SlideShare a Scribd company logo
1 of 6
2nd
GENERATION:
The 2G secondgenerationmobilecommunicationsystemis digitalsystem.Itcannotnormallytransfer
data such as email orsoftware otherthanthe digital voice call itself,andotherbasicancillarydatasuch
as data and time.SMS messagingisalsoavailable asaform of data transmissionforsome standard.2G
cellulartelecomnetworkswere commerciallylaunchedonthe GSM(Global systemformobile
communication) standardinFinland. 2Gtechnologiescanbe dividedinto Time Division Multiple
Access (TDMA) basedandCode Division Multiple Access (CDMA) based standards depending on the
type of multiplexing used.
Three servicesare offeredbyGSM
1) Teleservices
2) BearerServices
3) Supplementary Service
TELESERVICES:
>Telephony
Codecsforvoice anddata
Encryptionof voice data
>EmergencyCalls
These callsmusthave the highestpriority
Directingyoutothe nearestconnectionpoint
>Voice Mail
>Fax Mail
>Facsimile Group3
>Short MessagingService (SMS)
Includingthe SMS – Cell Broadcast(SMS-CB)
Bearer Services:
>Bearerservicesare for the transportof data
9600 bitspersecondmaximum
Synchronousandasynchronous
Alternate dataand speech
>Transparent
Fixeddelayindatatransfer
No guaranteesof dataintegrity
>Non transparent
Variable Delay
GuaranteeddataintegrityviaAutomaticrepeatrequest(ARQ)
SUPLEMEMNTARYSERVICES:
User Identification
Call Redirection
Call Hold
Advice of Charge
Call Barring
Call Forwarding
Multipartycalls
GSMOperates:
Time DivisionMultiplexAccess(TDMA)
o Thisallowthe frequencytobe brokenupintoslots
 The frequenciesusedare GSM900 , GSM 1800 andGSM 1900
 Separate frequenciesare usedforthe uplinkanddownlink
 890-915MHz uplink,935-960MHz downlinkforexample
 UplinkandDownlinkare 45 MHz apart
 200KHz spacingon the frequency
 124 pairsof channels
 These channelsare thendividedinto8time slices
 For GSM each slice is 0.577 ms
 Total channelsavailable is8* 124 = 992 (ina theoretical context)
o Thismeansthat there iseighttimesthe capacityas before inone partof the
frequency
 Assumingthe same rate isused
One of the featureswhichallowedthe increase inthe numberof usersisdigitisationof voice
o The voice issampledusinga(analogue toDigital Converter) ADC
 8KHz / second,withan 8 bit result
o The voice informationisthentransferredusingone of these methods
 EnhancedFull Rate
 Bestquality speech
 Uses a full slot
 Marginal increase inprocessoroverhead
 Full Rate
 Improvedspeechquality
 Takesa full slottotransfer
 Half Rate
 Thismode allowsfora doublingof capacityto a base station
 Loss inspeechquality,butnotsignificant
 Half a slotto transfer
Digitisation
o Of voice allowsforanumberof features
o Takeslessbandwidthtotransferthe voice
o The data once digital
 Can be encrypted
 Can be recoveredevenwiththe attenuationeffects
 Additional bitscanbe addedtoallow forerrors withintransport
 Withoutthe needforretransmission –ForwardError Checking
(FEC)
 The digital voice datacan thenbe place inside of apacketfor transport
Time DivisionMultiple Access(TDMA)
 Guard Time:Interval betweenburstsusedtoavoidoverlapping
 Preamble: Firstpart of the burst
 Message:Part of burst that includesuserdata
Postamble:Last part of burst – usedto initialise followingburst
SubscriberIdentityModule(SIM) Card
o Essential forthe GSMnetwork
o The SIM islocatedwithinthe Mobile station(MS)
 Basicallythe phone handsetyouuse
o Contains
 SubscriberAuthenticationkey
 128 bitencryptionkey
 International MobileSubscriberIdentity(IMSI).
 A unique internationalnone dial able numberwhichisattachedtoyour
device.
 TemporaryMobile SubscriberIdentity .
 Mobile StationIntegratedService DigitalNetwork(MSISDN).
 BasicallythisisYOUR phone number.
 PIN to secure the card.
 SMS messages.
 Personal data,phone numbers,Phonesettings etc.
o Each one isunique
 Authenticationencryptionisusedcalledthe A3/A8.
Thisis usedtoauthenticate yourdevice usingchallenge/response
 A randomnumberissent.
 The A3/A8 algorithmthenworksonthe numberandreturnsa
32-bit response.
 If this matchesthe one whichthe networkhascalculatedthe
device isauthenticated.
 A5 Encryptionisusedfor the voice calls.
Code DivisionMultiple Access(CDMA)
o Multiple accesstechniqueusedbyamericanSystem(notusedbythe EuropeanGSM
system)
o Basedon the spread-spectrumtechnique:
 „Spreadspectrum“indicatesthatthe signal occupiesmore spectrumthanin
FDMA and TDMA system
 Transmissionmode wherethe transmitteddataoccupiesalargerbandwidth
than that requiredtotransferdata
o Accesstechnique realisedbeforetransmissionbyadditionof acode that is independent
of the data sequence
 code usedat the receive endwhichmustoperate synchronizedwiththe
transmitter,todespreadthe receivedsignal inordertorecoverthe initial data
o Allowsmanydevicestotransmitsimultaneouslyinthe same frequencyband
Principle:
Each MH is allocatedarandom sequence orcode – thismustbe differentandorthogonal or
quasi-orthogonal(i.e.decorrelated) fromall othersequences
o CDMA providesprotectionagainstmultipathfadinginterference,privacy,interference
rejection,anti-jammingcapability,low probabilityof interceptionandallows
macrodiversity
o Three basicspread-spectrumtechniquesare defined:
 Direct Sequence CDMA– DS-CDMA
 Fast FrequencyHopping CDMA – FH-CDMA
 Time HoppingCDMA – TH-CDMA
GSMconsistsof three major systems:
 Base-StationSystem(BSS)
 NetworkSwitichingSub-System(NSS)
 OperationandSupportSystem(OSS)
o The SwitchingSystemperformscall processingandsubscriberrelatedfunctions
o The systemcontainsthe followingfunctional units
 Home LocationRegister(HLR)
 Mobile SwitchingCenter(MSC)
 VisitorLocationRegister(VLR)
 AuthenticationCenter(AUC)
 EquipmentIdentityRegister(EIR)
 Base Station System(BSS)
o Thisis the part of the networkwhichconnectsthe MS to the networkviathe radio
interface
 Base Station(BS)
 Knowas (Base TransceiverStation(BTS)) inofficial GSMdocumentation
 Thisis the radiotransceiverthe areaof transmissionisreferredtoasthe
cell
Base stationcontroller
o Thisnode takesoverall control of a numberof base stationsa pointof control for the BS
 Otherfunctionality
 Trafficconcentration
 Switchingoperations
Data basedand voice
 Networkmanagementtoall BS attached
 Radiochannel managementforall BSattached
 Conversionof airinterface ratestonetworkapplicable rates
13 Kbpsto 64 Kbps
 Handovercontrol
Thisis forbase stationswhichithas control of
 NetworkSwitchingSub-System(NSS)
 Responsible forthe transferof informationfromthe handsetstothe correctpart of the
infrastructure
 Functions
 HandoversbetweenBSC’s
 Allowcommunicationbetweenmobile andPSTN networks
 Allowsforroamingbetweennetworks
 A numberof nodesare a part of the NSS
o NSSnodes consistof
 Mobile SwitchingCentre (MSC)
 Home LocationRegister(HLR)
 VisitorLocationCentre (VLR)
 AuthenticationCentre (AuC)
 EquipmentIdentityRegister(EIR)
o HLR isthe most importantdatabase
 Storage and managementof subscriptions
 Permanentdataincludes:
 Subscriber'sservice profile
 Subscriber'slocationinformation
 Subscriber‘sactivitystatus
 Subscribingtoa particularprovider‘sservice registersyouinthe HLR of that provider
o The MSC performsthe telephonyswitchingfunctionsof the network
 Controlscall to andfrom othertelephoneanddatasystems
 Alsoperformsfunctionssuchas
 Toll ticketing
 Networkinterfacing
 CommonChannel signalling
o VLR containsdata onvisiting(roaming)subscribers
 Integratedwiththe MSC
 Whena roamer entersthe service areathe VLRqueriesthe appropriate HLR
 If a roamermakesa call the VLR will alreadyhave the informationitneedsforcall setup
o The AUC verifiesthe identityof the userandensuresandensuresthe confidentialityof eachcall
 By provide authenticityandencryptionparametersforeverycall
 Protectsnetworkoperatorsfromfraud
 Assuresacertainlevel of securityforthe contentof eachcall
o The EIR isa database that includesinfosolelyaboutthe identitymobile equipment
 Preventscallsfrom stolen,unauthorisedordefective mobile devices
 OperationandSupportSystem
 Thispart of the networkallowsmonitoringof the network
 Ensuresthe smoothrunningandinvolvesmanagementtasks
 AccountingandBilling
 StatusReports
 Trafficmonitoring
 In additionif aBSC can not carry out all of itstasksthe OSSwill take control of
the BSC’s tasks
 The OSS islogicallyconnectedtoall equipmentinthe infrastructure.
GSMInfrastructure
Made by: Muhammad Ahad

More Related Content

What's hot (20)

2gppt410
2gppt4102gppt410
2gppt410
 
Ch5
Ch5Ch5
Ch5
 
Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principles
 
Full gsm overview (modified)
Full gsm overview  (modified)Full gsm overview  (modified)
Full gsm overview (modified)
 
Gsmadvanced
GsmadvancedGsmadvanced
Gsmadvanced
 
An Introduction to GSM
An Introduction to GSM An Introduction to GSM
An Introduction to GSM
 
Gsm (2)
Gsm (2)Gsm (2)
Gsm (2)
 
Basic of teleom gsm
Basic of teleom gsmBasic of teleom gsm
Basic of teleom gsm
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSM
 
gsm
 gsm gsm
gsm
 
Mobile Station
Mobile StationMobile Station
Mobile Station
 
Wireless networks gsm cdma
Wireless networks  gsm cdmaWireless networks  gsm cdma
Wireless networks gsm cdma
 
GPRS seminar ppt
GPRS seminar pptGPRS seminar ppt
GPRS seminar ppt
 
Mobile data networks
Mobile data networksMobile data networks
Mobile data networks
 
Gsm architecture and signalling techniques
Gsm architecture and signalling techniquesGsm architecture and signalling techniques
Gsm architecture and signalling techniques
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMS
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryali
 
Gsm (1)
Gsm (1)Gsm (1)
Gsm (1)
 

Viewers also liked

2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..Muhammad Ahad
 
Kumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication securityKumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication securitynullowaspmumbai
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationsourabh kant
 
Comparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte aComparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte aManish Srivastava
 
The Future of Communication Technology
The Future of Communication TechnologyThe Future of Communication Technology
The Future of Communication Technologyanpipt01
 
Trends in communication technology
Trends in communication technologyTrends in communication technology
Trends in communication technologyVishal Langthasa
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technologyRashmi Joaa
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systemsjincy-a
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5GBharathi Ravi
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationKomal Gandhi
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentationmrtheodisthorne2
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyFatma Ala'a
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication systemBogs De Castro
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GPrateek Aloni
 

Viewers also liked (20)

2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..
 
Kumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication securityKumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication security
 
Final ppt
Final pptFinal ppt
Final ppt
 
Modern trends in mobile communication
Modern trends in mobile communicationModern trends in mobile communication
Modern trends in mobile communication
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Comparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte aComparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte a
 
1G,2G,3G,4G technologies
1G,2G,3G,4G technologies1G,2G,3G,4G technologies
1G,2G,3G,4G technologies
 
The Future of Communication Technology
The Future of Communication TechnologyThe Future of Communication Technology
The Future of Communication Technology
 
Trends in communication technology
Trends in communication technologyTrends in communication technology
Trends in communication technology
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication system
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
wireless communication
wireless communicationwireless communication
wireless communication
 

Similar to 2G...All about second generation of cellular networks.

Similar to 2G...All about second generation of cellular networks. (20)

GSM
GSMGSM
GSM
 
bsnl presentation on gsm
bsnl presentation on  gsm bsnl presentation on  gsm
bsnl presentation on gsm
 
Kp
KpKp
Kp
 
Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
GSM.ppt
GSM.pptGSM.ppt
GSM.ppt
 
Chapter 3 Telecom Sys.pptx
Chapter 3  Telecom Sys.pptxChapter 3  Telecom Sys.pptx
Chapter 3 Telecom Sys.pptx
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Journey of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMAJourney of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMA
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
GSM Module
GSM ModuleGSM Module
GSM Module
 
GSM network
GSM networkGSM network
GSM network
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication system
 
Global system for mobile communication
Global system for mobile communicationGlobal system for mobile communication
Global system for mobile communication
 
105093_633617613676087500 GSM technology.ppt
105093_633617613676087500 GSM technology.ppt105093_633617613676087500 GSM technology.ppt
105093_633617613676087500 GSM technology.ppt
 
Gsm overview
Gsm overviewGsm overview
Gsm overview
 
Gsm
Gsm Gsm
Gsm
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)
 

More from Muhammad Ahad

11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2Muhammad Ahad
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1Muhammad Ahad
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2Muhammad Ahad
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slidesMuhammad Ahad
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-conceptsMuhammad Ahad
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slidesMuhammad Ahad
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructureMuhammad Ahad
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)Muhammad Ahad
 

More from Muhammad Ahad (20)

11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
08. networking
08. networking08. networking
08. networking
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
06. security concept
06. security concept06. security concept
06. security concept
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
Chapter14
Chapter14Chapter14
Chapter14
 
Chapter13
Chapter13Chapter13
Chapter13
 
Chapter12
Chapter12Chapter12
Chapter12
 
Chapter11
Chapter11Chapter11
Chapter11
 
Chapter10
Chapter10Chapter10
Chapter10
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

2G...All about second generation of cellular networks.

  • 1. 2nd GENERATION: The 2G secondgenerationmobilecommunicationsystemis digitalsystem.Itcannotnormallytransfer data such as email orsoftware otherthanthe digital voice call itself,andotherbasicancillarydatasuch as data and time.SMS messagingisalsoavailable asaform of data transmissionforsome standard.2G cellulartelecomnetworkswere commerciallylaunchedonthe GSM(Global systemformobile communication) standardinFinland. 2Gtechnologiescanbe dividedinto Time Division Multiple Access (TDMA) basedandCode Division Multiple Access (CDMA) based standards depending on the type of multiplexing used. Three servicesare offeredbyGSM 1) Teleservices 2) BearerServices 3) Supplementary Service TELESERVICES: >Telephony Codecsforvoice anddata Encryptionof voice data >EmergencyCalls These callsmusthave the highestpriority Directingyoutothe nearestconnectionpoint >Voice Mail >Fax Mail >Facsimile Group3 >Short MessagingService (SMS) Includingthe SMS – Cell Broadcast(SMS-CB) Bearer Services: >Bearerservicesare for the transportof data 9600 bitspersecondmaximum Synchronousandasynchronous Alternate dataand speech >Transparent Fixeddelayindatatransfer No guaranteesof dataintegrity >Non transparent Variable Delay GuaranteeddataintegrityviaAutomaticrepeatrequest(ARQ) SUPLEMEMNTARYSERVICES: User Identification Call Redirection Call Hold Advice of Charge Call Barring Call Forwarding Multipartycalls
  • 2. GSMOperates: Time DivisionMultiplexAccess(TDMA) o Thisallowthe frequencytobe brokenupintoslots  The frequenciesusedare GSM900 , GSM 1800 andGSM 1900  Separate frequenciesare usedforthe uplinkanddownlink  890-915MHz uplink,935-960MHz downlinkforexample  UplinkandDownlinkare 45 MHz apart  200KHz spacingon the frequency  124 pairsof channels  These channelsare thendividedinto8time slices  For GSM each slice is 0.577 ms  Total channelsavailable is8* 124 = 992 (ina theoretical context) o Thismeansthat there iseighttimesthe capacityas before inone partof the frequency  Assumingthe same rate isused One of the featureswhichallowedthe increase inthe numberof usersisdigitisationof voice o The voice issampledusinga(analogue toDigital Converter) ADC  8KHz / second,withan 8 bit result o The voice informationisthentransferredusingone of these methods  EnhancedFull Rate  Bestquality speech  Uses a full slot  Marginal increase inprocessoroverhead  Full Rate  Improvedspeechquality  Takesa full slottotransfer  Half Rate  Thismode allowsfora doublingof capacityto a base station  Loss inspeechquality,butnotsignificant  Half a slotto transfer Digitisation o Of voice allowsforanumberof features o Takeslessbandwidthtotransferthe voice o The data once digital  Can be encrypted  Can be recoveredevenwiththe attenuationeffects  Additional bitscanbe addedtoallow forerrors withintransport  Withoutthe needforretransmission –ForwardError Checking (FEC)  The digital voice datacan thenbe place inside of apacketfor transport Time DivisionMultiple Access(TDMA)  Guard Time:Interval betweenburstsusedtoavoidoverlapping  Preamble: Firstpart of the burst  Message:Part of burst that includesuserdata Postamble:Last part of burst – usedto initialise followingburst
  • 3. SubscriberIdentityModule(SIM) Card o Essential forthe GSMnetwork o The SIM islocatedwithinthe Mobile station(MS)  Basicallythe phone handsetyouuse o Contains  SubscriberAuthenticationkey  128 bitencryptionkey  International MobileSubscriberIdentity(IMSI).  A unique internationalnone dial able numberwhichisattachedtoyour device.  TemporaryMobile SubscriberIdentity .  Mobile StationIntegratedService DigitalNetwork(MSISDN).  BasicallythisisYOUR phone number.  PIN to secure the card.  SMS messages.  Personal data,phone numbers,Phonesettings etc. o Each one isunique  Authenticationencryptionisusedcalledthe A3/A8. Thisis usedtoauthenticate yourdevice usingchallenge/response  A randomnumberissent.  The A3/A8 algorithmthenworksonthe numberandreturnsa 32-bit response.  If this matchesthe one whichthe networkhascalculatedthe device isauthenticated.  A5 Encryptionisusedfor the voice calls. Code DivisionMultiple Access(CDMA) o Multiple accesstechniqueusedbyamericanSystem(notusedbythe EuropeanGSM system) o Basedon the spread-spectrumtechnique:  „Spreadspectrum“indicatesthatthe signal occupiesmore spectrumthanin FDMA and TDMA system  Transmissionmode wherethe transmitteddataoccupiesalargerbandwidth than that requiredtotransferdata o Accesstechnique realisedbeforetransmissionbyadditionof acode that is independent of the data sequence
  • 4.  code usedat the receive endwhichmustoperate synchronizedwiththe transmitter,todespreadthe receivedsignal inordertorecoverthe initial data o Allowsmanydevicestotransmitsimultaneouslyinthe same frequencyband Principle: Each MH is allocatedarandom sequence orcode – thismustbe differentandorthogonal or quasi-orthogonal(i.e.decorrelated) fromall othersequences o CDMA providesprotectionagainstmultipathfadinginterference,privacy,interference rejection,anti-jammingcapability,low probabilityof interceptionandallows macrodiversity o Three basicspread-spectrumtechniquesare defined:  Direct Sequence CDMA– DS-CDMA  Fast FrequencyHopping CDMA – FH-CDMA  Time HoppingCDMA – TH-CDMA GSMconsistsof three major systems:  Base-StationSystem(BSS)  NetworkSwitichingSub-System(NSS)  OperationandSupportSystem(OSS) o The SwitchingSystemperformscall processingandsubscriberrelatedfunctions o The systemcontainsthe followingfunctional units  Home LocationRegister(HLR)  Mobile SwitchingCenter(MSC)  VisitorLocationRegister(VLR)  AuthenticationCenter(AUC)  EquipmentIdentityRegister(EIR)  Base Station System(BSS) o Thisis the part of the networkwhichconnectsthe MS to the networkviathe radio interface  Base Station(BS)  Knowas (Base TransceiverStation(BTS)) inofficial GSMdocumentation  Thisis the radiotransceiverthe areaof transmissionisreferredtoasthe cell Base stationcontroller o Thisnode takesoverall control of a numberof base stationsa pointof control for the BS  Otherfunctionality  Trafficconcentration  Switchingoperations Data basedand voice  Networkmanagementtoall BS attached  Radiochannel managementforall BSattached  Conversionof airinterface ratestonetworkapplicable rates 13 Kbpsto 64 Kbps  Handovercontrol Thisis forbase stationswhichithas control of  NetworkSwitchingSub-System(NSS)  Responsible forthe transferof informationfromthe handsetstothe correctpart of the infrastructure
  • 5.  Functions  HandoversbetweenBSC’s  Allowcommunicationbetweenmobile andPSTN networks  Allowsforroamingbetweennetworks  A numberof nodesare a part of the NSS o NSSnodes consistof  Mobile SwitchingCentre (MSC)  Home LocationRegister(HLR)  VisitorLocationCentre (VLR)  AuthenticationCentre (AuC)  EquipmentIdentityRegister(EIR) o HLR isthe most importantdatabase  Storage and managementof subscriptions  Permanentdataincludes:  Subscriber'sservice profile  Subscriber'slocationinformation  Subscriber‘sactivitystatus  Subscribingtoa particularprovider‘sservice registersyouinthe HLR of that provider o The MSC performsthe telephonyswitchingfunctionsof the network  Controlscall to andfrom othertelephoneanddatasystems  Alsoperformsfunctionssuchas  Toll ticketing  Networkinterfacing  CommonChannel signalling o VLR containsdata onvisiting(roaming)subscribers  Integratedwiththe MSC  Whena roamer entersthe service areathe VLRqueriesthe appropriate HLR  If a roamermakesa call the VLR will alreadyhave the informationitneedsforcall setup o The AUC verifiesthe identityof the userandensuresandensuresthe confidentialityof eachcall  By provide authenticityandencryptionparametersforeverycall  Protectsnetworkoperatorsfromfraud  Assuresacertainlevel of securityforthe contentof eachcall o The EIR isa database that includesinfosolelyaboutthe identitymobile equipment  Preventscallsfrom stolen,unauthorisedordefective mobile devices  OperationandSupportSystem  Thispart of the networkallowsmonitoringof the network  Ensuresthe smoothrunningandinvolvesmanagementtasks  AccountingandBilling  StatusReports  Trafficmonitoring  In additionif aBSC can not carry out all of itstasksthe OSSwill take control of the BSC’s tasks  The OSS islogicallyconnectedtoall equipmentinthe infrastructure.