Вы находитесь на странице: 1из 67

WORLD

WIDE
WIRELESS
STANDARDS
INTRODUCTION TO GSM
• Global System for Mobile Communications is a set
of ETSI standards specifying the infrastructure for a
digital cellular service.
• The GSM Association is an international organization
founded in 1987, dedicated to providing, developing,
and overseeing the worldwide wireless standard of
GSM.
DEFINATION TO GSM
• The digital nature of GSM allows data, both
synchronous and asynchronous data, to be transported
as a bearer service to or from an ISDN terminal.
• Global System for Mobile (GSM) is a second
generation cellular standard developed to cater voice
services and data delivery using digital modulation.
Features of the GSM
• The most basic teleservice supported by GSM is
telephony.
• Features such as international roaming, caller
identification, call forwarding, call waiting, multi­
party conversations, and barring of outgoing
(international) calls, among others.
• Encryption of speech and data transmission over the
radio path.
Channels
• The physical channel in GSM is the timeslot.
• The logical channel is the information which goes
through the physical channel.
• Both user data and signaling are logical channels.
Into the architecture
• Mobile Station (MS)
Mobile Equipment (ME)
Subscriber Identity Module (SIM)

• Base Station Subsystem (BSS)


Base Transceiver Station (BTS)
Base Station Controller (BSC)
• Network Switching Subsystem (NSS)
Mobile Switching Center (MSC)
Home Location Register (HLR)
Visitor Location Register (VLR)
Authentication Center (AUC)
Equipment Identity Register (EIR)
GSM Network
• The GSM network is divided into three major
systems: the switching system (SS), the base station
system (BSS), and the operation and support system
(OSS):
The Switching System
• The switching system (SS) is responsible for performing
call processing and subscriber­related functions. The
switching system includes the following functional units:
– Home Location Register (HLR)—The HLR is a
database used for storage and management of
subscriptions. The HLR is considered the most important
database, as it stores permanent data about subscribers,
including a subscriber's service profile, location
information, and activity status.

– Mobile Services Switching Center (MSC)—The MSC


performs the telephony switching functions of the
system. It controls calls to and from other telephone and
data systems.
– Visitor Location Register (VLR)—The VLR is a
database that contains temporary information about
subscribers that is needed by the MSC in order to
service visiting subscribers. The VLR is always
integrated with the MSC.
– Authentication Center (AUC)—A unit called the
AUC provides authentication and encryption
parameters that verify the user's identity and ensure
the confidentiality of each call.
– Equipment Identity Register (EIR)—The EIR is a
database that contains information about the identity
of mobile equipment that prevents calls from stolen,
unauthorized, or defective mobile stations.
The Base Station System
• All radio­related functions are performed in the BSS,
which consists of base station controllers (BSCs) and
the base transceiver stations (BTSs).

– BSC: The BSC provides all the control functions


and physical links between the MSC and BTS. It is
a high­capacity switch that provides functions such
as handover, cell configuration data, and control of
radio frequency (RF) power levels in base
transceiver stations. A number of BSCs are served
by an MSC.
The Base Station System
(contd.)
– BTS: The BTS handles the radio interface to the
BTS: The BTS handles the radio interface to the
mobile station. The BTS is the radio equipment
(transceivers and antennas) needed to service each
cell in the network. A group of BTSs are
controlled by a BSC.
The Operation and Support
System
• The operations and maintenance center (OMC) is
connected to all equipment in the switching system
and to the BSC. The implementation of OMC is
called the operation and support system (OSS). The
OSS is the functional entity from which the network
operator monitors and controls the system.
GSM System
PSTN
Architecture ISDN
BSC PDN
MS BTS
MSC
GMSC

BTS BSC
VLR
MS

BTS EIR
AUC
MS HLR
GSM Functionality
• A mobile phone which is GSM compliant and operates
at the same frequency as the operator. Most phone
companies sell phones from third­party manufacturers.

• A SIM ("Subscriber Identity Module") card which is


activated by the operator once the billing relationship is
established. After activation the card is then
programmed with the subscriber's MSISDN ("Mobile
Subscriber Integrated Services Digital Network
Number") (the telephone number). Personal information
such as contact numbers of friends and family can also
be stored on the SIM by the subscriber.
GSM Functionality
(contd.)
• After subscribers sign up, information about their
identity (telephone number) and what services they
are allowed to access are stored in a "SIM record" in
the Home Location Register (HLR).

• Once the SIM card is loaded into the phone and the
phone is powered on, it will search for the nearest
mobile phone mast, also called a Base Transceiver
Station or BTS. If a mast can be successfully
contacted, then there is said to be coverage in the
area.
GSM Functionality
(contd.)
• Each geographic area has a database called
the Visitor Location Register (VLR) which contains
details of all the mobiles currently in that area.
Whenever a phone attaches, or visits, a new area,
the Visitor Location Register must contact
the Home Location Register to obtain the details for
that phone. The current cellular location of the phone
(i.e. which BTS it is at) is entered into the VLR
record and will be used during a process
called paging when the GSM network wishes to
locate the mobile phone.
GSM Functionality
(contd.)
• Every SIM card contains a secret key, called the Ki, which is used to
provide authentication and encryption services. This is useful to prevent
theft of service, and also to prevent "over the air" snooping of a user's
activity. The network does this by utilizing the Authentication Center and
is accomplished without transmitting the key directly.

• Every GSM phone contains a unique identifier (different from the phone
number), called the International Mobile Equipment Identity (IMEI).
This can be found by dialing " *#06# ". When a phone contacts the
network, its IMEI may be checked against the Equipment Identity
Register to locate stolen phones and facilitate monitoring.
Data transmission
• The GSM standard also provides separate facilities for
transmitting digital data. This allows a mobile phone
to act like any other computer on the Internet, sending
and receiving data via the Internet Protocol.
• The mobile may also be connected to a desktop
computer, laptop, or PDA, for use as a network
interface (just like a modem or Ethernet card, but using
one of the GSM data protocols described below
instead of a PSTN­compatible audio channel or an
Ethernet link to transmit data).
• In addition to general Internet access, other special
services may be provided by the mobile phone
operator, such as SMS.
Functional Elements
– Message Center (MXE): The MXE is a node that
provides integrated voice, fax, and data
messaging , handles short message service, cell
broadcast, voice mail, fax mail, e­mail .
– Mobile Service Node (MSN): The MSN is the
node that handles the mobile intelligent network
(IN) services.
– Gateway Mobile Services Switching Center
(GMSC): A gate way is a node used to
interconnect two networks.
– GSM interworking unit (GIWU): The GIWU
consists of both hardware and software that
provides an interface to various networks for data
communications.
Sharing
• GSM uses TDMA and FDMA to let everybody talk.
• FDMA: 25MHz freq. is divided into 124 carrier
frequencies. Each base station gets few of those.
• TDMA: Each carrier frequency is divided into bursts
[0.577 ms]. 8 bursts are a frame.
GSM Operation
GSM Specifications
• Frequency band—The frequency range specified for
GSM is 1,850 to1,990 MHz (mobile station to base
station).
• Duplex distance—The duplex distance is 80 MHz.
Duplex distance is the distance between the uplink
and downlink frequencies. A channel has two
frequencies, 80 MHz apart .
• Channel separation—The separation between
adjacent carrier frequencies. In GSM, this is 200 kHz.
• Access method—GSM utilizes the time division
multiple access (TDMA) concept. Each call is
assigned a particular time slot.
GSM Specifications (contd.)
• Modulation—Modulation is the process of sending a
signal by changing the characteristics of a carrier
frequency. This is done in GSM via Gaussian
minimum shift keying (GMSK).
• Transmission rate—GSM is a digital system with an
over­the­air bit rate of 270 kbps.
• Speech coder—GSM uses linear predictive coding
(LPC). The purpose of LPC is to reduce the bit rate.
The LPC provides parameters for a filter that mimics
the vocal tract. The signal passes through this filter,
leaving behind a residual signal. Speech is encoded at
13 kbps.
GSM Subscriber Services
• There are two basic types of services offered through
GSM: telephony (also referred to as teleservices) and
data (also referred to as bearer services).
• Telephony services are mainly voice services that
provide subscribers with the complete capability
(including necessary terminal equipment) to
communicate with other subscribers.
• Data services provide the capacity necessary to
transmit appropriate data signals between two access
points creating an interface to the network.
• In addition to normal telephony and emergency
calling, the following subscriber services are
supported by GSM:
• Dual­tone Multi frequency (DTMF)

• Facsimile group III

• Short message services

• Cell broadcast

• Voice mail

• Fax mail
Supplementary Services
• GSM supports a comprehensive set of supplementary
services that can complement and support both
telephony and data services. Supplementary services
are defined by GSM and are characterized as
revenue­generating features. A partial listing of
supplementary services follows :
– Call forwarding: This service gives the subscriber
the ability to forward incoming calls to another
number if the called mobile unit is not reachable, if
it is busy, if there is no reply, or if call forwarding
is allowed unconditionally.
Supplementary Services
(contd.)
• Barring of outgoing calls: This service makes it
possible for a mobile subscriber to prevent all
outgoing calls.
• Barring of incoming calls—This function allows the
subscriber to prevent incoming calls. The following
two conditions for incoming call barring exist: baring
of all incoming calls and barring of incoming calls
when roaming outside the home PLMN.
• Advice of charge (AoC)—The AoC service provides
the mobile subscriber with an estimate of the call
charges.
Supplementary Services
(contd.)
• Call hold—This service enables the subscriber to
interrupt an ongoing call and then subsequently
reestablish the call. The call hold service is only
applicable to normal telephony.
• Call waiting: This service enables the mobile
subscriber to be notified of an incoming call during a
conversation. The subscriber can answer, reject, or
ignore the incoming call.
• Multiparty service: The multiparty service enables a
mobile subscriber to establish a multiparty
conversation—that is, a simultaneous conversation
between three and six subscribers.
Supplementary Services
(contd.)
• Calling line identification presentation/restriction:
These services supply the called party with the
integrated services digital network (ISDN) number of
the calling party.
• Closed user groups (CUGs): CUGs are generally
comparable to a PBX. They are a group of
subscribers who are capable of only calling
themselves and certain numbers
Advantages of GSM
• GSM is already used worldwide with over 450 million
subscribers.
• International roaming permits subscribers to use one
phone throughout Western Europe. CDMA will work in
Asia, but not France, Germany, the U.K. and other
popular European destinations.
• GSM is mature, having started in the mid­80s. This
maturity means a more stable network with robust
features. CDMA is still building its network.
• GSM's maturity means engineers cut their teeth on the
technology, creating an unconscious preference.
• The availability of Subscriber Identity Modules, which
are smart cards that provide secure data encryption give
GSM m­commerce advantages.
Disadvantages of GSM
• Lack of access to burgeoning.
• GSM has a fixed maximum cell site range of 35 km,
which is imposed by technical limitations.
INTRODUCTION TO CDMA
• stands for Code Division Multiple Access. Both data
and voice are separated from signals using codes and
then transmitted using a wide frequency range.
Because of this, there are more space left for data
transfer (this was one of the reasons why CDMA is
the preferred technology for the 3G generation, which
is broadband access and the use of big multimedia
messages).
DEFINATION TO CDMA
• Multiple users occupying the same band by having
different codes is known as CDMA ­ Code Division
Multiple Access system
• It employs a commercial adaptation of a military
spread­spectrum technology.
• Based on spread spectrum theory, it gives essentially
the same services and qualities as wireline service.
• The receiver undoes the randomization to collect the
bits together and produce the sound.
• Since there are multiple users transmitting over the same
channel, a method must be established so that individual
users will not disrupt one another. There are essentially
three ways to do this:

 FREQUENCY DIVISION MULTIPLE ACCESS: In this technique,


the available bandwidth is split up into non-overlapping
frequency bands and these disjoint sub bands of
frequency are allocated to the different users on a
continuous time basis. In order to reduce interference
between users allocated adjacent channel bands,
channel bands are used to act as buffer zones. These
guard bands are necessary because of the impossibility
of achieving ideal filtering for separating the different
users. It could be compared to AM or FM broadcasting
radio where each station has a frequency assigned.
– TIME DIVISION MULTIPLE ACCESS: In
this technique, each user is allocated
the full spectral occupancy of. The
channel, but only for a short duration
of time called time slot. Buffers zones
are in the form of guard times are
inserted between the assigned time
slots. This is done to reduce
interference between users by allowing
for time uncertainty that arises due to
system imperfections, especially in
synchronization scheme
DRAWBACKS:
In both FDMA and TDMA, only one
subscriber at a time is assigned to a
channel. No other conversion can
access this channel until the
subscriber’s call is finished or until that
original call to handed off to a different
channel by the system. Voice data
tends to be burst in nature. So much of
the time, no data is being sent over the
channel. This inefficiency tends to limit
the capacity of the system.
 CODE DIVISION MULTIPLE
ACCESS: This is a hybrid combination of
FDMA and TDMA. For example, frequency
hopping may be employed to ensure during
each successive time slot, the frequency
bands assigned to the users are recorded in
random manner. An important advantage
of CDMA over FDMA and TDMA is that it can
provide for secure communication
 Basis of CDMA is the spread spectrum
technology:
Spread Spectrum
• SPREAD SPECTRUM is a means of
transmission in which the data sequence
occupies a bandwidth in excess of the
minimum bandwidth necessary to send it.
• Spread spectrum is accomplished before
transmission through the use of a code that is
independent of the data sequence (PN).
• Another application is in multiple access
communication in which a number of
independent users can share a common
channel without an external synchronizing
mechanism.
Types Of Spread

Spectrum
Direct sequence spread spectrum:
– DS sequence allows each station to transmit over the
entire frequency Spectrum all the time.
– Multiple simultaneous transmissions are separated
using some sort of coding technique that is each user
is assigned a chip sequence.
– The sender and receiver synchronize by the receiver
locking into the chip sequence and the sender and
receiver locking into the chip sequence of the sender.
– All the other (unsynchronized) transmission is then
seen as random noise. So with CDMA each user uses
the full frequency spectrum.
• They employ a high speed code
sequence along with the basic
information being sent, to modulate
their RF carriers. The high speed
code sequence is used directly
setting the transmitted RF
bandwidth.
• Binary phase shift keying (BPSK) is
the most common technique used in
DS system. Direct sequence is, in
essence, multiplication of a more
conventional communication
waveform by PN sequence in the
Frequency Hopping Spread
Spectrum
• FH – CDMA is a kind of spread spectrum
technology that enables many users to share
the same channel by employing a unique
hopping pattern to distinguish different users’
transmission.
• The type of spread spectrum in which the
carrier hops randomly from one frequency to
another is called FH spread spectrum.
• A common modulation format for FH system is
that of M-ary frequency shift keying (MFSK). the
combination is referred to as FH/MFSK.
• A major advantage of frequency hopping is that it
can be implemented over a much larger
frequency band than it is possible to implement
DS- spreading, and the band can be
noncontiguous.
• Another major advantage is that frequency
hopping provides resistance to multiple – access
interference while not requiring power control to
prevent near – far problems.
• Frequency hopping does not cover the entire
spread spectrum. Instantaneously, we are led to
consider the rate at which the hops occur.
• So, we may identify two basic
characterizations of frequency hopping:
– Slow frequency hopping, in which the symbol
rate Rs of MFSK signal is an integrator multiple
of the hop rate Rh . that is, several symbols are
transmitted on each frequency hop
– Fast frequency hopping, in which the hop rate Rh
is an integrator multiple of the MFSK symbol rate
Rs. that is, the carrier frequency will change or
hop several times during the transmission of one
symbol.
Features
• With CDMA, unique digital codes, rather than
separate RF frequencies or channels, are used to
differentiate subscribers.
• The codes are shared by both the mobile station
(cellular phone) and the base station, and are
called pseudo-random code sequences.
• Since each user is separated by a unique code, all
users can share the same frequency band (range
of radio spectrum). This gives many unique
advantages to the CDMA technique over other RF
techniques in cellular communication.
Channel
Into the architecture
• Mobile Station
• Base station (BS)
• Base station controller (BSC)
• Mobile switching center (MSC)
• Home location register (HLR)
• Visitor location register (VLR)
• Authentication center (AC)
• Operation and administration (OAM)
Information on CDMA
Architecture
• Mobile station: The CDMA mobile station (or
mobile phone) communicates with other parts of
the system through the base-station system.
    
• Base station (BS): The base station (BS)
handles the radio interface to the mobile station.
The base station is the radio equipment
(transceivers and antennas)
    
• Base station controller (BSC): The BSC
provides the control functions and physical links
between the MSC and BTS. It provides functions
such as handover, cell configuration data and
control of RF power levels in base transceiver
stations. A number of BSCs are served by a MSC.
    
• Mobile switching center (MSC): The MSC
performs the telephony switching functions of
the system. It also performs such functions as
toll ticketing, network interfacing, common
channel signalling , and others.
    
• Home location register (HLR): The HLR
database is used for storage and management
of subscriptions. The home location register
stores permanent data about subscribers,
including a subscriber's service profile, location
information, and activity status.
    
• Visitor location register (VLR): The VLR
database contains temporary information about
subscribers that is needed by the mobile
services switching center (MSC) in order to
service visiting subscribers.     
• Authentication center (AC): The AC provides
authentication and encryption parameters that verify the
user's identity and ensure the confidentiality of each call.
The authentication center (AUC) also protects network
operators from fraud.
    
• Operation and administration (OAM): The OAM is the
functional entity from which the network operator monitors
and controls the system. The purpose of operation and
support system is to offer support for centralized, regional,
and local operational and maintenance activities that are
required for a CDMA network.
CDMA Functionality
• The mobile initiates the decision as to whether the
session will be a packet data session, voice session,
or concurrent (meaning voice and data).
• After the decision has been made, the mobile sends
an origination message that includes an indication
that this is a voice data session.
• The RAN informs the MSC, and the MSC performs
an authentication procedure similar to the circuit
switched authentication process.
• Finally, the BSC and BTS allocate radio resources
and establish a low data rate dedicated channel. In
contrast to the radio channel used for voice calls,
this low rate data channel uses the Radio Link
Protocol (RLP) to provide better error performance.
• The next step is to allocate resources in the new
packet switched core network domain.
• The next step in establishing the packet data
session is to allocate resources on the Radio –
Packet (R-P) interface.
• Once resources have been established, the
mobile communicates with the PDSN over the
allocated channels in order to set up a Point-to-
Point Protocol (PPP) connection.
• During this process, the packet switched core
network, specifically the PDSN, assigns an
Internet Protocol (IP) address to the mobile
station.
• Before completing the PPP connection, there is
another level of authentication. Authentication
has already been performed from a wireless
access perspective, now it will be performed
based on the Internet service.
• The PDSN talks to the AAA server using
the Remote Access Dial-In User Service
(RADIUS) protocol to authenticate the
user. Authorization to access the
requested service is based on the
subscriber profile stored in the AAA. If
authorization is successful, the mobile is
granted access to the IP network. 
Applications
• Though CDMA’s application in cellular telephony
is relatively new, it is not a new technology.
CDMA has been used in many military
applications, such as:
– Anti-jamming (because of the spread signal, it is
difficult to jam or interfere with a CDMA signal).
– Ranging (measuring the distance of the
transmission to know when it will be received).
– Secure communications (the spread spectrum signal
is very hard to detect).
Advantages of CDMA
• Increased cellular communications security.
• Simultaneous conversations.
• Increased efficiency, meaning that the carrier
can serve more subscribers.
• Smaller phones.
• Low power requirements and little cell-to-cell
coordination needed by operators.
• Extended reach - beneficial to rural users
situated far from cells.
Disadvantages of CDMA
• Due to its proprietary nature, all of
CDMA's flaws are not known to the
engineering community.
• CDMA is relatively new, and the
network is not as mature as GSM.
• CDMA cannot offer international
roaming, a large GSM advantage
GSM v/s CDMA
• Coverage: The most important factor is
getting service in the areas you will be
using your phone. Upon viewing
competitors' coverage maps you may
discover that only GSM or CDMA carriers
offer cellular service in your area. If so,
there is no decision to be made, but most
people will find that they do have a
choice.
• Data Transfer Speed: CDMA has been
traditionally faster than GSM, though both
technologies continue to rapidly leapfrog
along this path.
• Subscriber Identity Module (SIM)
cards: Phones that are card-enabled can
be used with any GSM carrier. The CDMA
equivalent, a R-UIM card, CDMA carriers
require proprietary handsets that are
linked to one carrier only and are not
card-enabled.
• Roaming: GSM carriers, have roaming
contracts with other GSM carriers. CDMA
networks may not cover rural areas as
well as GSM carriers
• International Roaming: If you need to
make calls to other countries, a GSM
carrier can offer international roaming, as
GSM networks dominate the world market.
CDMA phones that are not card-enabled do
not have this capability, however there are
several countries that use CDMA networks.
• It is harder to implement a CDMA network.
The tower placement is more difficult.
Dealing with hills is more difficult than with
GSM/TDMA .
Conclusion
• CDMA evolution ground is wider and in a few
years it will be superior than GSM
• CDMA is a better technology than GSM, but GSM
is MORE wisely used:
– CDMA is cheaper, to maintain and deploy, and
upgrade, not to mention that the backbone of its
towers is backwards compatible .
– CDMA provides FAR superior data speeds than GSM.
– More users can connect to a tower, due to have a
wider spectrum than GSM
– GSM can be easily hacked whereas CDMA cannot.

Вам также может понравиться