Академический Документы
Профессиональный Документы
Культура Документы
Unit 7
Unit 7
Structure:
7.1 Introduction
7.2 GSM System Operations
Mobile Telephone Initialization
7.3 Traffic Cases in GSM Network
The Mobile Station is in idle mode
Roaming in the Network
The mobile station is in active mode
7.4 Handover in GSM Network
7.5 Summary
7.6 Answers
7.1 Introduction
In unit 6 you have learnt the process of data transmission in GSM network in
TDMA format. The discussion of time division multiple access (TDMA) frame
hierarchy used in GSM network is discussed. You have also learnt the use
of channels in GSM network for transmitting managerial information and
data traffic. It is seen how various identifiers in the GSM network facilitate
the roaming of subscribers without any difficulty to locate and identify them.
In this unit you will learn system operations of GSM network in order to
provide services to GSM subscribers. The issues and challenges faced by
any mobile network to support mobility are discussed with respect to GSM
network. The methods adopted by the GSM network to maintain continuous
conversations on movement are also discussed in this unit. The process of
handover is also discussed at the end of the unit.
Objectives:
After studying this unit, you will be able to:
explain operations supported by GSM network
describe the process of handover
describe various traffic cases
explain security enhancement during conversation between two
subscribers
Wireless Networks
Unit 7
Wireless Networks
Unit 7
Wireless Networks
Unit 7
Wireless Networks
Unit 7
The terminal then sends a setup message. The base station responds with
a call confirmed message followed by an alerting message in which case
the terminal applies the ring-b k
.A
p ys
p
,
the network sends an assignment command message informing the traffic
channel number to be used for the conversation. The subscriber, still on the
SDCCH, responds with an assignment acknowledgment message and
moves to the traffic channel that has been assigned. The network confirms
the acceptance of the call by the other party by means of a connect
acknowledgment message on the FACCH of the assigned TCH. And the
conversation proceeds on the TCH.
Transferring Calls Between Call Sites is the process of identifying when
a connection should be transferred to another cell site and coordinating the
handover process.
Mobile Assisted Handoff is the process of transferring information (such
as RF signal quality) from the mobile device to the system which can be
used to assist in the transfer process.
Receiving a Call on a Mobile Telephone is the process of alerting a
mobile device that an incoming call is waiting to be answered and
connecting the audio path if the mobile user answers the call. The call is
also switched from signaling to voice.
Conversation Mode is the process of maintaining an audio connection
with a user during a call. MSC informs the BSS about the allocated voice
circuit.
Connected Mode is the process of maintaining the availability of a device
that is transferring bursts of data (packet data) on the network.
Authentication is the validation of the identity of the device through the
use of security processes and secret information. An authentication
procedure may be required at the location update procedure or at the
request of a new service. The GSM encryption is shown in the figure 7.2,
authentication procedure starts with the network sending an authentication
request message to the terminal; the message conveys a 128-bit random
number (RAND). The terminal uses the RAND, the secret key, Ki, stored at
SIM, and the encryption algorithm, referred to as A3 (specifies the
confidentiality algorithm), to compute a 32-bit number, referred to as a
Sikkim Manipal University
Wireless Networks
Unit 7
signed response (SRES). Another 64-bit key, the ciphering key, Kc, is
computed using another encryption algorithm, referred to as A8 (specifies
the confidentiality algorithm). The Kc parameter is later used in the ciphering
procedure. After these computations, the terminal responds with an
authentication response message, which contains the SRES. The network
uses the same parameters and the same algorithm to compute another
SRES. The terminal SRES and the network SRES are then compared with
each other. If a match occurs, the network accepts the user as an
authorized subscriber. Otherwise, the authentication is rejected.
Wireless Networks
Unit 7
Wireless Networks
Unit 7
station has changed his location within the same LA and does not need to
inform the network.
Changing Location to different LA under same MSC/VLR: If an MS
detects a change in LAI on the BCCH, it has to update the information
stored in different network elements. On detecting a change in the LA, the
mobile station sends location update information to the concerned VLR. On
receipt of the location update request from the mobile station, the MSC/VLR
s
s
b s f
xs
f
m b s
s f m
. If
the entry if found in the data base then it updates the existing information
with new information received through the location update message,
otherwise a new entry is made in the data base. The following steps are
performed by the MSC/VLR to update the location information of the visitor
mobile station.
1. On entering into a new cell, the mobile station listens to BCCH in the
new cell and determines the LAI. The received LAI information is
compared to the old one. If they differ, the mobile station initiates a
location update procedure.
2. The mobile station uses the SDCCH to establish a connection with the
network. Once the connection is established, it performs authentication
procedure.
3. On successful completion of the authentication, the mobile station sends
a Location Updating Request to the concerned MSC/VLR.
4. The MSC/VLR on receipt of the location update request send an
acknowledgement to mobile station and release the signaling channel.
Changing Location to different LA under different MSC/VLR: When a
mobile station moves to a new LA under different MSC/VLR the location
updating is performed. When the Location Update Request is received by
the new VLR, it executes the procedure as given below.
1. The VLR verify the authenticity of the location update request as a first
step of the location update process. If authentication is successful, the
VLR checks its database to determine whether or not it has a record for
this mobile station.
2. If the VLR do not find any record for the new mobile station, it sends a
qu s
subs b s LR f
py f
mobile stations
subscription information.
Sikkim Manipal University
Wireless Networks
Unit 7
3. The HLR passes the information to the VLR and updates its location
information for the subscriber. The HLR sends a request to the old VLR
to delete the information about the mobile station.
4. The VLR stores its subscription information for the MS including the
latest location and status. The VLR sends acknowledgement to the
mobile station.
Periodic Location Update or Periodic Registration: Apart from the
location update cases discussed above, the mobile station also has to
update its location information with the concerned location registers. If a
mobile station does not perform such periodic location update with the
system, the network marks the mobile station as detached. This may occur
if a station is out of the coverage for long time. Sometimes the network
elements also initiates periodic registration through the BCCH and also
specifies how often periodic registration must be performed. Periodic
registration has an acknowledgment message. The mobile station tries to
register until it receives this message.
Detaching the mobile station from the Network: IMSI detach enables the
mobile station to indicate to the network that it is switched off. At power off,
the mobile station sends an IMSI detach message to the network. On
reception of the detach message, the VLR marks the corresponding IMSI as
detached. The HLR is not informed. No acknowledgement is sent to the
mobile station.
Implicit Detach: Sometimes the mobile station cannot respond to the
explicit IMSI detach process due to poor quality of the radio link. In that case
the system might not be able to be detached from the network. The VLR
then performs an implicit detach procedure to mark the mobile station as
detached from the network.
MS Purging: The VLR stores information regarding the visitor mobile
stations. It is very obvious as due to movement of the mobile station it
changes its VLR from one to another. When a VLR notices that a particular
mobile station is not under its coverage area then it decides to purge the
information from its data base regarding the station. Before purging the
information regarding any mobile station the VLR informs the HLR of the
station that the VLR is about to remove a subscriber record from its own
Sikkim Manipal University
Wireless Networks
Unit 7
database. The HLR then sets the mobile station purged flag and treats the
subscriber as unreachable.
7.3.3 The mobile station is in active mode
If a mobile station is not in idle mode then it may have any ongoing
conversation. In this case the mobile station is said to be in active state.
When it is in active state, it may be engaged in a call, or may be in a state of
call setup process. Based on these scenarios the following traffic cases are
described for active mode of a mobile station.
Call from a mobile station: The first traffic case in the active mode of the
mobile station is considered where the mobile station is making a phone call
to a PSTN subscriber. In order to initiate a call the mobile station performs
the following procedure stepwise:
1. It (the mobile station) uses the RACH to request a signaling channel for
the base station.
2. The BSC on request and availability allocates a signaling channel to the
mobile station using AGCH.
3. The station then sends a call setup request using SDCCH to the MSC or
VLR.
4. The MSC/VLR instructs the BSC to allocate an idle TCH. The mobile
station is informed to tune to the TCH allocated by the BSC.
5. The MSC/VLR forwards the dialed number to the concerned exchange
in the PSTN, which establishes a connection to the subscriber.
6. If the PSTN subscriber answers, the connection is established.
Call to a mobile station: The second traffic case in active mode of the
mobile station is calling a mobile station by a PSTN subscriber. The major
difference between the first and the second case is that, in a call to a mobile
station the exact location of the mobile subscriber is not known at the time of
requesting the call setup. So, the mobile station needs to be searched using
paging before a connection can be established. Below is the procedure that
is been followed by different components of the network to complete a call
from the PSTN subscriber to a mobile station.
1. The PSTN subscriber dials the mobile telephone number using Mobile
Station ISDN number (MSISDN). A connection request is made to the
mobile stations home GMSC (Gateway Mobile Switching Centre).
Sikkim Manipal University
Wireless Networks
Unit 7
2. The home GMSC finds the respective HLR of the called mobile station
and sends a query to the HLR for information about the serving
MSC/VLR of the called mobile station.
3. The HLR translates MSISDN into IMSI, and determines which
MSC/VLR is currently serving the MS.
4. The HLR requests a Mobile Subscriber Roaming Number (MSRN) from
the serving MSC/VLR of the called mobile station.
5. The MSC/VLR returns an MSRN via HLR to the GMSC.
6. The GMSC routes the call to the concerned MSC/VLR.
7. The MSC/VLR searches its record to find the current LA of the mobile
station and a paging message is sent to the BSC of the controlling the
LA.
8. The B
Wireless Networks
Unit 7
7. The mobile station sends a call setup request using __________ to the
MSC or VLR.
8. The PSTN subscriber dials the mobile telephone number using
MSISDN. (True/False)
Wireless Networks
Unit 7
cell and initiates a call setup, it can be transferred to a nearby cell with less
traffic. Provided an acceptable connection quality is likely to be obtained in
the new cell. Such forced handover is also noticed in during the
maintenance process of the network. In such situation all channels are
released from traffic if required. There are several types of handover found
in GSM network. These handovers are classified as handover takes place
between two cells controlled by the same BSC or handover between two
cells con
by ff
B s, bu the under same MSC/VLR or
Handover between cells controlled by different MSC/VLRs. There exist a
special handover called intra-Cell Handover exists in GSM network. It
occurs when the BSC detects that the quality of the channel currently
connecting the mobile station is too low, but there is no indication of any
existing nearby cell with sufficiently strong signal. In that case the BSC
selects another channel in the same cell with better signal quality, and the
mobile station is ordered to retune to the new channel. A brief description of
various handover processes are discussed below. In each case it is
assumed that the decision to perform a handover has already been made
and a target cell has been identified.
Handover between two cells of the same BSC: To perform a handover
between two cells of the same BSC, the MSC/VLR is not involved in the
process. However, they are informed that the handover has taken place. If
v
v v s ff
LAs,
up e is performed after
completion of the ongoing call. To complete the handover process the
following steps are carried out.
1. The BSC instructs the new RBS to activate a TCH.
2. The BSC sends a message to the mobile station to the old RBS using
FACCH. The message contains information about the frequency and
time slot to be used by the mobile station.
3. On receipt of the message the mobile station tunes to the new
frequency, and transmits handover access bursts in the allotted time
slot.
4. When the new RBS detects the handover bursts, it sends information
about TA via FACCH.
5. The mobile station sends a Handover Complete message to the BSC
through the new RBS.
6. The BSC informs the old RBS to release the old TCH.
Sikkim Manipal University
Wireless Networks
Unit 7
Wireless Networks
Unit 7
Handover between
s
by ff
M s: The procedure to
perform handover is given below, and shown in the figure 7.4.
1. The current BSC of the mobile station sends a Handover required
message to the serving MSC along with the identity of the target cell to
which the mobile station to be handed over.
2. MSC identifies the MSC of target cell communicated through the
Handover required sends a handover initiation request.
3. The new MSC allocates a handover number to reroute the call and send
a Handover Request new BSC of the new MSC.
4. The new BSC instructs the target RBS to activate a TCH.
5. The old MSC on receipt of the information passes it on to old MSC
together with the handover number.
6. A link is established to new MSC.
7. The old MSC sends a handover command to the mobile station via the
old BSC.
8. The mobile station tunes to the new frequency and transmits handover
access bursts in the allotted time slot.
Wireless Networks
Unit 7
11. This type of handover where the mobile station takes the initiative to
perform a handover is called _________ ____________.
12.
13. When the new RBS detects the handover bursts, it sends information
about TA via FACCH. (True/False)
14. When a mobile station is about to go to the idle state then it executes
an IMSI attach procedure. (True/False)
15. The _____________ store the information of all visitor nodes in a
location area.
7.6 Summary
We have discussed the GSM system operations and different traffic cases in
this unit. To support users in GSM network the system components has to
perform various tasks. The device and call initialization, connection
management, and ending a call are main operations performed by a GSM
network. Due to the movement of user in the network, the subscriber
changes their locations vary frequently. This change of location during an
ongoing call is called handover. Maintaining a uninterrupted call during
handover is a challenging task in mobile network. To accomplish this task
the network maintains the location information of the entire subscriber in the
network. Various traffic cases leads to update different levels of registers
maintained by the GSM system. Describe various traffic cases.
Authenticating a subscriber before providing a GSM service to it is another
essential task carried out by the network. Along with the identity verification,
Sikkim Manipal University
Wireless Networks
Unit 7
the system also checks the authorized services for the subscriber before
serving any mobile user.
7.7 Answers
Self Assessment Questions
1. True
2. The VLR
3. BCCH.
4. the SDCCH
5. True
6. the RACH
7. SDCCH
8. True.
9. True
10. True
11. Mobile Assisted Handover (MAHO).
12. True
13. True
14. True
15. VLR
Terminal Questions
1. Answer to provide services to the GSM subscribers there are various
operations carried out by the system components. It has to identify
authorize subscribers to use the GSM services, identify them when they
request services, initiate a call to another subscribers and many more.
Refer to section 7.2.
2. Answer. The traffic cases describe the action taken either by the GSM
network elements or by the mobile station to use the services of the
network. Based on the movement pattern and status of the mobile user
or the movement area of the mobile user there are various traffic cases
available in GSM network Refer to section 7.2.
3. Answer. The process of changing cells during an ongoing conversation
is called handover or handoff in GSM terminology. The mobile station
always measures the strength of the received signal while it is on move.
Sikkim Manipal University
Wireless Networks
Unit 7
Because based on the signal strength the station can discover a cell
change and appropriate action against handover. For rest of the answer
refer to section 7.4.
References
Second Edition, Tata McGraw Hills, 1995.
Michel Daoud Yacoub, Wireless Technology, CRC Press, 2002.
Dharma Prakash Agarwal, Introduction to Wireless Communication,
Second Edition, Thomson Learning 2007.
E-References
http://www.scribd.com/doc/6606382/Traffic-Cases
http://www.ericsson.com/hr/services/competence/course_gsm/LZU_108
_852_en.pdf