The Evolution of Mobile Telephone Systems
The Evolution of Mobile Telephone Systems
The Evolution of Mobile Telephone Systems
Cellular is one of the fastest growing and most demanding telecommunications applications. Today, it represents a continuously increasing percentage of all new telephone subscriptions around the world. Currently there are more than 45 million cellular subscribers worldwide, and nearly 50 percent of those subscribers are located in the United States. It is forecasted that cellular systems using a digital technology will become the universal method of telecommunications. By the year 2005, forecasters predict that there will be more than 100 million cellular subscribers worldwide. It has even been estimated that some countries may have more mobile phones than fixed phones by the year 2000.
The concept of cellular service is the use of low-power transmitters where frequencies can be reused within a geographic area. The idea of cell-based mobile radio service was formulated in the United States at Bell Labs in the early 1970s. However, the Nordic countries were the first to introduce cellular services for commercial use with the introduction of the Nordic Mobile Telephone (NMT) in 1981.Cellular systems began in the United States with the release of the advanced mobile phone service (AMPS) system in 1983. The AMPS standard was adopted by Asia, Latin America, and Oceanic countries, creating the largest potential market in the world for cellular. In the early 1980s, most mobile telephone systems were analog rather than digital, like today's newer systems. One challenge facing analog systems was the inability to handle the growing capacity needs in a cost-efficient manner. As a result, digital
technology was welcomed. The advantages of digital systems over analog systems include ease of signaling, lower levels of interference, integration of transmission and switching, and increased ability to meet capacity demands. Table 1 charts the worldwide development of mobile telephone systems.
Institute) simultaneous introduction of essential services in three phases (1991,1994, 1996) by the European telecommunication administrations(Germany: D1 and D2) seamless roaming within Europe possible
today many providers all over the world use GSM (more than 200 countries in
more than 1.2 billion subscribers in more than 630 networks more than 75% of all digital mobile phones use GSM (74% total) over 200 million SMS per month in Germany, > 550 billion/year worldwide(> 10% of the revenues for many operators)
Teleservices
Regular telephony, emergency calls, and voice messaging are within TS. Telephony, the old bidirectional speech calls, is certainly the most popular of all services. An emergency call is a feature that allows the mobile subscriber to contact a nearby emergency service, such as police, by dialing a unique number. Voice messaging permits a message to be stored within the voice mailbox of the called party either because the called party is not reachable or because the calling party chooses to do so.
Additional services Non-Voice-Teleservices group 3 fax voice mailbox (implemented in the fixed network supporting the mobile terminals) electronic mail (MHS, Message Handling System, implemented in the fixed network) Short Message Service (SMS) alphanumeric data transmission to/from the mobile terminal (160 characters) using the signaling channel, thus allowing simultaneous use of basic services and SMS
Bearer Services
Data services, short message service (SMS), cell broadcast, and local features are within BS. Rates up to 9.6 kbit/s are supported. With a suitable data terminal or computer connected directly to the mobile apparatus, data may be sent through circuit-switched or packet-switched networks. Short messages containing as many as 160 alphanumeric characters can be transmitted to or from a mobile phone. In this case, a message center is necessary. The broadcast mode (to all subscribers) in a given geographic area may also be used for short messages of up to 93 alphanumeric characters. Some local features of the mobile terminal may be used. These may include, for example, abbreviated dialing, edition of short messages, repetition of failed calls, and others. data service (circuit switched) synchronous: 2.4, 4.8 or 9.6 kbit/s asynchronous: 300 - 1200 bit/s data service (packet switched) synchronous: 2.4, 4.8 or 9.6 kbit/s asynchronous: 300 - 9600 bit/s
Supplementary Services
Some of the SS are as follows:
1. Advice of charge - This SS details the cost of a call in progress.
2. Barring of all outgoing calls - This SS blocks outgoing calls. 3. Barring of international calls - This SS blocks incoming or outgoing international
calls as a whole or only those associated with a specific basic service, as desired. 4. Barring of roaming calls - This SS blocks all the incoming roaming calls or only those associated with a specific service. 5. Call forwarding - This SS forwards all incoming calls, or only those associated with a specific basic service, to another directory number. The forwarding may be unconditional or may be performed when the mobile subscriber is busy, when there is no reply, when the mobile subscriber is not reachable, or when there is radio congestion. 6. Call hold - This SS allows interruption of a communication on an existing call. Subsequent reestablishment of the call is permitted. 7. Call waiting - This SS permits the notification of an incoming call when the mobile subscriber is busy. 8. Call transfer - This SS permits the transference of an established incoming or outgoing call to a third party. 9. Completion of calls to busy subscribers. This SS allows notification of when a busy called subscriber becomes free. At this time, if desired, the call is reinitiated. 10. Closed user group - This SS allows a group of subscribers to communicate only among themselves. 11. Calling number identification presentation/restriction - This SS permits the presentation or restricts the presentation of the calling partys identification number (or additional address information). 12. Connected number identification presentation - This SS indicates the phone number that has been reached. 13. Freephone service - This SS allocates a number to a mobile subscriber, and all calls to that number are free of charge for the calling party. 14. Malicious call identification - This SS permits the registration of malicious, nuisance, and obscene incoming calls. 15. Three-party service - This SS permits the establishment of conference calls.
The carriers are then divided in time, using a TDMA scheme. This enables the different users of the single radio frequency channel to be allocated different times slots. They are then able to use the same RF channel without mutual interference. The slot is then the time that is allocated to the particular user, and the GSM burst is the transmission that is made in this time. Each GSM slot, and hence each GSM burst lasts for 0.577 mS (15/26 mS). Eight of these burst periods are grouped into what is known as a TDMA frame. This lasts for approximately 4.615 ms (i.e.120/26 ms) and it forms the basic unit for the definition of logical channels. One physical channel is one burst period allocated in each TDMA frame. There are different types of frame that are transmitted to carry different data, and also the frames are organised into what are termed multiframes and superframes to provide overall synchronisation.
GSM burst
The GSM burst, or transmission can fulfil a variety of functions. Some GSM bursts are used for carrying data while others are used for control information. As a result of this a number of different types of GSM burst are defined.
Normal burst uplink and downlink Synchronisation burst downlink Frequency correction burst downlink Random Access (Shortened Burst) uplink
3. 4.
5. 6. 7.
8.
These tail bits at the start of the GSM burst give time for the transmitter to ramp up its power 57 data bits: This block of data is used to carry information, and most often contains the digitised voice data although on occasions it may be replaced with signalling information in the form of the Fast Associated Control CHannel (FACCH). The type of data is indicated by the flag that follows the data field 1 bit flag: This bit within the GSM burst indicates the type of data in the previous field. 26 bits training sequence: This training sequence is used as a timing reference and for equalisation. There is a total of eight different bit sequences that may be used, each 26 bits long. The same sequence is used in each GSM slot, but nearby base stations using the same radio frequency channels will use different ones, and this enables the mobile to differentiate between the various cells using the same frequency. 1 bit flag Again this flag indicates the type of data in the data field. 57 data bits Again, this block of data within the GSM burst is used for carrying data. 3 tail bits These final bits within the GSM burst are used to enable the transmitter power to ramp down. They are often called final tail bits, or just tail bits. 8.25 bits guard time At the end of the GSM burst there is a guard period. This is introduced to prevent transmitted bursts from different mobiles overlapping. As a result of their differing distances from the base station.
1. 3 tail bits: 2. 3. 4. 5. 6.
Again, these tail bits at the start of the GSM burst give time for the transmitter to ramp up its power 39 bits of information: 64 bits of a Long Training Sequence: 39 bits Information: 3 tail bits Again these are to enable the transmitter power to ramp down. 8.25 bits guard time: to act as a guard interval.
Again, these tail bits at the start of the GSM burst give time for the transmitter to ramp up its power. 2. 142 bits all set to zero: 3. 3 tail bits Again these are to enable the transmitter power to ramp down. 4. 8.25 bits guard time: to act as a guard interval.
The increased number of tail bits is included to provide additional margin when accessing the network. 41 training bits: 36 data bits: 3 tail bits Again these are to enable the transmitter power to ramp down. 69.25 bits guard time: The additional guard time, filling the remaining time of the GSM burst provides for large timing differences.
The basic GSM frame defines the structure upon which all the timing and structure of the GSM messaging and signalling is based. The fundamental unit of time is called a burst period and it lasts for approximately 0.577 ms (15/26 ms). Eight of these burst periods are grouped into what is known as a TDMA frame. This lasts for approximately 4.615 ms (i.e.120/26 ms) and it forms the basic unit for the definition of logical channels. One physical channel is one burst period allocated in each TDMA frame. In simplified terms the base station transmits two types of channel, namely traffic and control. Accordingly the channel structure is organised into two different types of
frame, one for the traffic on the main traffic carrier frequency, and the other for the control on the beacon frequency.
GSM multiframe
The GSM frames are grouped together to form multiframes and in this way it is possible to establish a time schedule for their operation and the network can be synchronised. There are several GSM multiframe structures:
Traffic multiframe: The Traffic Channel frames are organised into multiframes consisting of 26 bursts and taking 120 ms. In a traffic multiframe, 24 bursts are used for traffic. These are numbered 0 to 11 and 13 to 24. One of the remaining bursts is then used to accommodate the SACCH, the remaining frame remaining free. The actual position used alternates between position 12 and 25. Control multiframe: the Control Channel multiframe that comprises 51 bursts and occupies 235.4 ms. This always occurs on the beacon frequency in time slot zero and it may also occur within slots 2, 4 and 6 of the beacon frequency as well. This multiframe is subdivided into logical channels which are timescheduled. These logical channels and functions include the following: Frequency correction burst Synchronisation burst Broadcast channel (BCH) Paging and Access Grant Channel (PACCH) Stand Alone Dedicated Control Channel (SDCCH)
GSM Superframe
Multiframes are then constructed into superframes taking 6.12 seconds. These consist of 51 traffic multiframes or 26 control multiframes. As the traffic multiframes are 26 bursts long and the control multiframes are 51 bursts long, the different number of traffic and control multiframes within the superframe, brings them back into line again taking exactly the same interval.
GSM Hyperframe
Above this 2048 superframes (i.e. 2 to the power 11) are grouped to form one hyperframe which repeats every 3 hours 28 minutes 53.76 seconds. It is the largest time interval within the GSM frame structure. Within the GSM hyperframe there is a counter and every time slot has a unique sequential number comprising the frame number and time slot number. This is used to maintain synchronisation of the different scheduled operations with the GSM frame structure. These include functions such as:
Frequency hopping: Frequency hopping is a feature that is optional within the GSM system. It can help reduce interference and fading issues, but for it to work, the transmitter and receiver must be synchronised so they hop to the same frequencies at the same time. Encryption: The encryption process is synchronised over the GSM hyperframe period where a counter is used and the encryption process will repeat with each hyperframe. However, it is unlikely that the cellphone conversation will be over 3 hours and accordingly it is unlikely that security will be compromised as a result.
SACCHt - TCH in-band signalling, e.g. for link monitoring. SDCCH - For signalling exchanges, e.g. during call setup, registration / location updates. FACCHs - FACCH for the SDCCH. The SDCCH burst is stolen for a full signalling burst. Function not clear in the present version of GSM (could be used for e.g. handover of an eight-rate channel, i.e. using a "SDCCH-like" channel for other purposes than signalling). SACCHs - SDCCH in-band signalling, e.g. for link monitoring.
The features of cellular networks are as follows : segmentation of the area into cells
use of several carrier frequencies not the same frequency in adjoining cells cell sizes vary from some 100 m up to 35 km depending on user density, geography, transceiver power etc. hexagonal shape of cells is idealized (cells overlap) if a mobile user changes cells: handover of the connection to the neighbor cell
Signal propagation ranges: Frequency reuse only with a certain distance between the base stations
A GSM network is a public land mobile network (PLMN). Other types of PLMN are the time division multiple access (TDMA) network or code division multiple access (CDMA) network. GSM uses the following sub-division of the PLMN: Home PLMN (HPLMN) the HPLMN is the GSM network that a GSM user is a subscriber of. That implies that GSM users subscription data resides in the HLR in that PLMN. The HLR may transfer the subscription data to a VLR (during registration in a PLMN) or a GMSC (during mobile terminating call handling). The HPLMN may also contain various service nodes, such as a short message service centre (SMSC), service control point (SCP), etc. Visited PLMN (VPLMN) the VPLMN is the GSM network where a subscriber is currently registered. The subscriber may be registered in her HPLMN or in another PLMN. In the latter case, the subscriber is outbound roaming (from HPLMNs perspective) and inbound roaming (from VPLMNs perspective). When the subscriber is currently registered in her HPLMN, then the HPLMN is at the same time VPLMN.1 Interrogating PLMN (IPLMN) the IPLMN is the PLMN containing the GMSC that handles mobile terminating (MT) calls. MT calls are always handled by a GMSC in the PLMN, regardless of the origin of the call. For most operators, MT call handling is done by a GMSC in the HPLMN;
in that case, the HPLMN is at the same time IPLMN. This implies that calls destined for a GSM subscriber are always routed to the HPLMN of that GSM subscriber. Once the call has arrived in the HPLMN, the HPLMN acts as IPLMN. MT call handling will be described in more detail in subsequent sections. When basic optimal routing (BOR) is applied, the IPLMN is not the same PLMN as the HPLMN.
subsystems
RSS (radio subsystem): covers all radio aspects NSS (network and switching subsystem): call forwarding, handover, switching OSS (operation subsystem): management of the network
Radio subsystem(RSS)
The Base Station System (BSS) All radio-related functions are performed in the BSS, which consists of base station controllers (BSCs) and the base transceiver stations (BTSs). Base station controller (BSC) - The BSC provides all the control functions and physical links between the MSC and BTS. It is a high-capacity switch that provides functions such as handover, cell configuration data, and control of radio frequency (RF) power levels in base transceiver stations. A number of BSCs are served by an MSC.
Base transreceiver station (BTS) - The BTS handles the radio interface to the mobile station. The BTS is the radio equipment (transceivers and antennas) needed to service each cell in the network. A group of BTSs are controlled by a BSC.
Mobile station (MS) The mobile station (MS) comprises all user equipment and software needed for communication with a mobile network.In GSM, the mobile station consists of four main components:
Mobile Termination (MT) - offers common functions of a such as: radio Transmission and handover, speech encoding and decoding, Error detection and correction, signalling and access to the SIM. The IMEI code is attached to the MT. It is equivalent to the network termination of an ISDN access. Terminal Equipment (TE) - is any device connected to the MS offering services to the user. It does not contain any functions specific to GSM. Terminal adapter (TA) - Provides access to the MT as if it was an ISDN network termination with extended capabilities. Communication between the TE and MT over the TA takes place using AT commands. Subscriber Identity Module (SIM) - is a removable subscriber identification token storing the IMSI a unique key shared with the mobile network operator and other data.
phone operators and allows mobile devices to communicate with each other and telephones in the wider Public Switched Telephone Network or (PSTN). The architecture contains specific features and functions which are needed because the phones are not fixed in one location. The NSS originally consisted of the circuit-switched core network, used for traditional GSM services such as voice calls, SMS, and circuit switched data calls. It was extended with an overlay architecture to provide packet-switched data services known as the GPRS core network. This allows mobile phones to have access to services such as WAP, MMS, and Internet access. home location register (HLR) - The HLR is a database used for storage and management of subscriptions. The HLR is considered the most important database, as it stores permanent data about subscribers, including a subscriber's service profile, location information, and activity status. When an individual buys a subscription from one of the PCS operators, he or she is registered in the HLR of that operator.
mobile services switching center (MSC) - The MSC performs the telephony switching functions of the system. It controls calls to and from other telephone and data systems. It also performs such functions as toll ticketing, network interfacing, common channel signaling, and others. visitor location register (VLR) - The VLR is a database that containstemporary information about subscribers that is needed by the MSC in order to service visiting subscribers. The VLR is always integrated with the MSC. When a mobile station roams into a new MSC area, the VLR connected to that MSC will request data about the mobile station from the HLR. Later, if the mobile station makes a call, the VLR will have the information needed for call setup without having to interrogate the HLR each time. Gateway MSC (GMSC) the GMSC is the switching entity that controls mobile terminating calls. When a call is established towards a GSM subscriber, a GMSC contacts the HLR of that subscriber, to obtain the address of the MSC where that subscriber is currently registered. That MSC address is used to route the call to that subscriber.
overview and support the maintenance activities of different operation and maintenance organizations. authentication center (AUC) - A unit called the AUC provides authenticationand encryption parameters that verify the user's identity and ensure the confidentiality of each call. The AUC protects network operators from different types of fraud found in today's cellular world. equipment identity register (EIR) - The EIR is a database that containsinformation about the identity of mobile equipment that prevents calls from stolen, unauthorized, or defective mobile stations. The AUC and EIR are implemented as stand-alone nodes or as a combined AUC/EIR node. operations and maintenance center (OMC) - The operations and maintenance center (OMC) is connected to all equipment in the switching system and to the BSC. The implementation of OMC is called the operation and support system (OSS).Here are some of the OMC functions:
Administration and commercial operation (subscription, end terminals, charging and statistics). Security Management. Network configuration, Operation and Performance Management. Maintenance Tasks.
Following is the figure which shows how OMC system covers all the GSM elements.
GSM SPECIFICATIONS
Before looking at the GSM specifications, it is important to understand the following basic terms:
bandwidth - the range of a channel's limits; the broader the bandwidth, the faster data can be sent
fbits per second (bps) - a single on-off pulse of data; eight bits are equivalent to one byte frequency - the number of cycles per unit of time; frequency is measured in hertz (Hz) kilo (k) - kilo is the designation for 1,000; the abbreviation kbps represents 1,000 bits per second megahertz (MHz) - 1,000,000 hertz (cycles per second) milliseconds (ms) - one-thousandth of a second watt (W) - a measure of power of a transmitter Listed below is a description of the specifications and characteristics for GSM. frequency band - The frequency range specified for GSM is 1,850 to 1,990 MHz (mobile station to base station). duplex distance - The duplex distance is 80 MHz. Duplex distance is the distance between the uplink and downlink frequencies. A channel has two frequencies, 80 MHz apart. channel separation - The separation between adjacent carrier frequencies. In GSM, this is 200 kHz. modulation - Modulation is the process of sending a signal by changing the characteristics of a carrier frequency. This is done in GSM via Gaussian minimum shift keying (GMSK). transmission rate - GSM is a digital system with an over-the-air bit rate of 270 kbps. access method - GSM utilizes the time division multiple access (TDMA) concept. TDMA is a technique in which several different calls may share the same carrier. Each call is assigned a particular time slot. speech coder - GSM uses linear predictive coding (LPC). The purpose of LPC is to reduce the bit rate. The LPC provides parameters for a filter that mimics the vocal tract. The signal passes through this filter, leaving behind a residual signal. Speech is encoded at 13 kbps.
subscriber mobility and for addressing of all the remaining network elements. The most important addresses and identifiers are presented in the following: International Mobile Station Equipment Identity (IMEI): The international mobile station equipment identity (IMEI) uniquely identifies a mobile station internationally. It is a kind of serial number. The IMEI is allocated by the equipment manufacturer and registered by the network operator and registered by the network operator who stores it in the EIR. By means of IMEI one recognizes obsolete, stolen or nonfunctional equipment. There are following parts of an IMEI:
Type Approval Code (TAC): 6 decimal places, centrally assigned. Final Assembly Code (FAC): 2 decimal places, assigned by the manufacturer. Serial Number (SNR): 6 decimal places, assigned by the manufacturer. Spare (SP): 1 decimal place.
Thus, IMEI = TAC + FAC + SNR + SP. It uniquely characterizes a mobile station and gives clues about the manufacturer and the date of manufacturing.
International Mobile Subscriber Identity ( IMSI): The international mobile subscriber identity (IMSI) is embedded on the SIM card and is used to identify a subscriber. The IMSI is also contained in the subscription data in the HLR. The IMSI is used for identifying a subscriber for various processes in the GSM network. Some of these are:
location update when attaching to a network, the MS reports the IMSI to the MSC, which uses the IMSI to derive the global title (GT) of the HLR associated with the subscriber; terminating call when the GSM network handles a call to a GSM subscriber, the HLR uses the IMSI to identify the subscriber in the MSC/VLR, to start a process for delivering the call to that subscriber in that MSC/VLR. roaming charging a VPLMN uses the IMSI to send billing records to the HPLMN of a subscriber.
Mobile Country Code (MCC): 3 decimal places, internationally standardized. Mobile Network Code (MNC): 2 decimal places, for unique identification of mobile network within the country. Mobile Subscriber Identification Number (MSIN): Maximum 10 decimal places, identification number of the subscriber in the home mobile network.
Mobile Subscriber ISDN Number ( MSISDN): The real telephone number of a mobile station is the mobile subscriber ISDN number (MSISDN). It is assigned to the subscriber (his or her SIM, respectively), such that a mobile station set can have several MSISDNs depending on the SIM. The MSISDN categories follow the international ISDN number plan and therefore have the following structure.
country code (CC) the CC identifies the country or group of countries of the subscriber; national destination code (NDC) each PLMN in a country has one or more NDCs allocated to it; the NDC may be used to route a call to the appropriate network; subscriber number (SN) the SN identifies the subscriber within the number plan of a PLMN.
Mobile Station Roaming Number ( MSRN): The Mobile Station Roaming Number ( MSRN) is a temporary location dependent ISDN number. It is assigned by the locally responsible VLR to each mobile station in its area. Calls are also routed to the MS by using the MSRN. The MSRN has same structure as the MSISDN.
National Destination Code (NDC): of the visited network. Subscriber Number (SN): in the current mobile network.
Location Area Identity (LAI): Each LA of an PLMN has its own identifier. The Location Area Identifier (LAI) is also structured hierarchically and internationally unique as follows:
Country Code (CC) : 3 decimal places. Mobile Network Code (MNC): 2 decimal places. Location Area Code (LAC): maximum 5 decimal places or, maximum twice 8 bits coded in hexadecimal (LAC < FFFF).
Temporary Mobile Subscriber Identity (TMSI): The VLR, which is responsible for the current location of a subscriber, can assign a temporary mobile subscriber identity (TMSI) which has only local significance in the area handled by the VLR. It is stored on the network side only in the VLR and is not passed to the HLR.Together with the current location area, TMSI allows a subscriber to be identified uniquely and it can consist of upto 4x8 bits. Local Mobile Subscriber Identity (LMSI): The VLR can assign an additional searching key to each mobile station within its area to accelerate database access. This unique key is called the Local Mobile Subscriber Identity (LMSI). The LMSI is assigned when the mobile station registers with the VLR and is also sent to the HLR.An LIMSI consists of four octets ( 4 x 8 bits).
Cell Identifier (CI): Within an LA, the individual cells are uniquely identified with a cell identifier (CI), maximum 2 x 8 bits. Together with the global cell identity (LAI + CI) calls are thus also internationally defined in a unique way.
GSM - Operations
The operation of the GSM system can be understood by studying the sequence of events that takes place when a call is initiated from the Mobile Station.
Call from Mobile Phone to PSTN (MOT) When a mobile subscriber makes a call to a PSTN telephone subscriber, the following sequence of events takes place: 1. The MSC/VLR receives the message of a call request. 2. The MSC/VLR checks if the mobile station is authorized to access the network. If so, the mobile station is activated. If the mobile station is not authorized, service will be denied. 3. MSC/VLR analyzes the number and initiates a call setup with the PSTN. 4. MSC/VLR asks the corresponding BSC to allocate a traffic channel (a radio channel and a time slot). 5. The BSC allocates the traffic channel and passes the information to the mobile station. 6. The called party answers the call and the conversation takes place. 7. The mobile station keeps on taking measurements of the radio channels in the present cell and neighboring cells and passes the information to the BSC. The BSC decides if handover is required, if so, a new traffic channel is allocated to the mobile station and the handover is performed. If handover is not required, the mobile station continues to transmit in the same frequency.
Call from PSTN to Mobile Phone (MTC) When a PSTN subscriber calls a mobile station, the sequence of events is as follows: 1. The Gateway MSC receives the call and queries the HLR for the information needed to route the call to the serving MSC/VLR. 2. The GMSC routes the call to the MSC/VLR. 3. The MSC checks the VLR for the location area of the MS. 4. The MSC contacts the MS via the BSC through a broadcast message, that is, through a paging request. 5. The MS responds to the page request.
6. The BSC allocates a traffic channel and sends a message to the MS to tune to the channel. The MS generates a ringing signal and, after the subscriber answers, the speech connection is established. 7. Handover, if required, takes place, as discussed in the earlier case.
MS Protocols
The signaling protocol in GSM is structured into three general layers, depending on the interface.
Layer 1: The physical layer, which uses the channel structures over the air interface. Layer 2: The data-link layer. Across the Um interface, the data-link layer is a modified version of the Link access protocol for the D channel (LAP-D) protocol used in ISDN, called Link access protocol on the Dm channel (LAP-Dm). Across the A interface, the Message Transfer Part (MTP), Layer 2 of SS7 is used. Layer 3: The third layer of the GSM signaling protocol is divided into three sublayers: o Radio Resource management (RR) o Mobility Management (MM) and o Connection Management (CM).
BSC Protocols
After the information is passed from the BTS to the BSC, a different set of interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio
resources at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management (BTSM). The BTS management layer is a relay function at the BTS to the BSC. The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS and the BTS. These services include controlling the initial access to the system, paging for MT calls, the handover of calls between cell sites, power control, and call termination. The RR protocols provide the procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some radio resource management in place for the frequency coordination, frequency allocation, and the management of the overall network layer for the Layer 2 interfaces. From the BSC, the relay is using SS7 protocols so the MTP 1-3 is used as the underlying architecture, and the BSS mobile application part or the direct application part is used to communicate from the BSC to the MSC.
MSC Protocols
At the MSC, the information is mapped across the A interface to the MTP Layers 1 through 3 from the BSC. Here the equivalent set of radio resources is called the BSS MAP. The BSS MAP/DTAP and the MM and CM are at the upper layers of Layer 3 protocols. This completes the relay process. Through the control-signaling network, the MSCs interact to locate and connect to users throughout the network. Location registers are included in the MSC databases to assist in the role of determining how and whether connections are to be made to roaming users. Each user of a GSM MS is assigned a HLR that is used to contain the user's location and subscribed services. A separate register, the VLR, is used to track the location of a user. As the users roam out of the area covered by the HLR, the MS notifies a new VLR of its whereabouts. The VLR in turn uses the control network (which happens to be based on SS7) to signal the HLR of the MS's new location. Through this information, MT calls can be routed to the user by the location information contained in the user's HLR.
calls rises, customer dissatisfaction increases and they are likely to change to another network. Accordingly GSM handover was an area to which particular attention was paid when developing the standard.
Handover decisions
Intra-BTS handover: This form of GSM handover occurs if it is required to change the frequency or slot being used by a mobile because of interference, or other reasons. In this form of GSM handover, the mobile remains attached to the same base station transceiver, but changes the channel or slot. Inter-BTS Intra BSC handover: This for of GSM handover or GSM handoff occurs when the mobile moves out of the coverage area of one BTS but into another controlled by the same BSC. In this instance the BSC is able to perform the handover and it assigns a new channel and slot to the mobile, before releasing the old BTS from communicating with the mobile. Inter-BSC handover: When the mobile moves out of the range of cells controlled by one BSC, a more involved form of handover has to be performed, handing over not only from one BTS to another but one BSC to another. For this the handover is controlled by the MSC. Inter-MSC handover: This form of handover occurs when changing between networks. The two MSCs involved negotiate to control the handover.
Types of handover
Old and new BTSs synchronised: In this case the mobile is given details of the new physical channel in the neighbouring cell and handed directly over. The mobile may optionally transmit four access bursts. These are shorter than the standard bursts and thereby any effects of poor synchronisation do not cause
overlap with other bursts. However in this instance where synchronisation is already good, these bursts are only used to provide a fine adjustment.
Time offset between synchronised old and new BTS: In some instances there may be a time offset between the old and new BTS. In this case, the time offset is provided so that the mobile can make the adjustment. The GSM handover then takes place as a standard synchronised handover.
Non-synchronised handover: When a non-synchronised cell handover takes place, the mobile transmits 64 access bursts on the new channel. This enables the base station to determine and adjust the timing for the mobile so that it can suitably access the new BTS. This enables the mobile to re-establish the connection through the new BTS with the correct timing.
Handover procedure
Inter-system handover
With the evolution of standards and the migration of GSM to other 2G technologies including to 3G UMTS / WCDMA as well as HSPA and then LTE, there is the need to handover from one technology to another. Often the 2G GSM coverage will be better then the others and GSM is often used as the fallback. When handovers of this nature are required, it is considerably more complicated than a straightforward only GSM handover because they require two technically very different systems to handle the handover. These handovers may be called intersystem handovers or inter-RAT handovers as the handover occurs between different radio access technologies. The most common form of intersystem handover is between GSM and UMTS / WCDMA. Here there are two different types:
UMTS / WCDMA to GSM handover: There are two further divisions of this category of handover: o Blind handover: This form of handover occurs when the base station hands off the mobile by passing it the details of the new cell to the mobile without linking to it and setting the timing, etc of the mobile for the new cell. In this mode, the network selects what it believes to be the optimum GSM based station. The mobile first locates the broadcast channel of the new cell, gains timing synchronisation and then carries out nonsynchronised intercell handover. o Compressed mode handover: using this form of handover the mobile uses the gaps I transmission that occur to analyse the reception of local GSM base stations using the neighbour list to select suitable candidate base stations. Having selected a suitable base station the handover takes place, again without any time synchronisation having occurred. Handover from GSM to UMTS / WCDMA: This form of handover is supported within GSM and a "neighbour list" was established to enable this occur easily. As the GSM / 2G network is normally more extensive than the 3G network, this type of handover does not normally occur when the mobile leaves a coverage area and must quickly find a new base station to maintain contact. The handover from GSM to UMTS occurs to provide an improvement in performance and can normally take place only when the conditions are right. The neighbour list will inform the mobile when this may happen.
Note that the individual subscriber authentication key (Ki) is never transmitted over the radio channel. It is present in the subscriber's SIM, as well as the AUC, HLR, and VLR databases as previously described. If the received SRES agrees with the calculated value, the MS has been successfully authenticated and may continue. If the values do not match, the connection is terminated and an authentication failure indicated to the MS. The calculation of the signed response is processed within the SIM. This provides enhanced security, because the confidential subscriber information such as the IMSI or the individual subscriber authentication key (Ki) is never released from the SIM during the authentication process.
Authentication in GSM
key-stream. The A5 algorithm used to encrypt the data is initialized with the KC and the number of the frame to be encrypted, thus generating a different key stream for every frame. The same KC is used as long as the MSC does not authenticate the MS again, in which case a new KC is generated. In practice, the same KC may be in use for days. The MS authentication is an optional procedure in the beginning of a call, but it is usually not performed. So it is very common the KC will not change during calls. When it is switched off , the mobile station stores the TMSI on the SIM card to make sure it is available when it is switched on again .The A5 algorithm is implemented in the hardware of the mobile phone, as it has to encrypt and decrypt data on the fly.
Difficult to upgrade the cryptographic mechanisms Lack of user visibility (e.g. doesnt know if encrypted or not) The flaw of the algorithms.
which is discussed above. This solution is easy to be implemented because the network operators can make the changes themselves and do not need the support of hardware or software manufacturers or the GSM Consortium. There is now a new algorithms available called COMP128-2. The operator can employ a new A5 implementation with strong encryption too. A new A5/3 algorithm has also been agreed upon to replace the aging A5/2 algorithm[7]. This improvement would require the co-operation of the hardware and software manufacturers because they will have to release new versions of their software and hardware that would comprise with the new algorithm. Third solution would be to encrypt the traffic on the operators backbone network between the network components. This would disable the attacker from wire tapping the backbone network. This solution could probably also be implemented without the blessings of the GSM Consortium, but the co-operation of the hardware manufacturers would still be required.
What is Next?
To enhance the current data capabilities of GSM, operators and infrastructure providers have specified new extensions to GSM Phase II. These extensions are:
High Speed Circuit Switched Data (HSCSD): by using several circuit channels.
General Packet Radio Service (GPRS) to provide packet radio access to external packet data networks (such as X.25 or Internet)
Enhanced Data rate for GSM Evolution (EDGE): using a new modulation scheme to provide up to three times higher throughput (for HSCSD and GPRS)
Universal Mobile Telecommunication System (UMTS): a new wireless technology using new infrastructure deployment.
Conclusion
Global System for Mobile communications (GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 82% of the global mobile market uses the standard GSM is used by over 2 billion people across more than 212 countries and territories. Its ubiquity makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs from its predecessors in that both signaling and speech channels are digital call quality, and so is considered a second generation (2G) mobile phone system. This has also meant that data communication were built into the system using the 3rd Generation Partnership Project (3GPP)The GSM logo is used to identify compatible handsets and equipment . The key advantage of GSM systems to consumers has been better voice quality and low-cost alternatives to making calls, such as the Short message service (SMS, also called "text messaging"). The advantage for network operators has been the ease of deploying equipment from any vendors that implement the standard. Like other cellular standards, GSM allows network operators to offer roaming services so that subscribers can use their phones on GSM networks all over the world. Newer versions of the standard were backward-compatible with the original GSM phones. For example, Release ''97 of the standard added packet data capabilities, by means of General Packet Radio Service (GPRS). Release ''99 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).