GSM V V Good

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 26

GSM GLOBAL SYSTEM FOR MOBILE COMMUNICATION

EE 737 Digital Spread Spectrum Dr. James Stephens May 24, 2004 Submitted by,

Sohel K. Baramatiwala
INDEX
1. Objective3 2. History....3 3. Basics and Specifications of GSM.3 4. Architecture and Building Blocks..5 5. Signaling schemes and Ciphering codes used7 5.1 Ciphering Codes...8 5.1.1 A3/8 Algorithm.9 5.1.2 A3/1 Algorithm.10 6. Two Main Interfaces..10 6.1 Air Interface.10 6.2 Abis Interface...11 7. Summary12 8. Future Enhancements.12 9. SUGGESTIONS FOR FURTHER STUDY..13 10. References..13

FIGURES
Fig1. Representation of a GSM signal using TDMA and FDMA with respect to the transmitted power. Fig 2. The Basic Blocks of the whole GSM system Fig 3. Transmitter for the voice signal

Fig 4. Receiver for voice signal

1. OBJECTIVE
In this paper I have outlined the reasons GSM started and how, the architecture that the GSM is built on, the signaling and ciphering codes used, the Air and Abis Interface and last but not the least future prospects and enhancements possible.

2. HISTORY
In 1980s the analog cellular telephone systems were growing rapidly all throughout Europe, France and Germany. Each country defined its own protocols and frequencies to work on. For example UK used the Total Access Communication System (TACS), USA used the AMPS technology and Germany used the C-netz technology. None of these systems were interoperable and also they were analog in nature. In 1982 the Conference of European Posts and Telegraphs (CEPT) formed a study group called the GROUPE SPECIAL MOBILE (GSM) The main area this focused on was to get the cellular system working throughout the world, and ISDN compatibility with the ability to incorporate any future enhancements. In 1989 the GSM transferred the work to the European Telecommunications Standards Institute (ETSI.) the ETS defined all the standards used in GSM.

3. BASICS OF WORKING AND SPECIFICATIONS OF GSM


The GSM architecture is nothing but a network of computers. The system has to partition available frequency and assign only that part of the frequency spectrum to any base transreceiver station and also has to reuse the scarce frequency as often as possible. GSM uses TDMA and FDMA together. Graphically this can be shown below

Fig 1.

Representation of a GSM signal using TDMA & FDMA with

respect to the transmitted power. Some of the technical specifications of GSM are listed below Multiple Access Method Uplink frequencies (MHz) Downlink frequencies (MHz) Duplexing Channel spacing, kHz Modulation Portable TX power, maximum / average (mW) Power control, handset and BSS Speech coding and rate (kbps) Speech Channels per RF channel: Channel rate (kbps) Channel coding Frame duration (ms) TDMA / FDMA 933-960 (basic GSM) 890-915 (basic GSM) FDD 200 GMSK 1000 / 125 Yes RPE-LTP / 13 8 270.833 Rate 1/2 convolutional 4.615

GSM was originally defined for the 900 Mhz range but after some time even the 1800 Mhz range was used for cellular technology. The 1800 MHz range has its architecture and specifications almost same to that of the 900 Mhz GSM technology but building the Mobile exchanges is easier and the high frequency Synergy effects add to the advantages of the 1800 Mhz range.

4. ARCITECTURE AND BUILDIGN BLOCKS


GSM is mainly built on 3 building blocks. (Ref Fig. 2) GSM Radio Network This is concerned with the signaling of the system. Handovers occur in the radio network. Each BTS is allocated a set of frequency channels. GSM Mobile switching Network This network is concerned with the storage of data required for routing and service provision. GSM Operation and Maintenance The task carried out by it include Administration and commercial operation , Security management, Network configuration, operation, performance management and maintenance tasks.

Fig.2 The basic blocks of the whole GSM system

Explanations of some of the abbreviations used Public Land Mobile Network(PLMN) The whole GSM system 5

Mobile System (MS) Base Transceiver Station

The actual cell phone that we use (BTS) Provides connectivity between network and mobile station via the Air- interface

Controls the whole subsystem. BaseStationController(BSC) Transcoding Rate & Adaption Unit This is instrumental in compressing the Data that is passed on to the network, is a part of the BSS.

(TRAU) Mobile Services Switching Center The BSC is connected to the MSC. The MSC routes the incoming and outgoing calls and (MSC) Home Location assigns user cannels on the A- interface. Register (HLR) This register stores data of large no of users. It is like a database that manages data of all the users. Every PLMN will have atleast one HLR.

Visitor Location

Resigter (VLR) This contains part of data so that the HLR is not overloaded with inquiries. If a subscriber moves out of VLR area the HLR requests removal of data related to that user from the VLR.

Equipment Identity Register (EIR) The IMEI no. is allocated by the manufacturer and is stored on the network in the EIR. A stolen phone can be made completely useless by the

network/s if the IMEI no is known.

5. SIGNALLING SCHEMES AND CIPHERING CODES USED


GSM is digital but voice is inherently analog. So the analog signal has to be converted and then transmitted. The coding scheme used by GSM is RPE-LTP (Rectangular pulse Excitation Long Term Prediction)

Fig.3 Transmitter for the voice signal

Fig.4 Receiver for the Voice signal The voice signal is sampled at 8000 bits/sec and is quantized to get a 13 bit resolution corresponding to a bit rate of 104 kbits/sec. This signal is given to a speech coder (codec) that compresses this speech into a source-coded speech signal of 260 bit blocks at a bit rate of 13 kbit/sec. The codec achieves a compression ratio of 1:8. The coder also has a Voice 7

activity detector (VAD) and comfort noise synthesizer. The VAD decides whether the current speech frame contains speech or pause, this is turn is used to decide whether to turn on or off the transmitter under the control of the Discontinuous Transmission (DTX). This transmission takes advantage of the fact that during a phone conversation both the parties rarely speak at the same time. Thus the DTX helps in reducing the power consumption and prolonging battery life. The missing speech frames are replaced by synthetic background noise generated by the comfort noise synthesize in a Silence Descriptor (SID) frame. Suppose a loss off speech frame occurs due to noisy transmission and it cannot be corrected by the channel coding protection mechanism then the decoder flags such frames with a bad frame indicator (BFI) In such a case the speech frame is discarded and using a technique called error concealment which calculates the next frame based on the previous frame.

5.1 CIPHERING CODES


MS Authentication algorithms These algorithms are stored in the SIM and the operator can decide which one it prefers using. 5.1.1 A3/8 The A3 generates the SRES response to the MSCs random challenge, RAND which the MSC has received from the HLR. The A3 algorithm gets the RAND from the MSC and the secret key Ki from the SIM as input and generated a 32- bit output, the SRES response. The A8 has a 64 bit Kc output. 5.1.2 A5/1 (Over the Air Voice Privacy Algorithm) The A5 algorithm is the stream cipher used to encrypt over the air transmissions. The stream cipher is initialized for every frame sent with the

session key Kc and the no. of frames being decrypted / encrypted. The same Kc key is used throughout the call but different 22-bit frame is used.

6. TWO MAIN INTERFACES


The two main interfaces are the AIR and the ABIS interface. The figure shows the signaling between them. AIR INTERFACE signaling between MS and BTS ABIS INTERFACE signaling between BTS and BSC

Fig.5 Signaling between Air and Abis Interface

6.1AIR INTERFACE
The air interface is like the physical layer in the model. The signaling schemes used in the AIR interface are as follows BROADCAST CONTROL CHANNE (BCCH) o Broadcast Control Channel (BCCH) This channel broadcasts a series of information elements to the MS, such as radio channel configuration, synchronization information etc.

o FREQUENCY CORRECTION CHANNEL (FCCH) This channel contains information about the correction in transmission frequency broadcasted to MS. o 0SYNCHRONIZATION CHANNEL (SCH) It broadcasts data for the frame synchronization of a MS and information to identify a BSC. COMMON CONTROL CHANNEL (BCH) This is a point to multi-point signaling channel to deal with access management functions. Consists of 3 channels o RANDOM ACCESS CHANNEL (RACH) It is the Uplink portion, accessed from the mobile stations in a cell to ask for a dedicated signaling channel for 1 transaction. o ACCESS GRANT CHANNEL (AGCH) It is the downlink portion used to assign a dedicated signaling channel. o NOTIFICATION CHANNEL (NCH) It is used to inform mobile stations about incoming calls and broadcast calls. DEDICATED CONTROL CHANNEL (DCCH) It is a Bi-directional point to point signaling channel. Consists of 3 channels o STAND ALONE DEDICATED CONTROL CHANNEL (SDDCH) Used for signaling between the BSS and MS when there is no active connection between them. o SLOW ASSOCIATED CONTROL CHANNEL (SACCH)

10

This channel had to continuously transfer data because it is considered as proof of existence of a physical radio connection. o FAST ASSOCIATED CONTROL CHANNEL (FACCH) This channel is used to make additional band-width available for signaling.

6.2. ABIS INTERFACE


This is the interface between BTS & BSC. The transmission rate is 2.048 Mbps, portioned into 32 channels of 64 Kbps each. As commercial service was introduced interference problems between BTSs increased and QoS decreased. Thus service providers moved to using more cells with fewer TRXs and smaller output power (<1W.) SIGNALLING on the Abis Interface It utilizes layer 1-3 of the OSI protocol stack. Layer 1 forms the D-channel It provides the basic signaling on the Abis interface that is it helps in building a link between the BTS and BSC. Layer 2 is the LAPD channel Also known as the Link Access Protocol. Once a connection has been established between the BSC and BTS, data can be transmitted as soon as layer 2 is operable. Layer 3 is the TRX management This layer decides whether the incoming signal is to be just passed or processed depending on whether it is a speech signal or a signal to establish a link.

7. SUMMARY
In this paper I have tried to explain the basic working of the GSM system. Although this paper might be missing many details of a detailed GSM explanation I believe I have explained the philosophy behind GSM. GSM operates at 900 MHz and 1800 MHz and is

11

truly an international system which is compatible with ISDN. Together with international roaming, SMS, Data transfer etc GSM systems are coming closer to a personal communication system, close to UMTS currently being developed in Europe. Though 3 rd generation mobile phones are taking over the market, the back-bone for most cellular technologies will always remain GSM.

8. FUTURE ENHANCEMENTS
One major problem was number compatibility, but now this problem has been solved and this is possible. Another major problem is SIM card cloning which allows users to make fraudulent calls. This can be got rid of by incorporating a more secret key in the SIM then the currently used one which can be cracked asking a few queries. Another possibility is making the whole GSM station design in software; this will make upgradation of systems really easy. 3 GSM which seems to be taking over the market is an advancement in 2G and in a few years will make 2G obsolete. The 3G system incorporates W-CDMA in it, and makes multimedia and high speed internet access possible. The next step is AD-HOC networks used in cellular technology. In this every MS itself would act as a BTS. But they have a long way to go as research in this area is still going on.

9. SUGGESTIONS FOR FURTHER STUDY


You could also do in depth analysis of the signaling scheme used in GSM, including the timing and the structure of the frames, the error correcting codes and QoS. The codecs

12

used in GSM is a vast topic and improved codecs that can utilize the available frequency better and yet give a sharper speech output are being developed. Study of the ciphering techniques used in detail and type of possible attacks on the GSM system. Study about General Packet Radio Service (GPRS) and how packet switching helps to reduce the complexity in networks. GPRS needs to be incorporated in the GSM architecture. Also GPRS helps reduce misuse as is the case in GSM. Study about the Wireless Access Protocol which defines an architecture such that the web pages can be viewed on a mobile device using the current GSM technology.

10. REFERENCES
GSM networks: Terminology, protocols and implementation Gunnar Heine GSM: Switching, Services And Protocols Jorg, Vogel and Bettstetter GSM Technical Specification ETSI http://ccnga.uwaterloo.ca/~jscouria/GSM/gsmreport.html www.gsm.org www.techmind.org An Overview of GSM www.comms.eee.strath.ac.uk/~gozalvez/gsm/gsm http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html

13

GSM
GLOBAL SYSTEM FOR MOBILE COMMUNICATION

GSM is a cooperative effort among thousands of the best minds in the world, all of whom share both the workload and the benefits of each others successes.
[Lamb 1997]

14

Debby Nahl
Dec. 10, 2004

15

GSM (Global System for Mobile Communication) is an ever changing / ever evolving digital technology for global communication. I discovered that in order to get to the big picture of what GSM really is I had to look into some of the history and the building blocks it has used to get to where it is today. Innovation is the key to keeping up with the market and with that and user demands, like any other technology there is always something bigger and better already being developed or waiting in the wings. It all began in the early 1980s when Europe began experiencing rapid growth in the analog cellular telephone systems. Scandinavia, France, Germany and The United Kingdom were all developing their own type of telecommunication systems. Each of these systems were incompatible with the others in equipment and operation therefore causing concern with the congestion and the entire market. In 1982 at the Conference of European Posts and Telegraphs (CEPT) a group was formed to study and develop a pan-European public land mobile system. This group was originally known as Groupe Special Mobile (GSM) this name later takes on the name of the project and eventually the new technology itself. The mandate for this group was to develop a standard to be common for the countries that created it and to provide service to the entire European continent. The criteria they were faced with was based on a couple of different things they wanted to correct the known problems that the analog service was experiencing but they also wanted it to be ISDN compatible visions of the future. The list of some of the criteria follows: good subjective quality better sound quality low terminal and service cost not too costly support for international roaming one system for all of Europe ability to support handheld terminals all types of mobile phones support for range of new services and facilities able to communicate with other areas enhanced features wanted more features such as a form of caller id ISDN compatability wanted the services that were similarly offered by ISDN

16

enhance privacy remove the eavesdropping problem security against fraud fraud was common with analog telephone service

Basically they wanted the best for the least amount of money possible. To achieve this goal they decided to build their system in a digital environment, which was unexplored territory at the time. They chose this environment in order to meet the criteria listed above and because they felt that the advancements in the area with the new compressed algorithms and digital signal processors supplied the tools and flexibility they needed to achieve their goals. In the late 1980s the GSM project was transferred to the European Telecommunication Standards Institute (ETSI) and a new group SMG (Special Mobile Group) was created. Their task was to document the functionality and interaction of every aspect of the GSM network. The network equipment manufacturers around the world were expressing concerns about this new spreading technology. The biggest questions were how many systems would be built and would all of the systems be the same or would there be a custom version for every market. These concerns led to the creation of the GSM MoU (Memorandum of Understanding) Association. This association was overseen by the ETSI in 1987. It was made up of work groups throughout the world specifically designed to allow interested parties to meet and work on finding solutions to system enhancements that will fit into existing programs of GSM operators. Their concept of a published international standard and a constantly evolving common standard was unique to GSM. Phase I of the specifications was published in 1990. International demand was so great that the system name was changed from Groupe Special Mobile to Global Systems for Mobile Communications (still GSM). The first commercial service started in mid-1991 and the first paying customers were signed up for service in 1992. There is no way to determine

17

or prove who actually signed up the first paying customer because people were given service within hours of one another. One company, Dansk Mobile Telefone in Denmark, currently holds the uncontested title as the first with their product Sonofon. It didnt take long for it to catch on and it spread rather quickly. For example one year later (1993) there were 1.3 million subscribers worldwide. Three years after that (1996) there were more than 25 million subscribers and by October of 1997 it had grown to more than 55 million subscribers worldwide. In a five-year time period it had grown to service over 55 million subscribers. Some of the building blocks that were used along the way include some of the older analog technologies. For example they referenced a technology that was mainly used in North and South America and approximately 35 other countries. This analog technology was called Advanced Mobile Phone System (AMPS) and it operated in the 800 MHz band using FDMA (Frequency Division Multiple Access) technology. TACS (Total Access Communication System) is a variation of AMPS so it is also an analog system. It was deployed in a number of other countries but it was prevalent in the UK. Another system is the NMT (Nordic Mobile Telephone System), which is also an analog technology. NMT operates in the 450 to 900 MHz band and was the first technology to offer international roaming but only within the Nordic countries. The developers of the GSM system were the first to use digital technology, which was considered unproven at the time. Its now considered the 2nd generation digital technology that was originally developed in the 900 MHz band and has been modified for the 850, 1800 and 1900 MHz bands.

18

There are two common types of transport mechanisms used for digital systems: TDMA (Time Division Multiple Access) and CDMA (Code Division Multiple Access). During my research of these technologies I found a useful example that really helps explain the difference in these two technologies. It likened the TDMA technology to several streets converging into one and at the intersection was a traffic cop that determined which car got to pass on the single street the traffic cop acting as the base station and the shared street the radio channel. CDMA was explained by using a party environment. At this party there are multiple groups of people having different conversations. When you join a group you are aware that there are multiple other conversations going on in the room around you (similar to broadcasting on the same frequency), but you are only participating in the conversation within the group you joined (a code assigned to that particular person within the group). These transport mechanisms are used to pass the data between the antennas at the base station and the handset. The system architecture is made up of the Mobile Station (MS), Base Station System (BSS) and the Network Subsystem (NSS). The MS has two entities: 1) the Mobile Equipment (ME) and 2) the Subscriber (SIM). Mobile Equipment (the handsets) are produced by many manufacturers but they must obtain approval of their handsets from the standardization body therefore they are somewhat standardized. Each ME is identified by an IMEI (International Mobile Equipment Identity). The SIM is simply a smart card that contains the International Mobile Subscriber Identity (IMSI). They come in two forms large and small. The SIM card allows the user to send and receive calls and to also receive other subscribed services. Each of these contains encoded network identification details and are protected by a password or a PIN. These SIM

19

can be moved from handset to handset and are necessary to activate the phone because they contain key information necessary to begin service on that handset. The Base Station Subsystem (BSS) is composed of two parts that communicate across the standardized Abis interface allowing operation between components made by different suppliers. These parts are the Base Transceiver Station (BTS) and the Base Station Controller (BSC). The BTS houses the radio transceivers that define the calls. They have antennas with several TRXs (radio transceivers) that each communicates on one frequency. The speech and data transmissions are recoded using the special encoding used on the radio interface to the standard 64 kbit/s encoding used in telecommunication networks. It also handles radio-link protocols with the MS. Because of this the BTS is required to be rugged, reliable, and portable. The BSC manages resources for the BTS, handles the call set up and location updates. It also handles the handovers for each MS. The Mobile Switching Center is known as the Heart of the Network and is part of the Network Subsystem and its function is to switch speech and data connections between Base Station Controllers, Mobile Switching Centers, GSM-networks, and other external networks. Its three main jobs are to connect calls from sender to receiver, collect details of the calls made and received, and supervise operation of the rest of the network components (thus the heart of the network). There two different types of Location Registers Home Location Registers (HLR) and Visitor Location Registers (VLR). The HLR contains administrative information of each subscriber and the current location of the mobile so the MSC does not have to search to find the handset. This is known as mobile management. The VLR contains selected administrative information from the HLR. It authenticates the user, tracks which customers

20

have their handsets on and therefore ready to receive a call. It also periodically updates the database with the information on which handsets are active and ready to receive calls. The Authentication Center (AuC) is also a part of the Network subsystem. It is mainly used for security but it is also the data storage location and functional part of the network. The Ki is the primary element of the AUC because it is used in the encryption of the data packets. The SIM card generates a Kc by running Ki and Rand (a random number) through the A8 algorithm. The Kc is then passed from the SIM to the handset. The data packet, Kc and current number of the TDMA frame is run through the A5 algorithm and receives a numeric answer known as the SRES. The SRES is then slotted into the TDMA frame and sent to the VLR for authentication. If the numbers match the call is connected without sending any important information out onto the system. See Appendix A for a diagram of a high level overview of the system. There is another type of encryption that can be used called Frequency Hopping. The encryption is done by scattering each data packet onto different channels for example one packet will be sent on channel 1 and another on channel 2, etc. The Equipment Identity Register (EIR) is an optional database. It is used to track handsets using the IMEI and made up of three classes: 1) the White List, 2) the Black List, and 2) the Gray List. The IMEIs that appear on the White List are considered good and can continue on with the process of connecting. The Black List is used to keep track of handsets that are stolen or should not be allowed access anymore. The Gray List is used for testing and development. GSM has some of the basic features that were a part of the analog system but it has also added some additional ones which gives GSM an advantage over other types of systems.

21

Some of the basic features provided by GSM are: o call waiting notification of an incoming call while on the handset o call hold the ability to put a caller on hold and they wont hear any of the conversion you may be having on another line o call barring the ability to not accept any calls, any or only outgoing call, any or only incoming calls, any or only roaming calls, etc. o call forwarding the ability to have calls made to that handset be sent to any number defined by the user o multi-party call conferencing the ability to link multiple call together so all parties can participate in the same conversation Some of the added features provided by GSM are: o calling line id incoming telephone number displayed o alternate line service one line for personal call and one line for business calls (allows the user to keep accurate records of how much time is used for business and / or personal) o closed user group group of people that can be called from that handset by dialing only the last four digits of the phone number (much like what is used within businesses using extensions) o advice of charge ability to tally actual costs of particular phone calls o fax & data the Virtual Office / Professional Office an adapter card (type II standard PCM/CIA card) that can fit into any laptop or portable fax machine (credit card sized computer modem) o roaming services and features can follow customer from market to market The advantages of GSM over analog services are: o o o o o o o o o o crisper, cleaner, quieter calls security against fraud and eavesdropping international roaming capability in over 100 countries improved battery life efficient network design for less expensive system expansion efficient use of spectrum advanced features such as short messaging and caller ID wide variety of handsets and accessories high stability mobile fax and data at up to 9600 baud each of use with over the air activation all account information is held in the SIM which can be moved from handset to handset

22

Just for the fun of it I compared these advantages to the original criteria that was set out for GSM at the onset. In comparing the criteria with the advantages in the table below I believe they were successful in meeting the original criteria.
Criteria good subjective quality low terminal and service cost support for international roaming ability to support handheld terminals support for range of new services and facilities enhanced features ISDN compatible enhance privacy security against fraud Advantages crisper, cleaner, quieter calls efficient network design for less expensive System expansion international roaming capability in over 100 countries wide variety of handsets and accessories efficient use of spectrum Enhanced features such as short messaging high stability mobile fax and data at up to 9600 baud security against eavesdropping security against fraud

The innovations in the market today include new service requirements and the availability of new radio bands that can lead to potential new customers. There are also new user demands that will have to be addressed in the third generation models because they cannot be handled in the current GSM network. These user demands include seamless Internet / Intranet access, a wider range of available services, compact, lightweight and affordable terminals, simplified terminal operation, and open and understandable pricing structures for the whole spectrum of available services. UMTS (Universal Mobile Telephone System) is the next third generation system for the year 2002 and going forward into the current year. The plan has been to deploy the new enhanced technology that is geared toward multimedia communication in stages. The system will be further enhanced at every

stage and it will also maintain backward compatibility as well.

23

Mobile to Mobile: Request is sent to the MSC validated in the VLR authenticated in the AuC passed on to Public Switched Telephone Network (PSTN) PSTN validates the number verifies it can be delivered connects Land to Mobile: PSTN receives request sends to home MSC queries VLR incoming call from particular MSISDN responds with IMSI and last known location validates handset is on authenticates receiving SIM instructs handset to ring Mobile to Mobile on the same network: Call request MSC validates in VLR authentication MSC advises VLR incoming call with MSISDN VLR responds with IMSI and last known location validates handset is on authenticates receiving SIM network instructs handset to ring

APPENDIX A

24

Bibliography: Website References: GSM World. 2004. http://www.gsmworld.com/technology/3g/intro.shtml GSM World. 2004. http://www.gsmworld.com/technology/glossary.shtml GSM World. 2004. http://www.gsmworld.com/technology/faq.shtml GSM World. 2004. http://www.gsmworld.com/about/history/index.shtml Protocols.com. RAD COM Academy. http://www.protocols.com/pbook/cellular.htm Introduction to GSM. Performance Technology. 2001. http://www.pt.com/products/gsmintro.html Overview of the Global System for Mobile Communication. John Scourias. 1997. http://ccnga.uwaterloo.ca/~jscouria/GSM/gsmreport.html Forensics and the GSM mobile telephone system. Svein Yngvar Willassen, M.Sc, Senior Investigator, Computer Forensics, Ibas AS. 2002. http://www.ijde.net/03_spring_art1.html Web ProForum Tutorials.
The International Engineering Consortium. 15 Jan. http://www.iec.org

An overview of the GSM system. Sempere, Javier Gonzalez. 2002 http://www.comms.eee.strath.ac.uk/~gonzalvez/gsm/html

Books: Muratore, Flavio. UMTS Mobile Communications for the Future. New York: John Wiley & Sons, 2001. Lee, William C.Y. Mobile Communications Design Fundamentals. New York: Wiley Interscience Publication, 1993. Eberspacher, Jory., Vogel, Hans-Jory, and Bettstetter, Christian. GSM Switching Services and Protocols. New York: John Wiley & Sons, 2001. Lamb, George. GSM Made Simple.
Georgia: Regal Printing, 1997.

Newton, Harry. Newtons Telecom Dictionary. San Francisco: CMP Books, 2004.

25

Acronyms: AMPS AuC BSC BSS BTS CDMA CEPT CSPDN EIR ETSI FDMA GSM GSM MoU HLR IMEI IMSI ISDN ME MS MSC NMT NSS PIN PSPDN PSTN RAND SIM SMG SRES TACS TDMA VLR A5 Algorithm A8 Algorithm Kc Ki Advanced Mobile Phone Service Authentication Center Base Station Controller Base Station Subsystem Base Transceiver Station Code Division Multiple Access Conference of European Posts and Telegraph Circuit Switched Public Data Network Equipment Identity Register European Telecommunication Standards Institute Frequency Division Multiple Access Groupe Speciale Mobile and Global Systems for Mobile Communications GSM Memorandum of Understanding Association Home Location Register International Mobile Station Equipment Identity International Mobile Subscriber Identity Integrated Services Digital Network Mobile Equipment Mobile Station Mobile Services Switching Center Nordic Mobile Telephone System Network Subsystem Personal Identification Number Packet Switched Public Data Networks Public Switched Telephone Network Random Number Subscriber Identity Module Special Mobile Group Signed Result Total Access Communication System Time Division Multiple Access Visitor Location Key Ciphering algorithm Ciphering key computation Ciphering key Subscriber Authentication Key

26

You might also like