Cs8601 Unit 2 Notes Mobile Computing Unit 2 Anna University Regulation2017
Cs8601 Unit 2 Notes Mobile Computing Unit 2 Anna University Regulation2017
M 2
UNIT
Introduction to Cellular Systems – GSM – Services & Architecture – Protocols –
Connection Establishment – Frequency Allocation – Routing – Mobility
Management – Security - General Packet Radio Service (GPRS) – Universal
Mobile Telecommunication System (UMTS) – Architecture – Handover –
Security.
The above figure shows a basic cellular system which consists of Mobile
Stations (or) Mobile Nodes, Base Stations, and a MSC.
The towers represent the base station which provides radio access between
mobile users and MSC.
Mobile Stations communicate only via the base station.
The Mobile Switching Center, also called as Mobile Telephone Switching
Office (MTSO), is responsible for connecting all mobile nodes to PSTN.
MSC has more computing power which can handle most of the
communication operations.
o Cell Splitting:
Cell Splitting is the process of dividing a larger congested cell into smaller cells
so that at the base station the antenna height is reduced as well as the
transmitting power required is also less.
Other Operations:
Roaming: When a user travels outside his home network, he can still
make calls. This is provided by the facility called roaming. Roaming
makes it possible for a user to get his call anywhere.
Call Blocking: On mobile-initiated call stage, if all the traffic channels
are busy, the call is blocked by returning busy tone.
Call termination: As the user hang up call, MTSO is informed and the
traffic channels at two BSs are released.
Call Drop: If the BS cannot maintain required signal strength, then call
drop will occur and the traffic channel is dropped and MTSO is informed.
Calls to/from fixed and remote mobile subscriber: Here the MTSO
connects to fixed/remote subscriber via PSTN.
Definition of GSM:
Global System for Mobile Communication (GSM) is wide area wireless
communications system that uses digital radio transmission to provide voice,
data and multimedia communication services. A GSM system coordinates the
communication between a Mobile Telephone (Mobile Stations), Base Stations
(Cell Sites) and Switching Systems.
GOAL OF GSM:
The primary goal of GSM was to provide a mobile phone system that
allows users to roam and provides data services in addition to voice
services and it is compatible to 1G systems.
1. Bearer services
- GSM data services are name as Bearer Services.
- Bearer Services gives the subscriber the capability to send and receive data
to/from remote computers or mobile phones.
- Bearer Services also enable the transparent transmission of data between
GSM and other networks like PSTN, ISDN etc. at rates from 300 bps to
9600 bps.
- Besides supporting SMS, Email, Voicemail box, Internet access and also
provides the user with the capability to execute the remote applications.
- GSM supports data transfer rates upto 9.6 kbps
2. Tele services
- Teleservices are application specific and it needs all seven layers of the
ISO.OSI reference model. These services are specific to end-to-end ie. from
one terminal to another.
- GSM is mainly focused on voice teleservices and these comprise of
encrypted voice transmission, message services, and basic data
communication with terminals as known from the PSTN or ISDN (e.g. fax).
- GSM provides both,
Voice-oriented teleservices
Non-voice oriented teleservices
* Telephony:
The primary goal of GSM was to provide high-quality digital voice
transmission, offering at least the typical audio bandwidth of 3.1 kHz.
* Emergency number:
This is the same number all over the GSM network in Europe and is
also the same as the national emergency number. This is a mandatory
service that all the network operators have to provide and is free of charge
to the user.
7
3. Supplementary services
GSM network operators can also offer supplementary services. These services
offer enhancements to the standard telephony service and may differ from
operator to operator. The services are,
User Identification
Call Redirection
Forwarding of Outgoing calls
Standard ISDN features such as
o Closed User Groups
o Multiparty Communication
1. Radio Subsystems:
The radio subsystem is comprised of all the radio specific elements, i.e.
The Mobile Stations (MS) and
The Base Station Subsystem (BSS)
10
11
Encryption/decryption X X
Paging X X
Uplink Signal measurement X
Traffic measurement X
Authentication X
Location registry, location update X
Handover management X
The structure of the VLR and HLR avoids frequent updates and long-
distance signaling of user information.
-----------------------------------------------------------------------------------------------------
2.2.5: GSM CONNECTION ESTABLISHMENT / CALL SETUP (Localization &
Calling)
One fundamental feature of the GSM system is the automatic, worldwide
localization of users. The system always knows where a user currently is, and
the same phone number is valid worldwide.
Localization
GSM provides periodic location updates, even if user does not use the
mobile.
The HLR always contains information about the current location, and the
VLR currently responsible for the MS, informs the HLR about location
changes.
As soon as an MS moves into the range of a new VLR, the HLR sends all
user data needed to the new VLR.
Roaming:
Changing VLRs with uninterrupted availability of all services is called roaming.
National Roaming: Roaming that takes place between two providers in one
country.
International Roaming: Roaming that takes place between different
providers in different countries.
16
18
2.2.7: ROUTING
In a mobile system the endpoints of the connection may not be fixed. A GSM
subscriber may roam nationally as well as internationally. The number dialed to
reach a specific Mobile Station is called the Mobile Subscriber ISDN (MSISDN).
The process of locating a MS when calling it, is complex. A incoming call is
directed to a Gateway MSC (GMSC), which is a MSC with added functionality to
get the HLR database for routing information. The information returned to the
GMSC is the Mobile Station Roaming Number (MSRN), which is a temporary
number that identifies the MSC servicing the MS.
20
21
22
located, so that the incoming call can be routed to the corresponding base
station. This process is called paging.
The number of all possible cells to be paged is dependent on how the
location update operation is performed.
23
the same BSC. The BSC then performs a handover, assigns a new radio
channel in the new cell and releases the old one (scenario 2).
(i) Authentication:
The purpose of authentication is to protect the network against
unauthorized use.
In the GSM context, it helps protect the GSM subscribers by
denying the possibility for intruders to impersonate authorized
users.
The first step includes the authentication of a valid user for the
SIM. The user needs a secret PIN to access the SIM. The next step
is the subscriber authentication.
(ii) Confidentiality:
GSM network protects voice, data and sensitive signaling
information (eg. Dialed digits) against eavesdropping by encrypting
the data on the radio path between Mobile Equipment (ME) and
the BTS.
Confidentiality of subscriber dialed information is achieved by
using encryption techniques.
(iii) Anonymity:
GSM network protects against someone tracking the location of a
user or identifying calls made to (or from) the user by
eavesdropping on the radio path.
26
o Algorithms A3 and A8 are located on the SIM and in the AuC and can be
proprietary.
o Only A5 which is implemented in the devices has to be identical for all
providers.
=>AUTHENTICATION
Before a subscriber can use any service from the GSM network, he or she
must be authenticated.
Authentication is based on the SIM, which stores the individual
authentication key Ki, the user identification IMSI, and the algorithm
used for authentication A3.
Authentication uses a challenge-response method: the access control AC
generates a random number RAND as challenge, and the SIM within the MS
answers with SRES (signed response) as response.
The AuC performs the basic generation of random values RAND, signed
responses SRES, and cipher keys Kc for each IMSI, and then forwards this
information to the HLR.
The current VLR requests the appropriate values for RAND, SRES, and Kc
from the HLR.
For authentication, the VLR sends the random value RAND to the SIM.
Both sides, network and subscriber module, perform the same operation
with RAND and the key Ki, called A3.
The MS sends back the SRES generated by the SIM; the VLR can now
compare both values.
27
If they are the same, the VLR accepts the subscriber, otherwise the
subscriber is rejected.
Fig-Subscriber Authentication
=>ENCRYPTION
28
Disadvantages:
1. It does not provide direct connection to the internet. In order to access the
internet, GSM needs to call Internet Service Provider (ISP).
29
2. Uplink and Downlink channels allocated for a user are for entire call period.
3. It has time-oriented charging, that is, payment is based on connection time,
not on data volumes.
4. Connection setup takes about 20-25 seconds.
5. Limited capacity (9600bps).
6. It the SIM gets lost, one can lose all the data if the same is not saved in the
phone.
-------------------------------------------------------------------------------------------------
2.3: GPRS – GENERAL PACKET RADIO SERVICE
Definition of GPRS:
GPRS (General Packet Radio Service) is a packet-oriented mobile data service
on the GSM of 2G and 3G cellular communication systems. It is a non-voice,
high-speed and useful packet-switching technology for GSM networks.
The GPRS is an enhancement over the GSM and adds some nodes in the
network to provide the packet switched services.
These network nodes are called GSNs (GPRS Support Nodes) and are
responsible for the routing and delivery of the data packets to and from the
MS and external packet data networks (PDN).
GSM uses a billing system based on the time (duration) of connection,
whereas GPRS uses a billing system based on the amount of
transmitted data rather than the duration of the connection. So users
can remain continuously connected to the system, and yet get charged
only for the amount of transmitted data.
30
The figure above shows the architecture of the GPRS system. The most
important network nodes added to the existing GSM networks are:
SGSN (Serving GPRS Support Node).
GGSN (Gateway GPRS Support Node).
The serving GPRS support node (SGSN) is responsible for routing the packet
switched data to and from the mobile stations (MS) within its area of
responsibility.
The main functions of SGSN are:
- Packet routing and transfer
- Mobile attach and detach procedure (Mobility Management (MM))
- Location management
- Assigning channels and time slots (Logical Link Management (LLM))
- Authentication and charging for calls.
- Storing the location information of the user (like the current location,
current VLR) and user profile (like IMSI addresses used in packet data
networks) of registered users in its location register.
32
It converts the GPRS packet coming from the SGSN into proper Packet Data
Protocol (PDP) format (i.e. X.25 or IP) before sending to the outside data
network.
The GGSN stores the current SGSN address of the user and his profile in its
location register.
It also contains routing information for GPRS users, performs address
connection and tunnels data to a user through encapsulation.
GGSN is connected to an external network and it transfers packets to the
SGSN through an IP-based GPRS backbone network.
The GGSN also performs the authentication and charging functions.
33
GTP can use two different transport protocols, either the reliable TCP
(needed for reliable transfer of X.25 packets) or the non-reliable UDP (used
for IP packets).
The network protocol for the GPRS backbone is IP (using any lower layers).
To adapt to the different characteristics of the underlying networks, the
subnetwork dependent convergence protocol (SNDCP) is used between an
SGSN and the MS.
On top of SNDCP and GTP, user packet data is tunneled from the MS to the
GGSN and vice versa.
34
Disadvantages:
1. The data rates (171.2/384 Kbps) supported are slower compare to latest
wireless standards such as HSPA, LTE, and LTE-advanced etc.
35
2. Network can be affected when more number of GPRS users in the same
area utilizes the GPRS services at the same time. This leads to congestion
which results into slower data connection.
3. It is not possible to troubleshoot in case of issues. This means either GPRS
services are working fine or they are not working.
3.2.5: APPLICATIONS OF GPRS:
1. Communications - E-mail, fax, unified messaging and intranet/internet
access, etc.
2. Value-added services - Information services and games, etc.
3. E-commerce - Retail, ticket purchasing, banking and financial trading,
etc.
4. Location-based applications - Navigation, traffic conditions, airline/rail
schedules and location finder, etc.
5. Vertical applications - Freight delivery, fleet management and sales-force
automation.
6. Advertising - Advertising may be location sensitive. For example, a user
entering a mall can receive advertisements specific to the stores in that
mall.
-------------------------------------------------------------------------------------------
2.4: UMTS – UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM
Definition of UMTS:
Universal Mobile Telecommunications System (UMTS) is a third-generation
(3G) mobile communication system that provides a broadband, packet-
based transmission of text, digitized voice, video, and multimedia at data
rates up to 2 megabits per second (Mbps) at 2100 MHz frequency.
1. User Equipment - UE
2. Radio Network SubSystem - RNS
3. Core Network – CN
38
Shared Elements:
Home Location Register (HLR): This database contains all the
administrative information about each subscriber along with their last
known location.
Equipment Identity Register (EIR): It is the entity that decides whether a
given UE equipment may be allowed onto the network by checking the IMEI
number.
Authentication Centre (AuC): AuC is a protected database that contains
the secret key.
-----------------------------------------------------------------------------------------------------------
40
Handoff must be
1. Performed Quickly
2. Performed infrequently
3. Invisible to users
4. Performed Successfully
41
42
a. The acknowledged mode transfer uses ARQ for error correction and
guarantees onetime in-order delivery of data packets.
b. The unacknowledged mode transfer does not perform ARQ but
guarantees at least one-time delivery of packets with the help of
sequence numbers.
c. The transparent mode transfer simply forwards MAC data without
any further processing. The system then has to rely on the FEC
which is always used in the radio layer.
(2) On top of these lower layers UDP/IP is used to create a UMTS internal IP
network.
(3) PDCP Layer (Packet Data Convergence Protocol) –This layer performs
protocol conversion from the combination GTP/UDP/IP and header
compression to avoid redundant data transmission using scarce radio
resources.
(4) GTP Layer (GPRS tunneling protocol) – Used for encapsulating all the
packets destined for the UE.
_________________________________________________________________
45
46
UMTS Authentication:
Unlike GSM, UMTS uses mutual authentication which means that the
mobile user and the serving network can authenticate each other,
providing security against false base station.
This mutual authentication uses an authentication quintet which helps
to ensure that a bill is issued to the correct person.
The authentication quintet consists of the User Challenge (RAND),
Expected User Response (XRES), the Encryption Key (CK), the
Integrity Key (IK), and the authentication token for Network
Authentication (AUTN).
Also UMTS provides a new data integrity mechanism which protects the
messages being signaled between the mobile station and Radio Network
Controller (RNC).
The user and the network negotiate and agree on cipher and integrity
algorithms. Both the integrity mechanism and an enhanced
authentication combine to provide against active attacks on the radio
interface.
47
UMTS Encryption:
UMTS provides enhanced encryption which ensures that messages are
not available to unauthorized users.
With UMTS, encryption is completed in the Radio Network Controller
(RNC) rather than at the base station, as in the case of GSM.
Longer encryption key lengths are used to improve confidentiality.
UMTS added confidentiality algorithms for maintaining identity
confidentiality:
o User Identity Confidentiality
o User Location Confidentiality
49