SlideShare a Scribd company logo
GSM handoffs
   Intra-BSS: if old and new BTSs are
    attached to same base station
       MSC is not involved


   Intra-MSC: if old and new BTSs are
    attached to different base stations but
    within same MSC
   Inter-MSC: if MSCs are changed
GSM Intra-MSC handoff
1.   Mobile station monitors signal quality and
     determines handoff is required, sends signal
     measurements to serving BSS
2.   Serving BSS sends handoff request to MSC with
     ranked list of qualified target BSSs
3.   MSC determines that best candidate BSS is under
     its control
4.   MSC reserves a trunk to target BSS
5.   Target BSS selects and reserves radio channels for
     new connection, sends Ack to MSC
6.   MSC notifies serving BSS to begin handoff,
     including new radio channel assignment
GSM Intra-MSC handoff
7.    Serving BSS forwards new radio channel assignment
      to mobile station
8.    Mobile station retunes to new radio channel, notifies
      target BSS on new channel
9.    Target BSS notifies MSC that handoff is detected
10.   Target BSS and mobile station exchange messages to
      synchronize transmission in proper timeslot
11.   MSC switches voice connection to target BSS, which
      responds when handoff is complete
12.   MSC notifies serving BSS to release old radio traffic
      channel
GSM Inter-MSC handoff
1.    MS sends signal measurements to serving BSS
2.   Serving BSS sends handoff request to MSC
3.   Serving MSC determines that best candidate BSS
     is under control of a target MSC and calls target
     MSC
4.   Target MSC notifies its VLR to assign a TMSI
5.   Target VLR returns TMSI
6.   Target MSC reserves a trunk to target BSS
7.   Target BSS selects and reserves radio channels
     for new connection, sends Ack to target MSC
8.   Target MSC notifies serving MSC that it is ready
     for handoff
GSM Inter-MSC handoff
9.    Serving MSC notifies serving BSS to begin handoff,
      including new radio channel assignment
10.   Serving BSS forwards new radio channel assignment
      to mobile station
11.   Mobile station retunes to new radio channel, notifies
      target BSS on new channel
12.   Target BSS notifies target MSC that handoff is
      detected
13.   Target BSS and mobile station synchronize timeslot
14.   Voice connection is switched to target BSS, which
      responds when handoff is complete
15.   Target MSC notifies serving MSC
16.   Old network resources are released
Geometric Representation
   Cells are commonly represented by
    hexagons.

   Why hexagon?
   How about circle?
   How about square, or triangle?
Hexagonal Cells
Channel Reuse
   The total number of channels are
    divided into K groups.
       K is called reuse factor or cluster size.
   Each cell is assigned one of the groups.
   The same group can be reused by two
    different cells provided that they are
    sufficiently far apart.
Example K=7
Channel Reuse
Coordinate System
                 Use (i,j) to denote a
                  particular cell.

                 Example:
                 Cell A is
                  represented by
                  (2,1).
Distance Formula
               D = 3(i + ij + j ) R
                              2       2


                    = 3K R
     R
                   where
         D

                      K = i + ij + j
                                  2       2



                    Reuse factor
Air Interface: MS to BTS
     Uplink/Downlink of 25MHz
        890 -915 MHz for Up link
       935 - 960 MHz for Down link
     Combination of frequency division and time
      division multiplexing
       FDMA
                124 channels of 200 kHz
           TDMA
                Burst
       Modulation used
               Gaussian Minimum Shift Keying (GMSK)
Number of channels in GSM
   Freq. Carrier: 200 kHz
   TDMA: 8 time slots per freq carrier

   No. of carriers = 25 MHz / 200 kHz = 125
   Max no. of user channels = 125 * 8 = 1000

   Considering guard bands = 124 * 8 = 992
    channels
Frequency Reusage
   If a mobile company got the bandwidth of
    12MHz with the guardband of 5 KHz and the
    seperation band of 10 KHz
       How many channels will be available for
        communication in the above scenario ?
        How many channels will be available if we have a
        cluster of K = 19 in a BSC of 380 cells?
       How many channels will be available if we reuse
        frequency at level one?
Outgoing call setup
       User keys in the number and presses send
       Mobile transmits request on uplink signaling channel
       If network can process the call, BS sends a channel
        allocation message
       Network proceeds to setup the connection
   Network activity:
       MSC determines current location of target mobile
        using HLR, VLR and by communicating with other
        MSCs
       Source MSC initiates a call setup message to MSC
        covering target area
Incoming call setup
       Target MSC initiates a paging message
       BSs forward the paging message on
        downlink channel in coverage area
       If mobile is on (monitoring the signaling
        channel), it responds to BS
       BS sends a channel allocation message and
        informs MSC
   Network activity:
       Network completes the two halves of the
        connection
LAI
   Location Area Identifier of an LA of a PLMN                              (A
    Public Land Mobile Network is a generic name for all mobile wireless networks
    that use land based radio transmitters or base stations.)

   Based on international ISDN numbering plan
         Country Code (CC): 2,3+ decimal digits
         Mobile Network Code (MNC): 2,3 decimal digits
     
          Location Area Code (LAC) : maximum 5 decimal digits,
          or maximum twice 8 bits, coded in hexadecimal
   Is broadcast regularly by the BTS on broadcast
    channel
Cell Identifier (CI)
   Within LA, individual cells are uniquely
    identified with Cell Identifier (CI).
   It is maximum 2*8 bits
   LAI + CI = Global Cell Identity
Cellular Concept
   Base stations (BS): implement space division
    multiplex
       Each BS covers a certain transmission area (cell)
       Each BS is allocated a portion of the total number
        of channels available
       Cluster: group of nearby BSs that together use all
        available channels
   Mobile stations communicate only via the base
    station, using FDMA, TDMA, CDMA…
Example: Incoming Call Setup
MS ↓ BSS/MSC   ------   Paging request            (PCH)
MS ↑ BSS/MSC   ------   Channel request           (RACH)
MS ↓ BSS/MSC   ------   Immediate Assignment      (AGCH)
MS ↑ BSS/MSC   ------   Paging Response           (SDCCH)
MS ↓ BSS/MSC   ------   Authentication Request    (SDCCH)
MS ↑ BSS/MSC   ------   Authentication Response   (SDCCH)
MS ↓ BSS/MSC   ------   Cipher Mode Command       (SDCCH)
MS ↑ BSS/MSC   ------   Cipher Mode Compl.        (SDCCH)
MS ↓ BSS/MSC   ------   Setup                     (SDCCH)
MS ↑ BSS/MSC   ------   Call Confirmation         (SDCCH)
MS ↓ BSS/MSC   ------   Assignment Command        (SDCCH)
MS ↑ BSS/MSC   ------   Assignment Compl.         (FACCH)
MS ↑ BSS/MSC   ------   Alert                     (FACCH)
MS ↑ BSS/MSC   ------   Connect                   (FACCH)
MS ↓ BSS/MSC   ------   Connect Acknowledge       (FACCH)
MS BSS/MSC     ------   Data                      (TCH)

More Related Content

What's hot

Chapter 6
Chapter 6Chapter 6
Chapter 6
Faisal Mehmood
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
AJAL A J
 
Gsm channel calculations
Gsm channel calculationsGsm channel calculations
Gsm channel calculations
Althaf Hussain
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
NarcisIlie1
 
Basic of gsm anurag
Basic of gsm  anuragBasic of gsm  anurag
Basic of gsm anurag
Anurag Sharma
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
slinpublishers
 
GSM Air Interface
GSM Air InterfaceGSM Air Interface
GSM Air Interface
Ahmed Khaled
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
ianeroman
 
Modul 3 gsm procedures
Modul 3   gsm proceduresModul 3   gsm procedures
Modul 3 gsm procedures
Wijaya Kusuma
 
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
Nam Yong Kim
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
Pallab Kumar Nandi
 
Ch06
Ch06Ch06
Home nodeb
Home nodebHome nodeb
Home nodeb
Sasi Reddy
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Faisal Mehmood
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologies
Sokunth Che
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
Alexander Decker
 

What's hot (20)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Gsm channel calculations
Gsm channel calculationsGsm channel calculations
Gsm channel calculations
 
Ch3 air interface
Ch3 air interfaceCh3 air interface
Ch3 air interface
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
Basic of gsm anurag
Basic of gsm  anuragBasic of gsm  anurag
Basic of gsm anurag
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
 
GSM Air Interface
GSM Air InterfaceGSM Air Interface
GSM Air Interface
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Ch06
Ch06Ch06
Ch06
 
Modul 3 gsm procedures
Modul 3   gsm proceduresModul 3   gsm procedures
Modul 3 gsm procedures
 
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
 
Ch06
Ch06Ch06
Ch06
 
Ch 21
Ch 21Ch 21
Ch 21
 
Home nodeb
Home nodebHome nodeb
Home nodeb
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologies
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
 

Viewers also liked

Voice fault diagnosis(gbss15.0 01)
Voice fault diagnosis(gbss15.0 01)Voice fault diagnosis(gbss15.0 01)
Voice fault diagnosis(gbss15.0 01)
sad_RNP
 
Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)Ali Usman
 
Anwar e-sabiri(complete)
Anwar e-sabiri(complete)Anwar e-sabiri(complete)
Anwar e-sabiri(complete)Ali Usman
 
Ethernet Technology
Ethernet Technology Ethernet Technology
Ethernet Technology
Ali Usman
 
Virgen de Chiquinquirá en Colombia
Virgen de Chiquinquirá en ColombiaVirgen de Chiquinquirá en Colombia
Virgen de Chiquinquirá en ColombiaMaria Daud
 
Hank Iving Media Plan
Hank Iving Media PlanHank Iving Media Plan
Hank Iving Media Plan
confar90
 
Coyaima ie. juan xxiii manual de convivencia
Coyaima ie. juan xxiii manual de convivenciaCoyaima ie. juan xxiii manual de convivencia
Coyaima ie. juan xxiii manual de convivencia
sebasecret
 
Mariquita iet francisco nuñez pedrozo manual convivencia antiguo
Mariquita iet francisco nuñez pedrozo manual convivencia antiguoMariquita iet francisco nuñez pedrozo manual convivencia antiguo
Mariquita iet francisco nuñez pedrozo manual convivencia antiguo
sebasecret
 
College Students
College StudentsCollege Students
College Students
confar90
 
Database ,16 P2P
Database ,16 P2P Database ,16 P2P
Database ,16 P2P Ali Usman
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 TransactionsAli Usman
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 ReplicationAli Usman
 
Database , 17 Web
Database , 17 WebDatabase , 17 Web
Database , 17 WebAli Usman
 
Muslim Contributions in Mathematics
Muslim Contributions in MathematicsMuslim Contributions in Mathematics
Muslim Contributions in Mathematics
Ali Usman
 
Database ,2 Background
 Database ,2 Background Database ,2 Background
Database ,2 BackgroundAli Usman
 
Database , 6 Query Introduction
Database , 6 Query Introduction Database , 6 Query Introduction
Database , 6 Query Introduction Ali Usman
 
Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query OptimizationAli Usman
 

Viewers also liked (20)

Voice fault diagnosis(gbss15.0 01)
Voice fault diagnosis(gbss15.0 01)Voice fault diagnosis(gbss15.0 01)
Voice fault diagnosis(gbss15.0 01)
 
Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)
 
Lte tutorial
Lte tutorialLte tutorial
Lte tutorial
 
BrunnerForbes2
BrunnerForbes2BrunnerForbes2
BrunnerForbes2
 
Anwar e-sabiri(complete)
Anwar e-sabiri(complete)Anwar e-sabiri(complete)
Anwar e-sabiri(complete)
 
Ethernet Technology
Ethernet Technology Ethernet Technology
Ethernet Technology
 
Virgen de Chiquinquirá en Colombia
Virgen de Chiquinquirá en ColombiaVirgen de Chiquinquirá en Colombia
Virgen de Chiquinquirá en Colombia
 
Hank Iving Media Plan
Hank Iving Media PlanHank Iving Media Plan
Hank Iving Media Plan
 
Coyaima ie. juan xxiii manual de convivencia
Coyaima ie. juan xxiii manual de convivenciaCoyaima ie. juan xxiii manual de convivencia
Coyaima ie. juan xxiii manual de convivencia
 
Mariquita iet francisco nuñez pedrozo manual convivencia antiguo
Mariquita iet francisco nuñez pedrozo manual convivencia antiguoMariquita iet francisco nuñez pedrozo manual convivencia antiguo
Mariquita iet francisco nuñez pedrozo manual convivencia antiguo
 
College Students
College StudentsCollege Students
College Students
 
Prezentacja.1
Prezentacja.1Prezentacja.1
Prezentacja.1
 
Database ,16 P2P
Database ,16 P2P Database ,16 P2P
Database ,16 P2P
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 Transactions
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 Replication
 
Database , 17 Web
Database , 17 WebDatabase , 17 Web
Database , 17 Web
 
Muslim Contributions in Mathematics
Muslim Contributions in MathematicsMuslim Contributions in Mathematics
Muslim Contributions in Mathematics
 
Database ,2 Background
 Database ,2 Background Database ,2 Background
Database ,2 Background
 
Database , 6 Query Introduction
Database , 6 Query Introduction Database , 6 Query Introduction
Database , 6 Query Introduction
 
Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query Optimization
 

Similar to Gsm (Part 3)

Gsm interfaces
Gsm interfacesGsm interfaces
Gsm interfaces
Sai Sankar Gochhayat
 
Gsmdocument 131119095413-phpapp01
Gsmdocument 131119095413-phpapp01Gsmdocument 131119095413-phpapp01
Gsmdocument 131119095413-phpapp01
Hoang Giang
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Zorays Solar Pakistan
 
wirelesscomputing-130619122913-phpapp01.pdf
wirelesscomputing-130619122913-phpapp01.pdfwirelesscomputing-130619122913-phpapp01.pdf
wirelesscomputing-130619122913-phpapp01.pdf
KarthikVadde2
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
Pawan Kumar
 
ENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERING
ENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERINGENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERING
ENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERING
IJARIDEA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
HazemElabed2
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
Iffat Anjum
 
2G (GSM) || Youtube channel-ANKUR TOMAR BADAYLA
2G (GSM)  || Youtube channel-ANKUR TOMAR BADAYLA2G (GSM)  || Youtube channel-ANKUR TOMAR BADAYLA
2G (GSM) || Youtube channel-ANKUR TOMAR BADAYLA
ankur tomar
 
Cdma and 3 g
Cdma and 3 gCdma and 3 g
Cdma and 3 g
Partha Bhunia
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
 
Gsm originating call_flow
Gsm originating call_flow Gsm originating call_flow
Gsm originating call_flow Deepthi Reddy B
 
Gsm originating call_flow
Gsm originating call_flowGsm originating call_flow
Gsm originating call_flow
vineet bhadwal
 
Gsm
GsmGsm
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
Telebeansolutions
 
Csit77402
Csit77402Csit77402
Csit77402
csandit
 
Gsm By Aziz
Gsm By AzizGsm By Aziz
Gsm By Aziz
Aziz Zoaib
 

Similar to Gsm (Part 3) (20)

Gsm interfaces
Gsm interfacesGsm interfaces
Gsm interfaces
 
Gsmdocument 131119095413-phpapp01
Gsmdocument 131119095413-phpapp01Gsmdocument 131119095413-phpapp01
Gsmdocument 131119095413-phpapp01
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
wirelesscomputing-130619122913-phpapp01.pdf
wirelesscomputing-130619122913-phpapp01.pdfwirelesscomputing-130619122913-phpapp01.pdf
wirelesscomputing-130619122913-phpapp01.pdf
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
 
Wireless computing
Wireless computingWireless computing
Wireless computing
 
ENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERING
ENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERINGENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERING
ENERGY EFFICIENT SMALL CELL NETWORKS USING DYNAMIC CLUSTERING
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
2G (GSM) || Youtube channel-ANKUR TOMAR BADAYLA
2G (GSM)  || Youtube channel-ANKUR TOMAR BADAYLA2G (GSM)  || Youtube channel-ANKUR TOMAR BADAYLA
2G (GSM) || Youtube channel-ANKUR TOMAR BADAYLA
 
Cdma and 3 g
Cdma and 3 gCdma and 3 g
Cdma and 3 g
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Gsm originating call_flow
Gsm originating call_flow Gsm originating call_flow
Gsm originating call_flow
 
Gsm originating call_flow
Gsm originating call_flowGsm originating call_flow
Gsm originating call_flow
 
Gsm
GsmGsm
Gsm
 
Gsm
GsmGsm
Gsm
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 
Csit77402
Csit77402Csit77402
Csit77402
 
Gsm By Aziz
Gsm By AzizGsm By Aziz
Gsm By Aziz
 

More from Ali Usman

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
Ali Usman
 
Islamic Arts and Architecture
Islamic Arts and  ArchitectureIslamic Arts and  Architecture
Islamic Arts and Architecture
Ali Usman
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current IssuesAli Usman
 
Database , 15 Object DBMS
Database , 15 Object DBMSDatabase , 15 Object DBMS
Database , 15 Object DBMSAli Usman
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMSAli Usman
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 ReliabilityAli Usman
 
Database ,11 Concurrency Control
Database ,11 Concurrency ControlDatabase ,11 Concurrency Control
Database ,11 Concurrency ControlAli Usman
 
Database ,7 query localization
Database ,7 query localizationDatabase ,7 query localization
Database ,7 query localizationAli Usman
 
Database , 5 Semantic
Database , 5 SemanticDatabase , 5 Semantic
Database , 5 SemanticAli Usman
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data IntegrationAli Usman
 
Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution DesignAli Usman
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 IntroductionAli Usman
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor SpecificationsAli Usman
 
Fifty Year Of Microprocessor
Fifty Year Of MicroprocessorFifty Year Of Microprocessor
Fifty Year Of MicroprocessorAli Usman
 
Discrete Structures lecture 2
 Discrete Structures lecture 2 Discrete Structures lecture 2
Discrete Structures lecture 2Ali Usman
 
Discrete Structures. Lecture 1
 Discrete Structures. Lecture 1  Discrete Structures. Lecture 1
Discrete Structures. Lecture 1 Ali Usman
 
Muslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-AstronomyMuslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-AstronomyAli Usman
 
Muslim Contributions in Geography
Muslim Contributions in GeographyMuslim Contributions in Geography
Muslim Contributions in GeographyAli Usman
 
Muslim Contributions in Astronomy
Muslim Contributions in AstronomyMuslim Contributions in Astronomy
Muslim Contributions in AstronomyAli Usman
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor SpecificationsAli Usman
 

More from Ali Usman (20)

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
Islamic Arts and Architecture
Islamic Arts and  ArchitectureIslamic Arts and  Architecture
Islamic Arts and Architecture
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current Issues
 
Database , 15 Object DBMS
Database , 15 Object DBMSDatabase , 15 Object DBMS
Database , 15 Object DBMS
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMS
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
 
Database ,11 Concurrency Control
Database ,11 Concurrency ControlDatabase ,11 Concurrency Control
Database ,11 Concurrency Control
 
Database ,7 query localization
Database ,7 query localizationDatabase ,7 query localization
Database ,7 query localization
 
Database , 5 Semantic
Database , 5 SemanticDatabase , 5 Semantic
Database , 5 Semantic
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data Integration
 
Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution Design
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 Introduction
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor Specifications
 
Fifty Year Of Microprocessor
Fifty Year Of MicroprocessorFifty Year Of Microprocessor
Fifty Year Of Microprocessor
 
Discrete Structures lecture 2
 Discrete Structures lecture 2 Discrete Structures lecture 2
Discrete Structures lecture 2
 
Discrete Structures. Lecture 1
 Discrete Structures. Lecture 1  Discrete Structures. Lecture 1
Discrete Structures. Lecture 1
 
Muslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-AstronomyMuslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-Astronomy
 
Muslim Contributions in Geography
Muslim Contributions in GeographyMuslim Contributions in Geography
Muslim Contributions in Geography
 
Muslim Contributions in Astronomy
Muslim Contributions in AstronomyMuslim Contributions in Astronomy
Muslim Contributions in Astronomy
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor Specifications
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Gsm (Part 3)

  • 1. GSM handoffs  Intra-BSS: if old and new BTSs are attached to same base station  MSC is not involved  Intra-MSC: if old and new BTSs are attached to different base stations but within same MSC  Inter-MSC: if MSCs are changed
  • 2. GSM Intra-MSC handoff 1. Mobile station monitors signal quality and determines handoff is required, sends signal measurements to serving BSS 2. Serving BSS sends handoff request to MSC with ranked list of qualified target BSSs 3. MSC determines that best candidate BSS is under its control 4. MSC reserves a trunk to target BSS 5. Target BSS selects and reserves radio channels for new connection, sends Ack to MSC 6. MSC notifies serving BSS to begin handoff, including new radio channel assignment
  • 3. GSM Intra-MSC handoff 7. Serving BSS forwards new radio channel assignment to mobile station 8. Mobile station retunes to new radio channel, notifies target BSS on new channel 9. Target BSS notifies MSC that handoff is detected 10. Target BSS and mobile station exchange messages to synchronize transmission in proper timeslot 11. MSC switches voice connection to target BSS, which responds when handoff is complete 12. MSC notifies serving BSS to release old radio traffic channel
  • 4. GSM Inter-MSC handoff 1. MS sends signal measurements to serving BSS 2. Serving BSS sends handoff request to MSC 3. Serving MSC determines that best candidate BSS is under control of a target MSC and calls target MSC 4. Target MSC notifies its VLR to assign a TMSI 5. Target VLR returns TMSI 6. Target MSC reserves a trunk to target BSS 7. Target BSS selects and reserves radio channels for new connection, sends Ack to target MSC 8. Target MSC notifies serving MSC that it is ready for handoff
  • 5. GSM Inter-MSC handoff 9. Serving MSC notifies serving BSS to begin handoff, including new radio channel assignment 10. Serving BSS forwards new radio channel assignment to mobile station 11. Mobile station retunes to new radio channel, notifies target BSS on new channel 12. Target BSS notifies target MSC that handoff is detected 13. Target BSS and mobile station synchronize timeslot 14. Voice connection is switched to target BSS, which responds when handoff is complete 15. Target MSC notifies serving MSC 16. Old network resources are released
  • 6. Geometric Representation  Cells are commonly represented by hexagons.  Why hexagon?  How about circle?  How about square, or triangle?
  • 8. Channel Reuse  The total number of channels are divided into K groups.  K is called reuse factor or cluster size.  Each cell is assigned one of the groups.  The same group can be reused by two different cells provided that they are sufficiently far apart.
  • 11. Coordinate System  Use (i,j) to denote a particular cell.  Example:  Cell A is represented by (2,1).
  • 12. Distance Formula D = 3(i + ij + j ) R 2 2 = 3K R R where D K = i + ij + j 2 2 Reuse factor
  • 13. Air Interface: MS to BTS  Uplink/Downlink of 25MHz  890 -915 MHz for Up link  935 - 960 MHz for Down link  Combination of frequency division and time division multiplexing  FDMA  124 channels of 200 kHz  TDMA  Burst  Modulation used  Gaussian Minimum Shift Keying (GMSK)
  • 14. Number of channels in GSM  Freq. Carrier: 200 kHz  TDMA: 8 time slots per freq carrier  No. of carriers = 25 MHz / 200 kHz = 125  Max no. of user channels = 125 * 8 = 1000  Considering guard bands = 124 * 8 = 992 channels
  • 15. Frequency Reusage  If a mobile company got the bandwidth of 12MHz with the guardband of 5 KHz and the seperation band of 10 KHz  How many channels will be available for communication in the above scenario ?  How many channels will be available if we have a cluster of K = 19 in a BSC of 380 cells?  How many channels will be available if we reuse frequency at level one?
  • 16. Outgoing call setup  User keys in the number and presses send  Mobile transmits request on uplink signaling channel  If network can process the call, BS sends a channel allocation message  Network proceeds to setup the connection  Network activity:  MSC determines current location of target mobile using HLR, VLR and by communicating with other MSCs  Source MSC initiates a call setup message to MSC covering target area
  • 17. Incoming call setup  Target MSC initiates a paging message  BSs forward the paging message on downlink channel in coverage area  If mobile is on (monitoring the signaling channel), it responds to BS  BS sends a channel allocation message and informs MSC  Network activity:  Network completes the two halves of the connection
  • 18. LAI  Location Area Identifier of an LA of a PLMN (A Public Land Mobile Network is a generic name for all mobile wireless networks that use land based radio transmitters or base stations.)  Based on international ISDN numbering plan  Country Code (CC): 2,3+ decimal digits  Mobile Network Code (MNC): 2,3 decimal digits  Location Area Code (LAC) : maximum 5 decimal digits, or maximum twice 8 bits, coded in hexadecimal  Is broadcast regularly by the BTS on broadcast channel
  • 19. Cell Identifier (CI)  Within LA, individual cells are uniquely identified with Cell Identifier (CI).  It is maximum 2*8 bits  LAI + CI = Global Cell Identity
  • 20. Cellular Concept  Base stations (BS): implement space division multiplex  Each BS covers a certain transmission area (cell)  Each BS is allocated a portion of the total number of channels available  Cluster: group of nearby BSs that together use all available channels  Mobile stations communicate only via the base station, using FDMA, TDMA, CDMA…
  • 21. Example: Incoming Call Setup MS ↓ BSS/MSC ------ Paging request (PCH) MS ↑ BSS/MSC ------ Channel request (RACH) MS ↓ BSS/MSC ------ Immediate Assignment (AGCH) MS ↑ BSS/MSC ------ Paging Response (SDCCH) MS ↓ BSS/MSC ------ Authentication Request (SDCCH) MS ↑ BSS/MSC ------ Authentication Response (SDCCH) MS ↓ BSS/MSC ------ Cipher Mode Command (SDCCH) MS ↑ BSS/MSC ------ Cipher Mode Compl. (SDCCH) MS ↓ BSS/MSC ------ Setup (SDCCH) MS ↑ BSS/MSC ------ Call Confirmation (SDCCH) MS ↓ BSS/MSC ------ Assignment Command (SDCCH) MS ↑ BSS/MSC ------ Assignment Compl. (FACCH) MS ↑ BSS/MSC ------ Alert (FACCH) MS ↑ BSS/MSC ------ Connect (FACCH) MS ↓ BSS/MSC ------ Connect Acknowledge (FACCH) MS BSS/MSC ------ Data (TCH)

Editor's Notes

  1. The figure shows an example of incoming call connection setup at the air interface how the various logical channels are used in principle. The MS is called via the PCH and requests a signaling channel on the RACH. It gets SDCCH through an IMMEDIATE ASSIGNMENT message on the AGCH. Then follow authentication, start of ciphering, and start of setup over the SDCCH. An ASSIGNMENT COMMAND message gives the traffic channel to the MS, which acknowledges its receipt on the FACCH of the traffic channel. The FACCH is also used to continue the connection setup.