gsm global system for mobile communications

25
GSM GSM Global System for Global System for Mobile Mobile Communications Communications ENGR 475 – Telecommunications ENGR 475 – Telecommunications October 31 – Halloween!! October 31 – Halloween!! Harding University Harding University Jonathan White Jonathan White

Upload: camden-patterson

Post on 31-Dec-2015

25 views

Category:

Documents


1 download

DESCRIPTION

GSM Global System for Mobile Communications. ENGR 475 – Telecommunications October 31 – Halloween!! Harding University Jonathan White. Outline. European history Operating Frequencies/ General Characteristics Why digital ISDN interface. European History. - PowerPoint PPT Presentation

TRANSCRIPT

GSMGSMGlobal System for Global System for

Mobile CommunicationsMobile Communications

ENGR 475 – TelecommunicationsENGR 475 – TelecommunicationsOctober 31 – Halloween!!October 31 – Halloween!!

Harding UniversityHarding University

Jonathan WhiteJonathan White

OutlineOutline

European historyEuropean history Operating Frequencies/ General Operating Frequencies/ General

CharacteristicsCharacteristics Why digitalWhy digital

– ISDN interfaceISDN interface

European HistoryEuropean History In the mid 1980’s, most of Europe didn’t In the mid 1980’s, most of Europe didn’t

have a cellular network.have a cellular network.– They weren’t committed to analog.They weren’t committed to analog.

After many years of research, GSM was After many years of research, GSM was proposed around 1990.proposed around 1990.– Covered Germany, France, England, and Covered Germany, France, England, and

Scandinavia.Scandinavia. Goals:Goals:

– Roaming throughout all of Europe.Roaming throughout all of Europe.– All digital to have ISDN type throughput (64 All digital to have ISDN type throughput (64

Kbps)Kbps) Never achieved.Never achieved.

– Low power and inexpensive devicesLow power and inexpensive devices

European HistoryEuropean History

Main Goal:Main Goal:– Compression of voice to allow much Compression of voice to allow much

better bandwidth usage.better bandwidth usage. GSM would use vocoders that used LPC – GSM would use vocoders that used LPC –

linear predictive coding.linear predictive coding.

GSM had an advantage in that it didn’t GSM had an advantage in that it didn’t have to support any legacy products.have to support any legacy products.

Security really wasn’t the reason Security really wasn’t the reason digital was chosen at the time.digital was chosen at the time.

European HistoryEuropean History

All of Europe began using the GSM All of Europe began using the GSM system.system.– Japan also switched to GSM and helped Japan also switched to GSM and helped

develop very inexpensive SIM cards.develop very inexpensive SIM cards. GSM was an open source standard.GSM was an open source standard.

– Products could be made by many Products could be made by many vendors.vendors.

8000 page standard was published in 8000 page standard was published in 1993.1993.

GSM ServicesGSM Services

GSM was designed to do 3 things:GSM was designed to do 3 things:– 1. Bearer data services: Faxes, text 1. Bearer data services: Faxes, text

messages, web pages.messages, web pages. Basic GSM had a basic data rate that is Basic GSM had a basic data rate that is

limited to 9.6 kbpslimited to 9.6 kbps– Extended by GMRS and EDGE to around 384 KbpsExtended by GMRS and EDGE to around 384 Kbps

– 2. Voice traffic2. Voice traffic But, at a lower quality than analog.But, at a lower quality than analog.

– 3. Other features:3. Other features: Call forwarding, caller id, etc…Call forwarding, caller id, etc…

– Meaning, we need to connect to the SS7 networkMeaning, we need to connect to the SS7 network

GSM ArchitectureGSM Architecture

Very similar to the analog Very similar to the analog architecture.architecture.

3 parts:3 parts:– Mobile PhoneMobile Phone

Digitizes and sends your voice.Digitizes and sends your voice.

– Cell phone tower / Base StationCell phone tower / Base Station Controls the radio link.Controls the radio link.

– Network switching systemNetwork switching system The brains in the system.The brains in the system.

GSM ArchitectureGSM Architecture

SIM – Subscriber Identity SIM – Subscriber Identity Module.Module.– Allows you to switch phones.Allows you to switch phones.– Stores your phonebook and Stores your phonebook and

ringtones.ringtones. ME – Mobile Equipment.ME – Mobile Equipment.

– Your cellphoneYour cellphone UM – User Mobile UM – User Mobile

FrequencyFrequency– The actual radio frequency The actual radio frequency

you are using.you are using.

GSM ArchitectureGSM Architecture

BTS – Base Transceiver Stations.BTS – Base Transceiver Stations.– The radio antennas.The radio antennas.– In GSM, 1 sends and 1 receives.In GSM, 1 sends and 1 receives.

Only 2 are necessary.Only 2 are necessary. BSC – Base Station Controller.BSC – Base Station Controller.

– Packages up all the radio signals and sends Packages up all the radio signals and sends them to the switch.them to the switch.

– Handles handoffs and some other low-level Handles handoffs and some other low-level functionality.functionality.

– Manages up to 50 or so radio antennasManages up to 50 or so radio antennas Provides better network segmentation.Provides better network segmentation.

Abis – Typically a T1 SS7 connection using Abis – Typically a T1 SS7 connection using ISUPISUP

GSM GSM ArchitectureArchitecture

MSC – Mobile Switching CenterMSC – Mobile Switching Center– Has several databases that perform call Has several databases that perform call

validation, call routing to the PSTN, and roaming validation, call routing to the PSTN, and roaming validation.validation.

– Some of the databases:Some of the databases: HLR: Home Location RegisterHLR: Home Location Register

– Main customer databaseMain customer database– Motorola only has 60 HLRs in the United States.Motorola only has 60 HLRs in the United States.

VLR: Visitor Location RegisterVLR: Visitor Location Register– Works in tandem with the HLR. Roamer database.Works in tandem with the HLR. Roamer database.

EIR: Equipment Identity RegisterEIR: Equipment Identity Register– Deny stolen mobile phones service. Has all valid serials.Deny stolen mobile phones service. Has all valid serials.

AuC: Authentication CenterAuC: Authentication Center– Stores encryption keys necessary for secure Stores encryption keys necessary for secure

communications.communications.

GSM ArchitectureGSM Architecture

Radio FrequenciesRadio Frequencies

Operates in the 1850 MHz band and Operates in the 1850 MHz band and from:from:– 1850 to 1910 MHz Mobile to Base1850 to 1910 MHz Mobile to Base– 1930 – 1990 MHz Base to Mobile1930 – 1990 MHz Base to Mobile

There are 300 forward/reverse channels in this There are 300 forward/reverse channels in this band.band.

Each channel is 200 KHzEach channel is 200 KHz GSM uses TDMA to fit 8 conversations GSM uses TDMA to fit 8 conversations

on a channel.on a channel. So, technically, GSM is TDMA and FDMA So, technically, GSM is TDMA and FDMA

based.based.

GSM Burst PeriodsGSM Burst Periods

Since GSM is TDMA based, it uses Since GSM is TDMA based, it uses burst periods to make up a frame.burst periods to make up a frame.– 8 burst periods make up one frame.8 burst periods make up one frame.– A burst is like a slot in the train.A burst is like a slot in the train.– A burst period is where a phone gets to A burst period is where a phone gets to

send digital information.send digital information. Phones send around 14 bits of information in Phones send around 14 bits of information in

every burst.every burst.

– However, a burst period only lasts .577 However, a burst period only lasts .577 ms.ms. Phones are only bursting information at around Phones are only bursting information at around

1700 times a second, much less than the 8000 1700 times a second, much less than the 8000 times a second a landline phone samples at.times a second a landline phone samples at.

GSM FramesGSM Frames

8 burst periods make 1 frame.8 burst periods make 1 frame. The frame length in time is 4.615 msThe frame length in time is 4.615 ms

– .577 ms times 8.577 ms times 8 Each frame carries 164 bitsEach frame carries 164 bits

– 114 are for voice114 are for voice– The rest are for synchronization and CRC The rest are for synchronization and CRC

checkschecks Each frame can carry up to 8 voice Each frame can carry up to 8 voice

samples, or, the frame can be dedicated to samples, or, the frame can be dedicated to other necessary information.other necessary information.

GSM FramesGSM Frames

Different frames mean different Different frames mean different things.things.– For instance, this data structure For instance, this data structure

contains information about the cell site.contains information about the cell site. The cell phone scans for this information The cell phone scans for this information

when it is turned on.when it is turned on.

GSM Frames GSM Frames

This is the burst that occurs when This is the burst that occurs when the mobile transmits its access key the mobile transmits its access key back to the base station.back to the base station.

Speech CodingSpeech Coding

GSM uses LPC – Linear Predictive Coding.GSM uses LPC – Linear Predictive Coding.– Uses interpolation.Uses interpolation.– Basically, previous samples, which don’t change Basically, previous samples, which don’t change

very quickly, are used to predict current samples.very quickly, are used to predict current samples. So, instead of actually sending the voice So, instead of actually sending the voice

sample, the delta in the voice sample is sample, the delta in the voice sample is sent.sent.

Also, silence is not transmitted.Also, silence is not transmitted.– This increases throughput by about 40%.This increases throughput by about 40%.– This bits can be used for other conversations.This bits can be used for other conversations.

Digital ModulationDigital Modulation

Uses Gaussian minimum shift keying.Uses Gaussian minimum shift keying. Very complex, uses filters, phase Very complex, uses filters, phase

shifts, and frequency shifts to shifts, and frequency shifts to actually send out binary digits.actually send out binary digits.

Power RequirementsPower Requirements

Since GSM is purely digital, it Since GSM is purely digital, it requires a lot less power since it requires a lot less power since it doesn’t have to transmit an analog doesn’t have to transmit an analog wave.wave.

The maximum output power of a The maximum output power of a GSM phone is only 2 watts.GSM phone is only 2 watts.– And this can be notched down by the And this can be notched down by the

controlling cell phone tower.controlling cell phone tower.– The minimum power is only 20 mW.The minimum power is only 20 mW.

GSM Call ProcessingGSM Call Processing

Unlike AMPS, the cell tower can Unlike AMPS, the cell tower can transmit on any of its frequencies.transmit on any of its frequencies.

The cell phone is actually pre-The cell phone is actually pre-programmed in the SIM card to have programmed in the SIM card to have a set of radio frequencies that it a set of radio frequencies that it should check first.should check first.– When this fails, it needs to search When this fails, it needs to search

through all frequencies.through all frequencies. When it detects the tower identifying When it detects the tower identifying

itself, call processing begins.itself, call processing begins.

SIM Card SecretsSIM Card Secrets

The SIM card has a secret serial The SIM card has a secret serial number that is only known by your number that is only known by your cellular provider and the SIM card.cellular provider and the SIM card.– You, as the customer, do not know the You, as the customer, do not know the

number.number. This secret number acts as a key, This secret number acts as a key,

and it is 32 bits in length.and it is 32 bits in length.

Authentication and SecurityAuthentication and Security

GSM uses a challenge/response public key GSM uses a challenge/response public key setup.setup.

The base station sends a random number to The base station sends a random number to the mobile.the mobile.– This acts as the base station’s public key.This acts as the base station’s public key.

The mobile then uses an algorithm called A3 The mobile then uses an algorithm called A3 to encrypt it’s secret key using the random to encrypt it’s secret key using the random public key that it was sent by the base public key that it was sent by the base station.station.– A5 is a derivative of DES.A5 is a derivative of DES.

Several rounds of shifts and XORs.Several rounds of shifts and XORs.

Authentication and SecurityAuthentication and Security

This encrypted information is then This encrypted information is then sent back to the base station.sent back to the base station.

The base station performs a reverse The base station performs a reverse operation, and checks to see that the operation, and checks to see that the mobile sent the correct secret code.mobile sent the correct secret code.– If not, it is denied access.If not, it is denied access.

A3 has proved to be very difficult to A3 has proved to be very difficult to break.break.– Though, given a significant amount of Though, given a significant amount of

time, it can be broken. time, it can be broken.

Authentication and SecurityAuthentication and Security

GSM also uses another database for GSM also uses another database for security.security.

This database maintains a list of This database maintains a list of stolen cell phones, and cell phones stolen cell phones, and cell phones that have technical errors.that have technical errors.– These are also not allowed access to the These are also not allowed access to the

digital network.digital network.

GSM conclusionGSM conclusion Widely used.Widely used.

– Upwards of 70% of phones.Upwards of 70% of phones. Uses SIM cards so customers can use any Uses SIM cards so customers can use any

phone and for security.phone and for security. Allows more customers than analog.Allows more customers than analog. Worse voice quality than analog.Worse voice quality than analog. Purely digital.Purely digital. Open source, very complex standard.Open source, very complex standard. Uses TDMA.Uses TDMA. Will be replaced by CDMA in the near Will be replaced by CDMA in the near

future.future.