What is VoIP?
VoIP (voice over IP) is an IP telephony term for a set of facilities used to manage the delivery of voice information over the Internet.VoIP involves sending voice information in digital form in discrete packets rather than by using the traditional circuit-committed protocols of the public switched telephone network (PSTN). A major advantage of VoIP and Internet telephony is that it avoids the tolls charged by ordinary telephone service.
VoIP derives from the VoIP Forum, an effort by major equipment providers, including Cisco, VocalTec, 3Com, and Netspeak to promote the use of ITU-T H.323, the standard for sending voice (audio) and video using IP on the public Internet and within an intranet. The Forum also promotes the user of directory service standards so that users can locate other users and the use of touch-tone signals for automatic call distribution and voice mail.
In addition to IP, VoIP uses the real-time protocol (RTP) to help ensure that packets get delivered in a timely way. Using public networks, it is currently difficult to guarantee Quality of Service (QoS). Better service is possible with private networks managed by an enterprise or by an Internet telephony service provider (ITSP).
A technique used by at least one equipment manufacturer, Adir Technologies (formerly Netspeak), to help ensure faster packet delivery is to use ping to contact all possible network gateway computers that have access to the public network and choose the fastest path before establishing a Transmission Control Protocol (TCP) sockets connection with the other end.
Using VoIP, an enterprise positions a "VoIP device" at a gateway. The gateway receives packetized voice transmissions from users within the company and then routes them to other parts of its intranet (local area or wide area network) or, using a T-carrier system or E-carrier interface, sends them over the public switched telephone network.
Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. They may be viewed as commercial realizations of the experimental Network Voice Protocol (1973) invented for the ARPANET providers. Some cost savings are due to utilizing a single network - see attached image - to carry voice and data, especially where users have existing underutilized network capacity that can carry VoIP at no additional cost. VoIP to VoIP phone calls are sometimes free, while VoIP to PSTN may have a cost that's borne by the VoIP user.
There are two types of PSTN to VoIP services: DID (Direct Inward Dialing) and access numbers. DID will connect the caller directly to the VoIP user while access numbers require the caller to input the extension number of the VoIP user. Access numbers are usually charged as a local call to the caller and free to the VoIP user while DID usually has a monthly fee.[1] There are also DIDs that are free to the VoIP user but chargeable to the caller.
A major development starting in 2004 has been the introduction of mass-market VoIP services over broadband Internet access services, in which subscribers make and receive calls as they would over the PSTN. Full phone service VoIP phone companies provide inbound and outbound calling with Direct Inbound Dialing. Many offer unlimited calling to the U.S., and some to Canada or selected countries in Europe or Asia as well, for a flat monthly fee.
These services take a wide variety of forms which can be more or less similar to traditional POTS. At one extreme, an analog telephone adapter (ATA) may be connected to the broadband Internet connection and an existing telephone jack in order to provide service nearly indistinguishable from POTS on all the other jacks in the residence. This type of service, which is fixed to one location, is generally offered by broadband Internet providers such as cable companies and telephone companies as a cheaper flat-rate traditional phone service. Often the phrase "VoIP" is not used in selling these services, but instead the industry has marketed the phrase "Internet Phone" or "Digital Phone" which is aimed at typical phone users who are not necessarily tech-savvy. Typically, the provider touts the advantage of being able to keep one's existing phone number.
At the other extreme are services like Gizmo Project and Skype which rely on a software client on the computer in order to place a call over the network, where one user ID can be used on many different computers or in different locations on a laptop. In the middle lie services which also provide a telephone adapter for connecting to the broadband connection similar to the services offered by broadband providers (and in some cases also allow direct connections of SIP phones) but which are aimed at a more tech-savvy user and allow portability from location to location. One advantage of these two types of services is the ability to make and receive calls as one would at home, anywhere in the world, at no extra cost. No additional charges are incurred, as call diversion via the PSTN would, and the called party does not have to pay for the call. For example, if a subscriber with a home phone number in a U.S. area code calls someone else in his home area code, it will be treated as a local call regardless of where that person is in the world. Often the user may elect to use someone else's area code as his own to minimize phone costs to a frequently called long-distance number.
For some users, the broadband phone complements, rather than replaces, a PSTN line, due to a number of inconveniences compared to traditional services. VoIP requires a broadband Internet connection and, if a telephone adapter is used, a power adapter is usually needed. In the case of a power failure, VoIP services will generally not function. Additionally, a call to the U.S. emergency services number 9-1-1 may not automatically be routed to the nearest local emergency dispatch center, and would be of no use for subscribers outside the U.S. This is potentially true for users who select a number with an area code outside their area. Some VoIP providers offer users the ability to register their address so that 9-1-1 services work as expected.
Another challenge for these services is the proper handling of outgoing calls from fax machines, TiVo/ReplayTV boxes, satellite television receivers, alarm systems, conventional modems or FAXmodems, and other similar devices that depend on access to a voice-grade telephone line for some or all of their functionality. At present, these types of calls sometimes go through without any problems, but in other cases they will not go through at all. And in some cases, this equipment can be made to work over a VoIP connection if the sending speed can be changed to a lower bits per second rate. If VoIP and cellular substitution becomes very popular, some ancillary equipment makers may be forced to redesign equipment, because it would no longer be possible to assume a conventional voice-grade telephone line would be available in almost all homes in North America and Western-Europe. The TestYourVoIP website offers a free service to test the quality of or diagnose an Internet connection by placing simulated VoIP calls from any Java-enabled Web browser, or from any phone or VoIP device capable of calling the PSTN network.
Although few office environments and even fewer homes use a pure VoIP infrastructure, telecommunications providers routinely use IP telephony, often over a dedicated IP network, to connect switching stations, converting voice signals to IP packets and back. The result is a data-abstracted digital network which the provider can easily upgrade and use for multiple purposes.
Corporate customer telephone support often use IP telephony exclusively to take advantage of the data abstraction. The benefit of using this technology is the need for only one class of circuit connection and better bandwidth use. Companies can acquire their own gateways to eliminate third-party costs, which is worthwhile in some situations.
VoIP is widely employed by carriers, especially for international telephone calls. It is commonly used to route traffic starting and ending at conventional PSTN telephones. Many telecommunications companies are looking at the IP Multimedia Subsystem (IMS) which will merge Internet technologies with the mobile world, using a pure VoIP infrastructure. It will enable them to upgrade their existing systems while embracing Internet technologies such as the Web, email, instant messaging, presence, and video conferencing. It will also allow existing VoIP systems to interface with the conventional PSTN and mobile phones.
Wednesday, October 28, 2009
What is VoIP?
Posted by zuhri at 1:41 AM 0 comments
What AT&T's 7.2Mbps Network Really Means
AT&T's contribution to the improved overall speed of the iPhone 3GS—their upgraded 7.2Mbps network—is nearly as important as Apple's. But 7.2 is just a number, and AT&T's network is just one of many. Here's where it actually stands.
First, a direct translation: AT&T's upgraded (or more accurately, upgrading) 3G network claims data download rates of 7.2 megabits per second. Though that's the lingo used to describe bandwidth, it's important to remember that those are not megabytes. AT&T's impressive-sounding 7.2 megabits would yield somewhere closer to .9 megabytes (900 kilobytes) per second, and that's only if you're getting peak performance, which you never will because...
That 7.2Mbps is theoretical, and due to technical overhead, network business, device speed and overzealous marketing, real world speeds are significantly lower. UPDATEDEven looking at the old hardware on the current 3G network—the networking guts in your iPhone 3G is technically capable of reaching the 3.6Mbps downstream that AT&T's network is technically capable of pushing. There are lots of reasons you don't ever see that. For one, it's limited to 1.4Mbps to preserve battery life—the faster you download, the faster you burn that battery. Another is congestion—all the a-holes watching YouTubes around you—and backhaul—the amount of pipe running to a tower, or more English-y still, the total bandwidth the tower has available. Another is proximity—the closer to the tower you are, the faster your phone is gonna fly. So for top speeds, you should sit under a deserted tower with plenty of backhaul.
As you can see on our chart above, our tested speeds for everything from EV-DO Rev. A to WiMax ran at anywhere from one half to one sixth their potential speed. Accordingly, Jason found AT&T's network to run at about 1.6Mbps with the iPhone 3G S—about a third faster than with the 3G, though he was probably still connecting at 3.6Mbps rates—the 7.2 rollout won't be complete until 2011, according to AT&T.
AT&T-style HSDPA is expected to reach out to an eventual theoretical speed of 14Mbps, which will undoubtedly make the current 3G networks feel slow, but won't necessarily blow them out of the water. That's the thing: the iPhone, and indeed just about all high-end handsets on the market today, operate at speeds that are reasonably close to the limits of 3G technology. In a funny sort of way, the iPhone 3GS is already a bit out of date.
So what's next? And what the hell are those really long green bars up there? Those are the so-called 4G (fourth generation) wireless technologies. Americans can ignore HSPA+ and EV-DO Rev B. for the most part, and given that they're the slowest of the next-gen bunch, shouldn't feel too bad. And anyway, as Matt explained, WiMax and LTE are what's next for us.
Both Verizon and AT&T are within a couple of years of deploying LTE in their networks, and WiMax is already out there in some cities. Our own WiMax tests on Clearwire's network peaked at an astounding 12Mbps—nearly eight times faster than the iPhone 3GS on AT&T. And even if WiMax is shaping up to be more of a general broadband protocol than a cellular one, this is the kind of thing that'll be in your phones in a few years, and the promises are mind-boggling: earlier this year, Verizon's LTE were breaking 60Mbps.
So in short, your brand-new, "S"-for-speed iPhone is pretty speedy—as long as you only look to the past.
Posted by zuhri at 1:40 AM 0 comments
Why WiMax and LTE Wireless 4G Data Will Blow Your Mind
Why WiMax and LTE Wireless 4G Data Will Blow Your Mind
3G sucks. Yeah I said it. Try watching YouTube video or hell, loading Giz. Real wireless, ubiquitous broadband for slurping up crazy data anywhere, anytime is coming. Soon. In the form of WiMax and LTE.
We're going to try to keep this pretty simple, as usual, but there are going to be some acronyms and a bit of jargon involved—our previous explainer on mobile terms might be a good place to start, actually, if you're walking into this totally oblivious to mobile tech.
Quickly, though, the current state of mobile networks is that we use 2.5G and 3G networks—mid-second-gen and newer third-gen data protocols. On the Verizon and Sprint side, known as CDMA, 2.5G is referred to as 1XRTT, or just 1X. On the AT&T and T-Mobile side, GSM, the 2.5G flavor is EDGE. Verizon and Sprint's 3G is EVDO, while AT&T and T-Mobile have HSDPA (you might not know that one, since they usually just say "3G").
Second gen wireless was basically just the leap to a digital network, and third gen is a closer attempt at true mobile broadband—kind of. Right now, with their 3G networks, they can all get you typical speeds of around 1 Megabit per second downstream, give or take (though the specs are rated for peak speeds of 3Mbps down on EVDO Rev. A, and 3.6 on HSDPA). 3G has a bit of breathing room left in it—EVDO Rev. B is capable of downstream speeds of 14.7Mbps , while the current HSDPA spec will go up to 14.4Mbps downstream with the right equipment, and depending on how far down the HSPA spec sheet you wanna go, maybe even faster.
But the fourth generation is already on its way. Technically, no wireless technology is officially 4G. But that's what everybody's calling WiMax and Long-Term Evolution, because they both promise crazyfast mobile internet speeds that leave the current 3G in the dirt. In the US, the main WiMax player is Clearwire, which Sprint owns 51 percent of after they combined their operations into one company and actually gave WiMax a chance to live. LTE is championed by AT&T (which makes sense because it was developed initially by companies who mainly build GSM networks like AT&T and T-Mobile's). Verizon also selected LTE, which blew everyone away at first because Verizon isn't in the GSM camp, but it makes sense because Verizon's parent company, Vodafone, is gung-ho for LTE in Europe, where everyone's on GSM.
So here's the crazy thing about WiMax and LTE, which you might not realize from all the smack talk coming out of Verizon and AT&T. I'm probably going to blow your mind right now: "They both use the same fundamental technology," says Barry West, Clearwire's President and Chief Architect. They both use orthogonal frequency-division multiplexing access and they're both IP (internet protocol) based. More simply, you can kind of think of the difference between WiMax and LTE as a software, not a hardware thing (kind of like Macs and PCs using the same Intel chip). Alcatel-Lucent, who makes the 4G wireless hardware, is actually "building hardware that is on a common platform," Paul Mankiewich A-L's Wireless CTO told us. In fact, West told us, at "some point in the future it's possible to harmonize" LTE and WiMax, it just "requires people to be willing to do that."
Here's what the fundamental difference is: Time division duplexing versus frequency division duplexing. Sounds complicated! But it's not. AT&T Labs VP of Architecture Hank Kafka explained it like this: "TDD is like CB radios or walkie-talkies—when one person is talking, the other person can't talk." The same channel is used for downstream and upstream, so the transmission is divided up over very tiny increments of time. Clearwire's West says they currently use a 2/3 downstream and 1/3 upstream split, so 2/3 of the time, you're swallowing data, and 1/3 of the time, you're spitting it. With LTE, Kafka says "it's more like a modem or phone conversation." It separates the available bandwidth into two parts—one operating downstream full time, and one operating upstream—so "you both can talk back and forth at the same time."
Great. But what's so special about WiMax and LTE? And how fast can they really get? Very simply, West told us, "The magic is the channel width." LTE and WiMax use really fat wireless channels, so they can move a lot of data at once. For example, AT&T's Kafka told us that "peak speed for LTE in 10MHz is about 140Mbps and peak speed in 20MHz is about 300Mbps." The thing about them being OFDM is that it makes them more flexible than 3G, since they can use a wide range of spectrum—LTE can use anything from the 1.4MHz channel up through 20MHz—whereas current 3G always uses 5MHz.
Did you see that? 300Mbps? Over the air? Whoooa. Well, don't let your panties get blown away yet. Yes, 4G will be way faster than 3G. But don't expect Asian city internet speeds wirelessly in the next couple of years. Clearwire's Barry West throws a bit of cold water on the ridiculously scorching speeds you might see hyped for LTE: To get to that 170Mbps, "that's like 8.5 bits per hertz and I've never seen a system achieve more than 5 bits per hertz." Huh? Basically, it doesn't take a whole lot of interference to slow your connection down, because it and WiMax use a complicated modulation scheme that you can't have constantly cranked to 11. So real world speeds will be slower.
WiMax is no slouch either, technically capable of up to 72Mbps.
Another thing about those superfat channels is that they don't reach as far out from the tower, and your response drops (obviously) as you get farther away. Which, Alcatel-Lucent's Mankiewich said, is one of the major infrastructure things with 4G: They're going to need to build more cell sites. That's why building out 4G is very pricey. (Not to mention all the money everyone had to spend on the right kind of airwaves to use for 4G.) If you thought 3G rollout was slow, 4G might be slower.
Here's what the real-soon-future looks like: Verizon isn't dicking around, and is doing commercial rollouts of LTE in 2010, while AT&T is following up with their commercial trials in 2011. (AT&T says Verizon "is in a big rush to move to LTE because their 3G technology gives them no room" to increase bandwidth and that red is a stupid color, nyah nyah nyah.) Clearwire has rolled out WiMax to a few cities already, and plans to have 120 million covered by the end of 2010. Verizon says they're getting about 60Mbps in testing, but expect it to be more like cable modem speeds when it launches—like Clearwire has now. For the reasons we mentioned above, and also because there won't be devices that can handle that kind of ridiculous speed—as you probably guessed, battery life being a major reason.
Will one standard eventually beat the other into submission, slinking away into the night, arm and arm with Betamax and HD DVD? Well, LTE does have a lot of momentum—the two biggest carriers in the US are rolling with it, and as part of the GSM family, you can bet all of the GSM carriers all over the world will be on board. But Alcatel-Lucent's Mankiewich says, "there's no real technological reason to pick one over the other." In fact, he thinks no one will "win," and just like now where "multiple technologies exist for economic reasons," it'll be the same thing with WiMax and LTE. So our only real hope for a single, happy standard is that they get together and make sweet, sweet love with some Marvin Gaye crooning in the background. It could happen.
Still something you still wanna know? Send any questions about wireless, Wild Things, or why truckers wear trucker hats to tips@gizmodo.com, with "Giz Explains" in the subject line. Original photo up top by Anina Schenkery Anina Schenker
Posted by zuhri at 1:33 AM 0 comments
GSM Coverage Maps
GSM Coverage Maps
This section provides detailed information about network operators worldwide that offer services from the GSM family of Wireless Communications. Specific details included within this section are network, roaming, services and coverage information for over 860 networks in 220 countries/areas of the world.
The information found within this section is supplied by and approved by the GSM Association and its members.
Download world & regional coverage maps in PDF format:
World 2009
Americas 2009
Europe 2009
Arab World 2008
Asia-Pacific 2008
To access information on a specific country/area, select from the list below:
[International]
Satellite | Air | Sea
[A]
Afghanistan | Albania | Algeria | Andorra | Angola | Anguilla | Antigua & Barbuda | Argentina | Armenia | Aruba | Australia | Austria | Azerbaijan
Bahamas | Bahrain | Bangladesh | Barbados | Belarus | Belgium | Belize | Benin | Bermuda | Bhutan | Bolivia | Bosnia Herzegovina | Botswana | Brazil | British Virgin Islands | Brunei Darussalam | Bulgaria | Burkina Faso | Burma, see Myanmar | Burundi
[C]
Cambodia | Cameroon | Canada | Cape Verde | Cayman Islands | Central African Republic | Chad | Chile | China, see also Hong Kong (SAR), Macau (SAR) | Colombia | Comoros | Congo (Dem.Rep.) | Congo | Cook Islands | Costa Rica | Cote d'Ivoire | Croatia | Cuba | Cyprus | Czech Republic
[D]
Denmark | Djibouti | Dominica | Dominican Republic
[E]
East Timor, see Timor-Leste | Ecuador | Egypt | El Salvador | Equatorial Guinea | Eritrea | Estonia | Ethiopia
[F]
Falkland Islands (Islas Malvinas) | Faroe Islands | Fiji | Finland | France | French Guiana, see French West Indies | French Polynesia | French West Indies
[G]
Gabon | Gambia | Georgia | Germany | Ghana | Gibraltar | Greece | Greenland | Grenada | Guadeloupe, see French West Indies | Guam | Guatemala | Guernsey | Guinea | Guinea Bissau | Guyana
[H]
Haiti | Honduras | Hong Kong (SAR) | Hungary
Iceland | India | Indonesia | Iran | Iraq | Ireland | Isle of Man | Israel | Italy
[J]
Jamaica | Japan | Jersey | Jordan
[K]
Kazakhstan | Kenya | Kiribati | Korea (North), Democratic People's Republic of | Korea (South), Republic of | Kuwait | Kyrgyzstan
[L]
Laos | Latvia | Lebanon | Lesotho | Liberia | Libya | Liechtenstein | Lithuania | Luxembourg
[M]
Macau (SAR) | Macedonia (FYROM) | Madagascar | Malawi | Malaysia | Maldives | Mali | Malta | Martinique, see French West Indies | Mauritania | Mauritius | Mayotte | Mexico | Micronesia | Moldova | Monaco | Mongolia | Montenegro | Montserrat | Morocco | Mozambique | Myanmar
[N]
Namibia | Nepal | Netherlands | Netherlands Antilles | New Caledonia | New Zealand | Nicaragua | Niger | Nigeria | Norfolk Island | Northern Mariana Islands | North Korea, see Korea (North) | Norway
[O]
Oman
[P]
Pakistan | Palau | Palestinian Territory | Panama | Papua New Guinea | Paraguay | Peru | Philippines | Poland | Portugal | Puerto Rico (see also United States)
[Q]
Qatar
[R]
La Reunion | Romania | Russia | Republic of Rwanda
[S]
Saint Pierre & Miquelon | Samoa | San Marino | St Kitts & Nevis | St Lucia | St Vincent & The Grenadines | São Tomé & Príncipe | Saudi Arabia | Senegal | Serbia | Seychelles | Sierra Leone | Singapore | Slovakia | Slovenia | Solomon Islands | Somalia | South Africa | South Korea, see Korea (South) | Spain | Sri Lanka | Sudan | Suriname | Swaziland | Sweden | Switzerland | Syria
[T]
Taiwan, China | Tajikistan | Tanzania | Thailand | Timor-Leste | Togo | Tonga | Trinidad & Tobago | Tunisia | Turkey | Turkmenistan | Turks & Caicos Islands
[U]
[I]Uganda | Ukraine | United Arab Emirates | United Kingdom, see also Guernsey, Isle of Man, Jersey | United States, including Puerto Rico and US Virgin Islands, see also Guam | Uruguay | Uzbekistan
[V]
Vanuatu | Venezuela | Vietnam | Virgin Islands (US), see United States
[W]
[X]
[Y]
Yemen
[B][Z]
Zambia | Zimbabwe
Posted by zuhri at 1:30 AM 0 comments
History of GSM
During the early 1980s, analog cellular telephone systems were experiencing rapid growth in Europe, particularly in Scandinavia and the United Kingdom, but also in France and Germany. Each country developed its own system, which was incompatible with everyone else's in equipment and operation. This was an undesirable situation, because not only was the mobile equipment limited to operation within national boundaries, which in a unified Europe were increasingly unimportant, but there was also a very limited market for each type of equipment, so economies of scale and the subsequent savings could not be realized.
The Europeans realized this early on, and in 1982 the Conference of European Posts and Telegraphs (CEPT) formed a study group called the Groupe Spécial Mobile (GSM) to study and develop a pan-European public land mobile system. The proposed system had to meet certain criteria:
* Good subjective speech quality
* Low terminal and service cost
* Support for international roaming
* Ability to support handheld terminals
* Support for range of new services and facilities
* Spectral efficiency
* ISDN compatibility
In 1989, GSM responsibility was transferred to the European Telecommunication Standards Institute (ETSI), and phase I of the GSM specifications were published in 1990. Commercial service was started in mid-1991, and by 1993 there were 36 GSM networks in 22 countries [6]. Although standardized in Europe, GSM is not only a European standard. Over 200 GSM networks (including DCS1800 and PCS1900) are operational in 110 countries around the world. In the beginning of 1994, there were 1.3 million subscribers worldwide [18], which had grown to more than 55 million by October 1997. With North America making a delayed entry into the GSM field with a derivative of GSM called PCS1900, GSM systems exist on every continent, and the acronym GSM now aptly stands for Global System for Mobile communications.
The developers of GSM chose an unproven (at the time) digital system, as opposed to the then-standard analog cellular systems like AMPS in the United States and TACS in the United Kingdom. They had faith that advancements in compression algorithms and digital signal processors would allow the fulfillment of the original criteria and the continual improvement of the system in terms of quality and cost. The over 8000 pages of GSM recommendations try to allow flexibility and competitive innovation among suppliers, but provide enough standardization to guarantee proper interworking between the components of the system. This is done by providing functional and interface descriptions for each of the functional entities defined in the system. Services provided by GSM
From the beginning, the planners of GSM wanted ISDN compatibility in terms of the services offered and the control signalling used. However, radio transmission limitations, in terms of bandwidth and cost, do not allow the standard ISDN B-channel bit rate of 64 kbps to be practically achieved.
Using the ITU-T definitions, telecommunication services can be divided into bearer services, teleservices, and supplementary services. The most basic teleservice supported by GSM is telephony. As with all other communications, speech is digitally encoded and transmitted through the GSM network as a digital stream. There is also an emergency service, where the nearest emergency-service provider is notified by dialing three digits (similar to 911).
A variety of data services is offered. GSM users can send and receive data, at rates up to 9600 bps, to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched Public Data Networks, and Circuit Switched Public Data Networks using a variety of access methods and protocols, such as X.25 or X.32. Since GSM is a digital network, a modem is not required between the user and GSM network, although an audio modem is required inside the GSM network to interwork with POTS.
Other data services include Group 3 facsimile, as described in ITU-T recommendation T.30, which is supported by use of an appropriate fax adaptor. A unique feature of GSM, not found in older analog systems, is the Short Message Service (SMS). SMS is a bidirectional service for short alphanumeric (up to 160 bytes) messages. Messages are transported in a store-and-forward fashion. For point-to-point SMS, a message can be sent to another subscriber to the service, and an acknowledgement of receipt is provided to the sender. SMS can also be used in a cell-broadcast mode, for sending messages such as traffic updates or news updates. Messages can also be stored in the SIM card for later retrieval [2].
Supplementary services are provided on top of teleservices or bearer services. In the current (Phase I) specifications, they include several forms of call forward (such as call forwarding when the mobile subscriber is unreachable by the network), and call barring of outgoing or incoming calls, for example when roaming in another country. Many additional supplementary services will be provided in the Phase 2 specifications, such as caller identification, call waiting, multi-party conversations. Architecture of the GSM network
A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations and Maintenance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface.
Figure 1. General architecture of a GSM network
Mobile Station
The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.
The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem
The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers.
The Base Transceiver Station houses the radio tranceivers that define a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost.
The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below. The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem
The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjuction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks.
The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile. The location of the mobile is typically in the form of the signalling address of the VLR associated with the mobile station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented as a distributed database.
The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations --- this information is stored in the location registers.
The other two registers are used for authentication and security purposes. The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. Radio link aspects
The International Telecommunication Union (ITU), which manages the international allocation of radio spectrum (among many other functions), allocated the bands 890-915 MHz for the uplink (mobile station to base station) and 935-960 MHz for the downlink (base station to mobile station) for mobile networks in Europe. Since this range was already being used in the early 1980s by the analog systems of the day, the CEPT had the foresight to reserve the top 10 MHz of each band for the GSM network that was still being developed. Eventually, GSM will be allocated the entire 2x25 MHz bandwidth.
Multiple access and channel structure
Since radio spectrum is a limited resource shared by all users, a method must be devised to divide up the bandwidth among as many users as possible. The method chosen by GSM is a combination of Time- and Frequency-Division Multiple Access (TDMA/FDMA). The FDMA part involves the division by frequency of the (maximum) 25 MHz bandwidth into 124 carrier frequencies spaced 200 kHz apart. One or more carrier frequencies are assigned to each base station. Each of these carrier frequencies is then divided in time, using a TDMA scheme. The fundamental unit of time in this TDMA scheme is called a burst period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst periods are grouped into a TDMA frame (120/26 ms, or approx. 4.615 ms), which forms the basic unit for the definition of logical channels. One physical channel is one burst period per TDMA frame.
Channels are defined by the number and position of their corresponding burst periods. All these definitions are cyclic, and the entire pattern repeats approximately every 3 hours. Channels can be divided into dedicated channels, which are allocated to a mobile station, and common channels, which are used by mobile stations in idle mode. Traffic channels
A traffic channel (TCH) is used to carry speech and data traffic. Traffic channels are defined using a 26-frame multiframe, or group of 26 TDMA frames. The length of a 26-frame multiframe is 120 ms, which is how the length of a burst period is defined (120 ms divided by 26 frames divided by 8 burst periods per frame). Out of the 26 frames, 24 are used for traffic, 1 is used for the Slow Associated Control Channel (SACCH) and 1 is currently unused (see Figure 2). TCHs for the uplink and downlink are separated in time by 3 burst periods, so that the mobile station does not have to transmit and receive simultaneously, thus simplifying the electronics.
In addition to these full-rate TCHs, there are also half-rate TCHs defined, although they are not yet implemented. Half-rate TCHs will effectively double the capacity of a system once half-rate speech coders are specified (i.e., speech coding at around 7 kbps, instead of 13 kbps). Eighth-rate TCHs are also specified, and are used for signalling. In the recommendations, they are called Stand-alone Dedicated Control Channels (SDCCH).
Figure 2. Organization of bursts, TDMA frames, and multiframes for speech and data
Control channels
Common channels can be accessed both by idle mode and dedicated mode mobiles. The common channels are used by idle mode mobiles to exchange the signalling information required to change to dedicated mode. Mobiles already in dedicated mode monitor the surrounding base stations for handover and other information. The common channels are defined within a 51-frame multiframe, so that dedicated mobiles using the 26-frame multiframe TCH structure can still monitor control channels. The common channels include:
Broadcast Control Channel (BCCH) Continually broadcasts, on the downlink, information including base station identity, frequency allocations, and frequency-hopping sequences. Frequency Correction Channel (FCCH) and Synchronisation Channel (SCH) Used to synchronise the mobile to the time slot structure of a cell by defining the boundaries of burst periods, and the time slot numbering. Every cell in a GSM network broadcasts exactly one FCCH and one SCH, which are by definition on time slot number 0 (within a TDMA frame). Random Access Channel (RACH) Slotted Aloha channel used by the mobile to request access to the network. Paging Channel (PCH) Used to alert the mobile station of an incoming call. Access Grant Channel (AGCH) Used to allocate an SDCCH to a mobile for signalling (in order to obtain a dedicated channel), following a request on the RACH. Burst structure
There are four different types of bursts used for transmission in GSM [16]. The normal burst is used to carry data and most signalling. It has a total length of 156.25 bits, made up of two 57 bit information bits, a 26 bit training sequence used for equalization, 1 stealing bit for each information block (used for FACCH), 3 tail bits at each end, and an 8.25 bit guard sequence, as shown in Figure 2. The 156.25 bits are transmitted in 0.577 ms, giving a gross bit rate of 270.833 kbps.
The F burst, used on the FCCH, and the S burst, used on the SCH, have the same length as a normal burst, but a different internal structure, which differentiates them from normal bursts (thus allowing synchronization). The access burst is shorter than the normal burst, and is used only on the RACH. Speech coding
GSM is a digital system, so speech which is inherently analog, has to be digitized. The method employed by ISDN, and by current telephone systems for multiplexing voice lines over high speed trunks and optical fiber lines, is Pulse Coded Modulation (PCM). The output stream from PCM is 64 kbps, too high a rate to be feasible over a radio link. The 64 kbps signal, although simple to implement, contains much redundancy. The GSM group studied several speech coding algorithms on the basis of subjective speech quality and complexity (which is related to cost, processing delay, and power consumption once implemented) before arriving at the choice of a Regular Pulse Excited -- Linear Predictive Coder (RPE--LPC) with a Long Term Predictor loop. Basically, information from previous samples, which does not change very quickly, is used to predict the current sample. The coefficients of the linear combination of the previous samples, plus an encoded form of the residual, the difference between the predicted and actual sample, represent the signal. Speech is divided into 20 millisecond samples, each of which is encoded as 260 bits, giving a total bit rate of 13 kbps. This is the so-called Full-Rate speech coding. Recently, an Enhanced Full-Rate (EFR) speech coding algorithm has been implemented by some North American GSM1900 operators. This is said to provide improved speech quality using the existing 13 kbps bit rate.
Channel coding and modulation
Because of natural and man-made electromagnetic interference, the encoded speech or data signal transmitted over the radio interface must be protected from errors. GSM uses convolutional encoding and block interleaving to achieve this protection. The exact algorithms used differ for speech and for different data rates. The method used for speech blocks will be described below.
Recall that the speech codec produces a 260 bit block for every 20 ms speech sample. From subjective testing, it was found that some bits of this block were more important for perceived speech quality than others. The bits are thus divided into three classes:
* Class Ia 50 bits - most sensitive to bit errors
* Class Ib 132 bits - moderately sensitive to bit errors
* Class II 78 bits - least sensitive to bit errors
Class Ia bits have a 3 bit Cyclic Redundancy Code added for error detection. If an error is detected, the frame is judged too damaged to be comprehensible and it is discarded. It is replaced by a slightly attenuated version of the previous correctly received frame. These 53 bits, together with the 132 Class Ib bits and a 4 bit tail sequence (a total of 189 bits), are input into a 1/2 rate convolutional encoder of constraint length 4. Each input bit is encoded as two output bits, based on a combination of the previous 4 input bits. The convolutional encoder thus outputs 378 bits, to which are added the 78 remaining Class II bits, which are unprotected. Thus every 20 ms speech sample is encoded as 456 bits, giving a bit rate of 22.8 kbps.
To further protect against the burst errors common to the radio interface, each sample is interleaved. The 456 bits output by the convolutional encoder are divided into 8 blocks of 57 bits, and these blocks are transmitted in eight consecutive time-slot bursts. Since each time-slot burst can carry two 57 bit blocks, each burst carries traffic from two different speech samples.
Recall that each time-slot burst is transmitted at a gross bit rate of 270.833 kbps. This digital signal is modulated onto the analog carrier frequency using Gaussian-filtered Minimum Shift Keying (GMSK). GMSK was selected over other modulation schemes as a compromise between spectral efficiency, complexity of the transmitter, and limited spurious emissions. The complexity of the transmitter is related to power consumption, which should be minimized for the mobile station. The spurious radio emissions, outside of the allotted bandwidth, must be strictly controlled so as to limit adjacent channel interference, and allow for the co-existence of GSM and the older analog systems (at least for the time being). Multipath equalization
At the 900 MHz range, radio waves bounce off everything - buildings, hills, cars, airplanes, etc. Thus many reflected signals, each with a different phase, can reach an antenna. Equalization is used to extract the desired signal from the unwanted reflections. It works by finding out how a known transmitted signal is modified by multipath fading, and constructing an inverse filter to extract the rest of the desired signal. This known signal is the 26-bit training sequence transmitted in the middle of every time-slot burst. The actual implementation of the equalizer is not specified in the GSM specifications.
Frequency hopping
The mobile station already has to be frequency agile, meaning it can move between a transmit, receive, and monitor time slot within one TDMA frame, which normally are on different frequencies. GSM makes use of this inherent frequency agility to implement slow frequency hopping, where the mobile and BTS transmit each TDMA frame on a different carrier frequency. The frequency hopping algorithm is broadcast on the Broadcast Control Channel. Since multipath fading is dependent on carrier frequency, slow frequency hopping helps alleviate the problem. In addition, co-channel interference is in effect randomized.
Discontinuous transmission
Minimizing co-channel interference is a goal in any cellular system, since it allows better service for a given cell size, or the use of smaller cells, thus increasing the overall capacity of the system. Discontinuous transmission (DTX) is a method that takes advantage of the fact that a person speaks less that 40 percent of the time in normal conversation [22], by turning the transmitter off during silence periods. An added benefit of DTX is that power is conserved at the mobile unit.
The most important component of DTX is, of course, Voice Activity Detection. It must distinguish between voice and noise inputs, a task that is not as trivial as it appears, considering background noise. If a voice signal is misinterpreted as noise, the transmitter is turned off and a very annoying effect called clipping is heard at the receiving end. If, on the other hand, noise is misinterpreted as a voice signal too often, the efficiency of DTX is dramatically decreased. Another factor to consider is that when the transmitter is turned off, there is total silence heard at the receiving end, due to the digital nature of GSM. To assure the receiver that the connection is not dead, comfort noise is created at the receiving end by trying to match the characteristics of the transmitting end's background noise. Discontinuous reception
Another method used to conserve power at the mobile station is discontinuous reception. The paging channel, used by the base station to signal an incoming call, is structured into sub-channels. Each mobile station needs to listen only to its own sub-channel. In the time between successive paging sub-channels, the mobile can go into sleep mode, when almost no power is used.
Power control
There are five classes of mobile stations defined, according to their peak transmitter power, rated at 20, 8, 5, 2, and 0.8 watts. To minimize co-channel interference and to conserve power, both the mobiles and the Base Transceiver Stations operate at the lowest power level that will maintain an acceptable signal quality. Power levels can be stepped up or down in steps of 2 dB from the peak power for the class down to a minimum of 13 dBm (20 milliwatts).
The mobile station measures the signal strength or signal quality (based on the Bit Error Ratio), and passes the information to the Base Station Controller, which ultimately decides if and when the power level should be changed. Power control should be handled carefully, since there is the possibility of instability. This arises from having mobiles in co-channel cells alternatingly increase their power in response to increased co-channel interference caused by the other mobile increasing its power. This in unlikely to occur in practice but it is (or was as of 1991) under study.
Network aspects
Ensuring the transmission of voice or data of a given quality over the radio link is only part of the function of a cellular mobile network. A GSM mobile can seamlessly roam nationally and internationally, which requires that registration, authentication, call routing and location updating functions exist and are standardized in GSM networks. In addition, the fact that the geographical area covered by the network is divided into cells necessitates the implementation of a handover mechanism. These functions are performed by the Network Subsystem, mainly using the Mobile Application Part (MAP) built on top of the Signalling System No. 7 protocol.
Figure 3. Signalling protocol structure in GSM
The signalling protocol in GSM is structured into three general layers [1], [19], depending on the interface, as shown in Figure 3. Layer 1 is the physical layer, which uses the channel structures discussed above over the air interface. Layer 2 is the data link layer. Across the Um interface, the data link layer is a modified version of the LAPD protocol used in ISDN, called LAPDm. Across the A interface, the Message Transfer Part layer 2 of Signalling System Number 7 is used. Layer 3 of the GSM signalling protocol is itself divided into 3 sublayers. Radio Resources Management Controls the setup, maintenance, and termination of radio and fixed channels, including handovers. Mobility Management Manages the location updating and registration procedures, as well as security and authentication. Connection Management Handles general call control, similar to CCITT Recommendation Q.931, and manages Supplementary Services and the Short Message Service. Signalling between the different entities in the fixed part of the network, such as between the HLR and VLR, is accomplished throught the Mobile Application Part (MAP). MAP is built on top of the Transaction Capabilities Application Part (TCAP, the top layer of Signalling System Number 7. The specification of the MAP is quite complex, and at over 500 pages, it is one of the longest documents in the GSM recommendations [16].
Radio resources management
The radio resources management (RR) layer oversees the establishment of a link, both radio and fixed, between the mobile station and the MSC. The main functional components involved are the mobile station, and the Base Station Subsystem, as well as the MSC. The RR layer is concerned with the management of an RR-session [16], which is the time that a mobile is in dedicated mode, as well as the configuration of radio channels including the allocation of dedicated channels.
An RR-session is always initiated by a mobile station through the access procedure, either for an outgoing call, or in response to a paging message. The details of the access and paging procedures, such as when a dedicated channel is actually assigned to the mobile, and the paging sub-channel structure, are handled in the RR layer. In addition, it handles the management of radio features such as power control, discontinuous transmission and reception, and timing advance. Handover
In a cellular network, the radio and fixed links required are not permanently allocated for the duration of a call. Handover, or handoff as it is called in North America, is the switching of an on-going call to a different channel or cell. The execution and measurements required for handover form one of basic functions of the RR layer.
There are four different types of handover in the GSM system, which involve transferring a call between:
* Channels (time slots) in the same cell
* Cells (Base Transceiver Stations) under the control of the same Base Station Controller (BSC),
* Cells under the control of different BSCs, but belonging to the same Mobile services Switching Center (MSC), and
* Cells under the control of different MSCs.
The first two types of handover, called internal handovers, involve only one Base Station Controller (BSC). To save signalling bandwidth, they are managed by the BSC without involving the Mobile services Switching Center (MSC), except to notify it at the completion of the handover. The last two types of handover, called external handovers, are handled by the MSCs involved. An important aspect of GSM is that the original MSC, the anchor MSC, remains responsible for most call-related functions, with the exception of subsequent inter-BSC handovers under the control of the new MSC, called the relay MSC.
Handovers can be initiated by either the mobile or the MSC (as a means of traffic load balancing). During its idle time slots, the mobile scans the Broadcast Control Channel of up to 16 neighboring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, at least once per second, and is used by the handover algorithm.
The algorithm for when a handover decision should be taken is not specified in the GSM recommendations. There are two basic algorithms used, both closely tied in with power control. This is because the BSC usually does not know whether the poor signal quality is due to multipath fading or to the mobile having moved to another cell. This is especially true in small urban cells.
The 'minimum acceptable performance' algorithm [3] gives precedence to power control over handover, so that when the signal degrades beyond a certain point, the power level of the mobile is increased. If further power increases do not improve the signal, then a handover is considered. This is the simpler and more common method, but it creates 'smeared' cell boundaries when a mobile transmitting at peak power goes some distance beyond its original cell boundaries into another cell.
The 'power budget' method [3] uses handover to try to maintain or improve a certain level of signal quality at the same or lower power level. It thus gives precedence to handover over power control. It avoids the 'smeared' cell boundary problem and reduces co-channel interference, but it is quite complicated. Mobility management
The Mobility Management layer (MM) is built on top of the RR layer, and handles the functions that arise from the mobility of the subscriber, as well as the authentication and security aspects. Location management is concerned with the procedures that enable the system to know the current location of a powered-on mobile station so that incoming call routing can be completed.
Location updating
A powered-on mobile is informed of an incoming call by a paging message sent over the PAGCH channel of a cell. One extreme would be to page every cell in the network for each call, which is obviously a waste of radio bandwidth. The other extreme would be for the mobile to notify the system, via location updating messages, of its current location at the individual cell level. This would require paging messages to be sent to exactly one cell, but would be very wasteful due to the large number of location updating messages. A compromise solution used in GSM is to group cells into location areas. Updating messages are required when moving between location areas, and mobile stations are paged in the cells of their current location area.
The location updating procedures, and subsequent call routing, use the MSC and two location registers: the Home Location Register (HLR) and the Visitor Location Register (VLR). When a mobile station is switched on in a new location area, or it moves to a new location area or different operator's PLMN, it must register with the network to indicate its current location. In the normal case, a location update message is sent to the new MSC/VLR, which records the location area information, and then sends the location information to the subscriber's HLR. The information sent to the HLR is normally the SS7 address of the new VLR, although it may be a routing number. The reason a routing number is not normally assigned, even though it would reduce signalling, is that there is only a limited number of routing numbers available in the new MSC/VLR and they are allocated on demand for incoming calls. If the subscriber is entitled to service, the HLR sends a subset of the subscriber information, needed for call control, to the new MSC/VLR, and sends a message to the old MSC/VLR to cancel the old registration.
For reliability reasons, GSM also has a periodic location updating procedure. If an HLR or MSC/VLR fails, to have each mobile register simultaneously to bring the database up to date would cause overloading. Therefore, the database is updated as location updating events occur. The enabling of periodic updating, and the time period between periodic updates, is controlled by the operator, and is a trade-off between signalling traffic and speed of recovery. If a mobile does not register after the updating time period, it is deregistered.
A procedure related to location updating is the IMSI attach and detach. A detach lets the network know that the mobile station is unreachable, and avoids having to needlessly allocate channels and send paging messages. An attach is similar to a location update, and informs the system that the mobile is reachable again. The activation of IMSI attach/detach is up to the operator on an individual cell basis. Authentication and security
Since the radio medium can be accessed by anyone, authentication of users to prove that they are who they claim to be, is a very important element of a mobile network. Authentication involves two functional entities, the SIM card in the mobile, and the Authentication Center (AuC). Each subscriber is given a secret key, one copy of which is stored in the SIM card and the other in the AuC. During authentication, the AuC generates a random number that it sends to the mobile. Both the mobile and the AuC then use the random number, in conjuction with the subscriber's secret key and a ciphering algorithm called A3, to generate a signed response (SRES) that is sent back to the AuC. If the number sent by the mobile is the same as the one calculated by the AuC, the subscriber is authenticated [16].
The same initial random number and subscriber key are also used to compute the ciphering key using an algorithm called A8. This ciphering key, together with the TDMA frame number, use the A5 algorithm to create a 114 bit sequence that is XORed with the 114 bits of a burst (the two 57 bit blocks). Enciphering is an option for the fairly paranoid, since the signal is already coded, interleaved, and transmitted in a TDMA manner, thus providing protection from all but the most persistent and dedicated eavesdroppers.
Another level of security is performed on the mobile equipment itself, as opposed to the mobile subscriber. As mentioned earlier, each GSM terminal is identified by a unique International Mobile Equipment Identity (IMEI) number. A list of IMEIs in the network is stored in the Equipment Identity Register (EIR). The status returned in response to an IMEI query to the EIR is one of the following: White-listed The terminal is allowed to connect to the network. Grey-listed The terminal is under observation from the network for possible problems. Black-listed The terminal has either been reported stolen, or is not type approved (the correct type of terminal for a GSM network). The terminal is not allowed to connect to the network. Communication management
The Communication Management layer (CM) is responsible for Call Control (CC), supplementary service management, and short message service management. Each of these may be considered as a separate sublayer within the CM layer. Call control attempts to follow the ISDN procedures specified in Q.931, although routing to a roaming mobile subscriber is obviously unique to GSM. Other functions of the CC sublayer include call establishment, selection of the type of service (including alternating between services during a call), and call release.
Call routing
Unlike routing in the fixed network, where a terminal is semi-permanently wired to a central office, a GSM user can roam nationally and even internationally. The directory number dialed to reach a mobile subscriber is called the Mobile Subscriber ISDN (MSISDN), which is defined by the E.164 numbering plan. This number includes a country code and a National Destination Code which identifies the subscriber's operator. The first few digits of the remaining subscriber number may identify the subscriber's HLR within the home PLMN.
An incoming mobile terminating call is directed to the Gateway MSC (GMSC) function. The GMSC is basically a switch which is able to interrogate the subscriber's HLR to obtain routing information, and thus contains a table linking MSISDNs to their corresponding HLR. A simplification is to have a GSMC handle one specific PLMN. It should be noted that the GMSC function is distinct from the MSC function, but is usually implemented in an MSC.
The routing information that is returned to the GMSC is the Mobile Station Roaming Number (MSRN), which is also defined by the E.164 numbering plan. MSRNs are related to the geographical numbering plan, and not assigned to subscribers, nor are they visible to subscribers.
The most general routing procedure begins with the GMSC querying the called subscriber's HLR for an MSRN. The HLR typically stores only the SS7 address of the subscriber's current VLR, and does not have the MSRN (see the location updating section). The HLR must therefore query the subscriber's current VLR, which will temporarily allocate an MSRN from its pool for the call. This MSRN is returned to the HLR and back to the GMSC, which can then route the call to the new MSC. At the new MSC, the IMSI corresponding to the MSRN is looked up, and the mobile is paged in its current location area (see Figure 4).
Figure 4. Call routing for a mobile terminating call
Conclusion and comments
In this paper I have tried to give an overview of the GSM system. As with any overview, and especially one covering a standard 6000 pages long, there are many details missing. I believe, however, that I gave the general flavor of GSM and the philosophy behind its design. It was a monumental task that the original GSM committee undertook, and one that has proven a success, showing that international cooperation on such projects between academia, industry, and government can succeed. It is a standard that ensures interoperability without stifling competition and innovation among suppliers, to the benefit of the public both in terms of cost and service quality. For example, by using Very Large Scale Integration (VLSI) microprocessor technology, many functions of the mobile station can be built on one chipset, resulting in lighter, more compact, and more energy-efficient terminals.
Telecommunications are evolving towards personal communication networks, whose objective can be stated as the availability of all communication services anytime, anywhere, to anyone, by a single identity number and a pocketable communication terminal [25]. Having a multitude of incompatible systems throughout the world moves us farther away from this ideal. The economies of scale created by a unified system are enough to justify its implementation, not to mention the convenience to people of carrying just one communication terminal anywhere they go, regardless of national boundaries.
The GSM system, and its sibling systems operating at 1.8 GHz (called DCS1800) and 1.9 GHz (called GSM1900 or PCS1900, and operating in North America), are a first approach at a true personal communication system. The SIM card is a novel approach that implements personal mobility in addition to terminal mobility. Together with international roaming, and support for a variety of services such as telephony, data transfer, fax, Short Message Service, and supplementary services, GSM comes close to fulfilling the requirements for a personal communication system: close enough that it is being used as a basis for the next generation of mobile communication technology in Europe, the Universal Mobile Telecommunication System (UMTS).
Another point where GSM has shown its commitment to openness, standards and interoperability is the compatibility with the Integrated Services Digital Network (ISDN) that is evolving in most industrialized countries, and Europe in particular (the so-called Euro-ISDN). GSM is also the first system to make extensive use of the Intelligent Networking concept, in in which services like 800 numbers are concentrated and handled from a few centralized service centers, instead of being distributed over every switch in the country. This is the concept behind the use of the various registers such as the HLR. In addition, the signalling between these functional entities uses Signalling System Number 7, an international standard already deployed in many countries and specified as the backbone signalling network for ISDN.
GSM is a very complex standard, but that is probably the price that must be paid to achieve the level of integrated service and quality offered while subject to the rather severe restrictions imposed by the radio environment.
References
[1] Jan A. Audestad. Network aspects of the GSM system. In EUROCON 88, June 1988.
[2] D. M. Balston. The pan-European system: GSM. In D. M. Balston and R.C.V. Macario, editors, Cellular Radio Systems. Artech House, Boston, 1993.
[3] David M. Balston. The pan-European cellular technology. In R.C.V. Macario, editor, Personal and Mobile Radio Systems. Peter Peregrinus, London, 1991.
[4] M. Bezler et al. GSM base station system. Electrical Communication, 2nd Quarter 1993.
[5] David Cheeseman. The pan-European cellular mobile radio system. In R.C.V. Macario, editor, Personal and Mobile Radio Systems. Peter Peregrinus, London, 1991.
[6] C. Déchaux and R. Scheller. What are GSM and DCS. Electrical Communication, 2nd Quarter 1993.
[7] M. Feldmann and J. P. Rissen. GSM network systems and overall system integration. Electrical Communication, 2nd Quarter 1993.
[8] John M. Griffiths. ISDN Explained: Worldwide Network and Applications Technology. John Wiley &Sons, Chichester, 2nd edition, 1992.
[9] I. Harris. Data in the GSM cellular network. In D. M. Balston and R.C.V. Macario, editors, Cellular Radio Systems. Artech House, Boston, 1993.
[10] I. Harris. Facsimile over cellular radio. In D. M. Balston and R.C.V. Macario, editors, Cellular Radio Systems. Artech House, Boston, 1993.
[11] Thomas Haug. Overview of the GSM project. In EUROCON 88, June 1988.
[12] Josef-Franz Huber. Advanced equipment for an advanced network. Telcom Report International, 15(3-4), 1992.
[13] Hans Lobensommer and Helmut Mahner. GSM - a European mobile radio standard for the world market. Telcom Report International, 15(3-4), 1992.
[14] Bernard J. T. Mallinder. Specification methodology applied to the GSM system. In EUROCON 88, June 1988.
[15] Seshadri Mohan and Ravi Jain. Two user location strategies for personal communication services. IEEE Personal Communications, 1(1), 1994.
[16] Michel Mouly and Marie-Bernadette Pautet. The GSM System for Mobile Communications. Published by the authors, 1992.
[17] Jon E. Natvig, Stein Hansen, and Jorge de Brito. Speech processing in the pan-European digital mobile radio system (GSM) - system overview. In IEEE GLOBECOM 1989, November 1989.
[18] Torbjorn Nilsson. Toward a new era in mobile communications. http://193.78.100.33/ (Ericsson WWW server).
[19] Moe Rahnema. Overview of the GSM system and protocol architecture. IEEE Communications Magazine, April 1993.
[20] E. H. Schmid and M. Kähler. GSM operation and maintenance. Electrical Communication, 2nd Quarter 1993.
[21] Marko Silventoinen. Personal email, quoted from European Mobile Communications Business and Technology Report, March 1995, and December 1995.
[22] C. B. Southcott et al. Voice control of the pan-European digital mobile radio system. In IEEE GLOBECOM 1989, November 1989.
[23] P. Vary et al. Speech codec for the European mobile radio system. In IEEE GLOBECOM 1989, November 1989.
[24] C. Watson. Radio equipment for GSM. In D. M. Balston and R.C.V. Macario, editors, Cellular Radio Systems. Artech House, Boston, 1993.
[25] Robert G. Winch. Telecommunication Transmission Systems. McGraw-Hill, New York, 1993. Copyright © John Scourias 1996-1999
Written by John Scourias
Posted by zuhri at 1:28 AM 0 comments
WiFi Hotspots
If you want to take advantage of public WiFi hotspots or start a wireless network in your home, the first thing you'll need to do is make sure your computer has the right gear. Most new laptops and many new desktop computers come with built-in wireless transmitters. If your laptop doesn't, you can buy a wireless adapter that plugs into the PC card slot or USB port. Desktop computers can use USB adapters, or you can buy an adapter that plugs into the PCI slot inside the computer's case. Many of these adapters can use more than one 802.11 standard.
USB wireless adapter and PC wireless card photos courtesy Consumer Guide Products
Wireless adapters can plug into a computer's PC card slot or USB port.
Once you've installed your wireless adapter and the drivers that allow it to operate, your computer should be able to automatically discover existing networks. This means that when you turn your computer on in a WiFi hotspot, the computer will inform you that the network exists and ask whether you want to connect to it. If you have an older computer, you may need to use a software program to detect and connect to a wireless network.
Being able to connect to the Internet in public hotspots is extremely convenient. Wireless home networks are convenient as well. They allow you to easily connect multiple computers and to move them from place to place without disconnecting and reconnecting wires. In the next section, we'll look at how to create a wireless network in your home.
Building a Wireless Network
If you already have several computers networked in your home, you can create a wireless network with a wireless access point. If you have several computers that are not networked, or if you want to replace your Ethernet network, you'll need a wireless router. This is a single unit that contains:
1. A port to connect to your cable or DSL modem
2. A router
3. An Ethernet hub
4. A firewall
5. A wireless access point
A wireless router allows you to use wireless signals or Ethernet cables to connect your computers to one another, to a printer and to the Internet. Most routers provide coverage for about 100 feet (30.5 meters) in all directions, although walls and doors can block the signal. If your home is very large, you can buy inexpensive range extenders or repeaters to increase your router's range.
Photo courtesy Consumer Guide Products
A wireless router uses an antenna to send signals to wireless devices and a wire to send signals to the Internet.
As with wireless adapters, many routers can use more than one 802.11 standard. 802.11b routers are slightly less expensive, but because the standard is older, they're slower than 802.11a, 802.11g and 802.11n routers. Most people select the 802.11g option for its speed and reliability.
Once you plug in your router, it should start working at its default settings. Most routers let you use a Web interface to change your settings. You can select:
* The name of the network, known as its service set identifier (SSID) -- The default setting is usually the manufacturer's name.
* The channel that the router uses -- Most routers use channel 6 by default. If you live in an apartment and your neighbors are also using channel 6, you may experience interference. Switching to a different channel should eliminate the problem.
* Your router's security options -- Many routers use a standard, publicly available sign-on, so it's a good idea to set your own username and password.
Security is an important part of a home wireless network, as well as public WiFi hotspots. If you set your router to create an open hotspot, anyone who has a wireless card will be able to use your signal. Most people would rather keep strangers out of their network, though. Doing so requires you to take a few security precautions.
It's also important to make sure your security precautions are current. The Wired Equivalency Privacy (WEP) security measure was once the standard for WAN security. The idea behind WEP was to create a wireless security platform that would make any wireless network as secure as a traditional wired network. But hackers discovered vulnerabilities in the WEP approach, and today it's easy to find applications and programs that can compromise a WAN running WEP security.
To keep your network private, you can use one of the following methods:
* WiFi Protected Access (WPA) is a step up from WEP and is now part of the 802.11i wireless network security protocol. It uses temporal key integrity protocol (TKIP) encryption. As with WEP, WPA security involves signing on with a password. Most public hotspots are either open or use WPA or 128-bit WEP technology, though some still use the vulnerable WEP approach.
* Media Access Control (MAC) address filtering is a little different from WEP or WPA. It doesn't use a password to authenticate users -- it uses a computer's physical hardware. Each computer has its own unique MAC address. MAC address filtering allows only machines with specific MAC addresses to access the network. You must specify which addresses are allowed when you set up your router. This method is very secure, but if you buy a new computer or if visitors to your home want to use your network, you'll need to add the new machines' MAC addresses to the list of approved addresses. The system isn't foolproof. A clever hacker can spoof a MAC address -- that is, copy a known MAC address to fool the network that the computer he or she is using belongs on the network.
Wireless networks are easy and inexpensive to set up, and most routers' Web interfaces are virtually self-explanatory.
Posted by zuhri at 1:24 AM 0 comments
Introduction to How WiFi Works
If you've been in an airport, coffee shop, library or hotel recently, chances are you've been right in the middle of a wireless network. Many people also use wireless networking, also called WiFi or 802.11 networking, to connect their computers at home, and some cities are trying to use the technology to provide free or low-cost Internet access to residents. In the near future, wireless networking may become so widespread that you can access the Internet just about anywhere at any time, without using wires.
One wireless router can allow multiple devices to connect to the Internet.
WiFi has a lot of advantages. Wireless networks are easy to set up and inexpensive. They're also unobtrusive -- unless you're on the lookout for a place to use your laptop, you may not even notice when you're in a hotspot. In this article, we'll look at the technology that allows information to travel over the air. We'll also review what it takes to create a wireless network in your home.
First, let's go over a few WiFi basics.
What Is WiFi?
What's in a name?
You may be wondering why people refer to WiFi as 802.11 networking. The 802.11 designation comes from the IEEE. The IEEE sets standards for a range of technological protocols, and it uses a numbering system to classify these standards.
A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens:
1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.
2. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection.
The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. The radios used for WiFi communication are very similar to the radios used for walkie-talkies, cell phones and other devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s. But WiFi radios have a few notable differences from other radios:
* They transmit at frequencies of 2.4 GHz or 5 GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data.
* They use 802.11 networking standards, which come in several flavors:
o 802.11a transmits at 5 GHz and can move up to 54 megabits of data per second. It also uses orthogonal frequency-division multiplexing (OFDM), a more efficient coding technique that splits that radio signal into several sub-signals before they reach a receiver. This greatly reduces interference.
o 802.11b is the slowest and least expensive standard. For a while, its cost made it popular, but now it's becoming less common as faster standards become less expensive. 802.11b transmits in the 2.4 GHz frequency band of the radio spectrum. It can handle up to 11 megabits of data per second, and it uses complementary code keying (CCK) modulation to improve speeds.
o 802.11g transmits at 2.4 GHz like 802.11b, but it's a lot faster -- it can handle up to 54 megabits of data per second. 802.11g is faster because it uses the same OFDM coding as 802.11a.
o 802.11n is the newest standard that is widely available. This standard significantly improves speed and range. For instance, although 802.11g theoretically moves 54 megabits of data per second, it only achieves real-world speeds of about 24 megabits of data per second because of network congestion. 802.11n, however, reportedly can achieve speeds as high as 140 megabits per second. The standard is currently in draft form -- the Institute of Electrical and Electronics Engineers (IEEE) plans to formally ratify 802.11n by the end of 2009.
* Other 802.11 standards focus on specific applications of wireless networks, like wide area networks (WANs) inside vehicles or technology that lets you move from one wireless network to another seamlessly.
* WiFi radios can transmit on any of three frequency bands. Or, they can "frequency hop" rapidly between the different bands. Frequency hopping helps reduce interference and lets multiple devices use the same wireless connection simultaneously.
Other Wireless Networking Standards
Another wireless standard with a slightly different number, 802.15, is used for Wireless Personal Area Networks (WPANs). It covers a very short range and is used for Bluetooth technology. WiMax, also known as 802.16, looks to combine the benefits of broadband and wireless. WiMax will provide high-speed wireless Internet over very long distances and will most likely provide access to large areas such as cities.
As long as they all have wireless adapters, several devices can use one router to connect to the Internet. This connection is convenient, virtually invisible and fairly reliable; however, if the router fails or if too many people try to use high-bandwidth applications at the same time, users can experience interference or lose their connections.
Next, we'll look at how to connect to the Internet from a WiFi hotspot.
Posted by zuhri at 1:22 AM 0 comments