Вы находитесь на странице: 1из 42

OVERVIEW OF GSM

ARCHITECTURE

CHAPTER 1: INTRODUCTION
1.1 Introduction to Telecommunication
Communication is a process in which information is transferred from source to destination.
Information can be in any form e.g. Voice, Data, Video, Graphics etc. Voice communication is the
simplest mode of communication. People also use facial expressions and body language to
communicate with each other.
Telecommunication is the exchange of information over significant distances by electronic means.
A complete, single telecommunications circuit consists of two stations, each equipped with a
transmitter and a receiver. The transmitter and receiver at any station may be combined into a single
device called a transceiver. The medium of signal transmission can be electrical wire or cable (also
known as "copper"), optical fibre or electromagnetic fields. The free-space transmission and reception
of data by means of electromagnetic fields is called wireless.
The simplest form of telecommunications takes place between two stations. However, it is
common for multiple transmitting and receiving stations to exchange data among them. Such an
arrangement is called a telecommunications network. The Internet is the largest example. On a smaller
scale,
Examples include:

Corporate and academic wide-area networks (WANs)

Telephone networks

Police and fire communications systems

Taxicab dispatch networks

Data is conveyed in a telecommunications circuit by means of an electrical signal called the carrier
or carrier wave. In order for a carrier to convey information, some form of modulation is required. The
mode of modulation can be broadly categorized as either analog or digital. In analog modulation, some

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

aspect of the carrier is varied in a continuous fashion. The oldest form of analog modulation is
amplitude modulation (AM), still used in radio broadcasting at some frequencies.

Digital modulation actually predates analog modulation; the earliest form was Morse code. During
the 1900s, dozens of new forms of modulation were developed and deployed, particularly during the
so-called "digital revolution" when the use of computers among ordinary citizens became widespread.

In some contexts, a broadcast network, consisting of a single transmitting station and multiple
receive-only stations, is considered a form of telecommunications. Radio and television broadcasting
are the most common examples.

Communications signals can be sent either by analog signals or digital signals. There are analog
communication systems and digital communication systems. For an analog signal, the signal is varied
continuously with respect to the information. In a digital signal, the information is encoded as a set of
discrete values (for example, a set of ones and zeros).

During the propagation and reception, the information contained in analog signals will inevitably
be degraded by undesirable physical noise. (The output of a transmitter is noise-free for all practical
purposes.) Commonly, the noise in a communication system can be expressed as adding or subtracting
from the desirable signal in a completely random way. This form of noise is called additive noise, with
the understanding that the noise can be negative or positive at different instants of time.

Noise that is not additive noise is a much more difficult situation to describe or analyze, and these
other kinds of noise will be omitted here.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

On the other hand, unless the additive noise disturbance exceeds a certain threshold, the
information contained in digital signals will remain intact. kTheir resistance to noise represents a key
advantage of digital signals over analog signals.

We have been using communication technology for years. Communications, or


telecommunication, technology consists of electromagnetic devices and systems for communicating
over long distance. The principle examples are telephone, radio, television, and cable. Before 1950s
computer technology and communications technology developed independently, like rails in a railroad
track that never merge. Since then, however they have gradually fused together, producing a new
information environment.

1.1.1 Basic Communications System Elements:


o Transmitter
o Receiver
o Medium: for example, cable, coax, wire, etc.
1.1.2. Purpose of a Communication System
o Deliver as much information as possible from the source to the destination (capacity). Capacity
may be measured in bits per second (bps) or in call capacity. Information maybe of different
natures, such as voice, video, or data produced by a computer.
o Deliver information in shortest time (delay). Delays are measured in milliseconds or in round
trip delay.
o Reduce errors in delivery of information (error detection/correction). Errors can be measured
as Bit Error Rate (BER) or Frame Error Rate (FER).

1.2: WHAT IS GSM

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

If you are in Europe or Asia and using a mobile phone, then most probably you are using GSM
technology in your mobile phone.

GSM stands for Global System for Mobile Communication. It is a digital cellular technology
used for transmitting mobile voice and data services.

The concept of GSM emerged from a cell-based mobile radio system at Bell Laboratories in
the early 1970s.

GSM is the name of a standardization group established in 1982 to create a common European
mobile telephone standard.

GSM is the most widely accepted standard in telecommunications and it is implemented


globally.

GSM is a circuit-switched system that divides each 200 kHz channel into eight 25 kHz timeslots. GSM operates on the mobile communication bands 900 MHz and 1800 MHz in most
parts of the world. In the US, GSM operates in the bands 850 MHz and 1900 MHz.

GSM owns a market share of more than 70 percent of the world's digital cellular subscribers.

GSM makes use of narrowband Time Division Multiple Access (TDMA) technique for
transmitting signals.

GSM was developed using digital technology. It has an ability to carry 64 kbps to 120 Mbps of
data rates.

Presently GSM supports more than one billion mobile subscribers in more than 210 countries
throughout the world.

GSM provides basic to advanced voice and data services including roaming service. Roaming
is the ability to use your GSM phone number in another GSM network.

GSM digitizes and compresses data, then sends it down through a channel with two other streams of
user data, each in its own timeslot.

1.3 WHY GSM


Listed below are the features of GSM that account for its popularity and wide acceptance.

Improved spectrum efficiency

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

International roaming

Low-cost mobile sets and base stations (BSs)

High-quality speech

Compatibility with Integrated Services Digital Network (ISDN) and other telephone company
services

Support for new services

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

CHAPTER 2: BLOCK DIAGRAM


2.1 GENERAL ARCHITECTURE OF GSM

Figure 2.1.1 General Architecture of GSM

2.1.1 MOBILE STATION


Mobile stations (MS), or mobile equipment (ME) as they are most widely known, cell or
mobile phones are the section of a GSM cellular network that the user sees and operates. In recent
years their size has fallen dramatically while the level of functionality has greatly increased. A further
advantage is that the time between charges has significantly increased.
There are a number of elements to the cell phone, although the two main elements are the main
hardware and the SIM.
The hardware itself contains the main elements of the mobile phone including the display, case,
battery, and the electronics used to generate the signal, and process the data receiver and to be
transmitted. It also contains a number known as the International Mobile Equipment Identity (IMEI).
This is installed in the phone at manufacture and "cannot" be changed. It is accessed by the network
during registration to check whether the equipment has been reported as stolen.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

The SIM or Subscriber Identity Module contains the information that provides the identity of
the user to the network. It contains are variety of information including a number known as the
International Mobile Subscriber Identity (IMSI).

2.1.2 BASE STATION SUBSYSTEM (BSS):


The BSS is a set of BS equipment (such as transceivers and controllers) that is in view by the
MSC through a single A interface as being the entity responsible for communicating with MSs in a
certain area. The radio equipment of a BSS may be composed of one or more cells. A BSS may consist
of one or more BS.
The interface between BSC and BTS is designed as an A-bis interface. The BSS includes two
types of machines: the BTS in contact with the MSs through the radio interface and the BSC, the latter
being in contact with the MSC. A BTS is a network component that serves one cell and is controlled
by a BSC. BTS is typically able to handle three to five radio carries, carrying between 24 and 40
simultaneous communication. Reducing the BTS volume is important to keeping down the cost of the
cell sites. An important component of the BSS that is considered in the GSM architecture as a part of
the BTS is the Transcoder/Rate Adapter Unit (TRAU).
The TRAU is the equipment in which coding and decoding is carried out as well as rate
adoption;n in case of data. Although the specifications consider the TRAU as a subpart of the BTS, it
can be sited away from the BTS (at MSC), and even between the BSC and the MSC. The interface
between the MSC and the BSS is a standardized SS7 interface (A-interface). This allows the system
operator to purchase switching equipment from one supplier and radio equipment and the controller
from another. The interface between the BSC and a remote BTS likewise is a standard the A-bits. E2E3/CM/Cellular Concept & GSM Architecture.
2.1.2.1 BASE TRANCIEVER SUB SYSTEM

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

The primary responsibility of the BTS is to transmit and receive radio signals from a mobile
unit over an air interface. To perform this function completely, the signals are encoded, encrypted,
multiplexed, modulated, and then fed to the antenna system at the cell site.

Transcoding to bring 13-kbps speech to a standard data rate of 16 kbps and then combining
four of these signals to 64 kbps is essentially a part of BTS, though, it can be done at BSC or at MSC.
Random access detection is made by BTS, which then sends the message to BSC. The channel
subsequent assignment is made by BSC. Timing advance is determined by BTS. BTS signals the
mobile for proper timing adjustment. Uplink radio channel measurement corresponding to the
downlink measurements made by MS has to be made by BTS.
2.1.2.2 BASE STATION CONTROLLER
The BSC, as discussed, is connected to the MSC on one side and to the BTS on the other. The
BSC performs the Radio Resource (RR) management for the cells under its control. It assigns and
release frequencies and timeslots for all MSs in its own area.
The BSC performs the intercell handover for MSs moving between BTS in its control. It also
reallocates frequencies to the BTSs in its area to meet locally heavy demands during peak hours or on
special events.
The BSC controls the power transmission of both BSSs and MSs in its area. The minimum
power level for a mobile unit is broadcast over the BCCH. The BSC provides the time and frequency
synchronization reference signals broadcast by its BTSs. E2-E3/CM/Cellular Concept&GSM
Architecture
2.1.3 NETWORK SWITCHING SUBSYSTEM (NSS)

The GSM system architecture contains a variety of different elements, and is often termed the core
network. It provides the main control and interfacing for the whole mobile network. The major
elements within the core network include:
2.1.3.1 MOBILE SWITCHING SERVICES CENTRE (MSC)

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

The main element within the core network area of the overall GSM network architecture is the
Mobile switching Services Centre (MSC). The MSC acts like a normal switching node within a PSTN
or ISDN, but also provides additional functionality to enable the requirements of a mobile user to be
supported.

These include registration, authentication, call location, inter-MSC handovers and call routing
to a mobile subscriber. It also provides an interface to the PSTN so that calls can be routed from the
mobile network to a phone connected to a landline. Interfaces to other MSCs are provided to enable
calls to be made to mobiles on different networks
Functions of the MSC include:
Call handling that copes with mobile nature of subscribers (e.g., paging)
Management of required logical radio-link channel during calls
Management of MSC-BSS signalling protocol
Handling location registration and ensuring interworking between Mobile Station
And VLR
Control of inter-BSS and inter-MSC handovers
Acting as a gateway MSC to interrogate the HLR
Exchange of signalling information with other system entities
Standard functions of a local exchange switch in the fixed network (example:
Charging).
2.1.3.2 HOME LOCATION REGISTER (HLR)
This database contains all the administrative information about each subscriber along with
their last known location. In this way, the GSM network is able to route calls to the relevant base
station for the MS. When a user switches on their phone, the phone registers with the network and
from this it is possible to determine which BTS it communicates with so that incoming calls can be
routed appropriately.
Even when the phone is not active (but switched on) it re-registers periodically to ensure that
the network (HLR) is aware of its latest position. There is one HLR per network, although it may be
distributed across various sub-centres to for operational reasons.
The HLR contains:

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Identity of mobile subscriber


ISDN directory number of mobile station
Subscription information on teleservices and bearer services
Service restrictions (if any)
Supplementary services

2.1.3.3 VISITOR LOCATION REGISTER (VLR)


This contains selected information from the HLR that enables the selected services for the
individual subscriber to be provided. The VLR can be implemented as a separate entity, but it is
commonly realised as an integral part of the MSC, rather than a separate entity. In this way access is
made faster and more convenient.
The VLR contains:
Identity of mobile subscriber
Any temporary mobile subscriber identity
ISDN directory number of mobile
A directory number to route calls to a roaming station
Location area where the mobile station is registered
Copy of (part of) the subscriber data from the HLR
2.1.3.4 EQUIPMENT IDENTITY REGISTER (EIR)
The EIR is the entity that decides whether a given mobile equipment may be allowed onto
the network. Each mobile equipment has a number known as the International Mobile Equipment
Identity. This number, as mentioned above, is installed in the equipment and is checked by the network
during registration. Dependent upon the information held in the EIR, the mobile may be allocated one
of three states - allowed onto the network, barred access, or monitored in case its problems
This contains:
White or Valid list - List of valid MS equipment identities
Grey or Monitored list - List of suspected mobiles under observation
Black or prohibited list - List of mobiles for which service is barred..
2.1.4. AUTHENTICATION CENTRE (AUC)

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

The AuC is a protected database that contains the secret key also contained in the user's SIM
card. It is used for authentication and for ciphering on the radio channel.
The Authentication Centre (AUC):
Contains subscriber authentication data called Authentication Keys (Ki)
Generates security related parameters needed to authorize service using Ki

Generates unique data pattern called a Cipher Key (Kc) needed for encrypting User speech and
data

2.2 GSM NETWORK AREAS:

Fig No: 2.2.1: Gsm Network Areas

In a GSM network, the following areas are defined:

Cell: Cell is the basic service area; one BTS covers one cell. Each cell is given a Cell Global
Identity (CGI), a number that uniquely identifies the cell.

Location Area: A group of cells form a Location Area (LA). This is the area that is paged
when a subscriber gets an incoming call. Each LA is assigned a Location Area Identity (LAI).
Each LA is served by one or more BSCs.

MSC/VLR Service Area: The area covered by one MSC is called the MSC/VLR service area.

PLMN: The area covered by one network operator is called the Public Land Mobile Network
(PLMN). A PLMN can contain one or more MSCs.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

CHAPTER 3: GSM SPECIFICATIONS


The requirements for different Personal Communication Services (PCS) systems differ for
each PCS network. Vital characteristics of the GSM specification are listed below:

3.1 CHARACTERISTICS OF GSM


3.1.1 MODULATION:
Modulation is the process of transforming the input data into a suitable format for the
transmission medium. The transmitted data is demodulated back to its original form at the receiving
end. The GSM uses Gaussian Minimum Shift Keying (GMSK) modulation method.
3.1.2 ACCESS METHODS
Radio spectrum being a limited resource that is consumed and divided among all the users,
GSM devised a combination of TDMA/FDMA as the method to divide the bandwidth among the
users. In this process, the FDMA part divides the frequency of the total 25 MHz bandwidth into 124
carrier frequencies of 200 kHz bandwidth.
Each BS is assigned with one or multiple frequencies, and each of this frequency is divided
into eight timeslots using a TDMA scheme. Each of these slots are used for both transmission as well
as reception of data. These slots are separated by time so that a mobile unit doesnt transmit and
receive data at the same time.
3.1.3 TRANSMISSION RATE

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

The total symbol rate for GSM at 1 bit per symbol in GMSK produces 270.833 K
symbols/second. The gross transmission rate of a timeslot is 22.8 Kbps.
GSM is a digital system with an over-the-air bit rate of 270 kbps.
3.1.4 FREQUENCY BAND
The uplink frequency range specified for GSM is 933 - 960 MHz (basic 900 MHz band
only). The downlink frequency band 890 - 915 MHz (basic 900 MHz band only).

CHAPTER 4: GSM ADDRESSING AND IDENTIFIERS


GSM treats the users and the equipment in different ways. Phone numbers, subscribers, and
equipment identifiers are some of the known ones. There are many other identifiers that have been
well-defined, which are required for the subscribers mobility management and for addressing the
remaining network elements. Vital addresses and identifiers that are used in GSM are addressed
below.

4.1 INTERNATIONAL MOBILE STATION EQUIPMENT IDENTITY (IMEI)


The International Mobile Station Equipment Identity (IMEI) looks more like a serial number
which distinctively identifies a mobile station internationally. This is allocated by the equipment
manufacturer and registered by the network operator, who stores it in the Entrepreneurs-in-Residence
(EIR). By means of IMEI, one recognizes obsolete, stolen, or non-functional equipment.
Following are the parts of IMEI:

Type Approval Code (TAC): 6 decimal places, centrally assigned.

Final Assembly Code (FAC): 6 decimal places, assigned by the manufacturer.

Serial Number (SNR): 6 decimal places, assigned by the manufacturer.

Spare (SP): 1 decimal place.

Thus, IMEI = TAC + FAC + SNR + SP. It uniquely characterizes a mobile station and gives clues
about the manufacturer and the date of manufacturing.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

4.2 INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)


Every registered user has an original International Mobile Subscriber Identity (IMSI) with a
valid IMEI stored in their Subscriber Identity Module (SIM).
IMSI comprises of the following parts:

Mobile Country Code (MCC): 3 decimal places, internationally standardized.

Mobile Network Code (MNC): 2 decimal places, for unique identification of mobile network
within the country.

Mobile Subscriber Identification Number (MSIN): Maximum 10 decimal places,


identification number of the subscriber in the home mobile network.

4.3 MOBILE SUBSCRIBER ISDN NUMBER (MSISDN)

The authentic telephone number of a mobile station is the Mobile Subscriber ISDN Number
(MSISDN). Based on the SIM, a mobile station can have many MSISDNs, as each subscriber is
assigned with a separate MSISDN to their SIM respectively.
Listed below is the structure followed by MSISDN categories, as they are defined based on
international ISDN number plan:

Country Code (CC): Up to 3 decimal places.

National Destination Code (NDC): Typically 2-3 decimal places.

Subscriber Number (SN): Maximum 10 decimal places.

4.4 MOBILE STATION ROAMING NUMBER (MSRN):


Mobile Station Roaming Number (MSRN) is an interim location dependent ISDN number,
assigned to a mobile station by a regionally responsible Visitor Location Register (VLA). Using
MSRN, the incoming calls are channeled to the MS.
The MSRN has the same structure as the MSISDN.

Country Code (CC): of the visited network.

National Destination Code (NDC): of the visited network.

Subscriber Number (SN): in the current mobile network.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

4.5 LOCATION AREA IDENTITY (LAI)

Within a PLMN, a Location Area identifies its own authentic Location Area Identity (LAI).
The LAI hierarchy is based on international standard and structured in a unique format as mentioned
below:

Country Code (CC): 3 decimal places.

Mobile Network Code (MNC): 2 decimal places.

Location Area Code (LAC): maximum 5 decimal places or maximum twice 8 bits coded in
hexadecimal (LAC < FFFF).

4.6 TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)

Temporary Mobile Subscriber Identity (TMSI) can be assigned by the VLR, which is
responsible for the current location of a subscriber. The TMSI needs to have only local significance in
the area handled by the VLR. This is stored on the network side only in the VLR and is not passed to
the Home Location Register (HLR).
Together with the current location area, the TMSI identifies a subscriber uniquely. It can
contain up to 4 8 bits.

4.7 LOCAL MOBILE SUBSCRIBER IDENTITY (LMSI)

Each mobile station can be assigned with a Local Mobile Subscriber Identity (LMSI), which is
an original key, by the VLR. This key can be used as the auxiliary searching key for each mobile
station within its region. It can also help accelerate the database access. An LMSI is assigned if the
mobile station is registered with the VLR and sent to the HLR. LMSI comprises of four octets (4x8
bits).

4.8 CELL IDENTIFIER (CI)

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Using a Cell Identifier (CI) (maximum 2 8) bit, the individual cells that are within an LA can
be recognized. When the Global Cell Identity (LAI + CI) calls are combined, then it is uniquely
defined.

CHAPTER 5: SUBSCRIBER IDENTITY MODULE


5.1 INTRODUCTION
A subscriber identity module or subscriber identification module (SIM) is an integrated
circuit chip that is intended to securely store the international mobile subscriber identity (IMSI)
number and its related key, which are used to identify and authenticate subscribers on mobile
telephony devices (such as mobile phones and computers). It is also possible to store contacts on many
SIM cards. SIM cards are always used on GSM phones; for CDMA phones, they are only needed for
newer LTE-capable handsets. SIM cards can also be used in satellite phones.

The SIM circuit is part of the function of a Universal Integrated Circuit Card (UICC)
physical smart card, which is usually made of PVC with embedded contacts and semiconductors.
"SIM cards" are designed to be transferable between different mobile devices. The first UICC smart
cards were the size of credit and bank cards; the development of physically smaller mobile devices has
prompted the development of smaller SIM cards, where the size of the plastic carrier is reduced while
keeping electrical contacts the same.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

A SIM card contains its unique serial number (ICCID), international mobile subscriber identity
(IMSI) number, security authentication and ciphering information, temporary information related to
the local network, a list of the services the user has access to, and two passwords: a personal
identification number (PIN) for ordinary use, and personal unblocking code (PUK) for PIN unlocking.

Functions of a SIM
The functions of the Subscriber Identity Module (SIM) are:
o Authentication of the validity of the MS when accessing the network
o User authentication
o Storage of subscriber-related information, which can be: data fixed during
administrative phase (e.g., subscriber identification), and temporary network data (e.g.,
cell location identity).

5.2 DESIGN

Fig No: 5.2.1: SIM chip structure and packaging

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V (ISO/IEC 7816-3 classes
A, B and C, respectively). The operating voltage of the majority of SIM cards launched before 1998
was 5 V. SIM cards produced subsequently are compatible with 3 V and 5 V. Modern cards support 5
V, 3 V and 1.8 V.

Modern SIM cards allow applications to be loaded when the SIM is in use by the subscriber.
These applications communicate with the handset or a server using SIM application toolkit, which was
initially specified by 3GPP in TS 11.14 (there is an identical ETSI specification with different
numbering). ETSI and 3GPP maintain the SIM specifications; the main specifications are: ETSI TS
102 223, ETSI TS 102 241, ETSI TS 102 588 and ETSI TS 131 111. SIM toolkit applications were
initially written in native code using proprietary APIs. In order to allow interoperability of the
applications, Java Card was taken as the solution of choice by ETSI. Additional standards and
specifications of interest are maintained by Global Platform.

5.3 DEVELOPMENTS

When GSM was already in use, the specifications were further developed and enhanced with
functionality like SMS, GPRS, etc. These development steps are referred as releases by ETSI. Within
these development cycles, the SIM specification was enhanced as well: new voltage classes, formats
and files were introduced.

5.3.1 USIM
In GSM-only times, the SIM consisted of the hardware and the software. With the advent of
UMTS this naming was split: the SIM was now an application and hence only software. The hardware

part was called UICC. This split was necessary because UMTS introduced a new application, the
Universal Subscriber Identity Module (USIM). The USIM brought, among other things, security

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

improvements like the mutual authentication and longer encryption keys and an improved address
book.

5.3.2 UICC

"SIM cards" in developed countries are today usually UICCs containing at least a SIM and a
USIM application. This configuration is necessary because older GSM only handsets are solely
compatible with the SIM [application] and some UMTS security enhancements do rely on the USIM
[application].

5.3.3 OTHER VARIANTS

The equivalent of SIM on CDMA networks is the R-UIM (and the equivalent of USIM
is CSIM).
A virtual SIM is a mobile phone number provided by a mobile network operator that does not
require a SIM card to connect phone calls to a user's mobile phone.
At the 2015 Mobile World Congress in Barcelona, Simless, Inc., a US-based startup unveiled
world's first GSM phone without a SIM card slot. The reference phone was capable of downloading
multiple virtual SIM cards over-the-air.
Virtual SIM are called e-SIM or eSIM.

5.4 Mobile Phone Tracking


Mobile phone tracking is the ascertaining of the position or location of a mobile phone,
whether stationary or moving. Localization may occur either via multilateration of radio signals
between (several) cell towers of the network and the phone, or simply via GPS.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

To locate a mobile phone using multilateration of radio signals, it must emit at least the
roaming signal to contact the next nearby antenna tower, but the process does not require an active
call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to
nearby antenna masts.

Mobile positioning may include location-based services that disclose the actual coordinates of
a mobile phone, which is a technology used by telecommunication companies to approximate the
location of a mobile phone, and thereby also its user

5.4.1 TECHNOLOGY
The technology of locating is based on measuring power levels and antenna patterns and uses
the concept that a powered mobile phone always communicates wirelessly with one of the closest base
stations, so knowledge of the location of the base station implies the cell phone is nearby.

Advanced systems determine the sector in which the mobile phone is located and roughly
estimate also the distance to the base station. Further approximation can be done by
interpolating signals between adjacent antenna towers. Qualified services may achieve a precision of
down to 50 meters in urban areas where mobile traffic and density of antenna towers (base stations) is
sufficiently high Rural and desolate areas may see miles between base stations and therefore determine
locations less precisely.

GSM localization uses multilateration to determine the location of GSM mobile phones, or
dedicated trackers, usually with the intent to locate the user.
The location of a mobile phone can be determined in a number of ways:

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

5.4.1.1NETWORK-BASED

The location of mobile phone can be determined using the service provider's network
infrastructure. The advantage of network-based techniques, from a service provider's point of view, is
that they can be implemented non-intrusively without affecting handsets. Network-based techniques
were developed many years prior to the widespread availability of GPS on handsets. (See US
5519760, issued 21 May 1996 for one of the first works relating to this.

The accuracy of network-based techniques varies, with cell identification as the least accurate
and triangulation as moderately accurate, and newer "advanced forward link trilateration" timing
methods as the most accurate. The accuracy of network-based techniques is both dependent on the
concentration of cell base stations, with urban environments achieving the highest possible accuracy.

One of the key challenges of network-based techniques is the requirement to work closely with
the service provider, as it entails the installation of hardware and software within the operator's
infrastructure. Frequently the compulsion associated with a legislative framework, such as Enhanced
9-1-1, is required before a service provider will deploy a solution.

5.4.1.2 HANDSET-BASED

The location of a mobile phone can be determined using client software installed on the
handset.[8] This technique determines the location of the handset by putting its location by cell
identification, signal strengths of the home and neighbouring cells, which is continuously sent to the
carrier. In addition, if the handset is also equipped with GPS then significantly more precise location
information can be then sent from the handset to the carrier.

Another approach is to use a fingerprinting-based technique, where the "signature" of the home
and neighbouring cells signal strengths at different points in the area of interest is recorded by war-

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

driving and matched in real-time to determine the handset location. This is usually performed
independent from the carrier.

The key disadvantage of handset-based techniques, from service provider's point of view, is the
necessity of installing software on the handset. It requires the active cooperation of the mobile
subscriber as well as software that must be able to handle the different operating systems of the
handsets.

Typically, smartphones,

such

as

one

based

on Symbian,

Windows, Windows

Phone, BlackBerry OS, iOS, or Android, would be able to run such software, e.g. Google Maps.

One proposed work-around is the installation of embedded hardware or software on the


handset by the manufacturers, e.g., Enhanced Observed Time Difference (E-OTD). This avenue has
not made significant headway, due to the difficulty of convincing different manufacturers to cooperate
on a common mechanism and to address the cost issue. Another difficulty would be to address the
issue of foreign handsets that are roaming in the network.

5.4.1.3 SIM-BASED

Using

the subscriber

identity

module (SIM)

in GSM and Universal

Mobile

Telecommunications System (UMTS) handsets, it is possible to obtain raw radio measurements from
the handset Available measurements include the serving Cell ID, round-trip time, and signal strength.
The type of information obtained via the SIM can differ from that which is available from the handset.

5.4.1.4 Wi-Fi

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Wi-Fi data can also be used to identify a handset's location.[14] Poor performance of the GPSbased methods in indoor environment and increasing popularity of Wi-Fi has encouraged companies to
design

new

and

feasible

methods

positioning. Most smartphones combine Global

to

carry

Navigation

out

Satellite

Wi-Fi-based

indoor

Systems (GNSS),

such

as GPS and GLONASS, with Wi-Fi positioning systems.

5.4.1.5 HYBRID

Hybrid positioning systems use a combination of network-based and handset-based


technologies for location determination. One example would be some modes of Assisted GPS, which
can both use GPS and network information to compute the location. Both types of data are thus used
by the telephone to make the location more accurate (i.e., A-GPS).

Alternatively tracking with both systems can also occur by having the phone attain its GPSlocation directly from the satellites, and then having the information sent via the network to the person
that is trying to locate the telephone. Such systems include Google Maps, as well
as, LTE's OTDOA and E-CellID.

There are also hybrid positioning systems which combine several different location approaches
to position mobile devices by Wi-Fi, WiMAX, GSM, LTE, IP addresses, and network environment
data.

CHAPTER 6: FREQUENCY REUSE


6.1 PRINCIPLES

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

In the cellular concept, frequencies allocated to the service are re-used in a regular pattern of
areas, called 'cells', each covered by one base station. In mobile-telephone nets these cells are usually
hexagonal. In radio broadcasting, a similar concept has been developed based on rhombic cells.
To ensure that the mutual interference between users remains below a harmful level, adjacent
cells use different frequencies. In fact, a set of C different frequencies {f1... fC} are used for each cluster
of C adjacent cells. Cluster patterns and the corresponding frequencies are re-used in a regular pattern
over the entire service area.

Fig No: 6.1.1: Frequency reuse plan for C = 3, with hexagonal cells. (i=1, j =1)

The total bandwidth for the system is C times the bandwidth occupied by a single cell.

6.2 REUSE DISTANCE

The closest distance between the centres of two cells using the same frequency (in different
clusters) is determined by the choice of the cluster size C and the lay-out of the cell cluster. This
distance is called the frequencyre-use' distance. It can be shown that the reuse distance ru, normalised
to the size of each hexagon is
ru = SQRT{3 C}
For hexagonal cells, i.e., with 'honeycomb' cell lay-outs commonly used in mobile radio,
possible cluster sizes are C = i2 + ij + j2, with integer i and j (C = 1, 3, 4, 7, 9 ...).
Integers i and j determine the relative location of co-channel cells.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Fig No: 6.2.1 7-cell reuse with i = 2 and j =1.

6.3 CLUSTER
A cellular system is based on re-use of frequencies .All the available frequencies are divided
into different frequency groups so that certain frequency belongs to a certain frequency group. The
frequency group together form a cluster.
A group of neighbouring cells using all the frequencies available in the system frequencies
band is called a cluster cells.
A cluster is an area in which all frequency groups are used once, but not re-used .By repeating
the cluster over and over again a cellular network can be built.

Fig no: 6.3.1 cluster

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

CHAPTER 7: EVALUTION OF MOBILE COMMUNICATION


7.1 FIRST GENERATION (1G)
1G (or 1-G) refers generation of wireless telephone technology (mobile telecommunications).
These are the analog telecommunications standards that were introduced in the 1980s and continued
until being replaced by 2G digital telecommunications. The main difference between the two mobile
telephone systems (1G and 2G), is that the radio signals used by 1G networks are analog, while 2G
networks are digital
.
Although both systems use digital signalling to connect the radio towers (which listen to the
handsets) to the rest of the telephone system, the voice itself during a call is encoded to digital signals
in 2G whereas 1G is only modulated to higher frequency, typically 150 MHz and up. The inherent
advantages of digital technology over that of analog meant that 2G networks eventually replaced them
almost everywhere.

The main disadvantage of 1g technology is that it makes use of analog rather than digital
signals. This is a less effective means of transmitting information. It is significantly slower, and signals
cannot reach as far in terms of secluded areas and such - 2g and 3g signal is far more widespread. In
addition, analogue signals are more likely to suffer interference problems. This can make using
a mobile phone with analog signal more difficult. In all, the newer brands of 2g and 3g technology are
more highly recommended.
7.2 SECOND GENERATION (2G)
2G (or 2-G) is short for second-generation wireless telephone technology. Second generation 2G
cellular

telecom

networks

were

commercially

launched

on

the GSM standard

in Finland byRadiolinja(now part of Elisa Oyj) in 1991. Three primary benefits of 2G networks over

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

their predecessors were that phone conversations were digitally encrypted, 2G systems were
significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels;
and 2G introduced data services for mobile, starting with SMS text messages. After 2G was launched,
the previous mobile telephone systems were retrospectively dubbed 1G. While radio signals on 1G
networks are analog, and on 2G networks are digital, both systems use digital signalling to connect the
radio towers (which listen to the handsets) to the rest of the telephone system.

7.2.1 ADVANTAGES
Digital systems were embraced by consumers for several reasons.

The lower powered radio signals require less battery power, so phones last much longer
between charges, and batteries can be smaller.

The digital voice encoding allowed digital error checking which could increase sound quality
by increasing dynamic range and lowering the noise floor.

The lower power emissions helped address health concerns.

Going all-digital allowed for the introduction of digital data services, such as SMS and email.

Greatly reduced fraud. With analog systems it was possible to have two or more cloned
handsets that had the same phone number.

Enhanced privacy. A key digital advantage not often mentioned is that digital cellular calls are
much harder to eavesdrop on by use of radio scanners. While the algorithms used have proved
not to be as secure as initially advertised, 2G phones are immensely more private than 1G
phone, which have no protection against eavesdropping.

7.2.2 DISADVANTAGES
The downsides of 2G systems, not often well publicized, are:

In less populous areas, the weaker digital signal may not be sufficient to reach a cell tower.
This tends to be a particular problem on 2G systems deployed on higher frequencies, but is

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

mostly not a problem on 2G systems deployed on lower frequencies. National regulations


differ greatly among countries which dictate where 2G can be deployed.

Analog has a smooth decay curve, digital a jagged steppy one. This can be both an advantage
and a disadvantage. Under good conditions, digital will sound better. Under slightly worse
conditions, analog will experience static, while digital has occasional dropouts. As conditions
worsen, though, digital will start to completely fail, by dropping calls or being unintelligible,
while analog slowly gets worse, generally holding a call longer and allowing at least a few
words to get through.

While digital calls tend to be free of static and background noise, the lossy compression used
by the codecs takes a toll; the range of sound that they convey is reduced. You'll hear less of the
tonality of someone's voice talking on a digital cell phone, but you will hear it more clearly.

7.3 2.5G

2.5G, which stands for "second and a half generation," is a cellular wireless technology
developed in between its predecessor, 2G, and its successor, 3G.

"2.5G" is an informal term, invented solely for marketing purposes, unlike "2G" or "3G" which
are officially defined standards based on those defined by the International Telecommunication (ITU).
The term "2.5G" usually describes a 2G cellular system combined with General Packet Radio Services
(GPRS), or other services not generally found in 2G or 1G networks.

Wireless telecommunication technology like CDMA200 1x-RTT, Enhanced Data Rates for
GSM Evolution (EDGE) or Enhanced General Packet Radio Service (EGPRS), since they have data

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

transmission rates of 144 kbps or higher, may qualify as 3G technology. However, they are usually
classified as 2.5G technology because they have slower network speeds than most 3G services.

GPRS is a service commonly associated with 2.5G technology. It has data transmission rates of
28 kbps or higher. GPRS came after the development of the Global System for Mobile (GSM) service,
which is classified as 2G technologies, and it was succeeded by the development of the Universal
Mobile Telecommunication Service (UMTS), which is classified as 3G technology.

A 2.5G system may make use of 2G system infrastructure, but it implements a packet-switched
network domain in addition to a circuit-switched domain. This does not necessarily give 2.5G an
advantage over 2G in terms of network speed, because bundling of timeslots is also used for circuitswitched data services (HSCSD).

The services and infrastructure of a 2.5G network may be used on a per-transaction basis rather
than a per-minute-of-use basis, thanks to its packet-switched domain. This makes its infrastructure
more efficient and improves the service delivery. This impetus is known as the "always-on" capability.

7.3.1 ADVANTAGES:
The advantages that 2.5G provides are a result of the previous difference. Mainly, the increased
data speed ranging from 56kbps to 115kbps. Faster speeds are not really needed if you just use your
cell phone for voice calling or text messaging. But the increased speeds also opened up a new set of
services to the consumers.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Probably the most important service provided by 2.5G is web browsing via WAP. WAP is a
simplified version of websites that are necessary because mobile phones back then were unable to
render full web pages due to very weak hardware. Although very simple, it still provided a basic level
of web interaction that was not available till then.

Another new feature provided by 2.5G is the ability to send and receive photos and videos via
MMS, or the Multimedia Messaging Service. This uses the packet switched network, pretty much like
the internet to deliver the multimedia content from the one phone to the other. This service is not
possible without the new 2.5G technologies.

7.4 2.75G
GPRS networks evolved to EDGE networks with the introduction of 8PSK encoding, while the
symbol rate remained the same at 270.833 samples per second, each symbol carried three bits instead
of one. Enhanced Data rates for GSM Evolution (EDGE), Enhanced GPRS (EGPRS), or IMT Single
Carrier (IMT-SC) is a backward-compatible digital mobile phone technology that allows improved
data transmission rates, as an extension on top of standard GSM. EDGE was deployed on GSM
networks beginning in 2003initially by AT&T in the United States.
EDGE is standardized by 3GPP as part of the GSM family and it is an upgrade that provides a
potential three-fold increase in capacity of GSM/GPRS networks. The 2G digital service provided very
useful features, such as caller ID, call forwarding, and short messaging.

7.5 THIRD GENERATION (3G)


3G is the Third Generation of Mobile Tele Communications technology. 3G phone and network
should comply with the standards of ITU-2000 (International Telecommunication Union 2000).
3G APPLICATIONS ARE:

(1) Voce telephony


(2) Mobile Internet
(3) Fixed wireless Telephony

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

(4) Video Calls


(5) Mobile TV
Minimum speed of 3g is 200kbps. And Maximum speed is up to several Mbps depending on
network coverage and technology adopted.
The following technologies generally branded as 3g.
(1) UMTS-SYSTEM (universal mobile telecommunication system)
(2) TD-SCDMA

(time division synchronous code division multiple access)

(3) WCDMA

(Wide band coded division multiple access)

(4) HSDPA and HSPA+ (high speed data pocket access)


Among the above technologies WCDMA is mostly adopted for 3G.
It was developed in 2000 but commercially available to the customers in the 2003 and
launched by Hutchison telecommunications.
The 1st launch of 3G in India was done by MTNL in Mumbai.
Technology- Speed
GSM

-9.6 Kbps

GPRS

-171Kbps

FREQUENCY BAND:
3G frequency band is

2100

MHz

Uplink range

1920 1980 MHz

Downlink range

2110 2170 MHz

;
7.5.1 ADVANTAGES OF 3G:
a. Overcrowding is relieved in existing systems with radio spectrum
b. Bandwidth, security and reliability are more
c. Provides interoperability among service providers
d. Availability of fixed and variable rates
e. Support to devices with backward compatibility with existing networks

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

f. Always online devices 3G uses IP connectivity which is packet based


g. Rich multimedia services are available
7.5.2 DISADVANTAGES OF 3G:
a. The cost of cellular infrastructure, upgrading base stations is very high
b. needs different handsets.
c. Roaming and data/voice work together has not yet been implemented
d. Power consumption is high
e. Requires closer base stations and are expensive
f. Spectrum-license costs, network deployment costs and handset subsidies subscribers are
tremendous.
7.6 INTRODUCTION TO 4G
4G systems provide ULTRA-BROADBAND MOBILE INTERNET ACCESS in addition to
the normal voice and other services of 3G. ULTRA BROADBAND means minimum speed of
100Mbps in moving position and may reach the speeds up to 1Gbps speed, in standstill position.
The 4G standards are stated by ITU-R (International Telecommunications union radio
communications sector) and named as IMT-advanced (International Telecommunications
advanced).The standards of 4G set the speeds as
300 Mbps for high mobility (such as trains, cars)
1 Gbps for low mobility (by walk or stationary).
The latest technologies are like:

Mobile Wimax version 2

LTE advanced (Long Term Evolution advanced) are supports 4G and they can
achieve those speeds.

The 4G does not supports traditional circuits switched telephony. But it supports all IP based
communication.

LTE advanced technology provides the speeds up to


1.1Gbps in peak download
2.500Mbps in peak up load

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Wimax version 2(IEEE 802.16m) provides


1.128Mbps in peak down load
2. 56Mbps in peak upload
* Bharthi Airtel launched Indias 1st 4G services using TD-LTE technology is KOLKATA on
April 10th of 2012. Then extends to Bangalore, Pune and Chandigarh in July 2014 Airtel 4G also
entered in AP, Assam, Bihar and Orissa.
Reliance also provides 4G in Delhi, Mumbai and Kolkata. BSNL is going to be implementing
4G shortly all over the India.
4G also called as MAGIC:
M- Mobile multimedia
A Anytime any where
G- Global mobility supports
I- Integrated wireless solution
C Customised personal services
7.6.1 ADVANTAGES OF 4G:
1. Quickly download files over a wireless network
2. Extremely high voice quality
3. Easily access Internet, IM, Social Networks, streaming media, video calling, etc.
4. Higher bandwidth
5. WiMAX, LTE, and HSPA+ are all versions of 4G, WiMAX is used by Sprint, LTE is used by
Verizon and AT&T, HSPA+ is used by AT&T and T-Mobile
6. 4G is 10 times faster than 3G
7.6.2 DISADVANTAGES OF 4G:
1. New frequencies means new components in cell towers.
2. Higher data prices for consumers
3. Consumer is forced to buy a new device to support the 4G
4. It is impossible to make your current equipment compatible with the 4G network
5. 4G is only currently available in certain cities within the United States.

CHAPTER 8: USER SERVICES &BILLING

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

GSM offers much more than just voice telephony. Contact your local GSM network operator
to the specific services that you can avail.
GSM offers three basic types of services:

Telephony services or teleservices

Data services or bearer services

Supplementary services

8.1 TELESERVICES:
The abilities of a Bearer Service are used by a Teleservice to transport data. These services are
further transited in the following ways:

8.1.1 VOICE CALLS

The most basic Teleservice supported by GSM is telephony. This includes full-rate speech at
13 kbps and emergency calls, where the nearest emergency-service provider is notified by dialing
three digits.

8.1.2 VIDEOTEXT AND FACSMILE

Another group of teleservices includes Videotext access, Teletex transmission, Facsimile


alternate speech and facsimile Group 3, Automatic facsimile Group, 3 etc.

8.1.3 SHORT TEXT MESSAGES

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Short Messaging Service (SMS) service is a text messaging service that allows sending and
receiving text messages on your GSM mobile phone. In addition to simple text messages, other text
data including news, sports, financial, language, and location-based data can also be transmitted.

8.2 BEARER SERVICES:

Data services or Bearer Services are used through a GSM phone. to receive and send data is
the essential building block leading to widespread mobile Internet access and mobile data transfer.
GSM currently has a data transfer rate of 9.6k. New developments that will push up data transfer rates
for GSM users are HSCSD (high speed circuit switched data) and GPRS (general packet radio
service) are now available.

8.3 SUPPLEMENTARY SERVICES:

Supplementary services are additional services that are provided in addition to teleservices and
bearer services. These services include caller identification, call forwarding, call waiting, multi-party
conversations, and barring of outgoing (international) calls, among others. A brief description of
supplementary services is given here:

Conferencing: It allows a mobile subscriber to establish a multiparty conversation, i.e., a


simultaneous conversation between three or more subscribers to setup a conference call. This
service is only applicable to normal telephony.

Call Waiting: This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Call Hold: This service allows a subscriber to put an incoming call on hold and resume after a
while. The call hold service is applicable to normal telephony.

Call Forwarding: Call Forwarding is used to divert calls from the original recipient to another
number. It is normally set up by the subscriber himself. It can be used by the subscriber to
divert calls from the Mobile Station when the subscriber is not available, and so to ensure that
calls are not lost.

Call Barring: Call Barring is useful to restrict certain types of outgoing calls such as ISD or
stop incoming calls from undesired numbers. Call barring is a flexible service that enables the
subscriber to conditionally bar calls.

Number Identification : There are following supplementary services related to number


identification:
o

Calling Line Identification Presentation: This service displays the telephone number
of the calling party on your screen.

Calling Line Identification Restriction : A person not wishing their number to be


presented to others subscribes to this service.

Connecte;d Line Identification Presentation : This service is provided to give the


calling party the telephone number of the person to whom they are connected. This
service is useful in situations such as forwarding's where the number connected is not
the number dialled.

Connected Line Identification Restriction: There are times when the person called
does not wish to have their number presented and so they would subscribe to this
person. Normally, this overrides the presentation service.

Malicious Call Identification: The malicious call identification service was provided
to combat the spread of obscene or annoying calls. The victim should subscribe to this

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

service, and then they could cause known malicious calls to be identified in the GSM
network, using a simple command.

Advice of Charge (AoC): This service was designed to give the subscriber an indication of
the cost of the services as they are used. Furthermore, those service providers who wish to
offer rental services to subscribers without their own SIM can also utilize this service in a
slightly different form. AoC for data calls is provided on the basis of time measurements.

Closed User Groups (CUGs): This service is meant for groups of subscribers who wish to
call only each other and no one else.

Unstructured supplementary services data (USSD): This allows operator-defined individual


services.
GSM service providers are doing billing based on the services they are providing to their

customers. All the parameters are simple enough to charge a customer for the provided services.
This chapter provides an overview of the frequently used billing techniques and parameters applied to
charge a GSM subscriber

8.4 BILLING:

8.4.1 TELEPHONY SERVICE:

These services can be charged on per call basis. The call initiator has to pay the charges, and
the incoming calls are nowadays free. A customer can be charged based on different parameters such
as:

International call or long distance call.

Local call.

Call made during peak hours.

Call made during night time.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Discounted call during weekends.

Call per minute or per second.

Many more other criteria can be designed by a service provider to charge their customers.

8.4.2 SMS SERVICE

Most of the service providers charge their customer's SMS services based on the number of
text messages sent. There are other prime SMS services available where service providers charge
more than normal SMS charge. These services are being availed in collaboration of Television
Networks or Radio Networks to demand SMS from the audiences.
Most of the time, the charges are paid by the SMS sender but for some services like stocks and
share prices, mobile banking facilities, and leisure booking services, etc. the recipient of the SMS has
to pay for the service.

8.4.3 GPRS SERVICES:

Using GPRS service, you can browse, play games on the Internet, and download movies. So a
service provider will charge you based on the data uploaded as well as data downloaded on your
mobile phone. These charges will be based on per Kilo Byte data downloaded/uploaded.
Additional parameter could be a QoS provided to you. If you want to watch a movie, then a
low QoS may work because some data loss may be acceptable, but if you are downloading a zip file,
then a single byte loss will corrupt your complete downloaded file.
Another parameter could be peak and off peak time to download a data file or to browse the
Internet.

8.4.4 SUPPLEMENTARY SERVICES:

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

Most of the supplementary services are being provided based on monthly rental or absolutely
free. For example, call waiting, call forwarding, calling number identification, and call on hold are
available at zero cost.
Call barring is a service, which service providers use just to recover their dues, etc., otherwise
this service is not being used by any subscriber.
Call conferencing service is a form of simple telephone call where the customers are charged
for multiple calls made at a time. No service provider charges extra charge for this service.
Closed User Group (CUG) is very popular and is mainly being used to give special discounts
to the users if they are making calls to a particular defined group of subscribers.
Advice of Charge (AoC) can be charged based on number of queries made by a subscriber.

CHAPTER 9: CONCLUSION

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

The communication development and the increase of living standard of people are directly
related to the more use of cellular mobile. Cellular mobile radio-the high end sophisticated technology
that enables everyone to communicate anywhere with anybody. The mobile telephony industry rapidly
growing and that has become backbone for business success and efficiency and a part of modern
lifestyles all over the world.
In this thesis work we have tried to give and over view of the GSM system. We hope that we
gave the general flavour of GSM and the philosophy behind its design. The GSM is standard that
insures interoperability without stifling competition and innovation among the suppliers to the benefit
of the public both in terms of cost and service quality.
The features and benefits expected in the GSM systems are superior speech quality, low
terminal, operational and service costs, a high level security, providing international roaming support
of low power hand portable terminals and variety of new services and network facilities. In near forth
coming days, the third generation mobile telephony becomes available whole over the world, which
will give the facility of videoconference in mobile telephone

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

CHAPTER 10: FUTURE SCOPE


Mobile communication is one of the fastest growing and demanding technologies in todays
worlds is the technology working behind mobile communications. The market is predicted to boom
tremendously for the next 5 years in all four continents.
GSM technology is the best technology to look for. This technology is reliable, advanced meets
the needs of the customer. It has got more advantages over other technologies used.

Dept. Of E.C.E

SVES-SRPT

OVERVIEW OF GSM
ARCHITECTURE

REFERENCES:
WWW.WIKIPEDIA.COM
WWW.ONLY4ENGINEER.COM
WWW.TUTORIALPOINTS.COM
WWW.GOOGLE.COM

Dept. Of E.C.E

SVES-SRPT

Вам также может понравиться