Mobile Telecommunication System
Mobile Telecommunication System
Frequency Planning
To avoid interference between transmitters using the same frequencies, frequencies have to
be distributed.
GSM Services
GSM offers three basic types of services:
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These services
are further transited in the following ways:
a. Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes full-rate speech
at 13 kbps and emergency calls, where the nearest emergency-service provider is notified
by dialing three digits.
Bearer Services
Telecommunication services to transfer data between access points
Specification of services up to the terminal interface (OSI layers 1-3)
Different data rates for voice and data (original standard)
1. data service (circuit switched)
synchronous: 2.4, 4.8 or 9.6 kbit/s
asynchronous: 300 - 1200 bit/s
2. data service (packet switched)
synchronous: 2.4, 4.8 or 9.6 kbit/s
asynchronous: 300 - 9600 bit/s
Data services or Bearer Services are used through a GSM phone to receive and send data
is the essential building block leading to widespread mobile Internet access and mobile
data transfer. GSM currently has a data transfer rate of 9.6k. New developments that will
push up data transfer rates for GSM users are HSCSD (high speed circuit switched data)
and GPRS (general packet radio service) are now available.
Supplementary Services
Supplementary services are additional services that are provided in addition to
teleservices and bearer services. These services include caller identification, call
forwarding, call waiting, multi-party conversations, and barring of outgoing
(international) calls, among others. A brief description of supplementary services is given
here:
Conferencing : It allows a mobile subscriber to establish a multiparty conversation,
i.e., a simultaneous conversation between three or more subscribers to setup a
conference call. This service is only applicable to normal telephony.
Call Waiting : This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.
Call Hold : This service allows a subscriber to put an incoming call on hold and
resume after a while. The call hold service is applicable to normal telephony.
Call Forwarding : Call Forwarding is used to divert calls from the original recipient
to another number. It is normally set up by the subscriber himself. It can be used by
the subscriber to divert calls from the Mobile Station when the subscriber is not
available, and so to ensure that calls are not lost.
Call Barring : Call Barring is useful to restrict certain types of outgoing calls such as
ISD or stop incoming calls from undesired numbers. Call barring is a flexible
service that enables the subscriber to conditionally bar calls.
Closed User Groups (CUGs) : This service is meant for groups of subscribers who
wish to call only each other and no one else.
Radio subsystem
It comprises all radio specific entities
Base transceiver station (BTS): A BTS comprises all radio equipment, i.e.,
antennas, signal processing, amplifiers necessary for radio transmission. A BTS
is usually placed in the center of a cell. Its transmitting power defines the size of
a cell.
Base station controller (BSC): The BSC basically manages the BTSs. The BSC
also multiplexes the radio channels onto the fixed network connections at the
A interface.
Mobile station (MS): The MS comprises all user equipment and software
needed for communication in GSM. It consists of user independent hard and
software and of the subscriber identity module (SIM). SIM card contains many
identifiers and tables such as card-type, serial number, a list of subscribed
services, a personal identity number (PIN), a PIN unblocking key (PUK), an
authentication key and the international mobile subscriber identity (IMSI).
Operation subsystem
It contains the necessary functions for network operation and maintenance. It is
also in charge of controlling the traffic load of the BSS.
Operation and maintenance center (OMC) : The OMC monitors and controls all
other network entities via the O interface (SS7 with X.25). OMCs use the concept of
telecommunication management network (TMN) as standardized by the ITU-T.
Authentication centre (AuC): is responsible for the authentication of a
subscriber. This is a protected database and stores a copy of the secret key
stored in each sub scriber's SIM card. These data help to verify the user's
identity.
2. logical channels.
The Physical channels are determined by the timeslot, whereas the logical channels are
determined by the information carried within the physical channel.
The logical channels are further divided into
1.Traffic channels
2.Control(signaling) channels.
full rate traffic channels. The 9.6 Kb/s data rate is only for full rate application.
The traffic channels(TCH) support two types of information rates Full rate (TCH/F)
and Half rate (TCH/H)
When transmitted as full rate, the user data is occupied within TS per frame. When
transmitted as half rate, the user data is occupied into the same time slot but sent in
alternate frames.
The 26th frame contains idle bits if full rate TCHs are used and contains SACCH
data if half rate TCHS are used
Full Rate TCH for data and speech channels:-
A. Full - rate Speech Channel )TCH/Fs): At 16 kbps the full rate speech channel is
digitized. The full rate speech channel caries 55.8kbps after adding the GSM channel
coding to the digitized speech.
B. Full-rate Data Channel for 9600 bps (TCH/F9.6): The full rate traffic data channel
contains raw data that is transmitted at 9.6 kbps. After the application of additional
forward error correction coding with the GSM standards, 9600 kbps is transferred at
22.8 kbps.
The access grant channel (AGCH) is carried data which instructs the mobile to
operate in a particular physical channel (Time slot or ARFCN).
It uses normal burst.
Dedicated Control Channels (DCCHs):
MS and MSC have five Protocol Layers whereas the BTS and BSC have only first three
Layers
LAYER 3:NETWORK LAYER : It Comprises many sub layers, lowest sub layer is
Radio Resource Management(Rr). The main task of RR include Setup, Maintenance
and Release of Radio channels RR directly access the physical layer for Radio
information Offers a reliable connection to the next higher layer
RR’ : RR‘ is a part of this layer that is implemented in the BTS, and the rest is in the
BSC. The function of RR‘ are supported by the BSC via the BTS management (BTSM) .
HANDOVER
When the user moves away from a tower, the radio signal strength or the power of
the signal keeps reducing. This can result in change of the channel or cell. This
procedure of changing the resources is called handover. This procedure is
called `handoff' in North America.
Handover Procedure
ALGORITHMS USED
A3 : For Authentication A5 : For EncryptionA8 : For Generation of a Cipher key
AUTHENTICATION: Any subscriber must be authenticated before using service from
GSM network. It is done at AUC
Authentication is based on
SIM-which stores the individual authentication key Ki ,User
identification IMSI and A3 – an algorithm used for authentication
The MS sends back the SRES generated by the SIM, the VLR can now compare
both values. If they are the same, the VLR accept the subscriber, otherwise the
subscriber is rejected.
DATA ENCRYPTION
Encryption is done to ensure privacy and is done by applying the cipher key Kc. Kc
is generated using the individual key Ki and a random value by applying the
algorithm A8.
The SIM in the MS and the network both calculate the same Kc, based on the
random value RAND. The key Kc itself is not transmitted over the air interface.MS
and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher
key Kc.
Kc should be a 64 bits key which is not very strong but at least a
good protection against simple eavesdropping.
Serving GPRS Support Node (SGSN): (lllr to MSC) SGSN's tasks include packet
switching, routing, mobility management, logical link management, authentication and
charging. The location register of the SGSN stores location information (e.g., current
cell, current VLR). SGSN sends queries to HLR to obtain profile data of GPRS
subscribers. It is connected to the base station system with Frame Relay.
Gateway GPRS Support Node (GGSN): GGSN acts as an interface between the GPRS
backbone network and the external packet data networks. (lllr to that of a router in a
LAN). GGSN maintains routing information to tunnel the PDUs to the SGSNs. It
converts the GPRS packets coming from SGSN into appropriate packet data protocol
(PDP) format. So, GGSN stores the current SGSN address of the user and his or her
profile in its location register. It also does authentication and charging functions
related to data transfer.
Home Location Register (HLR): It needs enhancement to register GPRS user profiles
and respond to queries from GSNs regarding profiles.
Mobile Station (MS): It is different from that of GSM.
SMS nodes: SMS-GMSCs and SMS-IWMSCs are upgraded 1.o support SMS transmission
BSS-SGSN Interface
Sub-Network Dependent Convergence Protocol (SNDCP): It is used to
transfer data packets between SGSN and MS. Its functionality includes:
Multiplexing, Segmentation, compression, and decompression of user
data.
Logical Link Control (LLC): a protocol for GPRS which functions are
Network Service : This layer manages the convergence sublayer that operates
between BSSGP and the Frame Relay Q922 Core by mapping.
activate PDP context request,' -MS informs the SGSN about the requested PDP
UMTS Architecture
The public land mobile network (PLMN) described in UMTS Rel. '99 incorporates three
major categories of network elements:
GSM phase 1/2 core network elements—Mobile services switching center (MSC),
visitor location register (VLR), home location register (HLR), authentication center
(AuC), and equipment identity register (EIR)
GPRS network elements—Serving GPRS support node (SGSN) and gateway GPRS
support node (GGSN)
UMTS-specific network elements—User equipment (UE) and UMTS terrestrial radio
access network (UTRAN) elements
UMTS system uses the same core network as the GPRS and uses entirely new radio
interface. ... The mobile terminal in UMTS is called User Equipment (UE). The UE is
connected to Node-B over high speed Uu (up to 2 Mbps) Interface. The UMTS core
network is based on the GSM/GPRS network topology. It provides the switching, routing,
transport, and database functions for user traffic. The core network contains circuit-
switched elements such as the MSC, VLR, and gateway MSC (GMSC). It also contains the
packet-switched elements SGSN and GGSN. The EIR, HLR, and AuC support both circuit-
and packet-switched data.
The Asynchronous Transfer Mode (ATM) is the data transmission method used within the
UMTS core network. ATM Adaptation Layer type 2 (AAL2) handles circuit-switched
connections. Packet connection protocol AAL5 is used for data delivery.
The General Packet Radio System (GPRS) facilitates the transition from phase1/2 GSM
networks to 3G UMTS networks. The GPRS supplements GSM networks by enabling
packet switching and allowing direct access to external packet data networks (PDNs). Data
transmission rates above the 64 kbps limit of integrated services digital network (ISDN) are
a requirement for the enhanced services supported by UMTS networks. The GPRS
optimizes the core network for the transition to higher data rates. Therefore, the GPRS is a
UMTS Architecture
The major difference between GSM/GPRS networks and UMTS networks is in the
air interface transmission. Time division multiple access (TDMA) and freqency division
multiple access (FDMA) are used in GSM/GPRS networks. The air interface access method
for UMTS networks is wide-band code division multiple access (WCDMA), which has two
basic modes of operation: frequency division duplex (FDD) and time division duplex
(TDD). This new air interface access method requires a new radio access network (RAN)
called the UTMS terrestrial RAN (UTRAN). The core network requires minor
modifications to accommodate the UTRAN.
Two new network elements are introduced in the UTRAN: the radio network controller
(RNC) and Node B. The UTRAN contains multiple radio network systems (RNSs), and
each RNS is controlled by an RNC. The RNC connects to one or more Node B elements.
Each Node B can provide service to multiple cells.
The RNC in UMTS networks provides functions equivalent to the base station controller
(BSC) functions in GSM/GPRS networks. Node B in UMTS networks is equivalent to the
base transceiver station (BTS) in GSM/GPRS networks. In this way, the UMTS extends
UTRAN Architecture
The radio network controller (RNC) performs functions that are equivalent to the base
station controller (BSC) functions in GSM/GPRS networks. The RNC provides centralized
control of the Node B elements in its covering area. It handles protocol exchanges between
UTRAN interfaces (Iu, Iur, and Iub). Because the interfaces are ATM-based, the RNC
performs switching of ATM cells between the interfaces. Circuit-switched and packet-
switched data from the Iu-CS and Iu-PS interfaces are multiplexed together for
transmission over the Iur, Iub, and Uu interfaces to and from the user equipment (UE). The
RNC provides centralized operation and maintenance of the radio network system (RNS)
including access to an operations support system (OSS).
The RNC uses the Iur interface. There is no equivalent to manage radio resources in
GSM/GPRS networks. In GSM/GPRS networks, radio resource management is performed
in the core network. In UMTS networks, this function is distributed to the RNC, freeing the
core network for other functions. A single serving RNC manages serving control functions
such as connection to the UE, congestion control, and handover procedures. The functions
of the RNC include:
Radio resource control
Admission control
Channel allocation
Power control settings
Handover control
Macro diversity
Ciphering
Segmentation and reassembly
Broadcast signaling
Open loop power control
Node B
Node B is the radio transmission/reception unit for communication between radio cells.
Each Node B unit can provide service for one or more cells. A Node B unit can be
physically located with an existing GSM base transceiver station (BTS) to reduce costs of
UMTS implementation. Node B connects to the user equipment (UE) over the Uu radio
interface using wide-band code division multiple access (WCDMA). A single Node B unit
can support both frequency division duplex (FDD) and time division duplex (TDD) modes.
The Iub interface provides the connection between Node B and the RNC using
asynchronous transfer mode (ATM). Node B is the ATM termination point.
The main function of Node B is conversion of data on the Uu radio interface. This function
includes error correction and rate adaptation on the air interface. Node B monitors the
quality and strength of the connection and calculates the frame error rate, transmitting this
information to the RNC for processing. The functions of Node B include:
Air interface transmission and reception
Modulation and demodulation
CDMA physical channel coding
Micro diversity
Error handling
Closed loop power control
Node B also enables the UE to adjust its power using a technique called downlink
transmission power control. Predefined values for power control are derived from RNC
power control parameters.
The UMTS user equipment (UE) is the combination of the subscriber's mobile equipment
and the UMTS subscriber identity module (USIM). Similar to the SIM in GSM/GPRS
networks, the USIM is a card that inserts into the mobile equipment and identifies the
subscriber to the core network.
The USIM card has the same physical characteristics as the GSM/GPRS SIM card and
provides the following functions:
Supports multiple user profiles on the USIM
Updates USIM information over the air
Provides security functions
Provides user authentication
Supports inclusion of payment methods
Supports secure downloading of new applications
The UMTS standard places no restrictions on the functions that the UE can provide. Many
of the identity types for UE devices are taken directly from GSM specifications. These
identity types include:
Handover Types
The above figure shows an overview of several common handover types in a combines
UMTS/GSM network.
i) Intra-node B, intra-RNC:
UE1 moves from one antenna of node B1 to another antenna. This type of
handover is called softer handover. In this case node B1 performs both
combining and splitting of data streams.
UE2 moves from B1 to node B2.Herte RNC1 supports the soft handover
by combining and splitting of data.
iii) Inter-RNC:
v) Inter-System:
UMTS Security
The security functions of UMTS are based on what was implemented in GSM. Some of the
security functions have been added and some existing have been improved. Encryption
algorithm is stronger and included in base station (NODE-B) to radio network controller
(RNC) interface , the application of authentication algorithms is stricter and subscriber
confidentially is tighter.
Authentication of subscribers
Subscriber identity confidentially
Subscriber Identity Module (SIM) to be removable from terminal hardware
Radio interface encryption
Additional UMTS security features:
Encryption extended from air interface only to include Node-B to RNC connection
Core network traffic between RNCs, MSCs and other networks is not ciphered and operators can to
implement protections for their core network transmission links, but that is unlike to happen. MSCs
will have by design a lawful interception capabilities and access to Call Data Records (SDR), so all
switches will have to have security measures against unlawful access.
Network access security: the set of security features that provide users with secure access to 3G
services, and which in particular protect against attacks on the (radio) access link;
Network domain security: the set of security features that enable nodes in the provider domain
to securely exchange signalling data, and protect against attacks on the wireline network;
User domain security: the set of security features that secure access to mobile stations
Application domain security: the set of security features that enable applications in the user and
in the provider domain to securely exchange messages.
Visibility and configurability of security: the set of features that enables the user to inform
himself whether a security feature is in operation or not and whether the use and provision of
services should depend on the security feature.