Module 2
Module 2
Developed by
Under ETSI, GSM is Full set of Phase 2 of the GSM
Group Special
Mobile which was named as “Global specifications specifications
an initiative of System for Mobile phase-I
CEPT communication”
GSM Services
GSM Services
How are
you?
How are
How are you? How are
you? you? How are
you?
GSM Network and System
Architecture GSM ervices
GSM Network
Network Switching
Subsystem (NSS) Base Station Mobile
Subsystem (BSS) Station (MS)
(International Mobile Equipment Identity) to phone – contains key information to activate the phone
● Voice and data transmission ● Security/authentication parameters and also address book
● Monitoring power and signal quality of contact information saved by users.
surrounding cells for optimum handover • ● SIM card also stores the SMS received by the users and saves.
Power level : 0.8W – 20 W ● Portability of SIM is possible
● 160 character long SMS
System Architecture of Base Station Subsystem
(BSS):
● The BSS is the link between the MS and GSM
Mobile switching centre.
● Base Station Subsystem is composed of two parts
that communicate across the standardized Abis
interface allowing operation between components
made by L different suppliers - Base Transceiver
Station (BTS) and Base Station Controller (BSC).
● The BSS communicate with MS over air interface
using protocols
● BSC and BTS communicate using LAPD protocol -
Link access protocol for D-Channels.
Base Transceiver Station (BTS):
● Encodes, encrypts, multiplexes, modulates and feeds
the RF signals to the antenna.
● Communicates with Mobile station and BSC.
● Consists of Transceivers (TRX) units
● Also called as Radio base station or RBS.
● RBS is the interface corresponds to the subscribers
MS. L
● Short message services need to have an SMS gateway MSC(SMS-GMSC) and an SMS
interworking MSC(SMS-IWMSC)
● The implementation of GPRS for high-speed data transmission and reception requires
the use of two additional switching elements
● A serving GPRS support node (SGSN) &A Gateway GPRS support node (GGSN)
Mobile Switching Centre (MSC)
● Heart of the network
● Manages communication between GSM and other networks
● Billing information and collection
● Mobility management
- Registration
- Location Updating
- Inter
L
BSS and inter MSC call handoff
- SS7 Protocol
Home Location Registers (HLR)
● Stores information about each subscriber that belongs to it MSC in permanent and
temporary fashion.
● As soon as mobile subscriber leaves its current local area, the information in the HLR is
updated.
● Database contains IMSI, MSISDN, prepaid/postpaid, roaming restrictions,
supplementary services.
Visitor Location
L
Registers (VLR)
● Temporary database which updates whenever new MS enters its area, by HLR
database.
● Assigns a TMSI (Temporary Mobile Subscriber Identity) to each MS entering the VLR
area which keeps on changing.
● Controls those mobiles roaming in its area.
● Database contains IMSI, MSISDN, Location Area, authentication key
Authentication Centre (AUC):
● Contains the algorithms for authentication as well as the keys for encryption.
● Protects network operators from fraud.
● Situated in special protected part of the HLR.
Equipment Identity Register (EIR):
● Stores all devices identifications registered for this network.
● Database that is used to track handsets using the IMEI (International Mobile
Equipment Identity)
● Prevents calls from stolen, unauthorised or defective mobile devices
L
● The AUC and EIR in conjunction with MSC/VLR and HLR provides the additional
GSM network security and facilitates international roaming within GSM network.
● The flexible numbering register (FNR) -> provides portability to a subscriber
Operation and Support System and Other Nodes
● The centralized operation of the various units in the system and functions
needed to maintain the subsystems.
● Dynamic monitoring and controlling of the network.
● Functions :
○ Configuration management
○ Fault report and alarm handling
○ Performance supervision/management
○ Storage of system software and data
L
GSM network interfaces and protocols
GSM interfaces
● The air interface between the MS and the BTS is the Um interface
● The physical interface between the BTS and the BSC is known as the Abis Interface
● The interface between the BSC and MSC is known as the A interface
● The MSC has various interfaces between it and the other network switching system
elements or other MSCs.
Subscriber information
updation and call routing for Authentication of mobile user
subscribers moving between
different MSCs
Exchange subscriber
information
1.Um interface
● The layer 2 protocol used on the Um interface is LAPDm a modified version
of LAPD.
○ The major difference between LAPD and LAPDm protocol are
■ For LAPDm no error correction is employed
■ LAPDm messages are segmented into shorter messages than LAPD
2.Abis Interface
The layer2 protocol used on the Abis interface is LAPD.
3.A Interface
The A interface exists between the BSC and MSC
GSM Channel Concept
The cellular telephone network use various control and traffic
channels to carry out
● The operations necessary to allow for the setup of a subscriber
radio link for the transmission of voice or data.
● To provide subsequent system support for the subscriber
mobility.
● The GSM cellular system is based on the use of TDMA technique
to provide additional user capacity over a limited amount of
radio frequency spectrum.
● This is accomplished by dividing the air interface connection
period into timeslots that can be used by different subscribers
for data or voice traffic.
GSM Channel Concept
The cellular telephone network use various control and traffic channels to carry out
● The timeslots are arranged in sequence and are conventionally numbered 0 to 7.
● Each time slot is considered as logical channel.
● Each time slot carry either subscriber traffic or signalling and control information
required for the management of the radio link and other system resources.
● Normal burst
● Frequency correction burst
● Synchronization burst
● Access burst
● Dummy burst
Normal burst:
● Here two groups of 57 encrypted bits are transmitted on either side of a
training sequence of bits.
● 3 tail bits precede the first group of traffic bits and 3 tails bits the last group of
traffic bits.
● It has 8.25 bit long guard period (GP) at end where no transmission activity
take place.
Frequency correction burst (FCB):
● It is used by the mobile to obtain the frequency synchronization.
● It consists of 142 fixed bits and followed by 3 tail bits.
● It has 8.25 bit long guard period (GP) at end.
● The repetition of FCB by the BTS within the GSM frame structure
becomes the frequency correction channel (FCCH).
Synchronization burst:
● It is used by the mobile to obtain the timing synchronization.
● It consists of 3 tail bits followed by 39 encrypted bits, a 64 bit
synchronisation sequence 39 more encrypted bits, 3 tail bits, and the
same 8.25 bit long guard period.
● The reputation of synchronising sequence was by the BTS within the
GSM frame structure becomes the synchronising channel(SCH)
Access burst:
● It is used by the mobile to facilitate random access request by the mobile and
handover operations.
● It consists of 8 tails with followed by 41-bits synchronization sequence , then 36
encrypted bits and 3 tail bits.
● The length of the guard bit time period is equal to 252 μs or 68.25 bits.
● The access burst is used on both the Random Access channel on the fast
associated control channel during handover.
Dummy burst:
● The dummy bus is transmitted on the radio frequency designated as C0 when no
other type of burst signal is being transmitted.
● It consists of 3 tail bits, 58 mixed bits, a- 26 bits training sequence, 58 more mixed
bits,3 tail with the same 8.25 bit longer guard period.
● The dummy burst is used to ensure that the base station is always transmitting the
frequency carrying system information. It helps for the power measurement on the
strongest BTS.
PART -II
GSM System Operations
GSM Identities
1.Mobile Subscriber ISDN Number (MSISDN)
● The authentic telephone number of a mobile station
is the Mobile Subscriber ISDN Number (MSISDN).
● Based on the SIM, a mobile station can have many
MSISDNs, as each subscriber is assigned with a
separate MSISDN to their SIM respectively.
○ Country Code (CC) − Up to 3 decimal places.
○ National Destination Code (NDC) − Typically 2-3
decimal places.
○ Subscriber Number (SN) − Maximum 10 decimal
places.
GSM Identities
2.Network Numbering Plans
● GSM has both LAI (Location area identity) and
CGI (Cell global Identity) .
● The LAI is used for MS paging and location
updating. CGI is used for cell identification
within a location area.
● The LAI hierarchy is based on international
standard and structured in a unique format as
mentioned below
○ Country Code (CC) − 3 decimal places.
○ Mobile Network Code (MNC) − 2 decimal
places.
○ Location Area Code (LAC) − maximum 5
decimal places or maximum twice 8 bits
coded in hexadecimal (LAC < FFFF).
Mobile Station Roaming Number (MSRN):
● Mobile Station Roaming Number (MSRN) is an
interim location dependent ISDN number,
assigned to a mobile station by a regionally
responsible Visitor Location Register (VLR).
● Using MSRN, the incoming calls are
channeled to the MS.
● The MSRN has the same structure as the
MSISDN.
○ Country Code (CC) − of the visited
network.
○ National Destination Code (NDC) − of the
visited network.
○ Subscriber Number (SN) − This is the
number of the serving MSC.
GSM call setup using
the MSRN (Mobile
Subscriber Roaming
Number
GSM call setup using the MSRN (Mobile Subscriber Roaming Number
○ Step1: Initial address message
○ Step2: Send routing Information
○ Step3: HLR uses MSISDN to find the subscriber data in the data base.
○ Step4: Provide Roaming Number
○ Step5: VLR asks MSC to reserve idle MSRN number
○ Step6: the MSC/VLR sends the MSRN back to HLR
○ Step7: HLR sends the MSRN back to GMSC
○ Step8: GMSC uses the MSRN to route the call to the Correct MSC. IMSI is used by
MSC for final establishment of call.
■ **IMSI-International Mobile Subscriber Identity
■ **GMSC- Gateway Mobile Switching Centre
■ **MSRN -Mobile Station Roaming Number
GSM System Operations
2.Call Setup
● Call setup within a GSM system consists following operations.
● For either a mobile-originating call or a mobile-terminating call the following operations
need to be performed.
1.Interrogation (only for a mobile-terminating call) 2. Radio resource connection
establishment.
3. Service request 4. Authentication
5. Ciphering mode setting 6. IMEI number check
7. TMSI (Temporary Mobile Subscriber Identity)allocation 8. Call initiation
9. Assignment of a traffic channel 10. User alerting signaling
11. Call accepted signaling
1.GSM Interrogation Phase of call setup
○ For the interrogation operation, initial address message (IAM) comes outside the
GSM network using ISUP (Integrated Services Digital Network User Part )
/TUP(Telephone User Part ) protocols.
2.Radio resource
connection
establishment
2.Radio resource connection establishment
○ The MSC/VLR initiates the call set up process by sending a layer 3 paging message to
the appropriate BSC.(IMSI number)
○ The BSC sends the paging command message to the appropriate BTSs .(IMSI number,
the paging group &channel number)
○ The BTS sends a paging request message to the MS.
○ The MS responds to the paging request message by sending channel request
message to the BTS.
○ The MS responds to the paging request message by sending channel request
message to the BTS.
○ This message will contain the informations like originating call,location
updating,emergency call etc.
○ When BTS detects an access burst,it sends a channel required message to BSC
○ The BSC examines the information contained within the channel required message
and determines whether the MS is within the allowed range of the cell.
2.Radio resource connection establishment
○ BSC determines what channel to use and sends a channel activation message to the
BTS
○ The BTS activates this channel and then sends a channel activation
acknowledgement back to the BSC.
○ The BSC then sends an immediate assignment command message back to the BTS
that includes an immediate assign message for the MS.
3.Service Request
3.Service Request
○ The service request phase occurs as soon as the MS has tuned to the new
channel assigned to it by the immediate assignment message sent during the
radio resource connection phase.
○ At this time a layer 2 message known as set asynchronous balance
mode(SABM) is sent from the MS to the BTS.
○ Then the BTS sends back to the MS a message that contains the original
paging response message.
○ This operation prevents the chance occurrence of two MS accessing the same
channel simultaneously.
○ The paging response message from MS includes MS identity, the ciphering key
sequence number and MS class mark.
○ When the paging response arrives at BTS it is forwarded to the BSC in an
establish indication message.
3.Service Request
○ This message causes the BSC to activate radio connection quality supervision
and initiates power control algorithm for the dynamic control of MS output
power level.
○ Eventually paging response message is delivered to MSC as connection
request message.
○ Finally MSC sends a connection confirm message back to the BSC.
4.Authentication
4.Authentication
○ Depending upon the exchange properties stored in the MSC/VLR,the
authentication is either activated or not activated.
○ If the authentication is activated,an authentication request message is sent
transparently to the MS.
○ The message containing a 128-bit random number (RAND) and ciphering key
sequence number (CKSN) is sent to the MS over SDCCH.
○ The MS stores the CKSN and then calculates the value of a signed response
(SRES) by using RAND and value of KI and KC.
○ The value of SRES is returned to the MSC/VLR as transparent authentication
response message.
4.Authentication
○ Between BSC and BTS a data request frame and a data indication frame are
used to pass message.
○ A timer is set in the MSC/VLR when the first authentication request message is
sent.
○ If the timer expires , the request is sent again. If the timer expires a second
time, the radio resources are released.
○ If authentication is unsuccessful,the GSM system may initiate a procedure to
identify the MS.
○ Depending upon the results of this procedure the MS may be barred from the
system or sent a message indicating that the IMSI is unknown in VLR or PLMN
not allowed.
5.Ciphering mode setting
5.Ciphering mode setting
○ If the authentication process is successful, the next step in the call set up
process is initiated.
○ The MSC/VLR sends a ciphering mode command to the BSC. This message
contains the value of KC.
○ It is then forwarded to the BTS with an encryption command message.
○ The BTS stores the value of KC and sends a nonciphered ciphering mode
command message to MS.
○ MS inserts KC & TDMA frame number into another authentication algorithm.
And thus a ciphering sequence is created
○ This ciphering mode complete message is sent to BTS
○ BTS, upon reception of this message deciphers it and sends it to MSC via
BSC.
6.IMEI check
6.IMEI check
○ If the IMEI number is to be checked, the MSC/VLR sends an identity request
message to the MS.
○ The value of IMEI sent by the mobile is checked against the EIR database.
○ The EIR can return three status modes for the MS back to the network.
■ The MS can be “whitelisted” and allowed to use the network.
■ The MS can be “blacklisted” and cannot be allowed to use the network.
■ The MS can be “greylisted” and the network operator can decide to
use/not use the network.
7.TMSI(Temporary Mobile Subscriber Identity) reallocation
○ The value of the TMSI number to be used is determined by the MSC/VLR.
○ If a TMSI number is to be used,it is sent transparently to the MS from the
MSC/VLR via the TMSI reallocation command.
○ This mobility management message is transmitted from the BTS to the MS.
○ The value of TMSI is stored in the SIM Card.
8.Call Initiation Procedure
○ The next step is the transmission of the setup message transparently from
the MSC to the MS.
○ This message contains a request for GSM bearer services(speech,data etc..)
○ The MS will send a call confirmed message if it can handle the requested
service.
9.Assignment of a traffic channel
○ The traffic channel
assignment is initiated by the
MSC
○ The MSC sends an assignment
request message to the BSC.
○ This message contains
information about the call
priority,a circuit identity code
to indicate the transmission
path for the speech/data
between the MSC and BSC.
10.Call
confirmation,Call
Accepted and Call
Release
10.Call confirmation, Call Accepted and Call Release
Gives details ab
the type
communications
messages that
sent across the ra
link or Um interfac
Layer 3: Networking Layer Operations
● Within the GSM network,layer 3 provides the mobile network
signaling(MNS) service for the mobile subscriber’s application.
● The MNS operations include the following:
○ Connection Management
○ Mobility Management
○ Radio Resource Management
● These are the 3 sublayers of layer 3.
Connection Management
●The CM sublayer contains the functions for call control,call related supplementary services
management,non call related supplementary service and short message service.
A. Call Control
● Call control(CC) procedures are used during the call establishment.
● For a mobile originated call,the mobile subscriber starts the call establishment procedure by
dialling the digits.
● When request is made to establish a call
1.Free or idle CC establish a CC connection between MS and GSM
2.Request MM sublayer to establish a MM connection
3.After confirming MM connection CC entity sends a message to MSC.
4.Two peer sub layers enter an active state and call establishment signaling phase is complete.
5.When a mobile-terminating call occurs,the CC entity establishes a connection between the
network and the MS.
6.Call clearing procedures are initiated through the sending of a disconnect message by the
CC.
7.MM connection is released and CC return tom an idle or null state.
B.Short message service support
● Short message control(SMC) uses short message control protocol.
● These entities are used to transfer short messages between the MS and
the MSC.
● SMC entities provide service to the SMS application through the mobile
network SMS service access point(MNSMS-SAP).
C.Supplementary Services Support
● Supplementary services(SS) handle services that are not related to a
specific call.
Eg: Call forwarding and Call waiting
Mobility Management(MM)
● MM procedures include authentication,TMSI reallocation
and MS identification through IMSI or IMEI.
● MM sublayer sends a request message for the
establishment of a RR connection to the RR sublayer.
● After the RR connection is established the network may
start the MM procedure of authentication,TMSI
reallocation and the network may also ask the RR sublayer
to perform ciphering mode setting.
Radio Resource Management
● The Radio Resource sublayer receives service from Layer2 and
provides service to the mm sublayer.
● Primary function of the RR procedures is to establish and maintain
a connection between the MS and the BTS.
● For the establishment of RR connection,the MS’s RR entity
transmits a channel request message that asks for a signaling
channel.
● The network responds by allocating a dedicated channel to the
MS by sending an immediate assignment message.
2. Layer 2: Data Link Layer