services offered by gsm access control and authentication the user has to first authentice the subscriber identity module for which secret Pin is required written on sim voucher confidentiality all user related data is encrypted. after authentication, bts and ms apply encryption to voice, data and signalling anonimity all user data is encrypted, and moreover user identity data are not sent over air. authentication: sim subscriber identity module saves the following informations, the individual authentication key Ki, the user identification imsi and the algorithm for authentication a3. Sim authentication to subscribe for gsm, the user must authentice its ms . the authentication uses a challenge response method control access generates a random number as the challenge, the authentication center for user authentication Auc performs the basic generation of this random number rand, applies algo a3 to generate a sres, and then forwards this information to hlr, the current vlr responsible for the sim authentication requests for the random no, sres and key kc from the hlr. For authentication, vlr sends the random value rand to sim,the ms performs the same algo a3 to rand as applied by the auc and generates sres, the ms sends back the generated sres to vlr, if the sres matches with the sres stored in vlr, the sim is subscribed for use of gsm network.

encryption: cipher key is used for enabling the encryption. Once authentication is done, bss and ms communicate , the data should be in encrypted form. both the ms and bss calculate the same kc based on the random value.After generating kc, the encryption of data starts, and this data is transmitted over air. Data transmission channels in gsm data transmission channels in gsm: tch f4.8 tch f9.6 tch f14.2 the low data rates are because of error correction bits . this low data rate is enough for sms and mms but not enough for internet and multimedia applications. hscsd high speed circuit switched data bundling of several time slots for achieving higher aiur air interface user rate 57.5 kbits.s using 4 slots each of 14.7 kbits/s. disadvantage The disadvantage of this topology of data transmission is that gsm requires n times signalling during handover, call setup and release. Each channel is treated separately. The probability of checking and service degradation during handover increases.n

You might also like