• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
This documents will help to understand the details procedure of GSM IDLE Mode Behavior. GSM Idle mode behavior starting from PLMN selection, GSM Cell Camp, Cell Selection, Cell Reselection, Location Update, Paging, System Information to Measurements procedures have been captured in this document.
This documents will help to understand the details procedure of GSM IDLE Mode Behavior. GSM Idle mode behavior starting from PLMN selection, GSM Cell Camp, Cell Selection, Cell Reselection, Location Update, Paging, System Information to Measurements procedures have been captured in this document.
Topics covered in this presentation:
1. What is drive testing?
2. Need for drive testing?
3. Types of drive testing
4. Key Performance Indicators and Parameters
5. Test Methods
On completion of the module one should be clear about the parameters required during drive test what does it mean and how much it is important.
Parameters regarding in windows like :
a) Current Channel
b) Radio parameters
c) Serving + Neighbors
Time: It is system time of computer.
Cell name: It displays the name of the sector which is serving according to the cellfile that is loaded in TEMS.
CGI : It stands for the Cell Global Identity which is unique for every sector of the site. It consists of MCC,MNC,LAC,CI.
Cell GPRS Support: Tells sector is having GPRS or not. Values are Yes or No .
Band : It tells in which Freq. Band mobile is operating e.g. GSM 900/ 1800.
BCCH ARFCN: It tells by which BCCH is the mobile station getting served.
TCH ARFCN: On which Traffic Freq. call is going on.
BSIC (Base Station Identity Code) : It is combination of Network Color Code (NCC) (0 – 7) & Base Station Color Code (BCC) (0 – 7). e.g. 62. It is decoded by mobile on every Sync. Channel Message.
Mode: It is shows in which state is mobile operating, Idle, Dedicated & Packet.
Time slot: On which time slot of current TCH call is going on. Viz. time slot no. of TRX.
Call Setup Success Rate Definition and Troubleshooting Assim Mubder
The CSSR indicates the probability of successful calls initiated by the MS. The CSSR is an important KPI for evaluating the network performance. If this KPI is too low, the subscribers are not likely to make calls successfully. The user experience is thus affected.
Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s
Half rate => Used for speech at 6.5 Kbits/s
or sending data at 4.8 Kbits/s
Enhanced Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s but
with almost Land line quality
FCCH = FREQUENCY CORRECTION CHANNEL
=> To tell the Mobile that this is the BCCH carrier
=> To able the Mobile to synchronize to the frequency
(Downlink only)
SCH = SYNCHRONISATION CHANNEL
=> Used for sending BSIC (Base station Identity Code)
=> Give TDMA frame number to the Mobile.
(Downlink only)
BCCH = BROADCAST CONTROL CHANNEL
=> Used for sending information to the mobile like
CGI (Cell Global identity), LAI (Location Area Identity),
BCCH carriers of the neighboring cells,
maximum output power allowed in the cell and other
broadcast messages like barred cell. (Downlink only)
PCH = PAGING CHANNEL
=> Used for paging the Mobile. (Downlink only)
Reason could be an incoming call or an incoming Short Message.
RACH = RANDOM ACCESS CHANNEL
=> Used for responding to the paging (terminating), Location updating
or to make call access (originating) by asking for a signaling channel.
(Uplink only)
AGCH = ACCESS GRANT CHANNEL
=> Used to allocate SDCCH to the mobile.
(Downlink only)
Topics covered in this presentation:
1. What is drive testing?
2. Need for drive testing?
3. Types of drive testing
4. Key Performance Indicators and Parameters
5. Test Methods
On completion of the module one should be clear about the parameters required during drive test what does it mean and how much it is important.
Parameters regarding in windows like :
a) Current Channel
b) Radio parameters
c) Serving + Neighbors
Time: It is system time of computer.
Cell name: It displays the name of the sector which is serving according to the cellfile that is loaded in TEMS.
CGI : It stands for the Cell Global Identity which is unique for every sector of the site. It consists of MCC,MNC,LAC,CI.
Cell GPRS Support: Tells sector is having GPRS or not. Values are Yes or No .
Band : It tells in which Freq. Band mobile is operating e.g. GSM 900/ 1800.
BCCH ARFCN: It tells by which BCCH is the mobile station getting served.
TCH ARFCN: On which Traffic Freq. call is going on.
BSIC (Base Station Identity Code) : It is combination of Network Color Code (NCC) (0 – 7) & Base Station Color Code (BCC) (0 – 7). e.g. 62. It is decoded by mobile on every Sync. Channel Message.
Mode: It is shows in which state is mobile operating, Idle, Dedicated & Packet.
Time slot: On which time slot of current TCH call is going on. Viz. time slot no. of TRX.
Call Setup Success Rate Definition and Troubleshooting Assim Mubder
The CSSR indicates the probability of successful calls initiated by the MS. The CSSR is an important KPI for evaluating the network performance. If this KPI is too low, the subscribers are not likely to make calls successfully. The user experience is thus affected.
Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s
Half rate => Used for speech at 6.5 Kbits/s
or sending data at 4.8 Kbits/s
Enhanced Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s but
with almost Land line quality
FCCH = FREQUENCY CORRECTION CHANNEL
=> To tell the Mobile that this is the BCCH carrier
=> To able the Mobile to synchronize to the frequency
(Downlink only)
SCH = SYNCHRONISATION CHANNEL
=> Used for sending BSIC (Base station Identity Code)
=> Give TDMA frame number to the Mobile.
(Downlink only)
BCCH = BROADCAST CONTROL CHANNEL
=> Used for sending information to the mobile like
CGI (Cell Global identity), LAI (Location Area Identity),
BCCH carriers of the neighboring cells,
maximum output power allowed in the cell and other
broadcast messages like barred cell. (Downlink only)
PCH = PAGING CHANNEL
=> Used for paging the Mobile. (Downlink only)
Reason could be an incoming call or an incoming Short Message.
RACH = RANDOM ACCESS CHANNEL
=> Used for responding to the paging (terminating), Location updating
or to make call access (originating) by asking for a signaling channel.
(Uplink only)
AGCH = ACCESS GRANT CHANNEL
=> Used to allocate SDCCH to the mobile.
(Downlink only)
GSM Air Interface, GSM Frequency Band
PPT File (https://drive.google.com/file/d/1xGLIMwstH1B7Z8y4kLS72HUG-XMtckvb/view?usp=sharing)
Reference: Eng. Waleed El-Safoury Presentations
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
ell Allocation (CA) is the subset of the total frequency band that is available for one BTS. It can be viewed as the total transport resource available for traffic between the BTS and its attached MSs. One Radio Frequency CHannel (RFCH) of the CA is used to carry synchronization information and the Broadcast Control CHannel (BCCH). This can be any of the carriers in the cell and it is known as the BCCH carrier or the c
carrier. Strong efficiency and quality requirements have resulted in a
0
rather complex way of utilizing the frequency resource. This chapter describes the basic principles of how to use this resource from the physical resource itself to the information transport service offered by the BTS.
Carrier separation is 200 kHz, which provides: • 124 pairs of carriers in the GSM 900 band • 374 pairs of carriers in the GSM 1800 band • 299 pairs of carriers in the GSM 1900 band
Using Time Division Multiple Access (TDMA) each of these carriers is divided into eight Time Slots (TS). One TS on a TDMA frame is called a physical channel, i.e. on each duplex pair of carriers there are eight physical channels.
A variety of information is transmitted between the BTS and thMS. The information is grouped into different logical channelsEach logical channel is used for a specific purpose such as paging, call set-up and speech. For example, speech is sent on the logical channel Traffic CHannel (TCH). The logical channels are mapped onto the physical channels.
The information in this chapter does not include channels specific for GPRS (General Packet Radio Service). For basic information on GPRS see chapter 14 of this documentation.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
6. GSM: TRX/TDMA Frame
25 MHZ: 890 to 915 MHz (UL)
935 to 960 MHz (DL)
Channel 1
200kHz
Channel 2
200kHz
Channel 124
200kHz
Time
Slot 0
Time
Slot 1
Time
Slot 7
TDMA Frame (4.616 ms)
57 bits
(interleaved sub block)
from a 20ms Voice frame
26 bit TSC
for error prediction
57 bits
(interleaved sub block )
from another 20ms Voice
frame
3 tail
bits
3 tail
bits
1 bit
flag
1 bit
flag
148+8.25=156.25 bits
8.25
guard
bits
Frequency band
Channels
TRX/TS
TS/bit stream
1800MHz Band : 1710-1785MHz(UL)
1805-1880MHz(DL)
Total no. of Channel is 374.
1TS=0.577ms
1bit=3.69ms
13. Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s
Half rate => Used for speech at 6.5 Kbits/s
or sending data at 4.8 Kbits/s
Enhanced Full rate => Used for speech at 13 Kbits/s
or sending data at 9.6 Kbits/s but
with almost Land line quality
TCH = TRAFFIC CHANNEL
14.
15.
16.
17. FCCH = FREQUENCY CORRECTION CHANNEL (Downlink only)
•To tell the Mobile that this is the BCCH carrier
•To able the Mobile to synchronize to the frequency
•bursts only containing zeroes are transmitted.
SCH = SYNCHRONISATION CHANNEL (Downlink only)
•Used for sending BSIC (Base station Identity Code)
•Give TDMA frame number to the Mobile
BCCH = BROADCAST CONTROL CHANNEL (Downlink only)
•Used for sending information to the mobile like-
•CGI (Cell Global identity)
•LAI (Location Area Identity)
•BCCH carriers of the neighboring cells
•maximum output power allowed in the cell
•Other broadcast messages like barred cell
BROADCAST CHANNELS
18. PCH = PAGING CHANNEL
=> Used for paging the Mobile. (Downlink only)
Reason could be an incoming call or an incoming Short Message.
RACH = RANDOM ACCESS CHANNEL
=> Used for responding to the paging (terminating), Location updating
or to make call access (originating) by asking for a signaling channel.
(Uplink only)
AGCH = ACCESS GRANT CHANNEL
=> Used to allocate SDCCH to the mobile.
(Downlink only)
COMMON CONTROL CHANNELS
19. SDCCH = STAND ALONE DEDICATED CONTROL CHANNEL
=> Used for allocating voice channel (TCH) to the mobile (call setup) and
Location updating.
=> Send Short Text message to Idle Mobile
(Uplink & Downlink)
SACCH = SLOW ASSOCIATED CONTROL CHANNEL
=> Used for sending information to the mobile like
CGI (Cell Global identity), LAI (Location Area Identity),
BCCH of all the neighbors and TA (Timing Advance)
=> Send Short Text message to Busy Mobile
(Downlink
=> Used for sending signal strength & bit error rate measurement of the
serving cell and signal strength of the BCCHs of the neighboring cells.
(Uplink)
FACCH = FAST ASSOCIATED CONTROL CHANNEL
=> Used for handover. (Uplink & Downlink)
DEDICATED CONTROL CHANNELS
20. => SMS messages are short TEXT messages up to 160 characters in length that you
can send or receive. The messages are not sent straight to the other mobile but is
sent to message centre operated by the Network provider.
=> If the mobile was switched off or is at outside of the coverage area,
the message is stored in the Message Service Center. The message
will be offered to the subscriber when the mobile is switched on again
or has reentered the coverage area again.
=> If the mobile is in the Idle mode the short message will be send through
the SDCCH. If the mobile is Busy the short message will send through
the SACCH.
CBCH = CELL BROADCAST CHANNEL
=> Used for sending short messages to all the mobiles within a geographic area.
Typical example is Traffic congestion in a major road or a major accident
in an area. Up to 93 characters can be sent.
=> If the mobile is in the Idle mode then the short message will be send through
the CBCH. If the mobile is Busy, it will not be sent.
NOT TO BE CONFUSED WITH SMS !!!!!!!!
(SHORT MESSAGE SERVICE)
21. 21
Channel combinations
The following combinations of logical channel types are allowed for the
radio timeslots and specified by GSM (Rec. 05.02):
a) TCH/F + FACCH/F + SACCH/TF
b) TCH/H + FACCH/H + SACCH/TH
c) SDCCH/8 + SACCH/C8
d) FCCH + SCH + BCCH + CCCH (TS 0)-Uncombined
e) FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/C4 (TS 0)-combined
f) BCCH + CCCH
g) SDCCH/8 + SACCH/8 + CBCH
h) FCCH + SCH + BCCH + CCCH + SDCCH/4 + SACCH/C4 + CBCH (TS 0)
***A "+" indicates that the channels are used simultaneously.
22. 22
a) TCH/F + FACCH/F + SACCH/TF
T-TCH/FACCH
A-SACCH
25. 25
c) SDCCH/8 + SACCH/C8
Note that the uplink and downlink patterns are time shifted, so that SDCCH subchannel 0 is sent
in frames 0-3 on downlink and in frames 15-18 on uplink. The reason for this is to achieve more
efficient communication, by giving the MS time to calculate its answers to the requests received
on downlink SDCCH.
26. 26
d) FCCH + SCH + BCCH + CCCH (TS 0)-Uncombined
F (FCCH) Frequency Correction Channel, S (SCH) Synchronization Channel,
B (BCCH - Norm) Broadcast Control Channel, C (CCCH) Common Control CHannel: Paging CHannel(PCH) or
Access Grant CHannel (AGCH), I Idle
27.
28.
29. F D T T T T T T
S D T T T T T T
B D T T T T T T
B D T T T T T T
B D T T T T T T
B D T T T T T T
C D T T T T T T
C D T T T T T T
C D T T T T T T
C D T T T T T T
F D T T T T T T
S D T T T T T T
C D A T A T A T
C D T T T T T T
C D T T T T T T
C D T T T T T T
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7
4.615 ms
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1 Frame
(Downlink - BTS transmit)
1 carrier = 200 kHz
F = FCCH
S = SCH
B = BCCH
C = PCH or
AGCH
D = SDCCH
A = SACCH
T = TCH
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D T T T T T T
R D A I A I A I
R D T T T T T T
R D T T T T T T
R D T T T T T T
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7
4.615 ms
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1 Frame
(Uplink - Mobile transmit)
1 carrier = 200 kHz
R = RACH
A = SACCH
T = TCH
31. 3 TIMESLOT
3 * 0.577ms = 1.73ms
Downlink
Uplink
TCH UP-DOWNLINK OFFSET
3 TIMESLOT
3 * 0.577ms = 1.73ms
3 TIMESLOT
3 * 0.577ms = 1.73ms
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 75 6 7
….
…..
…...
…..
This means that the mobile does not transmit and receive at the same time.
Also note that :
in TS 0 : All the Logical Channels will repeat itself after 51 frames
in TS 1 : All the Logical Channels will repeat itself after 102 frames
in TS 2 to 7 : All the Logical Channels will repeat itself after 26 frames
32. MOBILE STATIONS ISDN NUMBER (MSISDN)
=> Is the mobile number used in a GSM PLMN (Public Land Mobile Network)
MSISDN = Country Code + National Destination Code + Subscriber number
e.x. 63 + 0918 + 8889999
Maximum length is 15 digits.
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
=> Is the subscriber number used over radio path for all signaling in the GSM PLMN.
This number is stored in SIM (Subscriber Identity Module), HLR (Home Location Register,
and VLR (Visitor Location Register).
IMSI = MCC + MNC + MSIN
= Mobile Country Code + Mobile Network Code + Mobile Identification Number
[ 3 digit ] [ 2 digit ] [ 11 digit ]
e.x. 502 + 19 + 2345451
TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
=> Is used for the subscriber's confidentiality. Since the TMSI has only local significance
(within MSC/VLR) the structure of the TMSI can be chosen by the Vendor.
But the size must be 1/2 of the size of IMSI. Each time a mobile request for location
updating or call setup, MSC/VLR allocates to the IMSI a new TMSI, so the TMSI
is used on the signaling path, protecting the IMSI identity. Plus since the TMSI is half
the size of IMSI, we can page twice the amount compared to IMSI.
33. LOCATION AREA IDENTITY (LAI)
=> Is used to uniquely identify each location area in the GSM PLMN. When the system
receives an incoming call it knows in which location area it should page the mobile
and does not page the entire network.
LAI = MCC + MNC + LAC
Mobile Country Code + Mobile Network Code + Location Area Code
[ 3 digit ] [ 2 digit ] [ 1 to 65 536 ]
e.x. = 502 + 20 + 60001
CELL GLOBAL IDENTITY (CGI)
=> Is used for cell identification within the GSM network.
LAI = MCC + MNC + LAC + CI
Mobile Country Code + Mobile Network Code + Location Area Code + Cell Identity
[ 3 digit ] [ 2 digit ] [ 1 to 65 536 ] [ 1 to 65 536 ]
e.x. = 502 + 20 + 60001 + 50001
BASE STATION IDENTITY CODE (BSIC)
=> Is used to distinguish co channel Frequency used in the neighboring cell.
BSIC = NCC + BCC
Network Color Code + Base Station Color Code
[ 1 to 7 ] [ 1 to 7 ]
34. SUBSCRIBER IDENTITY MODULE (SIM)
SIM is used to provide storage on subscriber related information as following :
• IMSI (International Mobile Subscriber Identity).
• Temporary network data like TMSI, LAI, Location update status.
• Subscriber Authentication Key (Ki) and Ciphering Key (Kc) which are used for security purposes.
• BCCH information : List of carrier frequencies to be used for cell selection.
• Forbidden PLMN.
• Language preference.
• PIN number (Personal Identification Number) and PIN error counter.
• PUK number (Personal Unlock Key) and PUK error counter.
PIN management
The PIN number consist of 4 to 8 digit and it is loaded by the service activator an subscription time. Afterwards
the PIN number can be changed as many times an user wishes including the length of the PIN number.
The user can disable the PIN function but again can be inhibited at subscription time by a authorized
person. If an incorrect PIN is entered, an indication is given to the user. After 3 consecutive entries
the SIM is blocked, even if if the SIM is removed or the mobile is switch off and on.
If the SIM card is blocked the user cannot access the network. The unblocking of the SIM card can only be
done by keying in the PUK (Personal Unlock Key). PUK is 8 digit and is given to the user at subscription
time. If an incorrect PUK is entered more than 10 times then the PUK will not work anymore and the
SIM card will continue to be blocked until taken to the mobile vendor service center.