2. Introduction to GSM Technology
• GSM stands for Global System for Mobile Communication and is an open,
digital cellular technology used for transmitting mobile voice and data
services.
• The GSM emerged from the idea of cell-based mobile radio systems at Bell
Laboratoriesintheearly1970s.
• TheGSM makesuseofnarrowband techniquefortransmittingsignals.
• The GSM provides basic to advanced voice and data services including
Roaming service. Roaming is the ability to use your GSM phone number in
anotherGSM network.
3. Architecture Of GSM Network
MS
BT
S
DSC TCSM MSC
HLR
GLR
EIR
AUC
GMSC
SMSC
BSS
NSS
4. Mobile Station
The Terminal
• The terminal is basically
mobile equipment which
we are using.
• There are three different
types of terminal:
1.Fixed terminal
2.GSM Portable terminal
3.Hand held terminal
The SIM
• It stands for Subscriber
Identity Module.
• It is a smart card that
identifies the terminal.
• It is protected by a four digit
code called Personal
Identification Number(PIN).
5. The Base Station Subsystem
Base Trans-receiver
System
• BTS corresponds to
antennas used in each
cell of network.
• Each BTS has between
1-16 trans-receivers.
Base Station Controller
• The BSC controls a
group of BTS and
manages the resources.
• It is in charge of
handovers ,frequency-
hopping , exchange
functions etc.
6. The Network and Switching Subsystem
Its main role is to manage the communication between mobile
users and other users. It also includes data bases in order to
store information about the subscribers.
Its components are:
1. The mobile services Switching Centre: It performs the
switching functions of network and also provides connection to
other networks.
2. The Gateway Mobile Services Switching Centre: It is the
interface between mobile cellular network and PSTN.
3. Home location Register: It is master data base that stores
information of the subscribers belonging to the covering area of
MSC. It also stores the current location of these subscribers and
services to which they have access.
7. 4. Visitor Location register: It is a temporary database that
contains information from HLR necessary in order to provide the
subscribed services to the visiting users.
5. The Authentication Centre: The AUC register is used for
security purposes. It provides the parameters needed for
authentication and encryption functions that help to verify the
users’ identity.
6. The Equipment Identity register: It is a register containing
information about mobile equipments such as IMEI number. The
EIR forbids calls from stolen or un-authorised terminal.