You are on page 1of 11

4/18/2021

Introduction to Global System for


Mobile Communications (GSM)
(Continued)

1 2

Mobile Station
• It provides personal mobility, so that the user can have
The mobile station (MS) consists of: access to subscribed services irrespective of a specific
terminal.
• the mobile equipment (the terminal)
By inserting the SIM card into another GSM terminal, the
• a smart card called the Subscriber Identity Module
user is able:
(SIM).
• to receive calls at that terminal,
• The SIM card is protected by a four-digit Personal
Identification Number (PIN). • make calls from that terminal, and
• receive other subscribed services.

3 4
4/18/2021

• The mobile equipment is uniquely identified by the


International Mobile Equipment Identity (IMEI).
The SIM card contains: • Note: The IMEI and the IMSI are independent, thereby
allowing personal mobility.
• also the International Mobile Subscriber Identity (IMSI)
used to identify the subscriber to the system, • The SIM card may be protected against unauthorized
use by a password or personal identity number.
• a secret key for authentication, and other information.

5 6

Base Station Subsystem


• A list of IMEIs in the network is stored in the Equipment
Identity Register (EIR).
The status returned in response to an IMEI query to the • The Base Station Subsystem is composed of two
EIR is one of the following: parts, the Base Transceiver Station (BTS) and the
• White-listed -The terminal is allowed to connect to the Base Station Controller (BSC).
network.
• Grey-listed -The terminal is under observation from the • These communicate across a standardized
network for possible problems. interface, allowing (as in the rest of the system)
• Black-listed -The terminal has either been reported operation between components made by
stolen, or is not type approved (the correct type of different suppliers.
terminal for a GSM network). The terminal is not allowed
to connect to the network.
7 8
4/18/2021

Base Transceiver Station


• The BTS is the Mobile Station's access point to the network -handling speech encoding,
• The interface between the MS and the BTS is known as the Um -encryption,
Interface or the Air Interface
• . It is responsible for: -multiplexing (TDMA), and
-carrying out radio communications between the -modulation/demodulation of the radio signals. It is
network and the MS also capable of frequency hopping
-defining a cell
-handlings the radio-link protocols with the Mobile
Station..
9 10

• A BTS is assigned a Cell Identity. • It provides means to geographically locate connected


• The cell identity is 16-bit number (double octet) mobile phones.
• it identifies that cell in a particular Location Area. • If a cell phone is connected to a GSM network then
the position of that particular cell phone can be
• The cell identity is part of the Cell Global Identification
determined using CGI of the cell which is covering that
(CGI),
cell phone
• Cell Global Identity (CGI) is a standard identifier for
mobile phones cells,

11 12
4/18/2021

Network Subsystem
Base Station Controller(BSC)
• The Mobile services Switching Center (MSC) is central
• The BSC manages the radio resources for one or more component of the Network Subsystem.
BTSs.
• The interface between the BTS and the BSC is known as the • It acts like a normal switching node of the PSTN or
Abis Interface ISDN, and all the functionality needed to handle a
mobile subscriber,
• It handles:
-radio-channel setup or Allocation • The interface between the BSC and the MSC is known
-power and signal measurements from the MS as the A Interface
- frequency administration such as frequency hopping
- handovers from one BTS to another
13 14

The Home Location Register (HLR)


• The HLR is a large database that permanently
It provides: stores data about subscribers
- Registration, • The HLR contains all the administrative
-Authentication, information of each subscriber registered in the
corresponding GSM network, along with the
-Location updating, current location of the mobile.
-Handovers, and • The HLR maintains subscriber-specific information
-Call routing to a roaming subscriber. such as:
- the MSISDN,
-The connection to the fixed networks (such as the
PSTN or ISDN. -IMSI,
15 16
4/18/2021

Visitor Location Register (VLR)


-current location of the MS,
• The VLR is a database that contains a subset of the
-roaming restrictions, and information located on the HLR.
-subscriber supplemental features • It contains similar information as the HLR, but only for
Note: subscribers currently in its Location Area.
• But mainly, administrative information
There is logically only one HLR in any given network, • There is a VLR for every Location Area.
• The VLR reduces the overall number of queries to the
HLR and thus reduces network traffic.
• VLRs are often identified by the Location Area Code
(LAC) for the area they service.
17 18

Equipment Identity Register (EIR)


•The black list is a list if IMEIs that are to be
• This is a database that contains a list of all valid mobile equipment on denied service by the network for some
the network, reason.
• The EIR keeps tracks of handsets on the network using the IMEI. •Reasons include the IMEI being listed:
• Each mobile station is identified by its International Mobile - as stolen or
Equipment Identity (IMEI).
• There is only one EIR per network. It is composed of three lists. The
-cloned or
white list, the gray list, and the black list. -if the handset is malfunctioning or
-doesn't have the technical capabilities to
operate on the network.
19 20
4/18/2021

Authentication Center (Auc)


• This AuC handles the authentication and encryption
• The gray list is a list of IMEIs that are to be monitored tasks for the network.
for suspicious activity.
• The Auc stores the Key for each IMSI on the network.
• This could include:
• Authentication - Whenever a MS requests access to a
-handsets that are behaving oddly or network, the network must authenticate the MS.
-not performing as the network expects it to. • Authentication verifies the identity and validity of the
• The white list is an unpopulated list. That means if an SIM card to the network and ensures that the
IMEI is not on the black list or on the gray list, then it subscriber is authorized access to the network.
is considered good and is "on the white list".

21 22

• Encryption - In GSM, encryption refers to the process of • Kc - The Kc is the 64-bit ciphering key that is used in the A5
creating authentication and ciphering cryptovariables encryption algorithm to encipher and decipher the data
using a special key and an encryption algorithm. that is being transmitted on the Um interface.
• Ciphering - Ciphering refers to the process of changing
plaintext data into encrypted data using a special key and • Ki - The Ki is the individual subscriber authentication key. It
a special encryption algorithm. is a 128-bit number that is paired with an IMSI when the
• Transmissions between the MS and the BTS on the Um SIM card is created.
link, are enciphered • The Ki is only stored on the SIM card and at the
• The AuC generates crypto-variables such as the RAND, Authentication Center (AuC). The Ki should never be
SRES, and Kc. transmitted across the network on any link.
23 24
4/18/2021

• RAND - The RAND is a random 128-bit number that is Radio link


generated by the Auc when the network requests to
authenticate a subscriber. The RAND is used to generate the • The International Telecommunication Union (ITU),
Signed Response (SRES) and Kc crypto variables.
allocated the bands 890-915 MHz for the uplink
• SRES -Signed Response - The SRES is a 32-bit crypto variable (mobile station to base station) and
used in the authentication process. The MS is challenged by • 935-960 MHz for the downlink (base station to mobile
being given the RAND by the network, the SRES is the station) for mobile networks
expected correct response. The SRES is never passed on the
Um (Air) interface. It is kept at the MSC/VLR, which performs • GSM frequencies initially set with 25 MHz (transmit
the authentication check. and receive) spaced apart by 45 MHz

• Although it is not required, the Auc is normally physically


collocated with the HLR.
25 26

Multiple access and channel structure


• Each of these carrier frequencies is then divided in time,
• Radio spectrum is a limited resource shared by all users, using a TDMA scheme.
a method must be devised to divide up the bandwidth • The unit of time in this TDMA scheme is called a burst
among as many users as possible. period and it lasts 15/26 ms (or approx. 0.577 ms).
• The method used by GSM is a combination of Time- and • All these definitions are cyclic, and the entire pattern
Frequency-Division Multiple Access (TDMA/FDMA). repeats approximately every 3 hours.
• The FDMA part involves the division by frequency of the • Channels can be divided into:
(maximum) 25 MHz bandwidth into 124 carrier - dedicated channels, which are allocated to a mobile
frequencies spaced 200 kHz apart. station, and
• One or more carrier frequencies are assigned to each -common channels, which are used by mobile stations
base station. in idle mode.
27 28
4/18/2021

Traffic channels Control channels


• A traffic channel (TCH) is used to carry speech and data
traffic. • The common channels are used by idle mode mobiles to
• Traffic channels are defined using a 26-frame multi-frame, or exchange the signaling information required to change to
group of 26 TDMA frames. dedicated mode.
• On each multiframe, there are 24 frames for Traffic
Channels, • Common control channels can be accessed both by idle
• Within each Frame are 8 Timeslots at 576.92 μs per. mode and dedicated mode mobiles.
• Mobiles already in dedicated mode monitor the
• The length of a 26-frame multi-frame is 120 ms, which is surrounding base stations for handover and other
how the length of a burst period is defined (120 ms divided information
by 26 frames)

29 30

Speech coding

• GSM is a digital system, so speech which is inherently • PCM (Pulse Code Modulation) is a standardized method used
analog, has to be digitized. in the telephone network -
• to change an analog signal to a digital one.
• The method employed by ISDN, and by current • The analog signal is first sampled at a 8-kHz sampling rate.
telephone systems for multiplexing voice lines over Then each sample is quantized into 1 of 256 levels and then
high speed trunks and optical fiber lines, is Pulse • Encoded into digital eight-bit words.
Coded Modulation (PCM).

31 32
4/18/2021

Multipath equalization

• At the 900 MHz range, radio waves bounce off everything -


buildings, hills, cars, airplanes, etc.
• Thus many reflected signals, each with a different phase, can
reach an antenna.
• Equalization is used to extract the desired signal from the
unwanted reflections.
• It works by finding out how a known transmitted signal is
modified by multi-path fading, and constructing an inverse
filter to extract the rest of the desired signal
33 34

Frequency hopping in GSM Discontinuous transmission (DTX)


• Discontinuous transmission (DTX) is a method that takes
• The mobile station can move between a transmit, advantage of the fact that a person speaks less that 40
receive, and monitor time slot within one TDMA percent of the time in normal conversation,
frame,
• This is done by turning the transmitter off during silence
• They are normally on different frequencies. periods.
• GSM makes use of this frequency agility to • It is also added benefit of DTX in that power is conserved
implement frequency hopping, where the mobile at the mobile unit.
and BTS transmit each TDMA frame on a different
carrier frequency. • The most important component of DTX is, Voice Activity
Detection. It must distinguish between voice and noise
inputs
35 36
4/18/2021

• The Voice Activity Detection (VAD), which has to • So, a total silence is heard at the receiver.
determine whether the sound represents speech or • This can be very annoying to the user at the reception
noise, even if the background noise is very important. because it seems that the connection is dead.
• If the voice signal is considered as noise, the • In order to overcome this problem, the receiver
transmitter is turned off producing then, an creates a minimum of background noise called
unpleasant effect called clipping. comfort noise.
• An inconvenient of the DTX function is that when the • The comfort noise eliminates the impression that the
signal is considered as noise, the transmitter is turned connection is dead
off
37 38

Discontinuous reception Power control


• Another method used to conserve power at the • At the same time the base stations perform measurements
mobile station is discontinuous reception. on the power level of the different mobile stations.
• The paging channel, used by the base station to signal • These power levels are adjusted so that the power is nearly
the same for each burst.
an incoming call, is structured into sub-channels.
• There are five classes of mobile stations defined, according to
(The Paging Channel (PCH) is a downlink transport their peak transmitter power, rated at 20, 8, 5, 2, and 0.8
channel. The PCH is always transmitted over the entire watts.
cell.) • To minimize co-channel interference and to conserve power,
• Each mobile station needs to listen only to its own both the mobiles and the Base Transceiver Stations operate
sub-channel. at the lowest power level that will maintain an acceptable
signal quality.
• In the time between successive paging sub-channels, • Power levels can be stepped up or down from the peak
the mobile can go into sleep mode, when almost no power down to a minimum of 20 mill watts.
power is used. 39 40
4/18/2021

41 42

You might also like