Professional Documents
Culture Documents
Saugat Adhikari
Saugat Adhikari
2019-20 Autumn
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
1|Page
ACKNOWLEDGEMENT
It is always a pleasure to remind the fine people in the Islington College and
London Metropolitan University for their sincere guidance I received to uphold my
academic and practical skills in Networking and Operating Systems.
First of all, thanks to Mr. Dipeshor Silwal, module leader of Network and Operating
Systems for assigning us (the students) this coursework that broadens the horizon of a
networking student with theoretical, practical and report writing skills.
Second, I would like to thank Mr. Suryansh Mathema, lecturer of this module who
enlightened me with proper understanding of various Network topologies and
technologies. He provided proper guidance and format required to develop this report.
Finally, I would like to express my sincere gratitude to Mr. Umesh Nepal, tutor for
this particular module. His immense feedback and review helped me to transform my
report into professional standard.
2|Page
ABSTRACT
The technical reports developed in this coursework are divided into two tasks. The main
objective of Task A is to develop a network simulation model in COMNET III that depicts
the ATM transaction network setup of IBN Bank in Nepal. In this model, two ATM networks
are created in Lalitpur and Biratnagar that are connected to the WAN Cloud which is
further connected to the Edinburgh Network of IBN Bank. Similarly, Task B shows the
detailed report on the introduction, history, architecture, analysis and conclusion of GSM
and emerging mobile communication technologies. The Task A of the coursework was
required to be done in COMNET software; which is a performance analysis tool for
communication networks. The technical report on GSM and other mobile communication
technology depicts critical analysis of wireless and wired communication mediums along
with their working mechanism and architecture. Both the reports have extensive amount
of research paper, journals, articles, books and genuine websites as references and
bibliography.
3|Page
Table of Contents
4|Page
2.2.2. CELLULAR TECHNOLOGIES........................................................................................................ 52
2.2.2.1. 1G, 2G, 3G AND LTE ........................................................................................................... 52
2.2.2.2. WIRELESS COMMUNICATIONS .......................................................................................... 53
2.2.2.3.1. WAP ............................................................................................................................... 53
2.2.2.3.2. GPRS .............................................................................................................................. 53
2.2.2.3.3. EDGE .............................................................................................................................. 53
2.2.2.3.4. UMTS ............................................................................................................................. 54
2.3. CONCLUSION .................................................................................................................................. 55
References ............................................................................................................................................ 56
Bibliography .......................................................................................................................................... 58
Appendices............................................................................................................................................ 59
A. Introduction ............................................................................................................................... 59
B. Architecture of GSM .................................................................................................................. 59
B.1 Subscriber Identity Module ...................................................................................................... 59
B.2 Transcoding Rate and Adaption Unit ........................................................................................ 60
B.3 Mobile Services Switching Centre............................................................................................. 60
B.4 Home Location Register ........................................................................................................... 60
B.5 Visitor Location Register .......................................................................................................... 61
C. Mobile Communication.............................................................................................................. 61
D. Cellular Radio............................................................................................................................. 62
E. History of Communication ......................................................................................................... 62
F. Disadvantages of Mobile Communication/Technology ............................................................... 62
G. First Generation (1G) ................................................................................................................. 63
H. Second Generation (2G) ............................................................................................................. 64
I. Third Generation (3G) ................................................................................................................ 65
J. Fourth Generation (4G) .............................................................................................................. 66
K. Wireless Application Protocol (WAP).......................................................................................... 67
L. General Packet Radio System (GPRS) ......................................................................................... 68
M. Enhanced data rates for GSM evolution (EDGE) ...................................................................... 70
N. Universal Mobile Telecommunications Service (UMTS) .............................................................. 71
5|Page
Table of Figures
6|Page
Figure 39: Mobile and Internet users ............................................................................. 42
Figure 40: Early history of mobile communication ......................................................... 43
Figure 41: Evolution of Mobile Industry ......................................................................... 44
Figure 42: Global mobile traffic per month. Source: Cisco Systems (2014) Cisco Visual
Networking .................................................................................................................... 45
Figure 43: History of 1G to 3G ...................................................................................... 46
Figure 44: Low and High Frequency Sine wave ............................................................ 47
Figure 45: Advantages of Smartphones (Chanana, 2013) ............................................ 48
Figure 46: Disadvantages of Mobile Phones (Chanana, 2013) ..................................... 50
Figure 47: Specifications for GSM and CDMA .............................................................. 51
Figure 48: Architecture of AMTS ................................................................................... 63
Figure 49: UMTS Network Architecture ......................................................................... 65
Figure 50: WCDMA Network Architecture ..................................................................... 66
Figure 51: LTE Network Architecture ............................................................................ 67
Figure 52: WAP Architecture ......................................................................................... 68
Figure 53: Functional View of GPRS Network ............................................................... 69
Figure 54: GSM EDGE Network Architecture ................................................................ 70
Figure 55: High Level UMTS Architecture ..................................................................... 71
Figure 56: Overview of Network Model ......................................................................... 72
Figure 57: Edinburgh LAN of the Network Model .......................................................... 72
Figure 58: Biratnagar LAN of the Network Model .......................................................... 73
Figure 59: Lalitpur LAN of the Network Model ............................................................... 73
Figure 60: WAN Cloud of the Network Model ................................................................ 74
Figure 61: Simulation Parameters ................................................................................. 74
Figure 62: Access Link Stats inside WAN Cloud ........................................................... 75
Figure 63: Channel Utilization of all the links................................................................. 75
Figure 64: Frame Counts by Virtual Circuit inside WAN Cloud ..................................... 76
Figure 65: Frame Delay by Virtual Circuit inside WAN Cloud ........................................ 76
Figure 66: Message Delay for all the message sources and responses ....................... 77
Figure 67: Message Delivered for all the message sources and responses ................. 77
Figure 68: Counts for all the message received through each node ............................. 78
Table of Tables
7|Page
Task A
8|Page
1.1 INTRODUCTION
1|Page
As seen in Figure 1, there are three subnets that comprise of Edinburgh LAN, Lalitpur
LAN, and Biratnagar LAN. All these subnets are connected with a central WAN Cloud
that optimizes the WAN connection between Nepal and Edinburgh.
A wide area network covers a large geographical area, often a country or a continent. Al
l hosts of this connection are connected to the subnet of communication. Any WAN mod
el consists of transmission lines (Ethernet, Token Passing Ring) and switching elements
(Router). (Tanenbaum, 2003 ) The WAN model for IBN bank’s network includes three
subnets and a WAN cloud. Lalitpur LAN and Biratnagar LAN consist of all the ATM
transactions nodes and Cisco Router that is connected with frame relay cloud with a
2|Page
transmission rate of 56kps. The Lalitpur LAN and Biratnagar LAN both have 50 ATM
nodes as computer group and a single teller machine that is connected via Token Passing
Ring. All the subnets/LANs have an access link point each for connecting into the WAN
cloud. Similarly, the WAN cloud has access links and virtual links inside the model. The
success of WAN connection is defined by the process of ATM transaction requests
reaching Edinburgh Server and its effective response to those requests
3|Page
As seen in Figure 3, Edinburgh LAN has three major components; an Edinburgh Server,
Token Passing Ring and Edinburgh Router. This subnet is connected to WAN cloud via
access point that is connected with Edinburgh Router (Cisco Router 710sp). Then, the
router is connected to a Token-Passing Link (IEEE 802.5 16Mpbs) that is ultimately
connected to Edinburgh Processing Server. The main functionality of Edinburgh Server
is that it provides a response to the Lalitpur and Biratnagar ATM transaction requests.
Cloud WAN virtualizes and delivers all network functions as a service, including core
network functions such as packet steering and path selection. Using cloud in any network
provides stability in WAN connection over any physical infrastructure. (velocloud, 2019)
Similarly, in our network model, Edinburgh LAN, Lalitpur LAN, and Biratnagar LAN are
connected into the frame relay cloud via Cisco Router 7010sp, V10.0. This cloud makes
it possible for the ATM transaction request from Nepal to reach the Edinburgh Server.
4|Page
The WAN cloud has three access points connecting to their respective access links and
furthermore, has four virtual links that are shown in Figure 3.
Three point-to-point links/ Access Links are used in the model; namely, Edinburgh
Access, Lalitpur Access, and Biratnagar Access. As seen in Figure 3, all the access links
have a transmission rate of 56kbps for both packets coming from and to the WAN cloud.
All these access links are connected with their respective virtual link/ frame relay.
5|Page
1.2.2.2. VIRTUAL CIRCUIT
Frame Relay is a high-performance network protocol that operates on the physical and
data link layer of the OSI reference model. The essence of frame relay is that it is a
connection-oriented network with no error control and no flow control; where packets are
delivered in order. (Tanenbaum, 2003 ) On the other hand, Frame Relay Virtual Circuit
that is used in Figure 5 is only a logical connection that doesn’t use physical addresses
to define the Data Terminal Equipment. Here, four virtual circuits are used namely;
Lalitpur-Edinburgh, Edinburgh-Lalitpur, Biratnagar-Edinburgh and Edinburgh-Biratnagar.
Edinburgh access link serves as a focal point for the virtual circuits created for Biratnagar
and Lalitpur Access links. Similarly, the Frame relay VC’s used in the WAN cloud has a
transmission rate of 64kpbs using a sliding window burst type. Furthermore, in sliding
window protocols all the senders maintain a set of sequence numbers corresponding to
the frames it is permitted to send. (Tanenbaum, 2003 )
6|Page
1.2.3. BIRATNAGAR AND LALITPUR LAN
Figure 7 shows the architecture of Lalitpur that comprises a Cisco router, Token Passing
Ring, a computer group and a processing node. A message source is connected to both
computer groups and single processing nodes. The computer group in this LAN consists
of 50 ATM machines that request a transaction message each minute to the Edinburgh
Server. Similarly, a single teller machine also has the same criteria. Both these ATM
nodes are connected via a Token Passing Ring of IEEE 802.5 16Mbps standard.
Furthermore, a Cisco Router is connected between the token-passing ring and the access
point to the WAN cloud.
Figure 8 that is inserted below depicts the model of Biratnagar LAN that is identical to the
Lalitpur LAN previously discussed. Both these LANs are in different cities with different
ATM nodes, router, and token passing ring.
7|Page
Figure 8: Biratnagar LAN
8|Page
1.2.3.1. NETWORK DEVICE: ROUTER
All the network devices used throughout the network model are Cisco Routers 7000/7010
sp. The use of this router is all the three LANs is similar as it provides a gateway
connection between the local Token Passing ring and access link of the WAN Cloud.
Network devices are a prerequisite in any WAN model; as they are the medium that
actually allows the packets to pass through the internet and reach its desired destination.
9|Page
1.2.3.2. TOKEN PASSING LINK
The Token Ring Network was announced in October 1985 as a 4Mbps local area network
providing computers and workstations with high bandwidth peer-to-peer connectivity
between computers and workstations. (Blair, 1989) This connection is identified by IEEE
as 802.5 standards. We use an 802.5 16Mpbs token ring in all the LANs of our network
model; which provides fast transmission speed and reduces the chances of data collision
as each node/computer group only transmits a packet when it acquires the token.
10 | P a g e
1.2.3.3. PROCESSING NODE
11 | P a g e
Figure 12: Processing Node (Edinburgh Server)
Figure 12 shows the processing node that is used in Edinburgh LAN which is acting as
an Edinburgh Server placed at headquarter of IBN Bank. This node is connected to a
Token-Passing Ring of 16Mpbs and has a message response to all the ATM requests
from Biratnagar and Lalitpur LAN.
12 | P a g e
1.2.3.4. COMPUTER GROUP
The computer group used in the Biratnagar and Lalitpur LAN comprises of 50 different
ATM transaction nodes each. The computer group node is very helpful for designing
network architectures in this simulation environment; as a single computer group holds
the properties of all required number of workstations. The ATM computer group is
connected to a Token-Passing Ring of 16Mbps and has a message/transaction request
each minute that is destined to reach Edinburgh Server.
13 | P a g e
1.2.3.5. MESSAGE SOURCE
The computer group of 50 ATM transaction nodes in each of Lalitpur and Biratnagar LAN
has a message source that sends a transaction request to Edinburgh server each minute.
As seen in Figure 14, this message source has an interarrival time with exponential
distribution of 0.5 with a stream value of 2.
Similarly, Figure 15 shows the size of the message produced by each ATM transaction
node in Lalitpur and Biratnagar. This size of this ATM authorization message can be
described by a uniform distribution where the size is evenly dispersed over the range of
50 to 100 bytes with a stream value of 2.
14 | P a g e
Figure 15: Message Source (Computer Group) Messages
15 | P a g e
The ATM authorization message requests that are sent by the computer group of ATM
nodes has a destination type of random list with the list consisting of only Edinburgh
Server of Edinburgh LAN. It is essential to determine the server as the sole destination;
as ATM transaction request must be only authorized by Edinburgh Server at headquarter
of IBN Bank.
All the message source (ATM group and single teller machine) and message response
(ATM authorization) use the same parameters for packet size, protocols and routing
class. As seen in Figure 17, all the messages use TCP/IP – Windows V1.0 as the packet
transferring protocol. Similarly, the standard packet size for all message source and
response is 10.0ms and most importantly they use IGRP metric as the routing class.
Inside the IGRP metric class, the hop limit is set to 65,535 with weigh(k1) =1.
16 | P a g e
Figure 18: Message Source (Single Teller) Scheduling
17 | P a g e
Figure 19: Message Source (Single Teller) Messages
Biratnagar LAN and Lalitpur LAN both have a single teller machine each that generates
a message source each minute. Unlike the message source for computer group (ATM
nodes), the message authorization request from the single teller machine is generated an
interarrival time that can be defined with an exponential distribution with mean 30.
Likewise, the size of the message is defined by uniform distribution where the size is
evenly dispersed over the range of 50 to 120 bytes. This message source has similar
destination at Edinburgh Server of Edinburgh LAN as the message source from 50 ATM
Nodes.
18 | P a g e
1.2.3.6. RESPONSE SOURCE
Only the Edinburgh Server of Edinburgh LAN generates a message response or ATM
authorization response for messages from Lalitpur and Biratnagar LANs. Figure 20
depicts the scheduling parameters of this response message which has four different list
of received message namely; Biratnagar ATM Req, Biratnagar Single Teller Req, Lalitpur
ATM Req and Lalitpur Single Teller Req.
19 | P a g e
Figure 21: Message Response (Messages)
The ATM requests from Lalitpur and Biratnagar LANs are processed at the Edinburgh
server of IBN Bank. The message response from Edinburgh server can be described by
a uniform distribution where the size is evenly dispersed over the range of 50 to 100 bytes
with a stream value of 2.
20 | P a g e
1.3 DESCRIPTION OF REPORTS
The major advantage of using COMNET III for designing and simulating network models
is the automatic generation of reports. The report parameters cover a wide aspect of
options from Node Report, Channel Utilization and Message Delay. Hence, the received
message counts of all nodes, channel utilization, Frame Delay by VC, Frame Count by
VC, Access Link Stats, Message Delay for all nodes and Message Delivered for all nodes
is explained below.
Figure 22 demonstrates the count of all the message received by their respective receiver
along with its message name. As seen on the 1st row, the message named Biratnagar
ATM Req has reached Edinburgh Server of Edinburgh LAN for a total of 711 times.
Similarly, the ATM Request from Lalitpur has also reached Edinburgh Server 696 times.
Since the single teller machine in Biratnagar LAN is a single processing node; the
message generated from that machine has only reached the Edinburgh Server once. This
report is very useful in analyzing the number of times the message source reaches its
destinations and helps to determine the success of any LAN and WAN model.
21 | P a g e
Receiver(Message Name) vs Counts
800
700
600
500
COUNTS
400
300
200
100
0
Edinburgh Server Edinburgh Server Edinburgh Server
(Biratnagar ATM Req) (Lalitpur ATM Req) (Biratnagar Single
Teller Req)
Counts 711 696 1
22 | P a g e
1.3.2. LINK REPORT: CHANNEL UTILIZATION
0.76
0.755
0.75
UTILIZATION %
0.745
0.74
0.735
0.73
0.725
0.72
Edinburgh LAN. Biratnagar LAN. Lalitpur LAN. Token-
Token-Passing Ring Token-Passing Ring Passing Ring
Utilization % 0.7338 0.7556 0.758
23 | P a g e
All three LAN environment in this network model uses a Token-Passing Ring of 16Mbps
as channel requirement. So, Figure 24 illustrates the channel utilization of those token
rings used in LANs. This report has four major points namely, Link, Frames, Transmission
Delay (MS) and utilization percentage. Each row shows the name of the link, the number
of frames delivered, its error rate, average transmission delay and utilization percentage
of that particular link. 1st row demonstrates that the Token-Passing LAN in Edinburgh LAN
has delivered a total of 12119 frames with 0 error. Similarly, it has a pretty good average
of 0.036ms transmission delay and hence, has 0.7338% of channel utilization. This
means that the link is highly efficient in transmitting frames and has been utilized to its
optimum potential. Likewise, Token-Passing Ring in Biratnagar LAN has 11738 frames
delivered with an average transmission delay of 0.039 and setting the utilization
percentage to 0.7556. Finally, the Token-Passing LAN of Lalitpur LAN has 11761 frames
delivered with an average transmission delay of 0.039 and setting the utilization
percentage to 0.7580. As all the LANs use the identical Token-Passing Ring of 16Mpbs,
the utilization percentage seems to be almost parallel for all those links.
24 | P a g e
1.3.3. WAN CLOUD REPORT: FRAME DELAY, FRAME COUNT,
ACCESS LINK STATS
Figure 26 illustrates the frame delay in millisecond and burst size in kilobytes of all the
Virtual Circuits used in the model. The WAN cloud of the model contains four different
virtual circuits; namely, Lalitpur-Edinburgh, Edinburgh-Lalitpur, Edinburgh-Biratnagar and
Biratnagar-Edinburgh. Frame delay is a key service performance indicator in any
LAN/WAN environment. The report depicts that the Lalitpur-Edinburgh has an average
frame delay of 74915ms and average burst size of 56kb. Similarly, both the Edinburgh-
Lalitpur and Edinburgh-Biratnagar Virtual Circuits have identical value of 25ms for
average frame delay and 21kb for average burst size. Finally, Biratnagar-Edinburgh VC
has an average frame delay of 75057ms and average burst size of 56kb. As seen in the
report, the reason behind Lalitpur-Edinburgh and Biratnagar-Edinburgh having higher
value of both frame relay and burst size is due to the large number of frames generated
from the group of 50 ATMs and nodes of Biratnagar and Lalitpur LANs.
25 | P a g e
VC vs Average Frame Delay(ms)
80000
70000
60000
AVERAGE FRMAE DELAY
50000
40000
30000
20000
10000
0
Lalitpur- Edinburgh- Edinburgh- Biratnagar-
Edinburgh Lalitpur Biratnagar Edinburgh
Average Frame Delay(ms) 74915 25 25 75057
26 | P a g e
VC vs Average Burst Size(kb)
60
50
40
AVERAGE BURST SIZE
30
20
10
0
Lalitpur- Edinburgh- Edinburgh- Biratnagar-
Edinburgh Lalitpur Biratnagar Edinburgh
Average Burst Size(kb) 56 21 21 56
27 | P a g e
Figure 29: Frame Counts by VC
The total kilobits transmitted throughout all the four Virtual Circuits in WAN Cloud is 4717.
Figure 29 demonstrates the accuracy and reliability of Virtual Circuits of the WAN Cloud
as there is not a single frame dropped. Lalitpur-Edinburgh had 3039 frames accepted of
size 1388 kilobits. Likewise, Edinburgh-Lalitpur had 3037 frames of size 972 kilobits
accepted. Similarly, Edinburgh-Biratnagar had 3021 frames of size 967 kilobits accepted.
Finally, Biratnagar-Edinburgh VC has 3020 frames of size 1390 kilobits accepted.
28 | P a g e
VC vs Frame Accepted vs Kilobit Accepted
4500
4000
3500
FRAME/KILOBIT
3000
2500
2000
1500
1000
500
0
Lalitpur- Edinburgh- Edinburgh- Biratnagar-
Edinburgh Lalitpur Biratnagar Edinburgh
Kilobits Accepted 1388 972 967 1390
Frames Accepted 3039 3037 3021 3020
29 | P a g e
Three access links have been used in WAN cloud of our network model for transmission
of frames. As evident from Figure 31 all the access links had zero number of frames
dropped. Lalitpur Access Link had 6025 frames entered and 3037 frames exited with a
channel utilization of 37.60%. Similarly, Biratnagar Access Link had 6060 frames entered
and 3021 frames exited with channel utilization of 37.40%. Finally, Edinburgh Access Link
had 6059 frames entered and 12083 frames exited with channel utilization at its optimum
level of 100%. This further shows that the Edinburgh Access Link was most efficient
medium and had maximum channel utilization compared to Lalitpur Access and
Biratnagar Access.
20000
18000
16000
FRAME ENTRY/FRAME EXIT
14000
12000
10000
8000
6000
4000
2000
0
Lalitpur Access Biratnagar Access Edinburgh Access
Frame Accepted Exit 3037 3021 12083
Frame Accepted Entry 6025 6060 6059
30 | P a g e
1.3.4. MESSAGE AND REPORT RESPONSE: MESSAGE DELAY FOR
ALL NODES
Biratnagar ATM Req generated from ATM nodes at Biratnagar LAN has average
message delay of 143.63175 seconds when reaching the Edinburgh Server at Edinburgh
LAN. Similarly, Lalitpur ATM Req generated from ATM nodes at Lalitpur LAN has average
message delay of 143.27061 seconds while reaching the Edinburgh Server at Edinburgh
LAN. All the remaining message source and responses has a average message delay of
zero.
31 | P a g e
Origin/Msg Src Name/Destination vs
Average Message Delay (ms)
AVERAGE MESSAGE DELAY (MS)
160000
140000
120000
100000
80000
60000
40000
20000
0
Edinburg Biratnaga Biratnaga Lalitpur Lalitpur
h r r LAN.ATM LAN.Singl
LAN.Edin LAN.ATM LAN.Singl nodes / e Telller
burgh nodes / e Teller src Machine
Server / src Machine Lalitpur / src
src ATM Biratnaga / src ATM Req Lalitpur
response r ATM Biratnaga / Single
/ ECHO Req /… r Single… Ediburg… Teller…
Average Message Delay (ms) 0 143631.75 0 143270.61 0
32 | P a g e
1.4 CONCLUSION
The simulation, report analysis of the network model and comparison of the graphs
determines the reliability, effectiveness and efficiency of the created LAN and WAN model
for IBN Bank. The choice of Token-Passing Ring over Ethernet and usage of WAN Cloud
for setting up a new network is justified by the technical report. The network architecture
created in this coursework is not just done for simulation and report generation purposes
but also to illustrate the usefulness and reliability of such network model in any real time
scenario. Further analysis of the reports demonstrates that all the message sources/ATM
authorization requests from Lalitpur and Biratnagar ATMs have successfully reached and
responded by the Edinburgh Server of IBN Bank. All the properties and nature of devices,
nodes and links used in this network model has been thoroughly researched for better
understanding of the network.
33 | P a g e
TASK B
34 | P a g e
2.1. INTRODUCTION
The dream and goal of researchers, engineers and users, of being able to communicate
with anyone at any time was sparked since the advent of the first wireless communication
systems. GSM technology revolutionized the method of communication among people
since its introduction in 1990. Among the current wireless communication systems, GSM
is the most popular and widely implemented system that provided freedom to not only
roam within a network, but also between different networks. (Eberspacher et al., 2009)
GSM refers to Global System for mobile communication. It is the globally used mobile
communication system by all manufacturers and Internet Service Providers (ISP). GSM
is a framework that was developed as an advanced outline/application that uses Time
Division Multiple Access (TDMA) approach for purposes of correspondence. (Ali et al.,
2017) Moreover, GSM is a second-generation telecommunications system architecture
designed to address the first cellular network fragmentation issues. GSM is the first
telecommunications system in the world to define and facilitate digital modulation and
network layer services. For more information, click here.
35 | P a g e
2.1 BACKGROUND
Year Event
1982 Groupe Special Mobile established by the CEPT.
36 | P a g e
2.2.2 Architecture of GSM
A GSM network comprises of distinctive components and routes that communicate with
each other in order to empower the general framework operation. Despite advances in
the more up-to-date frameworks, the basic GSM framework design has been maintained
and the system components has remained same since the first GSM framework was
propelled in the mid-1990s. (Ali et al., 2017) Like any modern mobile networks, GSM
utilizes a cellular structure/network which basic functioning is to partition the available
frequency range and assign only required segments of that frequency spectrum to any
base receiver station. (Gunnar, 1999) A GSM network comprises of various elements: the
mobile station (MS), the base transceiver (BTS), the subscriber identity module (SIM), the
37 | P a g e
base station controller (BSC), the mobile services switching centre (MSC), etc. Figure 2
depicts an overview of the GSM subsystems.
Figure 2 shows the components required in order to form a public land mobile network
(PLMN). The GSM architecture can be assembled into four principal territories:
38 | P a g e
2. Base Station Subsystem (BSS): GSM’s Base Station (BSS) section organizes
engineering that is related to talking to the mobile phones on the system at a very
basic level. Furthermore, BSS has two components:
• Base Transceiver Station (BTS): The BTS organizes the users of the radio
transmitter and their corresponding receiving devices that
transmit and communicate directly with the mobile devices. (Ali
et al., 2017) It provides the connectivity between the network and
the mobile station via the Air Interface. (Gunnar, 1999)
• Base Station Controller (BSC): The BTSs of an area are connected to the
BSC via an interface called the Abis-interface. The BSC takes
control of Base Station Subsystem and deals with radio
properties and monitors such as; handover within the range of
BTSs, channel classification and so on. (Ali et al., 2017)
39 | P a g e
organize engineering. It is also used for monitoring and tracking the general GSM
system and additionally monitors the BSS movement heap. (Ali et al., 2017)
The detailed description of each components included with a GSM architecture can be
found here.
40 | P a g e
2.2.1. MOBILE COMMUNICATION
41 | P a g e
Figure 39: Mobile and Internet users
42 | P a g e
2.2.1.1. HISTORY
The cell phone has become standard sometime over the last decade. We now take it for
granted that we can communicate or call with anyone at anytime from anywhere and
inquire if such a call would be safe while driving. In addition, the technology arena has
moved from voice to wireless information. (Frenkiel, n.d.) For the early history of
communication, click here.
Since demand for mobile services has evolved from the beginning of the commercially
available GSM in the early 1990s to the introduction of a packet-based infrastructure in
GPRS, to a more reliable technology in UMTS, and to more advanced architectures in
LTE and beyond, the supporting core architecture has also shifted. (Liyanage et al., 2015)
Figure 39 shows how the mobile industry has evolved in every aspects of voice
transmission, SMS/Email transmission and how the user experiences these
43 | P a g e
advancements in mobile communication. Similarly, Figure 40 depicts the global mobile
traffic per month has shifted from 1.5 exabytes per month in 2013 to 15.9 exabytes per
month in 2018. These data are evident to the fact that we, users have been completely
immersed and dependent on the mobile communication and its features throughout the
last decade. Furthermore, Figure 41 demonstrates the development of 1G in 1995 to 2G
in 2002 and how this development has increased the data transmission and bandwidth of
mobile communication and its coverage.
44 | P a g e
Figure 42: Global mobile traffic per month. Source: Cisco Systems (2014) Cisco Visual Networking
45 | P a g e
Figure 43: History of 1G to 3G
46 | P a g e
2.2.1.2. CELLULAR RADIO
The use of the term “cellular” in describing mobile radio systems is well known to
everyone. We know that it is called cellular because a number of cells make up the
network. Mobile radio systems work for two reasons on the basis of cells. The first reason
is that the radio signals only transmit short distance without the usage of transmitters. The
second reason is due to the radio spectrum, which is what radio signals use to travel
through space. (Web, 1998) The one basic requirement for cellular and wireless
communication is the radio spectrum. By producing an electrical “radio” signal and
passing it via antenna, the signal is radiated in the form of electric waves that can be
received by another antenna at some distance away. And when the radio signal is
constantly changing, the electrical signal is finally transmitted. (Web, 1998) Figure 43
show the sine wave which is also the simplest form of changing signal. For more
information, click here.
47 | P a g e
2.2.1.3. ADVANTAGES AND DISADVANTAGES
Mobile communication technology includes devices such as mobile phones, portable Wi-
Fi-enabled devices and wireless laptops that can be linked via Wi-Fi or cellular
connectivity. But before you are dependent on these gadgets, it is important to understand
the advantages and disadvantages of mobile communication.
• Advantages:
48 | P a g e
The rapid advancement in the development of mobile communication technology has
led to the whole word being regarded as a global village. People can communicate
with each other at any time and from anywhere. Similarly, GSM has many advantages
from easier availability and cost effectiveness. GSM phones come with a range of
plans with cheaper rates of call, free messaging services, limited free calls, etc. The
GSM-based networks (i.e. base stations) are distributed globally and therefore the
same mobile phone operates worldwide. As well as providing seamless wireless
connectivity, this leverages cost benefits. The power consumption of GSM based
phones is lower than CDMA. The SIM card or subscriber recognizes a device card
that transmits customer information and shares information, offers purchaser
information. SIM cards also enable customers to provide one user with their
subscription information and telephone book info to be added at any time. (Dixit &
Garg, 2014)
49 | P a g e
• Disadvantages:
50 | P a g e
Figure 47: Specifications for GSM and CDMA
Furthermore, GSM uses a system for FTDMA connectivity. Multiple users use the
same bandwidth here and will also conflict if more users use the GSM service. As
seen of Figure 44, GSM uses pulse based burst transmission technology that
interferes with other electronics using radio waves. Due to this reason, petrol
stations, hospital and airplanes avoid the use of GSM based electronic equipment.
Today’s digital world demands security and confidentiality in digital transmission
that cannot be guaranteed by GSM, as it has no means for end-to-end encryption
of user data that can lead to tampering in calls made form GSM devices.
51 | P a g e
2.2.2. CELLULAR TECHNOLOGIES
• Second Generation (2G): Analog / digital split is the main difference between 1
G and 2G. 2 G was now able to handle roaming with the Short Message Service
(SMS) facility with the introduction of GSM architecture in 1991. Voice and data
with FDMA and TDMA as their multiplexing techniques were the main traffic in this
circuit switched architecture. (Kanani et al., 2014) For more information, click here.
• Fourth Generation (4G) / LTE: The LTE (Long Term Evolution) system is known
to be 4G. 4 G is being developed to meet the QoS and rate requirements of future
applications such as wireless broadband connectivity, Multimedia Messaging
Service (MMS), video messaging, mobile Television, HDTV content, Digital Video
Broadcasting (DVB), limited voice and data services and other bandwidth-based
services. (Vora, 2015) For more information, click here.
52 | P a g e
2.2.2.2. WIRELESS COMMUNICATIONS
2.2.2.3.1. WAP
WAP stands for Wireless Application Protocol. WAP is used to build bridges between cell
phones and the Internet as well as Intranet and provides mobile users with the experience
of accessing a better form of Internet on their mobile phones. With implementation of
WAP, subscribers can access as much information as they can from the desktops from a
pocket-sized computer. (K et al., 2015) For more information, click here.
2.2.2.3.2. GPRS
General Packet Radio System (GPRS) system brings to the existing GSM system the
packet-switched bearer services. Depending on the MS capabilities, the GPRS MS can
use between one and eight channels over the air network, and these channels are
dynamically allocated to an MS when packets need to be sent or received. The GPRS
device has a theoretical maximum throughput of 160 kbps per MS using all eight channels
without correction of errors. (Halonen et al., 2003) For more information, click here.
2.2.2.3.3. EDGE
Enhanced data rates for GSM evolution (EDGE) is a significant improvement in data rates
for GSM. For some time now, GSM networks have been providing advanced data
services, such as circuit-switched 9.6-kbpsdata and SMS. EGPRS is based on GPRS,
which is GSM's packet-switched data service. It typically provides high-bit rate packet
services include fast file transfer, Internet access, web browsing, and remote email.
(Halonen et al., 2003) For more information, click here
53 | P a g e
2.2.2.3.4. UMTS
54 | P a g e
2.3. CONCLUSION
Human beings have come a long way from the days of audible transmission and analogue
communication to modern mobile communication means. The area of wireless and mobile
communication has a fascinating history spanning more than a century of technological
innovations from the first transatlantic transmission by Marconi in 1899 to the widespread
acceptance of mobile cellular networks by more than four billion people today. Wireless
has become one of the core technology enablers for a wide range of networking and
communications applications ranging from 3G/4 G cellular devices, internet connectivity
to large WIFI networks. It is also of central importance to the future of mobile pervasive
audio-visual and multimedia applications. This has led to an accelerating pace of research
and development in the wireless area with the promise of significant new breakthroughs
over the next decade and beyond. (Raychaudhuri & Mandayam, 2011) Finally, GSM has
revolutionized the field of mobile communication since its development in 1990s.
55 | P a g e
References
Ahuja, S.P. (1998) COMNET III: a network simulation laboratory environment for a course
in communications networks. In FIE '98. 28th Annual Frontiers in Education Conference.
USA, 1998. IEEE.
Ali, S., Haq, I.u. & Zia, R.U. (2017) GSM Technology: Architecture, Security and Fututre
Challenges. Internation Journal of Science Engineering and Advance Technology, 5(1).
Bidgoli, H., ed. (2008) HANDBOOK OF COMPUTER NETWORKS. New Jersey: John
Wiley & Sons, Inc.
Blair, J.D. (1989) A 16 MBPS adapter chip for the token-ring local area network. In
Internation Solid-State Circuits Confrence. New York, 1989. IEEE.
Calhoun, G. (1988) Digital Cellular Radio. Artech House, Inc.
Chanana, P. (2013) Interesting Mobile Phone Statistics and Pros & Cons Of Using Them
[Infographic] [Online]. Available from:
https://www.business2community.com/infographics/interesting-mobile-phone-statistics-
pros-cons-using-infographic-0729744 [Accessed 23 December 2019].
Dixit, A. & Garg, A. (2014) A Study on Cellular GSM & CDMA -Based for New Generation
Mobile Radio System. International Journal of Computing and Technology, 1(8).
Eberspacher, J., Vogel, H.-J., Bettstetter, C. & Hartman, C. (2009) GSM - Architecture,
Protocols and Services. 3rd ed. Germany: John Wiley and Sons Ltd.
Frenkiel, R. (n.d.) A Brief History of Mobile Communications. IEEE.
GSMA Intelligence. (2019) Definitive data and analysis for the mobile industry [Online].
Available from: https://www.gsmaintelligence.com/ [Accessed 22 December 2019].
Guifen, G. & Guili, P. (2010) The Survey of GSM Wireless Communication Sytem.
Internatioal Conference on Computer and Information Application (ICCIA), (1).
Gunnar, H. (1999) GSM Networks: Protocols, Terminology, and Implementation. London:
Artech House, INC.
Halonen, T., Romero, J. & Melero, J., eds. (2003) GSM, GPRS and EDGE Performance:
Evolution Towards 3G/UMTS. 2nd ed. Sussex: John Wiley and Sons, Ltd.
Kanani, P., Shah, K. & Kaul, V. (2014) A Survey on Evolution of Mobile Networks:1G to
4G. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH.
Katz, J.E. (2008) Handbook of Mobile Communication Studies. London: The MIT Press.
56 | P a g e
K, A., M., & G, F.P. (2015) Wireless Application Protocol - A Survey. International Journal
of Trend in Research and Development, 2(6).
Kukushkin, A. (2018) Introduction to Mobile Network Engineering. Sussex: John Wiley
and Sons, Inc.
Liyanage, M., Gurtov, A. & Ylianttila, M., eds. (2015) Software Defined Mobile Networks
(SDMN). Sussex: John Wiley and Sons, Ltd.
Nath, D.A. & Mukherjee, S. (2015) Impact of Mobile Phone/Smartphones: A pilot study
on positive and negative effects. Research Article. Kolkata: International Journal of
Advance Research in Computer Science and Management Studies St. Xavier's College.
Rahnema, M. (2008) UMTS NETWORK PLANNING, OPTIMIZATION, AND INTER-
OPERATION WITH GSM. IEEE.
Raychaudhuri, D. & Mandayam, N. (2011) Frontiers of Wireless and Mobile
Communications. IEEE, 100(4).
Rouse, M. (2019) GSM (Global System for Mobile Communication) [Online]. Available
from: https://searchmobilecomputing.techtarget.com/definition/GSM [Accessed 23
December 2019].
Russell, S.J. & Norving, P. (2016) Artificial Intelligence: A Modern Approach. 3rd ed. India:
Pearson Education, Inc.
Smyth, P. (2000) A Brief History of Mobile Communications - 1995 to 2010. BT
Technology Journal, 18(1).
Tanenbaum, A.S. (2003 ) Computer Networks. 4th ed. New Delhi, India: Pearson
Education, Inc.
Tolstrup, M. (2015) Indoor Radio Planning: A Practical Guide for 2G,3G and 4G. 3rd ed.
Suusex: John Wiley and Sons, Ltd.
velocloud. (2019) cloud-wan [Online]. Available from: https://www.velocloud.com/sd-
wan/understanding-sd-wan/cloud-wan [Accessed 1 December 2019].
Vora, M.L.J. (2015) EVOLUTION OF MOBILE GENERATION TECHNOLOGY: 1G TO
5G. International Journal of Modern Trends in Engineering and Research, 2(10).
Web, W. (1998) Understanding Cellular Radio. Artech House, INC.
57 | P a g e
Bibliography
58 | P a g e
Appendices
A. Introduction
B. Architecture of GSM
B.1 Subscriber Identity Module: SIM is a smart card/chip that is used in GSM that
distinguishes the identity of the subscriber and mobile equipment. It has
integrated secure storage and cryptographic functions. It is inserted in any
mobile computers and mobile phones that is removable and portable. It serves
as a database on the user side as it governs the number and calls billed to the
subscriber. The SIM communicates directly with the VLR and indirectly with the HLR.
(Gunnar, 1999)
59 | P a g e
B.2 Transcoding Rate and Adaption Unit: The flexibility with which GSM uses the
available frequency resources is one of the most vital aspects of a mobile
network. Data compression is carried out in both the MS and TRAU in the GSM
network. TRAU is a black box within the Bases Station Subsystem. (Gunnar,
1999)
B.3 Mobile Services Switching Centre: The core component of the general GSM structure
engineering centre network area is the Mobile Services Centre (MSC). MSC
acts as a general exchange hub and provides additional usefulness to allow a
portable client’s needs to be upheld. (Ali et al., 2017) MSC is connected with
large numbers of BSCs via the A-interface. MSC routes the incoming and outgoing calls
and assigns user channels to the A-interface. (Gunnar, 1999)
B.4 Home Location Register: In addition to their last known area, this database contains
all the regulatory data about each supporter. The GSM system can make calls to
the relevant base station for the MS along these lines. It is a repository that stores
the data of large number of subscribers. When a customer turns on their mobile,
the telephone records with the network and it is therefore conceivable to decide
the BTS they are talking to in such a way that approaching calls can be handled
appropriately. (Ali et al., 2017)
60 | P a g e
B.5 Visitor Location Register: The VLR was devised so that the HLR would not be
overloaded with inquiries on data about its subscribers. (Gunnar, 1999) It
includes HLR selected data that empowers the chosen administrations to be
presented to the individual endorser. The VLR can be modified as a different
substance but is usually recognized as a vital port of the MSC rather than a separate
feature.
C. Mobile Communication
Mobile Internet is the second wave of the digital revolution that started with the
unprecedented introduction of cell phones that reached four billion users worldwide in
2011. With the launch of so-called third-generation (3G) and fourth-generation (4G)
networks beginning around 2005, cellular technology started transitioning towards data
and Internet services, allowing a wide range of new computing and multimedia
technologies from navigation to mobile video streaming/sharing seamlessly.
(Raychaudhuri & Mandayam, 2011)
61 | P a g e
D. Cellular Radio
AT&T/Bell Laboratories initially developed the concept of cellular coverage. Before that,
manual systems used only for mobile voice telephony were the mobile telephony
systems. The first of these cellular systems was analogue voice transmission and some
data transmission was modulated in the speech channel to signal the occasional
transmission or power control order. AMPS, D-AMPS, TACS, PCS, CDMA, NMT, GSM
(2G), DCS(2G), UMTS(3G) AND LTE(4G) were some of the widely used protocols.
(Tolstrup, 2015)
E. History of Communication
Before delving into the modern inventions in the field of mobile communication, we must
understand the founding stones of today’s technology. Before the advancement in
technology, the primitive times had visual transmission medium of smoke/light to audible
transmission of drums and horns. After the invention of electricity, first telephone was
invented in 1876 AD by Alexander Graham Bell, that revolutionized the communication
medium for human beings for ages to come.
The possible adverse health effects arising from exposure to radiofrequency radiation
(RFR) such as those from mobile communications devices have been increasingly
concerned. Mobile communication is where the signal is transmitted by radio frequency
and microwave signals through electromagnetic wave. This signal produces
electromagnetic radiation consisting of dangerous ionizing radiation and harmless non-
ionizing radiation in the form of thermal radiation. Electromagnetic wave is transmitted to
62 | P a g e
the body when using mobile phones, which causes health problems, especially in the
area near the ear skull where they are known to affect the neurons. (Nath & Mukherjee,
2015)
• Speed-2.4 kbps
• Allows voice calls in 1 country
• Use analogue signal.
• Poor voice quality and large phone size
• Offered very low level of spectrum efficiency
63 | P a g e
H. Second Generation (2G)
It uses the 30 to 200 KHz bandwidth. For comparison to 2 G, the 2.5 G system uses the
modified packet and circuit domain which provides up to 144 kbps of data rate. For
example. GPRS, CDMA, EDGE, etc.
64 | P a g e
I. Third Generation (3G)
• Speed 2 Mbps
• Typically called smart phones
• Increased bandwidth and data transfer rates to accommodate web-based
applications and audio and video files.
• Provides faster communication
• Send/receive large email messages
• High speed web/more security/video conferencing/3D gaming (Vora, 2015)
65 | P a g e
Figure 50: WCDMA Network Architecture
LTE Network Architecture includes the Evolved Packet Core (EPC), which is a fully PS
backbone network and manages mobility and session. The traditional, fully CS voice
traffic is handled by the IP multimedia subsystem (IMS) network. (Kanani et al., 2014)
The main features of 4G are:
66 | P a g e
Figure 51: LTE Network Architecture
WAP is a free, global standard that allows mobile users to immediately access and
communicate with internet information and resources via wireless devices. Wireless
Application Protocol allows users to use their mobile phones to carry Internet content.
The production of WAP began in the mid-1990s. At the beginning, the two major
manufacturers –Nokia and Ericsson–demonstrated their interest in offering such
advanced technologies to a competitive advantage on the mobile communication market.
As-Protocol mismatch, System limitations, accessibility, WAP is used to address several
major problems. WAP describes a series of standardized protocols that can run across a
wide range of existing cellular networks to address these issues. In 2002, the WAP forum
was founded in the Open Mobile Alliance by Ericsson, Motorola, Nokia and Unwired
Planet.
67 | P a g e
Figure 52: WAP Architecture
GPRS provides the GSM network with a few new network features. The main ones are
the GPRS support node serving (SGSN) and the GPRS support node gateway (GGSN).
The point-to-multipoint service center (PTM-SC), which is dedicated to the PTM services
in the GPRS network, is another important new feature. The main objective of the GPRS
is to offer an access to standard data networks such as transport control protocol
(TCP)/Internet protocol (IP) and X.25. (Halonen et al., 2003)
68 | P a g e
Figure 53: Functional View of GPRS Network
69 | P a g e
M. Enhanced data rates for GSM evolution (EDGE)
EGPRS has a major impact on the network interface RF and physical layer as well as on
the RLC / MAC protocol, but there are minor changes to other protocols and layers of
protocols. One significant conceptual change in EGPRS compared to GPRS is the quality
control component, which also supports incremental redundancy (type II hybrid ARQ) in
EGPRS, in addition to GPRS-type link adaptation (type I hybrid ARQ). (Halonen et al.,
2003)
70 | P a g e
N. Universal Mobile Telecommunications Service (UMTS)
In particular, the advantage of a higher spectrally effective and versatile air interface is
UMTS, which implemented the WCDMA for its air interface. The three main elements of
the high-level UMTS architecture are the user equipment (UE) that houses the UMTS
subscriber identity module (USIM), the UMTS Terrestrial Radio Access Network (UTRAN)
and the Core Network (CN). The Uu and Iu interface protocols are divided into two
categories: User plane and Control plane protocols. A bearer service is a type of
telecommunications service that provides transmitting capability between points of
access. A bearer service includes all the things required for delivering a certain QoS, such
as consumer plane data transportation and QoS management. The protocols of the
control plane are used to manage the radio access bearers and the communications
between the UE and the network. (Rahnema, 2008)
71 | P a g e
Figure 56: Overview of Network Model
72 | P a g e
Figure 58: Biratnagar LAN of the Network Model
73 | P a g e
Figure 60: WAN Cloud of the Network Model
74 | P a g e
Figure 62: Access Link Stats inside WAN Cloud
75 | P a g e
Figure 64: Frame Counts by Virtual Circuit inside WAN Cloud
76 | P a g e
Figure 66: Message Delay for all the message sources and responses
Figure 67: Message Delivered for all the message sources and responses
77 | P a g e
Figure 68: Counts for all the message received through each node
78 | P a g e