Professional Documents
Culture Documents
Layman’s view…
Areall different versions of digital
technology…
Time Division Multiple
Access
Users separated in
time
Requires digital
transmission
Normally wider
bandwidth
compared to FDMA
Used for GSM
Frequency Division
Multiple Access(FDMA)
Users separated in
frequency
Only possible in
analog system
Code Division Multiple
Access
Users separated by
code
Requires digital
transmission
Wider bandwidth
compared to TDMA
Time for History….
GSM originated in Europe…
GSM earlier known as Group Special
Mobile, a study group appointed to
study and develop European public
land mobile system
One important criteria that the proposed
system had to meet was ISDN
compatibility..
And now CDMA…
Introduced in 1980
IN North America….
Purpose…. What else
……but Military usage
Used in Cellular Communication
System , in the early 90’s
Finally ….What is
CDMA? …..
A way to transmit bits of information through
wideband, spread spectrum radio interface.
IS-95 is the transmission protocol that
employs CDMA.
Evolution from IS-95A to IS-95B to
CDMA2000
Better utilization of radio spectrum by allowing
multiple users to access the same physical
channel.
How CDMA Works?
Generating a CDMA signal
1.analog to digital conversion
2.vocoding
3.encoding and interleaving
4.channelizing the signals
5.conversion of the digital signal to a Radio
Frequency (RF) signal
How does it works……
Working of CDMA Channel Establishment
ACK
ACK
Handoff Direction
ACK
Handoff Information
ACK
Pilot Measurement Request
User
IAM Dials Call
HLR Query
HLR Response
SS7 IAM
User
IAM Dials Call
VLR Query
VLR Response
OSS
GSM
BSS
NSS MS
External Users
Networks
Entities
MS:
Physical equipment used by the
subscribers
BSS:
Physical equipment that provides radio
coverage
NSS:
Switching functions of GSM
Databases required for subscribers
Done through MSC
When an MS is switched
on…What happens??
• It first has to determine if it has access
to PLMN
• It does a location update for the same
informing its PLMN about its location
• Location of an MS is stored in a central
database
MS BSS MSC VLR PSTN
Setup
Send info for outgoing signal
GSM
CALL Call Proceeding
Complete Call
FLOW Assignment
Assignment
Assignment Complete
Assignment Complete
IAM
Assignment Complete
Alerting
(ACM)
Connect
Connect Acknowledge Answer
Privacy and Security in
GSM
Each subscriber is identified using a
cryptographic security mechanism
Subscriber security information is stored
in the SIM Card
The algorithm are stored in the SIM
card and in the authentication center.
Security Algorithms for
GSM RAND(from BS)
1.Authentication Algorithm(A3) K(I) on SIM Card
SMS-GMSC SM-SC
MSC/VLR HLR
GGSN EIR
Other PLMN
Finally Everything Together
TDMA EDGE
GSM GPRS
WCDMA
PDC
CDMA2000 IX
CDMA200 IXEV
CDMAone