Professional Documents
Culture Documents
GSM OVERVIEW
GSM
GSM bands
GSM ARCHITECTURE
The GSM system architecture consists of three major interconnected subsystems that interact between themselves and with the users through certain network interfaces. The subsystems are 1. Base Station Subsystem 2. Network & Switching Subsystem 3. Operation & Support Subsystem
M SC ABBREVIATIONS: Base Station Syste m BSS BSC INFORM ATION TRANSM ISSION CALL CONNECTIONS AND INFORM ATION TRANSM ISSION BTS AUC AUTHENTICATION CENTRE BSC BASE STATION CONTROLLER BTS BASE TRANSCEIVER STATION EIR EQUIPM ENT IDENTITY REGISTER
A DIFFERENT VIEW
CELL LOCATION AREA MSC/VLR SERVICE AREA PLMN SERVICE AREA GSM SERVICE AREA
B G A F
CELL
VLR MSC
LA4
Cell 4 Cell 1 Cell 2 Cell 5 Cell 3 Cell 6
LA5
GSM SERVICE AREA PLMN SERVICE AREA (one per operator) MSC SERVICE AREA
C G D E F A
BSC 1C
BSC 2C
BSC 1B
BSC 2B
MSC/VLR 2
MSC/VLR 1
BASIC EQUIPMENTS
1. 2. 3. Mobile Station Base Transceiver Station Base Station Controller
4.
5. 6. 7. 8.
10
11
12
13
14
MOBILE SERVICES AND SWITCHING CENTRE (MSC) / VISITOR LOCATION REGISTER (VLR)
The MSC is a very central component of the GSM network. The MSC performs the switching functions of the network and also provides connection to other networks. It additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. The VLR is always implemented together with a MSC; so the area under control of the MSC is also the area under control of the VLR. The VLR contains selected information from a subscriber's HLR necessary for call control and provisioning of the subscribed services to the visiting user.
EELO AMERICAN UNIVERSITY
16
AUTHENTICATION CENTER
The AUC generates authentication and ciphering data. The purpose of the authentication security feature is to protect the network against unauthorized use. It also protects subscribers by denying the possibility for intruders to impersonate authorized users. The ciphering data is used to ensure that confidentiality and integrity is kept on the physical radio channels. Ciphering prevents user information and signalling to be available or disclosed to unauthorized individuals.
17