Professional Documents
Culture Documents
Unit1 2
Unit1 2
com
Chapter 9
GSM
Distributed
Computing
Group
Mobile Computing
Summer 2002
www.jntuworld.com
Overview
GSM Overview
Services
Architecture
Cell management
TDMA, FDMA
Orientation
Handover
Authentications
HSCSD, GPRS
MOBILE COMPUTING
R. Wattenhofer
9/2
www.jntuworld.com
[crt.dk]
MOBILE COMPUTING
R. Wattenhofer
9/3
www.jntuworld.com
Analog total
500000
GSM total
400000
CDMA total
300000
TDMA total
total
[GSM Data]
subscribers (x 1000)
600000
R. Wattenhofer
9/4
PDC/PHS total
200000
100000
0
1996
1997
1998
1999
2000
2001
MOBILE COMPUTING
www.jntuworld.com
GSM: Overview
MOBILE COMPUTING
R. Wattenhofer
9/5
www.jntuworld.com
Communication
mobile, wireless communication; support for voice and data
services
Total mobility
international access, chip-card enables use of access points of
different providers
Worldwide connectivity
one number, the network handles localization
High capacity
better frequency efficiency, smaller cells, more customers per cell
Security functions
access control, authentication via chip-card and PIN
Distributed Computing Group
MOBILE COMPUTING
R. Wattenhofer
9/6
www.jntuworld.com
Disadvantages of GSM
MOBILE COMPUTING
R. Wattenhofer
9/7
www.jntuworld.com
GSM offers
several types of connections: voice connections, data connections,
short message service
multi-service options (combination of basic services)
MS
TE
MT
R, S
GSM-PLMN
Um
transit
network
(PSTN, ISDN)
source/
destination
network
TE
(U, S, R)
tele services
Distributed Computing Group
MOBILE COMPUTING
R. Wattenhofer
9/8
www.jntuworld.com
Bearer Services
MOBILE COMPUTING
R. Wattenhofer
9/9
www.jntuworld.com
Tele Services
MOBILE COMPUTING
R. Wattenhofer
9/10
www.jntuworld.com
Non-Voice-Teleservices
Short Message Service (SMS)
up to 160 character alphanumeric data transmission to/from the mobile
terminal using the signaling channel, thus allowing simultaneous use of
basic services and SMS
group 3 fax
voice mailbox (implemented in the fixed network supporting the mobile
terminals)
electronic mail (MHS, Message Handling System, implemented in the
fixed network)
etc.
MOBILE COMPUTING
R. Wattenhofer
9/11
www.jntuworld.com
Supplementary services
MOBILE COMPUTING
R. Wattenhofer
9/12
www.jntuworld.com
GSM: overview
OMC, EIR,
AUC
HLR
NSS
with OSS
VLR
MSC
GMSC
VLR
fixed network
MSC
BSC
BSC
RSS
MOBILE COMPUTING
R. Wattenhofer
9/13
www.jntuworld.com
MS (mobile station)
BS (base station)
MSC (mobile switching center)
LR (location register)
subsystems
RSS (radio subsystem): covers all radio aspects
NSS (network and switching subsystem): call forwarding, handover,
switching
OSS (operation subsystem): management of the network
MOBILE COMPUTING
R. Wattenhofer
9/14
www.jntuworld.com
radio cell
MS
BSS
MS
radio cell
Um
MS
BTS
RSS
BTS
Abis
BSC
BSC
A
MSC
NSS
MSC
VLR
signaling
VLR
HLR
GMSC
IWF
ISDN, PSTN
PDN
O
OSS
EIR
AUC
OMC
MOBILE COMPUTING
R. Wattenhofer
9/15
www.jntuworld.com
MS
MS (Mobile Station)
BSS (Base Station Subsystem):
consisting of
Um
BTS
Abis
BTS
BSC
MSC
BTS
BTS
BSC
Components
MSC
BSS
Interfaces
Um : radio interface
Abis : standardized, open interface
with 16 kbit/s user channels
A: standardized, open interface
with 64 kbit/s user channels
MOBILE COMPUTING
R. Wattenhofer
www.jntuworld.com
MOBILE COMPUTING
BTS
X
X
X
X
X
X
BSC
X
X
X
X
X
X
X
X
X
X
R. Wattenhofer
[J. Schiller]
9/17
www.jntuworld.com
Mobile station
TA (Terminal Adapter):
terminal adaptation, hides radio specific characteristics
TE (Terminal Equipment):
peripheral device of the MS, offers services to a user
does not contain GSM specific functions
TA
R
MT
S
MOBILE COMPUTING
Um
R. Wattenhofer
9/18
network
subsystem
fixed partner
networks
ISDN
PSTN
MSC
SS7
EIR
HLR
VLR
MSC
IWF
ISDN
PSTN
PSPDN
CSPDN
Databases
HLR (Home Location Register)
VLR (Visitor Location Register)
EIR (Equipment Identity Register)
MOBILE COMPUTING
R. Wattenhofer
www.jntuworld.com
www.jntuworld.com
MOBILE COMPUTING
R. Wattenhofer
9/20
radio
subsystem
MS
network and
switching subsystem
MS
ISDN
PSTN
MSC
Um
BTS
fixed
partner networks
Abis
EIR
SS7
BTS
BSC
VLR
BTS
BTS
HLR
BSC
A
BSS
MSC
IWF
ISDN
PSTN
PSPDN
CSPDN
MOBILE COMPUTING
R. Wattenhofer
www.jntuworld.com
www.jntuworld.com
cell
MOBILE COMPUTING
R. Wattenhofer
www.jntuworld.com
MOBILE COMPUTING
R. Wattenhofer
9/23
www.jntuworld.com
Channel Assignment
MOBILE COMPUTING
R. Wattenhofer
9/24
www.jntuworld.com
Centralized vs. Distributed Control. In particular an algorithm is klocal if each node can only communicate with nodes within distance
k.
Distributed Computing Group
MOBILE COMPUTING
R. Wattenhofer
9/25
www.jntuworld.com
f4
f3
f5
f1
f2
f3
f6
f7
f2
f4
f5
f1
MOBILE COMPUTING
R. Wattenhofer
9/26
www.jntuworld.com
Cost: The cost of the algorithm is the value of the highest channel
we used.
MOBILE COMPUTING
R. Wattenhofer
9/27
www.jntuworld.com
Unfortunately, both upper bound and lower bound are too intricate
to be presented here. But we can easily show that
MOBILE COMPUTING
R. Wattenhofer
9/28
www.jntuworld.com
MOBILE COMPUTING
R. Wattenhofer
9/29
www.jntuworld.com
or
MOBILE COMPUTING
R. Wattenhofer
9/30
www.jntuworld.com
It was long believed that the greedy algorithm is the best possible.
New idea: Maybe randomization helps. Dont accept every call that
you might accept.
Problem: Maybe adversary presents the same cell over and over
until we (randomly) accept and then presents the 3 callers in the
neighboring cells.
MOBILE COMPUTING
R. Wattenhofer
9/31
www.jntuworld.com
Remarks:
For randomized algorithms, we use the expected benefit.
An improved version of the algorithm is 2.651-competitive.
The algorithm can be generalized and is 27/28-competitive.
MOBILE COMPUTING
R. Wattenhofer
9/32
www.jntuworld.com
GSM - TDMA/FDMA
fre
qu
e
nc
y
935-960 MHz
124 channels (200 kHz)
downlink
890-915 MHz
124 channels (200 kHz)
uplink
8
4.615 ms
tail
3 bits
user data
S Training S
user data
57 bits
1 26 bits 1
57 bits
MOBILE COMPUTING
guard
tail space
546.5 s
577 s
R. Wattenhofer
www.jntuworld.com
Logical Channels
MOBILE COMPUTING
R. Wattenhofer
9/34
www.jntuworld.com
...
superframe
...
48
...
49
24
50
6.12 s
25
multiframe
0
...
0
24
2
120 ms
25
...
48
49
50
235.4 ms
frame
0
...
4.615 ms
slot
577 s
burst
Distributed Computing Group
MOBILE COMPUTING
R. Wattenhofer
9/35
www.jntuworld.com
Um
Abis
MS
BTS
BSC
MSC
CM
CM
MM
MM
RR
RR
BTSM
RR
BTSM
LAPDm
LAPDm
LAPD
LAPD
radio
radio
PCM
PCM
BSSAP
SS7
SS7
PCM
PCM
16/64 kbit/s
BSSAP
MOBILE COMPUTING
64 kbit/s /
2.048 Mbit/s
R. Wattenhofer
9/36
www.jntuworld.com
HLR
4
5
3 6
calling
station 1
PSTN
GMSC
10
VLR
8 9
14 15
MSC
10 13
16
10
BSS
BSS
BSS
11
11
11
11 12
17
MS
MOBILE COMPUTING
R. Wattenhofer
9/37
www.jntuworld.com
VLR
3 4
PSTN
5
GMSC
MSC
8
2 9
MS
MOBILE COMPUTING
1
10
R. Wattenhofer
BSS
9/38
www.jntuworld.com
MTC/MOC
MS
MTC
BTS
MS
MOC
BTS
paging request
channel request
channel request
immediate assignment
immediate assignment
paging response
service request
authentication request
authentication request
authentication response
authentication response
ciphering command
ciphering command
ciphering complete
ciphering complete
setup
setup
call confirmed
call confirmed
assignment command
assignment command
assignment complete
assignment complete
alerting
alerting
connect
connect
connect acknowledge
connect acknowledge
data/speech exchange
data/speech exchange
MOBILE COMPUTING
R. Wattenhofer
9/39
www.jntuworld.com
BTS
MS
MS
MS
BTS
BTS
BTS
BSC
BSC
BSC
MSC
MSC
MOBILE COMPUTING
R. Wattenhofer
9/40
www.jntuworld.com
Handover decision
receive level
BTSold
receive level
BTSnew
HO_MARGIN
MS
MS
BTSold
BTSnew
MOBILE COMPUTING
R. Wattenhofer
9/41
www.jntuworld.com
Handover procedure
MSC
MS
BTSold
BSCold
measurement
measurement
report
result
BSCnew
BTSnew
HO decision
HO required
HO request
resource allocation
ch. activation
HO command
HO command
HO command
HO access
Link establishment
clear command clear command
clear complete
HO complete
HO complete
clear complete
MOBILE COMPUTING
R. Wattenhofer
9/42
www.jntuworld.com
Security in GSM
Security services
access control/authentication
user SIM (Subscriber Identity Module): secret PIN (personal
identification number)
SIM network: challenge response method
confidentiality
voice and signaling encrypted on the wireless link (after successful
authentication)
anonymity
temporary identity TMSI
(Temporary Mobile Subscriber Identity)
newly assigned at each new location update (LUP)
encrypted transmission
MOBILE COMPUTING
secret
A3 and A8 available
via the Internet
network providers
can use stronger
mechanisms
R. Wattenhofer
9/43
www.jntuworld.com
GSM - authentication
SIM
mobile network
Ki
RAND
128 bit
AuC
RAND
128 bit
RAND
Ki
128 bit
128 bit
A3
A3
SIM
SRES* 32 bit
MSC
SRES* =? SRES
SRES
SRES
32 bit
32 bit
SRES
MOBILE COMPUTING
R. Wattenhofer
9/44
www.jntuworld.com
MS with SIM
RAND
128 bit
RAND
128 bit
RAND
128 bit
A8
cipher
key
BTS
Ki
128 bit
SIM
A8
Kc
64 bit
Kc
64 bit
data
encrypted
data
A5
SRES
data
MS
A5
MOBILE COMPUTING
R. Wattenhofer
9/45
www.jntuworld.com
TCH/F4.8
1
2
3
4
TCH/F9.6
TCH/F14.4
1
1
2
3
4
2
3
4
MOBILE COMPUTING
R. Wattenhofer
9/46
www.jntuworld.com
GR (GPRS Register)
user addresses
MOBILE COMPUTING
R. Wattenhofer
9/47
www.jntuworld.com
Lost SDU
probability
Duplicate
SDU
probability
1
2
3
10-9
10-4
10-2
10-9
10-5
10-5
Delay
class
1
2
3
4
Out of
sequence
SDU
probability
10-9
10-5
10-5
Corrupt SDU
probability
10-9
10-6
10-2
[J. Schiller]
MOBILE COMPUTING
R. Wattenhofer
9/48
www.jntuworld.com
BSS
MS
Um
SGSN
Gb
Gn
Gi
HLR/
GR
MSC
VLR
PDN
GGSN
EIR
MOBILE COMPUTING
R. Wattenhofer
9/49
www.jntuworld.com
BSS
Um
SGSN
Gb
Gn GGSN
Gi
apps.
IP/X.25
IP/X.25
SNDCP
SNDCP
LLC
RLC
RLC
MAC
MAC
radio
radio
BSSGP
FR
GTP
GTP
LLC
UDP/TCP
UDP/TCP
BSSGP
IP
IP
FR
L1/L2
L1/L2
MOBILE COMPUTING
R. Wattenhofer
9/50
www.jntuworld.com
MBS
(Mobile Broadband System)
fast
UMTS
mobile
GSM DECT
slow
fixed
MEDIAN
WAND
ISDN
10 kbit/s
B-ISDN
2 Mbit/s
20 Mbit/s
30 Mbit/s
MOBILE COMPUTING
[J. Schiller]
portable
SAMBA
150 Mbit/s
R. Wattenhofer
9/51