Академический Документы
Профессиональный Документы
Культура Документы
GSM Introduction
Technical Specification GSM Architecture
Channels
Frame Structure Advantages Disadvantages
Introduction
Global System for Mobile Communication (GSM) is a
second generation (2G) cellular standard. Developed by European Telecommunication Standards Institute(ETSI) in 1982. Supports eight time slotted users for each 200 KHz radio channel Deployed in Europe, Asia, Australia, South America and some parts of US.
Technical Specification
Spectrum
GSM 900 Mobile to BTS (uplink): 890-915 MHz BTS to Mobile(downlink):935-960 MHz Bandwidth : 2* 25 MHz GSM 1800 Mobile to BTS (uplink): 1710-1785 MHz BTS to Mobile(downlink) 1805-1880 MHz Bandwidth : 2* 75 MHz
Technical Specification
Carrier Separation : 200 KHz
Duplex Distance
: 45 MHz No. of RF carriers : 124 Access Method : TDMA/FDD Modulation Method : GMSK Modulation data rate : 270.833 Kbps
Type of Communication
Simplex Duplex
GSM Architecture
Mobile Station(MS)
Mobile Equipment
Portable, vehicle mounted, hand held device Uniquely identified by an IMEI (International Mobile Equipment Identity) Voice and data transmission Power level : 0.8W 20 W 160 character long SMS
Allows user to send and receive calls and receive other subscribed services Encoded network identification details - Key Ki,Kc and A3,A5 and A8 algorithms Protected by a password or PIN
networks, performs handovers between different BSSs and supports charging, accounting, and roaming of users between different providers in different countries consist of three major parts:
call handling Location updating Handover management Billing for all subscribers based in its area Reallocation of frequencies to BTSs in its area to meet heavy demands Signaling interface to databases like HLR, VLR. Gateway to SMS between SMS centers and subscribers Handle interworking function while working as GMSC
It is consist of following components:1. Operation and Maintenance Center(OMC) 2. Authentication Center(AUC) 3. Equipment Identity Register(EIR)
- It monitors traffic
- Contains status report of network entities - Subscriber and security management - Accounting and billing
Protects user identity and data transmission Algorithms for authentication, keys for encryption and values for authorization
Made up of three sub-classes: The White List- contains list of valid IMEIs The Black List- contains list of stolen or locked devices The Gray List- list of malfunctioning devices
Handover/Handoff
The process of changing cells during a call is called handover/ handoff. There are three types of handovers that can occur 1. between calls by the same BSC 2. between cells by different BSCs, but same MSC/VLR 3. between cells by different MSC/VLRs
Traffic Channel(TCH)
It carries digitally encoded user speech data.
Two types of TCH are:1. Half Rate TCH(TCH/h) carries user speech at data rate of 11.4 Kbps. 2. Full Rate TCH(TCH/f) carries user speech at data rate of 22.8 Kbps.
Control Channels(CCH)
It controls medium access, allocation of traffic channels and mobility management. It is of three types:Broadcast Channel(BCH) BTS uses this channel to signal information to all the MSs within the cell. There are three types :a) Broadcast Control Channel(BCCH)- It is used to broadcast information on forward channel such as cell and network identity etc. b) Frequency Correction Channel(FCCH)-The BTS sends information for frequency correction via this channel c) Synchronization Channel(SCH)-The BTS sends information about time synchronization via this channel
1.
medium by base station and mobile station in cellular networks can be made. It forms a duplex channel that allows simultaneous transmission in both directions. The two directions, mobile station to base station and vice versa are now separated using different frequencies. This scheme is hence called frequency division duplex (FDD)
FDD VS TDD
data and remaining 90 channels are used for customers. Each 248 channels are divided into 200 KHz frames having a duration of 4.615 ms. Each frame is again divided into 8 GSM times slots where each slot represents a physical TDM channel and lasts for 577 s.
overlapping. The first and last three bits of a normal burst (tail) are all set to 0 The training sequence in the middle of a slot is used to adapt the parameters of the receiver A flag S indicates whether the data field contains user or network control data.
email.
Disadvantages of GSM
Calls made through GSM mobiles can be tampered.
So there are many concerns regarding security. Due to pulse nature of TDMA it causes electronic interference with some devices like hearing aid, pacemaker etc. As multiple users share same bandwidth, it causes interference with the transmission. GSM has a fixed maximum cell site range of 35 km, which is imposed by technical limitations
Thank You