GSM.

Slides:



Advertisements
Similar presentations
Introduction to Public Land Mobile Network (PLMN)
Advertisements

ARSITEKTUR DASAR SISTEM SELULER
GSM Network Overview Um Abis A BSC BTS Mobile Station HLR VLR EIR AuC
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
Presentation on GSM Regional Telecom Training Centre Nikhilesh Mohanty
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION Debby Nahl Fall 2004.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
TEL 355: Communication and Information Systems in Organizations
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications.
GSM SERVICES. BTSBTS MSC VLR HLR PSTN ISDN Data Networks  Air interface OSS BTSBTS BTSBTS MSC VLR BSC A Interface A-bis interface.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM Network Structure Lance Westberg.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
GSM(GLOBAL SYSTEM FOR MOBILE COMMUNICATION) Presentation By: Pankaj Gupta Branch:Cse Rollno.=11077.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
WIRELESS COMMUNICATION GSM NETWORK OVERVIEW LECTURE 4 Tanvir Ahmad Niazi Air University, Islamabad 1.
GSM Network Architecture
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
04/2009. Overview 1. INTRODUCTION TO GSM 2. GSM ARCHITECTURE 3. GEOGRAPHICAL NETWORK ORGANIZATION 4. GSM NUMBERING 5. GSM CALLING (MOC, MTC)
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
DWAN ALSTON SMS TECHNOLOGY WHAT IS SMS????? SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Presentation on GSM Network. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Mobile Communications: Wireless Telecommunication Systems  Market  GSM  Overview  Services  Sub-systems  Components.
Bitwali1 Wireless Communication Introduction to Mobile Communication and Cellular System Lecture 3-4.
9 Transmission and Switching Mohamed Ashour, German University in Cairo Mohamed Ashour Lecture Fall 2011 AC = authentication center BSS = base station.
CSE 5345 – Fundamentals of Wireless Networks
Overview of the GSM for Cellular System
GSM Network GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Communication Security Lecture 4: Introduction To GSM
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM Training for Professionals
GPS.
Global System for Mobile Communications
GSM SECURITY AND ENCRYPTION
GSM.
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
Name:Shivalila A H,Shima
GSM (GLOBAL SYSTEM FOR MOBILE COMMUNICATION). It all started like this First telephone (photophone) – Alexander Bell, 1880 First telephone (photophone)
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Subject Name: GSM Subject Code: 10EC843
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Subject Name : Wireless Communication Subject Code:10EC81
CSE 5345 – Fundamentals of Wireless Networks
Global system for Mobile Communications
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) ARCHITECTURE Vivek E.B.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM By Saumya Chaturvedi.
Dept. of Business Administration
Security in Wide Area Networks
GSM Architecture.
Presentation transcript:

GSM

What is GSM? GSM (Global System for Mobile communication) is a digital mobile telephony system that is widely used in Europe and other parts of the world. GSM is a second generation cellular standard developed to cater voice services and data delivery using digital modulation. GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the three digital wireless telephony technologies (TDMA, GSM, and CDMA).

What is GSM? GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band

GSM Services TELE SERVICES : Includes mobile phones, emergency calling etc. DATA SERVICES : Includes SMS (Short message service), fax, voicemail, electronic mail. SUPPLYMENTARY SERVICES : I/C & O/G calls, call forwarding, call hold, call waiting, conference, etc.

GSM Subscriber Service Dual-Tone MultiFrequency (DTMF)—DTMF is a tone signaling scheme often used for various control purposes via the telephone network, such as remote control of an answering machine. facsimile group III—GSM supports CCITT Group 3 facsimile. As standard fax machines are designed to be connected to a telephone using analog signals, a special fax converter connected to the exchange is used in the GSM system. short message services—A convenient facility of the GSM network is the short message service. A message consisting of a maximum of 160 alphanumeric characters can be sent to or from a mobile station.

GSM Subscriber Services cell broadcast—A variation of the short message service is the cell broadcast facility. A message of a maximum of 93 characters can be broadcast to all mobile subscribers in a certain geographic area. Typical applications include traffic congestion warnings and reports on accidents. voice mail—This service is actually an answering machine within the network, which is controlled by the subscriber. Calls can be forwarded to the subscriber's voice-mail box and the subscriber checks for messages via a personal security code. fax mail—With this service, the subscriber can receive fax messages at any fax machine. The messages are stored in a service center from which they can be retrieved by the fax subscriber via a personal security code to the desired number.

GSM Supplwewwm.Vidyaerthipnlus.tcomary Services call forwarding—This service gives the subscriber the ability to forward incoming calls to another number if the called mobile unit is not reachable, if it is busy, if there is no reply, or if call forwarding is allowed unconditionally. barring of incoming calls—This function allows the subscriber to prevent incoming calls. The following two conditions for incoming call barring exist: baring of all incoming calls and barring of incoming calls when roaming outside the home network. advice of charge (AoC)—The AoC service provides the mobile subscriber with an estimate of the call charges. There are two types of AoC information: one that provides the subscriber with an estimate of the bill and one that can be used for immediate charging purposes. 9

GSM Supplwewwm.Vidyaerthipnlus.tcomary Services call hold—This service enables the subscriber to interrupt an ongoing call and then subsequently reestablish the call. The call hold service is only applicable to normal telephony. call waiting—This service enables the mobile subscriber to be notified of an incoming call during a conversation. The subscriber can answer, reject, or ignore the incoming call. Call waiting is applicable to all GSM telecommunications services using a circuit-switched connection. multiparty service—The multiparty service enables a mobile subscriber to establish a multiparty conversation— that is, a simultaneous conversation between three and six subscribers. This service is only applicable to normal telephony. 10

GSM Subscriber Service Calling line identification presentation/restriction— These services supply the called party with the integrated services digital network (ISDN) number of the calling party. The restriction service enables the calling party to restrict the presentation. The restriction overrides the presentation. Closed user groups (CUGs)—CUGs are generally comparable to a PBX. They are a group of subscribers who are capable of only calling themselves and certain numbers. Barring of outgoing calls—This service makes it possible for a mobile subscriber to prevent all outgoing calls.

Architecture GSM Network sub-system Radio sub-system Operation and maintenance sub-system

Architecture GSM GMSC-Gateway Mobile Switching Centre PSTN – Public Switched Telephone Network PLMN – Public Land Mobile Network

Mobile Station (MS) The Mobile Station is made up of two entities: Mobile Equipment (ME) Subscriber Identity Module (SIM) Portable, vehicle mounted, hand held device  Uniquely identified by an IMEI (International Mobile Equipment Identity) Voice and data transmission Monitoring power and signal quality of surrounding cells for optimum handover Power level : 0.8W – 20 W 160 character long SMS.

Mobile Station (MS) Subscriber Identity Module(SIM) Smart card contains the International Mobile Subscriber Identity (IMSI) Allows user to send and receive calls and receive other subscribed services Protected by a password or PIN Can be moved from phone to phone – contains key information to activate the phone

Network Sub-System/Switching System  Home location register (HLR) —The HLR is a database used subscriptions. for storage and management of The HLR is considered the most important database, as it stores permanent data about subscribers, including a subscriber's service profile, location information, and activity status.  Mobile services switching center (MSC) —The MSC performs the telephony switching functions of the system. It controls calls to and from other telephone and data systems. It also performs such functions as toll ticketing, network interfacing, common channel signaling, and others. 16

Network Sub-System/Switching System Visitor location register (VLR) —The VLR is a database that contains temporary information about subscribers that is needed by the MSC in order to service visiting subscribers. The VLR is always integrated with the MSC. Authentication center (AUC) —A unit called the AUC provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call. The AUC protects network operators from different types of fraud found in today's cellular world.

Network Sub-System/Switching System Equipment identity register (EIR) —The EIR is a database that contains information about the identity of mobile equipment that prevents calls from stolen, unauthorized, or defective mobile stations. The AUC and EIR are implemented as stand-alone nodes or as a combined AUC/EIR node.

Base Station System/Radio Sub-System  BSC —The BSC provides all the control functions and physical links between the MSC and BTS. It is a high-capacity switch that provides functions such as handover, cell configuration data, and control of radio frequency (RF) power levels in base transceiver stations. A number of BSCs are served by an MSC.  BTS —The BTS handles the radio interface to the mobile station. The BTS is the radio equipment (transceivers and antennas) needed to service each cell in the network. A group of BTSs are controlled by a BSC.

Base Station System/Radio Sub-System 20

MAINTENANCE SUBSYSTEM OPERATION AND MAINTENANCE SUBSYSTEM Dynamic monitoring and controlling of network. Operation and maintenance data function. Configuration management. Fault report and alarm handling. Performance supervision. Storage of software and data. Stores data for minimum one year.

Security in GSM On air interface, GSM uses encryption and TMSI instead of IMSI. SIM is provided 4-8 digit PIN to validate the ownership of SIM 3 algorithms are specified A3 algorithm for authentication A5 algorithm for encryption A8 algorithm for key generation

GSM SecuritywDww.Viedyarsthipilugs.comn Requirements Add significant overhead on call set up Increase bandwidth of the channel Increase error rate Add expensive complexity to the system Cost effective scheme Define security procedures Generation and distribution of keys Exchange information between operators Confidentiality of algorithms 23

GSM Sewwcw.uVidyrartihiptluys.com Features Key management is independent of equipment Subscribers can change handsets without compromising security Subscriber identity protection not easy to identify the user of the system intercepting a user data Detection of compromised equipment - Detection mechanism whether a mobile device was compromised or not Subscriber authentication - The operator knows for billing purposes who is using the system Signaling and user data protection- Signaling and data channels are protected over the radio path 24

Authentication awnww.dVidyarEthipluns.cocm ryption Scheme Mobile Station Radio Link GSM Operator Challenge RAND SIM Ki SRES A3 A3 K i Signed response (SRES) SRES A8 Authentication: are SRES A8 values equal? Kc Kc mi A5 Encrypted Data A5 mi 25

A3 – MS Authwwew.nVidytarithcipluas.cotmion Algorithm Goal Generation of SRES response to MSC’s random challenge RAND RAND (128 bit) A3 Ki (128 bit) SRES (32 bit) 26

A8 – Voice Priwvwwa.Vidcyartyhiplus.Kcom ey Generation Algorithm Goal Generation of session key Kc A8 specification was never made public RAND (128 bit) A8 Ki (128 bit) KC (64 bit) 27

Logical Implemwewwn.Vidtyaarthiptluis.coom n of A3 and A8 Both A3 and A8 algorithms are implemented on the SIM Operator can decide, which algorithm to use. Algorithms implementation is independent of hardware manufacturers and network operators. COMP128 is used for both A3 and A8 in most GSM networks. COMP128 is a keyed hash function 28

A5 – Encrwywwp.Vidytarithioplusn.com Algorithm A5 is a stream cipher Implemented very efficiently on hardware Design was never made public Leaked to Ross Anderson and Bruce Schneier Variants A5/1 – the strong version A5/2 – the weak version A5/3 GSM Association Security Group and 3GPP design Based on Kasumi algorithm used in 3G mobile systems 29

A5 Ewwwn.Vidcyarrthipylus.cpom tion Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases OMC BTS Exchange System VLR BTS BSC MSC HLR AUC BTS EIR A5 Encryption 30