0% found this document useful (0 votes)
0 views

MC_Module2_MU _Questions with Solutions

The document provides an overview of GSM mobile services, detailing authentication and privacy algorithms such as A3, A5, and A8. It explains the architecture of GSM, including its components like the Mobile Station, Base Station System, and Network Switching System, along with their functions and interfaces. Additionally, it compares GSM with GPRS, highlighting the upgrades required for GPRS implementation and introduces UMTS as a successor to GSM for 3G networks.

Uploaded by

Ayushi Warke
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

MC_Module2_MU _Questions with Solutions

The document provides an overview of GSM mobile services, detailing authentication and privacy algorithms such as A3, A5, and A8. It explains the architecture of GSM, including its components like the Mobile Station, Base Station System, and Network Switching System, along with their functions and interfaces. Additionally, it compares GSM with GPRS, highlighting the upgrades required for GPRS implementation and introduces UMTS as a successor to GSM for 3G networks.

Uploaded by

Ayushi Warke
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Department of Computer Engineering

Module 2: GSM Mobile services


1. Explain in short different algorithm used for authentication and
privacy in GSM.
Sol: Authentication mechanism
Authentication is performed using following entities and a technique called “Challenge
Response” ·
A3 Algorithm for Authentication ·
128-bit key Ki stored at SIM card and AUC ·
RAND number auto generated by AUC known as Challenge
Following steps are followed for authentication
1. Mobile station sends IMSI to network
2. Network accepts IMSI and find corresponding Ki which is 128-bit secret key stored on the
SIM card as well as available with the authentication centre
3. The AUC generates 128-bit random number RAND and sends to the mobile station. This is
called “challenge”
4. SIM card accepts this challenge and uses the random number and key Ki as input to A3
algorithm. SIM has a microcontroller to execute the algorithm A3. It produces 32-bit output
called signature response SRES using Ki and RAND as input
5. Network also calculates output using same inputs i.e. Ki, RAND and algorithm A3.
6. MS sends SRES to network
7. Network matches both SRES, if matched subscriber is authenticated

Encryption The data and signals are encrypted only between mobile station and base station.
Therefore, mechanisms for encryption need to be performed both at base station and mobile
station. The algorithms A5 and A8 are used for encryption Any encryption algorithm needs a
cipher key. This cipher key is not statically available. It is dynamically generated using A8
algorithm. It takes 128-bit key Ki and 128-bit RAND to generate 54-bit cipher key. Then 10 zero
bits are appended to the key to make it 64 bits. This is done to reduce the key space from 64 bits
to 54 bits.
A5 algorithm A5 is the encryption algorithm. It is a stream cipher. It works on bit-by-bit basis.
A5 is stored on hardware as it has to encrypt and decrypt data during transmission and reception
of information, which must be fast enough. A5 takes 64-bit cipher key and 22 bit function key
as input and 114 bit plain text to generate 114-bit cipher text. The encryption decryption
processes are performed both at Base station and Mobile station.
Steps followed during encryption
· Network initiates a ciphering mode request command
· Mobile station receives this command
· Network sends RAND number generated to generate the cipher key
· Mobile station uses RAND, Ki and RAND the network also generates Kc and distributes to BS
As long as user is authenticated Kc remains same. If authentication is done again, another cipher
key would be generated. During handovers if the mobile station has moved to a different base
station but there is no need to authenticate it again, then the same key can be used by the new
base station. The key would be forwarded to the new base station · Once the cipher key is
generated, it can be used to encrypt the data and signal using A5 algorithm.

2. What is the use of different interfaces used in global system for


mobile communication (GSM) with diagram? (Repeated)
Sol: GSM stands for Global System for Mobile Communication. GSM is an open and
digital cellular technology used for mobile communication. It uses 4 different frequency
bands of 850 MHz, 900 MHz, 1800 MHz and 1900 MHz. It uses the combination of FDMA
and TDMA.
Three subsystem BSS, NSS and OSS are connected with each other via interfaces. Total three
interfaces are there:
1. Air Interface: Air interface is also known as UM interface. Interface between MS and
BTS is called as UM interface because it is mobile analog to the U interface of ISDN. It is
used for interworking between the MS and the fixed part of the GSM system and transmits
information about radio resource management, mobility management, and connection
management. Um is defined in the lower three layers of the model.
2. Abis Interface: It is a BSS internal interface linking with BTS and BSC. This interface is
used for remote interconnection between the BTS and the BSC. It supports all services provided
to users. It also supports the control of the BTS radio equipment and the allocation of radio
frequencies.
3. A interface: It provides communication between BSS and MSC. This interface transmits
information related to mobile call processing, base station management, mobile station
management, channel management, etc.

3. Which components are new in GPRS as compared to GSM? What


is their purpose?
Solution: A Comparison of GPRS vs GSM
1.GSM is the abbreviation of Global System for Mobile Communications.
2. GPRS is an abbreviation for General Packet Radio.
3. GPRS is a packet data bearer and transmission service developed on the basis of the GSM
system.
4. The most fundamental difference between GPRS vs GSM systems is that GSM module is a
circuit-switched system, while GPRS module is a packet-switched system.
5. GSM module can only use SMS to transmit data, and does not support "real-time online"
and "pay-as-you-go". Compared with GSM, GPRS module has obvious advantages in bearing
and supporting data services. It can use wireless network channel resources more effectively,
and is especially suitable for intermittent and aperiodic data transmission, small data volume,
infrequent large-capacity data transmission and other application scenarios.
Seven major differences between GPRS vs GSM
1. Network signal
In terms of network requirements, GSM network signal requirements are relatively low, while
GPRS module network signal requirements are relatively high, similar to mobile phone
network signal requirements. Sending messages via cell phone has no problem, but calls are
blocked.
2. Transmission distance
In terms of transmission distance, it can be said that the GPRS vs GSM module are side by side
on the same horizontal line, and data can be transmitted wherever there is a signal, but the size
of the transmitted data is different. The data packet of the GSM module can only send 130
bytes, while the data packet of the GPRS module can only send 1024 bytes, which can complete
1K data transmission immediately. More data can be transferred if there is an automatic
outsourcing agreement.
3. Transmission method
In terms of transmission mode, both include active mode and passive mode, but the
transmission frequency band is different. The transmission of the GSM module is equivalent
to the 2G frequency band, and the transmission frequency of the GPRS module is equivalent
to 2.5G, indicating that the transmission speed of the GPRS module is very fast.
4. Access speed
Speaking of "fast", we have to talk about access speed. Compared with the access speed of
GSM 9.6kbps, the access speed of GPRS is 171.2kbps, which is more than ten times faster than
the speed commonly used by most people. GPRS is not only faster to access, but also takes
very little time to establish a connection request, while GSM takes 10 to 30 seconds.
5. Application environment
As far as the application environment is concerned, the GSM module is suitable for
environments with a small amount of data and a large collection interval, such as instrument
data collection. The suitable application environment of GPSR module is large-scale data
acquisition and high-frequency data acquisition environment.
6. Calculation method
The flow calculation method of the GPRS module is usually to calculate the flow in bytes. For
example, if the GPRS module is connected to the RTU, if the acquisition command from the
central station is 8 bytes and the data we return is 20 words, the average period is 6S. Therefore,
the business volume of each 6SGPRS module fee is 170+20+8=198 bytes, one minute is 1980
bytes, one hour is 118800 bytes, 24 hours is 2851200 bytes, and one month is 85536000 bytes
, that is, 80M stream packets. In actual use, the traffic packet must be slightly larger, because
our modules and heartbeat packets will also occupy a certain amount of data.
7. Cost Comparison
In terms of cost, GSM module is billed according to the connection time, and GPRS module
only needs to be billed according to the data flow; the network resource utilization rate of GPRS
is relatively higher than that of GSM. The cost of GSM module is much cheaper than 3G, and
the price is relatively low. If video calls and internet access are not required, the GSM module
is still more suitable.

4. What are the different security algorithms used in GSM?


Solution: GSM uses three different security algorithms called A3, A5, and A8. In practice,
A3 and A8 are generally implemented together (known as A3/A8).
An A3/A8 algorithm is implemented in Subscriber Identity Module (SIM) cards and in GSM
network Authentication Centres. It is used to authenticate the customer and generate a key for
encrypting voice and data traffic. Development of A3 and A8 algorithms is considered a matter
for individual GSM network operators, although example implementations are available.
An A5 encryption algorithm scrambles the user's voice and data traffic between the handset
and the base station to provide privacy. An A5 algorithm is implemented in both the handset
and the base station subsystem (BSS).
A3

• Authentication algorithm
• Calculates SRES based on the Ki key (stored on the SIM and in the HLR) and the
RAND sent by the MSC
• Not standardized; can be chosen independently by each operator

A8

• Key generation algorithm needed to calculate the session key Kc


• Calculation of Kc depends on Ki and RAND
• Not standardized; can be chosen independently by each operator.

A5

• Stream cipher used to encrypt over-the-air-transmissions


• Ciphering is based on Kc and the frame number
• Specified at international level to enable roaming.

5. Explain GSM architecture and different interfaces used in it. OR


explain in detail GSM System Architecture and Describe
function of each block.
Solution: GSM (Global System for Mobile Communications) is a set of mobile
communications standards and protocols governing second-generation or 2G networks, first
developed and deployed in Europe.
The Architecture of GSM
The GSM architecture is made up of three central systems. The following are the primary
components of the GSM architecture:
• The network switching system (NSS)
• The mobile station (MS)
• The base station system (BSS)
• The operations and support system (OSS)
1. The network switching system (NSS)
NSS is a GSM element that provides flow management and call processing for mobile devices
moving between base stations. The switching system consists of the functional units listed
below.
• Mobile Services Switching Center (MSC): Mobile Switching Center is
integral to the GSM network architecture’s central network space. The MSC
supports call switching across cellular phones and other fixed or mobile network
users. It also monitors cellular services, including registration, location updates,
and call forwarding to a roaming user.
• Home Location Register (HLR): It is a set of data items used for storing and
managing subscriptions. It provides data for each consumer as well as their last
known position. The HLR is regarded as the most significant database because it
preserves enduring records about users. When a person purchases a membership
from one of the operators, they are enlisted in that operator’s HLR.
• Visitor Location Register (VLR): VLR is a database that provides subscriber
information necessary for the MSC to service passengers. This includes a short-
term version of most of the data stored in the HLR. The visitor location register
can also be run as a standalone program, but it is usually implemented as a
component of the MSC.
• Equipment Identity Register (EIR): It is the component that determines if
one can use particular mobile equipment on the system. This consists of a list of
every functioning mobile device on the system, with each mobile device
recognized by its own International Mobile Equipment Identity (IMEI) number.
• Authentication Center (AuC): The AUC is a unit that offers verification and
encryption factors to ensure the user’s identity and the privacy of every call. The
verification centre is a secure file that contains the user’s private key in the SIM
card. The AUC shields network operators from various types of fraud prevalent
in the modern-day cellular world.
2. The mobile station (MS)
The mobile station is a cell phone with a display, digital signal processor, and radio transceiver
regulated by a SIM card that functions on a system. Hardware and the SIM card are the two
most essential elements of the MS. The MS (Mobile stations) is most widely recognized by
cell phones, which are components of a GSM mobile communications network that the
operator monitors and works.
Currently, their size has shrunk dramatically while their capabilities have
skyrocketed. Additionally, the time between charges has been significantly improved.
3. The base station system (BSS)
It serves as a connection between the network subsystem and the mobile station. It consists of
two parts:
• The Base Transceiver Station (BTS): The BTS is responsible for radio
connection protocols with the MS and contains the cell’s radio transceivers.
Companies may implement a significant number of BTSs in a big metropolitan
area. Each network cell has transceivers and antennas that make up the BTS.
Based on the cell’s consumer density, every BTS includes anywhere from one to
sixteen transceivers.
• The Base Station Controller (BSC): The BSC is responsible for managing the
radio resources of one or more BTS(s). This manages radio channel configuration
and handovers. The BSC serves as the link seen between mobile and MSC. It
allocates and emits MS frequency bands and time slots. Additionally, the BSC is
responsible for intercell handover and transmits the BSS and MS power within
its jurisdiction.
4. The operations and support system (OSS)
The operation support system (OSS) is a part of the overall GSM network design. This is linked
to the NSS and BSC components. The OSS primarily manages the GSM network and BSS
traffic load. As the number of BS increases due to customer population scaling, a few
maintenance duties are shifted to the base transceiver stations, lowering the system’s financial
responsibility. The essential purpose of OSS is to have a network synopsis and assist various
services and maintenance organizations with their routine maintenance arrangements.

6. What are the modifications are required to an existing GSM


network to be upgraded to GPRS, Explain with suitable diagram.
Solution: GPRS architecture architecture works on the same procedure procedure like GSM
network, network, but, has additional additional entities entities that allow packet data transmit
transmission. This data network overlaps a second-generation second-generation GSM network
providing packet data transport at the rates from 9.6 to 171 kbps. Along with the packet data transport
the GSM network accommodates multiple users to share the same air interface resources concurrently.
Following is the GPRS Architecture diagram:

GPRS attempts to reuse the existing GSM network elements as much as possible, possible, but to
effectively build a packet-based cket-based mobile cellular network, some new network elements,
interfaces, and protocols for handling packet traffic are required. Therefore, GPRS requires modifications
to numerous GSM network elements as summarized below:
GSM Network Element Modification or Upgrade Required for GPRS.
Mobile Station (MS) New Mobile Station is required to access GPRS
services. These new terminals will be backward
compatible with GSM for voice calls.
BTS A software upgrade is required in the existing Base
Transceiver Station (BTS).
BSC The Base Station Controller (BSC) requires a software
upgrade and the installation of new hardware called
the packet control unit (PCU). The PCU directs the
data traffic to the GPRS network and can be a
separate hardware element associated with the BSC.
GPRS Support Nodes (GSNs) The deployment of GPRS requires the installation of
new core network elements called the serving GPRS
support node (SGSN) and gateway GPRS support
node (GGSN)
Databases (HLR, VLR, etc.) All the databases involved in the network will require
software upgrades to handle the new call models
and functions introduced by GPRS.

7. Write a short note on UTRAN and UMTS network


Solution: UMTS or Universal Mobile Telecommunications Framework, is the 3G successor
to the GSM family of measures counting GPRS and EDGE. Universal mobile
telecommunication system (UMTS) is defined as the third-generation (3G) mobile network built
on the global GSM standard, compatible with data transfer up to 2 Megabits per second. UMTS
could be a component of IMT-2000 standard of the Universal Broadcast communications Union
(ITU), created by 3GPP. It employments wideband code division multiple access (W-CDMA)
discuss interface. It gives transmission of content, digitized voice, video and multimedia. It gives
tall transmission capacity to portable operators. It gives a tall information rate of 2Mbps. For
High-Speed Downlink Parcel Get to (HSDPA) handsets, the data-rate is as tall as 7.2 Mbps
within the downlink connection. It is additionally known as Flexibility of Mobile Multimedia
Access (FOMA).
UMTS Applications
• Streaming / Download (Video, Audio)
• Videoconferences.
• Fast Internet / Intranet.
• Mobile E-Commerce (M-Commerce)
• Remote Login
• Background Class applications
• Multimedia-Messaging, E-Mail
• FTP Access
• Mobile Entertainment (Games)
Advantages of UMTS
• UMTS could be a successor to 2G based GSM advances counting GPRS and EDGE .
Gaining a 3rd title 3GSM since it could be a 3G relocation for GSM
• Support 2Mbit/s information rates.
• Higher Information rates at lower incremental costs.
• Benefits of programmed universal wandering also necessarily security and charging
capacities, permitting administrators emigrate from 2G to 3G whereas holding
numerous of their existing back-office frameworks
• Gives administrators the adaptability to present unused mixed media administrations to
trade clients and buyers
• This not as it were gives client a valuable phone but moreover deciphers higher incomes
for the administrator.
Disadvantages of UMTS
• It is more expensive than GSM.
• Universal Mobile Telecommunication System has poor video experience.
• Universal Mobile Telecommunication System still not broadband.

UTRAN
UMTS Terrestrial Radio Access Network (UTRAN) is a collective term for the network and
equipment that connects mobile handsets to the public telephone network or the Internet. It
contains the base stations, which are called Node B's and Radio Network Controllers (RNCs)
which make up the Universal Mobile Telecommunications System (UMTS) radio access
network. This communications network, commonly referred to as 3G (for 3rd Generation
Wireless Mobile Communication Technology), can carry many traffic types from real-
time Circuit Switched to IP based Packet Switched. The UTRAN allows connectivity between
the UE (user equipment) and the core network.

The RNC provides control functionalities for one or more Node Bs. A Node B and an RNC
can be the same device, although typical implementations have a separate RNC located in a
central office serving multiple Node Bs. Despite the fact that they do not have to be physically
separated, there is a logical interface between them known as the Iub. The RNC and its
corresponding Node Bs are called the Radio Network Subsystem (RNS). There can be more
than one RNS present in a UTRAN.

There are four interfaces connecting the UTRAN internally or externally to other functional
entities: Iu, Uu, Iub and Iur. The Iu interface is an external interface that connects the RNC to
the Core Network (CN). The Uu is also external, connecting Node B with the User Equipment
(UE). The Iub is an internal interface connecting the RNC with Node B. And at last, there is
the Iur interface which is an internal interface most of the time but can, exceptionally be an
external interface too for some network architectures. The Iur connects two RNCs with each
other.

8. Explain GPRS architecture in detail.


Solution: GPRS stands for General Packet Radio Service. It is the modified version of GSM
architecture. GPRS is a packet-oriented mobile data mechanism, that can carry data packets as
well. GPRS tries to make maximum use of the existing physical structure of GSM. It has
introduced a new entity named GPRS support nodes (GSN) whose responsibility is to route and
deliver a data packet. GSN is of two types:
• Serving GPRS Support Node (SGNS)
• Gateway GPRS Support Node (GGNS)

Components of GPRS Architecture


• Mobile Station (MS)
GPRC requires enhanced mobile stations, as existing mobile stations were designed according
to the GSM network, and they were unable in handling enhanced data packets. A variety of
high-speed mobile stations are available to support enhanced data packets. These mobile
stations are also capable of handling the GSM architecture to make voice calls.
• Base Station Subsystem (BSC)
In GSM architecture there is one component called BSC. But in GPRS there is one component
is added to BSC called PCU. PCU stands for Packet Control Unit. If the signal comes to BSC
and that signal contains data, then PCU routes to the SGSN. The interface is used between BSC
and PCU is the FRI interface. After the signal comes to SGSN, it delivers the data packet to the
GGSN. GGSN routes the data packet to the data network (PDN- Predefined Data Network).
GPRS Support Nodes
• GPRS support nodes are of two types:
1. Serving GPRS Support Node (SGSN) : It is responsible for the following tasks:
• Packet Delivery
• Mobility management
• apply/ sign off of terminals
• localization
• LLC (Logical Link Control) management
• Authentication
• Billing
2. Gateway GPRS Support Node (GGSN) : It is responsible for the following tasks:
• Mediator between GPRS between backbone and external data networks.
• Saves current data for the SGSN address of the participant as well as their profile and
data for authentication and invoice.

9. Explain UMTS Architecture.

UMTS or Universal Mobile Telecommunications Framework, is the 3G successor to the GSM family
of measures counting GPRS and EDGE
Features of UMTS

• UMTS could be a component of IMT-2000 standard of the Universal Broadcast


communications Union (ITU), created by 3GPP.

• Its employments wideband code division multiple access (W-CDMA) discuss interface.

• It gives transmission of content, digitized voice, video and multimedia.

• It gives tall transmission capacity to portable operators.

• It gives a tall information rate of 2Mbps.

• For High-Speed Downlink Parcel Get to (HSDPA) handsets, the data-rate is as tall as 7.2 Mbps
within the downlink connection.

• It is additionally known as Flexibility of Mobile Multimedia Access (FOMA).

• The UTRAN consists of a set of radio network subsystems (RNSs). There are two logical
elements in RNS. One is Node B and other is RNC.

• Each cell consists of one group of nodes and one RNC (Radio Network Controller). The RNC is
responsible for the use and allocation of all the radio resources of the RNS.

• A Node B is responsible for radio transmission and reception in one or more cells to/from the
user equipment (UE).

• Node B denotes the base station transceiver within UMTS. It contains the transmitter and
receiver to communicate with the UEs within the cell. It participates with the RNC in the
resource management. Node B is the 3GPP term for base station, and often the terms are
used interchangeably.

Advantages of UMTS

• UMTS could be a successor to 2G based GSM advances counting GPRS and EDGE. Gaining a
3rd title 3GSM since it could be a 3G relocation for GSM

• Support 2Mbit/s information rates.

• Higher Information rates at lower incremental costs.

• Benefits of programmed universal wandering also necessarily security and charging


capacities, permitting administrators emigrate from 2G to 3G whereas holding numerous of
their existing back-office frameworks

• Gives administrators the adaptability to present unused mixed media administrations to


trade clients and buyers

• This not as it were gives client a valuable phone but moreover deciphers higher incomes for
the administrator.

Disadvantages of UMTS

• It is more expensive than GSM.

• Universal Mobile Telecommunication System has poor video experience.

• Universal Mobile Telecommunication System still not broadband

You might also like