gsm network aspects
TRANSCRIPT
![Page 1: Gsm Network Aspects](https://reader030.vdocuments.us/reader030/viewer/2022021218/577d365a1a28ab3a6b92d77d/html5/thumbnails/1.jpg)
8/8/2019 Gsm Network Aspects
http://slidepdf.com/reader/full/gsm-network-aspects 1/5
GSM -> Network Aspects
1 Handover 2 Location updating and call
3 Authentication and security
Ensuring the transmission of voice or data of a given quality over the radio link is only half
the problem in a cellular mobile
network. The fact that the geogra phical area covered by the network is divided into cellsnecessitates the implementation of a handover mechanism. Also, the fact that the mobile
can roam nationally and internationally in GSM requires that registration, authentication, call routing and location updating f unctions exist in the GSM network.
The signalling protocol in GSM is str uctured in three layer s , shown in Figure 3. Layer 1
is the physical layer, which uses the channel str uctures discussed above. Layer 2 is the
data link layer. Across the Um interface, the data link layer uses a slight modification of the LAPD protocol used in ISDN, called LAPDm. Across the A interface, the lower parts
of Signalling System Num ber 7 are used. Layer 3 is su bdivided into 3 su blayer s.
,------------------------------------------------------------------------,
| Um A |
| ,---------, | | ,---------, |
| | CM | | CM | |
| GSM layer 3 |- - - - -| | | |- - - - -| |
| | MM | | MM | |
| |- - - - -| | ,-------------------, | |- - - - -| |
| | | | | DTAP | | DTAP | |
| | RR | | | RR | BSSMAP | | | BSSMAP | |
| - - - - - - -|---------| |---------|---------| |---------| |
| | | | | | SCCP | | | SCCP | || GSM layer 2 | LAPDm | | LAPDm |---------| |---------| |
| - - - - - - -|---------| | |---------| | | | | |
| GSM layer 1 | TDMA | | TDMA | MTP | | MTP | |
| `---------' | `-------------------' | `---------' |
| BTS BSC |
| |
| Mobile Station Base Station Subsystem MSC |
`------------------------------------------------------------------------'
FIGURE 3
Radio R esources Management controls the setup, maintenance, and ter mination of radio channels
Mobility Management manages the location updating, handover s, and registration procedures, discussed
below
Connection Management handles general call control, similar to CCITT R ecommendation Q.931, and providessupplementary services.
Signalling between the different entities in the network, such as between the HLR and VLR ,
![Page 2: Gsm Network Aspects](https://reader030.vdocuments.us/reader030/viewer/2022021218/577d365a1a28ab3a6b92d77d/html5/thumbnails/2.jpg)
8/8/2019 Gsm Network Aspects
http://slidepdf.com/reader/full/gsm-network-aspects 2/5
is accomplished throught the Mobile Application Part (MAP). Application parts are the to player of Signalling System Num ber 7. The specification of the MAP is complex. It is one
of the longest documents in the GSM recommendations, said to be over 600 pages in length .
Described below are the main f unctions of the Mobility Management su blayer.
1 Handover
Handover, or handoff as it is called in North America, is the switching of an ongoing call to
a different channel or cell. There are four different ty pes of handover in the GSM system, which involve transferring a call between
y channels (time slots) in the same cell,
y cells (Base Transceiver Stations) under the control of the same Base Station Controller (BSC),
y cells under the control of different BSCs, but belonging to the same Mobile servicesSwitching Center (MSC), and
y cells under the control of different MSCs.
The fir st two ty pes of handover, called internal handover s, involve only one Base Station
Controller (BSC). To save signalling bandwidth, they are managed by the BSC without involving the Mobile service Switching Center (MSC), exce pt to notify it at the completion
of the handover. The last two ty pes of handover, called external handover s, are handled by the MSCs involved. Note that call control, such as provision of supplementary services and
requests for f urther handoff s, is handled by the original MSC.
Handover s can be initiated by either the mobile or the MSC (as a means of traffic load
balancing). During its idle time slots, the mobile scans the Broadcast Control Channel of
up to 16 neighboring cells, and for ms a list of the six best candidates for possible handover, based on the received signal strength. This infor mation is passed to the BSC and MSC, and
is used by the handover algorithm.
The algorithm for when a handover decision should be taken is not specified in the GSMrecommendations. There are two basic algorithms used, both closely tied in with power
control. This is because the BSC usually does not know whether the poor signal quality isdue to multi path fading or to the mobile having moved to another cell. This is especially
tr ue in small urban cells.
The 'minimum acce ptable perfor mance' algorithm gives precedence to power control over
handover, so that when the signal degrades beyond a certain point, the power level of the mobile is increased. If f urther power increases do not improve the signal, then a handover
is considered. This is the simpler and more common method, but it creates 'smeared' cell boundaries when a mobile transmitting at peak power goes some distance beyond its original
![Page 3: Gsm Network Aspects](https://reader030.vdocuments.us/reader030/viewer/2022021218/577d365a1a28ab3a6b92d77d/html5/thumbnails/3.jpg)
8/8/2019 Gsm Network Aspects
http://slidepdf.com/reader/full/gsm-network-aspects 3/5
cell boundaries into another cell.
The 'power budget' method uses handover to try to maintain or improve a certain level of
signal quality at the same or lower power level. It thus gives precedence to handover over power control. It avoids the 'smeared' cell boundary problem and reduces cochannel
interference, but it is quite complicated.
2 Location updating and call routing
The MSC provides the interface between the GSM mobile network and the pu blic fixed
network. From the fixed network 's point of view, the MSC is just another switching node. However, switching is a little more complicated in a mobile network since the MSC has to
know where the mobile is currently roaming - and in GSM it could even be roaming in another country. The way GSM accomplishes location updating and call routing to the
mobile is by using two location register s: the Home Location R egister (HLR) and the Visitor Location R egister (VLR).
Location updating is initiated by the mobile when, by monitoring the Broadcast Control
Channel, it notices that the locationarea broadcast is not the same as the one previously stored in the mobile's memory. An update request and the IMSI or previous TMSI is sent to
the new VLR via the new MSC. A Mobile Station R oaming Num ber (MSRN) is allocated and sent to the mobile's HLR (which always kee ps the most current location) by the new
VLR . The MSRN is a regular tele phone num ber that routes the call to the new VLR and issu bsequently translated to the TMSI of the mobile. The HLR sends back the necessary call-
control parameter s, and also sends a cancel message to the old VLR , so that the previousMSRN can be reallocated. Finally, a new TMSI is allocated and sent to the mobile, to
identify it in f uture paging or call initiation requests.
,-------------------------------------------------------------------------
-,
| Fixed PSTN/ISDN Gateway Home Location PSTN/ISDN Mobile
|
| Subscriber exchange MSC Register exchange MSC/VLR Station
|
| | | | | | | |
|
| |--------->| MSISDN | | | | |
|
| | MSISDN |-------->| MSISDN | | | |
|
| | | |- - - - ->| | | ||
| | | | MSRN | | | |
|
| | | |<- - - - -| | | |
|
| | | | MSRN | | | |
|
| | | |-------------------->| MSRN | |
![Page 4: Gsm Network Aspects](https://reader030.vdocuments.us/reader030/viewer/2022021218/577d365a1a28ab3a6b92d77d/html5/thumbnails/4.jpg)
8/8/2019 Gsm Network Aspects
http://slidepdf.com/reader/full/gsm-network-aspects 4/5
|
| | | | | |--------->| TMSI |
|
| | | | | | |--------->|
|
| | ,---, ,---, | ,---, ,---, |
|| | | S | | S | | | S | | S | |
|
| `---' `---' `---' `---'
|
| ,---,
|
| | S | indicates a switching node.
|
| `---'
|
`-------------------------------------------------------------------------
-'
FIGURE 4
With the above locationupdating procedure, call routing to a roaming mobile is easily
perfor med. The most general case is shown in Figure 4, where a call from a fixed network (Pu blic Switched Telecommunications Network or Integrated Services Digital Network ) is
placed to a mobile su bscriber. Using the Mobile Su bscriber 's tele phone num ber (MSISDN, the ISDN num bering plan specified in the ITUT E.164 recommendation), the call is routed
through the fixed land network to a gateway MSC for the GSM network (an MSC that interfaces with the fixed land network, thus requiring an echo canceller ). The gateway
MSC uses the MSISDN to query the Home Location R egister, which returns the current roaming num ber (MSRN). The MSRN is used by the gateway MSC to route the call to the
current MSC (which is usually coupled with the VLR). The VLR then converts the roaming num ber to the mobile's TMSI, and a paging call is broadcast by the cells under the
control of the current BSC to infor m the mobile.
3 Authentication and security
Since the radio medium can be accessed by anyone, authentication of user s to prove that
they are who they claim to be, is a very important element of a mobile network. Authentication involves two f unctional entities, the SIM card in the mobile, and the
Authentication Center (AC). Each su bscriber is given a secret key, one co py of which is
stored in the SIM card and the other in the Authentication Center. During authentication, the AC generates a random num ber that it sends to the mobile. Both the mobile and the ACthen use the random num ber, in con juction with the su bscriber 's secret key and a ci phering
algorithm called A3, to generate a num ber that is sent back to the AC. If the num ber sent by the mobile is the same as the one calculated by the AC, the su bscriber is authenticated.
The above calculated num ber is also used, together with a TDMA frame num ber and another
ci phering algorithm called A5, to enci pher the data sent over the radio link, preventing
![Page 5: Gsm Network Aspects](https://reader030.vdocuments.us/reader030/viewer/2022021218/577d365a1a28ab3a6b92d77d/html5/thumbnails/5.jpg)
8/8/2019 Gsm Network Aspects
http://slidepdf.com/reader/full/gsm-network-aspects 5/5
other s from listening in. Enci phering is an o ption for the very paranoid, since the signal isalready coded, interleaved, and transmitted in a TDMA manner, thus providing protection
from all but the most per sistent and dedicated eavesdro pper s.
Another level of security is perfor med on the mobile equi pment, as o pposed to the mobile
su bscriber. As mentioned earlier, each GSM ter minal is identified by a unique International Mobile Equi pment Identity (IMEI) num ber. A list of IMEIs in the network is stored in the
Equi pment Identity R egister (EIR). The status returned in response to an IMEI query to the EIR is one of the following:
whitelisted The ter minal is allowed to connect to the network
greylisted Under observation from the network, possible problems
black listed The ter minal has either been re ported as stolen, or it is not ty pe a pproved (the correct
ty pe of ter minal for a GSM network ). The ter minal is not allowed to connect to the network.