Chapter 1: Introduction
Chapter 1: Introduction
Chapter 1: Introduction
ARCHITECTURE
CHAPTER 1: INTRODUCTION
1.1 Introduction to Telecommunication
Communication is a process in which information is transferred from source to destination.
Information can be in any form e.g. Voice, Data, Video, Graphics etc. Voice communication is the
simplest mode of communication. People also use facial expressions and body language to
communicate with each other.
Telecommunication is the exchange of information over significant distances by electronic means.
A complete, single telecommunications circuit consists of two stations, each equipped with a
transmitter and a receiver. The transmitter and receiver at any station may be combined into a single
device called a transceiver. The medium of signal transmission can be electrical wire or cable (also
known as "copper"), optical fibre or electromagnetic fields. The free-space transmission and reception
of data by means of electromagnetic fields is called wireless.
The simplest form of telecommunications takes place between two stations. However, it is
common for multiple transmitting and receiving stations to exchange data among them. Such an
arrangement is called a telecommunications network. The Internet is the largest example. On a smaller
scale,
Examples include:
Telephone networks
Data is conveyed in a telecommunications circuit by means of an electrical signal called the carrier
or carrier wave. In order for a carrier to convey information, some form of modulation is required. The
mode of modulation can be broadly categorized as either analog or digital. In analog modulation, some
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
aspect of the carrier is varied in a continuous fashion. The oldest form of analog modulation is
amplitude modulation (AM), still used in radio broadcasting at some frequencies.
Digital modulation actually predates analog modulation; the earliest form was Morse code. During
the 1900s, dozens of new forms of modulation were developed and deployed, particularly during the
so-called "digital revolution" when the use of computers among ordinary citizens became widespread.
In some contexts, a broadcast network, consisting of a single transmitting station and multiple
receive-only stations, is considered a form of telecommunications. Radio and television broadcasting
are the most common examples.
Communications signals can be sent either by analog signals or digital signals. There are analog
communication systems and digital communication systems. For an analog signal, the signal is varied
continuously with respect to the information. In a digital signal, the information is encoded as a set of
discrete values (for example, a set of ones and zeros).
During the propagation and reception, the information contained in analog signals will inevitably
be degraded by undesirable physical noise. (The output of a transmitter is noise-free for all practical
purposes.) Commonly, the noise in a communication system can be expressed as adding or subtracting
from the desirable signal in a completely random way. This form of noise is called additive noise, with
the understanding that the noise can be negative or positive at different instants of time.
Noise that is not additive noise is a much more difficult situation to describe or analyze, and these
other kinds of noise will be omitted here.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
On the other hand, unless the additive noise disturbance exceeds a certain threshold, the
information contained in digital signals will remain intact. kTheir resistance to noise represents a key
advantage of digital signals over analog signals.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
If you are in Europe or Asia and using a mobile phone, then most probably you are using GSM
technology in your mobile phone.
GSM stands for Global System for Mobile Communication. It is a digital cellular technology
used for transmitting mobile voice and data services.
The concept of GSM emerged from a cell-based mobile radio system at Bell Laboratories in
the early 1970s.
GSM is the name of a standardization group established in 1982 to create a common European
mobile telephone standard.
GSM is a circuit-switched system that divides each 200 kHz channel into eight 25 kHz timeslots. GSM operates on the mobile communication bands 900 MHz and 1800 MHz in most
parts of the world. In the US, GSM operates in the bands 850 MHz and 1900 MHz.
GSM owns a market share of more than 70 percent of the world's digital cellular subscribers.
GSM makes use of narrowband Time Division Multiple Access (TDMA) technique for
transmitting signals.
GSM was developed using digital technology. It has an ability to carry 64 kbps to 120 Mbps of
data rates.
Presently GSM supports more than one billion mobile subscribers in more than 210 countries
throughout the world.
GSM provides basic to advanced voice and data services including roaming service. Roaming
is the ability to use your GSM phone number in another GSM network.
GSM digitizes and compresses data, then sends it down through a channel with two other streams of
user data, each in its own timeslot.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
International roaming
High-quality speech
Compatibility with Integrated Services Digital Network (ISDN) and other telephone company
services
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The SIM or Subscriber Identity Module contains the information that provides the identity of
the user to the network. It contains are variety of information including a number known as the
International Mobile Subscriber Identity (IMSI).
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The primary responsibility of the BTS is to transmit and receive radio signals from a mobile
unit over an air interface. To perform this function completely, the signals are encoded, encrypted,
multiplexed, modulated, and then fed to the antenna system at the cell site.
Transcoding to bring 13-kbps speech to a standard data rate of 16 kbps and then combining
four of these signals to 64 kbps is essentially a part of BTS, though, it can be done at BSC or at MSC.
Random access detection is made by BTS, which then sends the message to BSC. The channel
subsequent assignment is made by BSC. Timing advance is determined by BTS. BTS signals the
mobile for proper timing adjustment. Uplink radio channel measurement corresponding to the
downlink measurements made by MS has to be made by BTS.
2.1.2.2 BASE STATION CONTROLLER
The BSC, as discussed, is connected to the MSC on one side and to the BTS on the other. The
BSC performs the Radio Resource (RR) management for the cells under its control. It assigns and
release frequencies and timeslots for all MSs in its own area.
The BSC performs the intercell handover for MSs moving between BTS in its control. It also
reallocates frequencies to the BTSs in its area to meet locally heavy demands during peak hours or on
special events.
The BSC controls the power transmission of both BSSs and MSs in its area. The minimum
power level for a mobile unit is broadcast over the BCCH. The BSC provides the time and frequency
synchronization reference signals broadcast by its BTSs. E2-E3/CM/Cellular Concept&GSM
Architecture
2.1.3 NETWORK SWITCHING SUBSYSTEM (NSS)
The GSM system architecture contains a variety of different elements, and is often termed the core
network. It provides the main control and interfacing for the whole mobile network. The major
elements within the core network include:
2.1.3.1 MOBILE SWITCHING SERVICES CENTRE (MSC)
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The main element within the core network area of the overall GSM network architecture is the
Mobile switching Services Centre (MSC). The MSC acts like a normal switching node within a PSTN
or ISDN, but also provides additional functionality to enable the requirements of a mobile user to be
supported.
These include registration, authentication, call location, inter-MSC handovers and call routing
to a mobile subscriber. It also provides an interface to the PSTN so that calls can be routed from the
mobile network to a phone connected to a landline. Interfaces to other MSCs are provided to enable
calls to be made to mobiles on different networks
Functions of the MSC include:
Call handling that copes with mobile nature of subscribers (e.g., paging)
Management of required logical radio-link channel during calls
Management of MSC-BSS signalling protocol
Handling location registration and ensuring interworking between Mobile Station
And VLR
Control of inter-BSS and inter-MSC handovers
Acting as a gateway MSC to interrogate the HLR
Exchange of signalling information with other system entities
Standard functions of a local exchange switch in the fixed network (example:
Charging).
2.1.3.2 HOME LOCATION REGISTER (HLR)
This database contains all the administrative information about each subscriber along with
their last known location. In this way, the GSM network is able to route calls to the relevant base
station for the MS. When a user switches on their phone, the phone registers with the network and
from this it is possible to determine which BTS it communicates with so that incoming calls can be
routed appropriately.
Even when the phone is not active (but switched on) it re-registers periodically to ensure that
the network (HLR) is aware of its latest position. There is one HLR per network, although it may be
distributed across various sub-centres to for operational reasons.
The HLR contains:
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The AuC is a protected database that contains the secret key also contained in the user's SIM
card. It is used for authentication and for ciphering on the radio channel.
The Authentication Centre (AUC):
Contains subscriber authentication data called Authentication Keys (Ki)
Generates security related parameters needed to authorize service using Ki
Generates unique data pattern called a Cipher Key (Kc) needed for encrypting User speech and
data
Cell: Cell is the basic service area; one BTS covers one cell. Each cell is given a Cell Global
Identity (CGI), a number that uniquely identifies the cell.
Location Area: A group of cells form a Location Area (LA). This is the area that is paged
when a subscriber gets an incoming call. Each LA is assigned a Location Area Identity (LAI).
Each LA is served by one or more BSCs.
MSC/VLR Service Area: The area covered by one MSC is called the MSC/VLR service area.
PLMN: The area covered by one network operator is called the Public Land Mobile Network
(PLMN). A PLMN can contain one or more MSCs.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The total symbol rate for GSM at 1 bit per symbol in GMSK produces 270.833 K
symbols/second. The gross transmission rate of a timeslot is 22.8 Kbps.
GSM is a digital system with an over-the-air bit rate of 270 kbps.
3.1.4 FREQUENCY BAND
The uplink frequency range specified for GSM is 933 - 960 MHz (basic 900 MHz band
only). The downlink frequency band 890 - 915 MHz (basic 900 MHz band only).
Thus, IMEI = TAC + FAC + SNR + SP. It uniquely characterizes a mobile station and gives clues
about the manufacturer and the date of manufacturing.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Mobile Network Code (MNC): 2 decimal places, for unique identification of mobile network
within the country.
The authentic telephone number of a mobile station is the Mobile Subscriber ISDN Number
(MSISDN). Based on the SIM, a mobile station can have many MSISDNs, as each subscriber is
assigned with a separate MSISDN to their SIM respectively.
Listed below is the structure followed by MSISDN categories, as they are defined based on
international ISDN number plan:
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Within a PLMN, a Location Area identifies its own authentic Location Area Identity (LAI).
The LAI hierarchy is based on international standard and structured in a unique format as mentioned
below:
Location Area Code (LAC): maximum 5 decimal places or maximum twice 8 bits coded in
hexadecimal (LAC < FFFF).
Temporary Mobile Subscriber Identity (TMSI) can be assigned by the VLR, which is
responsible for the current location of a subscriber. The TMSI needs to have only local significance in
the area handled by the VLR. This is stored on the network side only in the VLR and is not passed to
the Home Location Register (HLR).
Together with the current location area, the TMSI identifies a subscriber uniquely. It can
contain up to 4 8 bits.
Each mobile station can be assigned with a Local Mobile Subscriber Identity (LMSI), which is
an original key, by the VLR. This key can be used as the auxiliary searching key for each mobile
station within its region. It can also help accelerate the database access. An LMSI is assigned if the
mobile station is registered with the VLR and sent to the HLR. LMSI comprises of four octets (4x8
bits).
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Using a Cell Identifier (CI) (maximum 2 8) bit, the individual cells that are within an LA can
be recognized. When the Global Cell Identity (LAI + CI) calls are combined, then it is uniquely
defined.
The SIM circuit is part of the function of a Universal Integrated Circuit Card (UICC)
physical smart card, which is usually made of PVC with embedded contacts and semiconductors.
"SIM cards" are designed to be transferable between different mobile devices. The first UICC smart
cards were the size of credit and bank cards; the development of physically smaller mobile devices has
prompted the development of smaller SIM cards, where the size of the plastic carrier is reduced while
keeping electrical contacts the same.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
A SIM card contains its unique serial number (ICCID), international mobile subscriber identity
(IMSI) number, security authentication and ciphering information, temporary information related to
the local network, a list of the services the user has access to, and two passwords: a personal
identification number (PIN) for ordinary use, and personal unblocking code (PUK) for PIN unlocking.
Functions of a SIM
The functions of the Subscriber Identity Module (SIM) are:
o Authentication of the validity of the MS when accessing the network
o User authentication
o Storage of subscriber-related information, which can be: data fixed during
administrative phase (e.g., subscriber identification), and temporary network data (e.g.,
cell location identity).
5.2 DESIGN
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V (ISO/IEC 7816-3 classes
A, B and C, respectively). The operating voltage of the majority of SIM cards launched before 1998
was 5 V. SIM cards produced subsequently are compatible with 3 V and 5 V. Modern cards support 5
V, 3 V and 1.8 V.
Modern SIM cards allow applications to be loaded when the SIM is in use by the subscriber.
These applications communicate with the handset or a server using SIM application toolkit, which was
initially specified by 3GPP in TS 11.14 (there is an identical ETSI specification with different
numbering). ETSI and 3GPP maintain the SIM specifications; the main specifications are: ETSI TS
102 223, ETSI TS 102 241, ETSI TS 102 588 and ETSI TS 131 111. SIM toolkit applications were
initially written in native code using proprietary APIs. In order to allow interoperability of the
applications, Java Card was taken as the solution of choice by ETSI. Additional standards and
specifications of interest are maintained by Global Platform.
5.3 DEVELOPMENTS
When GSM was already in use, the specifications were further developed and enhanced with
functionality like SMS, GPRS, etc. These development steps are referred as releases by ETSI. Within
these development cycles, the SIM specification was enhanced as well: new voltage classes, formats
and files were introduced.
5.3.1 USIM
In GSM-only times, the SIM consisted of the hardware and the software. With the advent of
UMTS this naming was split: the SIM was now an application and hence only software. The hardware
part was called UICC. This split was necessary because UMTS introduced a new application, the
Universal Subscriber Identity Module (USIM). The USIM brought, among other things, security
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
improvements like the mutual authentication and longer encryption keys and an improved address
book.
5.3.2 UICC
"SIM cards" in developed countries are today usually UICCs containing at least a SIM and a
USIM application. This configuration is necessary because older GSM only handsets are solely
compatible with the SIM [application] and some UMTS security enhancements do rely on the USIM
[application].
The equivalent of SIM on CDMA networks is the R-UIM (and the equivalent of USIM
is CSIM).
A virtual SIM is a mobile phone number provided by a mobile network operator that does not
require a SIM card to connect phone calls to a user's mobile phone.
At the 2015 Mobile World Congress in Barcelona, Simless, Inc., a US-based startup unveiled
world's first GSM phone without a SIM card slot. The reference phone was capable of downloading
multiple virtual SIM cards over-the-air.
Virtual SIM are called e-SIM or eSIM.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
To locate a mobile phone using multilateration of radio signals, it must emit at least the
roaming signal to contact the next nearby antenna tower, but the process does not require an active
call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to
nearby antenna masts.
Mobile positioning may include location-based services that disclose the actual coordinates of
a mobile phone, which is a technology used by telecommunication companies to approximate the
location of a mobile phone, and thereby also its user
5.4.1 TECHNOLOGY
The technology of locating is based on measuring power levels and antenna patterns and uses
the concept that a powered mobile phone always communicates wirelessly with one of the closest base
stations, so knowledge of the location of the base station implies the cell phone is nearby.
Advanced systems determine the sector in which the mobile phone is located and roughly
estimate also the distance to the base station. Further approximation can be done by
interpolating signals between adjacent antenna towers. Qualified services may achieve a precision of
down to 50 meters in urban areas where mobile traffic and density of antenna towers (base stations) is
sufficiently high Rural and desolate areas may see miles between base stations and therefore determine
locations less precisely.
GSM localization uses multilateration to determine the location of GSM mobile phones, or
dedicated trackers, usually with the intent to locate the user.
The location of a mobile phone can be determined in a number of ways:
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
5.4.1.1NETWORK-BASED
The location of mobile phone can be determined using the service provider's network
infrastructure. The advantage of network-based techniques, from a service provider's point of view, is
that they can be implemented non-intrusively without affecting handsets. Network-based techniques
were developed many years prior to the widespread availability of GPS on handsets. (See US
5519760, issued 21 May 1996 for one of the first works relating to this.
The accuracy of network-based techniques varies, with cell identification as the least accurate
and triangulation as moderately accurate, and newer "advanced forward link trilateration" timing
methods as the most accurate. The accuracy of network-based techniques is both dependent on the
concentration of cell base stations, with urban environments achieving the highest possible accuracy.
One of the key challenges of network-based techniques is the requirement to work closely with
the service provider, as it entails the installation of hardware and software within the operator's
infrastructure. Frequently the compulsion associated with a legislative framework, such as Enhanced
9-1-1, is required before a service provider will deploy a solution.
5.4.1.2 HANDSET-BASED
The location of a mobile phone can be determined using client software installed on the
handset.[8] This technique determines the location of the handset by putting its location by cell
identification, signal strengths of the home and neighbouring cells, which is continuously sent to the
carrier. In addition, if the handset is also equipped with GPS then significantly more precise location
information can be then sent from the handset to the carrier.
Another approach is to use a fingerprinting-based technique, where the "signature" of the home
and neighbouring cells signal strengths at different points in the area of interest is recorded by war-
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
driving and matched in real-time to determine the handset location. This is usually performed
independent from the carrier.
The key disadvantage of handset-based techniques, from service provider's point of view, is the
necessity of installing software on the handset. It requires the active cooperation of the mobile
subscriber as well as software that must be able to handle the different operating systems of the
handsets.
Typically, smartphones,
such
as
one
based
on Symbian,
Windows, Windows
Phone, BlackBerry OS, iOS, or Android, would be able to run such software, e.g. Google Maps.
5.4.1.3 SIM-BASED
Using
the subscriber
identity
module (SIM)
Mobile
Telecommunications System (UMTS) handsets, it is possible to obtain raw radio measurements from
the handset Available measurements include the serving Cell ID, round-trip time, and signal strength.
The type of information obtained via the SIM can differ from that which is available from the handset.
5.4.1.4 Wi-Fi
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Wi-Fi data can also be used to identify a handset's location.[14] Poor performance of the GPSbased methods in indoor environment and increasing popularity of Wi-Fi has encouraged companies to
design
new
and
feasible
methods
to
carry
Navigation
out
Satellite
Wi-Fi-based
indoor
Systems (GNSS),
such
5.4.1.5 HYBRID
Alternatively tracking with both systems can also occur by having the phone attain its GPSlocation directly from the satellites, and then having the information sent via the network to the person
that is trying to locate the telephone. Such systems include Google Maps, as well
as, LTE's OTDOA and E-CellID.
There are also hybrid positioning systems which combine several different location approaches
to position mobile devices by Wi-Fi, WiMAX, GSM, LTE, IP addresses, and network environment
data.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
In the cellular concept, frequencies allocated to the service are re-used in a regular pattern of
areas, called 'cells', each covered by one base station. In mobile-telephone nets these cells are usually
hexagonal. In radio broadcasting, a similar concept has been developed based on rhombic cells.
To ensure that the mutual interference between users remains below a harmful level, adjacent
cells use different frequencies. In fact, a set of C different frequencies {f1... fC} are used for each cluster
of C adjacent cells. Cluster patterns and the corresponding frequencies are re-used in a regular pattern
over the entire service area.
Fig No: 6.1.1: Frequency reuse plan for C = 3, with hexagonal cells. (i=1, j =1)
The total bandwidth for the system is C times the bandwidth occupied by a single cell.
The closest distance between the centres of two cells using the same frequency (in different
clusters) is determined by the choice of the cluster size C and the lay-out of the cell cluster. This
distance is called the frequencyre-use' distance. It can be shown that the reuse distance ru, normalised
to the size of each hexagon is
ru = SQRT{3 C}
For hexagonal cells, i.e., with 'honeycomb' cell lay-outs commonly used in mobile radio,
possible cluster sizes are C = i2 + ij + j2, with integer i and j (C = 1, 3, 4, 7, 9 ...).
Integers i and j determine the relative location of co-channel cells.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
6.3 CLUSTER
A cellular system is based on re-use of frequencies .All the available frequencies are divided
into different frequency groups so that certain frequency belongs to a certain frequency group. The
frequency group together form a cluster.
A group of neighbouring cells using all the frequencies available in the system frequencies
band is called a cluster cells.
A cluster is an area in which all frequency groups are used once, but not re-used .By repeating
the cluster over and over again a cellular network can be built.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The main disadvantage of 1g technology is that it makes use of analog rather than digital
signals. This is a less effective means of transmitting information. It is significantly slower, and signals
cannot reach as far in terms of secluded areas and such - 2g and 3g signal is far more widespread. In
addition, analogue signals are more likely to suffer interference problems. This can make using
a mobile phone with analog signal more difficult. In all, the newer brands of 2g and 3g technology are
more highly recommended.
7.2 SECOND GENERATION (2G)
2G (or 2-G) is short for second-generation wireless telephone technology. Second generation 2G
cellular
telecom
networks
were
commercially
launched
on
in Finland byRadiolinja(now part of Elisa Oyj) in 1991. Three primary benefits of 2G networks over
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
their predecessors were that phone conversations were digitally encrypted, 2G systems were
significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels;
and 2G introduced data services for mobile, starting with SMS text messages. After 2G was launched,
the previous mobile telephone systems were retrospectively dubbed 1G. While radio signals on 1G
networks are analog, and on 2G networks are digital, both systems use digital signalling to connect the
radio towers (which listen to the handsets) to the rest of the telephone system.
7.2.1 ADVANTAGES
Digital systems were embraced by consumers for several reasons.
The lower powered radio signals require less battery power, so phones last much longer
between charges, and batteries can be smaller.
The digital voice encoding allowed digital error checking which could increase sound quality
by increasing dynamic range and lowering the noise floor.
Going all-digital allowed for the introduction of digital data services, such as SMS and email.
Greatly reduced fraud. With analog systems it was possible to have two or more cloned
handsets that had the same phone number.
Enhanced privacy. A key digital advantage not often mentioned is that digital cellular calls are
much harder to eavesdrop on by use of radio scanners. While the algorithms used have proved
not to be as secure as initially advertised, 2G phones are immensely more private than 1G
phone, which have no protection against eavesdropping.
7.2.2 DISADVANTAGES
The downsides of 2G systems, not often well publicized, are:
In less populous areas, the weaker digital signal may not be sufficient to reach a cell tower.
This tends to be a particular problem on 2G systems deployed on higher frequencies, but is
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Analog has a smooth decay curve, digital a jagged steppy one. This can be both an advantage
and a disadvantage. Under good conditions, digital will sound better. Under slightly worse
conditions, analog will experience static, while digital has occasional dropouts. As conditions
worsen, though, digital will start to completely fail, by dropping calls or being unintelligible,
while analog slowly gets worse, generally holding a call longer and allowing at least a few
words to get through.
While digital calls tend to be free of static and background noise, the lossy compression used
by the codecs takes a toll; the range of sound that they convey is reduced. You'll hear less of the
tonality of someone's voice talking on a digital cell phone, but you will hear it more clearly.
7.3 2.5G
2.5G, which stands for "second and a half generation," is a cellular wireless technology
developed in between its predecessor, 2G, and its successor, 3G.
"2.5G" is an informal term, invented solely for marketing purposes, unlike "2G" or "3G" which
are officially defined standards based on those defined by the International Telecommunication (ITU).
The term "2.5G" usually describes a 2G cellular system combined with General Packet Radio Services
(GPRS), or other services not generally found in 2G or 1G networks.
Wireless telecommunication technology like CDMA200 1x-RTT, Enhanced Data Rates for
GSM Evolution (EDGE) or Enhanced General Packet Radio Service (EGPRS), since they have data
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
transmission rates of 144 kbps or higher, may qualify as 3G technology. However, they are usually
classified as 2.5G technology because they have slower network speeds than most 3G services.
GPRS is a service commonly associated with 2.5G technology. It has data transmission rates of
28 kbps or higher. GPRS came after the development of the Global System for Mobile (GSM) service,
which is classified as 2G technologies, and it was succeeded by the development of the Universal
Mobile Telecommunication Service (UMTS), which is classified as 3G technology.
A 2.5G system may make use of 2G system infrastructure, but it implements a packet-switched
network domain in addition to a circuit-switched domain. This does not necessarily give 2.5G an
advantage over 2G in terms of network speed, because bundling of timeslots is also used for circuitswitched data services (HSCSD).
The services and infrastructure of a 2.5G network may be used on a per-transaction basis rather
than a per-minute-of-use basis, thanks to its packet-switched domain. This makes its infrastructure
more efficient and improves the service delivery. This impetus is known as the "always-on" capability.
7.3.1 ADVANTAGES:
The advantages that 2.5G provides are a result of the previous difference. Mainly, the increased
data speed ranging from 56kbps to 115kbps. Faster speeds are not really needed if you just use your
cell phone for voice calling or text messaging. But the increased speeds also opened up a new set of
services to the consumers.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Probably the most important service provided by 2.5G is web browsing via WAP. WAP is a
simplified version of websites that are necessary because mobile phones back then were unable to
render full web pages due to very weak hardware. Although very simple, it still provided a basic level
of web interaction that was not available till then.
Another new feature provided by 2.5G is the ability to send and receive photos and videos via
MMS, or the Multimedia Messaging Service. This uses the packet switched network, pretty much like
the internet to deliver the multimedia content from the one phone to the other. This service is not
possible without the new 2.5G technologies.
7.4 2.75G
GPRS networks evolved to EDGE networks with the introduction of 8PSK encoding, while the
symbol rate remained the same at 270.833 samples per second, each symbol carried three bits instead
of one. Enhanced Data rates for GSM Evolution (EDGE), Enhanced GPRS (EGPRS), or IMT Single
Carrier (IMT-SC) is a backward-compatible digital mobile phone technology that allows improved
data transmission rates, as an extension on top of standard GSM. EDGE was deployed on GSM
networks beginning in 2003initially by AT&T in the United States.
EDGE is standardized by 3GPP as part of the GSM family and it is an upgrade that provides a
potential three-fold increase in capacity of GSM/GPRS networks. The 2G digital service provided very
useful features, such as caller ID, call forwarding, and short messaging.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
(3) WCDMA
-9.6 Kbps
GPRS
-171Kbps
FREQUENCY BAND:
3G frequency band is
2100
MHz
Uplink range
Downlink range
;
7.5.1 ADVANTAGES OF 3G:
a. Overcrowding is relieved in existing systems with radio spectrum
b. Bandwidth, security and reliability are more
c. Provides interoperability among service providers
d. Availability of fixed and variable rates
e. Support to devices with backward compatibility with existing networks
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
LTE advanced (Long Term Evolution advanced) are supports 4G and they can
achieve those speeds.
The 4G does not supports traditional circuits switched telephony. But it supports all IP based
communication.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
GSM offers much more than just voice telephony. Contact your local GSM network operator
to the specific services that you can avail.
GSM offers three basic types of services:
Supplementary services
8.1 TELESERVICES:
The abilities of a Bearer Service are used by a Teleservice to transport data. These services are
further transited in the following ways:
The most basic Teleservice supported by GSM is telephony. This includes full-rate speech at
13 kbps and emergency calls, where the nearest emergency-service provider is notified by dialing
three digits.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Short Messaging Service (SMS) service is a text messaging service that allows sending and
receiving text messages on your GSM mobile phone. In addition to simple text messages, other text
data including news, sports, financial, language, and location-based data can also be transmitted.
Data services or Bearer Services are used through a GSM phone. to receive and send data is
the essential building block leading to widespread mobile Internet access and mobile data transfer.
GSM currently has a data transfer rate of 9.6k. New developments that will push up data transfer rates
for GSM users are HSCSD (high speed circuit switched data) and GPRS (general packet radio
service) are now available.
Supplementary services are additional services that are provided in addition to teleservices and
bearer services. These services include caller identification, call forwarding, call waiting, multi-party
conversations, and barring of outgoing (international) calls, among others. A brief description of
supplementary services is given here:
Call Waiting: This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Call Hold: This service allows a subscriber to put an incoming call on hold and resume after a
while. The call hold service is applicable to normal telephony.
Call Forwarding: Call Forwarding is used to divert calls from the original recipient to another
number. It is normally set up by the subscriber himself. It can be used by the subscriber to
divert calls from the Mobile Station when the subscriber is not available, and so to ensure that
calls are not lost.
Call Barring: Call Barring is useful to restrict certain types of outgoing calls such as ISD or
stop incoming calls from undesired numbers. Call barring is a flexible service that enables the
subscriber to conditionally bar calls.
Calling Line Identification Presentation: This service displays the telephone number
of the calling party on your screen.
Connected Line Identification Restriction: There are times when the person called
does not wish to have their number presented and so they would subscribe to this
person. Normally, this overrides the presentation service.
Malicious Call Identification: The malicious call identification service was provided
to combat the spread of obscene or annoying calls. The victim should subscribe to this
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
service, and then they could cause known malicious calls to be identified in the GSM
network, using a simple command.
Advice of Charge (AoC): This service was designed to give the subscriber an indication of
the cost of the services as they are used. Furthermore, those service providers who wish to
offer rental services to subscribers without their own SIM can also utilize this service in a
slightly different form. AoC for data calls is provided on the basis of time measurements.
Closed User Groups (CUGs): This service is meant for groups of subscribers who wish to
call only each other and no one else.
customers. All the parameters are simple enough to charge a customer for the provided services.
This chapter provides an overview of the frequently used billing techniques and parameters applied to
charge a GSM subscriber
8.4 BILLING:
These services can be charged on per call basis. The call initiator has to pay the charges, and
the incoming calls are nowadays free. A customer can be charged based on different parameters such
as:
Local call.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Many more other criteria can be designed by a service provider to charge their customers.
Most of the service providers charge their customer's SMS services based on the number of
text messages sent. There are other prime SMS services available where service providers charge
more than normal SMS charge. These services are being availed in collaboration of Television
Networks or Radio Networks to demand SMS from the audiences.
Most of the time, the charges are paid by the SMS sender but for some services like stocks and
share prices, mobile banking facilities, and leisure booking services, etc. the recipient of the SMS has
to pay for the service.
Using GPRS service, you can browse, play games on the Internet, and download movies. So a
service provider will charge you based on the data uploaded as well as data downloaded on your
mobile phone. These charges will be based on per Kilo Byte data downloaded/uploaded.
Additional parameter could be a QoS provided to you. If you want to watch a movie, then a
low QoS may work because some data loss may be acceptable, but if you are downloading a zip file,
then a single byte loss will corrupt your complete downloaded file.
Another parameter could be peak and off peak time to download a data file or to browse the
Internet.
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Most of the supplementary services are being provided based on monthly rental or absolutely
free. For example, call waiting, call forwarding, calling number identification, and call on hold are
available at zero cost.
Call barring is a service, which service providers use just to recover their dues, etc., otherwise
this service is not being used by any subscriber.
Call conferencing service is a form of simple telephone call where the customers are charged
for multiple calls made at a time. No service provider charges extra charge for this service.
Closed User Group (CUG) is very popular and is mainly being used to give special discounts
to the users if they are making calls to a particular defined group of subscribers.
Advice of Charge (AoC) can be charged based on number of queries made by a subscriber.
CHAPTER 9: CONCLUSION
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
The communication development and the increase of living standard of people are directly
related to the more use of cellular mobile. Cellular mobile radio-the high end sophisticated technology
that enables everyone to communicate anywhere with anybody. The mobile telephony industry rapidly
growing and that has become backbone for business success and efficiency and a part of modern
lifestyles all over the world.
In this thesis work we have tried to give and over view of the GSM system. We hope that we
gave the general flavour of GSM and the philosophy behind its design. The GSM is standard that
insures interoperability without stifling competition and innovation among the suppliers to the benefit
of the public both in terms of cost and service quality.
The features and benefits expected in the GSM systems are superior speech quality, low
terminal, operational and service costs, a high level security, providing international roaming support
of low power hand portable terminals and variety of new services and network facilities. In near forth
coming days, the third generation mobile telephony becomes available whole over the world, which
will give the facility of videoconference in mobile telephone
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
Dept. Of E.C.E
SVES-SRPT
OVERVIEW OF GSM
ARCHITECTURE
REFERENCES:
WWW.WIKIPEDIA.COM
WWW.ONLY4ENGINEER.COM
WWW.TUTORIALPOINTS.COM
WWW.GOOGLE.COM
Dept. Of E.C.E
SVES-SRPT