SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Content
 What is GSM?
 Network structure
 GSM system architecture
 Mobile Station (MS)
 Base Station Subsystem (BSS)
 Network Switching Subsystem (NSS)
 Characteristics
2
What is GSM?
 The Global System for Mobile communications is a
digital cellular communications system.
 Based on digital technology.
 The standardized system had to meet certain
criteria’s:
 Spectrum efficiency
 International roaming
 Low mobile and base stations costs
 Good subjective voice quality
 Ability to support new services
3
Network structure
 Cell
 Location area
 MSC service area
 PLMN service area
 GSM service area
4
Cell
A cell is the basic unit of a cellular system and is
defined as the radio coverage given by one BTS.
Location area
 A group of cells served by one or more BSC.
 Within the network, a subscribers' location is known
by the LA which they are in.
 The identity of the LA in which an MS is currently
located is stored in the VLR.
5
 MSC Service Area
An MSC Service Area is made up of LAs and
represents the geographical part of the network
controlled by one MSC.
 PLMN service area
A PLMN service area is the entire set of cells served
by one network operator.
Defined as the area in which an operator offers radio
coverage and access to its network.
6
 GSM service area
The GSM service area is the entire geographical
area in which a subscriber can gain access to a
GSM network.
7
GSM system architecture
 Mobile Station (MS)
 Base Station Subsystem (BSS)
 Network Switching Subsystem(NSS)
8
Mobile Station (MS)
The Mobile Station is made up of two entities:
1. Mobile Equipment (ME)
2. Subscriber Identity Module (SIM)
9
Mobile Equipment (ME)
 Portable, vehicle mounted, hand held device.
 Uniquely identified by an IMEI (International
Mobile Equipment Identity).
 Voice and data transmission.
 Monitoring power and signal quality of surrounding
cells for optimum handover.
 Power level : 0.8W – 20 W
 160 character long SMS.
10
Subscriber Identity Module (SIM)
 Smart card contains the International Mobile Subscriber
Identity (IMSI)
 Allows user to send and receive calls and receive other
subscribed services
 Protected by a password or PIN
 Can be moved from phone to phone – contains key
information to activate the phone
11
Base Station Subsystem (BSS)
It consists of 2 major hardware components:
 Base Transceiver Station (BTS)
 Base Station Controller (BSC)
12
Base Transceiver Station (BTS)
 The BTS contains the RF
components that provide the
air interface for a particular
cell .
 Encodes, encrypts,
multiplexes, modulates and
feeds the RF signals to the
antenna.
 Communicates with Mobile
station and BSC.
 Consists of Transceivers
(TRX) units.
13
Base Station Controller (BSC)
 Provides the control for the
BSS.
 Communicates directly with
the MSC.
 May control single or multiple
BTS.
 In charge of handovers,
frequency hopping, exchange
functions and control of power
level of BTS.
14
Network Switching Subsystem(NSS)
The system contains the following functional units
 Mobile Switching Center (MSC)
 Home Location Register (HLR)
 Visitor Location Register (VLR)
 Authentication Center (AUC)
 Equipment Identity Register (EIR)
 Operation and maintenance center (OMC)
15
Mobile Switching Center (MSC)
 Central component of NSS.
 MSC performs the switching functions.
 Each MSC provides service to MS located within
a defined geographic coverage area.
16
Home Location Register (HLR)
 Stores information about each subscriber that
belongs to its MSC in permanent and temporary
fashion.
 As soon as mobile subscriber leaves its current
local area, the information in the HLR is updated.
 Database contains IMSI, prepaid/postpaid, roaming
restrictions and supplementary services.
17
Visitor Location Register (VLR)
The Visitor Location Register (VLR) contains the
information about subscriber parameters and location
information for all mobile subscribers currently
located in the geographical area controlled by that
VLR.
Authentication Center (AUC)
It is used for security purposes.
Authentication is a process to verify the subscriber SIM.
AUC & HLR collectively authenticate the subscribers.
18
Equipment identity register (EIR)
 Stores all devices identifications registered for this network.
 Database that is used to track handsets using the IMEI.
 White or Valid list
 Grey or Monitored list
 Black or prohibited list
Operation and maintenance center (OMC)
 The Operation and maintenance Center (OMC) is the
centralized maintenance and diagnostic heart of the base station
system (BSS).
 It allows the network provider to operate, administer , and
monitor the functioning of the BSS.
19
20
Characteristics
 Fully digital system using 900,1800 MHz frequency band.
 User/terminal authentication for fraud control.
 Full international roaming capability.
 Low speed data services (up to 9.6 Kb/s).
 Compatibility with ISDN.
 Support of Short Message Service (SMS).
21
THANK YOU!!!
Queries???
23

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Handover
HandoverHandover
Handover
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
GSM
GSMGSM
GSM
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
WCDMA
WCDMAWCDMA
WCDMA
 
Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
Cellular network
Cellular networkCellular network
Cellular network
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
Ch6
Ch6Ch6
Ch6
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
Telecom Roaming Overview
Telecom Roaming OverviewTelecom Roaming Overview
Telecom Roaming Overview
 
IT6601 Mobile Computing Unit III
IT6601 Mobile Computing Unit IIIIT6601 Mobile Computing Unit III
IT6601 Mobile Computing Unit III
 

Andere mochten auch

GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecturekoonlay
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5GBharathi Ravi
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gNoor Mohammad's Faltoos
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 
Student -gsm_architecture
Student  -gsm_architectureStudent  -gsm_architecture
Student -gsm_architectureHaval Sharafany
 
Gsm, gprs, edge presentation
Gsm, gprs, edge presentationGsm, gprs, edge presentation
Gsm, gprs, edge presentationZahid Been Aziz
 
Gsm architecture with gmsk
Gsm architecture with gmsk Gsm architecture with gmsk
Gsm architecture with gmsk Bilal Waheed
 
Day 02 gsm-network_architecture
Day 02 gsm-network_architectureDay 02 gsm-network_architecture
Day 02 gsm-network_architecturehaider04
 
Ch2 gsm network architecture
Ch2 gsm network architectureCh2 gsm network architecture
Ch2 gsm network architectureMohamed Shaaban
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
 

Andere mochten auch (20)

GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
Full gsm overview (modified)
Full gsm overview  (modified)Full gsm overview  (modified)
Full gsm overview (modified)
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
2G & 3G Overview
2G & 3G Overview2G & 3G Overview
2G & 3G Overview
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
 
GSM fundamentals (Huawei)
GSM fundamentals (Huawei)GSM fundamentals (Huawei)
GSM fundamentals (Huawei)
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5g
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 
GSM & GPRS Primer
GSM & GPRS PrimerGSM & GPRS Primer
GSM & GPRS Primer
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Student -gsm_architecture
Student  -gsm_architectureStudent  -gsm_architecture
Student -gsm_architecture
 
Gsm, gprs, edge presentation
Gsm, gprs, edge presentationGsm, gprs, edge presentation
Gsm, gprs, edge presentation
 
Gsm architecture with gmsk
Gsm architecture with gmsk Gsm architecture with gmsk
Gsm architecture with gmsk
 
Day 02 gsm-network_architecture
Day 02 gsm-network_architectureDay 02 gsm-network_architecture
Day 02 gsm-network_architecture
 
Ch2 gsm network architecture
Ch2 gsm network architectureCh2 gsm network architecture
Ch2 gsm network architecture
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 

Ähnlich wie Gsm architecture

Module1 part2
Module1 part2Module1 part2
Module1 part2raksharao
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...satishnittana1
 
Gsm overview for beginners v2
Gsm overview for beginners v2Gsm overview for beginners v2
Gsm overview for beginners v2Assim Mubder
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptxhazhamina
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobilePartha Bhunia
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansTelebeansolutions
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network ArchitectureAhmed Khaled
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSMRAVIKIRAN ANANDE
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecturesumit singh
 
Global system for mobile communication
Global system for mobile communicationGlobal system for mobile communication
Global system for mobile communicationbhartis3
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentFabiha Ain
 
Mobile and information society
Mobile and information societyMobile and information society
Mobile and information societyIlyaas Hussain
 

Ähnlich wie Gsm architecture (20)

Module1 part2
Module1 part2Module1 part2
Module1 part2
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
 
Ec module 3
Ec module 3Ec module 3
Ec module 3
 
GSM_SANAT_Ppt
GSM_SANAT_PptGSM_SANAT_Ppt
GSM_SANAT_Ppt
 
Gsm overview for beginners v2
Gsm overview for beginners v2Gsm overview for beginners v2
Gsm overview for beginners v2
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
 
GSM architecture
GSM architectureGSM architecture
GSM architecture
 
Cellular radio network
Cellular radio networkCellular radio network
Cellular radio network
 
Gsm
GsmGsm
Gsm
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network Architecture
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSM
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
GSM
GSM GSM
GSM
 
Global system for mobile communication
Global system for mobile communicationGlobal system for mobile communication
Global system for mobile communication
 
report
reportreport
report
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Mobile and information society
Mobile and information societyMobile and information society
Mobile and information society
 

Kürzlich hochgeladen

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 

Kürzlich hochgeladen (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 

Gsm architecture

  • 1.
  • 2. Content  What is GSM?  Network structure  GSM system architecture  Mobile Station (MS)  Base Station Subsystem (BSS)  Network Switching Subsystem (NSS)  Characteristics 2
  • 3. What is GSM?  The Global System for Mobile communications is a digital cellular communications system.  Based on digital technology.  The standardized system had to meet certain criteria’s:  Spectrum efficiency  International roaming  Low mobile and base stations costs  Good subjective voice quality  Ability to support new services 3
  • 4. Network structure  Cell  Location area  MSC service area  PLMN service area  GSM service area 4
  • 5. Cell A cell is the basic unit of a cellular system and is defined as the radio coverage given by one BTS. Location area  A group of cells served by one or more BSC.  Within the network, a subscribers' location is known by the LA which they are in.  The identity of the LA in which an MS is currently located is stored in the VLR. 5
  • 6.  MSC Service Area An MSC Service Area is made up of LAs and represents the geographical part of the network controlled by one MSC.  PLMN service area A PLMN service area is the entire set of cells served by one network operator. Defined as the area in which an operator offers radio coverage and access to its network. 6
  • 7.  GSM service area The GSM service area is the entire geographical area in which a subscriber can gain access to a GSM network. 7
  • 8. GSM system architecture  Mobile Station (MS)  Base Station Subsystem (BSS)  Network Switching Subsystem(NSS) 8
  • 9. Mobile Station (MS) The Mobile Station is made up of two entities: 1. Mobile Equipment (ME) 2. Subscriber Identity Module (SIM) 9
  • 10. Mobile Equipment (ME)  Portable, vehicle mounted, hand held device.  Uniquely identified by an IMEI (International Mobile Equipment Identity).  Voice and data transmission.  Monitoring power and signal quality of surrounding cells for optimum handover.  Power level : 0.8W – 20 W  160 character long SMS. 10
  • 11. Subscriber Identity Module (SIM)  Smart card contains the International Mobile Subscriber Identity (IMSI)  Allows user to send and receive calls and receive other subscribed services  Protected by a password or PIN  Can be moved from phone to phone – contains key information to activate the phone 11
  • 12. Base Station Subsystem (BSS) It consists of 2 major hardware components:  Base Transceiver Station (BTS)  Base Station Controller (BSC) 12
  • 13. Base Transceiver Station (BTS)  The BTS contains the RF components that provide the air interface for a particular cell .  Encodes, encrypts, multiplexes, modulates and feeds the RF signals to the antenna.  Communicates with Mobile station and BSC.  Consists of Transceivers (TRX) units. 13
  • 14. Base Station Controller (BSC)  Provides the control for the BSS.  Communicates directly with the MSC.  May control single or multiple BTS.  In charge of handovers, frequency hopping, exchange functions and control of power level of BTS. 14
  • 15. Network Switching Subsystem(NSS) The system contains the following functional units  Mobile Switching Center (MSC)  Home Location Register (HLR)  Visitor Location Register (VLR)  Authentication Center (AUC)  Equipment Identity Register (EIR)  Operation and maintenance center (OMC) 15
  • 16. Mobile Switching Center (MSC)  Central component of NSS.  MSC performs the switching functions.  Each MSC provides service to MS located within a defined geographic coverage area. 16
  • 17. Home Location Register (HLR)  Stores information about each subscriber that belongs to its MSC in permanent and temporary fashion.  As soon as mobile subscriber leaves its current local area, the information in the HLR is updated.  Database contains IMSI, prepaid/postpaid, roaming restrictions and supplementary services. 17
  • 18. Visitor Location Register (VLR) The Visitor Location Register (VLR) contains the information about subscriber parameters and location information for all mobile subscribers currently located in the geographical area controlled by that VLR. Authentication Center (AUC) It is used for security purposes. Authentication is a process to verify the subscriber SIM. AUC & HLR collectively authenticate the subscribers. 18
  • 19. Equipment identity register (EIR)  Stores all devices identifications registered for this network.  Database that is used to track handsets using the IMEI.  White or Valid list  Grey or Monitored list  Black or prohibited list Operation and maintenance center (OMC)  The Operation and maintenance Center (OMC) is the centralized maintenance and diagnostic heart of the base station system (BSS).  It allows the network provider to operate, administer , and monitor the functioning of the BSS. 19
  • 20. 20
  • 21. Characteristics  Fully digital system using 900,1800 MHz frequency band.  User/terminal authentication for fraud control.  Full international roaming capability.  Low speed data services (up to 9.6 Kb/s).  Compatibility with ISDN.  Support of Short Message Service (SMS). 21