Mobile telecommunication systems use cellular networks with multiple low-power base stations that divide coverage areas into cells. Each cell is served by a base station transmitting frequencies allocated to that cell. Neighboring cells use different frequencies to avoid interference. This allows frequency reuse for higher network capacity. Mobile devices connect to the nearest base station and can handover connections between base stations as they move between cells. The GSM system implements this cellular concept and provides voice calls, data services, and supplementary services through its radio subsystem, network switching subsystem, and operations subsystem.
Mobile ad-hoc networks (MANETs) were first developed in the 1970s by DARPA to allow packet radio connections between military terminals without infrastructure. MANETs allow devices to self-configure into a temporary network without centralized administration. They find applications in disaster relief, conferences, and more. Key challenges in MANETs include dynamic topology, limited bandwidth, energy constraints, and scalability issues as more devices join the network. Routing protocols must adapt to frequent changes, while providing quality of service, security, and other functions with distributed control.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
UNIT III
MOBILE COMMUNICATION SYSTEMS
GSM-architecture-Location tracking and call setup- Mobility management- Handover-Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and service data mgt –-Mobile Number portability -VoIP service for Mobile Networks –GPRS –Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-combined RA/LA update procedures-Billing
This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth.
Mobile ad hoc networks (MANETs) are wireless networks without a fixed infrastructure. Each node acts as both a host and a router, forwarding packets for other nodes. MANETs have dynamic topologies as nodes can move freely. They are used in applications like military operations, emergency response, and conferences. Routing in MANETs is challenging due to the dynamic topology. Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds sequence numbers to distance vector routing to avoid loops from topology changes. DSR is an on-demand routing protocol where the source determines the complete path to the destination.
HiperLAN was developed as a wireless local area network standard by ETSI to provide higher data rates than early 802.11 standards. HiperLAN Type 1 achieved data rates up to 2 Mbps for ad hoc networking. HiperLAN Type 2 was later developed to provide connection-oriented service up to 54 Mbps, with quality of service guarantees, security, and flexibility. It uses OFDM in the 5 GHz spectrum for robust transmission. While early products only achieved 25 Mbps, the standard provides a framework for higher speeds as technologies advance. HiperLAN is intended to complement wired networks by providing wireless connectivity in hotspot areas like offices, homes, and public places.
This document provides an overview of the Global System for Mobile Communications (GSM). It discusses how GSM uses a combination of Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) to maximize channel usage. It also describes the key components of GSM including the mobile station, base station subsystem, network switching subsystem, and operation and support subsystem. Additionally, it covers functions like frequency reuse, handovers, short message service, speech coding, and call routing in GSM networks.
Mobile ad-hoc networks (MANETs) were first developed in the 1970s by DARPA to allow packet radio connections between military terminals without infrastructure. MANETs allow devices to self-configure into a temporary network without centralized administration. They find applications in disaster relief, conferences, and more. Key challenges in MANETs include dynamic topology, limited bandwidth, energy constraints, and scalability issues as more devices join the network. Routing protocols must adapt to frequent changes, while providing quality of service, security, and other functions with distributed control.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
UNIT III
MOBILE COMMUNICATION SYSTEMS
GSM-architecture-Location tracking and call setup- Mobility management- Handover-Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and service data mgt –-Mobile Number portability -VoIP service for Mobile Networks –GPRS –Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-combined RA/LA update procedures-Billing
This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth.
Mobile ad hoc networks (MANETs) are wireless networks without a fixed infrastructure. Each node acts as both a host and a router, forwarding packets for other nodes. MANETs have dynamic topologies as nodes can move freely. They are used in applications like military operations, emergency response, and conferences. Routing in MANETs is challenging due to the dynamic topology. Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds sequence numbers to distance vector routing to avoid loops from topology changes. DSR is an on-demand routing protocol where the source determines the complete path to the destination.
HiperLAN was developed as a wireless local area network standard by ETSI to provide higher data rates than early 802.11 standards. HiperLAN Type 1 achieved data rates up to 2 Mbps for ad hoc networking. HiperLAN Type 2 was later developed to provide connection-oriented service up to 54 Mbps, with quality of service guarantees, security, and flexibility. It uses OFDM in the 5 GHz spectrum for robust transmission. While early products only achieved 25 Mbps, the standard provides a framework for higher speeds as technologies advance. HiperLAN is intended to complement wired networks by providing wireless connectivity in hotspot areas like offices, homes, and public places.
This document provides an overview of the Global System for Mobile Communications (GSM). It discusses how GSM uses a combination of Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) to maximize channel usage. It also describes the key components of GSM including the mobile station, base station subsystem, network switching subsystem, and operation and support subsystem. Additionally, it covers functions like frequency reuse, handovers, short message service, speech coding, and call routing in GSM networks.
This document provides an overview of mobile telecommunication systems including GSM, GPRS, and UMTS. It describes:
- The key components and architecture of GSM networks including the radio subsystem (mobile station and base station), networking and switching subsystem (MSC, HLR, VLR), and operation subsystem.
- The services provided by GSM like bearer services, teleservices, and supplementary services.
- Enhancements to GSM like GPRS which improved data transfer rates and UMTS which supported higher speech quality and data rates.
- How the transition from GSM to UMTS involved upgrades to network elements like the BTS, BSC, and addition of new
1. Vehicular ad hoc networks (VANETs) use vehicle-to-vehicle and vehicle-to-infrastructure communication to share safety information, improving road safety.
2. VANETs allow vehicles to form a temporary network without any preexisting infrastructure, distributing real-time information to avoid accidents.
3. Current research focuses on applications for traffic scenarios, as well as addressing challenges relating to network topology, routing mechanisms, security, and minimizing power consumption.
UNIT II
WIRELESS NETWORKS
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi and WiMAX - Wireless Local Loop
The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs.
This document discusses mobile computing through telephony and satellite communication systems. It covers the evolution of telephony from 1876 to present day. It describes the public switched telephone network and different multiple access procedures used in mobile networks like FDMA, TDMA, CDMA and SDMA. It also discusses low earth orbit satellites, medium earth orbit satellites, geostationary earth orbit satellites and satellite phone companies. Finally, it describes how mobile computing is enabled through computer telephony interface and interactive voice response systems using voice and DTMF inputs.
The document discusses wireless networks and IEEE 802.11 standards. It describes the components of wired LANs like repeaters, hubs, bridges, and switches. It then covers wireless networks including wireless LAN standards like 802.11b, 802.11a, and 802.11g. It also discusses wireless network topologies, services, and the medium access control of 802.11 which uses CSMA/CA for distributed coordination function and an alternative point coordination function for centralized access control.
Lecture 1 mobile and adhoc network- introductionChandra Meena
This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks.
This document provides an introduction to mobile computing. It discusses how information is the foundation of decision making and differentiates humans from animals. It explores the evolution of computing from centralized mainframes to ubiquitous computing accessible anywhere, anytime from any device. The document examines the attributes of mobility and how physical mobility evolved into logical mobility. It outlines some motivations and functions of mobile computing as well as examples of mobile applications.
Lecture 2 evolution of mobile cellular Chandra Meena
This document provides an overview of mobile and ad hoc networks. It discusses the evolution of cellular networks from early radio communication systems through modern generations like 5G. Key topics covered include the fundamentals of wireless technologies, radio propagation mechanisms, characteristics of the wireless channel, and cellular network components and terminology. Generations of cellular standards are defined, including 1G analog networks like AMPS, 2G digital networks like GSM that enabled data services, and subsequent generations with improved capabilities.
Overview of handover decision strategies in heterogeneous networks by narendr...Narendra Prajapati
The availability of diverse wireless access technologies such as (Wi-Fi), (WiMAX), and (UMTS) allows users to stay “always on” in fast roaming too using IEEE802.21.
Vertical handovers had made possible for user to transfer itself to other technology service without disturbances in ongoing process.
Its is known that security problems in GSM authentication when it comes to high speed moving users, because of there frequent change of cell sites.
Handover could be horizontal or vertical and per user requirement. MIH (media independent handover) though provide vertical handover but on other hand 802.11had provided us fast and secure connection oriented handover from one access point to another with in same mobility domain.
Thus feature of security and authentication is integrated with handover for user security.
What are heterogeneous networks?
Evolutions of Generations
The Cellular GSM Transitions
Overview of 4G Communications
Concept of Handover /Handoff
Handovers distinguished according to criteria
The Vertical handover IEEE 802.21 & its phases.
VHO Management procedures
Requirements of Handover mechanism in heterogeneous networks
Performance evaluation (Technology )
Performance evaluation in Handover mechanisms
This document provides an overview of mobile computing and mobile communication systems. It discusses various topics including:
- Guided and unguided signal transmission methods. Guided uses wires/fibers while unguided uses wireless electromagnetic signals.
- Signal propagation frequencies for different transmission standards like FM radio, GSM, UHF. It also discusses antenna types used for transmission and reception of signals.
- Modulation techniques and standards for 1G to 4G mobile systems. 1G supported only voice, while newer standards enable higher data rates and support for data/multimedia. GSM is described as a prominent 2G standard.
- Concepts of mobility including user mobility and device mobility. It also discusses applications and
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
An ad-hoc wireless network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using an existing network infrastructure or centralized administration. There are different types including wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Wireless mesh networks provide many paths for data transfer between sources and destinations with advantages like high data rates and scalability. Wireless sensor networks consist of sensor nodes that monitor regions without infrastructure by working together. Hybrid wireless networks incorporate properties of multi-hop relaying along with existing infrastructure for higher capacity and flexibility. Applications include monitoring, tracking, location services, and future scopes involve connecting more devices and enabling access to real-world information.
The document discusses various networking devices used to connect and extend local area networks (LANs). It describes repeaters as devices that receive and regenerate signals to allow them to travel longer distances. Hubs are multiport repeaters that connect multiple nodes to a single device. Bridges operate at the data link layer and logically separate network segments. Switches provide dedicated connections and are multiport bridges that separate collision domains for improved performance.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
The document discusses ad hoc wireless networks and their applications. It describes key characteristics of ad hoc networks including being self-organizing and lacking centralized administration. It outlines several applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also examines important technical issues for ad hoc networks related to medium access, routing, multicasting, transport protocols, energy management, and deployment considerations.
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
The document discusses cellular communication systems and mobile network technologies including:
- The basic components and principles of cellular networks including cells, frequency reuse, and handoff.
- Early analog cellular standards like AMPS and their limitations in capacity and features.
- Digital cellular standards including TDMA, CDMA, and GSM, with details on GSM network architecture and services.
- 3G networks providing broadband multimedia including messaging, applications, and requirements.
- Challenges include handover, screen size, functionality for convergence of mobile and consumer electronics.
Mobile computing basics include cells which are geographic units for cellular systems represented as hexagons, with base stations at the center. Cell clusters group cells where frequencies are not reused. Spectrum is limited, so frequencies must be reused across cells to increase capacity while avoiding interference. Noise sources include thermal, intermodulation, crosstalk, and impulse noise. GSM and CDMA are cellular standards, with GSM using SIM cards for storage and CDMA using internal memory.
This document provides an overview of mobile telecommunication systems including GSM, GPRS, and UMTS. It describes:
- The key components and architecture of GSM networks including the radio subsystem (mobile station and base station), networking and switching subsystem (MSC, HLR, VLR), and operation subsystem.
- The services provided by GSM like bearer services, teleservices, and supplementary services.
- Enhancements to GSM like GPRS which improved data transfer rates and UMTS which supported higher speech quality and data rates.
- How the transition from GSM to UMTS involved upgrades to network elements like the BTS, BSC, and addition of new
1. Vehicular ad hoc networks (VANETs) use vehicle-to-vehicle and vehicle-to-infrastructure communication to share safety information, improving road safety.
2. VANETs allow vehicles to form a temporary network without any preexisting infrastructure, distributing real-time information to avoid accidents.
3. Current research focuses on applications for traffic scenarios, as well as addressing challenges relating to network topology, routing mechanisms, security, and minimizing power consumption.
UNIT II
WIRELESS NETWORKS
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi and WiMAX - Wireless Local Loop
The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs.
This document discusses mobile computing through telephony and satellite communication systems. It covers the evolution of telephony from 1876 to present day. It describes the public switched telephone network and different multiple access procedures used in mobile networks like FDMA, TDMA, CDMA and SDMA. It also discusses low earth orbit satellites, medium earth orbit satellites, geostationary earth orbit satellites and satellite phone companies. Finally, it describes how mobile computing is enabled through computer telephony interface and interactive voice response systems using voice and DTMF inputs.
The document discusses wireless networks and IEEE 802.11 standards. It describes the components of wired LANs like repeaters, hubs, bridges, and switches. It then covers wireless networks including wireless LAN standards like 802.11b, 802.11a, and 802.11g. It also discusses wireless network topologies, services, and the medium access control of 802.11 which uses CSMA/CA for distributed coordination function and an alternative point coordination function for centralized access control.
Lecture 1 mobile and adhoc network- introductionChandra Meena
This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks.
This document provides an introduction to mobile computing. It discusses how information is the foundation of decision making and differentiates humans from animals. It explores the evolution of computing from centralized mainframes to ubiquitous computing accessible anywhere, anytime from any device. The document examines the attributes of mobility and how physical mobility evolved into logical mobility. It outlines some motivations and functions of mobile computing as well as examples of mobile applications.
Lecture 2 evolution of mobile cellular Chandra Meena
This document provides an overview of mobile and ad hoc networks. It discusses the evolution of cellular networks from early radio communication systems through modern generations like 5G. Key topics covered include the fundamentals of wireless technologies, radio propagation mechanisms, characteristics of the wireless channel, and cellular network components and terminology. Generations of cellular standards are defined, including 1G analog networks like AMPS, 2G digital networks like GSM that enabled data services, and subsequent generations with improved capabilities.
Overview of handover decision strategies in heterogeneous networks by narendr...Narendra Prajapati
The availability of diverse wireless access technologies such as (Wi-Fi), (WiMAX), and (UMTS) allows users to stay “always on” in fast roaming too using IEEE802.21.
Vertical handovers had made possible for user to transfer itself to other technology service without disturbances in ongoing process.
Its is known that security problems in GSM authentication when it comes to high speed moving users, because of there frequent change of cell sites.
Handover could be horizontal or vertical and per user requirement. MIH (media independent handover) though provide vertical handover but on other hand 802.11had provided us fast and secure connection oriented handover from one access point to another with in same mobility domain.
Thus feature of security and authentication is integrated with handover for user security.
What are heterogeneous networks?
Evolutions of Generations
The Cellular GSM Transitions
Overview of 4G Communications
Concept of Handover /Handoff
Handovers distinguished according to criteria
The Vertical handover IEEE 802.21 & its phases.
VHO Management procedures
Requirements of Handover mechanism in heterogeneous networks
Performance evaluation (Technology )
Performance evaluation in Handover mechanisms
This document provides an overview of mobile computing and mobile communication systems. It discusses various topics including:
- Guided and unguided signal transmission methods. Guided uses wires/fibers while unguided uses wireless electromagnetic signals.
- Signal propagation frequencies for different transmission standards like FM radio, GSM, UHF. It also discusses antenna types used for transmission and reception of signals.
- Modulation techniques and standards for 1G to 4G mobile systems. 1G supported only voice, while newer standards enable higher data rates and support for data/multimedia. GSM is described as a prominent 2G standard.
- Concepts of mobility including user mobility and device mobility. It also discusses applications and
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
An ad-hoc wireless network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using an existing network infrastructure or centralized administration. There are different types including wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Wireless mesh networks provide many paths for data transfer between sources and destinations with advantages like high data rates and scalability. Wireless sensor networks consist of sensor nodes that monitor regions without infrastructure by working together. Hybrid wireless networks incorporate properties of multi-hop relaying along with existing infrastructure for higher capacity and flexibility. Applications include monitoring, tracking, location services, and future scopes involve connecting more devices and enabling access to real-world information.
The document discusses various networking devices used to connect and extend local area networks (LANs). It describes repeaters as devices that receive and regenerate signals to allow them to travel longer distances. Hubs are multiport repeaters that connect multiple nodes to a single device. Bridges operate at the data link layer and logically separate network segments. Switches provide dedicated connections and are multiport bridges that separate collision domains for improved performance.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
The document discusses ad hoc wireless networks and their applications. It describes key characteristics of ad hoc networks including being self-organizing and lacking centralized administration. It outlines several applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also examines important technical issues for ad hoc networks related to medium access, routing, multicasting, transport protocols, energy management, and deployment considerations.
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
The document discusses cellular communication systems and mobile network technologies including:
- The basic components and principles of cellular networks including cells, frequency reuse, and handoff.
- Early analog cellular standards like AMPS and their limitations in capacity and features.
- Digital cellular standards including TDMA, CDMA, and GSM, with details on GSM network architecture and services.
- 3G networks providing broadband multimedia including messaging, applications, and requirements.
- Challenges include handover, screen size, functionality for convergence of mobile and consumer electronics.
Mobile computing basics include cells which are geographic units for cellular systems represented as hexagons, with base stations at the center. Cell clusters group cells where frequencies are not reused. Spectrum is limited, so frequencies must be reused across cells to increase capacity while avoiding interference. Noise sources include thermal, intermodulation, crosstalk, and impulse noise. GSM and CDMA are cellular standards, with GSM using SIM cards for storage and CDMA using internal memory.
The document provides an introduction to the Global System for Mobile Communications (GSM) digital cellular network. It describes that GSM networks use digital technology and operate across international boundaries in a consistent manner. It then discusses key aspects of GSM including its frequencies, features, network components, and how frequency reuse allows for increased call capacity.
The document summarizes key aspects of GSM (Global System for Mobile Communication) technology including its history, specifications, network architecture, components, services, and future developments. Specifically, it discusses the RF spectrum used by GSM, its TDMA access method, modulation techniques, network subsystems like the MSC, HLR, VLR, authentication center, radio subsystems including the BSC and BTS. It also covers mobile station components, mobile identification numbers, call origination and termination processes, and developments like 2.5G and 3G technologies.
presentation on gsm architecture and fixed assignmentFabiha Ain
The document provides an overview of GSM architecture and fixed assignment schemes. It discusses the key elements of GSM architecture including the network switching subsystem, base station subsystem, mobile station, and operations and support system. It then covers three fixed assignment schemes - frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) - and describes how channel access is allocated based on frequency, time, or code under each scheme.
Cellular telephone networks allow subscribers to have wireless connections to nearby transmitters through short-wave analog or digital telecommunication. The network is distributed over land areas divided into cells, each served by a fixed-location transceiver known as a base station. Base stations provide network coverage for transmission of voice, data, and other services within each cell using different frequencies to avoid interference. Key components of cellular networks include mobile switching centers that route calls and SMS, home location registers that store subscriber details, visitor location registers that store details of roaming subscribers, base station controllers that handle radio channels and handovers, and base transceiver stations that transmit and receive radio signals.
The document provides an introduction to the Global System for Mobile Communications (GSM). It describes that GSM is a set of recommendations and specifications for a digital cellular telephone network that ensures compatibility between equipment from different manufacturers. It divides the service area into regions called cells, with each cell having equipment to transmit and receive calls within its radio coverage area. The document then discusses various components of the GSM network including the mobile station, SIM card, base station subsystem, mobile switching center, home location register, visitor location register, and authentication center. It also covers frequency bands, handovers, and security features of GSM.
Mobile communication - GSM/CDMA/WIMAX TechnologiesAman Abhishek
Mobile communication allows communication without a physical connection and flexibility to move anywhere during communication. It uses technologies like GSM and CDMA. Mobile communication has become one of the fastest growing industries. A mobile handset allows making and receiving calls over radio links while moving. It contains components like a battery, SIM card and antenna. A SIM card identifies the subscriber to the network. In mobile communication, a cell is the smallest area, subscribers pay for use, and base stations connect mobile units to switching centers. As users move, handoffs transfer calls between base stations to maintain connectivity.
This document provides an overview of the Global System for Mobile Communications (GSM) mobile telecommunication system. It discusses the architecture and components of GSM, including the radio subsystem (RSS), network and switching subsystem (NSS), and operation subsystem (OSS). It describes the protocols and services in GSM like bearer services, teleservices, and supplementary services. It also explains key concepts like connection establishment, frequency allocation bands, and mobility management in GSM networks.
1) GSM is a cellular network standard developed in 1991 that is widely used in Europe and Asia. It uses FDMA to separate frequencies and TDMA to divide each frequency into time slots to allow multiple calls over the same frequency.
2) The GSM architecture consists of mobile stations, a base station subsystem to connect to mobile devices, and a network subsystem to switch calls. Each component has several elements like the BTS, BSC, MSC, HLR, and VLR.
3) Frequency reuse allows a limited number of frequencies to service many users by dividing a region into cells and assigning each a unique set of frequencies to avoid interference between cells.
GSM is the most widely used mobile telecommunications system in the world. It uses TDMA to separate each radio frequency carrier into time slots, allowing multiple users to access the same frequency channel. The document describes the key components and protocols of the GSM network architecture including the radio subsystem with base stations and mobile stations, the switching and network subsystem for call routing and mobility management, and bearer, tele and supplementary services provided to users.
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
GSM(Global System For Mobile) CommunicationNavin Kumar
GSM is a standard for second-generation digital cellular networks, first deployed in 1991. It describes protocols for 2G cellular networks used by mobile devices. The document discusses GSM's development and standardization by ETSI, its goals of improved spectrum efficiency, international roaming, and compatibility with other networks. It also outlines GSM's network architecture including subsystems for the mobile station, base station, switching, and operation support.
Mobile computing devices can be categorized as display-only devices, info pad models with limited processing, laptop computers, and personal digital assistants (PDAs). Mobile stations in a mobile network comprise the user equipment and software needed for communication. A GSM network consists of mobile stations, the base station subsystem including base transceiver stations (BTS) and base station controllers (BSC), and the network switching subsystem including mobile switching centers (MSCs) and databases. Mobile stations contain a mobile equipment component and a subscriber identity module (SIM) card. Ad hoc networks allow wireless nodes to connect and communicate without a preexisting infrastructure by forming a temporary network.
The document discusses teleservices and supplementary services provided by GSM networks. It describes the main teleservices which include regular telephony, emergency calls, voice messaging, and short message handling. It also explains several supplementary services such as calling line identification, call forwarding, call waiting, call barring, and advice of charge features. The document further discusses intelligent network services including virtual private networks, prepaid calling, and sponsored cell and call services.
The document provides an overview of GSM networks including:
1. GSM was developed in the 1980s to standardize cellular networks in Europe and is now used globally.
2. The key components of a GSM network are the mobile station (phone), base station subsystem including base transceiver stations and base station controllers, and the network switching subsystem centered around mobile switching centers.
3. GSM uses TDMA and FDMA to allow multiple users to access the same radio channel simultaneously. It operates in the 900MHz and 1800MHz bands and supports data rates up to 9.6kbps along with services like SMS.
GSM(Global system for mobile communication ) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation.
The document summarizes the call flow process in GSM networks. It describes the sequence of events that occur when a mobile subscriber makes a call to a landline, when a landline subscriber calls a mobile, and between two mobile subscribers. It also provides an overview of the user services, data services, supplementary services, and security features supported in GSM networks, such as encryption, authentication, and temporary identification numbers to protect subscriber privacy.
The document provides an overview of the Global System for Mobile Communications (GSM) network. It discusses:
1. The key features of GSM that have led to its popularity, including international roaming, low-cost devices, high quality speech, and support for new services.
2. The different areas that make up a GSM network, including cells, location areas, MSC/VLR service areas, and public land mobile networks (PLMNs).
3. The main components of the GSM network architecture, which are the mobile station, base station subsystem (BSS), network and switching subsystem (NSS), and operation and support subsystem (OSS). The BSS handles communication with
Similar to Mobile telecommunication system converted (20)
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
2. MOBILE TELECOMMUNICATION SYSTEM
Cellular Network Organization
Use multiple low-power transmitters (Base station) (100 W or less)
Areas divided into cells
Each served by its own antenna
Served by base station consisting of transmitter, receiver, and control unit
Band of frequencies allocated
Cells set up such that antennas of all neighbors are equidistant(Hexagonal pattern)
Cellular systems implements Space Division Multiplexing Technique(SDM). Each
transmitter is called a base station and can cover a fixed area called a cell. This area can
vary from few meters to few kilometers.
Mobile network providers install several thousands of base stations each with a smaller
cell instead of using power full transmitters with large cells
CELLULAR SYSTEM LAYOUT
Basic concepts:
3. High capacity is achieved by limiting the coverage of each base station to a small
geographic region called a cell
Same frequencies/ timeslots/codes are reused by spatially separated basestation
A switching technique called handoff enables a call to proceed uninterrupted when one
user moves from one cell to another
Neighboring base stations are assigned different group of channels so as to minimize the
interference
By systematically spacing base station and the channels group may be reused as many
number of times as necessary
As demand increases the number of base stations may be increased thereby providing
additional capacity
Frequency Reuse
4. adjacent cells assigned different frequencies to avoid interference or crosstalk
Objective is to reuse frequency in nearby cells
10 to 50 frequencies assigned to each cell
Advantages
Higher capacity
Smaller the size of the cell more the number of concurrent user’s i.e. huge cells do not allow
for more concurrent users.
Less transmission power
Huge cells require a greater transmission power than small cells.
Local interference only
For huge cells there are a number of interfering signals, while for small cells there is limited
interference only.
Robustness
As cellular systems are decentralized, they are more robust against the failure of single
components.
Disadvantages:
Infrastructure needed: Cellular systems need a complex infrastructure to connect all base stations
Handover needed: The mobile station has to perform a handover when changing from one cell
to another.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM)
GSM stands for Global System for Mobile Communication. It is a digital cellular
technology used for transmitting mobile voice and data services.
formerly: Group Special Mobile (founded 1982)
now: Global System for Mobile Communication
GSM offers several types of connections voice connections, data connections, short
message service
GSM offers three basic types of services:
5. Telephony services or teleservices
Data services or bearer services
Supplementary services
GSM SERVICES AND FEATURES
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These services
are further transited in the following ways:
Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes full-rate speech at
13 kbps and emergency calls, where the nearest emergency-service provider is notified by
dialing three digits.
Videotext and Facsmile
Another group of teleservices includes Videotext access, Teletex transmission, Facsmile
alternate speech and Facsmile Group 3, Automatic Facsmile Group, 3 etc.
Short Text Messages
Short Messaging Service (SMS) service is a text messaging service that allows sending and
receiving text messages on your GSM mobile phone. In addition to simple text messages, other
text data including news, sports, financial, language, and location-based data can also be
transmitted.
Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive and send data
is the essential building block leading to widespread mobile Internet access and mobile
data transfer.
Different data rates for voice and data (original standard)
Data Service (circuit switched)
synchronous: 2.4, 4.8 or 9.6 kbit/s
asynchronous: 300 - 1200 bit/s
Data service (packet switched)
6. synchronous: 2.4, 4.8 or 9.6 kbit/s
asynchronous: 300 - 9600 bit/s
Supplementary Services
Supplementary services are additional services that are provided in addition to
teleservices and bearer services. These services include caller identification, call
forwarding, call waiting, multi-party conversations, and barring of outgoing
(international) calls, among others. A brief description of supplementary services is given
here:
Conferencing : It allows a mobile subscriber to establish a multiparty conversation, i.e., a
simultaneous conversation between three or more subscribers to setup a conference call.
This service is only applicable to normal telephony.
Call Waiting : This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.
Call Hold : This service allows a subscriber to put an incoming call on hold and resume
after a while. The call hold service is applicable to normal telephony.
Call Forwarding : Call Forwarding is used to divert calls from the original recipient to
another number. It is normally set up by the subscriber himself. It can be used by the
subscriber to divert calls from the Mobile Station when the subscriber is not available,
and so to ensure that calls are not lost.
Call Barring : Call Barring is useful to restrict certain types of outgoing calls such as
ISD or stop incoming calls from undesired numbers. Call barring is a flexible service that
enables the subscriber to conditionally bar calls.
Number Identification : There are following supplementary services related to number
identification:
Calling Line Identification Presentation : This service displays the telephone number
of the calling party on your screen.
Calling Line Identification Restriction : A person not wishing their number to be
presented to others subscribes to this service.
Connected Line Identification Presentation : This service is provided to give the
calling party the telephone number of the person to whom they are connected. This
7. service is useful in situations such as forwarding's where the number connected is not the
number dialed.
Connected Line Identification Restriction : There are times when the person called
does not wish to have their number presented and so they would subscribe to this person.
Normally, this overrides the presentation service.
Malicious Call Identification : The malicious call identification service was provided to
combat the spread of obscene or annoying calls. The victim should subscribe to this
service, and then they could cause known malicious calls to be identified in the GSM
network, using a simple command.
Advice of Charge (AoC) : This service was designed to give the subscriber an indication
of the cost of the services as they are used. Furthermore, those service providers who
wish to offer rental services to subscribers without their own SIM can also utilize this
service in a slightly different form. AoC for data calls is provided on the basis of time
measurements.
Closed User Groups (CUGs) : This service is meant for groups of subscribers who wish
to call only each other and no one else.
Unstructured supplementary services data (USSD) : This allows operator-defined
individual services.
Architecture of the GSM system
GSM is a PLMN (Public Land Mobile Network)
several providers setup mobile networks following the GSM standard within each
country
Components
MS (mobile station)
BS (base station)
MSC (mobile switching center)
LR (location register)
Subsystems
A GSM system consists of three main subsystems
8. RSS (radio subsystem): covers all radio aspects
NSS (network and switching subsystem): call forwarding,handover, switching
OSS (operation subsystem): management of the network
A schematic architecture of the GSM is shown in the figure
RADIO SUBSYSTEM
The subsystem comprises all the radio specific entities,that is the
MOBILE STATION
BASE STATION SUBSYSTEM
BASE TRANSIVIER STATION
Mobile Station(MS)
The Mobile Station is made up of two entities:
9. Mobile Equipment (ME)
Subscriber Identity Module (SIM)
Mobile Equipment (ME)
Portable, vehicle mounted, hand held device
Uniquely identified by an IMEI (International Mobile Equipment Identity)
Voice and data transmission
Monitoring power and signal quality of surrounding cells for optimum handover
Power level : 0.8W – 20 W
160 character long SMS.
Subscriber Identity Module(SIM)
Smart card contains the International Mobile Subscriber Identity (IMSI)
Allows user to send and receive calls and receive other subscribed services
Protected by a password or PIN
Can be moved from phone to phone –
contains key information to activate the phone
Base Station Sub System
BSC(Base Station Controller) —The BSC provides all the control functions and physical links
between the MSC and BTS. It is a high-capacity switch that provides functions such as
handover, cell configuration data, and control of radio frequency (RF) power levels in base
transceiver stations. The BSC is the connection between the Mobile Station and Mobile
Switching Center.
BTS(Base Transceiver Station) —The BTS handles the radio interface to the mobile station.
The BTS is the radio equipment (transceivers and antennas) needed to service each cell in the
network. A group of BTSs are controlled by a BSC. controls multiple BTSs and manages radio
channel setup, and handovers.
10. Base Station Sub-System
Network and Switching Sub System
This subsystem forms the heart of the GSM system.It connects the wireless networks to
the standard public network and carries out the usage based charging,accounting and also
handles the roaming.It consists of the following
• Home location register (HLR) —The HLR is a database used for storage and
management of subscriptions. The HLR is considered the most important database, as it
11. stores permanent data about subscribers, including a subscriber's service profile,location
information, and activity status.
• Mobile services switching center (MSC) —The MSC performs the telephony switching
functions of the system. It controls calls to and from other telephone and data systems. It
also performs such functions as toll ticketing, network interfacing,common channel
signaling, and others.
• Visitor location register (VLR) —The VLR is a database that contains temporary
information about subscribers that is needed by the MSC in order to service visiting
subscribers. The VLR is always integrated with the MSC
OPERATION SUB SYSTEM
The operation subsystem consists of all the necessary functions for network operation and
maintenance. It consists the following
Authentication center (AUC) —A unit called the AUC provides authentication and
encryption parameters that verify the user's identity and ensure the confidentiality of each
call. The AUC protects network operators from different types of fraud found in today's
cellular world.
Equipment identity register (EIR) —The EIR is a database that contains information about
the identity of mobile equipment that prevents calls from stolen, unauthorized, or defective
mobile stations. The AUC and EIR are implemented as stand-alone nodes or as a combined
AUC/EIR node.
Base Station System/Radio Sub-System
12. Security in GSM
Security services
Access control/authentication
User SIM (Subscriber Identity Module): secret PIN (personal identification number)
SIM network: challenge response method
Confidentiality
voice and signaling encrypted on the wireless link (after successful authentication)
temporary identity TMSI (Temporary Mobile Subscriber Identity)
newly assigned at each new location update (LUP)
encrypted transmission
3 algorithms specified in GSM
A3 for authentication (“secret”, open interface)
A5 for encryption (standardized)
A8 for key generation (“secret”, open interface)
GSM Security
Authentication
13. network operator can verify the identity of the subscriber making it infeasible to
clone someone else’s mobile phone
Confidentiality
protects voice, data and sensitive signalling information (e.g. dialled digits)
against eavesdropping on the radio path
Anonymity
protects against someone tracking the location of the user or identifying calls
made to or from the user by eavesdropping on the radio path
GSM Security Mechanisms
Authentication
challenge-response authentication protocol
encryption of the radio channel
Confidentiality
encryption of the radio channel
Anonymity
use of temporary identities
GSM Security Architecture
Each mobile subscriber is issued with a unique 128-bit secret key (Ki)
This is stored on a Subscriber Identity Module (SIM) which must be inserted into the
mobile phone
Each subscriber’s Ki is also stored in an Authentication Centre (AuC) associated with the
HLR in the home network
The SIM is a tamper resistant smart card designed to make it infeasible to extract the
customer’s Ki
14. GSM security relies on the secrecy of Ki
if the Ki could be extracted then the subscription could be cloned and the
subscriber’s calls could be eavesdropped
even the customer should not be able to obtain Ki
AUTHENTICATION
Authentication key Ki,, the user identification IMSI, and the algorithmused for
authentication A3 is stored in the sim. This is known only to the MS and BTS.
Authentication uses a challenge-response method: The access control AC (BTS)
generates a random number RAND this is called as challenge, and the SIM within the MS
reply with SRES (signed response). This is called as SRES response.
N/W side: BTS send random number RAND to MS.
15. MS side: MS prepares SRES response by giving the random number RAND and Ki, to
the algorithm A8.The output is the SRES which is sent to the BTS.
BTS side: BTS also prepares the same SRES and the output from the MS is compared
with result created by the BTS. If they are the same, the BTS accepts the subscriber,
otherwise the subscriber is rejected.
CONFIDENTIALITY/ENCRYPTION
To maintain the secrecy of the conversation, all messages are encrypted in GSM.
Encryption is done by giving the cipher key Kc with message to the algorithm A5 .Here
the key is generated separately
Kc is generated using the Ki which is stored in SIM and a random number RAND given
by BTS, by applying the algorithm A8.
Note that the SIM in the MS and the network both calculate the same Kc based on the
random value RAND. The key Kc itself is not transmitted over the air.
ANONYMITY
A GSM networks protects against someone tracking the location of a user or identifying
calls made to or from the user.
16. The anonymity of the subscriber on the radio access link in the GSM network is achieved
by allocating Temporary Mobile Subscriber Identity(TMSI)instead of permanent
identities.
This helps to protect against tracking users location and obtaining information about a
users calling pattern.
GSM Security Features
Key management is independent of equipment Subscribers can change handsets without
compromising security
Subscriber identity protection not easy to identify the user of the system intercepting a
user data
Detection of compromised equipment – Detection mechanism whether a mobile device
was compromised or not
Subscriber authentication - The operator knows for billing purposes who is using the
system
Signaling and user data protection- Signaling and data channels are protected over the
radio path
General packet radio service (GPRS)
General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and
3G cellular communication system's global system for mobile communications(GSM). GPRS
was originally standardized by European Telecommunications Standards Institute (ETSI) in
response to the earlier CDPD and i-mode packet-switched cellular technologies.
Networks based on the Internet Protocol (IP) and X.25
Theoretically maximum rate is just 171. 2 Kbits/sec.
A realistic estimation on transfer is between 5 and 40 kbps.
It applies a packet radio principle to transfer user data packets in an efficient way.
This principle offers a more user-friendly billing than that offered by circuit switched
services.
17. User can be "online" over a long period of time but will be billed based on the
transmitted data volume.
GPRS Architecture
GPRS architecture introduces two new network elements
Serving GPRS support node(SGSN)
Gateway GPRS support Node(GGSN)
Serving GPRS support node(SGSN)
A serving GPRS support node (SGSN) is responsible for
Delivery of data packets from and to the mobile stations within its service area.
Packet routing and transfer
18. Mobility management (attach/detach and location management)
Authentication and charging functions. The location register of the SGSN stores location
information and user profiles (IMSI, addresses used in the packet data network) of all
GPRS users registered with this SGSN.
Gateway GPRS support Node(GGSN)
A gateway GPRS support node (GGSN) acts as an
interface between the GPRS backbone network and the external packet data networks.
It converts the GPRS packets coming from the SGSN into the appropriate packet data
protocol (PDP) format (IP or X.25) and sends them out on the corresponding packet data
network.
In the other direction, PDP addresses of incoming data packets are converted to the GSM
address of the destination user. The readdressed packets are sent to the responsible
SGSN. For this purpose, the GGSN stores the current SGSN address of the user and his
or her profile in its location register.
Also performs authentication and charging functions.
GPRS Mobility Management
GPRS Attachment
GPRS Detachment
Location Management
GPRS Attachment Procedure
Before a mobile station can use GPRS services, it must register with an
SGSN of the GPRS network. This procedure follows as
mobile is authenticated with the mobile's Home Location Register
19. SGSN does an update of the GPRS location
SGSN sends an "Attach Accept" message to the mobile
mobile responds with an "Attach Complete“
Attach request which includes IMSI which then processed by the network to P-TMSI.
GPRS Detachment Procedure
The disconnection from the GPRS. It can be initiated by the mobile station or by the
network (SGSN).
In MS initiated one; MS informs that it wants to leave the system, this is MS’s wish. If
any contexts are active, network will clear them. Afterwards MS’s location is not tracked
anymore.
In Network initiated one; Network wants to “get rid of the MS” because of;
20. behaving mobile
Congested network
Immediate service termination (IST)(E.g. Bills are not paid)
Load new parameters (Configuration has been changed and they should be taken into
use)
GPRS - PDP Context
PDP stands for Packet Data Protocol. The PDP addresses are network layer addresses
(Open Standards Interconnect [OSI] model Layer 3). GPRS systems support both X.25
and IP network layer protocols. Therefore, PDP addresses can be X.25, IP, or both.
Each PDP address is anchored at a Gateway GPRS Support Node (GGSN), as shown in
figure below. All packet data traffic sent from the public packet data network for the PDP
address goes through the gateway (GGSN).
21. The public packet data network is only concerned that the address belongs to a specific
GGSN. The GGSN hides the mobility of the station from the rest of the packet data
network and from computers connected to the public packet data network.
Statically assigned PDP addresses are usually anchored at a GGSN in the subscriber's
home network. Conversely, dynamically assigned PDP addresses can be anchored either
in the subscriber's home network or the network that the user is visiting.
When a MS is already attached to a SGSN and it is about to transfer data, it must activate
a PDP address. Activating a PDP address establishes an association between the current
SGSN of mobile device and the GGSN that anchors the PDP address.
The record kept by the SGSN and the GGSN regarding this association is called the
PDP context.
22. It is important to understand the difference between a MS attaching to a SGSN and a MS
activating a PDP address. A single MS attaches to only one SGSN, however, it may have
multiple PDP addresses that are all active at the same time.
Each of the addresses may be anchored to a different GGSN. If packets arrive from the
public packet data network at a GGSN for a specific PDP address and the GGSN does not
have an active PDP context corresponding to that address, it may simply discard the
packets. Conversely, the GGSN may attempt to activate a PDP context with a MS if the
address is statically assigned to a particular mobile device.
GPRS - Data Routing
Data routing or routing of data packets to and fro from a mobile user, is one of the pivot
requisites in the GPRS network. The requirement can be divided into two areas:
Data packet routing
Location management.
Data Packet Routing
The GGSN updates the location directory using routing information supplied by the
SGSNs about the location of an MS. It routes the external data network protocol packet
encapsulated over the GPRS backbone to the SGSN currently serving the MS. It also
decapsulates and forwards external data network packets to the appropriate data network
and collects charging data that is forwarded to a charging gateway (CG).
There are three important routing schemes:
Mobile-originated message - This path begins at the GPRS mobile device and ends at
the host.
23. Network-initiated message when the MS is in its home network - This path begins at
the host and ends at the GPRS mobile device.
Network-initiated message when the MS roams to another GPRS network - This
path begins at the host of visited network and ends at the GPRS mobile device.
The GPRS network encapsulates all data network protocols into its own encapsulation
protocol called the GPRS tunnelling protocol (GTP). The GTP ensures security in the
backbone network and simplifies the routing mechanism and the delivery of data over the
GPRS network.
Location Management
Aim is to keep track of the user's current location,so that incoming packets can be routed
to his or her MS.
A MS can be in one of three states depending on its current traffic amount; the location
update frequency is dependent on the state of the MS.
Active State
24. Data is transmitted between an MS and the GPRS network only when the MS is in the
active state. In the active state, the SGSN knows the cell location of the MS.
Packet transmission to an active MS is initiated by packet paging to notify the MS of an
incoming data packet.
The data transmission proceeds immediately after packet paging through the channel
indicated by the paging message.
The purpose of the paging message is to simplify the process of receiving packets.
The MS listens to only the paging messages instead of to all the data packets in the
downlink channels. This reduces battery usage significantly.
When an MS has a packet to transmit, it must access the uplink channel (i.e., the channel
to the packet data network where services reside). T
he uplink channel is shared by a number of MSs, and its use is allocated by a BSS(base
station subsystem). The MS requests use of the channel in a random access message.
The BSS allocates an unused channel to the MS and sends an access grant message in
reply to the random access message.
Standby State
In the standby state, only the routing area of the MS is known. (The routing area can
consist of one or more cells within a GSM location area).
When the SGSN sends a packet to an MS that is in the standby state, the MS must be
paged. Because the SGSN knows the routing area of the MS, a packet paging message is
sent to the routing area.
On receiving the packet paging message, the MS relays its cell location to the SGSN to
establish the active state.
Idle State
25. In the idle state, the MS does not have a logical GPRS context activated or any Packet-
Switched Public Data Network (PSPDN) addresses allocated.
In this state, the MS can receive only those multicast messages that can be received by
any GPRS MS.
Because the GPRS network infrastructure does not know the location of the MS, it is not
possible to send messages to the MS from external data networks.
Routing Updates
When an MS that is in an active or a standby state moves from one routing area to
another within the service area of one SGSN, it must perform a routing update. The
routing area information in the SGSN is updated, and the success of the procedure is
indicated in the response message.
A cell-based routing update procedure is invoked when an active MS enters a new cell.
The MS sends a short message containing the identity of the MS and its new location
through GPRS channels to its current SGSN. This procedure is used only when the MS is
in the active state.
The inter-SGSN routing update is the most complicated routing update. The MS changes
from one SGSN area to another, and it must establish a new connection to a new SGSN.
This means creating a new logical link context between the MS and the new SGSN and
informing the GGSN about the new location of the MS
.
GPRS - Quality of Service
The QoS is a vital feature of GPRS services as there are different QoS support
requirements for assorted GPRS applications like realtime multimedia, web browsing,
and e-mail transfer.
GPRS allows defining QoS profiles using the following parameters :
26. Service Precedence
Reliability
Delay and
Throughput
Service Precedence
The preference given to a service when compared to another service is known as Service
Precedence.This level of priority is classified into three levels called:
high
normal
low
When there is network congestion, the packets of low priority are discarded as compared
to high or normal priority packets.
Reliability
This parameter signifies the transmission characteristics required by an application.The
reliability classes are defined which guarantee certain maximum values for the probability of
loss, duplication, mis-sequencing, and corruption of packets
Delay
The delay is defined as the end-to-end transfer time between two communicating mobile
stations or between a mobile station and the GI interface to an external packet data
network.
This includes all delays within the GPRS network, e.g., the delay for request and
assignment of radio resources and the transit delay in the GPRS backbone network.
Transfer delays outside the GPRS network, e.g., in external transit networks, are not
taken into account.
27. Throughput
The throughput specifies the maximum/peak bit rate and the mean bit rate.
Using these QoS classes, QoS profiles can be negotiated between the mobile user and the
network for each session, depending on the QoS demand and the available resources.
The billing of the service is then based on the transmitted data volume, the type of
service, and the chosen QoS profile.
GPRS Billing Techniques
The SGSN and GGSN register all possible aspects of a GPRS user's behavior and
generate billing information accordingly. This information is gathered in so-called
Charging Data Records (CDR) and is delivered to a billing gateway.
The GPRS service charging can be based on the following parameters:
Volume - The amount of bytes transferred, i.e., downloaded and uploaded.
Duration - The duration of a PDP context session.
Time - Date, time of day, and day of the week (enabling lower tariffs at offpeak hours).
Final destination - A subscriber could be charged for access to the specific network,
such as through a proxy server.
Location - The current location of the subscriber.
Quality of Service - Pay more for higher network priority.
SMS - The SGSN will produce specific CDRs for SMS.
Served IMSI/subscriber - Different subscriber classes (different tariffs for frequent
users, businesses, or private users).
Reverse charging - The receiving subscriber is not charged for the received data;
instead, the sending party is charged.
28. Free of charge - Specified data to be free of charge.
Flat rate - A fixed monthly fee.
Bearer service - Charging based on different bearer services (for an operator who has
several networks, such as GSM900 and GSM1800, and who wants to promote usage of
one of the networks). Or, perhaps the bearer service would be good for areas where it
would be cheaper for the operator to offer services from a wireless LAN rather than from
the GSM network.
Universal Mobile Telecommunications
System(UMTS)
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of
several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text,
digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to
the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Features
It uses FDD/TDD duplexing method.
It uses the Bandwidth of 5 MHz. ´
The Chip rate is about 3.84 Mbps
It is very much flexible with 100/200 kHz carrier spacing. ´
29. The Frame length unit is 10 ms.
It has variable spreading factor.
The maximum data rat for indoor is 2 Mbps and for mobile it is 384 kbps.
UMTS Modes
It has two modes.
I) UMTS-FDD ii) UMTSTDD.
In frequency division duplex mode there are two frequencies used one for the uplink and
the other for the downlink.
In Time division duplex mode only one frequency is used for both uplink and downlink,
but the frequency is divided into time slots for uplink and downlink communication.
30. Types of Cells and its Data Rates
In these networks coverage is provided by a combination of various cell sizes
Macro Cell
These cover a large area and will give slow access.
144 Kbps – max speed of 500 Km/h. Low data rate.
Micro Cell
These should cover a medium area.
384 Kbps max speed 120 Km/h. Medium data rate.
31. Pico Cell
Less than 100 metres.
2 Mbps – max speed of 10 Km/h. High data rate
Architecture of UMTS
The UMTS network architecture can be divided into three main elements
User Equipment
UMTS Terrestrial Radio Access network
Core Network
User Equipment
It is not a simple mobile phone but rather, a mobile multimedia terminal provides
simultaneously voice, video and data services.
UE is composed of two parts –
Mobile Equipment(ME)
Universal subscriber identity module (USIM).
32. Mobile Equipment
It performs reliable data and signalling message transfer throughout the radio Interface.
User data is generated in uplink and processed in the downlink, Application protocols
such as WAP/IP are located in the TE(Terminal Equipment).
USIM
Information located in USIM are:
The personal identification Number(PIN).
The preferred languages
The codes to enable emergency call
One or several IMSI(international mobile subscriber identity) and MSISDN(mobile
subscriber integrated services digital network ).
The user’s temporary identities allocated.
Circuit and packet switched temporary location information.
UTRAN (UMTS Terrestrial Radio Access network)
The UMTS(UMTS Terrestrial Radio Access network) has two elements:
RNC (radio network controller)
Node B.
UTRAN is subdivided into individual radio network (RNS), where each RNS is
controlled by RNC.
The RNC is connected to a set of Node B elements, each of which can serve one or
several cells.
Radio Network Controller (RNC)
33. A radio network controller (RNC) is a governing element in the UMTS radio
access network (UTRAN) and is responsible for controlling the Node Bs that are
connected to it.
The RNC carries out radio resource management, some mobility management functions
and encrypts data before it is sent to and from the mobile.
Node B
Node B is the physical unit for radio TX/RX with cells.
A single Node B can support both FDD and TDD modes.
The Main task of Node B is the conversion of data to and from th Uu radio interface,
including forward error correction (FEC)
Node B also participates in power control.
Core Network
The UMTS core network may be split into two different areas:
Circuit switched elements:
Carry data in a circuit switched manner, i.e. a permanent channel for the duration of the
call.
Packet switched elements:
Carry packet data. This enables much higher network usage as the capacity can be shared
and data is carried as packets which are routed according to their destination.
Shared Elements
Circuit switched elements
The circuit switched elements of the UMTS core network architecture include the following
network entities:
34. Mobile switching center (MSC):
An exchange performing all the switching and signalling functions
Functions
–call management
–mobility management(handling attach and authentication)
–subscriber administration
–maintenance of charging data(for radio network usage)
–supplementary call services (call forwarding, etc.)
Gateway MSC (GMSC)
The Gateway Mobile Switching Center (GMSC) is a type of Mobile Switching Center
(MSC) that is used to route calls outside the mobile network. Mobile Switching Center
Servers (MSC-S) provide control of high-capacity switching in mobile circuit core
networks for operators to control services and switching.
Provides interconnection between the UMTS core network and external Public Switched
Telephone Network (PSTN)/ Integrated Services Digital Network (ISDN)networks.
Packet switched elements
The packet switched elements of the 3G UMTS core network architecture include the
following network entities:
Serving GPRS Support Node (SGSN)
The SGSN provides a number of functions within the UMTS network architecture.
Mobility management
Session management:
Interaction with other areas of the network:
35. Billing
Gateway GPRS Support Node (GGSN):
Central element in UMTS.
It handles inter-working between the UMTS packet switched network and external packet
switched networks.
Shared Elements
The shared elements of the 3G UMTS core network architecture include the following network
entities:
Home location register (HLR):
Contains all the administrative information about each subscriber along with their last
known location
Equipment identity register (EIR):
The EIR is the entity that decides whether a given UE equipment may be allowed onto
the network or not on the basis of IMEI.
Authentication centre (AuC) :
The AuC is a protected database that contains the secret key also contained in theuser's
USIM card.
Major Interface
There are four major new interfaces defined in UMTS:
Iu The interface between UTRAN and the CN. This is the circuit-switched connection for
carrying (typically) voice traffic and signaling between the UTRAN and the core voice network.
The main signaling protocol used is Radio Access Network Application Part (RANAP).
Iur The Interface between different RNCs.
36. The primary purpose of the Iur interface is to support inter-MSC mobility. When a
mobile subscriber moves between areas served by different RNCs, the mobile
subscriber’s data is now transferred to the new RNC via Iur.
The original RNC is known as the serving RNC and the new RNC is known as the drift
RNC.
The main signaling protocol used is Radio Network Subsystem Application Part
(RNSAP).
Iub The interface between the Node B and the RNC. This is the interface used by an RNC to
control multiple Node Bs.
The main signaling protocol used is Node B Application Part (NBAP).
The equivalent interface in GSM/GPRS networks is the A-bis interface.
The Iubinterface is the main standardized and open, unlike the A-bis interface.
Uu This is the interface between the user equipment and the network. That is, it is the UMTS
air interface.
General Protocol Model
37. Signaling bearers are used to transmit higher layers, signaling and control
information.
Data bearers are the frame protocols used to transport user data.
Application protocols are used to provide UMTS- specific signaling an control with in
UTRAN such as to set up bearers in theradio network layer
Data streams contain the user data that is transparently transmitted between the
network elements.
Access link control application part protocol layers . They react to the radio network
slayer’s demands to set up, maintain and release data bearers.