Вы находитесь на странице: 1из 5

Mobile Communications and Wireless Sensor Networks

Chapter 2
SERVICES IN THE GSM SYSTEM
2.2.THE TERMINAL IN THE GSM NETWORK

Figure 2.1. SIM card and mobile equipment


The GSM network makes the distinction between a subscriber <number> and <identity>.
The Identity IMSI, International Mobile Subscriber Identity, allows the network to contact
a subscriber uniquely.
The User knows only the MSISDN number (Mobile Station ISDN Number), through which
he can be called.
In GSM, every equipment is found using its own identity, the IMEI, International Mobile
Identity.

Figure 2.2. Number and Identity


1

Mobile Communications and Wireless Sensor Networks

2.3.CLASSIFICATION OF SERVICES
The services are organized in ISDN networks in the following way:
Support or bearer services, offering transmission capacity between the interfaces of different
users;
Teleservices containing a communication offer, including terminals and subsequent
applications;
Auxiliary services composed of all usage facilities that are offered to complete the previous
services.

Figure 2.3.Bearer service and teleservices


2.4.BEARER SERVICES
Service Type

Transfer
3.1 kHz
3.1 kHz
3.1 kHz

Data circuit
UDI
UDI

Flow

Access Type

Module

Comments

300, 1200, 2400 , Asyncronous


or 9600 bits/s.
1200, 2400, 4800 ,
Syncronous
or 9600 bits/s.
BS MS: 1200 bits/s
MS BS: 75 bits/s Asyncronous

T or
NT
T or
NT
T or
NT

V.21, V22bis
V.26 and V.32
V.22, V22bis
V.26 and V.32
Call
from
mobile
V.23.

300, 1200, 2400 ,


or 9600 bits/s.
Asyncronous
BS MS: 1200 bits/s
MS BS: 75 bits/s Asyncronous

T or
NT
T or
NT

Call
mobile

from

Mobile Communications and Wireless Sensor Networks

UDI

Service Type
Syncronous
Access to the
Data
Network
Asyncronous
Access to the
Data
Network

UDI
(PAD)
Transfer

1200, 2400, 4800 ,


Syncronous
or 9600 bits/s.
300, 1200, 2400 ,
or 9600 bits/s.
Asyncronous
Flow
Access Type

UDI
(PAD)

MS: 1200 bits/s


BS: 75 bits/s

UDI
(Package)

2400, 4800 or
9600 bits/s

T or
NT
T or
NT
Module

Comments
Call
mobile

from

Asyncronous

T or
NT

Syncronous

NT

Call
mobile

from

Figure 2.5. List of bearer services .


T: transparent module; NT: non-transparent module (RLP protocol).
UDI: end-to-end numeric transfer 3,1 kHz : analog conversion tranfer.
PAD: pass through the package assembler/disassembler.
2.5. Teleservices
Class
Name
Norm
Abbreviation
Voice
Voice call
Voice call
Transmission Emergency call
Emergency call
Short messages to mobile, point to Short messages to mobile SM MT/PP
point
terminal/ Point to point
Short
Short messages from mobile, point to Short messages with origin SM MO/PP
Messages
point
mobile terminal/ Point to
point
Broadcast short messages (to mobile)
Short messages
Alternated
voice/fax
transmission Alternated voice and fax
Fax
group 3 (transparent and non- group 3
transparent)
Automated fax transmission group 3 Automated fax (group 3)
(transparent and non-transparent)
Figure 2.6.List of teleservices.
2.6. Auxiliary services
Auxiliary GSM services offer a number of improvements for the teleservices and bearer
services. They represent the auxiliary services defined for ISDN, that are largely available on RTC.

Mobile Communications and Wireless Sensor Networks

There are two categories of auxiliary services, the essential ones ,that can be offered on all PLMNs,
and the additional ones, that are available only on a national scale and are the subject of bilateral
agreements between service providers, for the purpose of expanding availability [GSM 02.04].
Service Type
Calling Line Identification

Call Forwarding

Call Waiting
Conference Call
Charging

Call Barring

Norm
Calling Line Identification Presentation
Calling Line Identification Restriction
Connected Line Identification Presentation
Connected Line Identification Restriction
Call Forwarding Unconditional
Call Forwarding on Mobile Subscriber Busy
Call Forwarding on No Reply
Call Forwarding on Mobile Subscriber Not
Rechable
Call Waiting
Call Hold
Multi-Party Service
Closed User Group
Advice of Charge (Information)
Advice of Charge (Charging)
Barring of All Outgoing Calls
Barring of Outgoing International Calls
Barring of Outgoing International Calls except
those directed to the Home PLMN country
Barring of All Incoming Calls
Barring of All Incoming Calls when Roaming
outside the Home PLMN Country
Figure 2.7. List of auxiliary services

Abbreviation
CLIP
CLIR
CoLP
CoLR
CFU
CFB
CNFRy
CNFRc
CW
HOLD
MPTY
CUG
AoCI
AoCC
BAOC
BOIC
BOIC-exHC
BAIC
BIC-Roam

2.7.Main Security Functions in GSM


The encoding algorithm starts at the point of signalling transfer, in order to prevent a third party
listening on the radio channel to decode the called telephone number and listen to the conversation.
To make tracking the route of a subscriber impossible, the service provider has the possibility of
allocating dynamically a temporary identity called TMSI, (Temporary Mobile Subscriber Identity).
This identity is chosen through the network, and is transmitted to the mobile device in encoded
form. It is then used in the network for every transaction. It can be changede after one or more uses,
depending on the service provider.

Mobile Communications and Wireless Sensor Networks

The service provider is protected against fraudulent use of the network by using a secret key stored
in the SIM card. The presence of this key is verified depending on the service providers choice, at
every transaction or every call. If the key is not found, usage of the terminal becomes impossible.

Вам также может понравиться