Beruflich Dokumente
Kultur Dokumente
GSM Architecture
1
vYV lsaVj
2
AGENDA vYV lsaVj
GSM Interfaces
GSM subsystems
Authentication
3
vYV lsaVj
4
GSM Network Architecture- typical vYV lsaVj
OSS
NSS
HLR SCP
BSS
CAP
AuC
B E1
MS T PSTN
S ISDN
A SMSC
B
T E1 MSC VLR
S BSC
BSC CCS-7 Data
Signaling
Abis Networks
EIR
B
E1/Microwave
T LAPD Signaling E1
S IP
Air interface
MSC- VLR2 Billing
Server
5
Abbreviations vYV lsaVj
6
GSM Network Architecture…. vYV lsaVj
8
GSM Interfaces vYV lsaVj
9
GSM subsystems vYV lsaVj
MS:-Mobile Station
BSS:-Base station Subsystem (Radio Subsystem).
NSS:-Network Subsystem
OSS:-Operations and Maintenance subsystem
10
Mobile Station (MS) vYV lsaVj
Mobile Hand set is one of the most complicated SIM is a removable module goes into the mobile
GSM device. It provides user the access to the handset. Each SIM has unique number called
Network. Each handset has unique identity no. International Mobile Subscriber Identity (IMSI).
called IMEI. It has built in Micro-computer & memory into it.
It contains the ROM of 6 to 16KB,RAM of 128 to
256 bytes and EEPROM of 3 to 8KB
11
Mobile Station (MS) vYV lsaVj
12
SIM vYV lsaVj
13
SIM vYV lsaVj
14
Base Station Sub System (BSS) vYV lsaVj
15
Base Station Sub-System vYV lsaVj
16
Base Transceiver Station (BTS) vYV lsaVj
17
Base Station Controller (BSC) vYV lsaVj
18
Role of BSC vYV lsaVj
B
T B
S T
S
MSC/
MSC/ VLR
VLR
BSC B
B T
T S
S
Assumption :-BTSs are directly connected with
MSC
19
Why BTS are not directly connected with MSC? vYV lsaVj
20
Transcoder( XCDR ) vYV lsaVj
22
Transcoding vYV lsaVj
30 Timeslots
1 traffic channel / TS Each Timeslot =16 X 4
64 Kbps / TS = 64 Kb/s
4 E1 lines = 30 X 4 30 timeslots = 30 x 4
=120 Timeslots =120 traffic channels
0 1 2 16 31
23
Network & Switching Subsystem (NSS) vYV lsaVj
24
Network & Switching Subsystem vYV lsaVj
26
Functions of MSC vYV lsaVj
27
Home Location Register( HLR ) vYV lsaVj
28
Functions of HLR vYV lsaVj
29
Visitor Location Register (VLR) vYV lsaVj
30
Functions of VLR vYV lsaVj
31
Need of HLR vYV lsaVj
32
Need of VLR and HLR vYV lsaVj
Why there is two subscriber data base in GSM i.e. VLR &
HLR? Why HLR it self do not keep the information of in-
roamers?
If HLR can also contain information regarding active /in-
roamer subscribers then for each call (whether it is mobile
originating or mobile terminating) MSC has to contact the
HLR and that will unnecessarily increase the signaling
load
VLR contains the information regarding location area of
subscriber which is being frequently updated. So if VLR
is not there this has to be taken care by the HLR itself and
which would also increase the signaling load.
33
Authentication Centre (AUC) vYV lsaVj
34
Equipment Identity Register (EIR) vYV lsaVj
35
Equipment Identity Register (EIR) vYV lsaVj
EIR
36
Operation & Maintenance Subsystem (OSS) vYV lsaVj
37
Operation And Maintenance Centre vYV lsaVj
38
Network Structure vYV lsaVj
39
Relation between areas in GSM N/w vYV lsaVj
Cell
Location Area
MSC Service Area
PLMN Service Area
40
PLMN Service Area vYV lsaVj
MSC2
MSC1 VLR1
VLR2
MSC 2 VLR3
V
MSC4
VLR4
41
MSC Service Area vYV lsaVj
LA2
LA1 LA3
VLR
MSC
LA4 LA6
LA5
42
MSC Service Area vYV lsaVj
LA2
LA1 LA3
VLR
MSC
C2 C3
C1 LA6
LA4 C4
LA5
C6 C5
43
Mobile Identification Numbers vYV lsaVj
• IMEI
• MSISDN
• IMSI
• TMSI
• MSRN
44
Mobile Station International Subscriber Directory Number (MSISDN vYV lsaVj
CC NDC SN
91 9412 xxxxxx
CC = Country code
NDC = National Destination Code
SN = Subscriber Number
45
International Mobile Subscribers Identity (IMSI) vYV lsaVj
46
Temporary Mobile Subscribers Identity (TMSI ) vYV lsaVj
6 2 6 1
48
Base Station Identity Code vYV lsaVj
0 0 NCC BCC
BCC
49
Cell Global Identity ( CGI ) : vYV lsaVj
LAI
50
Mobile Station Roaming Number(MSRN) vYV lsaVj
51
Authentication vYV lsaVj
52
Authentication & Encription vYV lsaVj
AUC
Database SRES RAND
Kc
IMSI1 ki1 H
Algorithm for
Ciphering L
IMSI2 ki2
A8 Kc R
IMSI3 ki3 64 bits
Algorithm for
Generation
Authentication SRES
of Random A3
Number 32 bits
RAND RAND
53
Authentication vYV lsaVj
At MS At N/W
Ki Ki
RAND( 128 bits )
A3 A3
SRES SRES
=? ( 32 bits )
AUTHENTICATION
54
vYV lsaVj
A5
Ciphering Stream
Ciphered Bits
XOR
Information Bits ( 114 bits )
CIPHERING
56
Thank You vYV lsaVj
vYV lsUVj
57