gsm3
gsm3
gsm3
INTRODUCTION TO GSM
GSM:-
Global System for Mobile Communication (GSM), is a set of European
Telecommunication Standards Institute specifying the infrastructure for a
digital cellular service. This standard is used in approx. 85 countries in the
world including such locations as Europe, Japan and Australia.
1
1.2.2 The Network & Switching Subsystem (NSS):-
Home Location Register (HLR) - A database which stores data about GSM
subscribers, including the Individual Subscriber Authentication Key (Ki) for
each Subscriber Identity Module (SIM).
Base Transceiver Station (BTS) - The network element which handles the
radio interface to the mobile station. The BTS is the radio equipment
(transceivers and antennas) needed to service each cell in the network.
2
Gateway Mobile Services Switching Center (GMSC) - A network element
used to interconnect two GSM networks.
Example: ABC Communications Inc. orders 1000 MSE Units with the
following range of IMSIs.
3
Once the range of IMSI numbers has been determined, the HLR can be
populated with the new IMSI records that will be configured and activated at
a future date by authorized sales or service subscription representatives. The
fact that the HLR can be populated with ranges or blocks of IMSI numbers
creates efficiencies in the storage and retrieval of routing information.
4
Figure 1. General architecture of a GSM network
5
The Base Transceiver Station houses the radio transceivers that define a cell
and handles the radio-link protocols with the Mobile Station. In a large
urban area, there will potentially be a large number of BTSs deployed, thus
the requirements for a BTS are ruggedness, reliability, portability, and
minimum cost.
The Base Station Controller manages the radio resources for one or more
BTS. It handles radio-channel setup, frequency hopping, and handovers, as
described below. The BSC is the connection between the mobile station and
the Mobile service Switching Center (MSC).
The MSC provides the connection to the fixed networks (such as the PSTN
or ISDN). Signaling between functional entities in the Network Subsystem
uses Signaling System Number 7 (SS7), used for trunk signaling in ISDN
and widely used in current public networks.
The Home Location Register (HLR) and Visitor Location Register (VLR),
together with the MSC, provide the call-routing and roaming capabilities of
GSM. The HLR contains all the administrative information of each
subscriber registered in the corresponding GSM network, along with the
current location of the mobile.
The location of the mobile is typically in the form of the signaling address
of the VLR associated with the mobile station. The actual routing procedure
will be described later. There is logically one HLR per GSM network,
although it may be implemented as a distributed database.
6
subscribed services, for each mobile currently located in the geographical
area controlled by the VLR.
The other two registers are used for authentication and security purposes.
The Equipment Identity Register (EIR) is a database that contains a list of all
valid mobile equipment on the network, where each mobile station is
identified by its International Mobile Equipment Identity (IMEI).
• Authentication
• Encryption
• Key generation
7
The same Session Key (Kc) is used as long as the Mobile Services
Switching Center (MSC) does not authenticate the Mobile Station again. In
practice, the same Session Key (Kc) may be in use for days.
A8's task is to generate the 64-bit Session Key (Kc), from the 128-bit
random challenge (RAND) received from the Mobile Services Switching
Center (MSC) and from the 128-bit Individual Subscriber Authentication
Key (Ki) from the Mobile Station's Subscriber Identity Module (SIM) or the
Home Location Register (HLR).
One Session Key (Kc) is used until the MSC decides to authenticate the MS
again. This might take days.
A8 actually generates 128 bits of output. The last 54 bits of those 128 bits
form the Session Key (Kc). Ten zebro-bits are appended to this key before it
is given as input to the A5 algorithm.
8
SRES is the 32-bit Signed Response generated by the Mobile Station and the
Mobile Services Switching Center.
Kc is the 64-bit ciphering key used as a Session Key for encryption of the
over-the-air channel. Kc is generated by the Mobile Station from the random
challenge presented by the GSM network and the Ki from the SIM utilizing
the A8 algorithm.
9
1.5.2 Traffic channels:-
A traffic channel (TCH) is used to carry speech and data traffic. Traffic
channels are defined using a 26-frame multiform, or group of 26 TDMA
frames. The length of a 26-frame multiform is 120 ms, which is how the
length of a burst period is defined (120 ms divided by 26 frames divided by
8 burst periods per frame). Out of the 26 frames, 24 are used for traffic, 1 is
used for the Slow Associated Control Channel (SACCH) and 1 is currently
unused (see Figure 2). TCHs for the uplink and downlink are separated in
time by 3 burst periods, so that the mobile station does not have to transmit
and receive simultaneously, thus simplifying the electronics.
In addition to these full-rate TCHs, there are also half-rate TCHs defined,
although they are not yet implemented. Half-rate TCHs will effectively
double the capacity of a system once half-rate speech coders are specified
(i.e., speech coding at around 7 kbps, instead of 13 kbps). Eighth-rate TCHs
are also specified, and are used for signaling. In the recommendations, they
are called Stand-alone Dedicated Control Channels (SDCCH).
10
already in dedicated mode monitor the surrounding base stations for
handover and other information. The common channels are defined within a
51-frame multiframe, so that dedicated mobiles using the 26-frame
multiframe TCH structure can still monitor control channels. The common
channels include:
Broadcast Control Channel (BCCH)
Continually broadcasts, on the downlink, information including base
station identity, frequency allocations, and frequency-hopping
sequences.
Frequency Correction Channel (FCCH) and Synchronization Channel (SCH)
Used to synchronize the mobile to the time slot structure of a cell by
defining the boundaries of burst periods, and the time slot numbering.
Every cell in a GSM network broadcasts exactly one FCCH and one
SCH, which are by definition on time slot number 0 (within a TDMA
frame).
Random Access Channel (RACH)
Slotted Aloha channel used by the mobile to request access to the
network.
Paging Channel (PCH)
Used to alert the mobile station of an incoming call.
Access Grant Channel (AGCH)
Used to allocate an SDCCH to a mobile for signaling (in order to
obtain a dedicated channel), following a request on the RACH.
The F burst, used on the FCCH, and the S burst, used on the SCH, have the
same length as a normal burst, but a different internal structure, which
differentiates them from normal bursts (thus allowing synchronization). The
access burst is shorter than the normal burst, and is used only on the RACH.
11
1.5.5 Speech coding:-
GSM is a digital system, so speech which is inherently analog, has to be
digitized. The method employed by ISDN, and by current telephone systems
for multiplexing voice lines over high speed trunks and optical fiber lines, is
Pulse Coded Modulation (PCM). The output stream from PCM is 64 kbps,
too high a rate to be feasible over a radio link. The 64 kbps signal, although
simple to implement, contains much redundancy. The GSM group studied
several speech coding algorithms on the basis of subjective speech quality
and complexity (which is related to cost, processing delay, and power
consumption once implemented) before arriving at the choice of a Regular
Pulse Excited -- Linear Predictive Coder (RPE--LPC) with a Long Term
Predictor loop. Basically, information from previous samples, which does
not change very quickly, is used to predict the current sample.
12
CHAPTER-2
CORE ARCHITECTURE OF NETWORK AND SWITCHING
SUBSYTEM
13
Mobile switching center (MSC):-
Description:-
The mobile switching center (MSC) is the primary service delivery node for
GSM, responsible for handling voice calls and SMS as well as other services
(such as conference calls, FAX and circuit switched data). The MSC sets up
and releases the end-to-end connection, handles mobility and hand-over
requirements during the call and takes care of charging and real time pre-
paid account monitoring.
In the GSM mobile phone system, in contrast with earlier analogue services,
fax and data information is sent directly digitally encoded to the MSC. Only
at the MSC is this re-coded into an "analogue" signal (although actually this
will almost certainly mean sound encoded digitally as PCM signal in a 64-
kbit/s timeslot, known as a DS0 in America).
There are various different names for MSCs in different contexts which
reflects their complex role in the network, all of these terms though could
refer to the same MSC, but doing different things at different times.The
gateway MSC (G-MSC) is the MSC that determines which visited MSC the
subscriber who is being called is currently located. It also interfaces with the
PSTN. All mobile to mobile calls and PSTN to mobile calls are routed
through a G-MSC. The term is only valid in the context of one call since any
MSC may provide both the gateway function and the Visited MSC function,
however, some manufacturers design dedicated high capacity MSCs which
do not have any BSSs connected to them. These MSCs will then be the
Gateway MSC for many of the calls they handle.
14
Mobile switching centre server (MSCS):-
The mobile switching centre server is a soft-switch variant of the mobile
switching centre, which provides circuit-switched calling, mobility
management, and GSM services to the mobile phones roaming within the
area that it serves. MSS functionality enables split between control
(signalling) and user plane (bearer in network element called as media
gateway/MG), which guarantees more optimal placement of network
elements within the network. MSS and MGW media gateway makes it
possible to cross-connect circuit switched calls switched by using IP, ATM
AAL2 as well as TDM. More information is available in 3GPP TS 23.205.
The home location register (HLR) for obtaining data about the SIM and
mobile services ISDN number (MSISDN; i.e., the telephone number). The
base station subsystem which handles the radio communication with 2G and
2.5G mobile phones. The UMTS terrestrial radio access network (UTRAN)
which handles the radio communication with 3G mobile phones. The visitor
location register (VLR) for determining where other mobile subscribers are
located. Other MSCs for procedures such as handover.
Implemented procedures:-
Tasks of the MSC include:
15
mobile network (PLMN), though one international mobile subscriber
identity (IMSI)/MSISDN pair can be associated with only one logical HLR
(which can span several physical nodes) at a time.
The HLR stores details of every SIM card issued by the mobile phone
operator. Each SIM has a unique identifier called an IMSI which is the
primary key to each HLR record.
The next important items of data associated with the SIM are the MSISDNs,
which are the telephone numbers used by mobile phones to make and
receive calls. The primary MSISDN is the number used for making and
receiving voice calls and SMS, but it is possible for a SIM to have other
secondary MSISDNs associated with it for fax and data calls. Each MSISDN
is also a primary key to the HLR record. The HLR data is stored for as long
as a subscriber remains with the mobile phone operator.
Examples of other data stored in the HLR against an IMSI record is:
The VLR for handling requests from mobile phones to attach to the network
16
The voice mail system for delivering notifications to the mobile phone that a
message is waiting
The AUC for authentication and ciphering and exchange of data (triplets)
Procedures implemented:-
The main function of the HLR is to manage the fact that SIMs and phones
move around a lot. The following procedures are implemented to deal with
this:
Send the subscriber data to a VLR or SGSN when a subscriber first roams
there.
Broker between the G-MSC or SMSC and the subscriber's current VLR in
order to allow incoming calls or text messages to be delivered.
Remove subscriber data from the previous VLR when a subscriber has
roamed away from it.
Description:-
The authentication centre (AUC) is a function to authenticate each SIM card
that attempts to connect to the GSM core network (typically when the phone
is powered on). Once the authentication is successful, the HLR is allowed to
manage the SIM and services described above. An encryption key is also
generated that is subsequently used to encrypt all wireless communications
(voice, SMS, etc.) between the mobile phone and the GSM core network.
If the authentication fails, then no services are possible from that particular
combination of SIM card and mobile phone operator attempted. There is an
additional form of identification check performed on the serial number of the
mobile phone described in the EIR section below, but this is not relevant to
17
the AUC processing. Proper implementation of security in and around the
AUC is a key part of an operator's strategy to avoid SIM cloning.
The AUC does not engage directly in the authentication process, but instead
generates data known as triplets for the MSC to use during the procedure.
The security of the process depends upon a shared secret between the AUC
and the SIM called the Ki. The Ki is securely burned into the SIM during
manufacture and is also securely replicated onto the AUC. This Ki is never
transmitted between the AUC and SIM, but is combined with the IMSI to
produce a challenge/response for identification purposes and an encryption
key called Kc for use in over the air communications.
Description:-
The visitor location register is a temporary database of the subscribers who
have roamed into the particular area which it serves. Each base station in the
network is served by exactly one VLR, hence a subscriber cannot be present
in more than one VLR at a time.
The data stored in the VLR has either been received from the HLR, or
collected from the MS. In practice, for performance reasons, most vendors
integrate the VLR directly to the V-MSC and, where this is not done, the
VLR is very tightly linked with the MSC via a proprietary interface.
Authentication data.
18
Other GSM core network elements connected to the VLR:-
The VLR connects to the following elements:
The V-MSC to pass needed data for its procedures; e.g., authentication or
call setup.
The HLR to request data for mobile phones attached to its serving area.
Other VLRs to transfer temporary data concerning the mobile when they
roam into new VLR areas. For example, the temporal mobile subscriber
identity (TMSI).
Procedures implemented:-
The primary functions of the VLR are:
To inform the HLR that a subscriber has arrived in the particular area
covered by the VLR.
To track where the subscriber is within the VLR area (location area) when
no call is ongoing.
19
stolen mobile phones. In theory all data about all stolen mobile phones
should be distributed to all EIRs in the world through a Central EIR. It is
clear, however, that there are some countries where this is not in operation.
The EIR data does not have to change in real time, which means that this
function can be less distributed than the function of the HLR. The EIR is a
database that contains information about the identity of the mobile
equipment that prevents calls from stolen, unauthorized or defective mobile
stations. Some EIR also have the capability to log Handset attempts and
store it in a log file.
20
CAS-Channel Associated Signal.
The SS7 network and protocol are used for providing intelligent network
services such as:
The current SS7 / C7 network, one of the largest data network in the world,
connects together local telcos, cellular, and long-distance networks
nationwide and worldwide.
SS7/C7 protocol suite covers all 7 layers of the OSI model as showing in the
following diagram:
21
Application ASP provides the functions of Layers 4 through 6
ASP
Service Part of the OSI model.
Bearer BICC is a call control protocol based on ISUP
Independent used between serving nodes to support the ISDN
BICC
Call Control services independent of the bearer technology and
protocol signalling message transport technology used.
BISUP is an ATM protocol intended to support
services such as high-definition television
B-ISDN User
BISUP (HDTV), multilingual TV, voice and image
Part
storage and retrieval, video conferencing, high-
speed LANs and multimedia.
DUP defines the necessary call control, and
facility registration and cancellation related
DUP Data User Part elements for international common channel
signalling by use of SS7 for circuit-switched data
transmission services.
ISUP supports basic telephone call
connect/disconnect between end offices. ISUP
ISUP ISDN User Part was derived from TUP, but supports ISDN and
intelligent networking functions. ISUP also links
the cellular and PCS network to the PSTN.
22
Mobile MAP is used to share cellular subscriber
MAP Application information among different networks.
Part
MTP acrosses physical, data link and network
layers. It defines what interface to be used,
Message provides the network with sequenced delivery of
MTP
Transfer Part all SS7 message packets; and provides routing,
message discrimination and message distribution
functions.
Signalling SCCP provides end-to-end routing. SCCP is
SCCP Connection required for routing TCAP messages to their
Control Part proper database.
Transaction TCAP facilitates connection to an external
Capabilities database
TCAP
Application
Part
Telephone User TUP is an analog protocol that performs basic
TUP
Part telephone call connect and disconnect.
Here point code includes OPC (Origin of the Point Code) and DPC
(Destination of Point Code). Considering security purpose instead of IMSI,
TMSI (Temporary Mobile Subscriber Identity) is used in air which is
assigned by VLR. After getting TMSI, LAI and cell ID MSC will check for
VLR. When LAI get mismatched, BTS will send new LAI to MS. At the
23
home HLR and VLR, the LAI also get transferred. Data rate in air interface
is half rate is 5.6kbps , full rate is 13kbps. TCU is used to converting13kbps
(BSC) to 64kbps(MSC).
In call processor one block is allocated for memory block and for storing
CDR data (call detailed record) that is time duration etc. that get generated
after completion of a call. Another equipment called data storage unit will be
allocated is hard disk. After CDR gets filled MSC is pushed towards data
storage unit. Billing application is categorized according to the user.
Signaling or signal processing unit is used for processing signal messages.
24
CHAPTER-3
3.1.1Architecture:
The architecture of the DMS uses modular concepts in both hardware and
software. Each hardware module has its own microprocessor. By distributing
microprocessor controlled modules throughout the DMS, the master Central
Processing Unit (CPU) is relieved of many time-consuming functions and
thus can perform higher level functions.
25
BRISC processor and memory and System Load Module (SLM) in both
Supernode and Supernode SE (SNSE) module.
26
Call Processor (XA_core) & Data Manager (SDM)
3.3.1 XA-Core :-
It is the computing engine for the entire DMS-MSC and is a part of the
service processing hardware layer of the DMS-MSC. It controls all events
on switch, including call processing, call accounting and switching
performance. It contains a dedicated processor system known as Supporting
Operating System (SOS).
27
Since all elements are expandable and modular in nature, the no. of cross
point cards can be increased for provision according to the need of the
switch.
AXU- Alarm Cross connect Unit- Alarm extension and display is also
provided for the security of the components of the Nortel networks.
28
Cards: It is a Printed Circuit Board. It is having electronic
components. Also known as a circuit packs and are equipped in shelves.
The external distribution cables, their associated protective devices, and the
internal cable to the central office line unit terminals are wired and laced
neatly.
29
3.5 OMC-S Design Features:-
By using the network service platform and CEM, the existing design
features can be viewed for display. The hardware details, cards presented in
it, shelves connected to it, dummy card, connection between each cards and
current status of the cards can be viewed by using this design concept.
The opening of the platform is shown as follows: Since the main design is
concerned with the Chennai location the Chennai lab get assigned as
CHNLAB.
By opening the entire group the details get furnished with indication the
main MSC of that connection. The connection to this MSC can be studied by
studying the Core Element Manager of the chosen MSC.
30
This can be illustrated as follows:
Here the total no. of alarms over the DMS MSC is displayed and also its
nature is indicated by different colours. The next step of the design is to
show the connected elements of the Chennai MSC. This will illustrate the
elements as NET, COMPCORE, CCS, TRKGRP, MS. The details will be
further included while discussing the interior parts of the elements.
31
The arrow mark that indicated in the design will show the details of the sub
components that get connected to the MSC.
32
Further the XAC-0(XA-Core) is indicating the further components that get
attached to it. The further components are indicating their service provided
by them to the core components.
Here XA-Core consisting of many shelves that would include the cards that
get specified for some applications. It also includes$ the both rear and front
part where different functions will be carried out. This will basically
including both SM(Shared Memory) and PE(Processor Element) that
controls the basic data that is needed for the controlling purpose.
33
The next item considered is CCS(Common Channel Signal). This item is
configured for signaling purpose. This configuration is done at call
processor. It is used for configuring from MSC to various routes. This
signaling links will carry information pertaining to connected nodes that is
other MSC, BSCs, PSTN exchanges, etc…
The link set that includes the circuits that get configured for the basic
functions. The basic components that get involved in both the link set and
root set are TESTBSCTL, TESTCDOT, LIGHTGSMTL.
The various functions for them are TESTBSCTL is used for moving the
control to the BSC, TESTCDOT is used for moving the control to the PSTN
Exchange, LIGHTGSMTL is used for moving the control to the another
MSC.
34
The other component included here is NET, which includes the basic
structure as shelves having front and rear parts. This gets mainly included in
the function of providing network and routing of the different paths or
components that get connected to it.
The major parts get included in this are link and the clock circuit. Link gets
controlled over the circuits that get assigned for the specific purpose. It
basically includes the circuits that are enabling different functions.
Clock is providing the similar function as that of the synchronize clock that
are basically present in the microprocessors. Since the basic data controller
is microprocessor it includes the basic function as clock for their functions.
The Trunk: The trunk components that included in this design configuring
the functions as two way trunk, BCC trunk, MSC trunk, trunk sum.
35
Trunk is the unit where all the components gets terminated. It is the one that
provide route for all the connection.
The basic trunk design includes the following components and as follows:
36
The trunk unit indicates the different users that get connected to it. This gets
connected with TESTCODT. The different users that get connected with the
trunk unit in this design are 31 users simultaneously.
37
CHAPTER-4
The MSC stores global title translation tables that are used to determine the
HLR associated with the MSISDN. When only one HLR exists, the
translation tables are trivial. When more than one HLR is used however, the
translations become extremely challenging, with one translation record per
subscriber (see the example below). Having determined the appropriate HLR
address, the MSC sends a Routing Information Request to it.
When the HLR receives the Routing Information Request, it maps the
MSISDN to the IMSI, and ascertains the subscribers' profile including the
current VLR at which the subscriber is registered. The HLR then queries the
VLR for a Mobile Station Roaming Number (MSRN). The MSRN is
essentially an ISDN telephone number at which the mobile subscriber can
currently be reached. The MSRN is a temporary number that is valid only
for the duration of a single call.
38
The HLR generates a response message, which includes the MSRN, and
sends it back across the SS7 network to the MSC. Finally, the MSC attempts
to complete the call using the MSRN provided.
The new HLR can be populated with service subscription records as new
subscribers are brought into service or existing service subscription records
can be ported from the old HLR to the new HLR to more evenly distribute
the SS7 traffic load.
Typically, when new subscribers are brought into service, the second HLR
will be populated with blocks of IMSI numbers that are allocated when new
MSE equipment is ordered. As the following example shows, this grouping
of IMSI numbers within a single HLR simplifies the routing translations that
are required within the SS7 network for VLR to HLR Location Update
Request transactions. Global Title Translation (GTT) tables will contain
single translation records that translate an entire range of IMSIs numbers
into an HLR address. Even if some individual records are moved between
the HLRs, as shown in the example, the treatment of IMSIs as blocks results
in a significant simplification of the Global Translation tables.
Much more complicated SS7 message routing Global Title Translations are
required for Routing Information Request transactions between the MSCs
distributed over the entire wireless carrier serving area and the two or more
HLRs. MSC Routing Information Requests are routed to the appropriate
HLR based on the dialed MSISDN and not the IMSI. Unlike the IMSI
numbers, the MSISDN numbers cannot easily be arranged in groups to
reside within a single HLR and therefore, the MSC must contain an
MSISDN to HLR address association record for every mobile subscriber
homed on each of the MSCs. As the example illustrates, the MSC routing
tables quickly grow much more extensive than the STP tables. The network
administration becomes increasingly complex and prone to error.
39
4.1 HLR data:-
It provides data for subscriber creation by adding entries in the data tables.
There are four tables to be accessed and subscribers entry to be added.
• GHLRAUTH
• GHLRBSVC
• GHLRSSOP
• GHLRDATA
The data will be entered in the table by giving the command “ADD”
GHLRAUTH:-
In this table GSM - HLR gets authenticated. IMSI, Ki values gets entered in
this table. In this table IMSI number get its format from ICCID (Integrated
Circuit Card Identity ) number. ICCID is nothing but the number that is
available at the backside of the SIM card.
It is the one which provides the MCC, MNC and MSIN where
MCC(Mobile Country Code) represents the country of the MSC, MNC
(Mobile Network Code) represents the network operator of the MSC, MSIN
(Mobile Subscriber Identity Number) is the unique subscriber number. It is
derived from the ICCID by using the following format.
40
ICCID format – 20 digits
1-2 = Industrial code of the telecom (89)
3-4 = Country code (91)
5-6 = Mobile network code (74/XX)
7th = Last digit of the year (2011=1)
8-9 = Month (mm)
th
10 = For feature use
th
11 = Zonal code
th
12 = HLR code
th
13 = Prepaid/Postpaid
14-19 = Running counter (Random)
20 = Check digit generated by Luhn
Formula
By using ‘lis all’ command all the details get detailed out.
Here enter the MCC, MNC, MSIN number that to be generated along with
the Ki and CS value. Also include the value of MKVER(MK Version) as 1,
ALSEL(Algorithm Selector)as 8 and ALGPARM_SEL as NIL.
GHLRBSVC:-
This table provides basic service to the network, provides identity for newly
entered mobile subscriber. Mainly it provides some basic telephony services.
Here also “format pack” and “lis all” commands are used for viewing the
details.
By using format pack and lis all commands view all the contents of the
table. Similarly by using add command enter IMSI number and conform
SSPROV as CLIP and over ride as Not Permitted (NP). This gets conformed
by saying yes to the commands.
GHLRDATA:-
It provides data for the activation of the number, activated status will be
executed in this table only. It is the table by which the mobile gate activated
for further commitments.
4.2 HLRADMIN:-
It is a tool used to view the details from the HLR regarding the current SIM
number that has been uploaded. It provides the details about MSISDN, VLR,
Location Update, MSC number, services provided to them etc…
42
CHAPTER-5
CALL PROCESSING
The location updating procedures, and subsequent call routing, use the MSC
and two location registers: the Home Location Register (HLR) and the
Visitor Location Register (VLR). When a mobile station is switched on in a
new location area, or it moves to a new location area or different operator's
PLMN, it must register with the network to indicate its current location. In
the normal case, a location update message is sent to the new MSC/VLR,
which records the location area information, and then sends the location
information to the subscriber's HLR. The information sent to the HLR is
normally the SS7 address of the new VLR, although it may be a routing
number. The reason a routing number is not normally assigned, even though
it would reduce signaling, is that there is only a limited number of routing
numbers available in the new MSC/VLR and they are allocated on demand
for incoming calls. If the subscriber is entitled to service, the HLR sends a
subset of the subscriber information, needed for call control, to the new
43
MSC/VLR, and sends a message to the old MSC/VLR to cancel the old
registration.
For reliability reasons, GSM also has a periodic location updating procedure.
If an HLR or MSC/VLR fails, to have each mobile register simultaneously
to bring the database up to date would cause overloading. Therefore, the
database is updated as location updating events occur. The enabling of
periodic updating, and the time period between periodic updates, is
controlled by the operator, and is a trade-off between signaling traffic and
speed of recovery. If a mobile does not register after the updating time
period, it is deregistered.
The same initial random number and subscriber key are also used to
compute the ciphering key using an algorithm called A8. This ciphering key,
together with the TDMA frame number, use the A5 algorithm to create a
114 bit sequence that is XORed with the 114 bits of a burst (the two 57 bit
blocks). Enciphering is an option for the fairly paranoid, since the signal is
already coded, interleaved, and transmitted in a TDMA manner, thus
providing protection from all but the most persistent and dedicated
eavesdroppers.
44
Another level of security is performed on the mobile equipment itself, as
opposed to the mobile subscriber. As mentioned earlier, each GSM terminal
is identified by a unique International Mobile Equipment Identity (IMEI)
number. A list of IMEIs in the network is stored in the Equipment Identity
Register (EIR). The status returned in response to an IMEI query to the EIR
is one of the following:
The routing information that is returned to the GMSC is the Mobile Station
Roaming Number (MSRN), which is also defined by the E.164 numbering
plan. MSRNs are related to the geographical numbering plan, and not
assigned to subscribers, nor are they visible to subscribers.
The most general routing procedure begins with the GMSC querying the
called subscriber's HLR for an MSRN. The HLR typically stores only the
45
SS7 address of the subscriber's current VLR, and does not have the MSRN
(see the location updating section). The HLR must therefore query the
subscriber's current VLR, which will temporarily allocate an MSRN from its
pool for the call. This MSRN is returned to the HLR and back to the GMSC,
which can then route the call to the new MSC. At the new MSC, the IMSI
corresponding to the MSRN is looked up, and the mobile is paged in its
current location area (see Figure 4).
46
setup. Assuming that the passes comp ability checking it
acknowledges the call setup with a setup confirm message
• In this scenario it is assumed that the mobile subscriber answers the
phone. The MS in response to this action stops alerting and sends a
connect message to the MSC
• The MSC removes audible to the PSTN and connects the PSTN trunk
to the BSS trunk(terrestrial channel) and sends a connect message via
the GMSC to the PSTN. The caller and called party now have a
complete talk path. This event typically denotes the beginning of the
call for billing purposes
• The MSC sends the MS a connect acknowledgment message
• The release triggered by the land user is done in a similar way as the
release triggered by the mobile user
• The MSC receives a Release message from the network to terminate
the end-to-end connection
• This cause the sending of a disconnect message toward the MS
• The MS answers by a release message. The MSC release the
connection to the PSTN.
The mobile-to-mobile call is established using the same phases as seen
earlier
• The originating mobile part where the phases are the same as those of
a mobile-to-land call except that the call setup phase is partially
performed. Which means that only the call setup with Mobile is done
• The terminating mobile part consist of the same phases as the land-to-
mobile call scenario except again that the call setup phase performs
only the call setup with mobile
47
The Phases of Originating Mobile Request for service,
Authentication(optional),Ciphering(optional),Equipment
validation(optional),call setup, release
48
5.5.5 Equipment Validation:-
The Mobile Equipment (ME) validation process is the means by which a
specific piece of ME can be identified to prevent the use of stolen,
unauthorized or malfunctioning equipment in the network. Each
equipment is uniquely identified by an International Mobile Equipment
Identity (IMEI) code. IMEI which is incorporated into ME by the
manufacturer, has three components, such as
49
equipment number and checks the equipment against information in
the Equipment Identity Register(EIR)
The call is setup with the MS. A voice path is created between the MS and
the MSC by allocating a radio traffic channel and a voice trunk.
• The MS transmits a call setup request message to the MSC/VLR after
it has ciphered the radio channel. Included in this request message are
50
the dialed digits. The MSC upon receiving the call setup request
message, will request the VLR to supply subscriber parameters
necessary for handling the call. The VLR will check for call barring
conditions, such as the MS being barred from making specific
outgoing calls (e.g. international calls) or possibly if some
supplementary services are active which prevent the call from being
granted. If the VLR determines that the call cannot be processed, the
VLR will provide the reason to the MSC. In this scenario, we will
assume that this procedure is successful. The VLR returns a message
to the MSC containing the service parameters for the particular
subscriber.
• The MSC informs the MS that the call is proceeding.
The next four steps involve establishing a voice path between the MSC and
the MS
• The MSC allocates a trunk to the BSS currently serving the MS. The
MSC sends a message to the BSS supplying it with the trunk number
allocated (TN), and requests the BSS to allocate a radio traffic
channel(TCH) for the MS
51
• The BSS allocates a radio traffic channel and transmits this
assignment to the MS over the SDCCH
• The MS tunes to the assigned radio traffic channel and transmits an
acknowledgement to the BSS.
• The BSS connects the radio traffic channel to the assigned trunk of the
MSC. Since a small portion of a radio traffic channel is available for
out-of-band signaling, the SDCCH is no longer used for signaling
between the BSS and MS. The BSS de-allocates the SDCCH. The
BSS then transmits a trunk and radio assignment complete message to
the MSC
52
subscriber dials the directory number of the mobile subscriber and the call
enters the GSM network via a Gateway MSC(GMSC)
• The PSTN routes the call to the GMSC of this directory number.
based on the Mobile Subscriber ISDN Number(MSISDN)
• The GMSC not knowing whether this MS is roaming in its own
service area or not sends a message with the MSISDN in it to the HLR
• The HLR requests the MSC/VLR to provide routing information
about this
• The MSC/VLR returns to the GMSC via the HLR a directory number
where the MS can be reached which is referred to as the MS Roaming
Number(MSRN)
• The call is routed from the GMSC to the visited MSC
The call has been initialized between the two mobile stations which have
been inserted which contain the newly activated SIM cards generated by us.
Here the call has been initiated by 9442000007. First the request for the call
has been given to the MSC. From MSC Base Station will receive
acknowledgement. Then the call set up will be made and then the paging
will be done by MSC and the response will be received from BS.
53
Then the ID request will be provided and then the call set up is made from
which the connection is made and the alert will be given to the opponent.
After the conversation is over the call will get released and when the
opponent also get cancelled the set up clear of the call set up will be
provided.
The calling details, called duration, date and time of the call, number of calls
made, the MSC number and also further details will recorded in a file known
as CDR(Customer Detailed Record). It is the one in which the details will be
furnished and can be retrieved later. It is highly used in the case where the
details are needed for authentication purpose, needed for verification for the
list whether belong to the white, grey or black list.
The details for the calls generated the number created by us will be stored in
CDR file is given as follows:
The CDR file will be stored in the root file which can be entered by logging
in and entering the password. This will provide the contents in the root file.
It contains the list that having many options which include set, listfile, query
etc…
The further details can be obtained as from the table is tools and from there
cdr view can be analyzed by giving the corresponding file name from where
the further details can be obtained. From which the date, time and further
details can be obtained.
The details of the called number and the details have been furnished as
above for the given numbers.
CONCLUSION
54
We are studied the Network & Switching Subsystem in GSM Now
we know the call connecting, call routing, location updating. What are all the
procedure to create a subscriber and give the other facility like call
forwarding, call waiting, conference call.
Call recorder billing section how the location identity.We are tested
in practically in BSNL RGMTTC
References
55
1. R. Blake, “ Wireless Communication Technology”, Thomson Delmar,
2003
56