SlideShare a Scribd company logo
1 of 63
GSM
Global System for Mobile
Communications
Radio Frequencies
 Operates in the 1850 MHz band and from:
– 1850 to 1910 MHz Mobile to Base
– 1930 – 1990 MHz Base to Mobile
 There are 300 forward/reverse channels in this
band.
 Each channel is 200 KHz
 GSM uses TDMA to fit 8 conversations on
a channel.
 So, technically, GSM is TDMA and FDMA
based.
GSM Frequency Band
GSM operates at four main frequency bands
:
i.900 MHz : Used by most GSM networks.
ii.1800 MHz : In UK
iii. 1900 MHz : AS PCS concept in USA.
iv.800 MHZ : Enhancing now.
Key Terms
An MS can have one of the following states :
1.Idle: MS is ON but a call is not in progress.
Registration, Roaming, International Roaming,
Location Updating, Paging.
2.Active : MS is ON and A call is in progress.
Handover
3.Detached : MS is OFF.
GSM Services
 GSM was designed to do 3 things:
– 1. Bearer data services: Faxes, text
messages, web pages.
 Basic GSM had a basic data rate that is limited to
9.6 kbps
– Extended by GMRS and EDGE to around 384 Kbps
– 2. Voice traffic
 But, at a lower quality than analog.
– 3. Other features:
 Call forwarding, caller id, etc…
– Meaning, we need to connect to the SS7 network
SIM Card Secrets
 The SIM card has a secret serial number
that is only known by your cellular
provider and the SIM card.
– You, as the customer, do not know the
number.
 This secret number acts as a key, and it is
32 bits in length.
Authentication and Security
 GSM uses a challenge/response public key
setup.
 The base station sends a random number to the
mobile.
– This acts as the base station’s public key.
 The mobile then uses an algorithm called A3 to
encrypt it’s secret key using the random public
key that it was sent by the base station.
– A5 is a derivative of DES.
 Several rounds of shifts and XORs.
Authentication and Security
 This encrypted information is then sent
back to the base station.
 The base station performs a reverse
operation, and checks to see that the
mobile sent the correct secret code.
– If not, it is denied access.
 A3 has proved to be very difficult to break.
– Though, given a significant amount of time, it
can be broken.
Authentication and Security
 GSM also uses another database for
security.
 This database maintains a list of stolen
cell phones, and cell phones that have
technical errors.
– These are also not allowed access to the
digital network.
GSM conclusion
 Widely used.
– Upwards of 70% of phones.
 Uses SIM cards so customers can use any phone
and for security.
 Allows more customers than analog.
 Worse voice quality than analog.
 Purely digital.
 Open source, very complex standard.
 Uses TDMA.
 Will be replaced by CDMA in the near future.
What is Cell?
 In wireless telephony, a cell is the geographical area covered by a RF.
 The transmitter facility itself is called the cell site.
 Several coordinated cell sites are called a cell system.

 When you sign up with a cellular telephone service provider, you generally
are given access to their cell system, which is essentially local.
 When travelling out of the range of this cell system, the cell system can
enable you to be transferred to a neighboring company's cell system
without your being aware of it. This is called roaming
service.
Why cellular systems?
 Solves the problem of spectral congestion
 Reuse of radio channel in different cells
 Enable a fixed number of channels to serve an arbitrarily
large number of
users by reusing the channel throughout the coverage
region
Why hexagon for theoretical
coverage?
For a given distance between the center of a polygon and its farthest perimeter
points, the hexagon has the largest area of the three
Thus by using hexagon geometry, the fewest number of cells can cover a
geographic region, and hexagon closely approximates a circular radiation
pattern which would occur for an omnidirectionl BS antenna and free space
propagation
When using hexagons to model a coverage areas, BS t ransmitters are depicted
as ither being in the center of the cell (center-excited cells) or on the three of
the six cell vertices (edge-excited cells)
Normally omnidirectional antennas are used in center-excited cells and
directional antennas are used in corner-excited cel
ls
GSM Architecture
Mobile Station (MS)
Mobile Equipment (ME)
Subscriber Identity Module (SIM)
Base Station Subsystem (BSS)
Base Transceiver Station (BTS)
Base Station Controller (BSC)
Network Switching Subsystem(NSS)
Mobile Switching Center (MSC)
Home Location Register (HLR)
Visitor Location Register (VLR)
Authentication Center (AUC)
Equipment Identity Register (EIR)
Operation and Support Subsystem (OSS)
System Architecture
Mobile Station (MS)
The Mobile Station is made up of two entities:
1. Mobile Equipment (ME)
2. Subscriber Identity Module (SIM)
System Architecture
Mobile Station (MS)
Mobile Equipment
 Portable,vehicle mounted, hand held device
 Uniquely identified by an IMEI (International
Mobile Equipment Identity)
 Voice and data transmission
 Monitoring power and signal quality of surrounding
cells for optimum handover
 Power level : 0.8W – 20 W
 160 character long SMS.
System Architecture
Mobile Station (MS) contd.
Subscriber Identity Module (SIM)
 Smart card contains the International Mobile
Subscriber Identity (IMSI)
 Allows user to send and receive calls and receive other
subscribed services
 Encoded network identification details
- Key Ki,Kc and A3,A5 and A8 algorithms
 Protected by a password or PIN
 Can be moved from phone to phone – contains key
information to activate the phone
BSC
 Typically a BSC has tens or even hundreds of BTSs under its control.
 The BSC handles allocation of radio channels, receives
measurements from the mobile phones, and controls handovers
from BTS to BTS (except in the case of an inter-BSC handover in
which case control is in part the responsibility of the anchor MSC).
 A key function of the BSC is to act as a concentrator where many
different low capacity connections to BTSs (with relatively low
utilisation) become reduced to a smaller number of connections
towards the mobile switching center (MSC) (with a high level of
utilisation).
Some base station equipment
Some more base station
equipment
Typical macro cell
Typical micro cell
 Source Coding :The process by which information symbols are mapped to
alphabetical symbols.
 The mapping is generally performed in sequences or groups of information
and alphabetical symbols.
 Channel coding is a technique used for controlling errors in data
transmissionover unreliable or noisy communication channels.
It includes
 Digital Modulation schemes
 Line coding schemes
 Forward Correction(FEC) codes
 Interleaving :Interleaving, a technique for making FEC more robust with
respect to burst errors;
 Ciphering:A cipher (pronounced SAI-fuhr) is any method of encrypting text
(concealing its readability and meaning). It is also sometimes used to refer
to the encrypted text message itself although here the term ciphertext is
preferred.
 Burst formating : Burst is a term used in a number of information
technology contexts to mean a specific amount of data sent or received in
one intermittent operation.
 Modulation :n electronics and telecommunications, modulation is the
process of varying one or more properties of a periodic waveform, called
the carrier signal, with a modulating signal that typically contains
information to be transmitted.
GSM Operation
Speech decoding
Channel decoding
De-interleaving
Burst Formatting
De-ciphering
DemodulationModulation
Ciphering
Burst Formatting
Interleaving
Channel Coding
Speech coding
Radio Interface
Speech Speech
13 Kbps
22.8 Kbps
22.8 Kbps
33.6 Kbps
33.6 Kbps
270.83 Kbps
GSM Architecture
GSM Burst Periods
 Since GSM is TDMA based, it uses burst
periods to make up a frame.
– 8 burst periods make up one frame.
– A burst is like a slot in the train.
– A burst period is where a phone gets to send
digital information.
 Phones send around 14 bits of information in every
burst.
– However, a burst period only lasts .577 ms.
 Phones are only bursting information at around
1700 times a second, much less than the 8000
times a second a landline phone samples at.
GSM Frames
 8 burst periods make 1 frame.
 The frame length in time is 4.615 ms
– .577 ms times 8
 Each frame carries 164 bits
– 114 are for voice
– The rest are for synchronization and CRC checks
 Each frame can carry up to 8 voice samples, or,
the frame can be dedicated to other necessary
information.
GSM Frames
 Different frames mean different things.
– For instance, this data structure contains
information about the cell site.
 The cell phone scans for this information when it is
turned on.
GSM Frames
 This is the burst that occurs when the
mobile transmits its access key back to the
base station.
Speech Coding
 GSM uses LPC – Linear Predictive Coding.
– Uses interpolation.
– Basically, previous samples, which don’t change very
quickly, are used to predict current samples.
 So, instead of actually sending the voice sample,
the delta in the voice sample is sent.
 Also, silence is not transmitted.
– This increases throughput by about 40%.
– This bits can be used for other conversations.
Digital Modulation
 Uses Gaussian minimum shift keying.
 Very complex, uses filters, phase shifts,
and frequency shifts to actually send out
binary digits.
Power Requirements
 Since GSM is purely digital, it requires a
lot less power since it doesn’t have to
transmit an analog wave.
 The maximum output power of a GSM
phone is only 2 watts.
– And this can be notched down by the
controlling cell phone tower.
– The minimum power is only 20 mW.
GSM Call Processing
 Unlike AMPS, the cell tower can transmit
on any of its frequencies.
 The cell phone is actually pre-programmed
in the SIM card to have a set of radio
frequencies that it should check first.
– When this fails, it needs to search through all
frequencies.
 When it detects the tower identifying
itself, call processing begins.
SIM Card Secrets
 The SIM card has a secret serial number
that is only known by your cellular
provider and the SIM card.
– You, as the customer, do not know the
number.
 This secret number acts as a key, and it is
32 bits in length.
Authentication and Security
 GSM uses a challenge/response public key
setup.
 The base station sends a random number to the
mobile.
– This acts as the base station’s public key.
 The mobile then uses an algorithm called A3 to
encrypt it’s secret key using the random public
key that it was sent by the base station.
– A5 is a derivative of DES.
 Several rounds of shifts and XORs.
Authentication and Security
 This encrypted information is then sent
back to the base station.
 The base station performs a reverse
operation, and checks to see that the
mobile sent the correct secret code.
– If not, it is denied access.
 A3 has proved to be very difficult to break.
– Though, given a significant amount of time, it
can be broken.
Authentication and Security
 GSM also uses another database for
security.
 This database maintains a list of stolen
cell phones, and cell phones that have
technical errors.
– These are also not allowed access to the
digital network.
General architecture of BTS
A BTS is usually composed of:
 Transceiver (TRX) :Provides transmission and reception of signals. It
also does sending and reception of signals to and from higher
network entities (like the base station controller in mobile
telephony).
 Power amplifier (PA) :Amplifies the signal from TRX for transmission
through antenna; may be integrated with TRX.
 CombinerCombines feeds from several TRXs so that they could be
sent out through a single antenna. Allows for a reduction in the
number of antenna used.
 Multiplexer :For separating sending and receiving signals to/from
antenna. Does sending and receiving signals through the same
antenna ports (cables to antenna) used.
General architecture of BTS
 AntennaThis is the structure that the BTS lies underneath; it can be
installed as it is or disguised in some way (Concealed cell sites).
 Alarm extension systemCollects working status alarms of various
units in the BTS and extends them to operations and maintenance
(O&M) monitoring stations.
 Control function :Controls and manages the various units of BTS,
including any software. On-the-spot configurations, status changes,
software upgrades, etc. are done through the control function.
 Baseband receiver unit (BBxx)Frequency hopping, signal DSP.
GSM conclusion
 Widely used.
– Upwards of 70% of phones.
 Uses SIM cards so customers can use any phone
and for security.
 Allows more customers than analog.
 Worse voice quality than analog.
 Purely digital.
 Open source, very complex standard.
 Uses TDMA.
 Will be replaced by CDMA in the near future.

More Related Content

What's hot (20)

GSM Base transceiver station
GSM Base transceiver stationGSM Base transceiver station
GSM Base transceiver station
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Gsm (3)
Gsm (3)Gsm (3)
Gsm (3)
 
Cellular Mobile Communication Concept and GSM Frequency Band
Cellular Mobile Communication Concept and GSM Frequency BandCellular Mobile Communication Concept and GSM Frequency Band
Cellular Mobile Communication Concept and GSM Frequency Band
 
Overview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & OperationsOverview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & Operations
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
GSM and Basics of 3G
GSM and Basics of 3GGSM and Basics of 3G
GSM and Basics of 3G
 
Mobile data networks
Mobile data networksMobile data networks
Mobile data networks
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
GSM dan GPRS basic
GSM dan GPRS basicGSM dan GPRS basic
GSM dan GPRS basic
 
2G & 3G Overview
2G & 3G Overview2G & 3G Overview
2G & 3G Overview
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Cellular Communication
Cellular CommunicationCellular Communication
Cellular Communication
 
Wireless networks gsm cdma
Wireless networks  gsm cdmaWireless networks  gsm cdma
Wireless networks gsm cdma
 
Gsm
GsmGsm
Gsm
 
Gsm VS cdma
Gsm VS cdma Gsm VS cdma
Gsm VS cdma
 
Ch1 gsm “ global system for mobile communication
Ch1 gsm “ global system for mobile communicationCh1 gsm “ global system for mobile communication
Ch1 gsm “ global system for mobile communication
 
GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service Model
 

Similar to GSM Radio Frequencies and Key Concepts

Similar to GSM Radio Frequencies and Key Concepts (20)

Gsm
Gsm Gsm
Gsm
 
Intro to gsm
Intro to gsmIntro to gsm
Intro to gsm
 
Intro To GSM
Intro To  GSMIntro To  GSM
Intro To GSM
 
Gsm ( Cdma ( Gsm )
Gsm ( Cdma ( Gsm )Gsm ( Cdma ( Gsm )
Gsm ( Cdma ( Gsm )
 
Gsmadvanced
GsmadvancedGsmadvanced
Gsmadvanced
 
Pawan..bsnl
Pawan..bsnlPawan..bsnl
Pawan..bsnl
 
Journey of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMAJourney of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMA
 
My Seminar
My SeminarMy Seminar
My Seminar
 
PCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESPCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIES
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile Computing
 
Gsm overview11
Gsm overview11Gsm overview11
Gsm overview11
 
G second generation network
G second generation networkG second generation network
G second generation network
 
GSM network
GSM networkGSM network
GSM network
 
438lecture1
438lecture1438lecture1
438lecture1
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.ppt
 
1 g 2g_3g_4g_tutorial
1 g 2g_3g_4g_tutorial1 g 2g_3g_4g_tutorial
1 g 2g_3g_4g_tutorial
 
GSM Module
GSM ModuleGSM Module
GSM Module
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Ons training day 1
Ons training day 1Ons training day 1
Ons training day 1
 

More from UthsoNandy

Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Professional ethic's
Professional ethic'sProfessional ethic's
Professional ethic'sUthsoNandy
 
GPRS( General Packet Radio Service)
GPRS( General Packet Radio Service)GPRS( General Packet Radio Service)
GPRS( General Packet Radio Service)UthsoNandy
 
Gas turbine power_plant_new
Gas turbine power_plant_newGas turbine power_plant_new
Gas turbine power_plant_newUthsoNandy
 
Renewable Energy Sources
Renewable Energy SourcesRenewable Energy Sources
Renewable Energy SourcesUthsoNandy
 
Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...
Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...
Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...UthsoNandy
 
Power system operation & control( Switching & Controlling System)
Power system operation & control( Switching & Controlling System)Power system operation & control( Switching & Controlling System)
Power system operation & control( Switching & Controlling System)UthsoNandy
 
Power system 2(High Voltage DC,Cables and Different types cable,Transmission)
Power system 2(High Voltage DC,Cables and Different types cable,Transmission)Power system 2(High Voltage DC,Cables and Different types cable,Transmission)
Power system 2(High Voltage DC,Cables and Different types cable,Transmission)UthsoNandy
 
Logical channels
Logical channelsLogical channels
Logical channelsUthsoNandy
 
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...UthsoNandy
 
Nuclear power plant
Nuclear power plantNuclear power plant
Nuclear power plantUthsoNandy
 
Fundamentals of-refrigeration-systempdf
Fundamentals of-refrigeration-systempdfFundamentals of-refrigeration-systempdf
Fundamentals of-refrigeration-systempdfUthsoNandy
 
Lectures upto block diagram reduction
Lectures upto block diagram reductionLectures upto block diagram reduction
Lectures upto block diagram reductionUthsoNandy
 
Induction motors
Induction motorsInduction motors
Induction motorsUthsoNandy
 
Eee 223 oscilators
Eee 223 oscilatorsEee 223 oscilators
Eee 223 oscilatorsUthsoNandy
 
EEE 321( Power System Analysis and Principle of Power System and Power syste...
EEE 321( Power System Analysis and Principle of Power System and  Power syste...EEE 321( Power System Analysis and Principle of Power System and  Power syste...
EEE 321( Power System Analysis and Principle of Power System and Power syste...UthsoNandy
 
EEE 453( Semiconductor Switch and Triggering Device)
EEE 453( Semiconductor Switch and Triggering Device) EEE 453( Semiconductor Switch and Triggering Device)
EEE 453( Semiconductor Switch and Triggering Device) UthsoNandy
 
Eee 223 power-amplifiers
Eee 223 power-amplifiersEee 223 power-amplifiers
Eee 223 power-amplifiersUthsoNandy
 

More from UthsoNandy (20)

Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Professional ethic's
Professional ethic'sProfessional ethic's
Professional ethic's
 
GPRS( General Packet Radio Service)
GPRS( General Packet Radio Service)GPRS( General Packet Radio Service)
GPRS( General Packet Radio Service)
 
Gas turbine power_plant_new
Gas turbine power_plant_newGas turbine power_plant_new
Gas turbine power_plant_new
 
Renewable Energy Sources
Renewable Energy SourcesRenewable Energy Sources
Renewable Energy Sources
 
Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...
Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...
Techniques of Improving Cell Capacity and Coverage & Hand off/Handover & GSM ...
 
Power system operation & control( Switching & Controlling System)
Power system operation & control( Switching & Controlling System)Power system operation & control( Switching & Controlling System)
Power system operation & control( Switching & Controlling System)
 
Power system 2(High Voltage DC,Cables and Different types cable,Transmission)
Power system 2(High Voltage DC,Cables and Different types cable,Transmission)Power system 2(High Voltage DC,Cables and Different types cable,Transmission)
Power system 2(High Voltage DC,Cables and Different types cable,Transmission)
 
Logical channels
Logical channelsLogical channels
Logical channels
 
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
 
Nuclear power plant
Nuclear power plantNuclear power plant
Nuclear power plant
 
Steam turbine
Steam turbineSteam turbine
Steam turbine
 
Gas power-09
Gas power-09Gas power-09
Gas power-09
 
Fundamentals of-refrigeration-systempdf
Fundamentals of-refrigeration-systempdfFundamentals of-refrigeration-systempdf
Fundamentals of-refrigeration-systempdf
 
Lectures upto block diagram reduction
Lectures upto block diagram reductionLectures upto block diagram reduction
Lectures upto block diagram reduction
 
Induction motors
Induction motorsInduction motors
Induction motors
 
Eee 223 oscilators
Eee 223 oscilatorsEee 223 oscilators
Eee 223 oscilators
 
EEE 321( Power System Analysis and Principle of Power System and Power syste...
EEE 321( Power System Analysis and Principle of Power System and  Power syste...EEE 321( Power System Analysis and Principle of Power System and  Power syste...
EEE 321( Power System Analysis and Principle of Power System and Power syste...
 
EEE 453( Semiconductor Switch and Triggering Device)
EEE 453( Semiconductor Switch and Triggering Device) EEE 453( Semiconductor Switch and Triggering Device)
EEE 453( Semiconductor Switch and Triggering Device)
 
Eee 223 power-amplifiers
Eee 223 power-amplifiersEee 223 power-amplifiers
Eee 223 power-amplifiers
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

GSM Radio Frequencies and Key Concepts

  • 1. GSM Global System for Mobile Communications
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Radio Frequencies  Operates in the 1850 MHz band and from: – 1850 to 1910 MHz Mobile to Base – 1930 – 1990 MHz Base to Mobile  There are 300 forward/reverse channels in this band.  Each channel is 200 KHz  GSM uses TDMA to fit 8 conversations on a channel.  So, technically, GSM is TDMA and FDMA based.
  • 7. GSM Frequency Band GSM operates at four main frequency bands : i.900 MHz : Used by most GSM networks. ii.1800 MHz : In UK iii. 1900 MHz : AS PCS concept in USA. iv.800 MHZ : Enhancing now.
  • 8. Key Terms An MS can have one of the following states : 1.Idle: MS is ON but a call is not in progress. Registration, Roaming, International Roaming, Location Updating, Paging. 2.Active : MS is ON and A call is in progress. Handover 3.Detached : MS is OFF.
  • 9. GSM Services  GSM was designed to do 3 things: – 1. Bearer data services: Faxes, text messages, web pages.  Basic GSM had a basic data rate that is limited to 9.6 kbps – Extended by GMRS and EDGE to around 384 Kbps – 2. Voice traffic  But, at a lower quality than analog. – 3. Other features:  Call forwarding, caller id, etc… – Meaning, we need to connect to the SS7 network
  • 10. SIM Card Secrets  The SIM card has a secret serial number that is only known by your cellular provider and the SIM card. – You, as the customer, do not know the number.  This secret number acts as a key, and it is 32 bits in length.
  • 11. Authentication and Security  GSM uses a challenge/response public key setup.  The base station sends a random number to the mobile. – This acts as the base station’s public key.  The mobile then uses an algorithm called A3 to encrypt it’s secret key using the random public key that it was sent by the base station. – A5 is a derivative of DES.  Several rounds of shifts and XORs.
  • 12. Authentication and Security  This encrypted information is then sent back to the base station.  The base station performs a reverse operation, and checks to see that the mobile sent the correct secret code. – If not, it is denied access.  A3 has proved to be very difficult to break. – Though, given a significant amount of time, it can be broken.
  • 13. Authentication and Security  GSM also uses another database for security.  This database maintains a list of stolen cell phones, and cell phones that have technical errors. – These are also not allowed access to the digital network.
  • 14. GSM conclusion  Widely used. – Upwards of 70% of phones.  Uses SIM cards so customers can use any phone and for security.  Allows more customers than analog.  Worse voice quality than analog.  Purely digital.  Open source, very complex standard.  Uses TDMA.  Will be replaced by CDMA in the near future.
  • 15.
  • 16. What is Cell?  In wireless telephony, a cell is the geographical area covered by a RF.  The transmitter facility itself is called the cell site.  Several coordinated cell sites are called a cell system.   When you sign up with a cellular telephone service provider, you generally are given access to their cell system, which is essentially local.  When travelling out of the range of this cell system, the cell system can enable you to be transferred to a neighboring company's cell system without your being aware of it. This is called roaming service.
  • 17. Why cellular systems?  Solves the problem of spectral congestion  Reuse of radio channel in different cells  Enable a fixed number of channels to serve an arbitrarily large number of users by reusing the channel throughout the coverage region
  • 18. Why hexagon for theoretical coverage? For a given distance between the center of a polygon and its farthest perimeter points, the hexagon has the largest area of the three Thus by using hexagon geometry, the fewest number of cells can cover a geographic region, and hexagon closely approximates a circular radiation pattern which would occur for an omnidirectionl BS antenna and free space propagation
  • 19. When using hexagons to model a coverage areas, BS t ransmitters are depicted as ither being in the center of the cell (center-excited cells) or on the three of the six cell vertices (edge-excited cells) Normally omnidirectional antennas are used in center-excited cells and directional antennas are used in corner-excited cel ls
  • 20.
  • 21. GSM Architecture Mobile Station (MS) Mobile Equipment (ME) Subscriber Identity Module (SIM) Base Station Subsystem (BSS) Base Transceiver Station (BTS) Base Station Controller (BSC) Network Switching Subsystem(NSS) Mobile Switching Center (MSC) Home Location Register (HLR) Visitor Location Register (VLR) Authentication Center (AUC) Equipment Identity Register (EIR) Operation and Support Subsystem (OSS)
  • 22.
  • 23.
  • 24.
  • 25. System Architecture Mobile Station (MS) The Mobile Station is made up of two entities: 1. Mobile Equipment (ME) 2. Subscriber Identity Module (SIM)
  • 26. System Architecture Mobile Station (MS) Mobile Equipment  Portable,vehicle mounted, hand held device  Uniquely identified by an IMEI (International Mobile Equipment Identity)  Voice and data transmission  Monitoring power and signal quality of surrounding cells for optimum handover  Power level : 0.8W – 20 W  160 character long SMS.
  • 27. System Architecture Mobile Station (MS) contd. Subscriber Identity Module (SIM)  Smart card contains the International Mobile Subscriber Identity (IMSI)  Allows user to send and receive calls and receive other subscribed services  Encoded network identification details - Key Ki,Kc and A3,A5 and A8 algorithms  Protected by a password or PIN  Can be moved from phone to phone – contains key information to activate the phone
  • 28.
  • 29.
  • 30.
  • 31. BSC  Typically a BSC has tens or even hundreds of BTSs under its control.  The BSC handles allocation of radio channels, receives measurements from the mobile phones, and controls handovers from BTS to BTS (except in the case of an inter-BSC handover in which case control is in part the responsibility of the anchor MSC).  A key function of the BSC is to act as a concentrator where many different low capacity connections to BTSs (with relatively low utilisation) become reduced to a smaller number of connections towards the mobile switching center (MSC) (with a high level of utilisation).
  • 32. Some base station equipment
  • 33. Some more base station equipment Typical macro cell Typical micro cell
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.  Source Coding :The process by which information symbols are mapped to alphabetical symbols.  The mapping is generally performed in sequences or groups of information and alphabetical symbols.  Channel coding is a technique used for controlling errors in data transmissionover unreliable or noisy communication channels. It includes  Digital Modulation schemes  Line coding schemes  Forward Correction(FEC) codes
  • 43.  Interleaving :Interleaving, a technique for making FEC more robust with respect to burst errors;  Ciphering:A cipher (pronounced SAI-fuhr) is any method of encrypting text (concealing its readability and meaning). It is also sometimes used to refer to the encrypted text message itself although here the term ciphertext is preferred.  Burst formating : Burst is a term used in a number of information technology contexts to mean a specific amount of data sent or received in one intermittent operation.  Modulation :n electronics and telecommunications, modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.
  • 44. GSM Operation Speech decoding Channel decoding De-interleaving Burst Formatting De-ciphering DemodulationModulation Ciphering Burst Formatting Interleaving Channel Coding Speech coding Radio Interface Speech Speech 13 Kbps 22.8 Kbps 22.8 Kbps 33.6 Kbps 33.6 Kbps 270.83 Kbps
  • 45.
  • 46.
  • 48. GSM Burst Periods  Since GSM is TDMA based, it uses burst periods to make up a frame. – 8 burst periods make up one frame. – A burst is like a slot in the train. – A burst period is where a phone gets to send digital information.  Phones send around 14 bits of information in every burst. – However, a burst period only lasts .577 ms.  Phones are only bursting information at around 1700 times a second, much less than the 8000 times a second a landline phone samples at.
  • 49. GSM Frames  8 burst periods make 1 frame.  The frame length in time is 4.615 ms – .577 ms times 8  Each frame carries 164 bits – 114 are for voice – The rest are for synchronization and CRC checks  Each frame can carry up to 8 voice samples, or, the frame can be dedicated to other necessary information.
  • 50. GSM Frames  Different frames mean different things. – For instance, this data structure contains information about the cell site.  The cell phone scans for this information when it is turned on.
  • 51. GSM Frames  This is the burst that occurs when the mobile transmits its access key back to the base station.
  • 52. Speech Coding  GSM uses LPC – Linear Predictive Coding. – Uses interpolation. – Basically, previous samples, which don’t change very quickly, are used to predict current samples.  So, instead of actually sending the voice sample, the delta in the voice sample is sent.  Also, silence is not transmitted. – This increases throughput by about 40%. – This bits can be used for other conversations.
  • 53. Digital Modulation  Uses Gaussian minimum shift keying.  Very complex, uses filters, phase shifts, and frequency shifts to actually send out binary digits.
  • 54. Power Requirements  Since GSM is purely digital, it requires a lot less power since it doesn’t have to transmit an analog wave.  The maximum output power of a GSM phone is only 2 watts. – And this can be notched down by the controlling cell phone tower. – The minimum power is only 20 mW.
  • 55. GSM Call Processing  Unlike AMPS, the cell tower can transmit on any of its frequencies.  The cell phone is actually pre-programmed in the SIM card to have a set of radio frequencies that it should check first. – When this fails, it needs to search through all frequencies.  When it detects the tower identifying itself, call processing begins.
  • 56. SIM Card Secrets  The SIM card has a secret serial number that is only known by your cellular provider and the SIM card. – You, as the customer, do not know the number.  This secret number acts as a key, and it is 32 bits in length.
  • 57. Authentication and Security  GSM uses a challenge/response public key setup.  The base station sends a random number to the mobile. – This acts as the base station’s public key.  The mobile then uses an algorithm called A3 to encrypt it’s secret key using the random public key that it was sent by the base station. – A5 is a derivative of DES.  Several rounds of shifts and XORs.
  • 58. Authentication and Security  This encrypted information is then sent back to the base station.  The base station performs a reverse operation, and checks to see that the mobile sent the correct secret code. – If not, it is denied access.  A3 has proved to be very difficult to break. – Though, given a significant amount of time, it can be broken.
  • 59. Authentication and Security  GSM also uses another database for security.  This database maintains a list of stolen cell phones, and cell phones that have technical errors. – These are also not allowed access to the digital network.
  • 60. General architecture of BTS A BTS is usually composed of:  Transceiver (TRX) :Provides transmission and reception of signals. It also does sending and reception of signals to and from higher network entities (like the base station controller in mobile telephony).  Power amplifier (PA) :Amplifies the signal from TRX for transmission through antenna; may be integrated with TRX.  CombinerCombines feeds from several TRXs so that they could be sent out through a single antenna. Allows for a reduction in the number of antenna used.  Multiplexer :For separating sending and receiving signals to/from antenna. Does sending and receiving signals through the same antenna ports (cables to antenna) used.
  • 61. General architecture of BTS  AntennaThis is the structure that the BTS lies underneath; it can be installed as it is or disguised in some way (Concealed cell sites).  Alarm extension systemCollects working status alarms of various units in the BTS and extends them to operations and maintenance (O&M) monitoring stations.  Control function :Controls and manages the various units of BTS, including any software. On-the-spot configurations, status changes, software upgrades, etc. are done through the control function.  Baseband receiver unit (BBxx)Frequency hopping, signal DSP.
  • 62.
  • 63. GSM conclusion  Widely used. – Upwards of 70% of phones.  Uses SIM cards so customers can use any phone and for security.  Allows more customers than analog.  Worse voice quality than analog.  Purely digital.  Open source, very complex standard.  Uses TDMA.  Will be replaced by CDMA in the near future.