Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The main concept behind Bluetooth Technology was unifying the telecom and computing industries
Why Bluetooth
Various problems with IrDa (Infrared Data Association ) interface Limited range (abt 2 m) The need of line-of-sight between interface Usually limited to two participants, only point-to-point connections are supported It does not have internet working function, has no media access, or any other enhanced communication mechanism Only advantage is low cost and can be found in any mobile device
Bluetooth
Bluetooth enabled chips can easily transfer data at a speed of about 1 Mbps in basic mode within 50 m (150 feet) range
Bluetooth radio is built into a small microchip & operates in a globally available frequency band ensuring interoperability worldwide
It uses the unlicensed 2.4 GHz ISM (Industrial Scientific and Medical) frequency band.
Bluetooth
Bluetooth
The Bluetooth standard is managed and maintained by Bluetooth Special Interest Group (www.bluetooth.com)
IEEE standard for bluetooth is 802.15.1a Power level 1mW 100mW suitable for short device zone to personal area networks within a home
Uses concept of master slave protocol In master-slave protocol, a device cant talk when desire but has to wait until master allows them to talk
Bluetooth
The master and slaves together form a Piconet Piconet : Collection of bluetooth devices which are synchronized to the same hopping frequency
Bluetooth
One device in the piconet can acts as master (M), all other devices connected to the master must acts as slaves(S)
Master determines the hopping pattern in the piconet and the slaves have to synchronizes to this pattern.
Each piconet has a unique pattern If device want to participate, it has to synchronized with this. Two additional types of devices
Parked devices (P) can not actively participate in the piconet, but are known and can be reactivated within some milliseconds Device in Standby (SB) do not participate in the piconet.
Bluetooth
In each piconet, up to seven slave devices can be set to communicate with a master because 3-bit address is used in
bluetooth.
More than 200 devices can be parked Process to form bluetooth piconet
Master sends its clock and device ID All bluetooth devices have same capabilities i.e. they can be master or slave The unit establishing piconet automatically becomes the master, all other will become slave After adjusting the internal clock according to master, a device may participate in the piconet. All active devices are assigned a 3-bit active member address (AMA)
Bluetooth
All users within one piconet have the same hopping sequence and share the same 1 MHz channel
As more users join the piconet, the throughput per user drops Thus, several piconets can be linked together to form a larger network in an ad hoc manner
This network of piconets is called Scatternet A scatternet is formed when a device from one piconet also acts as a member of another piconet.
A device being master in one piconet can simultaneously be a slave in the other one.
Bluetooth
Bluetooth Scatternet
Bluetooth
If a device wants to participate in more than one piconet, it has to synchronize to the hopping sequence of the other.
If a device acts as slave in one piconet, it simply starts to synchronize with hopping sequence of other piconet.
Before leaving the piconet, a slave has to inform to master of current piconet.
A master can also leave its piconet and acts as a slave in another piconet.
If master leaves a piconet, all traffic within this piconet is suspended until the master returns
At physical layer, Bluetooth uses spread spectrum technologies Different applications can run over bluetooth core protocols by using
Bluetooth uses connectionless (ACL-Asynchronous Connectionless Link) and connection oriented (SCO Synchronous Connection oriented Link) links.
The SCO link is point-to-point between master and slave. The master maintains the link by using reserved timeslots at regular intervals. Packet retransmissions are not allowed.
ACL provides packet-switched connections between the master and all active slaves. Packet retransmissions are usually applied to assure data integrity.
It is a combination of multiple application specific stacks Three major protocols are RFCOMM (Radio Frequency
COMMunication), TCS Binary (Telephony Control Specification) and SDP (Service Discovery Protocol)
Common data link and physical layer for all application L2CAP (Logical Link Control and Adaptation Protocol) or TCS may use LMP (Link Manager Protocol) to control link manager
Bluetooth
Communication etc.
Using SCO & ACL link different packets can be multiplexed over the
same RF link ACL packets are used for data only, while SCO packet can contain audio or combination of audio and data
Logical Link Control and Adaptation Protocol (L2CAP) Bluetooth Core Protocol
Adaptation of higher layers to the baseband (Connectionless and connection-oriented services) Layer is responsible for segmentation of large packets and reassembly of fragmented packets Also responsible for multiplexing of bluetooth packets from different applications It provides logical channels between bluetooth devices with QoS properties L2CAP is available for ACLs only, while audio applications using SCO have to use the baseband layer directly
Logical Link Control and Adaptation Protocol (L2CAP) Bluetooth Core Protocol (Cont..)
L2CAP provides three types of logical channels that are transported via the ACL between master and slave 1. Connectionless : used for broadcast from a master to its slave 2. Connection-oriented : Bidirectional and for providing QoS parameter (average data rate, maximum burst size, latency, jitter) in each direction 3. Signaling : Used to exchange signaling messages
Multiple applications in a device may use a single SDP client to query servers
for service records A device in inquiry mode broadcasts ID packets on 32 frequency channels of the Inquiry Hopping Sequence It sends two ID packets and then listens for response Then a unique ID (globalID) of device is exchanged globalID indicates a devices profile along with capability functions
Bluetooth Security
Bluetooth
offers
security
infrastructure
starting
from
A frequency hopping scheme with 1600 hops/sec is employed which makes system difficult to eavesdrop
At lowest layer, it uses the publicity available cipher algorithm known as SAFER+(Secure and Fast Encryption) to authenticate a devices identity
Each application model in bluetooth is realized through a profile Profile defines the protocols and protocol features supporting a particular usage model
File Transfer :
Offers the ability to transfer data objects from one device ( e.g. PC, smartphone, PDA) to another Object types include .xls, .ppt, .wav, .jpg, .doc files, folders or streaming media formats
This model also offers a possibility to browse the contents of the folders on a
remote device.
Internet Bridge :
In this model, a mobile phone or cordless modem acts as modem to the PC, providing dial-up networking and fax capabilities without need for physical connection to the PC.
LAN Access :
Multiple data terminals use a LAN access point (LAP) as a wireless connection
to the Ethernet LAN Once connected, the terminals operate as if they were connected directly to the LAN
Headset :
The headset can be wirelessly connected for the purpose of acting as a
Others
A Bluetooth-mouse could be used at a further distance from a monitor, and while moving about in the room. A Bluetooth-keyboard could be used further away from the monitor. A Bluetooth-keyboard could also be used to address more than one computer,
Radio-frequency identification (RFID) is a technology that uses communication through the use of radio waves to transfer data between a reader and an electronic tag attached to an object for the purpose of identification and tracking.
It is a radio transponder carrying an ID (identification) that can read through radio frequency (RD) interface
Transponders are known as RFID tags To assign an identity to an object, a tag is attached to the object Data within the tag provides identification for the object Object could be an entity in a manufacturing shop, goods in transit, item in retail store, a vehicle in a parking lot, a pet, or a book in a library
Biologists use RFID to track animals for studying animal behavior and conservation
On frequency :
Six basic frequencies on which RFID operates Low frequency (30 KHz to 500 KHz) systems have short reading ranges and lower system costs Tags in this frequency range are slow in data transfer and suitable for slow-
moving objects
Mostly used in security access, asset tracking and animal identification applications High frequency systems offer long read ranges and high data transfer speeds High reading speed is required for fast moving objects like railway wagon tracking and identification of vehicles on freeways for automated toll collection The higher the frequency, the higher is the data transfer rate
On Application :
RFID also grouped according to application and range Speed of the objects and distance to read determines the type of tags The advantage of all types of RFID systems is the contactless, nonline-of-sight nature Tags can be read through variety of substances such as snow, fog, paint, plastic,wall, container and other challenging conditions Tags can also be read at high speed RFID tag contains two segments of memory First Segment : Factory Set :- Used to uniquely identify a tag Second segment : Usable by application to store related data
Power-based Grouping:
Two types as per power requirement
Passive tag : Works with low frequency range Active tag : Works with high / low frequency range
When an RFID tag passes through the electromagnetic zone of reader, it detects the readers activation signal
The antenna emits radio signals to read data from or write data into the tag.
Antenna controls data acquisition and communication An antenna is fitted with the transceiver to become a
reader
TCP/IP
~
Power
Customers MIS
API
RFID Operation
Sequence of Communication
Host Manages Reader(s) and Issues Commands Reader and tag communicate via RF signal Carrier signal generated by the reader (upon request from the host application) Carrier signal sent out through the antennas Carrier signal hits tag(s) Tag receives and modifies carrier signal
Wireless Broadband
Wireless technologies are generally known as WLL (Wireless Local Loop) or WiLL (Wireless in Local Loop)
Wireless Local Loop is also known as fixed-wireless system Wireless broadband or Wireless MAN is defined by IEEE 802.16
The deployments of Wimax and Wifi network are same The line of sight antennas used to connect tower in Wimax technology.
Wireless Broadband
WiMAX provides wireless transmission of data using variety of modes, from point-to-multipoint links to portable & fully mobile internet access
WiMAX is basically use to link homes and businesses with core telecommunication networks
It provides network access to buildings through exterior antennas communicating with radio base stations
Installation of network is easy by deploying a small number of base stations on buildings or poles to create high-capacity wireless access systems
Wireless Broadband
Defines how and when a base station may initiate transmission on the
channel
Convergence Layer :
Provides functions specific to service being provided
Wireless Broadband
sometimes simultaneously.
Wireless Broadband
Mobile IP
Mobile IP (or IP mobility) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to
network
A TCP connection is identified by the tuple (source IP address, source port, destination IP address, destination port)
Mobile IP
In mobile communication environment, a user may be mobile and may change its network and so change of IP address.
Mobile node (MN): A mobile node is an end-system or router that can change its
Home network:
Foreign network: The foreign network is the current subnet the MN visits and
Foreign agent (FA): The FA can provide several services to the MN during its visit to the foreign network. The FA can have the COA (Care Of Address), acting as tunnel endpoint and forwarding packets to the MN. The FA can be the default router for the MN. FAs can also provide security services because they belong to the foreign network as opposed to the MN which is only
Care-of address (COA): The COA defines the current location of the MN from an IP
point of view.
All IP packets sent to MN are delivered to the COA, not directly to the IP address of the MN.
Home agent (HA): It is a router on mobile nodes home network which forwards
When the mobile node is located on its home network, it operates without mobility services
The
COA can
be
determined
from
foreign
agents
The MN registers its new care-of address with its home agent
information its new location and new care-of-address
The home agent forwards all incoming data packet to the foreign
This new packet encapsulates the original packet, causing the mobile nodes home address to have no impact on the
On returning to its home network from being registered elsewhere, the mobile node deregisters with its foreign agent,
Fig. 4.6
Mobile IP needs to support three basic capabilities : Discovery , Registration and Tunneling
Discovery One initial problem of an MN after moving is how to find a foreign agent. For this purpose mobile IP describes two methods: Agent Advertisement and Agent Solicitation Foreign agents and home agents advertise their presence
periodically using special agent advertisement messages. These messages can be seen as a beacon broadcast into the subnet. Internet control message protocol (ICMP) messages
Discovery (Cont..) If no agent advertisements are present, MN has not received a COA
Finally, MN receives a COA, either one for an FA. On receiving this advertisement packet, portion of IP address with its own address MN compares the network
If no match, MN finds it is in foreign network . The MN knows its location (home network or foreign network) and the capabilities of the agent (if needed).
The next step for the MN is the registration with the HA if the MN is in a foreign network
mobile node and an application in the home agent, and hence uses a
transport-level protocol.
Because registration is a simple request/response transaction, the overhead of the connection-oriented TCP is not required, and, therefore, the User Datagram Protocol (UDP) is used as the transport protocol.
Once a MN obtained a COA from foreign network, the same need to be registered with HA
MN sends a registration request to HA with COA information HA updates its routing table and sends registration reply back to MN
Registration Authentication The MN needs to be authenticated Registration messages between MN and HA must be authenticated with an authorization-enabling extension This extension must be the first authentication extension; other foreign agent-specific extension Using HMAC-MD5 hashing algo, a Digital signature is generated
Registration (Cont..) Each MN and HA shares a common secret This secret makes the digital signature unique and allows the agent to authenticate the MN At the end of registration, a triplet (Home address, COA, registration lifetime) is maintained in the home agent This is called MN binding with HA.
Four steps of Registration The MN requests for forwarding service from the foreign network by sending a registration request to the FA The FA relays this registration request to the HA of that MN The HA either accepts or rejects the request and sends a registration reply to the FA The FA relays this reply to MN
B: Broadcast datagrams. Indicates that the mobile node would like to receive copies of broadcast datagrams that it would have received if it were attached to its home network.
D: Decapsulation by mobile node. The mobile node is using a colocated care-of address and will decapsulate its own tunneled IP datagrams.
Registration Request message M: Indicates that the home agent should use minimal encapsulation
V: Indicates that the home agent should use Van Jacobson header
compression,
G: Indicates that the home agent should use GRE encapsulation Lifetime: Denotes the validity of the registration in seconds. A value of zero indicates deregistration; all bits set indicates infinity.
Home address: The home IP address (Original IP address before moving into foreign area) of the mobile node. The home agent can expect to receive IP datagrams with this as a destination address
Registration Request message Home agent: The IP address of the mobile node home agent. This
informs the foreign agent of the address to which this request should be
relayed.
Care-of address: The IP address at this end of the tunnel. The home agent should forward IP datagrams that it receives with the mobile node home address to this destination address.
Identification: A 64-bit number generated by the mobile node, used for matching registration requests to registration replies and for security purposes
Extensions: extension
Home address: The home IP address of the mobile node. Home agent: The IP address of the mobile node home agent. Identification: A 64-bit number used for matching registration requests to registration replies.
Tunneling In Mobile IP, the HA adds a new IP header called tunnel header The tunnel header uses the MNs COA as the tunnel destination IP address The tunnel source IP address is the HAs IP address The tunnel header uses 4 as the protocol number, indicating that the next protocol header is again as IP header The entire original IP header is preserved as the first part of payload of the tunnel header The FA after receiving the packet, drops the tunnel header and delivers the rest to MN
Fig. 4.7
Tunneling When MN is in foreign network, the HA is able to intercept all IP datagram packets sent to MN It forwards all these datagrams via tunnel The HA steals the identity of MN in order to capture packets destined for that are transmitted across the home network For this purpose ARP (Address Resolution Protocol) is used to notify all nodes in the home network
Fig. 4.8
Mobile hosts Migratory : Can move from one fixed site to another from time to time but use the network only when they connected to it Roaming : Can do computation on run and want to maintain
configurable network
Hosts are usually mobile and wireless and may enter/leave the
network anytime
Routing in MANET
In fixed wireless network, a base station always reaches all mobile nodes, this is not always the case in an ad-hoc network
In fixed wireless n/w, a cell is defined and a base station is available within cell which is responsible to route each packet
Routing in MANET
Routing in MANET
Some characteristics for routing in ad-hoc wireless networks Routing in wireless ad-hoc networks requires knowledge of
Centralized approaches will not really work, because it takes too long to collect the current status and disseminate it again.
Routing in MANET
Routing in MANET
DSDV maintains routes between all nodes, although there may currently be no data exchange at all which causes unnecessary traffic and prevents nodes from saving battery power.
Dynamic source routing (DSR), therefore, divides the task of routing into two separate problems Route discovery : A node only tries to discover a route to a
destination if it has to send something to this destination and there is currently no known route. Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative.
Routing in MANET
Dynamic source routing (DSR), If a node needs to discover a route, it broadcasts a route
Routing in MANET
TCP
connection-less
Two points about traditional TCP TCP performs poorly together with wireless links.
Wireless part.
point.
Instead of the mobile host, the access point now terminates the standard TCP connection, acting as a proxy. The access point is now seen as the mobile host for the fixed host and as the fixed host for the mobile host. Between the access point and the mobile host, a special TCP, adapted to wireless links, is used. In mobile IP, FA can be working as access point The foreign agent controls the mobility of the mobile host anyway and can also hand over the connection to the next foreign agent when the
TCP improvements- Indirect TCP If the correspondent host sends a packet, the foreign agent
packet.
If the mobile host sends a packet, the foreign agent acknowledges this packet and tries to forward it to the
correspondent host.
If a packet
this.
TCP improvements- Indirect TCP Similarly, if the mobile host sends a packet, the foreign agent
TCP improvements- Indirect TCP I-TCP requires several actions as soon as a handover takes
place
Access point acts as a proxy buffering packets for retransmission.
After the handover, the old proxy must forward buffered data
to the new proxy because it has already acknowledged the data.
After registration with the new FA, this new FA can inform the
old one about its location to enable packet forwarding. Besides buffer content, the sockets of the proxy, too, must
TCP improvements- Indirect TCP The socket reflects the current state of the TCP connection,
connection state.
Advantages I-TCP does not require any changes in the TCP protocol as
more problematic
The foreign agent must be a trusted entity because the TCP connections end at this point.
Snooping TCP
I-TCP losses the end-to-end semantics of TCP Snooping TCP works completely transparently and leaves the
The main function of the enhancement is to buffer data close to the mobile host to perform fast local retransmission in case of
packet loss.
In this approach, the foreign agent buffers all packets with destination mobile host and additionally snoops (observe) the
Snooping TCP
Foreign agent can perform a local retransmission in case of packet loss on the wireless link.
The foreign agent buffers every packet until it receives an acknowledgement from the mobile host.
the mobile host within a certain amount of time, either the packet
or the acknowledgement has been lost.
Snooping TCP
Now the foreign agent retransmits the packet directly from the buffer, performing a much faster retransmission compared to the correspondent host.
To remain transparent, the foreign agent must not acknowledge data to the correspondent host.
This would make the correspondent host believe that the mobile host had received the data and would violate the end-to-end semantic in case of a foreign agent failure.
However, the foreign agent can filter the duplicate acknowledgements to avoid unnecessary retransmissions of data from the correspondent host.
Snooping TCP
If
the
foreign
agent
crashes,
the
time-out
of
the
The foreign agent may discard duplicates of packets already retransmitted locally and acknowledged by the mobile host. This avoids unnecessary traffic on the wireless link.
Snooping TCP
Data
transfer
from
the
mobile
host
with
destination
The foreign agent snoops into the packet stream to detect gaps in the sequence numbers of TCP.
The mobile host can now retransmit the missing packet immediately.
Snooping TCP
An unmodified TCP is used on the standard hostsupervisory host (SH) connection, while an optimized TCP is used on the SH-MH connection.
exchanging data
Mobile TCP The SH monitors all packets sent to the MH and ACKs
persistent mode, i.e., the state of the sender will not change
no matter how long the receiver is disconnected. This means that the sender will not try to retransmit data.
TCP.
Mobile TCP Advantages It maintains the TCP end-to-end semantics. The SH does not
send any ACK itself but forwards the ACKs from the MH
If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking connections by simply shrinking the
senders window to 0.
Since it does not buffer data in the SH as I-TCP does, it is not necessary to forward buffers to a new SH while handover.
Transmission/time-out freezing
Mobile TCP, I-TCP etc. are used to handle a short interruptions of the connection, either due to handover or transmission errors on the wireless link
In the case of longer interruptions of transmission, the TCP connection will be break
The MAC layer knows the real reason for the interruption and does not assume congestion
The MAC layer can inform the TCP layer about the current
TCP can now stop sending and freezes the current state of its congestion window and further timers.
Transmission/time-out freezing
As soon as the MAC layer detects connectivity again, it signals TCP that it can resume operation at exactly the same point where it had been forced to stop.
Advantage : this approach offers a way to resume TCP connections even after longer interruptions of the connection.
It is independent of any other TCP mechanism, such as acknowledgements or sequence numbers, so it can be used together with encrypted data
Selective retransmission
TCP acknowledgements are cumulative, i.e., they acknowledge in-order receipt of packets up to a certain packet
If a single packet is lost, the sender has to retransmit everything starting from the lost packet (go-back-n retransmission). This obviously wastes bandwidth
in-sequence packets.
The sender can now determine precisely which packet is needed and can retransmit it.
Selective retransmission
Advantage : A sender retransmits only the lost packets. This lowers bandwidth requirements and is extremely helpful in
Disadvantage : more complex software on the receiver side, because now more buffer is necessary to resequence data and
Transaction-oriented TCP
If an application running on the mobile host that sends a short request to a server from time to time, which responds with a short message.
If the application requires reliable transport of the packets, it may use TCP
Using TCP now requires several packets over the wireless link. First, TCP uses a three-way handshake to establish the connection.
At least one additional packet is usually needed for transmission of the request, and requires three more packets to close the connection via a three-way handshake.
Transaction-oriented TCP
A transaction-oriented TCP (T-TCP) can combine packets for connection establishment and connection release with user data packets. This can reduce the number of packets down to two instead of seven.
Advantage : the reduction in the overhead which standard TCP has for connection setup and connection release.
It is the current version of the Internet Protocol (IP). It is designed to succeed the older Internet Protocol version 4
(IPv4).
The Internet operates by transferring data in small packets that are independently routed across networks as specified by an
IPv6 uses 128 bit addresses for each packet creating virtually infinite number of IP addresses
In IPv6, there are global addresses and local addresses. Global addresses are used for routing of global Internet Link local addresses are available within subnet IPv6 uses hierarchical addressing with three-level of addresses which includes Public Topology(48-bit external routing prefix), a site
topology(16-bit subnet number) and an interface identifier(64-bit unique number on local LAN segment
End-user sites get their address prefix from an ISP that provides them the IPv6 service.
General IPv6 host is given a linklocal addresses such as fe80::EUI-64 and more than one global address such as global-
prefix::EUI-64
Interface ID is used to specific Interface in the same link It is generated to use Interfaces link layer address
IPV6 Security
All IPv6 nodes are expected to implement strong authentication and encryption features to improve Internet security
IPv6 comes with native security protocol IP Security (IPSec) It provides confidentiality, integrity and authenticity to information transferred across IP networks
Fundamental components of IPSec Security Association (SA) Security Protocol Authentication Header (AH) / Encapsulating Security Payload (ESP) Cryptographic Algorithms Key Management manual and automated (the Internet Key
Exchange (IKE))
IPV6 Security
SA it uses to track all peers entities which are using the same IPSec protocol
It is a logical uni-directional connection that can be defined as relationships between entities (hosts, firewalls, gateways, routers etc)
To secure bidirectional communication between two entities, two SAs are required
defined by a Security
maintained by admin
IPV6 Security
When security service is chosen, two IPSec peers must be determine which algorithms to use
In an entity there will be many SAs which are stored in SA Database (SAD)
IPV6 Security
AH is used to provide integrity and data origin authentication and to provide protection against replays
replay
If both AH and ESP protection are applied to a traffic stream, then two SAs must be created and coordinated to effect
IPV6 Security
IPSec uses Mobile IPv6 operates in any location without any special
GSM
GSM
GSM uses a combination of FDMA and TDMA GSM has allocation of 50MHz bandwidth in the 900 MHz
frequency band
Using FDMA, this band is divided into 124 channels Using TDMA, each of these channel is further divide into 8 time
slots
GSM
cell I, can be assigned one or all the frequencies from the set fbi
belonging to cell i. When moving from one cell to another during an ongoing
GSM
GSM Architecture
GSM Architecture
Fig. 5.2
GSM Architecture
Cells are formed by radio areas covered by BTS (Base Transceiver Station)
Several BTSs are controlled by one BSC Traffic from the MS (Mobile Station) is routed through MSC Calls originating from or terminating in a fixed network or other
For all subscribers registered with a cellular network, their permanent datas are stored in Home Location Register (HLR)
GSM Architecture
GSM Architecture
GSM Architecture
Identity (IMSI)
Identification information like name, address, Mobile Subscriber ISDN (MSISDN) Billing information like prepaid or postpaid customer Operator selected Denial of service to a subscriber Handling of supplementary services like CFU (Call Forwarding Unconditional), CFB (Call Forwarding Busy), CFNR (Call
Forwarding Not Reachable) or CFNA (Call Forwarding Not Answered) Storage of SMS service Center (SC) number in case the mobile is
not connectable
GSM Architecture
GSM Entities
Mobile Station(MS) includes Mobile Equipment (ME) and the Subscriber Identity Module (SIM)
Base Station Subsystems (BSS) includes Base Transceiver Station (BTS) and Base Station Controller (BSC)
Network and Switching Subsystems (NSS) includes Mobile Switching Center (MSC) , Home Location Register (HLR), Visitors Location Registers (VLR), Equipment Identity Registers(EIR) and the
Maintenance Center(OMC)
Data infrastructure includes PSTN, Integrated System Digital Network and Public Data network (PDN)
It connects the MS and NSS It is in charge of transmission/reception for the last mile
Station
The BSC is the connection between the BTS and MSC It manages the radio resources for one or more BTSs
The central component of the Network Subsystems is the Mobile Switching Center (MSC)
Functions of MSC
Acts like a normal switching node for mobile subscriber of the same network Acts like a normal switching node for the PSTN fixed telephone (connection between phone to fixed phone) Acts like a normal switching node for ISDN Provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers and call routing Includes DBs needed for storing information to manage the mobility of
All the previous services are provided in conjunction with several functional entities which together form the Network Subsystem (NSS)
The signaling between functional entities in the NSS uses Signaling System Number (SS7)
SS7 is used for signaling in ISDN, SMS, prepaid, roaming and other intelligent network functions
MSC together HLR and VLR databases, provide the call routing
When phone is powered off, this information is stored in the HLR The location of the mobile is typically in the form of the signaling
HLR is always fixed and stored in the home network, whereas the VLR locally moves with the subscriber
VLR is a temporary copy of some of the important information stored in the HLR
When a subscriber enters the covering area of a new MSC, the VLR associated with this MSC will request information about the new subscriber from its corresponding HLR in the home network
The VLR will then have enough information in order to assure the subscribed services without needing to refer to the HLR each time a communication is established
Within the NSS there is a component called gateway MSC (GMSC) that is associated with the MSC
GMSC is the interface between the mobile cellular network and the PSTN
It is in charge of routing calls from the fixed network towards a GSM user and vice versa
It controls and monitors the GSM system It is connected to different components of the NSS and to the
BSC
It is in charge of controlling the traffic load of the BSS Equipment Identity Register (EIR) is a database that contains a
list of all valid mobile equipment within the network, where each
mobile station is identified by its International Mobile Equipment Identity (IMEI)
It is a protected database and stores a copy of the secret key stored in each subscribers SIM card
Message Centre
A popular service within GSM is Short Message Service (SMS) It is always on service
Channel Coding
Add some extra information into data for error detection and error correction
Interleaving
Rearranges a group of bits in a particular way to improve performance of error correction mechanisms Reduces the possibility of losing entire burst of data during transmission
Ciphering
Encrypts blocks of user data using a symmetric key shared by the mobile station and the BTS
Burst formatting
Add some binary information to the ciphered block which is used for synchronization and equalization of received data
Modulation
Gaussian Minimum Shift Keying (GMSK) which converts binary data back into analog signal to fit the frequency and time requirements for multiple access
rules
The signal is then radiated as radio wave over air
It estimates the channel impulse response of the GSM system and then
constructs an inverse filter In order to extract the right signal, the received signal is passed through the inverse filter
Synchronization
For successful operation, a mobile radio system, time and frequency synchronization are needed Frequency synchronization is necessary so that the transmitter and receiver frequency match (in FDMA) Time synchronization is used to identify the frame boundary and bits within