Sie sind auf Seite 1von 36

m 

What is it all about ?


P
 



ñou can change your GSM SIM card to
get rid of your girlfriend«.

Shewag ki Maa ka phone Õ  pe


aaya tha«
©  
Àow is one better than the other ???

Which one is cheaper ???

Which one is more reliable ???

What is the difference in technology «.if any


???
 ©  
Is there a single What provides
security code that protection from
will permit me to eavesdropper ???
make changes to
my phone ??? Àow a mobile
subscriber on one
What role does network access his
bandwidth play ??? home network ???
      
   
î MA
F MA
C MA

Layman¶s view«
Are all different versions of digital
technology«
î        
 
Jsers separated in
time
Requires digital
transmission
Normally wider
bandwidth
compared to F MA
Jsed for GSM
     
    
Jsers separated in
frequency

Only possible in
analog system
       
 
Jsers separated by
code

Requires digital
transmission

Wider bandwidth
compared to î MA
î      
GSM originated in Europe«
GSM earlier known as Group Special
Mobile, a study group appointed to
study and develop European public land
mobile system
One important criteria that the proposed
system had to meet was IS N
compatibility..

Introduced in 1980
IN North America«.
Purpose«. What else
««but Military usage
Jsed in Cellular Communication
System , in the early 90¶s
    

A way to transmit bits of information through
wideband, spread spectrum radio interface.
IS-95 is the transmission protocol that
employs C MA.
Evolution from IS-95A to IS-95B to
C MA2000
Better utilization of radio spectrum by
allowing multiple users to access the same
physical channel.
 

Generating a C MA signal
1.analog to digital conversion
2.vocoding
3.encoding and interleaving
4.channelizing the signals
5.conversion of the digital signal to a Radio
Frequency (RF) signal
  

Working of CDMA Channel Establishment

Õ
 Õ   

 Õ

    

Õ
è    
  
  
C MA uses a device called a vocoder
to accomplish voice compression.
îhe term "vocoder" is a contraction of
the words "voice" and "code."
Vocoders are located in the phone.
   
îhe encoded voice data is further encoded to
separate it from other encoded voice data.
îhe encoded symbols are then spread over
the entire bandwidth of the C MA channel.
îhis process is called channelization.
îhe receiver knows the code and uses it to
recover the voice data.
 
C MA uses two important types of
codes to channelize users.
Walsh codes channelize users on the
forward link (BîS to mobile).
Pseudorandom Noise (PN) codes
channelize users on the reverse link
(mobile to BîS).
!    

   

  

   

 Õ 


"
Advantage of C MA is the ability to
communicate with more than one base
station at one time during a call
îhis functionality allows the C MA
network to perform soft handoff
Àow does it all ÀAPPEN ?
  
 !       Õ Õ
Ãilot Strength Measurement
Handoff Request
Frame Selector Join

ACK
ACK

Handoff Direction

ACK
Handoff Information

ACK
Ãilot Measurement Request

Ãilot Strength Measurement


a  
"   
  # Õ #$% &  Õ &$% ' ( 

)
  Õ
&$% * 

&$% % 

+ 

,  Õ !  Õ  


      
 
îhe irectory number of the MS is
dialed
Originating Switch sends an ss7 initial
address message (IAM) to home MSC
MSC queries the ÀLR for the location of
the MS
îhe ÀLR returns the locations of the
visited System
a  
îhe MSC invokes call forwarding to the
MSC in the visited system..
îhe forwarding MSC switch send an
SS7 IAM to the visited MSC
Call processing««
  
"    Õ #$% &  Õ &$% ' ( 
 

)
  Õ
#$% * 

#$% % 

 Õ  Õ (


, & 
Õ   Õ-  &    .
, &  

m   



'

m 

 


 


Ô 
MS:
Physical equipment used by the
subscribers
BSS:
Physical equipment that provides radio
coverage
NSS:
Switching functions of GSM
atabases required for subscribers
one through MSC
    
    
å It first has to determine if it has access
to PLMN
å It does a location update for the same
informing its PLMN about its location
å Location of an MS is stored in a central
database
  Õ #$% !,

 
       

Õ$$ Õ ! 


Õ  Õ
$'/ 

 Õ 
 Õ 

 Õ 

0Õ 1
Õ  
Õ   
 ( (
!    
m 
Each subscriber is identified using a
cryptographic security mechanism
Subscriber security information is stored
in the SIM Card
îhe algorithm are stored in the SIM
card and in the authentication center.
   
m  %,0  1
-2     031 701   Õ

4 ) "     


      
 "  " 
.2!5
  061
4)      " 
701    5 3 6

0781     5   


 5 
%9   78 5  

m   # $ 
%m
No boundary between telephony,
information and entertainment services
It will range from voice only to voice,
data, and other multimedia application
Wireless users will be able to make
video conference calls and surf the
internet simultaneously
 
     
 
People demand access for information
and services wherever they are
GSM should provide this connectivity.
Internet access and a whole range of
mobile multimedia capability.
îhus GPRS in GSM
!      
GPRS enhances GSM data services
îhere is no end to end connection to be
established, so setting up a GPRS call
is almost instantaneous and users can
be continuously online
And users pay for the actual data
transmitted, rather than for connection
time
m!a     m 

 : Õ  :Õ

Õ#$% &$%

9   , , !, 9

, 9%
' !$ ,
 Ô  î

 
99

 !%
/Õ 

!Õ
Õ .;;; <
Õ .;; <9#
Õ  

Das könnte Ihnen auch gefallen