You are on page 1of 53

AMITY INSTITUTE OF TELCOM TECHNOLOGY AND MANAGEMENT

AN INTERNSHIP EXPERIENCE REPORT BY


Apoorv Sharma(a2004707027)
B.TECH. (ELECTRONICS & TELECOMMUNICATION) BATCH 2007-11

INTERNSHIP WITH
MTNL

UNDER THE GUIDANCE OF


Mr. Asha Ram, SDE(MSC)

DURING MAY - JULY 2010

INTERNSHIP TRAINING CERTIFICATE


This is to certify that ……………………………. (Enrollment No. and Name of The student),
student of B.Tech. (Electronics & Telecommunication), Batch 2007 - 11, from Amity Institute of
Telecom Technology & Management, has undergone industry internship training with this
company under my supervision and guidance. During the internship he/she was assigned the
under mentioned tasks:-

That he/she ………………………………………………………… (Please write few lines on


how the student performed the task, his/her conduct and any special contributions)

Date:
Seal/Stamp of the Organization Signature,
Name and Designation

Table of Contents:
Introduction
It is tough for me to describe the wonderful & stupendous experience of working on a project
called “GSM” .I really thank my almighty for keeping me blessed & for giving me virtual
support for choosing out such a vast topic . During the six weeks of training I have reincarnated a
new stalwart engineer in me who was ambid to text & classroom sessions .
The saga or whole journey would have been incomplete sans Mr Asharam stouted guidance.
MTNL was set up on 1st April, 1986 by the Government of India to upgrade the quality of
telecom services, expand the telecom network, introduce new services and to raise revenue for
telecom development needs of India’s key metros - Delhi, the political capital and Mumbai,
the business capital of India. In the past 22 years, the company has taken rapid strides to
emerge as India’s leading and one of Asia’s largest telecom operating companies. Besides
having a strong financial base, MTNL has achieved a customer base of 5.92 million as on 31st
March 2006.
The company has also been in the forefront of technology induction by converting 100% of its
telephone exchange network into the state-of-the-art digital mode.
The Govt. of India currently holds 56.25% stake in the company.

Administrative Govt. of India, Ministry of Communication and Information Technology,


Ministry Department of Telecommunications.
To remain market leader in providing world class Telecom and IT related
Mission services at affordable prices and to become a global player.

• To expand customer base and services.


• To provide latest technology and services to the customers, at
affordable prices.
• To achieve the highest level of customer satisfaction and delight.

• To diversify in other areas for providing telecom services at


Corporate
national and international levels.
Objectives
• To provide convergence of Telecom, Information Technology and
related services.
• To improve productivity by training and redeployment of man-
power.
• To work for social benefits.

Corporate MTNL has been following the principles of Corporate Governance. As it is


Governance understood, the principles and Corporate Governance deals with laws,
procedures, practices and implicit rules that determine a company's ability
to take informed managerial decisions vis-à-vis its stake holders, in
particular its shareholders, creditors, customers, the state and employees.
The major constituents/components of Corporate Governance include :
1) Constitution of the Board of Directors.
2) Key information that are being reported to and are placed before the
Board of Directors.
3) Proper functioning of Audit Committee.
4) Transparency and desirable disclosures by the company.
At present, MTNL Board comprises of four non-executive Directors, apart
from three full time Directors viz. Director (Tech), Director (Fin) &
Director (HR) and two ex-officio Directors on Board. There are two Govt.
nominees on the Board. The meetings of the Board are held regularly, as
per the agenda and their importance. Besides regular Board Meeting,
emergency Board meetings are held as and when required. The
information, which are reported to and placed before the Board includes: -
1) Annual Plans, revenue, capital budgets, manpower and over-head
budgets and manpower requirements.
2) Quarterly results of the company as a whole and its operating divisions.
3) Internal audit reports.
There is a separate Internal Audit group formed & functioning in the
company under whose jurisdiction member of independent Chartered
Accountants Firms are appointed by the company to carry out audit of
various departments of the company both in Delhi & Mumbai as well as
Corporate Office.
Apart from the internal audit, the company is also subjected to Govt. Audits
and other audits/examination by Parliamentary Committees. Company has
to report its monthly, quarterly and yearly achievements in terms of
financial and physical parameters to DoT and Department of Public
Enterprises (DPE).
Hence, it can be seen that the company functions in a most transparent
manner. Two most important claimants to any company are creditors and
shareholders and the Corporate Governance and good corporate practice
must satisfy both these claimants. In this regard, MTNL, a debt free
company, has a unique distinction of servicing its shareholders. The
company has evolved its own “Insider Trading Code” as per SEBI Rules &
Regulations.

CORPORATE GOVERNANCE PRACTICES/STANDARDS

Vigilance in any organization is a managerial function and an integral part


of Executives. It ensures that the decisions taken by the officials are in the
best interests of the Company. MTNL Vigilance Organization is the nodal
agency for handling all vigilance matters of Mahanagar Telephone Nigam
Limited. The functions of vigilance in MTNL are to conduct preventive
checks, to investigate the complaints from various sources viz. CVC, DOT,
MPs/MLAs, VIPs, NGOs, customers, suppliers/vendors, contractors,
Organization
associations of employees and public etc. Vigilance also advises system
improvements where-ever necessary to improve the administrative
functioning of MTNL. Vigilance organisation arranges vigilance awareness
programmes from time to time.
The vigilance organisation works in close coordination with the
Vigilance Directorate of the Ministry of Communication & Information
Technology and the Central Vigilance Commission.
 Become a total solution provider company and to provide world

class telecom services at affordable prices.


Vision
 Become a global telecom company and to find a place in the
Vision for
‘Fortune 500’ companies.
Tomorrow
 Become the largest provider of private networks and leased lines.
 Venture into other areas in India and abroad on the strength of our
core competency.
PROFILE OF THE COMPANY’S BUSINESS

MAIN SERVICES OFFERED: MTNL is offering complete bouquet of Telecom services to


meet the needs of Government bodies, Corporates, Companies, individuals etc. MTNL Offers the
following mains Telecom Service:
1. Basic fixed line access (including phone plus facilities): MTNL provide basic fixed-line
access, which consists of installation provision of basic voice telephony services. Phone
plus facilities in basic fixed-line include such services as abbreviated dialing transfer,
hotline facility, three party conferencing, absentee facility, CLIP facility, call hunting,
call alert and morning alarm.

2. GSM cellular services: In February 2001, MTNL launched our cellular mobile services
using GSM technology ( the European Asian standard for digital cellular telephony) in
Delhi and Mumbai under the brand name Dolphin. In 2002, MTNL introduced prepaid
cellular services under the brand name Trump. MTNL provide national roaming facilities
for our GSM cellular customers through the networks of BSNL outside Mumbaiand
Delhi and international roaming facilities with 45 operators in approximate countries and
MTNL have established roaming facilities for our customers in a total of approximately
200 countries. As of Ma……….. 31,2008, MTNL had installed a cellular network with a
capacity of 17.63 lakh lines in Mumbai. GSM capacity in Mumbai was planned to be
further expanded by 1 million each (0.25 million 3G including).

3. Mobile and fixed wireless services based on CDMA technology: On 31.12.2001,


MTNL Mumbai began implementing wireless in local loop services using CDMA
technology for fixed wireless and mobile operations on a commercially experimental
basis with a single exchange and capacity for 9150 subscribers in Mumbai. Wireless in
local loop services use wireless links from a local exchange in place of conventional
cables. Two types of service are provided. One type employs a handset that is fixed to a
subscriber’s premises for “fixed wireless” service, while the other employs a mobile
telephone or “mobile” or “limited mobility” service. MTNL, Mumbai has since upgraded
our CDMA equipment 2000 – 1X and receiving stations and in Feb,2006 MTNL,
Mumbai opened subscriptions for upto 166066 CDMA mobile and fixed wireless
connections in Mumbai and dedicated 60% of these connections for fixed wireless.
Our CDMA mobile service offers only limited mobility within Delhi and Mumbai and
currently MTNL are not permitted to offer roaming facilities on this service. If MTNL
obtain the newly available Unified Access License, MTNL will be able to offer full
mobility.
CDMA fixed wireless is a substitute for fixed line access. Fixed wireless allows us to
enhance basic service penetration, provide quicker installation and cover areas where the
installation of cable would not be economical. Our CDMA mobile service is marked
under the brand name Garuda.

4. Internet access services: MTNL commenced our Internet service provider operations in
February 1999 with initial equipment capacity to support upto 5,000 subscribers in each
of Delhi and Mumbai. MTNL experiences significant demand for this service and have
since expanded our Internet services capacity to support additional subscribers in each of
Delhi and Mumbai.
MTNL also enable our customers to access the Internet without having to subscriber for
Internet service. They can access the service and later be billed on the basis of calling line
identification usage. The number of customers who use this service is much higher than
the number of internet subscribers MTNL have.

5. Intelligent Network Service: MTNL are introducing Intelligent Network services over
our entire network which at present includes;
- Calling card service
- Toll Free calling service.
- Premium rate ‘0900” number service.

6. Broadband services: MTNL also offer data communications services through our packet
switched data network. This service allows the transmission of data on standard
international data protocols and access via dedicated lines or dial up facilities. MTNL
plan to expand broadband services on a large scale based on the ADSL technology.
ADSL means Asymmetric Digital Subscriber Loop, a technology that allows
combinations of services including voice, data technology and one-way full motion video
to be compressed and delivered over existing copper cables. MTNL expect to experience
significant demand for these high speed data service from large corporate, financial,
media, public service and education institutions. MTNL launched broadband service
using ADSL 2+ in January, 2005.

7. IPTV (Internet Protocol Television): IPTV delivers television programming to


households using advanced technology and internet protocols. It requires a IPTV set-top
box and offers key advantages over existing TV cable and satellite technologies. IPTV is
typically bundled with other services like Video on Demand (VOD), voice over IP
(VOIP) or digital phone, and Web access, collectively referred to as Triple Play. MTNL
have launched IPTV services in both Delhi and Mumbai on revenue sharing basis with
M/s.Aksh Optifibre Limited.

8. VOIP: MTNL have launched VOIP (Voice over Internet Protocol) services on revenue
share arrangement in association with M/s.Aksh Optifibre Limited.

9. WI-F1 Services: MTNL have launched Wi-F1 service to provide Internet connectivity to
inaccessible and hot spots in the Mumbai areas. MTNL Wifine HotSpot offers a wide
range of service plans to meet the internet browsing needs. MTNL WiFine HotSpot
provides high speed Wi-Fi wireless Internet access in convenient public locations.

10. ISDN services: MTNL provide narrow band ISDN services that allow subscribers to
send high speed data make telephone calls with high quality voice transmission and hold
desktop video conference over a single line. In the past, the development of independent
networks for a variety of services ( such as voice, telex, packet switched data and leased
lines) made each of them relatively expensive. ISDN technology allows a wide range of
data services to be made available to the subscriber through a single connection and at a
reduced cost. MTNL believe these high speed data transmission products will help us to
attract high usage subscribers. MTNL introduced narrow band ISDN services in
August,1996.

11. Leased line services: MTNL provide point to point leased line services for local,
domestic long distance and international connectivity. Subscribers can use our leased
lines to assemble their own private networks between offices within Delhi and Mumbai
or together with BSNL between Delhi and Mumbai and to other Indian cities. Leased
line services can be used for voice and data transmission at various bandwidths. In
addition, MTNL earn revenues from leasing circuits to cellular operators in Delhi and
Mumbai to interconnect their networks to our network.

12. Digital Certificates: Indian Information Technology Act 2000 (IT-Act 2000) provides
legal recognition for transactions carried out by means of electronic data interchange and
other means of electronic communication, commonly referred to as “electronic
commerce” which involve the use of alternatives to paper based methods of
communication and storage of information, to facilitate electronic filling of documents.

MTNL TRUST LINE is a public key infrastructure (PKI) established by Mahanagar


Telephone Nigam Limited (MTNL) that provides Digital Certificates to entities including
but not limited to individuals, organizations, servers and network devices within the
framework IT Act 2000. The term certifying authority is an umbrella term that refers to
all entities issuing certificates with the MTNL TRUSTLINE PKI. MTNL TRUSTLINE
is governed, operated & managed by highly professional and skilled persons who take the
utmost care in issuing managing revoking and renewing certificates with legal validity
under the IT Act. Being under the banner of renowned Public Sector Undertaking (PSU)
MTNL TRUSTLINE has additional credibility & assurance in its bag. It is licensed by
Controller of Certifying Authority (CCA) Government of India.
DIGITAL SIGNATURE: Authentication of any electronic record by a subscriber by
means of an electronic method or procedure in accordance with the provisions of section
3 of the Indian IT Act 2000.
DIGITAL CERTIFICATE: A digital certificate is like a passport, with quite a bit of
information between the covers. The certificate actually contains different parts, most
importantly a private key and a public key. It identifies the CA, identifies the subscriber,
contain subscriber’s public key, identifies the certificate’s operational period, contain
certificate serial number and is digitally signed by the CA.

13. MTNL have also commissioned the state of the art IP/MPLS core network in Mumbai.

14. Public Call Offices: Public Call Offices consist of both manned offices where people can
make local, long distance and international calls and coin operated telephone booths. At
March 31,2008, Public Call Offices accounted for 7.45% of our total wire lines in
service. The coin operated Public All Offices offer only local call service, while the
franchised public call offices offer local, domestic long distance and international call
services. MTNL pay a commission to the franchisees depending on the number of calls
per fortnight and international calls. The franchisees charge the same tariffs MTNL do for
these services.

15. Value Added Services: Value- added services on GSM such as call waiting, call
forwarding, wake up calls, absent subscriber service (informing callers that the subscriber
is unavailable) and caller identification, friends & family, night talk, VMS call
conference, WAP and voice mail.

Company Description
Mahanagar Telephone Nigam Limited provides fixed-line and other basic telecommunications
services in Delhi and Mumbai. As of March 31, 2009, its fixed-line telecommunications
networks in Delhi and Mumbai had an aggregate of approximately 33.69 million fixed lines in
service. The company launched its cellular services using global system for mobile
communications (GSM) technology in Delhi and Mumbai and had approximately 4.18 million
subscribers as of March 31, 2009. The company’s CDMA-based services, as of March 31, 2009,
had approximately 0.18 million mobile subscribers in Mumbai and Delhi. It also had
approximately 1.43 million Internet access subscribers. Services Basic fixed-line access
(including phone plus facilities) in Delhi and Mumbai: The company provides basic fixed-line
access, which consists of installation and provision of basic voice telephony services. Phone plus
facilities in basic fixed-line include such services as abbreviated dialing, call transfer, hotline
facility, three party conferencing, absentee facility, CLIP facility, call hunting, call alert, and
morning alarm. Public Call Offices: Public call offices consist of both manned offices where
people can make local, long distance, and international calls; and coin operated telephone booths.
The coin-operated public call offices offer only local call service, while the franchised public call
offices offer local, domestic long distance, and international call services. 3G cellular services: In
December 2008, the company inaugurated 3G mobile services in Delhi. The 3G technology is
the natural evolution of 2G services and would facilitate higher speed and data throughputs
enabling the delivery of a range of multimedia services, such as video streaming, movie
downloads, mobile TV, M-commerce, and other functions. In February 2009, the company
launched 3G services in the NDMC area of Delhi (with 50 Node B’s) with the brand name
‘Jadoo’. In May 2009, the company launched 3G services in MTNL Mumbai on a trial basis.
GSM cellular services (including value-added services) in Delhi and Mumbai: The company
offers its cellular mobile services using GSM technology (the European and Asian standard for
digital cellular telephony) in Delhi and Mumbai under the brand name Dolphin. It has introduced
its prepaid cellular services under the brand name Trump. As of March 31, 2009, the company
had approximately 41.77 lakhs GSM cellular subscribers. It provides national roaming facilities
for its GSM cellular customers through the networks of BSNL outside Mumbai and Delhi and
has established roaming facilities for its customers in approximately 200 countries. As of March
31, 2009, the company had installed a cellular network with a capacity of 17.75 lakh lines in
Delhi and 23.25 lakh lines in Mumbai. Value Added services: The company offers value-added
services on GSM, such as call-waiting, call-forwarding, wake-up calls, absent subscriber service
(informing callers that the subscriber is unavailable) and caller identification, friends and family,
night talk, VMS call conference, WAP, and voice mail. Mobile and fixed-wireless services based
on CDMA technology: The company provides wireless-in-local-loop (WLL) services using
CDMA technology for fixed wireless and mobile operations on a commercially experimental
basis with a single exchange and capacity for 1,000 subscribers in Delhi. Wireless-in-local-loop
services use wireless links from a local exchange in place of conventional cables. As of March
31, 2008, the capacity of WLL was approximately 550,000 and 548,000 for Delhi and Mumbai;
and the company had approximately 184,000 CDMA mobile connections and 122,000 fixed
wireless connections. ISDN services: The company provides narrow-band ISDN services that
allow subscribers to send high speed data make telephone calls with voice transmission and
holds desktop video conference over a single line. The company’s narrow-band ISDN services,
as of March 31, 2008, had approximately 25,600 subscribers. Broadband and Internet services:
As of March 31, 2009, the company provided its Internet services to a total of approximately
1.43 million subscribers in Delhi and Mumbai. The company also enables its customers to access
the Internet without having to subscribe for Internet service. They can access the service and
later be billed on the basis of calling line identification usage. It has launched its broadband
services under the brand name ‘Triband’ in Delhi and Mumbai simultaneously. The broadband
customer base as on March 31, 2009 was 6.96 lakh; and the installed capacity of broadband ports
was 10.15 lakh. Leased line service: The company provides point-to-point leased line services
for local, domestic long distance, and international connectivity. Subscribers can use its leased
lines to assemble their own private networks between offices within Delhi and Mumbai or
together with BSNL, between Delhi and Mumbai and to other Indian cities. Leased line services
can be used for voice and data transmission at various bandwidths. In addition, the company
leases circuits to cellular operators in Delhi and Mumbai to interconnect their networks to its
network. As of March 31, 2009, the company had approximately 53,000 leased line subscribers.
Telex and Intelligent Network services: The company offers Intelligent Network services over its
entire network, which includes calling card service, toll free calling service, premium rate
‘0900’number service, and televoting service. Interconnection with domestic international long
distance carriers and with basic and cellular operators in Delhi and Mumbai: The company
provides local telephone services in Delhi and Mumbai, as well as domestic and international
long distance through its connectivity with BSNL’s domestic long distance network and VSNL’s
international gateways. In June 2008, the company received a license to enter the international
long distance service market. The company intends to lay submarine cable jointly with BSNL
from both the east and west coasts of India to the far East and the Middle East, respectively, to
carry voice and data traffic. Interconnection: The company connects its network with BSNL and
has entered into interconnect agreements with certain other licensed domestic long distance
service carriers to provide its customers with domestic long distance service and intend to pass
traffic to these other providers also (it carries its own traffic between Delhi and Mumbai). The
company connects its network with VSNL and has entered into interconnect agreements with
certain other licensed international long distance carriers to provide its customers with
international long distance service. It connects its network with the other basic, cellular
operators, and Unified Access Service Providers in Mumbai and Delhi to offer its customers
access in its coverage areas. Telecommunications Services in Other Countries United Telecom
Limited, a joint venture involving the company (26.68%), Telecommunications Consultants
India Limited (26.66%), Tata Communications Ltd) (26.66%), and Nepal Ventures Private
Limited (20%), commenced wireless in local loop services as the private-sector
telecommunications operator in Nepal. The company also has been awarded licenses to provide
basic and international long distance service, as well as mobile services in Mauritius. Through a
Mauritius subsidiary, MTML (Mahanagar Telephone Mauritius Limited), the company offers
fixed wireless services, mobile services, international long distance services, and Internet
services. Competition The company’s competitors include Reliance Infocom; Bharti Airtel; Tata
Teleservices Limited; Idea Cellular, Ltd.; Aircel Limited; Vodafone; and Loop Mobile. History
Mahanagar Telephone Nigam Limited was founded in 1986
competition

Last Price Market Cap. Sales Net Profit Total Assets


(Rs. cr.) Turnover
Bharti Airtel 265.50 100,824.42 35,609.54 9,426.16 35,357.62
Reliance Comm 200.10 41,301.18 12,290.61 478.93 82,593.93
Idea Cellular 58.25 19,223.85 11,895.77 1,053.66 18,873.79
Tata Comm 261.40 7,449.90 3,218.04 483.18 9,125.92
TataTeleservice 22.60 4,287.66 2,249.10 -298.01 2,743.96
MTNL 65.25 4,110.75 3,770.41 -2,514.87 12,059.38
Spice Comm 56.95 3,929.12 1,585.34 -1,015.22 1,875.94
Tulip Telecom 879.00 2,549.10 1,608.28 249.58 1,802.84
Nu Tek India 33.30 114.95 185.98 15.87 171.93
Goldstone Infra 26.25 94.71 65.58 6.75 110.56

Comparison with Competitors


------------------- in Rs. Cr. -------------------
MTNL TataTeleservice Bharti Airtel Tata Comm Idea Cellular
Sales Turnover Mar '10 Mar '10 Mar '10 Mar '10 Mar '10
Other Income 3,770.41 2,249.10 35,609.54 3,218.04 11,895.77
Total Income 1,135.03 28.71 89.73 125.75 66.31
Total Expenses 4,905.44 2,277.81 35,699.27 3,343.79 11,962.08
Operating Profit 7,248.45 1,737.30 11,370.13 2,471.60 9,035.83
Profit On Sale Of Assets -3,478.04 511.80 24,239.41 746.44 2,859.94
Profit On Sale Of Investments -- -- -- -- --
Gain/Loss On Foreign Exchange -- -- -- -- --
VRS Adjustment -- -- -- -- --
Other Extraordinary Income/Expenses -- -- -- -- --
Total Extraordinary Income/Expenses -- -- -- -- --
Tax On Extraordinary Items -33.16 -- -- 218.28 --
Net Extra Ordinary Income/Expenses -- -- -- -- --
Gross Profit -- -- -- -- --
Interest -2,343.01 540.51 24,329.14 872.19 2,926.25
PBDT 0.71 317.62 -855.65 206.41 206.32
Depreciation -1,878.53 222.89 14,589.33 884.06 2,719.93
Depreciation On Revaluation Of
728.53 520.89 3,890.08 574.73 1,551.20
Assets
PBT -- -- -- -- --
Tax -2,607.06 -298.00 10,699.25 309.33 1,168.73
Net Profit -92.19 0.01 1,273.09 -173.85 115.07
Prior Years Income/Expenses -2,514.87 -298.01 9,426.16 483.18 1,053.66
Depreciation for Previous Years
498.35 -- -- -- --
Written Back/ Provided
Dividend -- -- -- -- --
Dividend Tax -- -- -- -- --
Dividend (%) -- -- -- -- --
Earnings Per Share -- -- -- -- --
Book Value -- -- 24.82 16.95 3.19
Equity -- -- -- -- --
Reserves 630.00 1,897.20 1,898.77 285.00 3,299.84
Face Value -- -2,563.53 34,836.28 6,788.54 8,112.95

“To provide in its area of operation, in a leading way, world class telecom services which are
demanded, keeping always the customer’s delight as its aim, so that it continues to be the
premier Indian Telecom Company”.

ETHICS & COMMITMENT STATEMENT

Integrity and transparency are the core value in all our business dealings.
We shall act in compliance with applicable laws and regulations, in a manner that excludes
considerations of personal advantage and will not compromise in our commitment to honesty
and integrity in any aspect of our business. We are committed to excellence, in all our
endeavours.
GSM (Global System for Mobile Communications: originally from Groupe Spécial Mobile) is
the most popular standard for mobile telephony systems in the world. The GSM Association, its
promoting industry trade organization of mobile phone carriers and manufacturers, estimates that
80% of the global mobile market uses the standard.GSM is used by over 4.3 billion people across
more than 212 countries and territoriesIts ubiquity enables international roaming arrangements
between mobile phone operators, providing subscribers the use of their phones in many parts of
the world. GSM differs from its predecessor technologies in that both signaling and speech
channels are digital, and thus GSM is considered a second generation (2G) mobile phone system.
This also facilitates the wide-spread implementation of data communication applications into the
system.

The ubiquity of implementation of the GSM standard has been an advantage to both consumers,
who may benefit from the ability to roam and switch carriers without replacing phones, and also
to network operators, who can choose equipment from many GSM equipment vendors. GSM
also pioneered low-cost implementation of the short message service (SMS), also called text
messaging, which has since been supported on other mobile phone standards as well.
Newer versions of the standard were backward-compatible with the original GSM system. For
example, Release '97 of the standard added packet data capabilities by means of General Packet
Radio Service (GPRS). Release '99 introduced higher speed data transmission using Enhanced
Data Rates for GSM Evolution (EDGE).

GSM carrier frequencies


GSM networks operate in a number of different carrier frequency ranges (separated into GSM
frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks
operating in the 900 MHz or 1800 MHz bands. Where these bands were already allocated, the
850 MHz and 1900 MHz bands were used instead (for example in Canada and the United
States). In rare cases the 400 and 450 MHz frequency bands are assigned in some countries
because they were previously used for first-generation systems.

Most 3G networks in Europe operate in the 2100 MHz frequency band.

Regardless of the frequency selected by an operator, it is divided into timeslots for individual
phones to use.

Modules of gsm
The network is structured into a number of discrete sections:
• The Base Station Subsystem (the base stations and their controllers).
• The Network and Switching Subsystem (the part of the network most similar to a fixed
network). This is sometimes also just called the core network.
• The GPRS Core Network (the optional part which allows packet based Internet
connections).
• The Operations support system (OSS) for maintenance of the network..

Base station subsystem


The base station subsystem (BSS) is the section of a traditional cellular telephone network which
is responsible for handling traffic and signaling between a mobile phone and the network
switching subsystem. The BSS carries out transcoding of speech channels, allocation of radio
channels to mobile phones, paging, transmission and reception over the air interface and many
other tasks related to the radio network.

Network switching subsystem


Network switching subsystem (NSS) (or GSM core network) is the component of a GSM system
that carries out call switching and mobility management functions for mobile phones roaming on
the network of base stations. It is owned and deployed by mobile phone operators and allows
mobile devices to communicate with each other and telephones in the wider Public Switched
Telephone Network or (PSTN). The architecture contains specific features and functions which
are needed because the phones are not fixed in one location.

Operations support system


Operations Support Systems (also called Operational Support Systems or OSS) are computer
systems used by telecommunications service providers. The term OSS most frequently describes
"network systems" dealing with the telecom network itself, supporting processes such as
maintaining network inventory, provisioning services, configuring network components, and
managing faults. The complementary term Business Support Systems or BSS is a newer term
and typically refers to "business systems" dealing with customers, supporting processes such as
taking orders, processing bills, and collecting payments. The two systems together are often
abbreviated BSS/OSS or simply B/OSS.

Subscriber identity module


One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM
card. The SIM is a detachable smart card containing the user's subscription information and
phone book. This allows the user to retain his or her information after switching handsets.
Alternatively, the user can also change operators while retaining the handset simply by changing
the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only
a SIM issued by them; this practice is known as SIM locking and is illegal in some countries.

MOBILE STATION
The MS includes radio equipment and the man machine interface (MMI) that a subscribe needs
in order to access the services provided by the GSM PLMN. MS can be installed in Vehicles or
can be portable or handheld stations. The MS may include provisions for data communication as
well as voice. A mobile transmits and receives message to and from the GSM system over the air
interface to establish and continue connections through the system .

Different type of MSs can provide different type of data interfaces. To provide a common
model for describing these different MS configuration, ”reference configuration” for MS, similar
to those defined for ISDN land stations, has been defined.

Each MS is identified by an IMEI that is permanently stored in the mobile unit. Upon
request, the MS sends this number over the signaling channel to the MSC. The IMEI can be used
to identify mobile units that are reported stolen or operating incorrectly.

Just as the IMEI identities the mobile equipment, other numbers are used to identity the
mobile subscriber. Different subscriber identities are used in different phases of call setup. The
Mobile Subscriber ISDN Number (MSISDN) is the number that the calling party dials in order to
reach the subscriber. It is used by the land network to route calls toward an appropriate MSC.
The international mobile subscribe identity (IMSI) is the primary function of the subscriber
within the mobile network and is permanently assigned to him. The GSM system can also assign
a Temporary Mobile Subscriber Identity (TMSI) to identity a mobile. This number can be
periodically changed by the system and protect the subscriber from being identified by those
attempting to monitor the radio channel.

Functions of MS
The primary functions of MS are to transmit and receive voice and data over the air interface
of the GSM system. MS performs the signal processing function of digitizing, encoding, error
protecting, encrypting, and modulating the transmitted signals. It also performs the inverse
functions on the received signals from the BS.

In order to transmit voice and data signals, the mobile must be in synchronization with the
system so that the messages are the transmitted and received by the mobile at the correct instant.
To achieve this, the MS automatically tunes and synchronizes to the frequency and TDMA
timeslot specified by the BSC. This message is received over a dedicated timeslot several times
within a multiframe period of 51 frames. We shall discuss the details of this in the next chapter.
The exact synchronization will also include adjusting the timing advance to compensate for
varying distance of the mobile from the BTS.

The MS monitors the power level and signal quality, determined by the BER for known
receiver bit sequences (synchronization sequence), from both its current BTS and up to six
surrounding BTSs. This data is received on the downlink broadcast control channel. The MS
determines and send to the current BTS a list of the six best-received BTS signals. The
measurement results from MS on downlink quality and surrounding BTS signal levels are sent to
BSC and processed within the BSC. The system then uses this list for best cell handover
decisions.
MS keeps the GSM network informed of its location during both national and
international roaming, even when it is inactive. This enables the System to page in its present
LA.
The MS includes an equalizer that compensates for multi-path distortion on the received
signal. This reduces inter-symbol interface that would otherwise degrade the BER.

Finally, the MS can store and display short received alphanumeric messages on the liquid
crystal display (LCD) that is used to show call dialing and status information. These messages
are limited to 160 characters in length.

Power Levels
These are five different categories of mobile telephone units specified by the European GSM
system: 20W, 8W, 5W, 2W, and 0.8W. These correspond to 43-dBm, 39-dBm, 37-dBm, 33-
dBm, and 29-dBm power levels. The 20-W and 8-W units (peak power) are either for vehicle-
mounted or portable station use.

The MS power is adjustable in 2-dB steps from its nominal value down to 20mW (13
dBm). This is done automatically under remote control from the BTS, which monitors the
received power and adjusts the MS transmitter to the minimum power setting necessary for
reliable transmission.

International Mobile Subscriber Identity.

An IMSI is assigned to each authorized GSM user. It consists of a mobile country code (MSC),
mobile network code (MNC), and a PLMN unique mobile subscriber identification number
(MSIN). The IMSI is not hardware-specific. Instead, it is maintained on a SC by an authorized
subscriber and is the only absolute identity that a subscriber has within the GSM system. The
IMSI consists of the MCC followed by the NMSI and shall not exceed 15 digits.
Temporary Mobile Subscriber Identity
A TMSI is a MSC-VLR specific alias that is designed to maintain user confidentiality. It is
assigned only after successful subscriber authentication. The correlation of a TMSI to an IMSI
only occurs during a mobile subscriber’s initial transaction with an MSC (for example, location
updating). Under certain condition (such as traffic system disruption and malfunctioning of the
system), the MSC can direct individual TMSIs to provide the MSC with their IMSI.

Mobile Station ISDN Number


The MS international number must be dialed after the international prefix in order to obtain a
mobile subscriber in another country. The MSISDN numbers is composed of the country code
(CC) followed by the National Significant Number (N(S)N), which shall not exceed 15 digits.

The Mobile Station Roaming Number (MSRN)


The MSRN is allocated on temporary basis when the MS roams into another numbering area.
The MSRN number is used by the HLR for rerouting calls to the MS. It is assigned upon demand
by the HLR on a per-call basis. The MSRN for PSTN/ISDN routing shall have the same
structure as international ISDN numbers in the area in which the MSRN is allocated. The HLR
knows in what MSC/VLR service area the subscriber is located. At the reception of the MSRN,
HLR sends it to the GMSC, which can now route the call to the MSC/VLR exchange where the
called subscriber is currently registered.

International Mobile Equipment Identity


The IMEI is the unique identity of the equipment used by a subscriber by each PLMN and is
used to determine authorized (white), unauthorized (black), and malfunctioning (gray) GSM
hardware. In conjunction with the IMSI, it is used to ensure that only authorized usera are
granted access to the system. An IMEI is never sent in cipher mode by MS.

Structure of gsm

BTS
A BTS is a network component that serves one cell and is controlled by a BSC. BTS is
typically able to handle three to five radio carries, carrying between 24 and 40 simultaneous
communication. Reducing the BTS volume is important to keeping down the cost of the cell
sites.
An important component of the BSS that is considered in the GSM architecture as a part
of the BTS is the Transcoder/Rate Adapter Unit (TRAU). The TRAU is the equipment in which
coding and decoding is carried out as well as rate adoption in case of data. Although the
specifications consider the TRAU as a subpart of the BTS, it can be sited away from the BTS (at
MSC), and even between the BSC and the MSC.

The interface between the MSC and the BSS is a standardized SS7 interface (A-interface)
that, as stated before, is fully defined in the GSM recommendations. This allows the system
operator to purchase switching equipment from one supplier and radio equipment and the
controller from another. The interface between the BSC and a remote BTS likewise is a standard
the A-bis. In splitting the BSS functions between BTS and BSC, the main principle was that only
such functions that had to reside close to the radio transmitters/receivers should be placed in
BTS. This will also help reduce the complexity of the BTS.

Functions of BTS
As stated, the primary responsibility of the BTS is to transmit and receive radio signals from
a mobile unit over an air interface. To perform this function completely, the signals are
encoded, encrypted, multiplexed, modulated, and then fed to the antenna system at the cell
site. Trans-coding to bring 13-kbps speech to a standard data rate of 16 kbps and then
combining four of these signals to 64 kbps is essentially a part of BTS, though, it can be done
at BSC or at MSC. The voice communication can be either at a full or half rate over logical
speech channel. In order to keep the mobile synchronized, BTS transmits frequency and time
synchronization signals over frequency correction channel (FCCH and BCCH logical
channels. The received signal from the mobile is decoded, decrypted, and equalized for
channel impairments.
Random access detection is made by BTS, which then sends the message to BSC. The
channel subsequent assignment is made by BSC. Timing advance is determined by BTS.
BTS signals the mobile for proper timing adjustment. Uplink radio channel measurement
corresponding to the downlink measurements made by MS has to be made by BTS.

BTS-BSC Configurations
There are several BTS-BSC configurations: single site; single cell; single site; multicell; and
multisite, multicell. These configurations are chosen based on the rular or urban application.
These configurations make the GSM system economical since the operation has options to adapt
the best layout based on the traffic requirement. Thus, in some sense, system optimization is
possible by the proper choice of the configuration. These include omni directional rural
configuration where the BSC and BTS are on the same site; chain and multidrop loop
configuration in which several BTSs are controlled by a single remote BSC with a chain or ring
connection topology; rural star configuration in which several BTSs are connected by individual
lines to the same BSC; and sectorized urban configuration in which three BTSs share the same
site amd are controlled by either a collocated or remote BSC.In rural areas, most BSs are
installed to provide maximum coverage rather then maximum capacity.

Transcoder
Depending on the relative costs of a transmission plant for a particular cellular operator, there
may be some benefit, for larger cells and certain network topologies, in having the transcoder
either at the BTS, BSC or MSC location. If the trascoder is located at MSC, they are still
considered functionally a part of the BSS. This approach allows for the maximum of flexibility
and innovation in optimizing the transmission between MSC and BTS.
The transcoder is the device that takes 13-Kbps speech or 3.6/6/12-Kbps data multiplexes
and four of them to convert into standard 64-Kbps data. First, the 13 Kbps or the data at 3.6/6/12
Kbps are brought up to the level of 16 Kpbs by inserting additional synchronizing data to make
up the difference between a 13-Kbps speech or lower rate data, and then four of them are
combined in the transcoder to provide 64 Kpbs channel within the BSS. Four traffic channel can
then be multiplexed on one 64-Kpbs circuit. Thus, the TRAU output data rate is 64 Kpbs. Then,
up to 30 such 64-Kpbs channels are multiplexed onto a 2.048 Mpbs if a CEPT1 channel is
provided on the A-bis interface. This channel can carry up to 120-(16x 120) traffic and control
signals. Since the data rate to the PSTN is normally at 2 Mbps, which is the result of combining
30-Kbps by 64-Kbph channels, or 120- Kbps by 16-Kpbs channels.

BSC
The BSC, as discussed, is connected to the MSC on one side and to the BTS on the other. The
BSC performs the Radio Resource (RR) management for the cells under its control. It assigns
and release frequencies and timeslots for all MSs in its own area. The BSC performs the intercell
handover for MSs moving between BTS in its control. It also reallocates frequencies to the BTSs
in its area to meet locally heavy demands during peak hours or on special events. The BSC
controls the power transmission of both BSSs and MSs in its area. The minimum power level for
a mobile unit is broadcast over the BCCH. The BSC provides the time and frequency
synchronization reference signals broadcast by its BTSs. The BSC also measures the time delay
of received MS signals relative to the BTS clock. If the received MS signal is not centered in its
assigned timeslot at the BTS, The BSC can direct the BTS to notify the MS to advance the
timing such that proper synchronization takes place. The functions of BSC are as follows. The
BSC may also perform traffic concentration to reduce the number of transmission lines from the
BSC to its BTSs, as discussed in the last section.

SWITCHING SUBSYSTEMS:
MSC AND GMSC

The network and the switching subsystem together include the main switching functions of GSM
as well as the databases needed for subscriber data and mobility management (VLR). The main
role of the MSC is to manage the communications between the GSM users and other
telecommunication network users. The basic switching function of performed by the MSC,
whose main function is to coordinate setting up calls to and from GSM users. The MSC has
interface with the BSS on one side (through which MSC VLR is in contact with GSM users) and
the external networks on the other (ISDN/PSTN/PSPDN). The main difference between a MSC
and an exchange in a fixed network is that the MSC has to take into account the impact of the
allocation of RRs and the mobile nature of the subscribers and has to perform, in addition, at
least, activities required for the location registration and handover.

The MSC is a telephony switch that performs all the switching functions for MSs
located in a geographical area as the MSC area. The MSC must also handle different types of
numbers and identities related to the same MS and contained in different registers: IMSI,
TMSI,ISDN number, and MSRN. In general identities are used in the interface between the MSC
and the MS, while numbers are used in the fixed part of the network, such as, for routing.

Functions of MSC
As stated, the main function of the MSC is to coordinate the set up of calls between GSM mobile
and PSTN users. Specifically, it performs functions such as paging, resource allocation, location
registration, and encryption.

Specifically, the call-handling function of paging is controlled by MSC. MSC coordinates the set
up of call to and from all GSM subscribers operating in its areas. The dynamics allocation of
access resources is done in coordination with the BSS. More specifically, the MSC decides when
and which types of channels should be assigned to which MS. The channel identity and related
radio parameters are the responsibility of the BSS, The MSC provides the control of
interworking with different networks. It is transparent for the subscriber authentication
procedure. The MSC supervises the connection transfer between different BSSs for MSs, with an
active call, moving from one call to another. This is ensured if the two BSSs are connected to the
same MSC but also when they are not . In this latter case the procedure is more complex, since
more then one MSC in involved. The MSC performs billing on calls for all subscribers based in
its areas. When the subscriber is roaming elsewhere, the MSC obtains data for the call billing
from the visited MSC. Encryption parameters transfers from VLR to BSS to facilitate ciphering
on the radio interface are done by MSC. The exchange of signaling information on the various
interface toward the other network elements and the management of the interface themselves are
all controlled by the MSC. Finally, the MSC serves as a SMS gateway to forward SMS messages
from Short Message Service Centers (SMSC) to the subscribers and from the subscribers to the
SMSCs. It thus acts as a message mailbox and delivery system.

VLR
The VLR is collocated with an MSC. A MS roaming in an MSC area is controlled by the VLR
responsible for that area. When a MS appears in a LA, it starts a registration procedure. The
MSC for that area notices this registration and transfers to the VLR the identify of the LA where
the MS is situated. A VLR may be in charge of one or several MSC LA’s. The VLR constitutes
the databases that support the MSC in the storage and retrieval of the data of subscribers present
in its area. When an MS enters the MSC area borders, it signals its arrival to the MSC that stores
its identify in the VLR. The information necessary to manage the MS is contained in the HLR
and is transferred to the VLR so that they can be easily retrieved if so required.

Data Stored in VLR


The data contained in the VLR and in the HLR are more or less the same. Nevertheless the data
are present in the VLR only as long as the MS is registered in the area related to that VLR. Data
associated with the movement of mobile are IMSI, MSISDN, MSRN, and TMSI. The terms
permanent and temporary, in this case, are meaningful only during that time interval. Some data
are mandatory, others are optional.

HOME LOCATION REGISTER (HLR)


The HLR is a database that permanently stores data related to a given set of subscribers. The
HLR is the reference database for subscriber parameters. Various identification numbers and
addresses as well as authentication parameters, services subscribed, and special routing
information are stored. Current subscriber status including a subscriber’s temporary roaming
number and associated VLR if the mobile is roaming, are maintained.

The HLR provides data needed to route calls to all MS-SIMs home based in its MSC
area, even when they are roaming out of area or in other GSM networks. The HLR provides the
current location data needed to support searching for and paging the MS-SIM for incoming calls,
wherever the MS-SIM may be. The HLR is responsible for storage and provision of SIM
authentication and encryption parameters needed by the MSC where the MS-SIM is operating. It
obtains these parameters from the AUC.

The HLR maintains record of which supplementary service each user has subscribed to
and provides permission control in granting services. The HLR stores the identification of SMS
gateways that have messages for the subscriber under the SMS until they can be transmitted to
the subscriber and receipt is knowledge.
Some data are mandatory, other data are optional. Both the HLR and the VLR can be
implemented in the same equipment in an MSC (collocated). A PLMN may contain one or
several HLRs.

AUTHENTICATION CENTER
The AUC stores information that is necessary to protect communication through the air interface
against intrusions, to which the mobile is vulnerable. The legitimacy of the subscriber is
established through authentication and ciphering, which protects the user information against
unwanted disclosure. Authentication information and ciphering keys are stored in a database
within the AUC, which protects the user information against unwanted disclosure and access.
In the authentication procedure, the key Ki is never transmitted to the mobile over the air
path, only a random number is sent. In order to gain access to the system, the mobile must
provide the correct Signed Response (SRES) in answer to a random number (RAND) generated
by AUC.
Also, Ki and the cipher key Kc are never transmitted across the air interface between the
BTS and the MS. Only the random challenge and the calculated response are transmitted. Thus,
the value of Ki and Kc are kept secure. The cipher key, on the other hand, is transmitted on the
SS7 link between the home HLR/AUC and the visited MSC, which is a point of potential
vulnerability. On the other hand, the random number and cipher key is supposed to change with
each phone call, so finding them on one call will not benefit using them on the next call.
The HLR is also responsible for the “authentication” of the subscriber each time he
makes or receives a call. The AUC, which actually performs this function, is a separate GSM
entity that will often be physically included with the HLR. Being separate, it will use separate
processing equipment for the AUC database functions.

EQUIPMENT IDENTIFY REGISTER


EIR is a database that stores the IMEI numbers for all registered ME units. The IMEI uniquely
identifies all registered ME. There is generally one EIR per PLMN. It interfaces to the various
HLR in the PLMN. The EIR keeps track of all ME units in the PLMN. It maintains various lists
of message. The database stores the ME identification and has nothing do with subscriber who is
receiving or originating call. There are three classes of ME that are stored in the database, and
each group has different characteristics.
White List: contains those IMEIs that are known to have been assigned to valid MS’s. This is the
category of genuine equipment.
Black List: contains IMEIs of mobiles that have been reported stolen.
Gray List: contains IMEIs of mobiles that have problems (for example, faulty software, wrong
make of the equipment). This list contains all MEs with faults not important enough for barring.

INTERWORKING FUNCTION
GSM provided a wide range of data services to its subscribers. The GSM system interface with
the various forms of public and private data networks currently available. It is the job of the IWF
to provide this interfacing capability.
The IWF, which in essence is a part of MSC, provides the subscriber with access to data rate and
protocol conversion facilities so that data can be transmitted between GSM Data Terminal
Equipment (DTE) and a land-line DTE.

ECHO CANCELER
EC is used on the PSTN side of the MSC for all voice circuits. The EC is required at the MSC
PSTN interface to reduce the effect of GSM delay when the mobile is connected to the PSTN
circuit. The total round-trip delay introduced by the GSM system, which is the result of speech
encoding, decoding and signal processing, is of the order of 180 ms. Normally this delay would
not be an annoying factor to the mobile, except when communicating to PSTN as it requires a
two-wire to four-wire hybrid transformer in the circuit. This hybrid is required at the local
switching office because the standard local loop is a two-wire circuit. Due to the presence of this
hybrid, some of the energy at its four-wire receive side from the mobile is coupled to the four-
wire transmit side and thus retransmitted to the mobile. This causes the echo, which does not
effect the land subscriber but is an annoying factor to the mobile. The standard EC cancels about
70 ms of delay.
During a normal PSTN (land-to-land call), no echo is apparent because the delay
is too short and the land user is unable to distinguish between the echo and the normal telephone
“side tones” However, with the GSM round-trip delay added and without the EC, the effect
would be irritating to the MS subscriber.

OPERATION AND MAINTENANCE CENTER


The OMC provides alarm-handling functions to report and log alarms generated by the other
network entities. The maintenance personnel at the OMC can define that criticality of the alarm.
Maintenance cover both technical and administrative actions to maintain and correct the system
operation, or to restore normal operations after a breakdown, in the shortest possible time.
The fault management functions of the OMC allow network devices to be manually or
automatically removed from or restored to service. The status of network devices can be
checked, and tests and diagnostics on various devices can be invoked. For example, diagnostics
may be initiated remotely by the OMC. A mobile call trace facility can also be invoked. The
performance management functions included collecting traffic statistics from the GSM network
entities and archiving them in disk files or displaying them for analysis. Because a potential to
collect large amounts of data exists, maintenance personal can select which of the detailed
statistics to be collected based on personal interests and past experience. As a result of
performance analysis, if necessary, an alarm can be set remotely.

The OMC provides system change control for the software revisions and configuration
data bases in the network entities or uploaded to the OMC. The OMC also keeps track of the
different software versions running on different subsystem of the GSM.

Call and Mobility Management


Mobility management entails the GSM system keeping track of the mobile while on the move.
The mobility management is implemented through mobility management (MM) sub-layer which
is present in layer 3 of the protocol stack at MS and MSC. The functions performed by the
mobility management are:
1. Subscribe Data management at MSC/VLR-
Subscriber data from HLR are retrieved by MM at the time of first location updating of the
subscriber. Dynamic data change for a subscribe are also managed by the MM.
2. Services provided to upper layers-
MM provides basic means of transportation of upper CM sub-layer messages between
MS and the network Handover procedures ensure smooth transition from one radio
network to another.
3. Subscriber Authentication and confidentiality Management –
MM procedures ensure data confidentiality of a subscriber MM procedures provide a
means for to ensure data confidentiality at radio interface.
Mobility management is implemented through MM procedures, which are broadly classified in
to two groups – i) MM Common Procedure
ii) MM Specific Procedure
A MM specific procedure can only be started if no other MM specific procedure is running
or no MM connection exists between the network and the mobile station. The end of the running
MM connection has to be awaited before a new MM specific procedure can be started.
During the lifetime of a MM specific procedure, if a MM connection establishment is
requested by a CM entity this request will either be rejected or be delayed until the running MM
specific procedure is terminated (this depends upon implementation).
Any MM common procedure (except IMSI detach) may be started during MM specific
procedure.

MM Common Procedure.
1. TMSI reallocation procedure_
The purpose of the TMSI reallocation procedures is to provide identify confidentiality i.e. to
protect a user against being identified and located by an intruder. TMSI is used for
identification within the radio interface signaling procedures instead of IMSI. Usually the
TMSI reallocation is performed at least at each change of a location area. The reallocation of
TMSI can be performed explicitly after predetermined no. of accesses by MS to the network
or implicitly by a location updating procedure . TMSI reallocation can be initiated by the
network at any time whilst R R connection exists between the network and the mobile
station.
In case of TMSI reallocation procedure initiated by the network, network sends TMSI
reallocation command message to the MS containing new TMSI/LAI MS on receiving the
message stores new TMSI and LAI in SIM and deletes the older entries and sends TMSI
reallocation complete message to the network.
2. Authentication procedure-
Authentication Triplets.
At network side, authentication procedure requires authentication triplets.
Authentication triplet consists of:
Random number RAND (128 bits)
Signed response SRES (32 bits)
Ciphering key (64 bits).

While initiating authentication procedure, if network has no authentication triplet or all


triplets have been used, it requests AuC for the same. The index of currently used triplet is
known as CKSN. (Ciphering key sequence number).

2. Identification procedure.
The identification procedure is used by the network to request a MS to provide specific
identification parameters to the network e.g. IMSI, IMEI.
In case MS update location in the system using TMSI, but due to data base failure, TMSI at
network end is no more available; network initiates identification procedure and asks for
IMSI.
If network is unable to receive identity response, it clears all the ongoing MM connections
and releases radio resources.

3. IMSI Detach procedure.


The purpose of this procedure is to indicate the network that MS has switched off. This
enables the network not to page for the subscriber and invokes other applicable
supplementary service (e.g. call forwarding etc).

4. Ciphering procedure
Ciphering procedure is needed to encrypt data transmission over radio interface. When
MSC needs to indicate ciphering on radio interface, it sends Cipher Mode Command
message to BSS. This message contains Kc and a list of permitted algorithms. BSS stores Kc
for this session and sends Cipher mode message to the MS. BSS enable encryption and uses
Kc and permitted algorithm to encrypt /decrypt data.
In case ciphering is completed successfully the network receives a Cipher Mode
Complete command from the MS. This message contains the algorithm used for ciphering.
MSC stores this information and proceeds for further activities like call set- up etc.
In case MS is not able to support the ciphering it sends Cipher Mode Reject command to
the network. At MSC the encryption control is operator controlled. If ciphering is mandatory
and network receives a Cipher Mode Reject command from the MS, MSC clears all the
ongoing MM connection and then releases radio resources.

5. Abort procedure.
The procedure is used to abort any ongoing or established MM connection.

MM specific procedure
The MM specific procedures are –
Normal location updating – MS moves from one LA to other LA.
Periodic location updating -- It is used to periodically notify the availability of the MS to the
network.
IMSI attach procedure – is used to indicate the IMSI as active in the network.
MS initiates location-updating procedure by sending a Location Updating Request message to
the network. MS starts a guard timer and enters state location updating initiated. After this the
network. initiates authentication and ciphering procedure. After successful authentication and
ciphering location updating procedure proceeds further.
To limit the number of unsuccessful location updating attempts, an Attempt Counter is
maintained at MS. Attempt counter is incremented when a location updating procedure fails.
Attempt counter is reset when MS is powered on /a SIM is inserted / location update is
successfully completed.
If the Location updating is successfully accepted by the network a Location Updating
Accept message is transferred to the MS. Implicit TMSI reallocation procedure is also invoked.
MS on receiving the Location Updating Accept stores the received LAI, stops the guard
timer, reset the attempt counter and sets the update status of SIM to updated. MS at all times
maintains a list of forbidden LAI’s and PLMN’s in SIM. If the LAI or PLMN identity contained
in the Location Updating Accept message is a member of any of the “forbidden lists” then any
such entries are deleted in MS.

After location-updating procedure is over, the RR connection is released. The network


initiates the release. MS waits for the release and if within time out the connection is not
released, MS aborts it.
MM procedures make use of certain MAP (Mobile Application Part). For example location
updating procedure, which is an MM specific procedure make use of MAP procedures like:
Down-loading of subscriber related data from HLR to VLR through MAP procedure on C
interface. Thus LU procedure of MM makes use of a MAP procedure also. Similarly
authentication procedure, which is a MM common procedure, make use of MAP procedure to
retrieve authentication triplets from AuC.

Connection Management.
The mobility management (MM) sub-layer provides services to different entities of upper
connection management (CM) sub-layer. The different entities of CM sub-layer requesting for
service to MM sub-layer could be-call control (CC), short message service (SMS) or
supplementary service (SS). An MM connection is established and released on request from CM
entities. Different CM entity communicates with their pier entities using different MM
connection.
An MM connection requires an RR connection. Several MM connections may be active at
the same time and all simultaneous MM connection for a given MS use the same RR connection.
Different MM connections are identified by different protocol discriminator (PD) and
transaction identifier (TI) value. MM connection establishment may be initiated by the MS or the
network.
For an MS to initiate MM connection its updating status should be updated and MM sub-
layer should be either in IDLE or ACTIVE state. If any MM specific procedure is running then a
new MM connection establishment will either be rejected or delayed (depending upon
implementation). If no RR connection exists between MS and network, RR connection is
established by sending CM service request message to the network and MM sub- layer enters
wait for o/g MM Connection State. If RR connection already exists and an MM connection is
active, CM service Request message is sent and MM sub-layer enters wait for additional o/g MM
connection state. The CM service Request message contains the type of CM service requested
(o/g call, Emergency call, SMS, SS). If the network can accept the CM service request, a CM
Service Accept message is sent to MS and on recovering this message MM connection become
active and CC message can be transferred by CM entity. If network cannot accept CM service
request from MS, a CM service Reject message is sent to MS.
In case of MT (mobile terminated) call (incoming voice call or short message to the MS) CM
sub–layer entity in the network request MM sub layer to establish a MM connection.
The MM sub-layer is informed after completion of paging procedure. Now these can be
two scenarios depending upon whether RR connection to the desired MS already exists or not.

(a) R R connection to the desired MS already exists-


This could be then case when MS is in conversation mode and there is a short message for
the MS. When RR connection between the network and desired MS exists and also no MM
specific procedure is running (is no location updating etc. is in progress) the network establishes
new MM connection over same RR connection with new PD/TI combination. Before
establishment of a new MM connection the network may initiate any of MM common procedure
like authentication, ciphering etc. and wait for their successful completion.

(b) R R connection to the desired MS does not exist-


MM sub layer first requests to establish an RR connection and on connection establishment
MM sub-layer may initiate any of MM common procedure (authentication, ciphering etc.) Upon
successful completion of any such procedure MM sub layer informs the requesting CM sub-layer
entity.
If RR connection establishment is unsuccessful or any of the MM common procedure fail,
this is indicated to CM sub-layer with appropriate error cause.

A CM sub-layer entity, after having been advised that a MM connection has been
established, requests the transfer of CM massages. The CM messages passed to MM sub-layer
are sent to these other side of the interface with PD & TI set according to source entity. Upon
receiving CM message, the MM sub-layer on the side of the interface distributes it to the relevant
CM entity according to the PD & TI value.
After the information transfer between CM entities is over, an established MM connection
can be released by local CM entity. The release of CM connection is then done locally in the
MM sub-layer. After the release of last MM connection by its user, the MM sub-layer decides to
release RR connection requesting RR sub-layer.
Handover Management.
The main aim of handover is to avoid losing a call is progress when MS leaves the radio
coverage of the call in charge.
Handovers can be classified as
Internal handover within one cell.
Internal handover between cells.
External handover.
The hand-over process may be thought of as consisting of three phases-
1. Recognition that handover is required.
2. Decision of a target cell.
3. Execution of the handover.
Allocation and connection of new channel.
Reallocation and release of old channel.
The BSS is wholly responsible for first phase. However MSC may trigger BSS to do so through
certain, BSSMAP procedure. MSC participates with BSS in execution of phase 2 and 3.
Type of handovers-
Rescuer handover are done to avoid losing a call in progress when MS leaves the radio
coverage area of the cell in charge. These are the most common types of handover. The handover
decision is triggered by the averaged measurement reports given by the MS, for the beacon
frequencies of the adjacent cells given to it by the BSS.
Confinement handover is an handover triggered with the goal of optimizing the interface level.
The BSC divides the frequencies in a cell into five interference bands based on interference level
on each of them.
Traffic hand-over are aimed at reducing the congestion in congested cell by handing over some
cell from one cell to less congested one.
The hand-over procedure provides interface between the call control entities, MAP procedure
and the BSSMAP procedure to realize the handover. The handover are further categorized into:
Intra MSC handover.
Inter MSC handover.
The intra MSC handover procedure operates as detailed below.
BSS- A generates the HANDOVER REQUIRED message to MSC containing a list of cells in
order of preference to which MS is to be hand-over.
MSC on getting this message send a HANDOVER REQUEST message to the target BSS i.e
BSS-B.
BSS-B an receiving handover request messages takes all necessary action for giving radio access
to the MS in the new cell and gives a HANDOVER REQUEST ACK to MSC with a handover
reference number.
The HANDOVER REQUEST ACK message contains a HANDOVER COMMAND message,
which is to be transparently passed on by the MSC to BSS-A.
MS now accesses the radio resources of BSS-B with a HADOVER ACCESS on getting which
BSS-B verifies the reference number and sends HADOVER DETECT to MSC.
When MS starts successfully communicating with BSS-B,BSS-B sends HANDOVER
COMPLETE message to MSC.
MSC now release the resources held on BSS-A by sending it a CLEAR COMMAND.

Note:- When handover procedure is operational all the message meant for the MS are queued
up and are delivered only after the handover is complete . In case handover procedure fails the
queued up message meant for the MS are delivered once MS is back in communication with the
old BSS.

Inter MSC Handover-


Inter MSC handover is required when the target cell belongs to other MSC service area. The
successful handover in this case requires a circuit between two MSC’s. Inter MSC hand over
procedure acquires a circuit between the two MSC’s using MAP-E interface.
The handover procedure operates as detailed below-
MSC-A, on receipts of HANDOVER REQUIRED message from BSS-A, sends a
MAP_PREPARE_HANDOVER message to MSC-B containing HANDOVER REQUEST
message.
On receipts of this message MSC-B acquires a handover number from its VLR and returns it to
MSC-A in MAP_PREPARE_HANDOVER_REQUEST_resp. message. This message also
contains HANDOVER REQUEST .ACK containing in turn HANDOVER COMMAND to be
given by BSS-A to the MS.
On getting this message MSC-A dials handover number to obtain a circuit between two MSC’s.
MSC-A on receipt of ACM (ISUP) message from MSC-B sends the HANDOVER COMMAND
to BSS-A.
MSC-B passes the HANDOVER DETECT and HANDOVER COMPLETE message received
from the BSS-B to MSC-A.
After getting HANDOVER COMPLETE from BSS-B over E interface MSC-A initiates the
release of radio resources towards BSS-A.

FRAME STRUCTURE:
The GSM system has a defined GSM frame structure to enable the orderly passage of
information. The GSM frame structure establishes schedules for the predetermined use of
timeslots.
By establishing these schedules by the use of a frame structure, both the mobile and the base
station are able to communicate not only the voice data, but also signalling information without
the various types of data becoming intermixed and both ends of the transmission knowing
exactly what types of information are being transmitted.
The GSM frame structure provides the basis for the various physical channels used within GSM,
and accordingly it is at the heart of the overall system.

Basic GSM frame structure


The basic element in the GSM frame structure is the frame itself. This comprises the eight slots,
each used for different users within the TDMA system. As mentioned in another page of the
tutorial, the slots for transmission and reception for a given mobile are offset in time so that the
mobile does not transmit and receive at the same time.
GSM frame consisting of eight slots
The basic GSM frame defines the structure upon which all the timing and structure of the GSM
messaging and signalling is based. The fundamental unit of time is called a burst period and it
lasts for approximately 0.577 ms (15/26 ms). Eight of these burst periods are grouped into what
is known as a TDMA frame. This lasts for approximately 4.615 ms (i.e.120/26 ms) and it forms
the basic unit for the definition of logical channels. One physical channel is one burst period
allocated in each TDMA frame.
In simplified terms the base station transmits two types of channel, namely traffic and control.
Accordingly the channel structure is organised into two different types of frame, one for the
traffic on the main traffic carrier frequency, and the other for the control on the beacon
frequency.
GSM multiframe
The GSM frames are grouped together to form multiframes and in this way it is possible to
establish a time schedule for their operation and the network can be synchronised.
There are several GSM multiframe structures:
• Traffic multiframe: The Traffic Channel frames are organised into multiframes
consisting of 26 bursts and taking 120 ms. In a traffic multiframe, 24 bursts are used for
traffic. These are numbered 0 to 11 and 13 to 24. One of the remaining bursts is then used
to accommodate the SACCH, the remaining frame remaining free. The actual position
used alternates between position 12 and 25.
• Control multiframe: the Control Channel multiframe that comprises 51 bursts and
occupies 235.4 ms. This always occurs on the beacon frequency in time slot zero and it
may also occur within slots 2, 4 and 6 of the beacon frequency as well. This multiframe is
subdivided into logical channels which are time-scheduled. These logical channels and
functions include the following:
o Frequency correction burst
o Synchronisation burst
o Broadcast channel (BCH)
o Paging and Access Grant Channel (PACCH)
o Stand Alone Dedicated Control Channel (SDCCH)
GSM Superframe
Multiframes are then constructed into superframes taking 6.12 seconds. These consist of 51
traffic multiframes or 26 control multiframes. As the traffic multiframes are 26 bursts long and
the control multiframes are 51 bursts long, the different number of traffic and control
multiframes within the superframe, brings them back into line again taking exactly the same
interval.

GSM Hyperframe
Above this 2048 superframes (i.e. 2 to the power 11) are grouped to form one hyperframe which
repeats every 3 hours 28 minutes 53.76 seconds. It is the largest time interval within the GSM
frame structure.
Within the GSM hyperframe there is a counter and every time slot has a unique sequential
number comprising the frame number and time slot number. This is used to maintain
synchronisation of the different scheduled operations with the GSM frame structure. These
include functions such as:
• Frequency hopping: Frequency hopping is a feature that is optional within the GSM
system. It can help reduce interference and fading issues, but for it to work, the
transmitter and receiver must be synchronised so they hop to the same frequencies at the
same time.
• Encryption: The encryption process is synchronised over the GSM hyperframe period
where a counter is used and the encryption process will repeat with each hyperframe.
However, it is unlikely that the cellphone conversation will be over 3 hours and
accordingly it is unlikely that security will be compromised as a result.

GSM Frame Structure Summary

GSM frame structure summary


By structuring the GSM signalling into frames, multiframes, superframes and hyperframes, the
timing and organisation is set into an orderly format that enables both the GSM mobile and base
station to communicate in a reliable and efficient manner. The GSM frame structure forms the
basis onto which the other forms of frame and hence the various GSM channels are built.
Conclusion

The training was a path breaking experience of life & has accentuated me to the new domain of
telecom technicalities. Now I am better noire of theoretical concepts. Visiting switch room was a
dimension to theoretical knowledge. Practically visiting sites was a learning experience.it will be
cherished whole my life.
Appendices
ALARM CONSLOE:
523 GETS Board E1 Out-of-Frame

Alarm Meaning
1. Alarm Cause
GETS board is mainly responsible for receiving, sending, switching, multiplexing and
demultiplxing of 16 E1s or T1s, and the link control of HDLC. This alarm is generated when E1
port on GETS board detects the frame alignment loss.

2. Alarm Parameters
Example: alarm parameters field No. = 1, row No. = 2, column No. = 2, frame No. = 4 slot No. =
2, board type = GETS, board No. = 0, E1 No. = 0. Meaning: the No.0 E1 is out-of-frame on No.0
GETS board which is on the No.2 slot of No.4 frame in the rack of No.2 column and No.2 row
installed in the No.1 field.
Note:
GETS board is the trunk interface board supporting E1 and T1. It is responsible for receiving,
sending, switching, multiplexing and demultiplexing of 16 E1s or T1s, and supporting
processing of associated SS5 and R2 signaling. GETS board is in AM/CM interface frame and its
slot is compatible for E16 and STU board. Please note that 16 E1s or T1s in the same GETS
board can not be mixedly equipped, and E1 working mode is the system default.
When GETS board is configured as E1 working mode, this GETS board need be equipped with a
75Ω or 120Ω trunk interface board (ETDA/ETDB) to connect with trunk interface.

Impact on System
This E1 turns unavailable and it can not transmit service when call is set up.
3. Self-processing Procedure of System
Detect E1 port state and report E1 out-of-frame alarm. The failed E1 on this GETS board is
marked as unavailable and can no longer be used as trunk circuit before the fault is cleared.

Alarm Handling
1. Possible Cause
1) E1 port work mode is falsely configured.
2) PCM line failed to perform frame alignment.
3) E1 port on the GETS board is damaged.
4) Clock phase-lock is out of service.
5) The led-in clock is abnormal.
2. Handling Suggestion
1) Find the cabinet No., frame No. and slot No. of the alarmed GETS board according to the
location information in the alarm parameters.
2) Check whether home office clock system and the output clock of GQSI board in the same
frame failed.
YHandle 0443 GQSI Output Clock Failed alarm.
N3)
3) Check whether there is alarm of abnormal reference source.
YHandle 0240 Clock Reference Source Abnormal alarm.
N4)
4) Check whether the configuration data of the E1 port working mode are correct.
Y6)
N5)
5) Check whether the alarm still exists after correcting the error data configuration.
Y6)
NEND
6) Check the reliability of E1 line connection of GETS.
Y8)
N7)
7) Check whether the alarm is cleared after the line connection has been adjusted and the
reliability has been confirmed?
YEND
N8)
8) Self-loop the E1 transmitting and receiving ports of GETS board with self-loop cable.
Whether the alarm is cleared when the self-loop is confirmed correct.
Y9)
NProblems generated from transmission or peer office. For GETS board, the problems in
section of transmission or peer office can be located by sectional self-loop.
9) Replace the alarmed GETS board. Check whether the alarm is cleared after replacement.
YEND
N10)
10) Replace ETDA/ETDB board plugged in GETS board. Whether the E1 out-of-frame alarm is
cleared after replacement.
YEND
N11)
11) Contact maintenance staff
END
LIM:
Subscriber Interface Message Tracing:

You might also like