Cellular Mobile Communication Systems Lecture 8

Slides:



Advertisements
Similar presentations
GSM infrastructure MSC, BSC, BTS, VLR, HLR, GSGN, GSSN
Advertisements

Mobile Cellular Networks Evolution –1st generation, 1980s analogue voice –2nd generation 1990s digital Voice, fax data 95% coverage of UK by 1991 –3rd.
GSM Network Overview Um Abis A BSC BTS Mobile Station HLR VLR EIR AuC
Tutorial 6 Mobile Communication Networks Mohamed Esam.
GSM.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
IN Intelligent Network Basic IN concept & technology
Cellular Communication. Evolution to cellular networks – communication anytime, anywhere radio communication was invented by Nokola Tesla and Guglielmo.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM 1. 2 GSM Mobility Management Originals by: Rashmi Nigalye, Mouloud Rahmani, Aruna Vegesana, Garima Mittal, Fall 2001 Prof. M. Veeraraghavan, Polytechnic.
1 Channel Overview 3 Types 1.Broadcast Control Channel: Point to Multipoint, Downlink (BTS) to MS) (A)BCCH (Board cast Control Channel) It inform the Mobile.
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
Presentation on GSM Regional Telecom Training Centre Nikhilesh Mohanty
GSM standard (continued). Multiple Access Methods Frequency Division Multiple Access (FDMA) Frequency 1 ch Frequency 2 ch Frequency N ch Time Division.
GSM standard (continued)
1G PERSONAL COMMUNICATION SYSTEMS: AMPS (PART III) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering.
GSM (Most of the slides stolen from Prof. Sridhar Iyer’s lectures)
Modes Mobile Station ( MS )
GSM Security Overview (Part 1)
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Cellular Mobile Communication Systems Lecture 7
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
GSM.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
GSM Continued.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
Mobile Computing GSM.
CDMA Network Structure and Components Lance Westberg.
GSM Network Structure Lance Westberg.
GSM Signaling Protocol Architecture. Protocols above the link layer of the GSM signaling protocol architecture provide specific functions: Radio Resource.
An Introduction to CDMA Air Interface: IS-95A
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Location Management. The trends in telecom are proceeding with a strong tendency towards increasing need of mobility in access links within the network.
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
Speech decoding Channel decoding De-interleaving Burst Formatting
Wireless Communication GSM Network Architecture
Yschen, CSIE, CCU1 Chapter 9: Existing Wireless Systems: 2G, GSM System Associate Prof. Yuh-Shyan Chen Dept. of Computer Science and Information Engineering.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
Wireless Communications Technology Lesson 5: GSM Bellevue Community College Bob Young, Instructor.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)

GSM Network Architecture
Overview of cellular system
Ασύρματα Δίκτυα και Κινητές Επικοινωνίες
2001/12/21Prof. Huei-Wen Ferng1 Chapter 7 The 2nd Generation Cellular Systems GSM: Pan-European Digital Cellular System.
Communication Protocol Engineering Lab. Hyoung Joo. Nam. 1 GSM System Overview Wireless and Mobile Network Architecture Nam Hyoung-Joo
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
GSM GPRS Global System for Mobile communication
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
7 - 1 Chapter 7 GSM: Pan-European Digital Cellular System.
1 Lecture 20 EEE 441 Wireless And Mobile Communications.
Mobile Communications: Wireless Telecommunication Systems  Market  GSM  Overview  Services  Sub-systems  Components.
9 Transmission and Switching Mohamed Ashour, German University in Cairo Mohamed Ashour Lecture Fall 2011 AC = authentication center BSS = base station.
Wireless Network PMIT- By-
GSM SECURITY AND ENCRYPTION
CALL & MOBILITY MANAGEMENT
GSM location updating procedure
Subject Name: GSM Subject Code: 10EC843
Chapter 7 The 2nd Generation Cellular Systems
GSM location updating procedure
An Introduction to CDMA Air Interface: IS-95A
Dept. of Business Administration
Security in Wide Area Networks
Presentation transcript:

Cellular Mobile Communication Systems Lecture 8 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering and Technology Taxila TI - 1011 TI - 1011

GSM Mobility Management Mobility Types Track location of users for incoming calls/SMS Location registration/authentication/paging Divide coverage area into non-overlapping groups of cells – assign each a unique id Location Area ID periodically broadcast by each cell As a mobile moves/turns phone on – it listens to location area id – if different from last one registered in – performs a location update/authentication procedure with VLR and possibly HLR Call in progress mobility Handoff call from one BTS to another BTS MAHO by mobile reporting measurements of signal strength TI - 1011

Location Management Location Area ( LA) Divide coverage into non-overlapping groups of cells Assign each LA a unique id Location Area ID is periodically broadcast by each cell Two level database hierarchy HLR/VLR HLR points to VLR where mobile located VLR entry points to LA where mobile last located TI - 1011

Location Area and Cell Identification Parameters MCC – Mobile Country Code Uniquely identify the country of the GSM subscriber MNC – Mobile Network Code Identifies the GSM operator within the country. Each country can have several GSM operators each having a unique MNC. LAC – Location Area Code Defines a location area, which consists of a group of cells. Each MNC can have several LACs. CI – Cell Identity Uniquely identifies a cell in a location area. LAI – Location Area Identity Uniquely identifies a location area in the network Made up of MCC + MNC + LAC CGI – Cell Global Identifier Uniquely identifies the cell within the network Made up of LAI + CI TI - 1011

Location Area and Cell Identification Parameters

GSM Call Management Call Operation Types Registration Upon powering up, the MS scans common control channels (CCH) and locks onto channel with strongest signal Searches for FCCH (Frequency Correction Channel) on RF carrier, finds SCH (Synchronization Channel) to synch up After synchronization the MS decodes BCCH – decides whether to update location register or not. Once registered or locked on to BCCH Mobile Originating (MO) Call Mobile types in number presses Send Mobile Terminating (MT) Call Mobile registered and phone On – received incoming TI - 1011

GSM Registration TI - 1011

GSM Registration (cont)

Location Registration Register at power up/call placement/(power down)/ when detect a new location area id Walkthrough Roaming case 1. Mobile-> MSC signals HLR update VLR pointer 2. Auc verifies user- may issue challenge/response 3. HLR – gives VLR mobile service profile 4. HLR – deregisters mobile from last VLR location Target ITU-T bound on location registration ≤ 4sec Location Update Types Intra – VLR ( LAs attached to same VLR) Only change LA id in VLR ( local signaling) Target ITU-T location update time ≤ 2 sec Inter –VLR ( LAs attached to different VLR) must signal HLR to update VLR pointer Target ITU-T Location update time ≤ 4 sec TI - 1011

Location Update Call Flow

GSM Call Management Calling From MS TI - 1011

GSM Call Management Calling To MS TI - 1011

GSM Call Management Calling To MS (cont) TI - 1011

GSM Handoffs Handoff major decision-making stages Identify the need Identify the candidate Evaluate the candidates Select a target cell Types of handoffs Intra-Cell : Handoff between sectors of same cell Intra-BSS: if old and new BTSs are attached to same base station MSC is not involved Intra-MSC: if old and new BTSs are attached to different base stations but within same MSC Inter-MSC: if MSCs are changed TI - 1011

Types of Handoffs TI - 1011

GSM Handoff Handoff Initiation: Base station or MS notices signal is weakening (when the received signal strength goes below a certain threshold value) Base station or MS sends a handoff measurement request message to BSC/MSC BSC/MSC requests Neighbour base stations to report their reception of mobile’s signal MS to measure strength of neighbour base stations on downlink (called Mobile Assisted Handoff) BSC/MSC picks neighbour base station with highest received signal strength combination in up and downlink to handoff too TI - 1011

GSM- Mobile Assisted Handoff TI - 1011

Handoff Procedure TI - 1011

Security In GSM Security services Access control/authentication User => SIM (Subscriber Identity Module): secret PIN (personal identification number) SIM => Network: challenge response method Confidentiality Voice and signalling encrypted on the wireless link (after successful authentication) Anonymity temporary identity TMSI (Temporary Mobile Subscriber Identity) newly assigned at each new location update (LUP) encrypted transmission TI - 1011

Security In GSM (cont) 3 algorithms specified in GSM A3 for authentication (“secret”, open interface) Used by handset to compute a Signed Response (SRES) to random number (RAND) sent by BS Computation uses a secret key (Ki), stored in the SIM A5 for encryption (standardized) Used to encrypt data transmitted on the DCCH and TCH Inputs to A5 are the privacy key Kc and the TDMA frame number A8 for key generation (“secret”, open interface) Uses RAND and Ki to generate a privacy key Kc Kc used for voice and data privacy TI - 1011

Authentication Algorithm A3

Ciphering Procedure A8 Algorithm TI - 1011

Authentication and Encoding

END TI - 1011