gsm network aspects

5
GSM -> Network Aspects 1 Handover  2 Location updating and call  3 Authentication and security  Ensuring the transmission of  voice or  data of  a given quality over  the radio link  is only half  the problem in  a cellular mobile network. The fact that the geogra  phical  area covered  by the network  i s divided into cell s necessitates the implementation of  a handover mechanism. Also,  the fact that the mobile can roam nationally  and internationally  in GSM require s that regi stration, authentication,  call  routing and location updating f unctions exist in the GSM network. The signalling protocol  in GSM is str uctured in  three layer s , shown in Figure 3. Layer 1 is the phys ical  layer, which uses the channel str uctures discussed above. Layer 2 i s the data link  layer. Across the Um interface,  the data link  layer uses a slight modification of  the LAPD protocol used in ISDN, called LAPDm. Across the A interface,  the lower parts of Signalling System Num  ber 7 are used. Layer 3 is su  bdivided into 3 su  blayer s. ,------------------------------------------------------------------------, | Um A | | ,---------, | | ,---------, | | | CM | | CM | | | GSM layer 3 |- - - - -| | | |- - - - -| | | | MM | | MM | | | |- - - - -| | ,-------------------, | |- - - - -| | | | | | | DTAP | | DTAP | | | | RR | | | RR | BSSMAP | | | BSSMAP | | | - - - - - - -|---------| |---------|---------| |---------| | | | | | | | SCCP | | | SCCP | | | GSM layer 2 | LAPDm | | LAPDm |---------| |---------| | | - - - - - - -|---------| | |---------| | | | | | | GSM layer 1 | TDMA | | TDMA | MTP | | MTP | | | `---------' | `-------------------' | `---------' | | BTS BSC | | | | Mobile Station Base Station Subsystem MSC | `------------------------------------------------------------------------' FIGURE 3 Radio R esources Manageme nt control s the setup, maintenance,  and ter mination  of  radio channel s Mobili ty Manageme nt manages the location updating, handover s, and registration procedures, di scussed  below Connection Manageme nt handles general  call  control, similar  to CCITT R ecommendation Q.931, and provides supplementary services. Signalling   between the different entities in  the network, such as  between the HLR and VLR , 

Upload: abhineetkumar

Post on 10-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Gsm Network Aspects

8/8/2019 Gsm Network Aspects

http://slidepdf.com/reader/full/gsm-network-aspects 1/5

GSM -> Network Aspects 

1 Handover  2 Location updating and call 

3 Authentication and security 

Ensuring the transmission of  voice or  data of  a given quality over  the radio link  is only half  

the problem in a cellular mobile 

network. The fact that the geogra phical area covered  by the network  is divided into cellsnecessitates the implementation of  a handover mechanism. Also, the fact that the mobile 

can roam nationally and internationally in GSM requires that registration, authentication, call routing and location updating f unctions exist in the GSM network. 

The signalling protocol in GSM is str uctured in three layer s , shown in Figure 3. Layer 1

is the physical layer, which uses the channel str uctures discussed above. Layer 2 is the 

data link  layer. Across the Um interface, the data link  layer uses a slight modification of  the LAPD protocol used in ISDN, called LAPDm. Across the A interface, the lower parts

of Signalling System Num ber 7 are used. Layer 3 is su bdivided into 3 su blayer s. 

,------------------------------------------------------------------------,

| Um A |

| ,---------, | | ,---------, |

| | CM | | CM | |

| GSM layer 3 |- - - - -| | | |- - - - -| |

| | MM | | MM | |

| |- - - - -| | ,-------------------, | |- - - - -| |

| | | | | DTAP | | DTAP | |

| | RR | | | RR | BSSMAP | | | BSSMAP | |

| - - - - - - -|---------| |---------|---------| |---------| |

| | | | | | SCCP | | | SCCP | || GSM layer 2 | LAPDm | | LAPDm |---------| |---------| |

| - - - - - - -|---------| | |---------| | | | | |

| GSM layer 1 | TDMA | | TDMA | MTP | | MTP | |

| `---------' | `-------------------' | `---------' |

| BTS BSC |

| |

| Mobile Station Base Station Subsystem MSC |

`------------------------------------------------------------------------'

FIGURE 3 

Radio R esources Management controls the setup, maintenance, and ter mination of  radio channels

Mobility Management manages the location updating, handover s, and registration procedures, discussed 

 below 

Connection Management handles general call control, similar  to CCITT R ecommendation Q.931, and providessupplementary services. 

Signalling  between the different entities in the network, such as  between the HLR and VLR , 

Page 2: Gsm Network Aspects

8/8/2019 Gsm Network Aspects

http://slidepdf.com/reader/full/gsm-network-aspects 2/5

is accomplished throught the Mobile Application Part (MAP). Application parts are the to player  of Signalling System Num ber 7. The specification of  the MAP is complex. It is one 

of  the longest documents in the GSM recommendations, said to  be over 600 pages in length . 

Described  below are the main f unctions of  the Mobility Management su blayer. 

1 Handover

Handover, or  handoff  as it is called in North America, is the switching of  an ongoing call to 

a different channel or  cell. There are four  different ty pes of  handover  in the GSM system, which involve transferring a call  between 

y  channels (time slots) in the same cell, 

y  cells (Base Transceiver Stations) under  the control of  the same Base Station Controller (BSC), 

y  cells under  the control of  different BSCs,  but  belonging to the same Mobile servicesSwitching Center (MSC), and 

y  cells under  the control of  different MSCs. 

The fir st two ty pes of  handover, called internal handover s, involve only one Base Station 

Controller (BSC). To save signalling  bandwidth, they are managed  by the BSC without involving the Mobile service Switching Center (MSC), exce pt to notify it at the completion 

of  the handover. The last two ty pes of  handover, called external handover s, are handled  by the MSCs involved. Note that call control, such as provision of supplementary services and 

requests for  f urther  handoff s, is handled  by the original MSC. 

Handover s can  be initiated  by either  the mobile or  the MSC (as a means of  traffic load 

 balancing). During its idle time slots, the mobile scans the Broadcast Control Channel of  

up to 16 neighboring cells, and for ms a list of  the six  best candidates for possible handover,  based on the received signal strength. This infor mation is passed to the BSC and MSC, and 

is used  by the handover  algorithm. 

The algorithm for  when a handover  decision should  be taken is not specified in the GSMrecommendations. There are two  basic algorithms used,  both closely tied in with power  

control. This is  because the BSC usually does not know whether  the poor signal quality isdue to multi path fading or  to the mobile having moved to another  cell. This is especially 

tr ue in small urban cells. 

The 'minimum acce ptable perfor mance' algorithm gives precedence to power  control over  

handover, so that when the signal degrades  beyond a certain point, the power  level of  the mobile is increased. If  f urther power  increases do not improve the signal, then a handover  

is considered. This is the simpler  and more common method,  but it creates 'smeared' cell  boundaries when a mobile transmitting at peak power  goes some distance  beyond its original 

Page 3: Gsm Network Aspects

8/8/2019 Gsm Network Aspects

http://slidepdf.com/reader/full/gsm-network-aspects 3/5

cell  boundaries into another  cell. 

The 'power   budget' method uses handover  to try to maintain or  improve a certain level of  

signal quality at the same or  lower power  level. It thus gives precedence to handover  over   power  control. It avoids the 'smeared' cell  boundary problem and reduces cochannel 

interference,  but it is quite complicated. 

2 Location updating and call routing 

The MSC provides the interface  between the GSM mobile network  and the pu blic fixed 

network. From the fixed network 's point of  view, the MSC is just another switching node. However, switching is a little more complicated in a mobile network since the MSC has to 

know where the mobile is currently roaming - and in GSM it could even  be roaming in another  country. The way GSM accomplishes location updating and call routing to the 

mobile is  by using two location register s: the Home Location R egister (HLR) and the Visitor  Location R egister (VLR). 

Location updating is initiated  by the mobile when,  by monitoring the Broadcast Control 

Channel, it notices that the locationarea  broadcast is not the same as the one previously stored in the mobile's memory. An update request and the IMSI or previous TMSI is sent to 

the new VLR via the new MSC. A Mobile Station R oaming Num ber (MSRN) is allocated and sent to the mobile's HLR (which always kee ps the most current location)  by the new 

VLR . The MSRN is a regular  tele phone num ber  that routes the call to the new VLR and issu bsequently translated to the TMSI of  the mobile. The HLR sends  back  the necessary call-

control parameter s, and also sends a cancel message to the old VLR , so that the previousMSRN can  be reallocated. Finally, a new TMSI is allocated and sent to the mobile, to 

identify it in f uture paging or  call initiation requests. 

,-------------------------------------------------------------------------

-,

| Fixed PSTN/ISDN Gateway Home Location PSTN/ISDN Mobile

|

| Subscriber exchange MSC Register exchange MSC/VLR Station

|

| | | | | | | |

|

| |--------->| MSISDN | | | | |

|

| | MSISDN |-------->| MSISDN | | | |

|

| | | |- - - - ->| | | ||

| | | | MSRN | | | |

|

| | | |<- - - - -| | | |

|

| | | | MSRN | | | |

|

| | | |-------------------->| MSRN | |

Page 4: Gsm Network Aspects

8/8/2019 Gsm Network Aspects

http://slidepdf.com/reader/full/gsm-network-aspects 4/5

|

| | | | | |--------->| TMSI |

|

| | | | | | |--------->|

|

| | ,---, ,---, | ,---, ,---, |

|| | | S | | S | | | S | | S | |

|

| `---' `---' `---' `---'

|

| ,---,

|

| | S | indicates a switching node.

|

| `---'

|

`-------------------------------------------------------------------------

-'

FIGURE 4 

With the above locationupdating procedure, call routing to a roaming mobile is easily 

 perfor med. The most general case is shown in Figure 4, where a call from a fixed network  (Pu blic Switched Telecommunications Network  or Integrated Services Digital Network ) is

 placed to a mobile su bscriber. Using the Mobile Su bscriber 's tele phone num ber (MSISDN, the ISDN num bering plan specified in the ITUT E.164 recommendation), the call is routed 

through the fixed land network  to a gateway MSC for  the GSM network (an MSC that interfaces with the fixed land network, thus requiring an echo canceller ). The gateway 

MSC uses the MSISDN to query the Home Location R egister, which returns the current roaming num ber (MSRN). The MSRN is used  by the gateway MSC to route the call to the 

current MSC (which is usually coupled with the VLR). The VLR then converts the roaming num ber  to the mobile's TMSI, and a paging call is  broadcast  by the cells under  the 

control of  the current BSC to infor m the mobile. 

3 Authentication and security

Since the radio medium can  be accessed  by anyone, authentication of user s to prove that 

they are who they claim to  be, is a very important element of  a mobile network. Authentication involves two f unctional entities, the SIM card in the mobile, and the 

Authentication Center (AC). Each su bscriber  is given a secret key, one co py of  which is

stored in the SIM card and the other  in the Authentication Center. During authentication, the AC generates a random num ber  that it sends to the mobile. Both the mobile and the ACthen use the random num ber, in con juction with the su bscriber 's secret key and a ci phering 

algorithm called A3, to generate a num ber  that is sent  back  to the AC. If  the num ber sent  by the mobile is the same as the one calculated  by the AC, the su bscriber  is authenticated. 

The above calculated num ber  is also used, together  with a TDMA frame num ber  and another  

ci phering algorithm called A5, to enci pher  the data sent over  the radio link, preventing 

Page 5: Gsm Network Aspects

8/8/2019 Gsm Network Aspects

http://slidepdf.com/reader/full/gsm-network-aspects 5/5

other s from listening in. Enci phering is an o ption for  the very paranoid, since the signal isalready coded, interleaved, and transmitted in a TDMA manner, thus providing protection 

from all  but the most per sistent and dedicated eavesdro pper s. 

Another  level of security is perfor med on the mobile equi pment, as o pposed to the mobile 

su bscriber. As mentioned earlier, each GSM ter minal is identified  by a unique International Mobile Equi pment Identity (IMEI) num ber. A list of IMEIs in the network  is stored in the 

Equi pment Identity R egister (EIR). The status returned in response to an IMEI query to the EIR is one of  the following:

whitelisted The ter minal is allowed to connect to the network  

greylisted Under  observation from the network, possible problems

black listed The ter minal has either   been re ported as stolen, or  it is not ty pe a pproved (the correct 

ty pe of  ter minal for  a GSM network ). The ter minal is not allowed to connect to the network.