1) The document outlines the GSM architecture and mobility management procedures.
2) GSM uses a two-level hierarchical strategy with HLR and VLR databases to track the location of mobile stations as they move between different location areas and mobile switching centers.
3) The three cases of location update in GSM are inter-LA movement, inter-MSC movement, and inter-VLR movement. The location update procedures exchange signaling messages between the mobile station, base station, MSC, VLR, and HLR to update the location information in the databases.
The document describes the key components of a GSM network and their functions:
- The BTS handles radio transmissions and defines each cell. The BSC manages radio resources and handles handovers between BTSs. The MSC performs switching between mobile and other networks.
- The HLR is a central database that stores subscriber information. The VLR temporarily stores subscriber data needed by the local MSC. The EIR stores valid device IDs. The AUC authenticates users and protects the network from fraud.
Together, these components enable functions like call setup, location updates, authentication, and mobility as users move between cells in a GSM network.
The GSM system architecture is divided into three major systems: the Switching System (SS), the Base Station System (BSS), and the Operation and Support System (OSS). The SS handles call processing and subscriber functions and includes the MSC, HLR, VLR, and other registers. The BSS handles radio functions and includes the BSC and BTS. The OSS manages errors, configuration, faults, and performance across the network. Key interfaces include the A interface between MSC and BSS, the B interface between MSC and VLR, and the Um interface between MS and BTS.
The document discusses the evolution of cellular communication networks from early radio technologies to modern 4G networks. It covers key developments like the invention of the transistor, first commercial cellular networks, and the progression of cellular generations from 1G analog to 2G digital to 3G and 4G with integrated data services. It also provides details on cellular network components, concepts like frequency reuse and network cells, multiple access schemes, and an overview of the Global System for Mobile Communication (GSM) standard including its architecture, channels, and call processing.
The document compares the call flow processes in GSM and UMTS mobile networks. In GSM, call flows involve immediate assignment of channels like SDCCH or TCH, with handovers between cells/BSCs handled through measurements and channel administration. In UMTS, call flows activate algorithms for power control, code control, and admission control. Soft handovers are supported between cells/BSCs based on measurements, with inner and outer loop power control on the downlink packet data channel.
The document provides an introduction to 2G/3G and 4G core mobile networks. It discusses key network elements like BTS, BSC, RNC, SGSN, GGSN, eNodeB, MME, S-GW and P-GW. It provides an overview of the differences between circuit switching and packet switching. It also summarizes simplified call flows for 2G/3G packet data and 4G, highlighting the core network elements involved and interfaces between them.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
The document describes the call flow procedures for mobile originating and mobile terminating calls in a GSM network.
For a mobile originating call, the MS requests a dedicated channel and indicates it wants to set up a call. The MSC receives the call setup message and checks for call barring before establishing a link with the BSC. The BSC assigns a traffic channel for the call.
For a mobile terminating call, the call is routed to the GMSC serving the called subscriber's home network. The GMSC queries the HLR for routing information. The HLR provides a roaming number to route the call to the subscriber's current MSC. The MSC pages the subscriber through the BSCs in their
The document describes the key components of a GSM network and their functions:
- The BTS handles radio transmissions and defines each cell. The BSC manages radio resources and handles handovers between BTSs. The MSC performs switching between mobile and other networks.
- The HLR is a central database that stores subscriber information. The VLR temporarily stores subscriber data needed by the local MSC. The EIR stores valid device IDs. The AUC authenticates users and protects the network from fraud.
Together, these components enable functions like call setup, location updates, authentication, and mobility as users move between cells in a GSM network.
The GSM system architecture is divided into three major systems: the Switching System (SS), the Base Station System (BSS), and the Operation and Support System (OSS). The SS handles call processing and subscriber functions and includes the MSC, HLR, VLR, and other registers. The BSS handles radio functions and includes the BSC and BTS. The OSS manages errors, configuration, faults, and performance across the network. Key interfaces include the A interface between MSC and BSS, the B interface between MSC and VLR, and the Um interface between MS and BTS.
The document discusses the evolution of cellular communication networks from early radio technologies to modern 4G networks. It covers key developments like the invention of the transistor, first commercial cellular networks, and the progression of cellular generations from 1G analog to 2G digital to 3G and 4G with integrated data services. It also provides details on cellular network components, concepts like frequency reuse and network cells, multiple access schemes, and an overview of the Global System for Mobile Communication (GSM) standard including its architecture, channels, and call processing.
The document compares the call flow processes in GSM and UMTS mobile networks. In GSM, call flows involve immediate assignment of channels like SDCCH or TCH, with handovers between cells/BSCs handled through measurements and channel administration. In UMTS, call flows activate algorithms for power control, code control, and admission control. Soft handovers are supported between cells/BSCs based on measurements, with inner and outer loop power control on the downlink packet data channel.
The document provides an introduction to 2G/3G and 4G core mobile networks. It discusses key network elements like BTS, BSC, RNC, SGSN, GGSN, eNodeB, MME, S-GW and P-GW. It provides an overview of the differences between circuit switching and packet switching. It also summarizes simplified call flows for 2G/3G packet data and 4G, highlighting the core network elements involved and interfaces between them.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
The document describes the call flow procedures for mobile originating and mobile terminating calls in a GSM network.
For a mobile originating call, the MS requests a dedicated channel and indicates it wants to set up a call. The MSC receives the call setup message and checks for call barring before establishing a link with the BSC. The BSC assigns a traffic channel for the call.
For a mobile terminating call, the call is routed to the GMSC serving the called subscriber's home network. The GMSC queries the HLR for routing information. The HLR provides a roaming number to route the call to the subscriber's current MSC. The MSC pages the subscriber through the BSCs in their
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
The document summarizes the simplified call flow signaling process for a 2G/3G voice call. It shows that UE1 establishes a connection with the access network and core network to page UE2. UE2 responds and a connection is established between the two user equipments through the core network, with a notification that they are now connected.
The document discusses different types of location updating procedures in mobile networks:
1. Location updating type normal occurs when a mobile subscriber (MS) moves to a new location area and needs to update the network of its new location.
2. IMSI attach is used when the MS powers back on in the same location area it was in when it entered detached mode.
3. Periodic registration is used to avoid unnecessary paging and prevent database failures. The MS registers at periodic intervals set by the network operator, from every 6 minutes to every hour.
This document provides an overview of ISUP (Integrated Services Digital Network User Part) call signaling procedures. It describes the basic ISUP call sequence, message structure, and key messages and parameters. Procedures covered include early ACM, suspend-resume, enbloc and overlap dialing methods, continuity checks, circuit management messages like RSC and GRS, and call progress messages. Mandatory parameters are listed for main ISUP messages like IAM, ACM, ANM, REL and CPG.
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
This presentation/video provides an example of the registration procedure. The device or UE needs to let the core network(s) know that it is switched on and active. This procedure is known as registration. The UE can register individually to the CS and PS core networks. Most modern networks allow combined registration (or combined attach) whereby the UE registers only to the PS network and the PS network informs the CS network that the UE is active.
The document discusses the different types of logical channels used in the GSM air interface, including traffic channels, control channels, and dedicated control channels. It provides details on the purpose and function of various control channels like the Broadcast Control Channel (BCCH), Common Control Channels (CCCH), and Dedicated Control Channels (DCCH). The BCCH broadcasts information about the cell and network. The CCCH includes channels like the Paging Channel (PCH) and Random Access Channel (RACH) for paging and call requests. The DCCH comprises channels like SDCCH, SACCH, and FACCH that are used for call setup and in-call signaling.
This document provides an overview of the IP Multimedia Subsystem (IMS) standards and architecture. It discusses the evolution from 2G to 3G/4G mobile networks and the integration of IMS. The key components of IMS are described including the Call Session Control Function (CSCF), Home Subscriber Server (HSS), Application Servers (AS), Media Resource Functions (MRF), and Breakout Gateway Control Function (BGCF). Registration and call flow examples are provided to illustrate IMS signaling. Approaches to migrating existing networks to IMS are also summarized.
Call flow oma000003 gsm communication flowEricsson Saudi
The document summarizes several key GSM procedures including authentication and ciphering sequence, location update sequence, basic call sequences, and equipment identification. It provides detailed signaling diagrams to illustrate the message flows between different nodes in the network for these procedures.
Topics covered in this presentation:
What is a Base Transceiver Station ?
Components of any BTS
BTS transceiver, BTS O&M module, clock module
BTS Transmitter and Receiver Characteristics
BTS configurations
BTS functions and Protocols on Um and Abis Interface
BTS security aspects
The document discusses GPRS network architecture and processes. It describes how a mobile station (MS) attaches to and detaches from the GPRS network by communicating with the SGSN and HLR. It also describes how a temporary block flow (TBF) is established to enable data transfer between the MS and network. Additionally, it outlines how a packet data protocol (PDP) context is activated and deactivated to manage the subscriber's data session.
Circuit Switched Fallback (CSFB) is the most commonly used method to support voice services over Long Term Evolution (LTE) networks today, as the deployment of IP Multimedia Subsystem (IMS) is still in its infancy.
This document provides an introduction to GSM networks and their history. It discusses [1] the origins and evolution of cellular networks prior to GSM, [2] the formation of GSM in 1982 to develop a pan-European cellular standard, and [3] the key phases and advances of GSM technology over time, including digital voice services, SMS, and mobile data. The document also outlines some of the main advantages of GSM networks, including international roaming, security, voice quality, and their use of a single global standard.
The document discusses IP addressing and routing in LTE networks. It covers:
- OSI layers used in LTE including physical, MAC, RLC, and PDCP layers
- IP addressing schemes including IPv4 addressing, subnetting, and network/broadcast addresses
- IP routing configuration in BSCs, RNCs, and between network nodes
- Interface IP allocation and configuration of BTS, NodeB, and OAM addresses
The document discusses the network layer in GSM systems. It describes the main sublayers and protocols in the network layer, including radio resource management (RR), mobility management (MM), and call control (CC). It explains the functions and procedures handled by each sublayer, such as channel assignment and handover (RR), location updating and authentication (MM), and call establishment and clearing (CC). It also outlines some of the key layer 3 protocols used, including RIL3-RR, RIL3-MM, RIL3-CC, and MAP, and provides examples of signaling flows for initial mobile acquisition and a mobile-originating call.
1. This document describes the call setup process for a GSM originating call made from a mobile user to a landline subscriber.
2. It involves establishing a radio resource connection between the mobile station and base station, authenticating and ciphering the connection, and setting up the voice channel and call.
3. The key steps are radio channel allocation, call signaling transmission to the mobile switching center, routing the call to the public switched telephone network, alerting and connecting the called party, and releasing the call resources on completion.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
This document provides an overview and planning considerations for the Gb interface, which connects the BSS (base station subsystem) and SGSN (serving GPRS support node) in a GPRS network. It discusses topics like the Gb protocol stack, logical connections, frame relay interface planning, BSC and SGSN dimensioning, and topology planning. Examples are also provided for dimensioning the number of PCUs (packet control units) in the BSCs and required Gb links based on estimated GPRS traffic loads and overhead factors.
The document provides an overview of 2G and 3G mobile phone networks. It describes the basic network architecture including the BSS (Base Station Subsystem consisting of the BTS and BSC), the NSS core network (including the MSC, HLR, VLR, SGSN, GGSN), and their basic functions. It also defines common abbreviations like MS, BTS, BSC, MSC, SGSN, GGSN.
GSM is a standard for digital cellular networks that allows subscribers to use their phones globally. It uses FDMA to divide the spectrum into channels and TDMA to divide each channel into timeslots. The network consists of MSCs, HLRs, VLRs, BSCs, BTSs and cells. The MSC handles calls and interfaces with other networks. HLRs store subscriber data and VLRs temporarily store data for subscribers in the local area. BSCs control BTSs which transmit signals to mobile devices within cells. Key identifiers include IMSI, IMEI, MSISDN and MSRN.
A mobile station in GSM comprises several functional groups including the mobile terminal, terminal adapter, terminal equipment, and subscriber identity module. The network and switching subsystem is the main component of the public mobile network and controls switching, mobility management, and interconnection. It includes components like the mobile switching center, home location register, and visitor location register. The mobile switching center plays a central role in switching functions and mobility support.
GSM (Global System for Mobile communications) is a digital cellular network developed to provide improved spectrum efficiency, international roaming, and compatibility with other networks. It uses TDMA to allow multiple users to access the same radio frequency channel at different time slots. The GSM architecture consists of mobile stations, a base station subsystem including base transceiver stations and base station controllers, and a network subsystem including mobile switching centers and databases like the home location register.
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
The document summarizes the simplified call flow signaling process for a 2G/3G voice call. It shows that UE1 establishes a connection with the access network and core network to page UE2. UE2 responds and a connection is established between the two user equipments through the core network, with a notification that they are now connected.
The document discusses different types of location updating procedures in mobile networks:
1. Location updating type normal occurs when a mobile subscriber (MS) moves to a new location area and needs to update the network of its new location.
2. IMSI attach is used when the MS powers back on in the same location area it was in when it entered detached mode.
3. Periodic registration is used to avoid unnecessary paging and prevent database failures. The MS registers at periodic intervals set by the network operator, from every 6 minutes to every hour.
This document provides an overview of ISUP (Integrated Services Digital Network User Part) call signaling procedures. It describes the basic ISUP call sequence, message structure, and key messages and parameters. Procedures covered include early ACM, suspend-resume, enbloc and overlap dialing methods, continuity checks, circuit management messages like RSC and GRS, and call progress messages. Mandatory parameters are listed for main ISUP messages like IAM, ACM, ANM, REL and CPG.
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
This presentation/video provides an example of the registration procedure. The device or UE needs to let the core network(s) know that it is switched on and active. This procedure is known as registration. The UE can register individually to the CS and PS core networks. Most modern networks allow combined registration (or combined attach) whereby the UE registers only to the PS network and the PS network informs the CS network that the UE is active.
The document discusses the different types of logical channels used in the GSM air interface, including traffic channels, control channels, and dedicated control channels. It provides details on the purpose and function of various control channels like the Broadcast Control Channel (BCCH), Common Control Channels (CCCH), and Dedicated Control Channels (DCCH). The BCCH broadcasts information about the cell and network. The CCCH includes channels like the Paging Channel (PCH) and Random Access Channel (RACH) for paging and call requests. The DCCH comprises channels like SDCCH, SACCH, and FACCH that are used for call setup and in-call signaling.
This document provides an overview of the IP Multimedia Subsystem (IMS) standards and architecture. It discusses the evolution from 2G to 3G/4G mobile networks and the integration of IMS. The key components of IMS are described including the Call Session Control Function (CSCF), Home Subscriber Server (HSS), Application Servers (AS), Media Resource Functions (MRF), and Breakout Gateway Control Function (BGCF). Registration and call flow examples are provided to illustrate IMS signaling. Approaches to migrating existing networks to IMS are also summarized.
Call flow oma000003 gsm communication flowEricsson Saudi
The document summarizes several key GSM procedures including authentication and ciphering sequence, location update sequence, basic call sequences, and equipment identification. It provides detailed signaling diagrams to illustrate the message flows between different nodes in the network for these procedures.
Topics covered in this presentation:
What is a Base Transceiver Station ?
Components of any BTS
BTS transceiver, BTS O&M module, clock module
BTS Transmitter and Receiver Characteristics
BTS configurations
BTS functions and Protocols on Um and Abis Interface
BTS security aspects
The document discusses GPRS network architecture and processes. It describes how a mobile station (MS) attaches to and detaches from the GPRS network by communicating with the SGSN and HLR. It also describes how a temporary block flow (TBF) is established to enable data transfer between the MS and network. Additionally, it outlines how a packet data protocol (PDP) context is activated and deactivated to manage the subscriber's data session.
Circuit Switched Fallback (CSFB) is the most commonly used method to support voice services over Long Term Evolution (LTE) networks today, as the deployment of IP Multimedia Subsystem (IMS) is still in its infancy.
This document provides an introduction to GSM networks and their history. It discusses [1] the origins and evolution of cellular networks prior to GSM, [2] the formation of GSM in 1982 to develop a pan-European cellular standard, and [3] the key phases and advances of GSM technology over time, including digital voice services, SMS, and mobile data. The document also outlines some of the main advantages of GSM networks, including international roaming, security, voice quality, and their use of a single global standard.
The document discusses IP addressing and routing in LTE networks. It covers:
- OSI layers used in LTE including physical, MAC, RLC, and PDCP layers
- IP addressing schemes including IPv4 addressing, subnetting, and network/broadcast addresses
- IP routing configuration in BSCs, RNCs, and between network nodes
- Interface IP allocation and configuration of BTS, NodeB, and OAM addresses
The document discusses the network layer in GSM systems. It describes the main sublayers and protocols in the network layer, including radio resource management (RR), mobility management (MM), and call control (CC). It explains the functions and procedures handled by each sublayer, such as channel assignment and handover (RR), location updating and authentication (MM), and call establishment and clearing (CC). It also outlines some of the key layer 3 protocols used, including RIL3-RR, RIL3-MM, RIL3-CC, and MAP, and provides examples of signaling flows for initial mobile acquisition and a mobile-originating call.
1. This document describes the call setup process for a GSM originating call made from a mobile user to a landline subscriber.
2. It involves establishing a radio resource connection between the mobile station and base station, authenticating and ciphering the connection, and setting up the voice channel and call.
3. The key steps are radio channel allocation, call signaling transmission to the mobile switching center, routing the call to the public switched telephone network, alerting and connecting the called party, and releasing the call resources on completion.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
This document provides an overview and planning considerations for the Gb interface, which connects the BSS (base station subsystem) and SGSN (serving GPRS support node) in a GPRS network. It discusses topics like the Gb protocol stack, logical connections, frame relay interface planning, BSC and SGSN dimensioning, and topology planning. Examples are also provided for dimensioning the number of PCUs (packet control units) in the BSCs and required Gb links based on estimated GPRS traffic loads and overhead factors.
The document provides an overview of 2G and 3G mobile phone networks. It describes the basic network architecture including the BSS (Base Station Subsystem consisting of the BTS and BSC), the NSS core network (including the MSC, HLR, VLR, SGSN, GGSN), and their basic functions. It also defines common abbreviations like MS, BTS, BSC, MSC, SGSN, GGSN.
GSM is a standard for digital cellular networks that allows subscribers to use their phones globally. It uses FDMA to divide the spectrum into channels and TDMA to divide each channel into timeslots. The network consists of MSCs, HLRs, VLRs, BSCs, BTSs and cells. The MSC handles calls and interfaces with other networks. HLRs store subscriber data and VLRs temporarily store data for subscribers in the local area. BSCs control BTSs which transmit signals to mobile devices within cells. Key identifiers include IMSI, IMEI, MSISDN and MSRN.
A mobile station in GSM comprises several functional groups including the mobile terminal, terminal adapter, terminal equipment, and subscriber identity module. The network and switching subsystem is the main component of the public mobile network and controls switching, mobility management, and interconnection. It includes components like the mobile switching center, home location register, and visitor location register. The mobile switching center plays a central role in switching functions and mobility support.
GSM (Global System for Mobile communications) is a digital cellular network developed to provide improved spectrum efficiency, international roaming, and compatibility with other networks. It uses TDMA to allow multiple users to access the same radio frequency channel at different time slots. The GSM architecture consists of mobile stations, a base station subsystem including base transceiver stations and base station controllers, and a network subsystem including mobile switching centers and databases like the home location register.
- GSM was developed in 1982 by the Conference of European Postal and Telecommunications Administrations to improve digital cellular technology. It was later moved to the European Telecommunications Standards Institute.
- GSM operates using FDMA and TDMA, dividing carriers into time slots to maximize voice channels in limited bandwidth. It provides wireless communication and high security against tapping.
- The core network components are the BSS (including BTS and BSC), SS (including MSC, VLR, HLR, EIR), and MS. The network authenticates users based on their SIM card and supports various services like voice calls, SMS, and data.
The document provides an overview of GSM basics including its history and development. It describes the key aspects of GSM including the different frequency bands (GSM 900, DCS 1800, PCS 1900), physical channels, logical channels, control channels, and traffic channels. It also outlines the main components of the GSM network including the base station system (BSS), switching system (SS), and mobile station (MS). Finally, it covers GSM identities, operations, services, and advantages.
The document provides an overview of the GSM network including its history, architecture, technical specifications, and applications. It discusses the key components of GSM including the mobile station, base station subsystem, network switching subsystem, logical and physical channels, and security features. The architecture consists of the mobile station, base station subsystem with BTS and BSC, and the network switching subsystem including the MSC, HLR, VLR, and AUC. GSM uses TDMA and FDMA and operates in the 900/1800MHz spectrum. It provides voice and data services and allows international roaming.
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
The document provides an overview of the GSM architecture, which is divided into three main subsystems:
1. The Base Station Subsystem (BSS) which includes the Base Transceiver Station (BTS) and Base Station Controller (BSC).
2. The Network Switching Subsystem (NSS) which includes the Mobile Switching Center (MSC), Home Location Register (HLR), Visitor Location Register (VLR), and Authentication Center (AUC).
3. The Operations and Support Subsystem (OSS) which handles maintenance of the network.
The Mobile Station (MS) consists of the Mobile Equipment (ME) and the Subscriber Identity Module (SIM) card. The SIM card provides
The document provides an overview of GSM (Global System for Mobile Communication) technology. It describes how GSM was originally developed to provide roaming cellular voice services across Europe compatible with other networks. It now has over 5 billion subscribers worldwide. The document outlines the key components of GSM including the mobile station, base station, switching center, and databases. It also describes the radio subsystem using frequency division duplex and time division multiple access and the network switching subsystem responsible for mobility management and switching.
The document provides an agenda on GSM and GPRS theory that includes:
- An overview of GSM definition, history, services, system architecture, functional model, and interfaces
- Descriptions of the radio interface, A-bis, A-interface, signaling protocols, and inter-MSC signaling
- A brief history of GPRS and definitions of its new network elements and air and A-bis interfaces
The document discusses the Global System for Mobile Communications (GSM) standard for wireless telecommunications. It provides an overview of GSM, describing its key components and subsystems, including the mobile station, base station, mobile switching center, location registers, and operation subsystem. It outlines the radio subsystem and network switching subsystem, and how they facilitate mobile communication through functions like mobility management, switching, and database access. Finally, it maps the call setup processes for mobile terminated and originated calls within the GSM system.
The document provides an overview of GSM architecture and call flows. It describes the key components of the GSM network including the mobile station, base station subsystem, network switching subsystem, home location register, visitor location register and authentication center. It then details various location update call flows like IMSI attach, normal and periodic updates. It also summarizes the mobile to mobile and mobile to ISUP call flows and an intra-MSC handover call flow.
GSM is a second generation cellular standard developed to provide voice and data services using digital modulation. It was developed by Group Spéciale Mobile in the 1980s and standardized by ETSI in 1989. The GSM system architecture consists of mobile stations, base stations, base station controllers, switching systems and databases. It uses a variety of channels including traffic, broadcast, common control and dedicated control channels to handle calls, network registration and messaging.
The document discusses several advantages of CDMA technology, including frequency reuse, large coverage area, high spectrum capacity, privacy, soft handoff, good voice quality, and smooth migration to 3G. It also provides details on ZTE's involvement with CDMA technology development and key components of a CDMA network such as the BTS, BSC, MSC, VLR, and HLR.
The document discusses several advantages of CDMA technology, including frequency reuse, large coverage area, high spectrum capacity, privacy, soft handoff, good voice quality, and smooth migration to 3G. It also provides details on ZTE's involvement with CDMA technology development and key components of a CDMA network such as the BSC, BTS, MSC, VLR, and HLR.
The document discusses several advantages of CDMA technology, including frequency reuse, large coverage area, high spectrum capacity, privacy, soft handoff, good voice quality, and smooth migration to 3G. It also provides details on ZTE's involvement with CDMA technology development and key components of a CDMA network such as the BTS, BSC, MSC, VLR, and HLR.
The document provides an overview of the Global System for Mobile (GSM) network structure. It describes the basic nodes that compose the GSM network including the mobile station, base station subsystem consisting of base transceiver stations and base station controllers, and the network switching subsystem containing elements like the mobile switching center, home location register, and visitor location register. It also outlines the services offered in GSM like teleservices, bearer services, and supplementary services.
The document provides an overview of GSM networks including:
1. GSM was developed in the 1980s to standardize cellular networks in Europe and is now used globally.
2. The key components of a GSM network are the mobile station (phone), base station subsystem including base transceiver stations and base station controllers, and the network switching subsystem centered around mobile switching centers.
3. GSM uses TDMA and FDMA to allow multiple users to access the same radio channel simultaneously. It operates in the 900MHz and 1800MHz bands and supports data rates up to 9.6kbps along with services like SMS.
Implementation Of Bss And Nss In Mobile CommunicationRajan Kumar
The document discusses the Base Station Subsystem (BSS) and Network and Switching Subsystem (NSS) in mobile communications. The BSS connects the mobile station to the NSS and consists of the Base Transceiver Station (BTS) and Base Station Controller (BSC). The NSS includes the Mobile services Switching Center (MSC), Home Location Register (HLR), and Visitor Location Register (VLR). Together, the BSS and NSS provide critical functions such as mobility management, call control, and short message services that enable mobile communication.
This document provides an overview of CDMA and WiMAX technologies as well as the components that make up a BSS (Base Station Subsystem) in a CDMA network, including the BSC (Base Station Controller) and BTS (Base Transceiver Station). It describes the functions of the BSC and BTS, their interfaces, and configurations including components like the CIPS (Common Interface Processing Subrack) in the BSC and modules in the DBS3900 distributed antenna system.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
4. Introduction
Global System for Mobile Communications
(GSM) is a digital wireless network standard.
It was developed by Group Special Mobile of
Conference Europeenne des Postes et
Telecommunications (CEPT) and European
Telecommunications Standards Institute
(ETSI).
GSM Phases 1 and 2 define digital cellular
telecommunications system.
GSM Phase 2+ targets on Speech Codec
and Data Service.
5. Basic Requirements set out by GSM
Original text as written by the committee in 1985
Services
Quality of Services and Security
Radio Frequency Utilization
Network
Cost
The Basic Requirements of
GSM
8. GSM Architecture
Network and Switching
Subsystem
MS
BTS
BTS
BTS
BTS
BTS
BTS
BSC
BSC
Abis interface
Um interface
Base Station
Subsystems (BSS)
ME
SIM
Cloud
MSC
HLR VLR AUC
A interface
Network and Switching
Subsystem (NSS)
Cloud
Cloud
Cloud
PSTNGMSC
EIR
9. Also called Mobile Terminal (MT)
The MS consists of two parts:
Subscriber Identity Module (SIM)
Mobile Equipment (ME)
Mobile Station (MS)
10. A SIM contains subscriber-related information
A list of abbreviated and customized short dialing
numbers
Short message
Names of preferred Networks to provide service
Personal Identity Number (PIN) .
SIM
11. SIM
SIM contains important information including
IMSI
Ki
TMSI
Access Control Code
Kc
LAI
SIM information can be modified:
By the subscriber either by keypad or a PC using an
RS232 connection
By sending codes through short messages (network
operators)
12. Mobile Equipment (ME)
ME: non-customer-related hardware and
software specific to the radio interface
ME can not be used if no SIM is on the MS.
Except for emergency calls
The SIM-ME design supports portability:
The MS is the property of the subscriber.
The SIM is the property of the service provider.
13. Base Station System (BSS)
The Base Station System (BSS) connects the
MS and NSS.
BSS contains
Base transceiver station (BTS)
Base station controller (BSC)
14. BTS
Base Transceiver Station (BTS) contains
Transmitter
Receiver
Signaling equipment specific to the radio
interface in order to contact the MSs.
Transcoder/Rate Adapter Unit (TRAU)
GSM-specific speech encoding/decoding and rate
adaptation in data transmission
18. Base Station Controller (BSC)
Radio channel assignment
Handoff management
Connect to an MSC
Connect to several BTSs
Maintain cell configuration data of these BTSs.
The BSC communicates with the BTSs via the A-bis.
BSC (1/2)
19. BSC (2/2)
The processor load of a BSC:
Call activities (around 20-25%)
Paging and short message service (around 10-
15%)
Mobility management (handoff and location
update, around 20-25%
Hardware checking/network-triggered events
(around 15-20%)
When a BSC is overloaded, it first rejects
location update, next MS originating calls,
then handoff.
20. Network and Switching Subsystem (NSS)
Telephone switching functions
Subscriber profiles
Mobility management
Components in NSS:
MSC: provide basic switching function
Gateway MSC (GMSC): route an incoming call to
an MSC by interrogating the HLR directory.
NSS (1/2)
21. NSS (2/2)
Components in NSS (continuous):
HLR and VLR maintain the current location of the
MS.
Authentication Center (AuC) is used in the
security management.
Equipment Identity Register (EIR) is used for
the registration of MS equipment.
22. GSM Interfaces
Network and Switching
Subsystem
MS
BTS
BTS
BTS
BTS
BTS
BTS
BSC
BSC
Abis interface
Um interface
Base Station
Subsystems (BSS)
ME
SIM
Cloud
MSC
HLR VLR AUC
A interface
Network and Switching
Subsystem (NSS)
Cloud
Cloud
Cloud
PSTNGMSC
EIR
MAP interface
24. Radio Interface-Um (1/3)
The GSM radio link uses TDMA/FDD
technology.
890-915 MHz (uplink)
935-960 MHz (downlink)
124 pairs × 200 KHz
8 time slots (bursts) per carrier
A frame consists 8 timeslots (each 0.577 msec for
a time slot).
The length of GSM frame in a frequency carrier is
4.615 msec.
26. GSM Normal Burst
Begin with 3 head bits, and end with 3 bits.
Two groups are separated by an equalizer
training sequence of 26 bits.
The flags indicates whether the information
carried is for speech/data, or signaling.
3 57 bits 1 26 bits 1 57 bits 3 8.25 bits
Tailing Data Flag Training Flag Data Tailing Guard
Burst (148 bits/0.564 msec)
Time Slot (156.25 bits or 0.577 msec)
28. Traffic Channel (TCH)
TCHs are intended to carry user information
(speech or data).
Full-rate TCH (TCH/F)
Transmission speed: 13 Kbps for speech
Transmission speed: 9.6, 4.8 or 2.4 Kbps for data
Enhanced full-rate (EFR) speech coders for improving
the speech quality
Half-rate TCH (TCH/H)
Transmission speed: 6.5 Kbps speech
Transmission speed: 4.8 or 2.4 Kbps of data.
29. Control Channels (CCH)
CCHs: to carry signaling information
Three types of CCHs :
Broadcast channel (BCH)
Common control channel (CCCH)
Dedicated control channel (DCCH)
30. Broadcast Channels (BCHs)
BTS broadcasts system information to the
MSs through BCHs.
Two types in BCH:
Frequency Correction Channel (FCCH) and
Synchronization Channel (SCH)
The information allows the MS to acquire and stay
synchronized with the BSS.
Broadcast Control Channel (BCCH) (downlink)
Access information for the selected cell
Information related to the surrounding cells to support
cell selection
Location registration procedures in an MS
31. Three types in CCCH:
Random Access Channel (RACH) (uplink)
Used by the MSs for initial access to the network
Collision may occurs.
Slotted Aloha protocol is used to resolve access
collision.
Access Grant Channel (AGCH) (downlink)
Used by the network to indicate radio link allocation
upon prime access of an MS
Paging Channel (PCH) (downlink)
Used by the network to page the destination MS in
call termination
Common Control Channel (CCCH)
32. DCCH is for dedicated use by a specific MS.
Four types in DCCH:
Standalone Dedicated Control Channel (SDCCH)
(down/uplink)
used only for signaling and for short message
Slow Associated Control Channel (SACCH)
(down/uplink)
Associated with either a TCH or an SDCCH
For non-urgent procedures
Power and time alignment control information
(downlink)
Measurement reports from the MS (uplink)
Dedicated Control Channel (DCCH) (1/2)
33. Four types in DCCH (continuous):
Fast Associated Control Channel (FACCH)
(down/uplink)
Used for time-critical signaling, such as call-
establishing progress, authentication of subscriber, or
handoff.
FACCH use TCH during a call.
May cause user data loss.
Cell Broadcast Channel (CBCH) (downlink)
Carries only the short message service cell broadcast
messages, which use the same time slot as the
SDCCH.
Dedicated Control Channel
(DCCH) (2/2)
34. GSM Burst Structure
3 57 bits 1
Normal Burst
26 bits 1 57 bits 3 8.25 bits
Tailing Data Flag Training Flag Data Tailing Guard
3 142 bits
Frequency Correction Burst
3 8.25 bits
Tailing Fixed Bits Tailing Guard
3 39 bits
Synchronization Burst
64 bits 39 bits 3 8.25 bits
Tailing Data Training Data Tailing Guard
3 41 bits
Access Burst
36 bits 3 68.25 bits
Tailing Synch. Seq. Data Tailing Guard
38. Mobility Databases
The hierarchical databases used in GSM.
The home location register (HLR) is a database
used for MS information management.
The visitor location register (VLR) is the database
of the service area visited by an MS.
MSC 1
HLR
VLR 1 VLR 2
MSC 2
39. Key Terms
GSM uses some identifiers
Mobile system ISDN (MSISDN)
Mobile Station Roaming Number (MSRN)
International Mobile Subscriber Identity (IMSI)
Temporary Mobile Subscriber Identity (TMSI)
International Mobile station Equipment Identity
(IMEI)
Location Area Identity (LAI)
Cell Global Identity (CAI)
40. MSISDN
Mobile System ISDN
MSISDN uses the same format as the ISDN
address (based on ITU-T Recommendation
E.164).
HLR uses MSISDN to provide routing instructions
to other components in order to reach the
subscriber.
Country code
(CC)
National destination
code (NDC)
Subscriber
number (SN)
Total up to 15 digits
41. MSRN
Mobile Station Roaming Number
The routing address to route the call to the
MS through the visited MSC.
MSRN=CC+NDC+SN
42. IMSI
International Mobile Subscriber Identity
Each mobile unit is identified uniquely with an
IMSI.
IMSI includes the country, mobile network, mobile
subscriber.
Total up to 15 digits
Mobile country
code (MCC)
Mobile network
code (MNC)
Mobile subscriber
identification code (MSIC)
3 digits 1- 2 digits Up to 10 digits
43. TMSI
Temporary Mobile Subscriber Identify
TMSI is an alias used in place of the IMSI.
This value is sent over the air interface in place of
the IMSI for purposes of security.
44. IMEI
International Mobile Station Equipment
Identity
IMEI is assigned to the GSM at the factory.
When a GSM component passes conformance
and interoperability tests, it is given a TAC.
Up to 15 digits
Type approval
code (FAC)
Final assembly
code (FAC) Serial number (MSIC)
3 digits 2 digits Up to 10 digits
Spare 1 digit
45. LAI
Location Area Identity
LAI identifies a location area (LA).
When an MS roams into another cell, if it is in the
same LAI, no information is exchanged.
Total up to 15 digits
Mobile country
code (MCC)
Mobile network
code (MNC)
Location area code (LAC)
3 digits 1-2 digits Up to 10 digits
47. Home Location Register (HLR)
An HLR record consists of 3 types of
information:
Mobile station information
IMSI (used by the MS to access the network)
MSISDN (the ISDN number-“Phone Number” of the
MS)
Location information
ISDN number of the VLR (where the MS resides)
ISDN number of the MSC (where the MS resides)
Service information
service subscription
service restrictions
supplementary services
48. Visitor Location Register (VLR)
The VLR information consists of three parts:
Mobile Station Information
IMSI
MSISDN
TMSI
Location Information
MSC Number
Location Area ID (LAI)
Service Information
A subset of the service Information stored in HLR
54. GSM Location Area Hierarchy
HLR
VLR2VLR1
MSC1 MSC2
LA1 LA2
MS
HLR : HOME Location Register
VLR : VISITOR Location Register
MSC : Mobile Switching Center
LA : Location Area
MS : Mobile Station
55. Location Update Concept
Registration: the location update procedure
initiated by the MS:
Step 1. BS periodically broadcasts the LA
address.
Step 2. When an MS finds the LA of BS different
from the one stored in it memory, it sends a
registration message to the network.
Step 3. The location information is update.
56. Periodically Registration
The MS periodically send registration
messages to the network.
The period is 6 minutes to 24 hours.
Periodic registration is useful for fault-
tolerance purposes.
57. GSM Basic Location Update
Procedure
In GSM, registration or location update
occurs when an MS moves from one LA to
another.
Three cases of location update:
Case 1. Inter-LA Movement
Case 2. Inter-MSC Movement
Case 3. Inter-VLR Movement
59. Two LAs belong to the same MSC.
Four major steps:
Step 1. MS sends a location update request
message (MS→BTS→MSC) .
Parameters included: TMSI, Previous LA, target LA,
previous MSC and previous VLR.
IMSI (International Mobile Subscriber Identity) is used
to identify MS.
However, the MS identifies itself by the Temporary
Mobile Subscriber Identity (TMSI).
TMSI is used to avoid sending the IMSI on the radio
path.
TMSI is temporary identity is allocated to an MS by
the VLR at inter-VLR registration.
Inter-LA Movement (1/2)
60. The Process continues:
Step 2. The MSC forwards the location update
request to the VLR by a TCAP message,
MAP_UPDATE_LOCATION_AREA.
Parameter includes: Address of the MSC, TMSI,
previous Location Area Identification (LAI), target LAI,
Other related information
Steps 3 and 4.
Part I. The VLR find that both LA1 and LA2 belong to
the same MSC.
Part II. The VLR updates the LAI field of the MS.
Part III. The VLR replies an ACK to the MS through
the MSC.
Inter-LA Movement (2/2)
62. The two LAs belong to different MSCs of the
same VLR.
The process is:
Steps 1 and 2. MS sends a location update
request message (MS→BTS→MSC) .
Step 3.
Part I. VLR1 finds that the LA1 and LA2 belong to
MSC1 and MSC2, respectively. Two MSCs are
connected to VLR1.
Part II. VLR1 updates the LAI and MSC fields of MS.
Part III. The VLR1 derives the HLR address of the MS
from the MS’s IMSI.
Inter-MSC Movement (1/2)
63. The process continues:
Step 3.
Part IV. The VLR1 sends the
MAP_UPDATE_LOCATION to the HLR.
Parameter includes: IMSI, previous MSC Address,
target MSC Address, VLR Address, other related
information
Step 4. HLR updates the MSC number field of
the MS. An acknowledgement is sent to VLR1.
Steps 5 and 6. The acknowledgement is
forwarded to the MS.
Inter-MSC Movement (2/2)
65. MS Registration Process (2/2)
HLR
Old
VLR
New
VLR
1
3
4
2
5
TMSI
TMSI
MS’s IMSI 及其他認證資料
new TMSI
認證成功後向
HLR進行
location update
deregistration
消除VLR內資料
66. Two LAs belong to MSCs connected to
different VLRs.
The process is:
Step 1. MS sends a location update request.
MSC2 sends MAP_UPDATE_LOCATION_AREA
to VLR 2 with MS’s TMSI.
Steps 2 and 3.
VLR2 does not have the record of MS.
VLR2 identifies the address the VLR1 and sends
MAP_SEND_IDENTIFICATION (with TMSI) to VLR1.
VLR1 sends IMSI to VLR2.
Inter-VLR Movement (1/2)
67. The process continues:
Steps 4 and 5.
VLR2 creates a VLR record for the MS.
VLR2 sends a registration message to HLR.
HLR updates the record of the MS.
HLR sends an acknowledge back to VLR2.
Step 6.
VLR2 generates a new TMSI and sends it to the MS.
Steps 7 and 8.
The obsolete record of the MS in VLR1 is deleted.
Inter-VLR Movement (2/2)
69. Call Origination Operation
V L R V 2
M SC
u1
C loud
C loud
P ST N
V L R
T erm inating
Sw itch M SC
2. M A P _SE N D _IN F O _F O R _O U T G O IN G _C A L L
3. M A P _SE N D _IN F O _FO R _O U T G O IN G _C A L L _ack
4. IA M
2
3
70. GSM Basic Call Origination
The process is
Step 1. MS sends the call origination request to
MSC.
Step 2. MSC forwards the request to VLR with
message
MAP_SEND_INFO_FOR_OUTGOING_CALL.
Step 3. VLR checks MS’s profile and sends
MAP_SEND_INFO_FOR_OUTGOING_CALL_ac
k to MSC to grant the call request.
Step 4. MSC sets up the trunk according to the
standard PSTN call setup procedure.
72. Call Termination (1/2)
Routing information for call termination can
be obtained form the serving VLR.
The basic call termination process:
Step 1. A MS’s ISDN (MSISDN) number is
dialed by a PSTN user. The call is routed to a
gateway MSC by an SS7 ISUP IAM message.
Step 2. GMSC sends
MAP_SEND_ROUTING_INFORMATION with
the MSISDN to HLR.
73. Call Termination (2/2)
The process continues:
Step 3. HLR sends a
MAP_PROVIDE_ROAMING_NUMBER to VLR.
Parameter included: IMSI of the MS, the MSC number.
Steps 4 and 5. VLR creates Mobile Subscriber
Roaming Number (MSRN) by using the MSC
number stored in the VLR record.
MSRN is sent back to the gateway MSC through HLR.
MSRN provides the address of the target MSC where
the MS resides.
Step 6. An SS7 ISUP IAM message is directed
from the gateway MSC to the target MSC to setup
the voice trunk.
77. Two Aspects of Mobility in a
PCS Network
Handoff
Link transfer, or Handover
A mobile user moves from one coverage area of
an old BS to the coverage area of a new BS
during the conversation.
The radio link to the old BS is disconnected and
a radio link to the new BS should be established
to continue the conversation.
Roaming
When a mobile user moves from one system to
another, the user location should tell the PCS
system.
78. BS Coverage Area
BS coverage area:irregular.
In the cell boundary:
Signal from a neighboring BS
Signal from the serving BS
Otherwise: Forced termination
79. Handoff Cost
Handoffs are expensive.
Special for the system with small cell sizes
Small cell size for
To increase the capacity of the systems
To reduce power requirements of MSs.
82. Strategies for Handoff
Detection
Who makes a decision for handoff?
Three handoff detection schemes:
Mobile-Controlled Handoff (MCHO)
Network-Controlled Handoff (NCHO)
Mobile-Assisted Handoff (MAHO)
Others
83. MCHO is used in DECT and PACS.
Part I. The MS continuously monitors the
signals of the surrounding BSs.
Part II. The MS initiates the handoff process
when some handoff criteria are met.
Mobile-Controlled Handoff
(MCHO)
84. Network-Controlled Handoff
(NCHO)
Used in CT-2+ and AMPS
Part I. The surrounding BSs measure the
signal from the MS.
Part II. The network initiates the handoff
process when some handoff criteria are met.
MSC controls the handoff.
85. Mobile-Assisted Handoff
(MAHO)
Used in GSM, IS-136 and IS-95
Part I.. The network asks the MS to measure
the signal from the surrounding BSs.
Part II. The network makes the handoff
decision based on the reports from the MS.
88. Forced Terminations
Blocked call:Initial access requests fail
For new call
No available channels on the visited BS
Forced terminations:Handoff requests fail
For handoff call
No available channel on the selected BSs
Which one is serious, new call blocking or
force terminating?
91. Flowchart for Reserved
Channel Scheme
New
call
arrival
Normal
channel
available?
Channel
assigned
Handoff
call
arrival
Normal
channel
available?
Reserved
channel
available?
yes yes
yes
no
no no
Channel
blocked
Ongoing
call
Channel
released
93. Link Transfer
Two operations:
The radio link is
transferred from the
old BS to the new BS.
The network bridges
the trunk to the new
BS and drop the trunk
to the old BS.
MSC
Old
BS New
BS
94. Five Distinct Link Transfer
Cases (1/3)
1. Intra-BTS handoff or intra-cell handoff
2. Inter-BTS handoff or inter-cell handoff
3. Inter-BSC handoff
4. Inter-MSC handoff or intersystem handoff
5. Intersystem handoff between two PCS
networks
100. Anchor MSC
MSC A MSC B MSC C
BS 1 BS 2
BS 3 BS 4 BS 5
1
2
3
4
MSC A is the anchor MSC.
1: inter-BS handoff 2: handoff forward
3: handoff back 4: handoff to the third
101. Path Minimization
MSCA MSCB MSCA MSCB
(a) Handoff forwad
(a) Handoff Backwad
MSCA
MSCB
(c) Handoff to the Third
MSCc
MSCA
MSCB
(d) Path Minimization
MSCc
104. Hard Handoff
MS connects with only one
BS at a time.
Interruption in the
conversation occurs
Used in TDMA and FDMA
systems
We will study the signaling of
handoff:
MCHO Link Transfer
MAHO/NCHO Link Transfer
Subrating MCHO Link Transfer
MSC
Old
BS
New
BS
105. Hard Handoff Link Transfer for
MCHO
A handoff request message is initiated by the
MS.
The network can initiate the handoff.
But always MS chooses the BS.
MS selects a new radio channel.
If a handoff failure occurs, the MS link-quality
maintenance process must decide what to do
next.
107. Soft Handoff
MS connects to multiple BSs
simultaneously.
BSs use the same frequency.
BSs must be synchronized.
The network must combine
the signals form the multiple
BSs simultaneously.
Soft handoff is more
complicated than hard
handoff.
MSC
BS 1 BS 2
108. Mobility Management
Mobility management procedures begin
when a system detects the presence of a
visiting terminal.
(1) serving base station → serving MSC
(inform MSC the terminal’s action)
(2) MSC records that the terminal is in its
operating area
(3) MSC send this information to its VLR.
(4) VLR notifies the terminal’s HLR.
(5) HLR notifies the old VLR to erase record.
112. Handoff Categories
IS-41 specifies three handoff protocols:
handoff forward, handoff back, and handoff to
third.
Intersystem handoff requires dedicated
communication links between a pair of
MSCs:
voice trunks: for carrying user information in
calls handed from one MSC to another
data links: for carrying control messages
between the two switch.
113. Handoff forward:
The terminal moves into
the service area of system
B causing MSC-A and
MSC-B to perform a
handoff.
MSC-A is the anchor MSC
MSC-A is responsible for
routing the call to the
remote party.
MSC-B is the serving
MSC because it currently
has control of the call.
After handoff, MSC-B is
the target MSC.Figure 4.8 The situation after a handoff
forward from system A(anchor system) to
system B(serving system).
114. Handoff Back:
The terminal can return to
the service area of system
A.
MSC-B recognizes that
the call arrived from
system A and it initiates a
handoff back protocol,
which releases the voice
circuit between MSC-A
and MSC-B.
Without this protocol, the
systems would tie up two
voice trunks
one taking the call
from system A to
system B
the other taking it from
system B to system A.
115. Handoff forward:
It is possible that the
terminal will move from
system B to a third system C.
This produces two
possibilities in Figures 4.9
and 4.10.
In Figure 4.9, MSC-B and
MSC-C perform a handoff
forward procedure the one
that moved the call from
system A to system B.
System B provides a path
from MSC-A to MSC-C.
The situation can continue,
adding more and more
MSCs to the chain, up to a
limit established by the
anchor system.
Figure 4.9 Call path after handoff forward to
system C
116. Handoff to third:
An alternative occurs when
there is a direct connection
between systems A and C.
IS-41 includes a protocol
referred to as handoff to
third, which establishes a
direct link between MSC-A
and MSC-C and release the
link between A and B.
Figure 4.10 If there are circuits connecting MSC-A
and MSC-C, the system performs handoff to third.
117. Handoff Protocols
There are two phases to every handoff
procedure.
Location phase
the serving MSC collects measurement reports
from cells in the neighborhood of the cell
presently occupied by a terminal.
When measurements are required from one or
more cells in a system adjacent to the serving
system, the adjacent system becomes a
candidate system.
The serving MSC and a candidate MSC
exchange handoff measurement request
messages.
118. A HANDOFF MEASUREMENT REQUEST
INVOKE message, transmitted by the serving
MSC includes:
information about the terminal (station class mark,
SCM, indicates the capabilities of the terminal)
information about the serving base station (SAT and
a base station identifier), and
information about the radio channel carrying the call
(channel number).
Based on the identity of the serving base station,
the candidate MSC selects one or more
candidate cells and transmits a HANDOFF
MEASUREMENT REQUEST RESULT message
to the serving MSC.
119. The HANDOFF MEASUREMENT REQUEST
RESULT message contains identities of candidate
cells and associated signal strength measurements.
The serving MSC selects a target cell for the handoff.
If the target cell is served by a candidate MSC, this
MSC becomes the target MSC for the handoff.
The handoff procedure then moves from the location
phase to the handoff phase.
Handoff phase:
the serving MSC determines the type of handoff to
initiate (forward, back, or handoff to third).
120. Handoff Forward Protocol:
The serving MSC sends a FACILITIES DIRECTIVE
INVOKE message to the target MSC.
This message contains:
information about the terminal (SCM, MIN, ESN)
information about the call:
billing ID (established by the anchor MSC at the beginning
of the call);
inter-MSC circuit (voice trunk that will carry the call from
the serving MSC to the target MSC);
inter-switch count (the total number of MSCs through which
the call will pass after the handoff);
information about the call status (serving cell, serving channel);
and
target cell identifier (based on measurement reports from the
get MSC).
121. If the target MSC accepts the handoff, it selects a channel
to handle the call in the new cell and then sends a
FACILITIES DIRECTIVE RESULT message to the serving
MSC.
This message contains information about the new channel:
channel number, SAT, and transmit power level (VMAC).
On receiving this message, the serving MSC sends an
AMPS HANDOFF message to the terminal through the
serving cell.
When the target base station detects the SAT, it sends a
message to the target MSC which completes the handoff
forward operation by sending a MOBILE ON CHANNEL
INVOKE message to the prior serving MSC.
124. Handoff Back Protocol:
If the location phase results in a determination by the
serving MSC(MSC-B) that the call would best be handled
in the system(system A) previously occupied by the
terminal, the serving MSC initiates a handoff back
procedure.
It (MSC-B) sends a HANDOFF BACK INVOKE message
to the previous MSC (MSC-A), which is now the target
MSC of the handoff protocol.
The message plays the same role as the FACILITIES
DIRECTIVE INVOKE message.
The target MSC (MSC-A) sends HANDOFF BACK
RESULT message to the serving MSC (MSC-B).
This message contains the same information as the
FACILITIES DIRECTIVE RESULT message.
125. When the target MSC(MSC-A) learns that the terminal has
arrived on the assigned channel at the target base station,
it sends a FACILITIES RELEASE INVOKE message to the
serving MSC (MSC-B).
This message identifies the voice trunk that carries the call
between the two MSCs.
On receiving this message, the serving MSC (MSC-B)
releases the voice trunk and sends a FACILITIES
RELEASE RESULT message to the target MSC.
Any two MSCs in a chain can perform the handoff back
protocol.
126.
127. Handoff to third Protocol:
Handoff to third protocol is an example of path
minimization procedure, in which the system reduces the
number of voice trunks carrying a call through three or
more systems.
130. Security
GSM security is addressed in two aspects:
authentication and encryption.
Authentication avoids fraudulent access by a
cloned MS.
Encryption avoids unauthorized listening.
131. Parameters
Parameters:
Ki is used to achieve authentication.
Ki is stored in the AuC and SIM.
Ki is not known to the subscriber.
RAND
A 128-bit random number generated by the home
system.
SRES is generated by algorithm A3.
Kc is generated by algorithm A8 for the encryption.
Frame Number
A TDMA frame number encoded in the data bits.
132. Algorithms
Authentication Algorithms:
A3.
Authentication function.
In AuC and SIM
Encryption Algorithms:
A8.
To generate the encryption Key
In AuC and SIM
A5.
An algorithm stored in the MS (handset hardware) and
the visited system.
Used for the data ciphering and deciphering
133. Authentication and Encryption
Ki
RAND
A3 A8
Equal
?
SRES
Yes
No
reject
accept
A5
Kc
Ki
Frame
Number
A8 A3
SRES
Kc
A5 DataCiphered DataData
Mobile Station Home System
Visited
System
authentication
encryption
134. Authentication by Triplet
Triplet: RAND, SRES, Kc
AuC→HLR→VLR in advance
Example: Authentication in registration
New VLR uses LAI to find old VLR.
Old VLR sends triplets to new VLR.
New VLR challenges MS by using RAND and
SRES.