Sie sind auf Seite 1von 40

Syllabus: MOBILECOMMUNICATION SYSTEMS

GSM-architecture-Location tracking and call setup- Mobility management- Handover-


Security-GSM SMS International roaming for GSM- call recording functions-subscriber
and service data mgt -Mobile Number portability -VoIP service for Mobile Networks GPRS
Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-
combined RA/LA update procedures-Billing


PART A
1. What is Equipments Identity Register? [Nov/Dec 2013]
EIR module allows operators to control device access to mobile networks and to prevent the
use of stolen and fraudulent devices on the network. This includes blocking stolen device
and device to SIM locking for device based offers (marketing bundle, device tariff plans, and
subsidized devices).
2. What are the reasons for Handover? [Nov/Dec 2013]
Handover is the mechanism that transfers an ongoing call from one cell to another as a
user moves through the coverage area of a cellular system. The number of cell boundary
crossings increases because smaller cells are deployed in order to meet the demands for
increased capacity.
3. What is mobile number portability? [May/June 2013]
Mobile number portability (MNP) enables mobile telephone users to retain their mobile
telephone numbers when changing from one mobile network operator to another.
4. Define VOIP. [May/June 2013]
Supporting telephony services over an IP network is known as VOIP. VoIP is a technology
that allows telephone calls to be made over computer networks like the Internet. VoIP
converts analog voice signals into digital data packets and supports real-time, two-way
transmission of conversations using Internet Protocol (IP).
5. What are the advantages of GPRS? [Nov/Dec 2012]
Lower service charges than GSM based on monthly data volumes

Collecting data from Isodaq outstations normally falls within the minimum 1Mb per
month tariff
International-standard communications protocol enabling Isodaq units to be installed
almost anywhere in the world

No SCADA or telemetry server or modems required to capture data
Data collected via internet using industry standard TCP/IP protocols
Use of timeview.net application (up to 1Mb limit) supplied with every Isodaq GPRS
telemetry logger
Routine daily interval or more frequent event-activated data collection i.e 1 hour
independent of logging/measurement interval.
Optional email alarm message forwarding with SMS message functions (Timeview
Telemetry option)
Optional remote logger-set-up and sensor configuration (Timeview Telemetry option).

6. What are the types of handover in GPRS? [Nov/Dec 2012]

Horizontal Handover
Vertical Handover

7. List the standards similar to GSM. [May/June 2012]

GSM 01.02, General Description of a GSM PLMN
GSM 01.04, Abbreviations and Acronyms
GSM 02.02, Bearer services (BS) supported by a GSM PLMN
GSM 02.03, Teleserviccs supported by a GSM PLMN
GSM 02.04, General on supplementary services
GSM 02.09, Security aspects
GSM 02.16, International MS Equipment Tdentities
GSM 02.17, Subscriber Identity Modules Functional Characteristics
GSM 02.22, Personalisation of GSM Mobile Equipment (ME); Mobile functionality
specification

8. Draw the GPRS transport plane. [May/June 2012]
















User and transport planes are completely independent, i. e. the transport plane can run on
a different IP version than the user plane UTRAN and Core Network transport can also
run on different IP versions

9. State the pros and cons of GSM. [Nov/Dec 2011]

Pros and cons of GSM

GSM is very popular, with over 450,000,000 subscribers as of today

This network supports international roaming, hence is the popular choice among users
GSM offers a stable network with a host of robust functionalities
Probably the only minus of GSM technology is that it is not accessible in most of the
USA, which is ruled by CDMA tech

10. What is PDP? [Nov/Dec 2011]
The packet data protocol (PDP; e.g., IP, X.25, Frame Relay) context is a data
structure present on both the Serving GPRS Support Node (SGSN) and the Gateway

GPRS Support Node (GGSN) which contains the subscriber's session information when
the subscriber has an active session.
When a mobile wants to use GPRS, it must first attach and then activate a PDP context.
This allocates a PDP context data structure in the SGSN that the subscriber is currently
visiting and the GGSN serving the subscriber's access point.

11. Define GSM?

GSM (Global System for Mobile Communications), is a standard set developed by the
European Telecommunications Standards Institute (ETSI) to describe technologies for
second generation (2G) digital cellular networks. Developed as a replacement for first
generation (1G) analog cellular networks, the GSM standard originally described a digital,
circuit switched network optimized for full duplex voice telephony.

12. Define GSM architecture?

A GSM network consists of several functional entities whose functions and interfaces are
defined. The GSM network can be divided into following broad parts.

The Mobile Station(MS)
The Base Station Subsystem (BSS)
The Network Switching Subsystem (NSS)
The Operation Support Subsystem(OSS)

13. Define functions and messaging systems of GSM?

The GSM architecture includes the functions of the databases and messaging systems:

Home Location Register (HLR)
Visitor Location Register (VLR)
Equipment Identity Register (EIR)
Authentication Center (AuC)
SMS Serving Center (SMS SC)
Gateway MSC (GMSC)
Chargeback Center (CBC)
Transcoder and Adaptation Unit (TRAU)

14. Define HLR?
The home location register (HLR) is a central database that contains details of each
mobile phone subscriber that is authorized to use the GSM core network.

There can be several logical, and physical, HLRs per public land mobile network (PLMN),
though one international mobile subscriber identity (IMSI)/MSISDN pair can be associated
with only one logical HLR (which can span several physical nodes) at a time.

15. Define how security is addressed in GSM?

GSM security is addressed in two aspects: authentication and encryption. Authentication
avoids fraudulent access by cloned MS. Encryption avoids unauthorized listening.

16. Define call termination?

Call termination, also known as voice termination, refers to the routing of telephone calls
from one Telephone Company, also known as a carrier or provider, to another. The
terminating point is the called party or end point. The originating point is the calling party
who initiates the call.

17. State the Advantages of GSM? (nov2011)

Less signal deterioration inside buildings.
Ability to use repeaters.
Talk time is generally higher in GSM phones due to the pulse nature of transmission.
The availability of Subscriber Identity Modules allows users to switch networks and
handsets at will, aside from a subsidy lock.
GSM covers virtually all parts of the world so international roaming is not a problem.
The much bigger number of subscribers globally creates a better network effect for
GSM handset makers, carriers and end users.

18. Explain Disadvantages of GSM? (nov2011)

Interferes with some electronics, especially certain audio amplifiers.
Intellectual property is concentrated among a few industry participants, creating
barriers to entry for new entrants and limiting competition among phone
manufacturers. Situation is however worse in CDMA-based systems like IS-95, where
Qualcomm is the major IP holder
GSM has a fixed maximum cell site range of 120 km, which is imposed by technical
limitations. This is expanded from the old limit of 35 km.

19. What is EIR used for in GSM networks?

Equipment identity register (EIR) is used to maintain a list of legimate, fraudulent, or
faulty mobile stations. EIR works with HLR to block calls from illegitimate mobile stations.
EIR is optional in a GSM network and is often not used .when the GSM network bars an
MS, it does not bar the subscriber.

20. What is SMS?

SMS- short message service is one which provides a connectionless transfer of messages
with low capacity and low time performance. every GSM short message can contain up
to 140 octets ,or 160 characters of GSM default alphabet as defined in GSM03.38.

21. What is meant by SMS concatenation?

To allow messages longer than 160 characters SMS concatenation that delivers a long
message by concatenation of several individual standard short messages.

22. What is meant by Mobile originated messaging?

In mobile originated messaging an MS sends a short message to the SM-SC(short message
service center).depending on the destination of the message the SM-SC may deliver the
message to another MS or to a normal pager through the traditional paging system. The
logical message path is MS->originating MSC->IWMSC->SM-SC .

23. What is meant by Mobile Terminated Messaging?

In mobile terminated messaging an MS receives a short message from the SM-SC. The
message sender can be another MS in the GSM network or an input device in the
traditional paging system.
The logical message path is SM-SC->GMSC->terminating MSC->MS where the GMSC can
be the terminating MSC.

24. Define anti tromboning.

Anti-tromboning (also referred to as anti-hair pinning or media release) is a feature
employed in telecommunication networks, such as voice over IP networks, which
optimizes the use of the access network and reduces excess processing and traffic.
A network border node, such as a Session Border Controller, handling calls as they pass
from the access network to the core network can examine the IP address or domains of
both the caller and called parties and if they reside in the same part of the network the
media path can be released allowing media to flow directly between the two parties
without entering the access network.

25. What is meant by roaming?

In wireless telecommunications, roaming is a general term referring to the extension of
connectivity service in a location that is different from the home location where the service
was registered.
Roaming ensures that the wireless device is kept connected to the network, without losing
the connection. The term "roaming" originates from the GSM (Global System for Mobile
Communications) sphere; the term "roaming" can also be applied to the CDMA technology.

26. Define Trombone roaming.

Roaming calls within a local tariff area, when at least one of the phones belongs outside
that area. Usually implemented with trombone routing also known as tromboning

27. What is TMN?

Telecommunication management network concept was developed by ITU-T.GSM OA&M
follows this standard.

28. List the components of TMN?

Several components are identified in the TMN model listed below are a few:

Operations system
Network element
Data communication network
Mediation device
Q-adaptor
Workstation

29. Define PLMN accounting

Required for roaming traffic management which is settled by means of the transfer
account procedure. TAP records are regularly ex-changed between a GSM network and the
other network.
30. What is GPRS?

General packet radio service (GPRS) is a packet oriented mobile data service on
the 2G and 3G cellular communication system's global system for mobile
communications (GSM).
GPRS was originally standardized by European Telecommunications Standards
Institute (ETSI) in response to the earlier CDPD and i-mode packet-switched cellular
technologies. It is now maintained by the3rd Generation Partnership Project (3GPP).
GPRS usage is typically charged based on volume of data. This contrasts with circuit
switching data, which is typically billed per minute of connection time, regardless of
whether or not the user transfers data during that period.

31. What are services offered by GPRS?

GPRS extends the GSM Packet circuit switched data capabilities and makes the following
services possible:

SMS messaging and broadcasting
"Always on" internet access
Multimedia messaging service (MMS)
Push to talk over cellular (PoC)
Instant messaging and presencewireless village
Internet applications for smart devices through wireless application protocol (WAP)
Point-to-point (P2P) service: inter-networking with the Internet (IP)
Point-to-Multipoint (P2M) service: point-to-multipoint multicast and point-to-
multipoint group calls


32. What is meant by GPRS Attach Procedure?

When an Mobile Station needs to signal its presence to the network in order to access to
GPRS services, it performs an international mobile subscriber identity attach procedure
for GPRS services.
During this procedure a mobility management context is created between the MS and
the Serving GPRS Service Node.
33. What is meant by GPRS Detach procedure?

A GPRS MS can no longer access GPRS service when it is GPRS-detached.
The detach may be explicit or implicit. It is explicit when signaling is exchanged between
the MS and the network.
The detach is implicit when the network detaches the MS without any notification, and
it may occur when the network does not detect any activity related to the MS for a
certain amount of time.

34. What is meant by MNP (mobile number portability)?

Mobile number portability (MNP) enables mobile telephone users to retain their mobile
telephone numbers when changing from one mobile network operator to another.
"Mobile Number Portability" means the facility which allows a subscriber of a mobile
telephone service to retain his mobile telephone number when he moves from one
mobile telephone service provider to another, irrespective of the mobile technology. (OR)
from one mobile technology to another of the same mobile telephone service provider,
within such limits as may be permitted by the licensor.

PART-B

1. Explain in detail about GSM Architecture.

Explain the functional architecture of GSM system with a suitable sketch.

[Nov/Dec 2013]

Explain in detail about the system architecture of Global system for Mobile

communication. [May/June 2013]

Explain the reference architecture of GSM. [May/June 2012]

Explain the GSM service architecture in detail. [Nov/Dec 2011]

GSM System architecture:

As with all systems in the telecommunication area, GSM comes with a hierarchical,
complex system architecture comprising many entities, interfaces, and acronyms.
Figure 4.4 gives a simplified overview of the GSM system as specified in ETSI
A GSM system consists of three subsystems, the radio sub system (RSS), the network
and switching subsystem (NSS), and the operation subsystem (OSS).

Each subsystem will be discussed in more detail in the following sections.
Generally, a GSM customer only notices a very small fraction of the whole network the
mobile stations (MS) and some antenna masts of the base transceiver stations (BTS).











































(i) Radio subsystem

As the name implies, the radio subsystem (RSS) comprises all radio specific
entities, i.e., the mobile stations (MS) and the base station subsystem (BSS).

Figure 4.4 shows the connection between the RSS and the NSS via the A
interface (solid lines) and the connection to the OSS via the O interface (dashed
lines).

The A interface is typically based on circuit-switched PCM-30 systems (2.048
Mbit/s), carrying up to 30 64 kbit/s connections, whereas the O interface uses
the Signalling System No. 7 (SS7) based on X.25 carrying management data
to/from the RSS.


Base station subsystem (BSS):

A GSM network comprises many BSSs, each controlled by a base station controller (BSC).
The BSS performs all functions necessary to maintain radio connections to an MS,
coding/decoding of voice, and rate adaptation to/from the wireless network part.
Besides a BSC, the BSS contains several BTSs.

Base transceiver station (BTS):

A BTS comprises all radio equipment, i.e., antennas, signal processing, amplifiers
necessary for radio transmission.
A BTS can form a radio cell or, using sectorized antennas, several cells, and is connected to
MS via the Um interface (ISDN U interface for mobile use), and to the BSC via the Abis
interface.
The Um interface contains all the mechanisms necessary for wireless transmission (TDMA,
FDMA etc.) and will be discussed in more detail below.
The Abis interface consists of 16 or 64 kbit/s connections.
A GSM cell can measure between some 100 m and 35 km depending on the environment
(buildings, open space, mountains etc.) but also expected traffic.

Base station controller (BSC):

The BSC basically manages the BTSs. It reserves radio frequencies, handles the handover
from one BTS to another within the BSS, and performs paging of the MS.
The BSC also multiplexes the radio channels onto the fixed network connections at the A
interface.

Table 4.1 gives an overview of the tasks assigned to the BSC and BTS or of
tasks in which these entities support other entities in the network.

Mobile station (MS):

The MS comprises all user equipment and software needed for communication with a
GSM network.
An MS consists of user independent hard- and software and of the subscriber identity
module (SIM), which stores all user-specific data that is relevant to GSM.3 While an MS
can be identified via the international mobile equipment identity (IMEI), a user can
personalize any MS using his or her SIM, i.e., user specific mechanisms like charging
and authentication are based on the SIM, not on the device itself.
Device-specific mechanisms, e.g., theft protection, use the device specific IMEI. Without
the SIM, only emergency calls are possible.
The SIM card contains many identifiers and tables, such as card-type, serial number, a
list of subscribed services, a personal identity number (PIN), a PIN unblocking key
(PUK), an authentication key Ki, and the international mobile subscriber identity
(IMSI).

The PIN is used to unlock the MS. Using the wrong PIN three times will lock the SIM. In
such cases, the PUK is needed to unlock the SIM.
The MS stores dynamic information while logged onto the GSM system, such as, e.g.,
the cipher key Kc and the location information consisting of a temporary mobile
subscriber identity (TMSI) and the location area identification (LAI).




























(ii) Network and switching subsystem

The heart of the GSM system is formed by the network and switching subsystem (NSS).
The NSS connects the wireless network with standard public networks, performs
handovers between different BSSs

The NSS consists of the following switches and databases

Mobile services switching center (MSC):

MSCs are high-performance digital ISDN switches. They set up connections to other
MSCs and to the BSCs via the A interface.
A gateway MSC (GMSC) has additional connections to other fixed networks, such as

PSTN and ISDN.

Home locations register (HLR):

The HLR is the most important database in a GSM system as it stores all user-relevant
information.
This comprises static information, such as the mobile subscriber ISDN number
(MSISDN), subscribed services (e.g., call forwarding, roaming restrictions, GPRS), and
the international mobile subscriber identity (IMSI).

Dynamic information is also needed, e.g., the current location area (LA) of the MS, the
mobile subscriber roaming number (MSRN), the current VLR and MSC.

Visitor location registers (VLR):

The VLR associated to each MSC is a dynamic database which stores all important
information needed for the MS users currently in the LA that is associated to the MSC

(iii) Operation subsystem

The third part of a GSM system, the operation subsystem (OSS), contains the necessary
functions for network operation and maintenance.
The OSS possesses network entities of its own and accesses other entities via SS7
signaling

The following entities have been defined

Operation and maintenance center (OMC):

The OMC monitors and controls all other network entities via the O interface (SS7 with
X.25).
Typical OMC management functions are traffic monitoring, status reports of network
entities, subscriber and security management, or accounting and billing

Authentication centre (AuC):

As the radio interface and mobile stations are particularly vulnerable, a separate AuC
has been defined to protect user identity and data transmission.
The AuC contains the algorithms for authentication as well as the keys for encryption
and generates the values needed for user authentication in the HLR

Equipment identity register (EIR):

The EIR is a database for all IMEIs, i.e., it stores all device identifications registered for
this network.
As MSs are mobile, they can be easily stolen. With a valid SIM, anyone could use the
stolen MS

2. Explain in detail about Location tracking and call setup

The current location of MS is maintained by a two level hierarchical strategy with the
HLR and VLRs. when an MS visits a new location, it must register in the VLR of the
visited location.

The HLR must also be informed about this registration. To access the MS, the HLR is
queried to find the current VLR of the MS. The registration process of the MS moving
from one VLR to another VLR is shown in fig. 9.8, and is described in the following
steps:

1. The MS periodically listens to the BCCH broadcast from the BSS. If the MS detects
that it has entered a new location area, it sends a registration message to the new
VLR by using the SDCCH channel.
2. The new VLR communicates with the old VLR to find the HLR of the MS. The new
VLR then performs the authentication process.
3. After the MS is authenticated, the new VLR sends a registration message to the HLR.
If the registration request is accepted, the HLR provides the new VLR with all
relevant subscriber information for call handling.
4. The new VLR informs the MS of the successful registration
5. After step3, the HLR sends a deregistration (cancellation) message to the old VLR.
The old VLR cancels the record for the MS and sends an acknowledgement to the
HLR for the cancellation.

















The Ms Registration Process

When the MS is inactive, due to switching off or SIM removal, it transmits a detach
to deregister from the network. The MS may also periodically send registration
messages to the network.

The period may range from six minutes to slightly more than 24 hours;

Periodic registration is useful for fault tolerance purposes.

If the VLR or HLR fails, periodic registration will speed up the recovery of the
databases.















For a GSM mobile call termination or call delivery, the MS ISDN number (MSISDN) of the
subscriber is dialed. MSISDN is part of the ISDN numbering plan defined in ITU-T
recommendation E.164.
This number points to the subscribers record in the HLR. The HLR record contains the
information to locate the MSC where the subscriber is currently located.

The basic call termination procedure is described in the following steps, and is shown in fig.9.9
1. When the MSISDN is dialed, the call is forwarded to the GMSC, a switch that has the
capability to interrogate the HLR for routing information. The HLR requests the current
VLR of the MS to provide the routable address, called a mobile station roaming
number(MSRN).
2. The VLR returns the MSRN to the GMSC through the HLR.
3. The GMSC uses the MSRN to route the call to the MS through the visited MSC.

The MS may already be engaged in another communication when a call arrives.
If the mobile user has subscribed to the call-waiting service, the MSC proceeds directly to
connect the call to the MS.
Different communication sessions may be associated with an MS at the same time.
These sessions are distinguished by their transaction identifiers.

3. Explain in detail about mobility management.

With the convergence of the Internet and wireless mobile communications and with the
rapid growth in the number of mobile subscribers, mobility management emerges as
one of the most important and challenging problems for wireless mobile communication
over the Internet.
Mobility management enables the serving networks to locate a mobile subscribers point
of attachment for delivering data packets (i.e. location management), and maintain a
mobile subscribers connection as it continues to change its point of attachment (i.e.
handoff management).
The issues and functionalities of these activities are discussed in this section

(i) Location management

Location management enables the networks to track the locations of mobile nodes.
Location management has two major sub-tasks:

(i) location registration, and (ii) call delivery or paging.

In location registration procedure, the mobile node periodically sends specific signals to
inform the network of its current location so that the location database is kept updated.

The call delivery procedure is invoked after the completion of the location registration.

Based on the information that has been registered in the network during the location
registration, the call delivery procedure queries the network about the exact location of

the mobile device so that a call may be delivered successfully.


The design of a location management scheme must address the following issues:
minimization of signaling overhead and latency in the service delivery
meeting the guaranteed quality of service (QoS) of applications, and

In a fully overlapping area where several wireless networks co-exist, an efficient and robust
algorithm must be designed so as to select the network through which a mobile device
should perform registration, deciding on where and how frequently the location
information should be stored, and how to determine the exact location of a mobile
device within a specific time frame.

(ii) Handoff management

Handoff management is the process by which a mobile node keeps its connection active
when it moves from one access point to another.
There are three stages in a handoff process.
First, the initiation of handoff is triggered by either the mobile device, or a network
agent, or the changing network conditions.
The second stage is for a new connection generation, where the network must find new
resources for the handoff connection and perform any additional routing operations.
Finally, data-flow control needs to maintain the delivery of the data from the old
connection path to the new connection path according to the agreed upon QoS
guarantees.
Depending on the movement of the mobile device, it may undergo various types of
handoff. In a broad sense, handoffs may be of two types:

a. intra-system handoff (horizontal handoff) and

b. inter-system handoff (vertical handoff).

i. Handoffs in homogeneous networks are referred to as intra-system handoffs. This type
of handoff occurs when the signal strength of the serving BS goes below a certain
threshold value


4. Explain in detail about Handover

Discuss in detail various handover scenarios for GSM. [May/June 2103]

Explain the message flow between mobile station and BTS during Mobile Originated
call with suitable illustrations [Nov/Dec 2013]

Handover (handoff):

The seamless handover of a connection between two or more base stations using the same
wireless technology is the key feature of todays cell-based mobile phone systems.
As a single sender cannot cover a whole country mobile phone systems use many base
stations with each base station creating a radio cell.
As soon as a user changes a cell due to changes in signal strength, interference, or load
balancing, the system has to redirect all connections or forward all data.

The shorter the interruption of the service is up to the ideal case of no service interruption
and soft handover the better is the quality of service for higher layers or a user.

Example:

All mobile phone systems, such as GSM, cdmaOne, UMTS, cdma2000 etc. support the
seamless handover between base stations.
While GSM supports hard handovers only (with service interruption of up to 100 ms),
CDMA systems, such as cdmaOne and W-CDMA, support soft handover without any
service interruption.
Mobile IP, too, has to support redirection of data to a new foreign agent after the change of
network access.
In this case the additional delay caused by the redirection is of particular interest.
To avoid this additional delay, Mobile IP may use optimizations such as rerouting of the
whole packet flow.
Cellular systems require handover procedures, as single cells do not cover the whole
service area, but, e.g., only up to 35 km around each antenna on the countryside and
some hundred meters in cities.
The smaller the cell size and the faster the movement of a mobile station through the
cells (up to 250 km/h for GSM), the more handovers of ongoing calls are required.

However, a handover should not cause a cut-off, also called call drop.

GSM aims at maximum handover duration of 60 ms

Two basic reasons for a handover

The mobile station moves out of the range of a BTS or a certain antenna of a BTS
respectively.
The received signal level decreases continuously until it falls below the minimal
requirements for communication.
The error rate may grow due to interference; the distance to the BTS may be too high
(max. 35 km) etc. all these effects may diminish the quality of the radio link and
make radio transmission impossible in the near future.
The wired infrastructure (MSC, BSC) may decide that the traffic in one cell is too high
and shift some MS to other cells with a lower load (if possible).

Handover may be due to load balancing


Four possible handover scenarios in GSM

Intra-cell handover:

Within a cell, narrow-band interference could make transmission at a certain frequency
impossible.

The BSC could then decide to change the carrier frequency (scenario 1).

Inter-cell, intra-BSC handover:
The mobile station moves from one cell to another, but stays within the control
of the same BSC.
The BSC then performs a handover, assigns a new radio channel in the new cell and
releases the old one (scenario 2).

Inter-BSC, intra-MSC handover:
As a BSC only controls a limited number of cells; GSM also has to perform handovers
between cells controlled by different BSCs.

This handover then has to be controlled by the MSC (scenario 3).

This situation is also shown in Figure 4.13.

Inter MSC handover:
A handover could be required between two cells belonging to different MSCs.

Now both MSCs perform the handover together (scenario 4).





















To provide all the necessary information for a handover due to a weak link,

MS and BTS both perform periodic measurements of the downlink and uplink
quality respectively

Measurement reports are sent by the MS about every half-second and contain the
quality of the current link used for transmission as well as the quality of certain
channels in neighboring cells (the BCCHs).



















Figure 4.12 shows the typical behavior of the received signal level while an MS moves
away from one BTS (BTSold) closer to another one (BTSnew).

In this case, the handover decision does not depend on the actual value of the received
signal level, but on the average value.

Therefore, the BSC collects all values (bit error rate and signal levels from uplink and
downlink) from BTS and MS and calculates average values.

These values are then compared to thresholds, i.e., the handover margin (HO_MARGIN),
which includes some hysteresis to avoid a ping-pong effect.
























Figure 4.13 shows the typical signal flow during an inter-BSC, intra-MSC handover.
The MS sends its periodic measurements reports, the BTSold forwards these reports to
the BSCold together with its own measurements.
Based on these values and, e.g., on current traffic conditions, the BSCold may decide to
perform a handover and sends the message
HO_required to the MSC.
The task of the MSC then comprises the request of the resources needed for the
handover from the new BSC, BSCnew.
This BSC checks if enough resources (typically frequencies or time slots) are available
and activates a physical channel at the BTSnew to prepare for the arrival of the MS.
The BTSnew acknowledges the successful channel activation, BSCnew acknowledges
the handover request.

The MSC then issues a handover command that is forwarded to the MS.
The MS now breaks its old radio link and accesses the new BTS.
The next steps include the establishment of the link (this includes layer two link
establishment and handover complete messages from the MS).
Basically, the MS has then finished the handover, but it is important to release the resources
at the old BSC and BTS and to signal the successful handover using the handover and clear
complete messages as shown.


5. Explain in detail about Security in GSM

Explain the security services of GSM. [Nov/Dec 2013]

GSM offers several security services using confidential information stored in the AuC
and in the individual SIM

The SIM stores personal, secret data and is protected with a PIN against unauthorized
use.

The security services offered by GSM are explained below

Access control and authentication:

The first step includes the authentication of a valid user for the SIM. The user needs a secret
PIN to access the SIM. The next step is the subscriber authentication. This step is based on a
challenge-response scheme as presented in section 4.1.7.1.

Confidentiality:

All user-related data is encrypted. After authentication, BTS and MS apply encryption to voice,
data, and signaling. This confidentiality exists only between MS and BTS, but it does not exist
end-to-end or within the whole fixed GSM/telephone network.

Anonymity:

To provide user anonymity, all data is encrypted before transmission, and user identifiers
(which would reveal an identity) are not used over the air. Instead, GSM transmits a temporary
identifier (TMSI), which is newly assigned by the VLR after each location update. Additionally,
the VLR can change the TMSI at any time.

Three algorithms have been specified to provide security services in GSM.

Algorithm A3 is used for authentication
A5 for encryption and
A8 for the generation of a cipher key

(i) Authentication
Before a subscriber can use any service from the GSM network, he or she must be
authenticated.
































Authentication is based on the SIM, which stores the individual authentication key
Ki, the user identification IMSI, and the algorithm used for authentication A3.
Authentication uses a challenge-response method: the access control AC generates a
random number RAND as challenge, and the SIM within the MS answers with SRES
(signed response) as response
The AuC performs the basic generation of random values RAND, signed responses
SRES, and cipher keys Kc for each IMSI, and then forwards this information to the
HLR.
The current VLR requests the appropriate values for RAND, SRES, and Kc from the
HLR.
For authentication, the VLR sends the random value RAND to the SIM.
Both sides, network and subscriber module, perform the same operation with
RAND and the key Ki, called A3. The MS sends back the SRES generated by the SIM;
the VLR can now compare both values.
If they are the same, the VLR accepts the subscriber, otherwise the subscriber is
rejected

(ii) Encryption

To ensure privacy, all messages containing user-related information are encrypted in

GSM over the air interface.
After authentication, MS and BSS can start using encryption by applying the cipher
key Kc (the precise location of security functions for encryption, BTS and/or BSC
are vendor dependent).
Kc is generated using the individual key Ki and a random value by applying the
algorithm A8.
Note that the SIM in the MS and the network both calculate the same Kc based on
the random value RAND.

The key Kc itself is not transmitted over the air interface.





























MS and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher
key Kc. As
Figure 4.15 shows, Kc should be a 64 bit key which is not very strong, but is at least
a good protection against simple eavesdropping.
However, the publication of A3 and A8 on the internet showed that in certain
implementations 10 of the 64 bits are always set to 0, so that the real length of the key
is thus only 54 consequently, the encryption is much weaker.

6. Explain in detail about GSM-SMS.

A useful service for very simple message transfer is the short message service (SMS),
which offers transmission of messages of up to 160 characters.
SMS messages do not use the standard data channels of GSM but exploit unused
capacity in the signalling channels
Sending and receiving of SMS is possible during data or voice transmission. SMS was
in the GSM standard from the beginning; however, almost no one used it until millions
of young people discovered this service in the mid-nineties as a fun service.
SMS can be used for serious applications such as displaying road conditions, e-mail
headers or stock quotes, but it can also transfer logos, ring tones, horoscopes and love
letters.
Today more than 30 billion short messages are transferred worldwide per month!
SMS is big business today, not only for the network operators, but also for many
content providers.

It should be noted that SMS is typically the only way to reach a mobile phone from
within the network.
Thus, SMS is used for updating mobile phone software or for implementing so-called
push services
The successor of SMS, the enhanced message service (EMS), offers a larger
message size (e.g., 760 characters, concatenating several SMs), formatted text,
and the transmission of animated pictures, small images and ring tones in a
standardized way (some vendors offered similar proprietary features before).

EMS never really took off as the multimedia message service (MMS) was available



7. Explain in detail about International roaming for GSM. International roaming for
GSM:

GSM supports roaming services that allow a subscriber in a GSM network to receive
mobile telephony service when the user visits a different GSM networks.
If both the GSM networks are within the same country, call setup for a roamer can be
done efficiently.
However, if the networks are located in different countries, the current GSM
implementation for call delivery to the roamer can be very expensive.
Let us describe the international roaming issue from customer point of view:
John is a subscriber of GSM service in Taiwan.
John travels from Taiwan to Singapore, which have a GSM roaming agreement











In airport, john calls his friend(Jenny), to receive him.








Jenny calls john to check whether he reached airport.









There are 3 scenarios for call delivery to john:
Scenario 1: If a person in Taiwan calls john; the result is a local call and an international call
from Taiwan to Singapore.
Scenario 2: If the caller is from a third country, the call delivery to john results in 2
international calls. The called is charged for an international call from hongkong to Taiwan,
and john is charged for an international call from Taiwan to Singapore.
Scenario 3: If the caller is in Singapore, the call delivery results in 2 international calls, even
though both Jenny and John in Singapore. This scenario is referred as trombone.

International GSM call setup:

It contains 2 international switch centres involved in voice path.

In telecommunications, all countries have a national network, which is connected to an
international network.
ISCs after interworking functions between the national networks and the international
network.
The call path of every international call is composed of 3 segments:

1) In the origination country
2) In the international network
3) In the destination country

These circuit segments are interconnected by 2 ISCs:

1) In the origination country
2) In the destination country
In current GSM international roaming implementations, call delivery to a GSM roamer
results in one or two international calls.
Suppose that a GSM user from Taiwan roams to Singapore.

International call setup procedure

Step 1:

Johns GSM home system is in Taiwan, so jenny first dials the international switch
center access code (ISCA), then the country code.
MSISDN in Taiwan is a national destination code (NDC), 93, followed by a 6-digit
subscriber number.
When switch A intercepts the ISCA, the first portion of the dialed digits, it identifies the
call as an international call, then setup the call using IAM message to Singapores
international switch center ie. ISC B
Based on the country code, ISC B routes the call to Taiwans international switch
center, ISC C


ISC C interprets the prefix of the remaining digits, and sets up the voice trunk to GMSC
D.

Step 2:

GMSC D queries HLR E to obtain the MSRN.

Step 3 & 4:

HLR E queries VLR F. Note that these messages travel between Taiwan and Singapore.

Step 5:

The MSRN is returned to GMSC D.

Step 6:

Based on the MSRN, GMASC D uses the IAM message to setup the trunk to MSC G,
and therefore connects to John.

Reducing the international call delivery cost:

To avoid unnecessary international trunk setups, an IAM message should not travel
across country boundaries, before the destination is known.

There are 4 proposed solutions:

In the first 3 solutions, we utilize the concept of Roamer location cache(RLC). The RLC
is a visited system maintains a database containing the records of all international
roamers who are presently in that visited system.

Solution 1:

In this solution, RLC is co-located with the ISC in the visited system

Step 1: Jenny first dials the ISCA code, The CC code, then johns MSISDN. When switch A
interprets the first portion of the dialed digits, it identifies the call as an international call,
then routes the track to ISC B.

Step 2: Based on the CC code and the prefix of the remaining digits, ISC B recognizes that the
called party is a potential roamer. ISC B searches RLC using the MSISDN provided by the IAM
message. If there is no such entry, the call delivery is for scenario 2, and ISBC B forwards the
IAM message to Taiwan.

Step 3: If an entry for john is found, the call delivery follows, RLC serves as Johns HLR to
obtain the MSRN.

Step 4: By using the MSRN, ISC B routes the IAM message to John, and the 2 international
circuits are avoided.


The advantage of solution 1 is that only ISC B needs to be modified

Solution 2:

The GSM service provider may want to build its own RLC without involving an ISC. In this
case, call delivery to a foreign GSM user should not be forwarded to the ISC. Instead, the
caller would dial into a switch in the local GSM system for call forwarding.

Advantage: The modification are made only within the GSM network, they do not involve an
international call.

Solution 3:

Solution 2 may not be attractive because the VLR must be modified.
An alternative is to introduce an Extractor.
The extractors monitor the messages passing through the signaling links of the VLR
and takes action when a location update message is sent to the HLR in the foreign
country.

Advantage:

It is transparent to VLR compared to solution 2.

Disadvantage:

New network component extractor is introduced

Solution 4:

The basic idea of this solution is to divert the mobile call termination into the visited
GSM system before it reaches the ISC.
The operator if the visited GSM system reserves an international roamer access code in
its numbering plan, and announces to the public that it is cheaper way to call visiting
roamers.
Advantages:

GSM call delivery is not modified.

No new network elements are required.

The implementations cost effective because no new network elements such as RLC
are introduced.


8. Explain in detail about call recording functions.

In GSM operation, the billing of mobile subscribers, statistics of service usage and

roaming traffic must be monitored by the OS and it is managed by the tariff and
charging administration as defined in ITU-T M.3200.

The administration includes the following services:

Service Provision:

The OSF in Fig 14.4 introduces new or modified services to the GSM network.

The modifications to the existing services may be based partly on the service usage statistics
provided by the NEs such as MSC







































AOC Parameter (Sent to MS) Fig 14.4 Tariff and charging
administration Billing:

Based on the data collected from the NEs , this OSF (b) in Fig 14.4 determines the charge for
the service.
Measured network resources:

The network resource is in HLR


















Measurement Function:

The simple scanner specifies one or more measurement functions in the NEs to collect the
desired data.

Measurement Schedule:

This attribute specifies the start time and the stop time of the active measurement period. The
measurement should be started within 90 days after the measurement job is created.

Granularity Period:

This attributes specifies the periodic interval of sending measured data from the NE, which is
the HLR in fig 14.6

Scan report:

At the end of every granularity period , a scan report is sent from the NE to the OS.

The report includes the timestamp to indicate when it is send to the OS and the measurement
is collected by the measurement functions defined in simple scanner.


9. Explain in detail about subscriber and service data management.

Discuss in detail about the architecture and data services. [Nov/Dec 2012]

The GSM subscriber and service data management in GSM 12.02 defines the
management for NEs.
Under this management , the managed data in different NEFs may depend on each
other.
We use HLR as an example to illustrate the GSM subscriber and service data
management.

Fig 14.7 show the HLR subscriber administration object class hierarchy.

Basically the mobile station ISDN numbers(MSISDN) and the subscribers represents by
the international mobile subscriber identifies (IMISs) are managed in HLR





















Blocks of available MSISDNs are provided in an HLR.
Information about the MSISDN is stored in msisdnHlr, shown in fig 14.7 (a)
An MSISDN may be connected to a subscriber (IMSI), can be disconnected when the
IMSI is removed from the service.
The association is established between the msisdnHlr object and the
basicSerivceInHlr objects shown in fig 14.7(d).
When a customer subscribes to the GSM services, a subscriber profile, and thus the
subscriberHlr object (b) in fig 14.7 is created in the HLR and an IMSI is assigned to
the customer.

One or more MSISDNs are allocated to the IMSI.
The association is made between the msisdnHlr objects and the subscriberInHlr
object.
For every basic service the customer subscribes to a basicServiceGroupInHlr object
and the relevant basicServiceGroupInHlr ((c ) and (d) in fig 14.7) are created.
The subscriber data may be modified for example when a basic or a supplementary
service is withdrawn or when a new service added.
When a subscriber is deleted from the HLR, the corresponding subscriberInHlr
object and all its contained objects are removed.
The attribute of the corresponding msisdnHlr is modified and the MSISDN is no
longer associated with the IMSI.

10. Explain in detail about Mobile Number Portability.

Mobile Number Portability (MNP) allows the mobile subscribers to retain the existing
mobile phone number when the subscriber switches from one access service provider
(Operator) to another irrespective of mobile technology or from one technology to
another of the same or any other access service provider, in a licensed service area.

In the number portability issue the options open to the subscribers are:

Service portability

Ability of the subscriber to retain the existing telephone number when
changing from one service to another service, say, from fixed to mobile service.

Location portability

Ability of the subscriber to retain the existing telephone number when
changing from one physical location to another. This LP can be at the
maximum within the charging area.
Number portability

The customer is allowed to keep the same number of his mobile phone while
switching over from one mobile operator to another mobile operator within
his service area.
This is in fact a regulatory attempt seeking to liberalize telephony service competition
by enabling the end-user to change his operator at his choice with aim of getting better
service quality and comparably lower tariff.

The mobile teledensity is only 8 per cent as of now and MNP is required only when it
reaches 25 per cent.
In the mobile category the mobility aspect is provided on two different technology
platforms namely, GSM &CDMA
Number portability in a multi technology platform will cost more for service providers
and to customers as well.
While the mobile operators are in full swing, expanding their network and investing
huge sums in up gradation and value addition projects like GPRS, EDGE, the
important
question is whether they should divert the investment for MNP without having definite
assurance on revenue increase.

MNP PRINCIPLE IN INDIA

Applicable only for Mobile Numbers
Number Portability is only applicable to Mobile Numbers not for the Fixed/Land Line
Numbers

Applicable only in intra licensed area

A mobile subscriber can switch from one service provide to another within the same
license area. Portability is applicable only in intra-circle; it is not applicable in inter-circle.

Applicable irrespective of Technology

Portability is Possible irrespective of Mobile Technology used by Service Provider. A mobile
subscriber can change its operator from CDMA to GSM/UMTS and vice-versa.

LRN based routing DoT.

Has allocated 4 digits unique routing number called LRN (Location Routing Number) to
all Mobile Operators for each circle to identify individual network. Post MNP calls
(Voice/Non Voice) will be routed on the basis of LRN. Ported numbers are prefixed with a
LRN identifying the new service provider for the number. So when MNP database receives
a query for a given MSISDN, the data base will return the MSISDN prefixed with the LRN
of the MNO to which it (MSISDN) belongs. MNP database always responds to a query
with

LRN+B Number. In case of Ported Number LRN belongs to new service provider and in case of
Non B Ported Number LRN belongs to same service provider.

India Terminating International Calls/SMS

ILDOs/IGPs are responsible for MNP dip for the International calls and SMS terminating
to Indian subscribers. ILDOs/IGPs supposed to be an originating network for the Indian
terminating international calls/SMS. ILDOs/IGPs perform MNP dip and route calls/SMS
directly to the subscription network.
11. Explain in detail about VoIP service for mobile networks.
















VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-based
networks.
VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP based
network, Mobile VoIP is delivered by a third party service provider over a WiFi or 3G
network cellular network that a mobile device is connected to.
Mobile VoIP service providers typically require a user to download software onto their
mobile device in order to gain access to their service
The Internet Protocol (IP) was originally designed for data networking.
The success of IP in becoming a world standard for data networking has led to its
adaptation to voice networking.
First, every time you connect to the Internet your computer is given an IP address (ex:
127.0.0.0). An IP address is four numbers between 0-256 separated by periods.
Voice Over IP takes that address and routes a telephone number to it.

1. VoIP sends your calls across the Internet.
2. Your calls go through your Cable/DSL modem or IP router.
3. A VoIP phone adaptor splits your high-speed broadband phone connection.
4. Your Internet connection will work as it did before you installed the phone adaptor -
sending emails and other web data to your personal computer.
5. Your phone calls are sent through your VoIP phone adaptor to your regular or cordless
telephone
Broadband Internet connection is used in VoIP to rout telephone calls as opposed to the
switching and fiber optic networks, this enable subscriber to receive good quality of
services with less charge.
The setup of VoIP requires broadband internet connection, regular telephone line, software
and hardware for VoIP.
Cisco is major name in development of VoIP hardware where as Skype and Vonage
provides services of VoIP in US and rest of the world.
Calling cards is another successful method for voice communication which uses VoIP
networks.

One can call any number in anywhere in the world at very less price with good voice
quality by Purchasing calling cards.
The VoIP based services are easily available for residential and corporate sectors;
Voice communication can be made by PC to PC, PC to phone and phone to phone.
There are many other practical features of VoIP technology.
VoIP is combination of two technologies Voice data and Internet Protocol to transmit voice
n longer distances with lowest costs.
VoIP technology determines how Internet telephony, making calls on internet, making calls
from phone to PC, Pc to Phone and Phone to Phone works at present day.
VoIP is technology which is used to transmit voice traffic, ( voice data) over IP network, in
such kind of networks specially designed voice applications are used for transferring voice
data, one can quote an example of such voice applications are voice chat,
Internet phones which we used after buying minutes which are very inexpensive and
teleconferencing.
VoIP technology is quite dynamic in nature and it has potential to provide solutions for
every layer of internet protocol network. IP was first invented for data communication over
computer
Networks and to connect all the computers together forming one big gigantic network
called Internet.
The potential of Internet protocol in regard to vast possible applications led to
voice

communication networking called VoIP or Voice over Internet Protocol.
Due to the potential of Voice of Internet protocol, it has been one of the fasted growing
industries in recent times when we talk about voice communication and telephony.
There is lot of work going on using this technology and plenty of room is left to utilize to its
full potential for obtaining efficiency and cost effect voice communication solutions
By making VoIP calls using internet enabled cell phones one could avoid wireless roaming
fees and long distance rates which generally touch north. Most of the times in-network
calls to other VoIP service subscribers are free even if the calling parties are located in
different part.

12. Explain in detail about GPRS Architecture.

What is the advantage of GPRS over GSM? Also explain the architecture of GPRS.

[Nov/Dec 2013]
Advantage of GPRS over GSM

Global Systems for Mobile Communications or GSM is the standard bearer of the 2G
technologies.
It is the most widely used technology in the world for mobile phone communications.
GPRS is an upgrade over the basic features of GSM.
It allows mobile handsets to obtain much higher data speeds than what standard GSM
can offer.

GSM has served the world in mobile communications for more almost 2 decades and it
has served its role very well.
Although there have been some competing standards in the beginning, GSM has
proven itself to be superior and other companies began to use the GSM standard.
Unlike the first generation mobile phones, GSM was digitally switched; this made GSM
more secure and a better platform for more features.
One of the features that was introduced into GSM networks was the Short Messaging

System (SMS) or more commonly known today as text messages.
Text messaging had a very profound effect in society as it has become a very popular
means of communication for the younger generation.
Another feature is the capability to download content from the service provider.
The content came in the form of ringtones, logos, and primitive picture messages that
let the subscriber customize his phone to his liking.
As time passes by, the technology that was once new becomes a bit outdated and starts
having trouble coping with the demand;
GSM is no exception. In order to remedy the shortcomings of GSM, an improvement
was added to the network called GPRS or General Packet Radio Service.
GPRS was only an extension to the older GSM technology and did not need a revamp of
the whole system.
Because of that, GPRS was introduced flawlessly into the market and those who had
GPRS compatible phones can avail of faster speeds.

A feature that used GPRS technology was the Multimedia Messaging System or MMS.
It allowed subscribers to send videos, pictures, or sound clips to each other just like
text messages.
GPRS also gave mobile phones the ability to surf the internet at dial-up speeds through
WAP enabled sites.
The general packet radio service (GPRS) provides packet mode transfer for applications
that exhibit traffic patterns such as frequent transmission of small volumes (e.g.,
typical web requests) or infrequent transmissions of small or medium volumes.

GPRS Architecture:

The GPRS architecture introduces two new network elements, which are called GPRS
support nodes (GSN) and are in fact routers.
All GSNs are integrated into the standard GSM architecture, and many new interfaces
have been defined
The gateway GPRS support node (GGSN) is the interworking unit between the GPRS
network and external packet data networks (PDN).
This node contains routing information for GPRS users, performs address conversion,
and tunnels data to a user via encapsulation.
The GGSN is connected to external networks (e.g., IP or X.25) via the Gi interface and
transfers packets to the SGSN via an IP-based GPRS backbone network (Gn interface).
The other new element is the serving GPRS support node (SGSN) which supports the
MS via the Gb interface.
The SGSN, for example, requests user addresses from the GPRS register (GR), keeps
track of the individual MSs location, is responsible for collecting billing information
(e.g., counting bytes), and performs several security functions such as access control.
The SGSN is connected to a BSC via frame relay and is basically on the same hierarchy
level as an MSC. The GR, which is typically a part of the HLR, stores all GPRS-relevant
data.
GGSNs and SGSNs can be compared with home and foreign agents, respectively, in a
mobile IP network
As shown in Figure 4.16, packet data is transmitted from a PDN, via the GGSN and
SGSN directly to the BSS and finally to the MS.
The MSC, which is responsible for data transport in the traditional circuit-switched
GSM, is only used for signaling in the GPRS scenario.
Before sending any data over the GPRS network, an MS must attach to it, following the
procedures of the mobility management.
The attachment procedure includes assigning a temporal identifier, called a temporary
logical link identity (TLLI), and a ciphering key sequence number (CKSN) for data
encryption.
For each MS, a GPRS context is set up and stored in the MS and in corresponding
SGSN.














In idle mode an MS is not reachable and all context is deleted.
In the standby state only movement across routing areas is updated to the SGSN but
not changes of the cell














Figure 4.17 shows the protocol architecture of the transmission plane for GPRS.
Architectures for the signaling planes can be found in ETSI.
All data within the GPRS backbone, i.e., between the GSNs, is transferred using the

GPRS tunnelling protocol (GTP).
GTP can use two different transport protocols, either the reliable TCP (needed for
reliable transfer of X.25 packets) or the non-reliable UDP (used for IP packets).
The network protocol for the GPRS backbone is IP (using any lower layers).
To adapt to the different characteristics of the underlying networks, the subnetwork
dependent convergence protocol (SNDCP) is used between an SGSN and the MS
A base station subsystem GPRS protocol (BSSGP) is used to convey routing and
QoS-related information between the BSS and SGSN.
BSSGP does not perform error correction and works on top of a frame relay (FR)
network.
Finally, radio link dependent protocols are needed to transfer data over the Um
interface.
The radio link protocol (RLC) provides a reliable link, while the MAC controls access
with signaling procedures for the radio channel and the mapping of LLC frames onto
the GSM physical channels.
The radio interface at Um needed for GPRS does not require fundamental changes
compared to standard GSM


13. Explain in detail about GPRS procedures-attach and detach procedures

Describe the reliability and delay classes in GPRS. Also explain the GPRS
procedure.

[May/June 2013]
GPRS Attach and Detach Procedures

In the GPRS attach procedure, the MS changes its state from IDLE to READY.
This may be done when the user switches on his mobile device or when the user explicitly
activates GPRS on his already IMSI attached end device.
In the GPRS detach procedure, the MS changes its state from READY or STANDBY to
IDLE.
This may be done when the user switches off his mobile device or when the user explicitly
deactivates GPRS on his IMSI attached mobile device.

GPRS Attach

The GPRS attach procedure is very similar to the routing area update procedures
described
previously.
Therefore, only the differences (rather than the full descriptions of the different cases) are
presented here.
There are two differences:
No messages about PDP contexts are exchanged (for example between two SGSNs as in the
inter SGSN routing area update procedure), because all PDP contexts are inactive as the
MS was GPRS detached.

If the SIM card is new, in the first step, i.e. the attach request, the MS has to send this
request with the IMSI and not with any P-TMSI, because the MS has no P-TMSI.
The GPRS attach procedure may also be combined with the IMSI attach procedure if the Gs
interface is implemented between the MSC/VLR and the SGSN. If the Gs interface is not
implemented and if the MS wants to perform both a GPRS and an IMSI attach, the MS shall
perform the IMSI attach first.

GPRS Detach

The (explicit) GPRS detach function allows the MS to inform the network that it wants to
make a GPRS detach or a combined GPRS/IMSI detach.
An implicit detach is also possible after the so called 'mobile reachable' timer has expired,
or after an irrecoverable radio error causes disconnection of the logical link.
In each case, the network detaches the MS without notifying it (because in each case the
MS in no longer reachable).
In the request message of a GPRS detach procedure initiated by the MS, there is an
indication to inform the SGSN whether the detach is due to the device being switched off
or not.
This is done because, if the device is being switched off, the SGSN does not send any
detach accept message to the MS (because it would not be received).
The GPRS detach procedure may also be combined with the IMSI detach procedure if the
Gs interface is implemented between the MSCNLR and the SGSN.
If the Gs interface is not implemented and if the MS wants to perform both a GPRS and an
IMSI detach, the MS performs the GPRS detach first.
The GPRS detach procedure initiated by the MS (without an IMSI detach request and with
the implementation of the Gs interface) is illustrated in Figure 4.8. and described in the
following

sequence:

(I) The MS sends a GPRS detach request (without an IMSI detach request) including the P-
TMSI to the SGSN.

The active PDP contexts in the GGSNs regarding this particular MS are deactivated by the
SGSN sending a delete PDP context request with the tunnel identifiers (TID) to the GGSNs.
The GGSNs acknowledge with a delete PDP context response containing the corresponding
TID.
The MS wants to remain IMSI attached, i.e. still reachable Mr voice and SMS, and an is
only performing a GPRS detach. Therefore the SGSN sends a GPRS detach indication
containing the IMSI to the VLR. The VLR removes the association with the SGSN and
handles paging and location updates without going via the SGSN.
The detach is not due to the mobile device being switched off, hence the SGSN sends a
detach accept to the MS.



















The combined GPRS/IMSI detach procedure initiated by the MS is illustrated in Figure 4.9
and described in the following sequence:

(I) The MS sends a combined GPRS/IMSI detach request to the SGSN which includes the P-
TMSI and an indication that the mobile is being switch. off.
(2) The active PDP contexts in the GGSNs regarding this particular MS are deactivated by the
SGSN sending a delete PDP context request with the tunnel identifiers (TID) to the GGSNs.
The GGSNs acknowledge with a delete PDP context response containing the corresponding
TID.
(3) The SGSN sends an IMSI detach indication, with the IMSI, to the VLR.



























14. Explain in detail about PDP context procedure.

PDP context procedure

PDP address leads to the notion of PDP context because dynamic PDP address is allocated by
the GGSN during the activation of PDP context. a PDP context can be viewed as a set of
information maintained by the MS,SGSN and GGSN. it contains a PDP type (that identifies
the type of PDN, for example IPV4), the PDP address (say a dynamically allocated IPV4
address), quality of service (QoS) information, and other session information.
Activating a PDP context refers to creating the PDP context at the MS, SGSN, and GGSN so
that the MS can communicate with an entity in PDN using the PDP address maintained in
the PDP context. when the communication is over, the PDP context is deactivated. during
the deactivation of PDP context, the dynamic PDP address is released.
In case the PDP address is assigned by an external PDN, there are again two ways to
achieve it.
First, the GGSN obtains an address from the external PDP using protocols like Dynamic
Host Configuration Protocol (DHCP) and provides it to the MS during the activation of the
PDP context. Alternatively, the MS may obtain the PDP address directly from the PDN after

the PDP context is activated.








































15. Explain in detail about Combined RA/LA Update and Attach Procedure.
The GPRS network architecture defines an optional Gs interface between the VLR and
the SGSN.
The Gs interface is used to facilitate combined LA/RA update and combined [MSI
attach and GPRS attach by the MS.
This helps in saving the radio resources when the MS is attached to both the GSM and
the GPRS networks.
Also the presence of the Gs interface allows the paging of the MS for the GSM network
via the SGSN.
The steps involved in a combined LA/RA update, or a combined IMSI/GPRS attach
from the MS.
When the MS is attached to the GSM and the GPRS networks, the LA and RA updating
is done in a coordinated way to save radio resources.
In case when an MS enters a new RA, it sends a Routing_Area_Update message to the

SGSN.
In case the LA of the MS has also changed (i.e the new RA belongs to a different LA),
the Routing_Area_Update message from the MS contains the LA update as well.
The SGSN then forwards the LA update to the MSC/VLR. The MSC/VLR may return a
new TMSI, which is sent to the MS by the SGSN.
Similarly, the MS can perform a combined IMSI attach and a GPRS attach by sending a
request to the SGSN only.
The SGSN then forwards a location update request to the MSC/VLR indicating IMSI
attach.
Figure 6.9 depicts the scenario of combined LA/RA update or combined attach.
Note that the messages exchanged between the SGSN and the VLR are the same, and
the location update request from the SGSN to the MSC/VLR indicates whether it is a
case of IMSI attach, or normal LA update.
The BSSAP+protocol messages are used between the MSC/VLR and the SGSN.

























16. Explain in detail about Billing

Combined RA/LA update procedures-billing

The MS detects that a new cell has been entered by comparing the broadcasted cell
identity with the cell identity stored in its MM context.
The MS detects that a new RA has been entered by periodically comparing the RAI stored
in its MM context with that received from the new cell.
























When the MS camps on a new cell, possibly in a new RA, this indicates one of the following
three possible scenarios:
A cell update is required.
An RA update is required.
A combined RA and location area (LA) update is required.

In all three scenarios, the MS stores the new cell identity in its MM context.
A cell update takes place only when the MS is in the MM state READY.
The SGSN becomes aware of the cell update because the BSS adds the cell identity to the
BSSGP-PDU sent over the Gb interface.
An RA update takes place when a GPRS-attached MS detects that it has entered a new RA,
when the periodic RA update timer has expired, or when a suspended MS is not resumed
by the BSS.
The SGSN detects that it is an intra-SGSN RA update by noticing that it also handles the
old RA.







ANNA UNIVERSITY QUESTIONS
PART A
1. What is Equipments Identity Register? [Nov/Dec 2013]
Refer Q.No. 1
2. What are the reasons for Handover? [Nov/Dec 2013]
Refer Q.No. 2
3. What is mobile number portability? [May/June 2013]
Refer Q.No. 3
4. Define VOIP. [May/June 2013]
Refer Q.No. 4
5. What are the advantages of GPRS? [Nov/Dec 2012]
Refer Q.No. 5
6. What are the types of handover in GPRS? [Nov/Dec 2012]
Refer Q.No. 6
7. List the standards similar to GSM. [May/June 2012]
Refer Q.No. 7
8. Draw the GPRS transport plane. [May/June 2012]
Refer Q.No. 8
9. State the pros and cons of GSM. [Nov/Dec 2011]
Refer Q.No. 9
10. What is PDP? [Nov/Dec 2011]
Refer Q.No. 10




ANNA UNIVERSITY QUESTIONS
PART B
1. Explain the functional architecture of GSM system with a suitable sketch.
Refer Q.No.1 [Nov/Dec 2013]
2. Explain the message flow between mobile station and BTS during Mobile Originated call
with suitable illustrations [Nov/Dec 2013]
Refer Q.No.4
3. Explain the security services of GSM. [Nov/Dec 2013]
Refer Q.No.5
4. What is the advantage of GPRS over GSM? Also explain the architecture of GPRS.
Refer Q.No. 12 [Nov/Dec 2013]
5. Explain in detail about the system architecture of Global system for Mobile
Communication. [May/June 2013]
Refer Q.No.1
6. Discuss in detail various handover scenarios for GSM. [May/June 2103]
Refer Q.No.4
7. Describe the reliability and delay classes in GPRS. Also explain the GPRS procedure.
Refer Q.No. 13 [May/June 2013]
8. Discuss the mobile services, system architecture, localization and calling of GSM in
detail. [May/June 2013]
Refer Q.No. 1
9. Discuss in detail about the architecture and data services. [Nov/Dec 2012]
Refer Q.No. 9
10. Explain security services of GSM system. [Nov/Dec 2012]
Refer Q.No. 5
11. Explain the reference architecture of GSM. [May/June 2012]
Refer Q.No. 1
12. Explain the network architectures of GPRS and mobility support in GPRS.
Refer Q.No. 13 [May/June 2012]
13. Explain the GSM service architecture in detail. [Nov/Dec 2011]
Refer Q.No. 1
14. What is GPRS? Explain in detail. [Nov/Dec 2011]
Refer Q.No. 1

Das könnte Ihnen auch gefallen