Professional Documents
Culture Documents
1 2
Mobile Station
• It provides personal mobility, so that the user can have
The mobile station (MS) consists of: access to subscribed services irrespective of a specific
terminal.
• the mobile equipment (the terminal)
By inserting the SIM card into another GSM terminal, the
• a smart card called the Subscriber Identity Module
user is able:
(SIM).
• to receive calls at that terminal,
• The SIM card is protected by a four-digit Personal
Identification Number (PIN). • make calls from that terminal, and
• receive other subscribed services.
3 4
4/18/2021
5 6
11 12
4/18/2021
Network Subsystem
Base Station Controller(BSC)
• The Mobile services Switching Center (MSC) is central
• The BSC manages the radio resources for one or more component of the Network Subsystem.
BTSs.
• The interface between the BTS and the BSC is known as the • It acts like a normal switching node of the PSTN or
Abis Interface ISDN, and all the functionality needed to handle a
mobile subscriber,
• It handles:
-radio-channel setup or Allocation • The interface between the BSC and the MSC is known
-power and signal measurements from the MS as the A Interface
- frequency administration such as frequency hopping
- handovers from one BTS to another
13 14
21 22
• Encryption - In GSM, encryption refers to the process of • Kc - The Kc is the 64-bit ciphering key that is used in the A5
creating authentication and ciphering cryptovariables encryption algorithm to encipher and decipher the data
using a special key and an encryption algorithm. that is being transmitted on the Um interface.
• Ciphering - Ciphering refers to the process of changing
plaintext data into encrypted data using a special key and • Ki - The Ki is the individual subscriber authentication key. It
a special encryption algorithm. is a 128-bit number that is paired with an IMSI when the
• Transmissions between the MS and the BTS on the Um SIM card is created.
link, are enciphered • The Ki is only stored on the SIM card and at the
• The AuC generates crypto-variables such as the RAND, Authentication Center (AuC). The Ki should never be
SRES, and Kc. transmitted across the network on any link.
23 24
4/18/2021
29 30
Speech coding
• GSM is a digital system, so speech which is inherently • PCM (Pulse Code Modulation) is a standardized method used
analog, has to be digitized. in the telephone network -
• to change an analog signal to a digital one.
• The method employed by ISDN, and by current • The analog signal is first sampled at a 8-kHz sampling rate.
telephone systems for multiplexing voice lines over Then each sample is quantized into 1 of 256 levels and then
high speed trunks and optical fiber lines, is Pulse • Encoded into digital eight-bit words.
Coded Modulation (PCM).
31 32
4/18/2021
Multipath equalization
• The Voice Activity Detection (VAD), which has to • So, a total silence is heard at the receiver.
determine whether the sound represents speech or • This can be very annoying to the user at the reception
noise, even if the background noise is very important. because it seems that the connection is dead.
• If the voice signal is considered as noise, the • In order to overcome this problem, the receiver
transmitter is turned off producing then, an creates a minimum of background noise called
unpleasant effect called clipping. comfort noise.
• An inconvenient of the DTX function is that when the • The comfort noise eliminates the impression that the
signal is considered as noise, the transmitter is turned connection is dead
off
37 38
41 42