The document provides information on Global System for Mobile (GSM) network. It discusses that GSM is a second generation cellular standard developed to provide voice and data services using digital modulation. It details the history and development of GSM standards. The document describes the various GSM services including teleservices, bearer services, and supplementary services. It explains the GSM system architecture including components like mobile station, base station subsystem, network switching subsystem and their functions. It also covers GSM specifications, call routing process, advantages of GSM over analog systems, and the future of GSM network.
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
This presentation is all about GSM (Global System for mobile Communication). All components, entities ,architecture ,advantages of GSM, future of GSM was the main focus.
Call routing for incoming and outgoing call is also included in the presentation.
Global system for mobile communication(GSM)Jay Nagar
~Introduction
~GSM Architecture
~GSM Entities
~SMS Service In GSM
~Call Routing In GSM
~PLMN Interfaces
~GSM Addresses and Identifiers
~Network aspects in GSM
~Handover
~Mobility Management
~GSM Frequency Allocation
~Authentication and Security In GSM
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
This presentation is all about GSM (Global System for mobile Communication). All components, entities ,architecture ,advantages of GSM, future of GSM was the main focus.
Call routing for incoming and outgoing call is also included in the presentation.
Global system for mobile communication(GSM)Jay Nagar
~Introduction
~GSM Architecture
~GSM Entities
~SMS Service In GSM
~Call Routing In GSM
~PLMN Interfaces
~GSM Addresses and Identifiers
~Network aspects in GSM
~Handover
~Mobility Management
~GSM Frequency Allocation
~Authentication and Security In GSM
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. What is GSM ?What is GSM ?
Global System for Mobile (GSM) is a
second generation cellular standard
developed to cater voice services and
data delivery using digital modulation
3. GSM: HistoryGSM: History
• Developed by Group Spéciale Mobile (founded 1982) which was an
initiative of CEPT ( Conference of European Post and
Telecommunication )
• Aim : to replace the incompatible analog system
• Presently the responsibility of GSM standardization resides with special
mobile group under ETSI ( European telecommunication Standards
Institute )
• Full set of specifications phase-I became available in 1990
• Under ETSI, GSM is named as “ Global System for Mobile
communication “
• Today many providers all over the world use GSM (more than 135
countries in Asia, Africa, Europe, Australia, America)
• More than 1300 million subscribers in world and 45 million subscriber in
India.
5. Tele ServicesTele Services
services that enable voice communication
via mobile phones
• Offered services
- Mobile telephony
- Emergency calling
6. Bearer ServicesBearer Services
• Include various data services for information transfer
between GSM and other networks like PSTN (
Public switched telephone network), ISDN (
Integrated Services Digital Network) etc at rates from 300 to 9600
bps
• Short Message Service (SMS)
– up to 160 character alphanumeric data
transmission to/from the mobile terminal
• Voice mailbox
• Electronic mail
7. Supplementary ServicesSupplementary Services
Call related services :
• Call Waiting- Notification of an incoming call while on the
handset
• Call Hold- Put a caller on hold to take another call
• Call Barring- All calls, outgoing calls, or incoming calls
• Call Forwarding- Calls can be sent to various numbers defined by
the user
• Multi Party Call Conferencing - Link multiple calls together
• CLIP – Caller line identification presentation
• CLIR – Caller line identification restriction
• CUG – Closed user group
8. GSM System ArchitectureGSM System Architecture
BSC
BSC
MSC
MS
MS
MS BTS
BTS
BTS
GMSC
PSTN (public switched telephone
network)
ISDN (integrated services
digital network)
PDN
EIR
AUC
HLR
VLR
ME/SIM
9. GSM System Architecture-IGSM System Architecture-I
Mobile Station (MS)
Mobile Equipment (ME)
Subscriber Identity Module (SIM)
Base Station Subsystem (BSS)
Base Transceiver Station (BTS)
Base Station Controller (BSC)
Network Switching Subsystem (NSS)
Mobile Switching Center (MSC)
Home Location Register (HLR)
Visitor Location Register (VLR)
Authentication Center (AUC)
Equipment Identity Register (EIR)
10. System ArchitectureSystem Architecture
Mobile Station (MS)Mobile Station (MS)
The Mobile Station is made up of two entities:
1. Mobile Equipment (ME)
2. Subscriber Identity Module (SIM)
11. System ArchitectureSystem Architecture
Mobile Station (MS)Mobile Station (MS)
Mobile Equipment
• Portable , vehicle mounted, hand held device
• Uniquely identified by an IMEI
(International Mobile Equipment Identity)
• Voice and data transmission
• Monitoring power and signal quality of
surrounding cells for optimum handover
• Power level : 0.8W – 20 W
• 160 character long SMS.
12. System ArchitectureSystem Architecture
Mobile Station (MS) contd.Mobile Station (MS) contd.
• Subscriber Identity Module (SIM)
• Smart card contains the International Mobile
Subscriber Identity (IMSI)
• Allows user to send and receive calls and
receive other subscribed services
• Encoded network identification details
- Key Ki,Kc and A3,A5 and A8 algorithms
• Protected by a password or PIN
• Can be moved from phone to phone –
contains key information to activate the
phone
13. System ArchitectureSystem Architecture
Base Station Subsystem (BSS)Base Station Subsystem (BSS)
Base Station Subsystem is composed of two
parts that communicate across the
standardized Abis interface allowing
operation between components made by
different suppliers
1. Base Transceiver Station (BTS)
2. Base Station Controller (BSC)
14. System ArchitectureSystem Architecture
Base Station Subsystem (BSS)Base Station Subsystem (BSS)
Base Transceiver Station (BTS):
• Encodes , encrypts , multiplexes , modulates
and feeds the RF signals to the antenna.
• Frequency hopping
• Communicates with Mobile station and BSC
• Consists of Transceivers (TRX) units
15. System ArchitectureSystem Architecture
Base Station Subsystem (BSS)Base Station Subsystem (BSS)
• Base Station Controller (BSC)
• Manages Radio resources for BTS
• Assigns Frequency and time slots for all
MS’s in its area
• Handles call set up
• Transcoding and rate adaptation functionality
• Handover for each MS
• Radio Power control
• It communicates with MSC and BTS
16. System ArchitectureSystem Architecture
Network Switching Subsystem(NSS)Network Switching Subsystem(NSS)
Mobile Switching Center (MSC)
•Heart of the network
•Manages communication between GSM and other
networks
•Call setup function and basic switching
•Call routing
•Billing information and collection
•Mobility management
- Registration
- Location Updating
- Inter BSS and inter MSC call handoff
•MSC does gateway function while its customer
roams to other network by using HLR/VLR.
17. System ArchitectureSystem Architecture
Network Switching SubsystemNetwork Switching Subsystem
Home Location Registers (HLR)
- permanent database about mobile subscribers in a large
service area (generally one per GSM network operator)
- database contains IMSI , MS, ISDN , prepaid/postpaid ,
roaming restrictions , supplementary services.
Visitor Location Registers (VLR)
- Temporary database which updates whenever new MS
enters its area, by HLR database
- Controls those mobiles roaming in its area
- Reduces number of queries to HLR
- Database contains IMSI , TMSI , MSISDN , MSRN,
Location Area , authentication key
18. System ArchitectureSystem Architecture
Network Switching SubsystemNetwork Switching Subsystem
Authentication Center (AUC)
- Protects against intruders in air interface
- Maintains authentication keys and algorithms and
provides security triplets ( RAND , SRES , Kc)
- Generally associated with HLR
Equipment Identity Register (EIR)
- Database that is used to track handsets using the
IMEI (International Mobile Equipment Identity)
- Made up of three sub-classes: The White List, The
Black List and the Gray List
- Only one EIR per PLMN (public land mobile network )
19. GSM Specifications-1GSM Specifications-1
•GSM 900
• Mobile to BTS (uplink): 890-915 Mhz
• BTS to Mobile(downlink):935-960 Mhz
• Bandwidth : 2* 25 Mhz
•GSM 1800
• Mobile to BTS (uplink): 1710-1785 Mhz
• BTS to Mobile(downlink) 1805-1880 Mhz
• Bandwidth : 2* 75 Mhz
22. Outgoing CallOutgoing Call
1. MS sends dialed number to BSS
2. BSS sends dialed number to MSC
3,4 MSC checks VLR if MS is
allowed the requested service. If
so, MSC asks BSS to allocate
resources for call.
5 MSC routes the call to GMSC (
Gateway Mobile Services Switching Center)
6 GMSC routes the call to local
exchange of called user
7, 8,
9,10 Answer back (ring back) tone is
routed from called user to MS via
GMSC,MSC,BSS
23. Incoming CallIncoming Call
1. Calling a GSM subscribers
2. Forwarding call to GSMC
3. Signal Setup to HLR
4. 5. Request MSRN from VLR
6. Forward responsible MSC to
GMSC
7. Forward Call to current MSC
8. 9. Get current status of MS
10.11. Paging of MS
12.13. MS answers
14.15. Security checks
16.17. Set up connection
24. Characteristics of GSM StandardCharacteristics of GSM Standard
•Fully digital system using 900,1800 MHz frequency band.
•TDMA over radio carriers(200 KHz carrier spacing.
•8 full rate or 16 half rate TDMA channels per carrier.
•User/terminal authentication for fraud control.
•Encryption of speech and data transmission over the radio path.
•Full international roaming capability.
•Low speed data services (upto 9.6 Kb/s).
•Compatibility with ISDN.
•Support of Short Message Service (SMS).
25. Advantages of GSM over Analog systemAdvantages of GSM over Analog system
•Capacity increases
•Reduced RF transmission power and longer
battery life.
•International roaming capability.
•Better security against fraud (through terminal
validation and user authentication).
•Encryption capability for information security
and privacy.
•Compatibility with ISDN , leading to wider range
of services
26. Future Of GSMFuture Of GSM
2nd Generation
GSM -9.6 Kbps (data rate)
2.5 Generation ( Future of GSM)
HSCSD (High Speed ckt Switched data)
Data rate : 76.8 Kbps (9.6 x 8 kbps)
GPRS (General Packet Radio service)
Data rate: 14.4 - 115.2 Kbps
EDGE (Enhanced data rate for GSM Evolution)
Data rate: 547.2 Kbps (max)
3 Generation
WCDMA(Wide band CDMA)
Data rate : 0.348 – 2.0 Mbps
27. Evolution of the G
G stands for Mobile Technology GENERATION
1G was introduced in 1980 in Japan, used only for analogue SMS
service. 2.4 kbps
2G, was introduced in Finland in 1991, Digital GSM, CDMA & other
mobile communications standard base was laid, used for clear voice,
SMS & MMS service. 64 kbps
In Pakistan & some other under developed countries still this 2G tech
is used, latter due to the demand of high speed internet EDGE and
GPRS are developed, this is the mid point of 3G & 2G and is known
as 2.5G, still used in Pakistan (So far).
3G, was developed in 1991, faster as compared to its predecessors.
With 3G mobile user can easily stream HD videos, play online games,
no need for Wi-fi connections for mobiles. All u need is 3G tech
mobile supported.
EVO & Wi-Max are the example of 3G (ptcl) speed upto 3.1Mbps
from 512kbps.
4G, used in USA & some western countries. (100MBps)