Course Material (Lecture Notes) : Sri Vidya College of Engineering & Technology, Virudhunagar
Course Material (Lecture Notes) : Sri Vidya College of Engineering & Technology, Virudhunagar
GSM
GSM is the most successful digital mobile telecommunication system in the world today.
It is used by over 800 million people in more than 190 countries. GSM permits the integration of
different voice and data services and the interworking with existing networks. Services make a
network interesting for customers. GSM has defined three different categories of services:
Bearer Services, Tele and Supplementary Services.
Bearer services:
GSM specifies different mechanisms for data transmission, the original GSM allowing
for data rates of up to 9600 bit/s for non-voice services. Bearer services permit transparent and
non-transparent, synchronous or asynchronous data transmission.
Transparent bearer services only use the functions of the physical layer (layer 1) to transmit
data. Data transmission has a constant delay and throughput if no transmission errors occur.
Transmission quality can be improved with the use of forward error correction (FEC), which
codes redundancy into the data stream and helps to reconstruct the original data in case of
transmission errors. Transparent bearer services do not try to recover lost data in case of, for
example, shadowing or interruptions due to handover. Non-transparent bearer services use
protocols of layers two and three to implement error correction and flow control. These services
use the transparent bearer services, adding a radio link protocol (RLP). This protocol comprises
mechanisms of high-level data link control (HDLC), and special selective-reject mechanisms
to trigger retransmission of erroneous data. Using transparent and non-transparent services, GSM
specifies several bearer services for interworking with PSTN, ISDN, and packet switched public
data networks (PSPDN) like X.25, which is available worldwide. Data transmission can be full-
duplex, synchronous with data rates of 1.2, 2.4, 4.8, and 9.6 kbit/s or full-duplex, asynchronous
from 300 to 9,600 bit/s.
Tele services: GSM mainly focuses on voice-oriented tele services. These comprise encrypted
voice transmission, message services, and basic data communication with terminals as known
from the PSTN or ISDN (e.g., fax). The primary goal of GSM was the provision of high-quality
digital voice transmission. Special codecs (coder/decoder) are used for voice transmission, while
other codecs are used for the transmission of analog data for communication with traditional
computer modems used in, e.g., fax machines. Another service offered by GSM is the
emergency number (eg 911, 999). This service is mandatory for all providers and free of
charge. This connection also has the highest priority, possibly pre-empting other connections,
and will automatically be set up with the closest emergency center. A useful service for very
simple message transfer is the short message service (SMS), which offers transmission of
messages of up to 160 characters. Sending and receiving of SMS is possible during data or voice
transmission. It can be used for “serious” applications such as displaying road conditions, e-mail
headers or stock quotes, but it can also transfer logos, ring tones, horoscopes and love letters.
The successor of SMS, the enhanced message service (EMS), offers a larger message
size, formatted text, and the transmission of animated pictures, small images and ring tones in a
standardized way. But with MMS, EMS was hardly used. MMS offers the transmission of larger
pictures (GIF, JPG, WBMP), short video clips etc. and comes with mobile phones that integrate
small cameras. Another non-voice tele service is group 3 fax, which is available worldwide. In
this service, fax data is transmitted as digital data over the analog telephone network according to
the ITU-T standards T.4 and T.30 using modems.
Supplementary services:
In addition to tele and bearer services, GSM providers can offer supplementary services.
these services offer various enhancements for the standard telephony service, and may vary from
provider to provider. Typical services are user identification, call redirection, or forwarding of
ongoing calls, barring of incoming/outgoing calls, Advice of Charge (AoC) etc. Standard ISDN
features such as closed user groups and multiparty communication may be available.
GSM Architecture
A GSM system consists of three subsystems, the radio sub system (RSS), the network
and switching subsystem (NSS), and the operation subsystem (OSS).
Network Switching Subsystem: The NSS is responsible for performing call processing and
subscriber related functions. The switching system includes the following functional units:
Home location register (HLR): It is a database used for storage and management of
subscriptions. HLR stores permanent data about subscribers, including a subscribers service
profile, location information and activity status. When an individual buys a subscription from the
PCS provider, he or she is registered in the HLR of that operator.
Visitor location register (VLR): It is a database that contains temporary information about
subscribers that is needed by the MSC in order to service visiting subscribers. VLR is always
integrated with the MSC. When a MS roams into a new MSC area, the VLR connected to that
MSC will request data about the mobile station from the HLR. Later if the mobile station needs
to make a call, VLR will be having all the information needed for call setup.
Authentication center (AUC): A unit called the AUC provides authentication and
encryption parameters that verify the users identity and ensure the confidentiality of each call.
Equipment identity register (EIR): It is a database that contains information about the
identity of mobile equipment that prevents calls from stolen, unauthorized or defective mobile
stations.
Mobile switching center (MSC): The MSC performs the telephony switching functions of
the system. It controls calls to and from other telephone and data systems.
identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the
International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a
secret key for authentication, and other information. The IMEI and the IMSI are independent,
thereby allowing personal mobility. The SIM card may be protected against unauthorized use by
a password or personal identity number.
Radio Interface
The most interesting interface in a GSM system is Um, the radio interface, as it
comprises various multiplexing and media access mechanisms. GSM implements SDMA using
cells with BTS and assigns an MS to a BTS.
characteristics and to select the strongest signal in case of multi-path propagation. A flag S
indicates whether the data field contains user or network control data.
Apart from the normal burst, ETSI (1993a) defines four more bursts for data
transmission: a frequency correction burst allows the MS to correct the local oscillator to avoid
interference with neighbouring channels, a synchronization burst with an extended training
sequence synchronizes the MS with the BTS in time, an access burst is used for the initial
connection setup between MS and BTS, and finally a dummy burst is used if no data is
available for a slot.
There are two different types of logical channel within the GSM system: Traffic channels
(TCHs), Control channels (CCHs).
Traffic Channels:
Traffic channels carry user information such as encoded speech or user data. Traffic
channels are defined by using a 26-frame multiframe. Two general forms are defined:
i. Full rate traffic channels (TCH/F), at a gross bit rate of 22.8 kbps (456bits / 20ms)
ii. Half rate traffic channels (TCH/H), at a gross bit rate of 11.4 kbps.
Uplink and downlink are separated by three slots (bursts) in the 26-multiframe structure.
This simplifies the duplexing function in mobile terminals design, as mobiles will not
need to transmit and receive at the same time. The 26-frame multiframe structure, shown below
multiplexes two types of logical channels, a TCH and a Slow Associated Control Channel
(SACCH).
However, if required, a Fast Associated Control CHannel (FACCH) can steal TCH in
order to transmit control information at a higher bit rate. This is usually the case during the
handover process. In total 24 TCH/F are transmitted and one SACCH.
Control Channels:
Control channels carry system signalling and synchronisation data for control procedures
such as location registration, mobile station synchronisation, paging, random access etc. between
base station and mobile station. Three categories of control channel are defined: Broadcast,
Common and Dedicated. Control channels are multiplexed into the 51-frame multiframe.
GSM Protocols
The signalling protocol in GSM is structured into three general layers depending on the
interface, as shown below. Layer 1 is the physical layer that handles all radio-specific functions.
This includes the creation of bursts according to the five different formats, multiplexing of
bursts into a TDMA frame, synchronization with the BTS, detection of idle channels, and
measurement of the channel quality on the downlink. The physical layer at Um uses GMSK for
digital modulation and performs encryption/decryption of data, i.e., encryption is not
performed end-to-end, but only between MS and BSS over the air interface.
The main tasks of the physical layer comprise channel coding and error
detection/correction, which is directly combined with the coding mechanisms. Channel coding
makes extensive use of different forward error correction (FEC) schemes.
Signaling between entities in a GSM network requires higher layers. For this purpose, the
LAPDm protocol has been defined at the Um interface for layer two. LAPDm has been derived
from link access procedure for the D-channel (LAPD) in ISDN systems, which is a version of
HDLC. LAPDm is a lightweight LAPD because it does not need synchronization flags or
checksumming for error detection. LAPDm offers reliable data transfer over connections,
resequencing of data frames, and flow control.
The network layer in GSM, layer three, comprises several sublayers. The lowest sublayer
is the radio resource management (RR). Only a part of this layer, RR’, is implemented in the
BTS, the remainder is situated in the BSC. The functions of RR’ are supported by the BSC via
the BTS management (BTSM). The main tasks of RR are setup, maintenance, and release of
radio channels. Mobility management (MM) contains functions for registration, authentication,
identification, location updating, and the provision of a temporary mobile subscriber identity
(TMSI). Finally, the call management (CM) layer contains three entities: call control (CC), short
message service (SMS), and supplementary service (SS). SMS allows for message transfer using
the control channels SDCCH and SACCH, while SS offers the services like user identification,
call redirection, or forwarding of ongoing calls. CC provides a point-to-point connection between
two terminals and is used by higher layers for call establishment, call clearing and change of call
parameters. This layer also provides functions to send in-band tones, called dual tone multiple
frequency (DTMF), over the GSM network. These tones are used, e.g., for the remote control of
answering machines or the entry of PINs in electronic banking and are, also used for dialing in
traditional analog telephone systems. Additional protocols are used at the Abis and A interfaces.
Data transmission at the physical layer typically uses pulse code modulation (PCM) systems.
LAPD is used for layer two at Abis, BTSM for BTS management. Signaling system No. 7 (SS7)
is used for signaling between an MSC and a BSC. This protocol also transfers all management
information between MSCs, HLR, VLRs, AuC, EIR, and OMC. An MSC can also control a BSS
via a BSS application part (BSSAP).
Handover
Cellular systems require handover procedures, as single cells do not cover the whole
service area. However, a handover should not cause a cut-off, also called call drop. GSM aims at
maximum handover duration of 60 ms. There are two basic reasons for a handover:
1. The mobile station moves out of the range of a BTS, decreasing the received signal level
increasing the error rate thereby diminishing the quality of the radio link.
2. Handover may be due to load balancing, when an MSC/BSC decides the traffic is too high in
one cell and shifts some MS to other cells with a lower load.
The four possible handover scenarios of GSM are shown below:
.
Handover decision depending on receive level
Intra-MSC handover
More sophisticated handover mechanisms are needed for seamless handovers between
different systems.
Security
GSM offers several security services using confidential information stored in the AuC
and in the individual SIM. The SIM stores personal, secret data and is protected with a PIN
against unauthorized use. Three algorithms have been specified to provide security services in
GSM. Algorithm A3 is used for authentication, A5 for encryption, and A8 for the generation
of a cipher key. The various security services offered by GSM are:
Access control and authentication: The first step includes the authentication of a valid user for
the SIM. The user needs a secret PIN to access the SIM. The next step is the subscriber
authentication. This step is based on a challenge-response scheme as shown below:
Subscriber Authentication
Authentication is based on the SIM, which stores the individual authentication key Ki,
the user identification IMSI, and the algorithm used for authentication A3. The AuC performs
the basic generation of random values RAND, signed responses SRES, and cipher keys Kc for
each IMSI, and then forwards this information to the HLR. The current VLR requests the
appropriate values for RAND, SRES, and Kc from the HLR. For authentication, the VLR sends
the random value RAND to the SIM. Both sides, network and subscriber module, perform the
same operation with RAND and the key Ki, called A3. The MS sends back the SRES generated
by the SIM; the VLR can now compare both values. If they are the same, the VLR accepts the
subscriber, otherwise the subscriber is rejected.
Confidentiality:
All user-related data is encrypted. After authentication, BTS and MS apply encryption to
voice, data, and signalling as shown below.
Anonymity:
To provide user anonymity, all data is encrypted before transmission, and user identifiers
are not used over the air. Instead, GSM transmits a temporary identifier (TMSI), which is newly
assigned by the VLR after each location update. Additionally, the VLR can change the TMSI at
any time.
HSCD:
A straightforward improvement of GSM’s data transmission capabilities is high speed
circuit switched data (HSCSD) in which higher data rates are achieved by bundling several
TCHs. An MS requests one or more TCHs from the GSM network, i.e., it allocates several
TDMA slots within a TDMA frame. This allocation can be asymmetrical, i.e. more slots can be
allocated on the downlink than on the uplink, which fits the typical user behaviour of
downloading more data compared to uploading. A major disadvantage of HSCD is that it still
uses the connection-oriented mechanisms of GSM, which is not efficient for computer data
traffic.
GPRS:
The next step toward more flexible and powerful data transmission avoids the problems
of HSCSD by being fully packet-oriented. The general packet radio service (GPRS) provides
packet mode transfer for applications that exhibit traffic patterns such as frequent transmission of
small volumes (e.g., typical web requests) or infrequent transmissions of small or medium
volumes (e.g., typical web responses) according to the requirement specification. For the new
GPRS radio channels, the GSM system can allocate between one and eight time slots within a
TDMA frame. Time slots are not allocated in a fixed, pre-determined manner but on demand. All
time slots can be shared by the active users; up- and downlink are allocated separately.
Allocation of the slots is based on current load and operator preferences. The GPRS concept is
independent of channel characteristics and of the type of channel (traditional GSM traffic or
control channel), and does not limit the maximum data rate (only the GSM transport system
limits the rate). All GPRS services can be used in parallel to conventional services. GPRS
includes several security services such as authentication, access control, user identity
confidentiality, and user information confidentiality.
The GPRS architecture introduces two new network elements, which are called GPRS
support nodes (GSN) and are in fact routers. All GSNs are integrated into the standard GSM
architecture, and many new interfaces have been defined. The gateway GPRS support node
(GGSN) is the interworking unit between the GPRS network and external packet data networks
(PDN). This node contains routing information for GPRS users, performs address conversion,
and tunnels data to a user via encapsulation. The GGSN is connected to external networks (e.g.,
IP or X.25) via the Gi interface and transfers packets to the SGSN via an IPbased GPRS
backbone network (Gn interface). The other new element is the serving GPRS support node
(SGSN) which supports the MS via the Gb interface. The SGSN, for example, requests user
addresses from the GPRS register (GR), keeps track of the individual MSs’ location, is
responsible for collecting billing information (e.g., counting bytes), and performs several
security functions such as access control. The SGSN is connected to a BSC via frame relay and
is basically on the same hierarchy level as an MSC. The GR, which is typically a part of the
HLR, stores all GPRS-relevant data.
As shown above, packet data is transmitted from a PDN, via the GGSN and SGSN
directly to the BSS and finally to the MS. The MSC, which is responsible for data transport in
the traditional circuit-switched GSM, is only used for signaling in the GPRS scenario. Before
sending any data over the GPRS network, an MS must attach to it, following the procedures of
the mobility management. The attachment procedure includes assigning a temporal identifier,
called a temporary logical link identity (TLLI), and a ciphering key sequence number
(CKSN) for data encryption. For each MS, a GPRS context is set up and stored in the MS and
in the corresponding SGSN. Besides attaching and detaching, mobility management also
comprises functions for authentication, location management, and ciphering.
The following figure shows the protocol architecture of the transmission plane for GPRS.
All data within the GPRS backbone, i.e., between the GSNs, is transferred using the GPRS
tunnelling protocol (GTP). GTP can use two different transport protocols, either the reliable
TCP (needed for reliable transfer of X.25 packets) or the non-reliable UDP (used for IP
packets). The network protocol for the GPRS backbone is IP (using any lower layers). To adapt
to the different characteristics of the underlying networks, the subnetwork dependent
convergence protocol (SNDCP) is used between an SGSN and the MS. On top of SNDCP and
GTP, user packet data is tunneled from the MS to the GGSN and vice versa. To achieve a high
reliability of packet transfer between SGSN and MS, a special LLC is used, which comprises
ARQ and FEC mechanisms for PTP (and later PTM) services.