Unit 2 - Wireless & Mobile Computing - WWW - Rgpvnotes.in
Unit 2 - Wireless & Mobile Computing - WWW - Rgpvnotes.in
Call Hold: This service allows a subscriber to put an incoming call on hold and resume after a while. The call
hold service is applicable to normal telephony.
Call Forwarding: Call Forwarding is used to divert calls from the original recipient to another number. It is
normally set up by the subscriber himself. It can be used by the subscriber to divert calls from the Mobile
Station when the subscriber is not available, and so to ensure that calls are not lost.
Call Barring : Call Barring is useful to restrict certain types of outgoing calls such as ISD or stop incoming
calls from undesired numbers. Call barring is a flexible service that enables the subscriber to conditionally
bar calls.
Number Identification: There are following supplementary services related to number identification:
Calling Line Identification Presentation: This service displays the telephone number of the calling party on
the screen.
Calling Line Identification Restriction: A person not wishing their number to be presented to others
subscribes to this service.
Connected Line Identification Presentation: This service is provided to give the calling party the telephone
number of the person to whom they are connected. This service is useful in situations such as forwarding's
where the number connected is not the number dialed.
Connected Line Identification Restriction: There are times when the person called does not wish to have
their number presented and so they would subscribe to this person, normally, this overrides the
presentation service.
Malicious Call Identification: The malicious call identification service was provided to combat the spread of
obscene or annoying calls. The victim should subscribe to this service, and then they could cause known
malicious calls to be identified in the GSM network, using a simple command.
Advice of Charge (AoC): This service was designed to give the subscriber an indication of the cost of the
services as they are used. Furthermore, those service providers who wish to offer rental services to
subscribers without their own SIM can also utilize this service in a slightly different form. AoC for data calls
is provided on basis of time measurements.
Closed User Groups (CUGs): This service is meant for groups of subscribers who wish to call only each
other and no one else.
Unstructured supplementary services data (USSD) : This allows operator-defined individual services.
Despite the developments of the newer systems, the basic GSM system architecture has been maintained,
and the network elements described below perform the same functions as they did when the original GSM
system was launched in the early 1990s.
The GSM network architecture can be grouped into four main areas:
Mobile station (MS)
Base-Station Subsystem (BSS)
Network and Switching Subsystem (NSS)
Operation and Support Subsystem (OSS)
The different elements of the GSM network operate together and the user is not aware of the different
entities within the system.
A basic diagram of the overall GSM system architecture with these four major elements is shown below:
Radio interface: The common boundary between a mobile station and the radio equipment in the
network, which is the boundary defined by functional characteristics, physical interconnection
characteristics, signal characteristics, and other characteristics as appropriate
Radio Interface Layer (RIL) is a layer in an operating system which provides an interface to the hardware's
radio and modem on e.g. a mobile phone.
Android RIL
The Android Open Source Project provides a Radio Interface Layer (RIL) between Android telephony
services (android.telephony) and the radio hardware.
It consists of a stack of two components: a RIL Daemon and a Vendor RIL. The RIL Daemon talks to the
telephony services and dispatches "solicited commands" to the Vendor RIL. The Vendor RIL is specific to a
particular radio implementation, and dispatches "unsolicited commands" up to the RIL Daemon.
Windows Mobile RIL
A RIL is a key component of Microsoft's Windows Mobile OS. The RIL enables wireless voice or data
applications to communicate with a GSM/GPRS or CDMA2000 1X modem on a Windows Mobile device.
The RIL provides the system interface between the CellCore layer within the Windows Mobile OS and the
radio protocol stack used by the wireless modem hardware. The RIL, therefore, also allows OEMs to
integrate a variety of modems into their equipment by providing this interface.
The RIL comprises two separate components: a RIL driver, which processes AT commands and events; and
a RIL proxy, which manages requests from the multiple clients to the single RIL driver. Except for PPP
connections, all interaction between the Windows Mobile OS and the device radio stack is via the RIL. (PPP
connections initially use the RIL to establish the connection, but then bypass the RIL to connect directly to
the virtual serial port assigned to the modem.) In essence, the RIL accepts and converts all direct service
requests from the upper layers (i.e., TAPI) into commands supported and understood by the modem.
SACCH: Slow associated control channel, is used for control and supervisory signals associated with the
traffic channels.
FACCH: Fast associated control channel, is used for control requirements such as handoff/handovers.
GSM Protocols
GSM architecture is a layered model that is designed to allow communications between two different
systems. The lower layers assure the services of the upper-layer protocols. Each layer passes suitable
notifications to ensure the transmitted data is formatted, transmitted, and received accurately.
The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS
and the BTS. These services include controlling the initial access to the system, paging for MT calls, the
handover of calls between cell sites, power control, and call termination. The BSC still has some radio
resource management in place for the frequency coordination, frequency allocation, and the
management of the overall network layer for the Layer 2 interfaces.
To transit from the BSC to the MSC, the BSS mobile application part or the direct application part is used,
and SS7 protocols is applied by the relay, so that the MTP 1-3 can be used as the prime architecture.
MSC Protocols
At the MSC, starting from the BSC, the information is mapped across the A interface to the MTP Layers 1
through 3. Here, Base Station System Management Application Part (BSS MAP) is said to be the equivalent
set of radio resources. The relay process is finished by the layers that are stacked on top of Layer 3
protocols, they are BSS MAP/DTAP, MM, and CM. This completes the relay process. To find and connect
to the users across the network, MSCs interact using the control-signalling network. Location registers are
included in the MSC databases to assist in the role of determining how and whether connections are to be
made to roaming users.
Each GSM M“ use is gi e a HL‘ that i tu o p ises of the use s lo atio a d su s i ed se i es. VL‘
is a separate register that is used to track the location of a user. When the users move out of the HLR
covered area, the VLR is notified by the MS to find the location of the user. The VLR in turn, with the help
of the o t ol et o k, sig als the HL‘ of the M“ s e lo atio . With the help of lo atio i fo atio
o tai ed i the use s HL‘, the MT alls a e outed to the use .
Handover
One of the key elements of a mobile phone or cellular telecommunications system is that the system is
split into many small cells to provide good frequency re-use and coverage. However, as the mobile moves
out of one cell to another it must be possible to retain the connection. The process by which this occurs is
known as handover or handoff.
GSM systems require a procedure known as a Handover to maintain the continuity of the call. This is
because a single cell does not cover the whole service area e.g. a whole city or country. However, a single
cell has a maximum service area of approximately 23 miles (35 km) for each antenna. The smaller the size
of the cell and the faster the movement of the MS through the cells (Up to 155 mph (250 kph) for GSM),
the more handovers of ongoing calls are required, but a handover should not cause the a call drop. There
are two main reasons for handovers.
The MS moves out of coverage of the serving BTS thus the signal level becomes lower continuously until it
falls beneath the minimal requirements for communications. Or the error rate may grow due to
interference, the distance to the BTS may be do high. All these effects may diminish the quality of the radio
link and make transmission impossible in the near future.
The wired infrastructure i.e. the MSC, BSC may decide that the traffic in one cell is too high thus
introducing congestion and hence decides to shift some MSs to other cells with a lower level of traffic, if
that is possible. Thus, handovers can be used as a method of controlling traffic through load balancing to
relieve localized congestion.
1. Intra Cell Handover: This happens when within a cell, when narrowband interference could make
transmission at a certain frequency impossible. The BSC could then decide to change the carrier frequency.
2. Inter Cell, intra BSC handover: This type of handover is a typical handover within the GSM system and
occurs when the MS moves from one BTS to another but stays within the control of same BSC. The BSC
performs the handover and assigns a new radio channel in the new BTS, and then releases the old BTS.
3. Inter BSC, Intra MSC handover: Since a BSC controls a limited number of BTSs, the GSM system has to
perform handovers between BSCs. This form of handover is controlled by the MSC.
4. Inter MSC handover: A handover could also be required between two BTSs that belong to two different
MSCs, now both MSCs perform the handover together.
GSM security is provided for gsm network subscribers to communicate securely without any intrusion. The
security here is covered for the air interface part and not for the fixed network part. The air interface is
considered to be weakest for the hackers. Security for SS7 part was not provided as SS7 was used for few
of the institutions.
Security
GSM security is provided for gsm network subscribers to communicate securely without any intrusion. The
security here is covered for the air interface part and not for the fixed network part. The air interface is
considered to be weakest for the hackers. Security for SS7 part was not provided as SS7 was used for few
of the institutions
GSM security
Confidentiality
Anonymity ( used to identify users)
PIN Lock,EIR,personalization etc.
Anonymity: Here IMSI is associated with a unique user (SIM), after the initial registration, a TMSI is
assigned to the subscriber. The TMSI is stored along with the IMSI in the network HLR.
HSCSD
High-Speed Circuit-Switched Data is essentially a new high speed implementation of GSM (Global System
for Mobile Communication) data transfer. Four times faster than GSM, with a transfer rate of up to
57.6Kbps, it achieves this speed by allocating up to eight time slots to an individual user. This speed makes
it comparable to many fixed-line telecommunications networks and will allow users to access the Internet
and other datacom services via a GSM network.
HSCSD Technology
HSCSD operates across a GSM network, and therefore no extra hardware is required by a mobile
communications operator to offer the service, just a network software upgrade. In a GSM network single
slots are allocated to each user, which has a standard data transfer rate of 9.6Kbps, although some
networks are now being upgraded to 14.4Kbps, an increase of 50%. In HSCSD, users are allocated multiple
slots so that the transmission speed can be drastically increased, with some service providers offering rates
of up to 57.6Kbps. This enables internet access at the same speed of many dial-up modem services across
fixed line networks.
GPRS architecture
GPRS architecture works on the same procedure like GSM network, but, has additional entities that allow
packet data transmission. This data network overlaps a second-generation GSM network providing packet
data transport at the rates from 9.6 to 171 kbps. Along with the packet data transport the GSM network
accommodates multiple users to share the same air interface resources concurrently.
GPRS attempts to reuse the existing GSM network elements as much as possible, but to effectively build a
packet-based mobile cellular network, some new network elements, interfaces, and protocols for handling
packet traffic are required.
Therefore, GPRS requires modifications to numerous GS
SM Network Element Modification or Upgrade Required for GPRS.
Mobile Station (MS) New Mobile Station is required to access GPRS services. These new
terminals will be backward compatible with GSM for voice calls.
BSC The Base Station Controller (BSC) requires a software upgrade and the
installation of new hardware called the packet control unit (PCU). The
PCU directs the data traffic to the GPRS network and can be a separate
hardware element associated with the BSC.
GPRS Support Nodes (GSNs) The deployment of GPRS requires the installation of new core network
elements called the serving GPRS support node (SGSN) and gateway
GPRS support node (GGSN).
Databases (HLR, VLR, etc.) All the databases involved in the network will require software
upgrades to handle the new call models and functions introduced by
GPRS.
Interfaces:GPRS network interfaces used in transmission plane and control plane. It includes
Um,Gb,Gn,Gp,Gi,Gr,Gc,Gf,Gd and Gs interfaces.
Transmission plane provides means for exchange of the user data. The control plane is used to ensure
availability of the transmission plane. The control plane also facilitates signalling between the Mobile
Station(MS) and the GPRS network elements.
Transmission Plane
GPRS
interface Between Basic description Protocol Reference
type
LLC 44.064
Used between MS and SGSN for
MS- GMM 24.008
Um exchange of user and signaling
SGSN SM 24.008
information
SMS 24.011
Physical
48.014
SGSN- Used between SGSN and BSS for data network
Gb 48.016
BSS transfer and mobility management service
48.018
BSSGP
SGSN-
SMS-
IWMSC Used to deliver to and receive short
Gd MAP 29.002
SGSN- message form MS to SM service center
SMS-
GMSC
GPRS
interface Between Basic description Protocol Reference
type
Physical
Used between SGSN and BSS for data network 48.014,48.016.48
Gb SGSN-BSS
transfer and mobility management service .018
BSSGP
There is a variety of channels used within GPRS, and they can be set into groups dependent upon whether
they are for common or dedicated use. Naturally the system does use the GSM control and broadcast
channels for initial set up, but all the GPRS actions are carried out within the GPRS logical channels carried
within the PDCH.
Broadcast channels:
Packet Broadcast Central Channel (PBCCH): This is a downlink only channel that is used to broadcast
information to mobiles and informs them of incoming calls etc. It is very similar in operation to the BCCH
used for GSM. In fact the BCCH is still required in the initial to provide a time slot number for the PBCCH. In
operation the PBCCH broadcasts general information such as power control parameters, access methods
and operational modes, network parameters, etc, required to set up calls.
Packet Paging Channel (PPCH): This is a downlink only channel and is used to alert the mobile to
Common control channels:
an incoming call and to alert it to be ready to receive data. It is used for control signaling prior to
Packet Access Grant Channel (PAGCH): This is also a downlink channel and it sends information
the call set up. Once the call is in progress a dedicated channel referred to as the PACCH takes over.
telling the mobile which traffic channel has been assigned to it. It occurs after the PPCH has
Packet Notification Channel (PNCH): This is another downlink only channel that is used to alert
informed the mobile that there is an incoming call.
mobiles that there is broadcast traffic intended for a large number of mobiles. It is typically used in
Packet Random Access Channel (PRACH): This is an uplink channel that enables the mobile to
what is termed point-to-point multicasting.
initiate a burst of data in the uplink. There are two types of PRACH burst, one is an 8 bit standard
burst, and a second one using an 11 bit burst has added data to allow for priority setting. Both
types of burst allow for timing advance setting.
Packet Associated Control Channel (PACCH): : This channel is present in both uplink and downlink
Dedicated control channels:
directions and it is used for control signalling while a call is in progress. It takes over from the PPCH
once the call is set up and it carries information such as channel assignments, power control
Packet Timing Advance Common Control Channel (PTCCH): This channel, which is present in both
messages and acknowledgements of received data.
the uplink and downlink directions is used to adjust the timing advance. This is required to ensure
that messages arrive at the correct time at the base station regardless of the distance of the mobile
from the base station. As timing is critical in a TDMA system and signals take a small but finite time
to travel this aspect is very important if long guard bands are not to be left.
Packet Data Traffic Channel (PDTCH): This channel is used to send the traffic and it is present in
Dedicated traffic channel:
both the uplink and downlink directions. Up to eight PDTCHs can be allocated to a mobile to
provide high speed data.
Mobility management:
Mobility management is a functionality that facilitates mobile device operations in Universal Mobile
Telecommunications System (UMTS) or Global System for Mobile Communications (GSM) networks.
Mobility management is used to trace physical user and subscriber locations to provide mobile phone
services, like calls and Short Message Service (SMS).
UMTS and GSM are each made up of separate cells (base stations) that cover a specific geographical area.
All base stations are integrated into one area, allowing a cellular network to cover a wider area (location
area).
The location update procedure allows a mobile device to notify a cellular network when shifting between
areas. When a mobile device recognizes that an area code differs from a previous update, the mobile
device executes a location update, by sending a location request to its network, prior location and specific
Temporary Mobile Subscriber Identity (TMSI). A mobile device provides updated network location
information for several reasons, including reselecting cell location coverage due to a faded signal.
Location area includes a group of base stations assembled collectively to optimize signaling. Base stations
are integrated to form a single network area known as a base station controller (BSC). The BSC manages
allocation of radio channels, acquires measurements from cell phones, and handles handovers from one
base station to another.
Roaming is among the basic procedures of mobility management. It enables subscribers to use mobile
services when moving outside of the geographical area of a specific network
DECT:
DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is
expected to make cordless phones much more common in both businesses and homes in the future.
Formerly called the Digital European Cordless Telecommunications standard because it was developed by
European companies, DECT's present name reflects its global acceptance. Like another important wireless
standard, Global System for Mobile communication (GSM), DECT uses time division multiple access (TDMA)
to transmit radio signals to phones. Whereas GSM is optimized for mobile travel over large areas, DECT is
designed especially for a smaller area with a large number of users, such as in cities and corporate
complexes. A user can have a telephone equipped for both GSM and DECT (this is known as a dual-mode
phone) and they can operate seamlessly.
TETRA:
TErrestrial Trunked RAdio (TETRA) is a digital trunked mobile radio standard developed to meet the needs
Public Safety
of traditional Professional Mobile Radio (PMR) user organizations such as:
Transportation
Utilities
Government
Military
PAMR
Commercial & Industry
Oil & Gas
The TETRA standard has been specifically developed to meet the needs of a variety of traditional PMR user
organizations. This means it has a scalable architecture allowing economic network deployments ranging
from single site local area coverage to multiple site wide area national coverage.
Wide area fast call set-up "all informed net" group calls
Some unique PMR services of TETRA are:
Direct Mode Operation (DMO) allowing "back to back" communications between radio terminals
High level voice encryption to meet the security needs of public safety organizations
independent of the network
An Emergency Call facility that gets through even if the system is busy
Full duplex voice for PABX and PSTN telephony communications
Besides meeting the needs of traditional PMR user organizations, the TETRA standard has also been
developed to meet the needs of Public Access Mobile Radio (PAMR) operators.
UMTS:
The Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for
networks based on the GSM standard.
UMTS supports maximum theoretical data transfer rates of 42 Mbit/s when Evolved HSPA (HSPA+) is
implemented in the network. Users in deployed networks can expect a transfer rate of up to 384 kbit/s for
Release '99 (R99) handsets (the original UMTS release), and 7.2 Mbit/s for High-Speed Downlink Packet
Access (HSDPA) handsets in the downlink connection. These speeds are significantly faster than the 9.6
kbit/s of a single GSM error-corrected circuit switched data channel, multiple 9.6 kbit/s channels in High-
Speed Circuit-Switched Data (HSCSD) and 14.4 kbit/s for CDMAOne channels.
Since 2006, UMTS networks in many countries have been or are in the process of being upgraded with
High-Speed Downlink Packet Access (HSDPA), sometimes known as 3.5G. Currently, HSDPA enables
downlink transfer speeds of up to 21 Mbit/s. Work is also progressing on improving the uplink transfer
speed with the High-Speed Uplink Packet Access (HSUPA). Longer term, the 3GPP Long Term Evolution
(LTE) project plans to move UMTS to 4G speeds of 100 Mbit/s down and 50 Mbit/s up, using a next
generation air interface technology based upon orthogonal frequency-division multiplexing.
The first national consumer UMTS networks launched in 2002 with a heavy emphasis on telco-provided
mobile applications such as mobile TV and video calling. The high data speeds of UMTS are now most often
utilized for Internet access. The user demand for video calls is not high and telco-provided audio/video
content has declined in popularity in favour of high-speed access to the World Wide Web—either directly
Pageonno: 15 or connected to a computer viaFollow
a handset us on facebook
Wi-Fi, Bluetooth or USB to get real-time updates from RGPV
We hope you find these notes useful.
You can get previous year question papers at
https://qp.rgpvnotes.in .