25
GSM GSM Global System for Global System for Mobile Mobile Communications Communications ENGR 475 – Telecommunications ENGR 475 – Telecommunications October 31 – Halloween!! October 31 – Halloween!! Harding University Harding University Jonathan White Jonathan White

Lecture 12: GSM

Embed Size (px)

Citation preview

Page 1: Lecture 12: GSM

GSMGSMGlobal System for Global System for

Mobile CommunicationsMobile Communications

ENGR 475 – TelecommunicationsENGR 475 – TelecommunicationsOctober 31 – Halloween!!October 31 – Halloween!!

Harding UniversityHarding University

Jonathan WhiteJonathan White

Page 2: Lecture 12: GSM

OutlineOutline European historyEuropean history Operating Frequencies/ General Operating Frequencies/ General

CharacteristicsCharacteristics Why digitalWhy digital

– ISDN interfaceISDN interface

Page 3: Lecture 12: GSM

European HistoryEuropean History In the mid 1980’s, most of Europe didn’t In the mid 1980’s, most of Europe didn’t

have a cellular network.have a cellular network.– They weren’t committed to analog.They weren’t committed to analog.

After many years of research, GSM was After many years of research, GSM was proposed around 1990.proposed around 1990.– Covered Germany, France, England, and Covered Germany, France, England, and

Scandinavia.Scandinavia. Goals:Goals:

– Roaming throughout all of Europe.Roaming throughout all of Europe.– All digital to have ISDN type throughput (64 Kbps)All digital to have ISDN type throughput (64 Kbps)

Never achieved.Never achieved.– Low power and inexpensive devicesLow power and inexpensive devices

Page 4: Lecture 12: GSM

European HistoryEuropean History Main Goal:Main Goal:

– Compression of voice to allow much Compression of voice to allow much better bandwidth usage.better bandwidth usage. GSM would use vocoders that used LPC – GSM would use vocoders that used LPC –

linear predictive coding.linear predictive coding. GSM had an advantage in that it didn’t GSM had an advantage in that it didn’t

have to support any legacy products.have to support any legacy products. Security really wasn’t the reason Security really wasn’t the reason

digital was chosen at the time.digital was chosen at the time.

Page 5: Lecture 12: GSM

European HistoryEuropean History All of Europe began using the GSM All of Europe began using the GSM

system.system.– Japan also switched to GSM and helped Japan also switched to GSM and helped

develop very inexpensive SIM cards.develop very inexpensive SIM cards. GSM was an open source standard.GSM was an open source standard.

– Products could be made by many Products could be made by many vendors.vendors.

8000 page standard was published in 8000 page standard was published in 1993.1993.

Page 6: Lecture 12: GSM

GSM ServicesGSM Services GSM was designed to do 3 things:GSM was designed to do 3 things:

– 1. Bearer data services: Faxes, text 1. Bearer data services: Faxes, text messages, web pages.messages, web pages. Basic GSM had a basic data rate that is Basic GSM had a basic data rate that is

limited to 9.6 kbpslimited to 9.6 kbps– Extended by GMRS and EDGE to around 384 KbpsExtended by GMRS and EDGE to around 384 Kbps

– 2. Voice traffic2. Voice traffic But, at a lower quality than analog.But, at a lower quality than analog.

– 3. Other features:3. Other features: Call forwarding, caller id, etc…Call forwarding, caller id, etc…

– Meaning, we need to connect to the SS7 networkMeaning, we need to connect to the SS7 network

Page 7: Lecture 12: GSM

GSM ArchitectureGSM Architecture Very similar to the analog Very similar to the analog

architecture.architecture. 3 parts:3 parts:

– Mobile PhoneMobile Phone Digitizes and sends your voice.Digitizes and sends your voice.

– Cell phone tower / Base StationCell phone tower / Base Station Controls the radio link.Controls the radio link.

– Network switching systemNetwork switching system The brains in the system.The brains in the system.

Page 8: Lecture 12: GSM

GSM ArchitectureGSM Architecture

SIM – Subscriber Identity SIM – Subscriber Identity Module.Module.– Allows you to switch phones.Allows you to switch phones.– Stores your phonebook and Stores your phonebook and

ringtones.ringtones. ME – Mobile Equipment.ME – Mobile Equipment.

– Your cellphoneYour cellphone UM – User Mobile UM – User Mobile

FrequencyFrequency– The actual radio frequency The actual radio frequency

you are using.you are using.

Page 9: Lecture 12: GSM

GSM ArchitectureGSM Architecture

BTS – Base Transceiver Stations.BTS – Base Transceiver Stations.– The radio antennas.The radio antennas.– In GSM, 1 sends and 1 receives.In GSM, 1 sends and 1 receives.

Only 2 are necessary.Only 2 are necessary. BSC – Base Station Controller.BSC – Base Station Controller.

– Packages up all the radio signals and sends them Packages up all the radio signals and sends them to the switch.to the switch.

– Handles handoffs and some other low-level Handles handoffs and some other low-level functionality.functionality.

– Manages up to 50 or so radio antennasManages up to 50 or so radio antennas Provides better network segmentation.Provides better network segmentation.

Abis – Typically a T1 SS7 connection using Abis – Typically a T1 SS7 connection using ISUPISUP

Page 10: Lecture 12: GSM

GSM GSM ArchitectureArchitecture

MSC – Mobile Switching CenterMSC – Mobile Switching Center– Has several databases that perform call Has several databases that perform call

validation, call routing to the PSTN, and roaming validation, call routing to the PSTN, and roaming validation.validation.

– Some of the databases:Some of the databases: HLR: Home Location RegisterHLR: Home Location Register

– Main customer databaseMain customer database– Motorola only has 60 HLRs in the United States.Motorola only has 60 HLRs in the United States.

VLR: Visitor Location RegisterVLR: Visitor Location Register– Works in tandem with the HLR. Roamer database.Works in tandem with the HLR. Roamer database.

EIR: Equipment Identity RegisterEIR: Equipment Identity Register– Deny stolen mobile phones service. Has all valid serials.Deny stolen mobile phones service. Has all valid serials.

AuC: Authentication CenterAuC: Authentication Center– Stores encryption keys necessary for secure Stores encryption keys necessary for secure

communications.communications.

Page 11: Lecture 12: GSM

GSM ArchitectureGSM Architecture

Page 12: Lecture 12: GSM

Radio FrequenciesRadio Frequencies Operates in the 1850 MHz band and Operates in the 1850 MHz band and

from:from:– 1850 to 1910 MHz Mobile to Base1850 to 1910 MHz Mobile to Base– 1930 – 1990 MHz Base to Mobile1930 – 1990 MHz Base to Mobile

There are 300 forward/reverse channels in this There are 300 forward/reverse channels in this band.band.

Each channel is 200 KHzEach channel is 200 KHz GSM uses TDMA to fit 8 conversations on GSM uses TDMA to fit 8 conversations on

a channel.a channel. So, technically, GSM is TDMA and FDMA So, technically, GSM is TDMA and FDMA

based.based.

Page 13: Lecture 12: GSM

GSM Burst PeriodsGSM Burst Periods Since GSM is TDMA based, it uses burst Since GSM is TDMA based, it uses burst

periods to make up a frame.periods to make up a frame.– 8 burst periods make up one frame.8 burst periods make up one frame.– A burst is like a slot in the train.A burst is like a slot in the train.– A burst period is where a phone gets to A burst period is where a phone gets to

send digital information.send digital information. Phones send around 14 bits of information in Phones send around 14 bits of information in

every burst.every burst.– However, a burst period only lasts .577 ms.However, a burst period only lasts .577 ms.

Phones are only bursting information at around Phones are only bursting information at around 1700 times a second, much less than the 8000 1700 times a second, much less than the 8000 times a second a landline phone samples at.times a second a landline phone samples at.

Page 14: Lecture 12: GSM

GSM FramesGSM Frames 8 burst periods make 1 frame.8 burst periods make 1 frame. The frame length in time is 4.615 msThe frame length in time is 4.615 ms

– .577 ms times 8.577 ms times 8 Each frame carries 164 bitsEach frame carries 164 bits

– 114 are for voice114 are for voice– The rest are for synchronization and CRC checksThe rest are for synchronization and CRC checks

Each frame can carry up to 8 voice Each frame can carry up to 8 voice samples, or, the frame can be dedicated to samples, or, the frame can be dedicated to other necessary information.other necessary information.

Page 15: Lecture 12: GSM

GSM FramesGSM Frames Different frames mean different Different frames mean different

things.things.– For instance, this data structure For instance, this data structure

contains information about the cell site.contains information about the cell site. The cell phone scans for this information The cell phone scans for this information

when it is turned on.when it is turned on.

Page 16: Lecture 12: GSM

GSM Frames GSM Frames This is the burst that occurs when This is the burst that occurs when

the mobile transmits its access key the mobile transmits its access key back to the base station.back to the base station.

Page 17: Lecture 12: GSM

Speech CodingSpeech Coding GSM uses LPC – Linear Predictive Coding.GSM uses LPC – Linear Predictive Coding.

– Uses interpolation.Uses interpolation.– Basically, previous samples, which don’t change Basically, previous samples, which don’t change

very quickly, are used to predict current samples.very quickly, are used to predict current samples. So, instead of actually sending the voice So, instead of actually sending the voice

sample, the delta in the voice sample is sent.sample, the delta in the voice sample is sent. Also, silence is not transmitted.Also, silence is not transmitted.

– This increases throughput by about 40%.This increases throughput by about 40%.– This bits can be used for other conversations.This bits can be used for other conversations.

Page 18: Lecture 12: GSM

Digital ModulationDigital Modulation Uses Gaussian minimum shift keying.Uses Gaussian minimum shift keying. Very complex, uses filters, phase Very complex, uses filters, phase

shifts, and frequency shifts to shifts, and frequency shifts to actually send out binary digits.actually send out binary digits.

Page 19: Lecture 12: GSM

Power RequirementsPower Requirements Since GSM is purely digital, it requires Since GSM is purely digital, it requires

a lot less power since it doesn’t have a lot less power since it doesn’t have to transmit an analog wave.to transmit an analog wave.

The maximum output power of a GSM The maximum output power of a GSM phone is only 2 watts.phone is only 2 watts.– And this can be notched down by the And this can be notched down by the

controlling cell phone tower.controlling cell phone tower.– The minimum power is only 20 mW.The minimum power is only 20 mW.

Page 20: Lecture 12: GSM

GSM Call ProcessingGSM Call Processing Unlike AMPS, the cell tower can Unlike AMPS, the cell tower can

transmit on any of its frequencies.transmit on any of its frequencies. The cell phone is actually pre-The cell phone is actually pre-

programmed in the SIM card to have a programmed in the SIM card to have a set of radio frequencies that it should set of radio frequencies that it should check first.check first.– When this fails, it needs to search through When this fails, it needs to search through

all frequencies.all frequencies. When it detects the tower identifying When it detects the tower identifying

itself, call processing begins.itself, call processing begins.

Page 21: Lecture 12: GSM

SIM Card SecretsSIM Card Secrets The SIM card has a secret serial The SIM card has a secret serial

number that is only known by your number that is only known by your cellular provider and the SIM card.cellular provider and the SIM card.– You, as the customer, do not know the You, as the customer, do not know the

number.number. This secret number acts as a key, This secret number acts as a key,

and it is 32 bits in length.and it is 32 bits in length.

Page 22: Lecture 12: GSM

Authentication and SecurityAuthentication and Security GSM uses a challenge/response public key GSM uses a challenge/response public key

setup.setup. The base station sends a random number to The base station sends a random number to

the mobile.the mobile.– This acts as the base station’s public key.This acts as the base station’s public key.

The mobile then uses an algorithm called A3 The mobile then uses an algorithm called A3 to encrypt it’s secret key using the random to encrypt it’s secret key using the random public key that it was sent by the base station.public key that it was sent by the base station.– A5 is a derivative of DES.A5 is a derivative of DES.

Several rounds of shifts and XORs.Several rounds of shifts and XORs.

Page 23: Lecture 12: GSM

Authentication and SecurityAuthentication and Security This encrypted information is then sent This encrypted information is then sent

back to the base station.back to the base station. The base station performs a reverse The base station performs a reverse

operation, and checks to see that the operation, and checks to see that the mobile sent the correct secret code.mobile sent the correct secret code.– If not, it is denied access.If not, it is denied access.

A3 has proved to be very difficult to A3 has proved to be very difficult to break.break.– Though, given a significant amount of Though, given a significant amount of

time, it can be broken. time, it can be broken.

Page 24: Lecture 12: GSM

Authentication and SecurityAuthentication and Security GSM also uses another database for GSM also uses another database for

security.security. This database maintains a list of This database maintains a list of

stolen cell phones, and cell phones stolen cell phones, and cell phones that have technical errors.that have technical errors.– These are also not allowed access to the These are also not allowed access to the

digital network.digital network.

Page 25: Lecture 12: GSM

GSM conclusionGSM conclusion Widely used.Widely used.

– Upwards of 70% of phones.Upwards of 70% of phones. Uses SIM cards so customers can use any Uses SIM cards so customers can use any

phone and for security.phone and for security. Allows more customers than analog.Allows more customers than analog. Worse voice quality than analog.Worse voice quality than analog. Purely digital.Purely digital. Open source, very complex standard.Open source, very complex standard. Uses TDMA.Uses TDMA. Will be replaced by CDMA in the near future.Will be replaced by CDMA in the near future.