GSM

The GSM logo is used to identify compatible handsets and equipment

GSM (Global System for Mobile communications: originally from Groupe Spécial Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80% of the global mobile market uses the standard.[1] GSM is used by over 3 billion people across more than 212 countries and territories.[2][3] Its ubiquity makes international very common between operators, enabling subscribers to use their phones in many parts of the world. GSM differs from its predecessors in that both signaling and speech channels are digital, and thus is considered a second generation () mobile phone system. This has also meant that was easy to build into the system. GSM EDGE is a version of the protocol.

The ubiquity of the GSM standard has been an advantage to both consumers (who benefit from the ability to roam and switch carriers without switching phones) and also to network operators (who can choose equipment from any of the many vendors implementing GSM[4]). GSM also pioneered a low-cost (to the network carrier) alternative to voice calls, the short message service (SMS, also called "text messaging"), which is now supported on other mobile standards as well. Another advantage is that the standard includes one worldwide emergency telephone number, 112.[5] This makes it easier for international travellers to connect to emergency services without knowing the local emergency number.

Newer versions of the standard were backward-compatible with the original GSM phones. For example, Release '97 of the standard added packet data capabilities, by means of General Packet Radio Service (GPRS). Release '99 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).

[edit] Technical details GSM cell site antennas in the Deutsches Museum

[edit] Cellular

Main article:

GSM is a cellular network, which means that mobile phones connect to it by searching for cells in the immediate vicinity.

There are five different cell sizes in a GSM network—macro, micro, pico, femto and umbrella cells. The coverage area of each cell varies according to the implementation environment. Macro cells can be regarded as cells where the base station antenna is installed on a mast or a building above average roof top level. Micro cells are cells whose antenna height is under average roof top level; they are typically used in urban areas. Picocells are small cells whose coverage diameter is a few dozen metres; they are mainly used indoors. Femtocells are cells designed for use in residential or small business environments and connect to the service provider’s network via a broadband connection. Umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in coverage between those cells.

Cell horizontal radius varies depending on antenna height, antenna gain and propagation conditions from a couple of hundred meters to several tens of kilometres. The longest distance the GSM specification supports in practical use is 35 kilometres (22 mi). There are also several implementations of the concept of an extended cell[12], where the cell radius could be double or even more, depending on the antenna system, the type of terrain and the timing advance.

Indoor coverage is also supported by GSM and may be achieved by using an indoor picocell base station, or an indoor repeater with distributed indoor antennas fed through power splitters, to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system. These are typically deployed when a lot of call capacity is needed indoors; for example, in shopping centers or airports. However, this is not a prerequisite, since indoor coverage is also provided by in-building penetration of the radio signals from any nearby cell.

The modulation used in GSM is Gaussian minimum-shift keying (GMSK), a kind of continuous-phase frequency shift keying. In GMSK, the signal to be modulated onto the carrier is first smoothed with a Gaussian low-pass filter prior to being fed to a frequency modulator, which greatly reduces the interference to neighboring channels (adjacent- channel interference).

[edit] GSM frequencies

Main article: GSM frequency ranges

GSM networks operate in a number of different frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G). Most 2G GSM networks operate in the 900 MHz or 1800 MHz bands. Some countries in the Americas (including Canada and the United States) use the 850 MHz and 1900 MHz bands because the 900 and 1800 MHz frequency bands were already allocated. Most 3G GSM networks in Europe operate in the 2100 MHz frequency band.

The rarer 400 and 450 MHz frequency bands are assigned in some countries where these frequencies were previously used for first-generation systems.

GSM-900 uses 890–915 MHz to send information from the mobile station to the base station (uplink) and 935–960 MHz for the other direction (downlink), providing 125 RF channels (channel numbers 1 to 124) spaced at 200 kHz. Duplex spacing of 45 MHz is used.

In some countries the GSM-900 band has been extended to cover a larger frequency range. This 'extended GSM', E-GSM, uses 880–915 MHz (uplink) and 925–960 MHz (downlink), adding 50 channels (channel numbers 975 to 1023 and 0) to the original GSM-900 band. Time division is used to allow eight full-rate or sixteen half-rate speech channels per channel. There are eight radio timeslots (giving eight burst periods) grouped into what is called a TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel data rate for all 8 channels is 270.833 kbit/s, and the frame duration is 4.615 ms.

The transmission power in the handset is limited to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900.

[edit] Voice codecs

GSM has used a variety of voice codecs to squeeze 3.1 kHz audio into between 6.5 and 13 kbit/s. Originally, two codecs, named after the types of data channel they were allocated, were used, called Half Rate (5.6 kbit/s) and Full Rate (13 kbit/s). These used a system based upon linear predictive coding (LPC). In addition to being efficient with bitrates, these codecs also made it easier to identify more important parts of the audio, allowing the layer to prioritize and better protect these parts of the signal.

GSM was further enhanced in 1997[13] with the Enhanced Full Rate (EFR) codec, a 12.2 kbit/s codec that uses a full rate channel. Finally, with the development of UMTS, EFR was refactored into a variable-rate codec called AMR-Narrowband, which is high quality and robust against interference when used on full rate channels, and less robust but still relatively high quality when used in good radio conditions on half-rate channels.

[edit] Network structure

The structure of a GSM network

The network behind the GSM seen by the customer is large and complicated in order to provide all of the services which are required. It is divided into a number of sections and these are each covered in separate articles.

• the Base Station Subsystem (the base stations and their controllers). • the Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network. • the GPRS Core Network (the optional part which allows packet based Internet connections). • all of the elements in the system combine to produce many GSM services such as voice calls and SMS.

[edit] Subscriber Identity Module (SIM)

Main article: Subscriber Identity Module

One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking, and is illegal in some countries.

[edit] Phone locking

Main article: SIM lock

Sometimes mobile phone operators lock mobiles which they sell to their own network. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions, and operators want to try to recoup this investment before a subscriber leaves for another operator.

A subscriber can usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or make use of software and websites available on the Internet to unlock the handset themselves. While most web sites offer the unlocking for a fee, some do it for free. The locking applies to the handset not to SIM card.

In some countries (e.g. Bangladesh, Hong Kong, Pakistan and others) all phones are sold unlocked. In others (e.g. Belgium, Finland, New Zealand and others) it is unlawful for operators to offer any form of subsidy on the phone's price.

[edit] GSM security

See also: UMTS security

GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the- air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack.[14] The system supports multiple algorithms so operators may replace that cipher with a stronger one.

On 28 December 2009 it was announced that Karsten Nohl, a 28-year-old German computer engineer, had cracked GSM's encrypting code. [15] [edit] Standards information

The GSM systems and services are described in a set of standards governed by ETSI, where a full list is maintained.[16]

The Global System for Mobile communications is the most popular cellular approach in the world. According to the GSM Association, there were more than 2 billion GSM subscribers worldwide by June, 2008, which the organization said is more than 86 percent of the world's cellular market. GSM was accelerated earlier this decade by Enhanced Data rates for GSM Evolution (EDGE) and is in the process of further speed boosts by High Speed Downlink Packet Access and High Speed Uplink Packet Access (HSDPA and HSUPA) approaches.

This tutorial explains the basic components, technologies used, and operation of Global System for Mobile Communication - GSM - systems. You will discover why providers have upgraded from 1st generation analog systems to more efficient and feature rich 2nd generation GSM systems. You will also discover how 2nd generation systems are gradually evolving into 3rd generation broadband multimedia systems.

This tutorial starts with the system components and basic services that the GSM system can provide. You will learn that the key types of GSM devices include single mode and dual mode mobile telephones, PCMCIA cards, embedded radio modules, and external radio modems. You will then discover the different types of available services such as multiple types of voice services, data services, group call, and messaging services.

Explained are the physical and logical radio channel structures of the GSM system along with the basic frame and slot structures. Described are the fundamental capabilities and operation of the GSM radio channel including channel coding, modulation types, speech coding, RF power control, and mobile assisted handover. You will learn how each GSM radio channel has 8 time slots per frame and that some of these are used for signaling (control channels) and others are used for user traffic (voice and data). Because the needs of voice and data communication are different, you will discover that the GSM system essentially separates circuit switched (primarily voice) and packet switched (primarily data) services.

Described are key functional sections of a GSM network components and how they communicate with each other. You will learn how and why GSM is evolving into 3rd generation broadband systems including GPRS, EDGE, and WCDMA.

Definition: GSM, which stands for Global System for Mobile communications, reigns as the world’s most widely used cell phone technology. Cell phones use a cell phone service carrier’s GSM network by searching for cell phone towers in the nearby area.

The origins of GSM can be traced back to 1982 when the Groupe Spécial Mobile (GSM) was created by the European Conference of Postal and Administrations (CEPT) for the purpose of designing a pan-European mobile technology.

It is approximated that 80 percent of the world uses GSM technology when placing wireless calls, according to the GSM Association (GSMA), which represents the interests of the worldwide mobile communications industry. This amounts to nearly 3 billion global people.

Cell phone carriers T-Mobile and AT&T use GSM for their cell phone networks. Sprint, Virgin Mobile and Wireless use the competing CDMA standard.

For practical and everyday purposes, GSM offers users wider international roaming capabilities than other U.S. network technologies and can enable a cell phone to be a “world phone”. More advanced GSM incorporates the earlier TDMA standard. GSM carriers have roaming contracts with other GSM carriers and typically cover rural areas more completely than competing CDMA carriers (and often without roaming charges, too).

GSM also has the advantage of using SIM (Subscriber Identity Module) cards in the U.S. The SIM card, which acts as your digital identity, is tied to your cell phone service carrier’s network rather than to the handset itself. This allows for easy exchange from one phone to another without new cell phone service activation.

GSM uses digital technology and is a second-generation (2G) cell phone system. GSM, which predates CDMA, is especially strong in Europe. EDGE is faster than GSM and was built upon GSM.

GSM Technology

General Information

GSM is also known as Global System for Mobile Communications, or simply Global System for Mobile. A technology started development in 1985 by a French company formerly known as Groupe Spécial Mobile. It's main competetor is CDMA, currently in use by Bell Mobility, Telus Mobility and Mobility Canada carriers.

Currently, only two main carriers in Canada are operating GSM networks. Microcell (Fido, Cityfone) and Rogers Wireless. Fido was the first carrier to start utilising this technology, followed by Rogers Wireless mainstream around 2001. Several companies in the United States have adopted GSM and it's spreading fast among AT&T Wireless, T-Mobile.

GSM operates on 4 different frequencies worldwide. However, only two are which are used in Canada, which are GSM-850 and GSM-1900.GSM-850 and GSM-1900 which operate at 1.9Ghz.

GSM calls are either based on data or voice. Voice calls use audio codecs called half-rate, full-rate and enhanced full-rate. Data calls can turn the cell phone into a modem operating at 9600 bps. An extended GSM feature is high speed , allowing the phone to transmit upto around 40 kbps.

GPRS

GPRS or General Packet Radio Service is an extended service of GSM Network adding the ability to surf the Internet on your phone at slightly higher speeds. GPRS Internet surfing is comparable to dial-up Internet service in it's speed, operating at around 4 to 5 Kilobytes per second.

Surfing the net on your mobile isn't exactly cheap compared to residential Internet services. It is generally billed by how much data you transfer and it can get costly! We would not recommend the consumer use GPRS technology in place of a desktop computer with an Internet connection. It's just too expensive.

Technical introduction to GSM modem technology

FACTS AND APPLICATIONS OF GSM/GPRS MODEM

The GSM/GPRS Modem comes with a serial interface through which the modem can be controlled using AT command interface. An antenna and a power adapter are provided. The basic segregation of working of the modem is as under: • Voice calls • SMS • GSM Data calls • GPRS

Voice calls: Voice calls are not an application area to be targeted. In future if interfaces like a microphone and speaker are provided for some applications then this can be considered.

SMS: SMS is an area where the modem can be used to provide features like: • Pre-stored SMS transmission • These SMS can be transmitted on certain trigger events in an automation system • SMS can also be used in areas where small text information has to be sent. The transmitter can be an automation system or machines like vending machines, collection machines or applications like positioning systems where the navigator keeps on sending SMS at particular time intervals • SMS can be a solution where GSM data call or GPRS services are not available

GSM Data Calls: Data calls can be made using this modem. Data calls can be made to a normal PSTN modem/phone line also (even received). Data calls are basically made to send/receive data streams between two units either PC’s or embedded devices. The advantage of Data calls over SMS is that both parties are capable of sending/receiving data through their terminals.

Some points to be remembered in case of data calls: • The data call service doesn’t come with a normal SIM which is purchased but has to be requested with the service provider (say Airtel). • Upon activation of data/ service you are provided with two separate numbers i.e. the Data call number and the Fax service number. • Data calls are established using Circuit Switched data connections. • Right now the speed at which data can be transmitted is 9.6 kbps. • The modem supports speeds up to 14.4 kbps but the provider give a maximum data rate of 9.6 kbps during GSM data call. • Technologies like HSCSD (high Speed Circuit Switched Data) will improve drastically the data rates, but still in pipeline.

Applications And Facts About GSM Data Calls:

• Devices that have communication on serial port either on PC or in the embedded environment • Devices that want to communicate with a remote server for data transfer • This capability of data transfer can help in reducing processing requirements of the device • The basic aim is to provide a wireless solution keeping the existing firmware intact • The clients firmware continues to work without any modifications (no changes in the existing software required) • GSM data calls can be a good solution where data has to be transmitted from a hand-held device to a central server • The interface on two sides can be between PC’s as well as embedded devices

• Calls can be established by the terminals at either side to start data calls • The Modem remains transparent during data transfer after the call is established. • Call establishment utility to be provided in case PC terminals • Call establishment to be automated in case of embedded terminals. GSM converter can be an option where intelligence of establishing calls has to be put in case of embedded devices. Concept of GSM converter is discussed later in this document

Dial-Up Networks Using GSM Data Calls: Dial up networking is a utility available with Windows through a person can dial the Data call number of this modem from any PC and share the file system on either PC’s. This can be a good utility where both terminals are PC based. Sharing the file system remotely enables monitoring of devices remotely. Thus the modem can act as a piece of device which acts as a spy in the system. Can be a good debugging utility wherein a person can configure/monitor a remote PC based system and even rectify it. Some companies do sell their products with a GSM modem inside it just for this handy feature which allows them to configure the machines sitting anywhere in the world. Since the connection can have upper layer protocols like TCP/IP in this connection it becomes more reliable and useful.

GSM Converter: GSM converter will be an add-on device to be attached between a terminal which wants data transfer and the GSM modem. This GSM converter will take care of call establishment where the embedded device cannot make a call. The converter will remain transparent through-out the call once call is established. The GSM converter will be a very small piece of hardware possibly embedded inside the cable itself.

GPRS: This modem can be used to make a GPRS connection. Upon connection the modem can be used for internet connectivity of devices.

Key-Points in GPRS:

• The PC/Embedded device dials the Service Provider (say Airtel) • Data is routed through the ISP (Internet Service Provider) • GPRS is basically Packet Oriented service • Protocols like TCP/IP are inherent characteristics in GPRS • One has to talk in terms of IP addresses here not phone numbers • The implementation is more useful where PC’s want to communicate over GPRS • Although data transfer is done from embedded devices too but with reduced features • Since you are charged either on monthly flat rates or amount of data transfer taking place GPRS is anyday a cheaper option as compared to GSM data call. But GPRS services are not available everywhere. • The data rate rates in GPRS can go upto 40 kbps

Application areas in GPRS using this Modem:

• Applications where mobile devices want to upload data to a central server • Monitoring devices that are continuously logged on to the server. Since you are charged for the amount of data transfer hence a continuous connection can be maintained. • Virtual private networks • Radius servers

Virtual private networks

A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A VPN enables you to send data between two computers across a shared or public internetwork in a manner that emulates the properties of a point-to-point private link. The act of configuring and creating a virtual private network is known as virtual private networking. To emulate a point-to-point link, data is encapsulated, or wrapped, with a header that provides routing information allowing it to traverse the shared or public transit internetwork to reach its endpoint. To emulate a private link, the data being sent is encrypted for confidentiality. Packets that are intercepted on the shared or public network are indecipherable without the encryption keys. The portion of the connection in which the private data is encapsulated is known as the tunnel. The portion of the connection in which the private data is encrypted is known as the virtual private network (VPN) connection.

Figure 1: Virtual private network connection

VPN connections allow users working at home or on the road to connect in a secure fashion to a remote organization server using the routing infrastructure provided by a public internetwork (such as the Internet). From the user’s perspective, the VPN connection is a point-to-point connection between the user’s computer and an organization server. The nature of the intermediate internetwork is irrelevant to the user because it appears as if the data is being sent over a dedicated private link. VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork (such as the Internet), while maintaining secure communications. The VPN connection across the Internet logically operates as a (WAN) link between the sites. In both of these cases, the secure connection across the internetwork appears to the user as a private network communication—despite the fact that this communication occurs over a public internetwork—hence, the name virtual private network. VPN technology is designed to address issues surrounding the current business trend toward increased telecommuting and widely distributed global operations, where workers must be able to connect to central resources and must be able to communicate with one another. To provide employees with the ability to connect to organization computing resources, regardless of their location, a corporation must deploy a scalable remote access solution. Typically, corporations choose either a department solution, where an internal information systems department is charged with buying, installing, and maintaining organization modem pools and a private network infrastructure; or they choose a value-added network (VAN) solution, where they pay an outsourced company to buy, install, and maintain modem pools and a infrastructure. Neither of these solutions provides the necessary scalability, in terms of cost, flexible administration, and demand for connections. Therefore, it makes sense to replace the modem pools and private network infrastructure with a less expensive solution based on Internet technology so that the business can focus on its core competencies. With an Internet solution, a few Internet connections through Internet service providers (ISPs) and VPN server computers can serve the remote networking needs of hundreds or thousands of remote clients and branch offices. Common Uses of VPNs The next few sections describe the more common VPN configurations in more detail. Remote Access Over the Internet VPNs provide remote access to organization resources over the public Internet, while maintaining privacy of information. Figure 2 shows a VPN connection used to connect a remote access client to an organization intranet. This is known as a remote access VPN connection.

Figure 2: Using a VPN connection to connect a remote access client to an organization intranet Rather than making a long distance (or 1-800) call to an organization or outsourced network access server (NAS), the user dials a local ISP. Using the connection to the local ISP, the VPN client creates a VPN connection between the remote access computer and the organization VPN server across the Internet. Connecting Networks Over the Internet There are two methods for using VPNs to connect local area networks at remote sites: • Using dedicated lines to connect a branch office to an organization LAN. For example, rather than using an expensive long-distance dedicated circuit between the branch office and the corporate hub, both the branch office and the corporate hub routers can use a local dedicated circuit and local ISP to connect to the Internet. The VPN software uses the local ISP connections and the Internet to create a virtual private network between the branch office router and corporate hub router. • Using a dial-up line to connect a branch office to the Internet. Rather than having a router at the branch office make a long distance (or 1-800) call to a corporate or outsourced NAS, the router at the branch office can call a local ISP. The VPN client uses the connection to the local ISP to create a VPN connection between the branch office router and the corporate hub router across the Internet. This is known as a site-to-site VPN connection.

Figure 3: Using a VPN connection to connect two remote sites

In both cases, the facilities that connect the branch office and corporate offices to the Internet are local. The corporate hub router that acts as a VPN server must be connected to a local ISP with a dedicated line. This VPN server must be listening 24 hours a day for incoming VPN traffic. Connecting Computers Over an Intranet In some organization internetworks, the departmental data is so sensitive that the department’s LAN is physically disconnected from the rest of the organization internetwork. Although this protects the department’s confidential information, it creates information accessibility problems for those users not physically connected to the separate LAN.

Figure 4: Using a VPN connection to connect to a secured or hidden network

VPNs allow the department’s LAN to be physically connected to the organization internetwork but separated by a VPN server. The VPN server is not acting as a router between the organization internetwork and the department LAN. A router would connect the two networks, allowing everyone access to the sensitive LAN. By using a VPN server, the network administrator can ensure that only those users on the organization internetwork who have appropriate credentials (based on a need-to-know policy within the company) can establish a VPN connection with the VPN server and gain access to the protected resources of the department. Additionally, all communication across the VPN can be encrypted for data confidentiality. Those users who do not have the proper credentials cannot view the department LAN.

RADIUS:

A GSM phone is a type of mobile phone that uses the (G)lobal (S)ystem for (M)obile Communications to send and receive phone calls. GSM is a digital standard first offered commercially in 1991 and is currently the most popular mobile phone transmission technology in the world.

The GSM standard uses TDMA digital technology, which allows for three different voice calls to be placed in the same time slot, rather than one call using the old analog "cell" phones. This is possible through digital compression that GSM then builds upon with the addition of encryption. A GSM phone takes up the same amount of transmission space as the old technology, but has the additional benefit of added security.

One of the great benefits of a GSM phone is the addition of a SIM card, or "Subscriber Identification Module." This little chip slips into the back of GSM phones and provides all of the users' personal information. This includes contacts and calendar information in most cases, and more importantly the subscriber's personal identification information. Having this information on removable chip enables a GSM phone user to move a SIM card between mobile phones and still receive voice calls to the same number. It also prevents user from having to re-input personal information each time a new phone is purchased.

In Europe and most of Asia, GSM is the standard used by everyone. Having one technology is great, because users can simply move their chips to different phones if they travel to different countries or in most cases use the same phone. This is in contrast to the US, with so many competing standards and difficulty transferring between carriers.

The adoption of GSM technology and GSM phones as a standard also paved the way for the rise of text messaging in many countries. While text messaging is starting to become popular in North America, it is nowhere near as popular as it is in Europe and Asia. Carriers in the US in particular use various technologies in addition to GSM and must then route text messages through third party gateways. This is how a Sprint user can send a text message to a Verizon customer. Until a few years ago this wasn't possible and served to prevent text messaging from truly catching on.

GSM and GSM phones have found a significant boost due to Cingular Wireless becoming America's largest mobile provider. They have adopted GSM technology and promote the GSM phone's ease of use due to a swappable SIM card. Though the US still has many competing technologies, a GSM phone is the international choice. If you plan to travel frequently overseas, a GSM phone might be the wise decision.

Introduction Before deciding which technology is superior, let's talk a little more about these two tecnologies:

• CDMA: stands for Code Division Multiple Access. Both data and voice are separated from signals using codes and then transmited using a wide frequency range. Because of this, there are more space left for data transfer (this was one of the reasons why CDMA is the prefered technology for the 3G generation, which is broadband access and the use of big multimedia messages). 14% of the worldwide market goes to CDMA. For the 3G generation CDMA uses 1x EV-DO and EV-DV. It has a lot of users in Asia, specially in South Korea. • GSM: stands for Global System Mobile. Even though it is sold as "the latest technology" in several countries, this technology is older than CDMA (and also TDMA). But keep in mind that this doesn't mean that GSM is inferior or worse than CDMA. Roaming readiness and fraud prevention are two major advantages from this technology. GSM is the most used cell phone technology in the world, with 73% of the worldwide market. It has a very strong presence in Europe.

TDMA technology is the less used from the three main digital technologies (GSM, CDMA and TDMA) and we think it will gradually be replaced to CDMA or GSM. That's why the GSM vs CDMA war. At one corner, GSM operators say it is better "because it uses a SIM chip, it is the most used technology worldwide, it is more secure and it is more advanced". On the other corner, CDMA followers say it is better "because it is the 3G generation chosen technology and GSM will migrate to CDMA since CDMA is more advanced..."

But which one of these statements are correct? Acordingly to Nokia, "this discussion is not about technology anymore, but about market". We think this is the best way to describe the war between these two cell phone technologies.

In the beginning, GSM was in fact superior. It had more services and allowed more data transfer. But CDMA, facing the advantages of the competitor standard, soon delivered the same features found on GSM. Nowadays, it is not possible to say that GSM services are better than CDMA. Multimedia messages, video, high-speed , digital camera and even PDA function are some of the features we can found on both technologies. The new CDMA 1XRTT technology, which previews what G3 cell phones will bring, is more advanced than EDGE, technology from the beginning of 3G generation, allowing higher transfer rates.

Even the GSM SIM card advantage, that allows you to change your cell phone and keep your phone list, is being surplaced by some CDMA operators with a service that allows you to store your phone book on the operator's database, allowing you to recover your phone book even if your cell phone is stolen (which is not possible with GSM, since if your cell phone is stolen, your SIM card will be stolen together). Notice that recently a new accessory called SIM backup was released, which allows you to backup the data stored in your SIM card. Also some GSM operators are offering a similar backup service.

So, nowadays both technologies are equiparated in technology, but this picture won't be like that in the future. Afterall, CDMA evolution ground is wider and in a few years it will be superior than GSM. This means that GSM operators will disapear? Not at all. They will migrate over CDMA and the war will continue, because the existing CDMA operators chose to use 1xEV-DO and1XEV-DV technologies for their 3G network and the existing GSM operators have opted for a different technology, called WCDMA. Also, even though the current GSM operators will migrate to WCDMA, they still can use their existing GSM network. So users won't feel anything special when the operators shift to the new cell generation (3G), independently from the technology they choose. CDMA & GSM Cellular Technology Reference Page Wireless Communication Protocols and Standards

GSM

In 1989, GSM responsibility was transferred to the European Telecommunication Standards Institute (ETSI), and phase I of the GSM specifications were published in 1990. Commercial service was started in mid1991, and by 1993 there were 36 GSM networks in 22 countries, with 25 additional countries having already selected or considering GSM In addition to Europe, South Africa, Australia, and many Middle and Far East countries have chosen to adopt GSM. By the beginning of 1994, there were 1.3 million subscribers worldwide. The acronym GSM now (aptly) stands for Global System for Mobile telecommunications.

From the beginning, the planners of GSM wanted ISDN compatibility in services offered and control signaling used. The radio link imposed some limitations, however, since the standard ISDN bit rate of 64 Kbps could not be practically achieved.

The digital nature of GSM allows data, both synchronous and asynchronous data, to be transported as a bearer service to or from an ISDN terminal. The data rates supported by GSM are 300 bps, 600 bps, 1200 bps, 2400 bps, and 9600 bps.

The most basic teleservice supported by GSM is telephony. A unique feature of GSM compared to older analog systems is the Short Message Service (SMS). Supplementary services are provided on top of teleservices or bearer services, and include features such as international roaming, caller identification, call forwarding, call waiting, multiparty conversations, and barring of outgoing (international) calls, among others.

CDMA

Code Division Multiple Access (CDMA) is a digital air interface standard, claiming eight to fifteen times the capacity of traditional analog cellular systems. It employs a commercial adaptation of a military spread-spectrum technology. Based on theory, it gives essentially the same services and qualities as wireline service. The primary difference is that access to the local exchange carrier (LEC) is provided via a wireless phone.

Though CDMA’s application in cellular telephony is relatively new, it is not a new technology. CDMA has been used in many military applications, such as:

• Anti-jamming (because of the spread signal, it is difficult to jam or interfere with a Mobile Forensics..Understanding the Technology of GSM Vs CDMA

The mobile industry in India is divided between the two technologies GSM and CDMA. While the earlier service providers had adopted the GSM technology, the new players have been using CDMA technology and have notched up a significant share of the Indian market. Hence any discussion on Mobile Forensics need to take into account the presence of the two technologies.

It is necessary for us to understand the basic differentiation of the two technologies as they may have an impact on the Forensics. An attempt is made here to present the fundamental technical aspects about the two systems.

GSM stands for Global System for Mobile Communications and CDMA stands for Code Division Multiple Access. They represent different systems of sharing of the radio spectrum for communication.

Normally the radio spectrum can be shared by different users accessing the same frequency band without causing interference. The techniques used for this are TDMA (Time division multiple access), FDMA (Frequency division multiple access) and CDMA (Code division multiple access).

GSM (Global System for Mobile Communications) is a form of multiplexing, which divides the available among the different channels. . GSM is a combination of Time and Frequency-Division Multiple Access (TDMA/FDMA). The FDMA part involves the division by frequency of the (maximum) 25 MHz bandwidth into 124 carrier frequencies spaced 200 kHz apart. Each of these carrier frequencies is then divided in time, using a TDMA scheme. The fundamental unit of time in this TDMA scheme is called a burst period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst periods are grouped into a TDMA frame (120/26 ms, or approx. 4.615 ms), which forms the basic unit for the definition of logical channels. One physical channel is one burst period per TDMA frame. Thus GSM allows eight simultaneous calls on the same radio frequency.

CDMA (Code Division Multiple Access) is a form of multiplexing (access to the same resource will be given to more than one user),which allows the use of a particular frequency for a number of signals, optimizing the use of available bandwidth. It is a cellular technology that uses spread-spectrum techniques. In CDMA technology every channel uses the full available spectrum. Individual conversations are encoded with a pseudo-random digital sequence.

CDMA employs analog-to-digital conversion (ADC) in combination with spread spectrum technology. Audio input is first digitized (ADC) into binary elements. The frequency of the transmitted signal is then made to vary according to a defined pattern (code), so it can be intercepted only by a receiver whose frequency response is programmed with the same code, so it follows exactly along with the transmitter frequency. There are trillions of possible frequency-sequencing codes; this enhances privacy and makes cloning difficult. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands.

GSM was first introduced in 1991 and until recently before the establishment of CDMA networks, GSM was the only mobile communication system present in the market. CDMA was first used during World War II by the English allies to foil German attempts at jamming transmissions. The allies decided to transmit over several frequencies, instead of one, making it difficult for the Germans to pick up the complete signal.

Since bandwidth is the major problem in the modern times the CDMA has a very clear advantage over the GSM in these terms. The number of channels(users) that can be allocated in a given bandwidth is comparatively higher for CDMA than for GSM. The cost of setting up a CDMA network is also comparatively less than the GSM network. Due to these advantages there is high probability that CDMA technology will dominate the future of mobile communications.

The technologies are normally evaluated on the following three parameters namely the data transmission capacity, security and radiation levels.

Following table indicates the data transmission of different technologies.:

Cellular technology Generation Data transmission capacity GSM 2G 56 Kps CDMA (IS-95B) 2. 64 Kps - 140 Kps CDMA 2000 3G 2 MBps

The idea of technology with superior security is not a new one. In 1935, a Russian researcher Dmitrii Vasilevich AGEEV, published his book "The basics of linery selection theory", where he explained the concept of coding the signals. After the WWII, Soviet and American military communication systems started to use the concept very widely because of many valuable advantages of the system. The origin concept of CDMA scheme was recommended by QUALCOMM (the famous communication provider in the US and worldwide), however Korean research institute, ETRI and companies like Hyundai, LG, and Samsung performed its realization for the first time in the world in 1995. As of today many countries have accepted it as a national standard of mobile communication and worldwide number of CDMA subscribers has climbed to over 100 million.

As already explained, CDMA uses a radically different approach to what GSM does. It assigns a unique "code" to put multiple users on the same wideband channel at the same time. The codes so-called "pseudo-random code sequence" is used by both the mobile station (handset) and the base station to distinguish between conversations. This gives a greater level of privacy and security to the communication.

As far as radiation level concerned, CDMA is the most harmless one among all existing technologies. Of course, it transmits microwaves while on standby mode, like other technologies do. However, CDMA technology checks 800 times per second its transmission level. Therefore, radiation level is 10 times less than GSM. Another important thing to point out is that CDMA system transmits signals only when the user starts conversation. Simply saying, when you're listening the other ends conversation, you are not affected by microwave as the speaking person does.

It appears that CDMA would be the dominating technology in future and Mobile Forensics has to gear itself to the requirements of the CDMA technology.

Architechture and Working Of GSM Networks

We have already read about how GSM technology had taken over mobile communication technologies and grown over to 214 countries around the world. Now it is important to learn how GSM network works and what is the architecture of GSM networks?. GSM network is consist of thee major systems, it can also be considered architecture of GSM networks. These three systems are SS, which is known to be The Switching System, BSS, it is The Base Station and the other important system is, The operation and support System for GSM networks.

Below all three systems are defined in details with sub systems of each system. The Switching System The Switching system is very operative system in which many crucial operations are conducted, SS systems holds five databases with in it which performs different functions. If we talk about major tasks of SS system it performs call processing and subscriber related functions. These five databases from SS systems are HLR, MSC, VLR, AUC and EIR. Let’s study each database in detail and learn what functions this little systems performs. HLR- Home Location Register:

HLR is database, which holds very important information of subscribers. It is mostly known for storing and managing information of subscribers. It contains subscriber service profile, status of activities, information about locations and permanent data of all sorts. When new connections are purchased, these subscribers are registered in HLR of mobile phone companies. MSC- Mobile Services Switching Center: MSC is also important part of SS, it handles technical end of telephony.It is build to perform switching functionality of the entire system. It’s most important task is to control the calls to and from other telephones, which means it controls calls from same networks and calls from other networks. Toll ticketing, common channel signaling, network interfacing etc are other tasks which MSC is responsible for.

VLR- Visitor Location Register: VLR performs very dynamic tasks; it is database which stores temporary data regarding subscribers which is needed by Mobile Services Switching Center-MSC VLR is directly connected to MSC, when subscribe moves to different MSC location, Visitor location register – VLR integrates to MSC of current location and requests the data about subscriber or Mobile station ( MS ) from the Home Location Register –HLR. When subscriber makes a call the Visitor location register-VLR will have required information for making call already and it will not required to connect to Home Register Location - HRL again. AUC- Authentication Center:

AUC is small unit which handles the security end of the system. Its major task is to authenticate and encrypt those parameters which verify user’s identification and hence enables the confidentiality of each call made by subscriber. Authentication center – AUC makes sure mobile operators are safe from different frauds most likely to happen when hackers are looking for even smallest loop wholes in systems. EIR – Equipment Identity Register: EIR is another important database which holds crucial information regarding mobile equipments. EIR helps in restricting for calls been stolen, mal functioning of any MS, or unauthorized access. AUC – Authentication center and EIR- Equipment Identity registers are either Stand-alone nodes or some times work together as combined AUC/EIR nodes for optimum performance. The Base Station System (BSS) The base station system have very important role in mobile communication. BSS are basically out door units which consist of iron rods and are usually of high length. BSS are responsible for connecting subscribers (MS) to mobile networks.All the communication is made in Radio transmission.The Base station System is further divided in two systems. These two systems, they are BSC, and BTS. Let’s study these two systems in detail.

BTS – The Base Transceiver Station: Subscriber, MS (Mobile Station) or mobile phone connects to mobile network through BTS; it handles communication using radio transmission with mobile station. As name suggests, Base transceiver Station is the radio equipment which receive and transmit voice data at the same time. BSC control group of BTSs. BSC – The Base Station Controller: The Base Station normally controls many cells, it registers subscribers, responsible for MS handovers etc. It creates physical link between subscriber (MS) and BTS , then manage and controls functions of it. It performs the function of high quality switch by handover over the MS to next BSC when MS goes out of the current range of BTS, it helps in connecting to next in range BTS to keep the connection alive within the network. It also performs functions like cell configuration data, control radio frequency in BTS. Data moves to MSC-Mobile switching center after BSC done processing it. MSC is switching center which acts as bridge between different mobile networks. Note: This image is graphical explaination of GSM Arhitecutre and Working of GSM Networks

Note: See the Video of GSM Arhcitechture to learn how GSM network works.

The Operation and Support System (OSS)

OMC- Operations and maintenance center is designed to connect to equipment of MSC- Mobile Switching Center and BSC-Base Station Controller. The implementation of OMC is called OSS-The Operations and Support System.OSS helps in mobile networks to monitor and control the complex systems.The basic reason for developing operation and support system is to provide customers a cost effective support and solutions. It helps in managing, centralizing, local and regional operational activities required for GMS networks. Maintaining mobile network organization, provide overview of network, support and maintenance activities are other important aspects of Operation and Support System

Prior to the end of the 20th century, the use of telephones were limited to the home or workplace. Then technology gave us the , the beeper and then the cellular phones.

Everybody will agree that cellular phone is better than the other types of phones because aside from its being handy it also offers differing varieties of features. You can now view movies, listen to radio, and take memorable photos all with the cellular phone handset. Although millions of people use it, it is undeniable that not everyone knows about the technology needed for cellular phones to work.

One such technology is GSM, how many of us know the correct meaning of this acronym? How about its uses?

GSM stands for "Global System for Mobile Communications". This refers to a digital cellular phone technology that is primarily based on a specified standard for how data is sent over a . GSM was taken over in 1989 by the ETSI (European Telecommunications Standards Institute) and they finalized the GSM standard in 1990. GSM cellular phones use a combination of Time and Frequency Division Multiple Access.

How does GSM work? The GSM works very differently as you compare it to its analog precursor. It can provide you with important features like a fax machine, encryption, text messaging (this is the most commonly used among its services), call forwarding, caller ID, call waiting and multi party conferencing. This is useful because you can talk to the other line without any interference from other calls. The reason for this is because, the frequency channel of GSM is divided into several time slots and as the data travels, there is a specified slot for it, away from the other data. Aside from this, there are also other important features that can be provided by the GSM. There are several system components and basic services that GSM system can provide to its users. To start with, the key types of GSM devices both include single mode and dual mode mobile telephones, embedded radio modules and even external radio modems.

Since there is a need to distinguish between voice and data communication, GSM has found a way of resolving it. The GSM system has made a significant separation of the circuits between these two important elements - the circuit switch refers to the primary voice service and the packet switch refers to the primary data service.

The main companies that offer a credible GSM service of in the United States are the AT&T and the Cingular companies that already merged into one company now. The second is T-Mobile.

Nicola Kennedy publishes articles and reports and provides news, views and information about communications and GSM and Satellite Telephones at Satellite Telephones Information.

This article may be reprinted in full so long as the resource box and the live links are included intact. All rights reserved. Copyright Satellite-Telephones.info

A GSM network is composed of several functional entities, whose functions and interfaces are defined.

Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber, the Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center, performs the switching of calls between the mobile and other fixed or mobile network users, as well as management of mobile services, such as authentication. Not shown is the Operations and Maintenance center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile service Switching Center across the A interface. Mobile Station The mobile station (MS) consists of the physical equipment, such as the radio transceiver, display and digital signal processors, and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to all subscribed services irrespective of both the location of the terminal and the use of a specific terminal. By inserting the SIM card into another GSM cellular phone, the user is able to receive calls at that phone, make calls from that phone, or receive other subscribed services.

The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI), identifying the subscriber, a secret key for authentication, and other user information. The IMEI and the IMSI are independent, thereby providing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem

The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). These communicate across the specified Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers.

The Base Transceiver Station houses the radio tranceivers that define a cell and handles the radiolink protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed. The requirements for a BTS are ruggedness, reliability, portability, and minimum cost.

The Base Station Controller manages the radio resources for one or more BTSs. It handles radiochannel setup, frequency hopping, and handovers, as described below. The BSC is the connection between the mobile and the Mobile service Switching Center (MSC). The BSC also translates the 13 kbps voice channel used over the radio link to the standard 64 kbps channel used by the Public Switched Telephone Network or ISDN. Network Subsystem

The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching of the PSTN or ISDN, and in addition provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjuction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the public fixed network (PSTN or ISDN), and signalling between functional entities uses the ITUT Signalling System Number 7 (SS7), used in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the callrouting and (possibly international) roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile. The current location of the mobile is in the form of a Mobile Station Roaming Number (MSRN) which is a regular ISDN number used to route a call to the MSC where the mobile is currently located. There is logically one HLR per GSM network, although it may be implemented as a distributed database.

The Visitor Location Register contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. Although each functional entity can be implemented as an independent unit, most manufacturers of switching equipment implement one VLR together with one MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, simplifying the signalling required. Note that the MSC contains no information about particular mobile stations - this information is stored in the location registers.

The other two registers are used for authentication and security purposes. The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and ciphering of the radio channel.

GSM

ARCHITECTURE

GSM Glossary

Information on GSM Architecture A GSM network consists of the following components:

 Mobile station. The GSM mobile station (or mobile phone) communicates with other parts of the system through the base-station system.

 GSM Base station system (BSS).

 Base transceiver station (BTS). The base transceiver station (BTS) handles the radio interface to the mobile station. The base transceiver station is the radio equipment (transceivers and antennas)

 Base station controller (BSC). The BSC provides the control functions and physical links between the MSC and BTS. It provides functions such as handover, cell configuration data and control of RF power levels in base transceiver stations. A number of BSCs are served by a MSC.

 GSM Switching System

 Mobile services switching center (MSC). The MSC performs the telephony switching functions of the system. It also performs such functions as toll ticketing, network interfacing, common channel signalling, and others.

 Home location register (HLR). The HLR database is used for storage and management of subscriptions. The home location register stores permanent data about subscribers, including a subscriber's service profile, location information, and activity status.

 Visitor location register (VLR). The VLR database contains temporary information about subscribers that is needed by the mobile services switching center (MSC) in order to service visiting subscribers. When a mobile station roams into a new mobile services switching center (MSC) area, the visitor location register (VLR) connected to that MSC will request data about the mobile station from the HLR, reducing the need for interrogation of the home location register (HLR).

 Authentication center (AUC). The AUC provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call. The authentication center (AUC) also protects network operators from fraud.

 Equipment identity register (EIR). The EIR database contains information on the identity of mobile equipment to prevent calls from stolen, unauthorized or defective mobile stations.

 Message center (MXE). The MXE is a node that provides integrated voice, fax, and data messaging.

 Mobile service node (MSN). The MSN is the node that handles the mobile intelligent network (IN) services.

 Gateway mobile services switching center (GMSC). A gateway mobile services switching center (GMSC) is a node used to interconnect two networks.

 GSM interworking unit (GIWU). The GIWU consists of both hardware and software that provides an interface to various networks for data communications. Through the GSM interworking unit (GIWU), users can alternate between speech and data during the same call.

 Operation and support system (OSS). The OSS is the functional entity from which the network operator monitors and controls the system. The purpose of operation and support system is to offer support for centralized, regional, and local operational and maintenance activities that are required for a GSM network.

GSM System Architecture

In GSM system the mobile handset is called Mobile Station (MS). A cell is formed by the coverage area of a Base Transceiver Station (BTS) which serves the MS in its coverage area. Several BTS together are controlled by one Base Station Controller (BSC). The BTS and BSC together form Base Station Subsystem (BSS). The combined traffic of the mobile stations in their respective cells is routed through a switch called Mobile Switching Center (MSC). Connection originating or terminating from external telephone (PSTN) are handled by a dedicated gateway Gateway Mobile Switching Center (GMSC). The architecture of a GSM system is shown in the figure 2.1 below.

Figure 2.1: GSM Architecture (Source: Bettstetter et. all)

In addition to the above entities several databases are used for the purpose of call control and network management. These databases are Home Location Register (HLR), Visitor Location Register (VLR), the Authentication Center (AUC), and Equipment Identity Register (EIR).

Home Location Register (HLR) stores the permanent (such as user profile) as well as temporary (such as current location) information about all the users registered with the network. A VLR stores the data about the users who are being serviced currently. It includes the data stored in HLR for faster access as well as the temporary data like location of the user. The AUC stores the authentication information of the user such as the keys for encryption. The EIR stores stores data about the equipments and can be used to prevent calls from a stolen equipments.

All the mobile equipments in GSM system are assigned unique id called IMSI (International Mobile Equipment Identity) and is allocated by equipment manufacturer and registered by the service provider. This number is stored in the EIR. The users are identified by the IMSI (International Module Subscriber Identity) which is stored in the Subscriber Identity Module (SIM) of the user. A mobile station can be used only if a valid SIM is inserted into an equipment with valid IMSI. The ``real'' telephone number is different from the above ids and is stored in SIM.

About Private Line Private Line covers what has occurred, is occurring, and will ocurr in telecommunications. Since communication technology constantly changes, you can expect new content posted regularly.

Consider this site an authoritative resource. Its moderators have successful careers in the telecommunications industry. Utilize the content and send comments. As a site about communicating, conversation is encouraged.

Writers Thomas Farely

Tom has produced privateline.com since 1995. He is now a freelance technology writer who contributes regularly to the site.

His knowledge of telecommunications has served, most notably, the American Heritage Invention and Technology Magazine and The History Channel. His interview on will air on the History Channel the end of 2006.

Ken Schmidt

Ken is a licensed attorney who has worked in the tower industry for seven years. He has managed the development of broadcast towers nationwide and developed and built cell towers.

He has been quoted in newspapers and magazines on issues regarding cell towers and has spoke at industry and non-industry conferences on cell tower related issues.

He is recognized as an expert on cell tower leases and due diligence processes for tower acquisitions. GSM History JANUARY 16, 2006 Architecture of the GSM network

A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the operations. Not shown is the Operations and Maintenance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface.

As John states, he presents a generic GSM architecture. Lucent, Ericsson, Nokia, and others feature their own vision in their own diagrams. But they all share the same main elements and parts from different vendors should all work together. The links below show how these vendors picture the GSM architecture. You can remember the different terms much better by looking at all these diagrams.

Lucent GSM architecture/ Ericsson GSM architecture / Nokia GSM architecture / Siemen's GSM architecture

General architecture of a GSM network

One of the most contentious battles being waged in the wireless infrastructure industry is the debate over the efficient use and allocation of finite airwaves. For several years, the world's two main methods -- Code-Division Multiple Access (CDMA) and Global System for Mobile communications (GSM) -- have divided the wireless world into opposing camps. Ultimately, the emergence of a victorious technology may owe more to historical forces than the latest wireless innovation, or the merits of one standard over the other.

CDMA's World War II Foundations CDMA, put into an historical context, is a recently patented technology that only became commercially available in the mid-1990s, but had its roots in pre-World War II America. In 1940, hollywood actress turned inventor, Hedy Lamarr, and co-inventor George Antheil, with World War II looming, co-patented a way for torpedoes to be controlled by sending signals over multiple radio frequencies using random patterns. Despite arduous efforts by the inventors to advance the technology from experiment to implementation, the U.S. Navy discarded their work as architecturally unfeasible. The idea, which was known as frequency- hopping, and later as frequency-hopping spread-spectrum technology (FHSS), remained dormant until 1957 when engineers at the Sylvania Electronic Systems Division, in Buffalo, New York took up the idea, and after the Lamarr-Antheil patent expired, used it to secure communications for the U.S. during the 1962 Cuban Missile Crisis. After becoming an integral part of government security technology, the U.S. military, in the mid-80s, declassified what has now become CDMA technology, a technique based on spread- spectrum technology.

What interested the military soon caught the eye of a nascent wireless industry. CDMA, incorporating spread-spectrum, works by digitizing multiple conversations, attaching a code known only to the sender and receiver, and then dicing the signals into bits and reassembling them. The military loved CDMA because coded signals with trillions of possible combinations resulted in extremely secure transmissions.

Qualcomm, which patented CDMA, and other telecommunications companies, were attracted to the technology because it enabled many simultaneous conversations, rather than the limited stop-and-go transmissions of analog and the previous digital option.

CDMA was not field tested for commercial use until 1991, and was launched commercially in Hong Kong in 1995. CDMA technology is currently used by major cellular carriers in the United States and is the backbone of Sprint's Personal Communications System (PCS). Along with Sprint, major users of CDMA technology are Verizon and GTE.

Advantages of CDMA include:

• Increased cellular communications security. • Simultaneous conversations. • Increased efficiency, meaning that the carrier can serve more subscribers. • Smaller phones. • Low power requirements and little cell-to-cell coordination needed by operators. • Extended reach - beneficial to rural users situated far from cells.

Disadvantages of CDMA include:

• Due to its proprietary nature, all of CDMA's flaws are not known to the engineering community. • CDMA is relatively new, and the network is not as mature as GSM. • CDMA cannot offer international roaming, a large GSM advantage.

The Euro-Asian Alternative: GSM

Analysts consider Qualcomm's major competitive disadvantage to be its lack of access to the European market now controlled by Global System for Mobile communications (GSM). The wireless world is now divided into GSM (much of Western Europe) and CDMA (North America and parts of Asia).

Bad timing may have prevented the evolution of one, single global wireless standard. Just two years before CDMA's 1995 introduction in Hong Kong, European carriers and manufacturers chose to support the first available digital technology - Time Division Multiple Access (TDMA). GSM uses TDMA as its core technology. Therefore, since the majority of wireless users are in Europe and Asia, GSM has taken the worldwide lead as the technology of choice.

Mobile Handset manufacturers ultimately split into two camps, as Motorola, Lucent, and Nextel chose CDMA, and Nokia and Ericsson eventually pushed these companies out and became the dominant GSM players.

Advantages of GSM:

• GSM is already used worldwide with over 450 million subscribers. • International roaming permits subscribers to use one phone throughout Western Europe. CDMA will work in Asia, but not France, Germany, the U.K. and other popular European destinations. • GSM is mature, having started in the mid-80s. This maturity means a more stable network with robust features. CDMA is still building its network. • GSM's maturity means engineers cut their teeth on the technology, creating an unconscious preference. • The availability of Subscriber Identity Modules, which are smart cards that provide secure data encryption give GSM m-commerce advantages.

In brief, GSM is a "more elegant way to upgrade to 3G," says Strategis Group senior wireless analyst Adam Guy.

Disadvantages of GSM:

• Lack of access to burgeoning American market.

Conclusion

Today, the battle between CDMA and GSM is muddled. Where at one point Europe clearly favored GSM and North America, CDMA, the distinct advantage of one over the other has blurred as major carriers like AT&T Wireless begin to support GSM, and recent trials even showed compatibility between the two technologies.

GSM still holds the upper hand however. There's the numerical advantage for one thing: 456 million GSM users versus CDMA's 82 million.

Other factors potentially tipping the scales in the GSM direction include : AT&T Wireless' move to overlay GSM atop its TDMA network means the European technology (GSM) gains instant access to North America's number two network.

Qualcomm's recently announced that Wideband-CDMA (WCDMA) won't be ready in Europe until 2005. This comes amidst reports that GSM's successor, General Packet Radio Services (GPRS) remains on target for deployment in 2001-2002.

For all of the historical and technological reasons outlined above, it appears that GSM, or some combination of GSM and CDMA, will become the long sought after grail for a global wireless standard. A universalization of wireless technologies can only stand to benefit the compatibility and development costs and demands on all wireless commerce participants.

What is the Difference Between GSM and CDMA? In cellular service there are two main competing network technologies: Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). Cellular carriers including Sprint PCS, Cingular Wireless, Verizon and T-Mobile use one or the other. Understanding the difference between GSM and CDMA will allow you to choose a carrier that uses the preferable network technology for your needs.

The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA, a proprietary standard designed by Qualcomm in the United States, has been the dominant network standard for North America and parts of Asia. However, GSM networks continue to make inroads in the United States, as CDMA networks make progress in other parts of the world. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other. That said, to the non-invested consumer who simply wants bottom line information to make a choice, the following considerations may be helpful.

Coverage: The most important factor is getting service in the areas you will be using your phone. Upon viewing competitors' coverage maps you may discover that only GSM or CDMA carriers offer cellular service in your area. If so, there is no decision to be made, but most people will find that they do have a choice.

Data Transfer Speed: With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, speed is important to those who use the phone for more than making calls. CDMA has been traditionally faster than GSM, though both technologies continue to rapidly leapfrog along this path. Both boast "3G" standards, or 3rd generation technologies.

EVDO, also known as CDMA2000, is CDMA's answer to the need for speed with a downstream rate of about 2 megabits per second, though some reports suggest real world speeds are closer to 300-700 kilobits per second (kbps). This is comparable to basic DSL. As of fall 2005, EVDO is in the process of being deployed. It is not available everywhere and requires a phone that is CDMA2000 ready.

GSM's answer is EDGE (Enhanced Data Rates for GSM Evolution), which boasts data rates of up to 384 kbps with real world speeds reported closer to 70-140 kbps. With added technologies still in the works that include UMTS (Universal Mobile Telephone Standard) and HSDPA (High Speed Downlink Packet Access), speeds reportedly increase to about 275—380 kbps. This technology is also known as W-CDMA, but is incompatible with CDMA networks. An EDGE-ready phone is required.

In the case of EVDO, theoretical high traffic can degrade speed and performance, while the EDGE network is more susceptible to interference. Both require being within close range of a cell to get the best speeds, while performance decreases with distance.

Subscriber Identity Module (SIM) cards: In the United States only GSM phones use SIM cards. The removable SIM card allows phones to be instantly activated, interchanged, swapped out and upgraded, all without carrier intervention. The SIM itself is tied to the network, rather than the actual phone. Phones that are card-enabled can be used with any GSM carrier.

The CDMA equivalent, a R-UIM card, is only available in parts of Asia but remains on the horizon for the U.S. market. CDMA carriers in the U.S. require proprietary handsets that are linked to one carrier only and are not card-enabled. To upgrade a CDMA phone, the carrier must deactivate the old phone then activate the new one. The old phone becomes useless.

Roaming: For the most part, both networks have fairly concentrated coverage in major cities and along major highways. GSM carriers, however, have roaming contracts with other GSM carriers, allowing wider coverage of more rural areas, generally speaking, often without roaming charges to the customer. CDMA networks may not cover rural areas as well as GSM carriers, and though they may contract with GSM cells for roaming in more rural areas, the charge to the customer will generally be significantly higher.

International Roaming: If you need to make calls to other countries, a GSM carrier can offer international roaming, as GSM networks dominate the world market. If you travel to other countries you can even use your GSM cell phone abroad, providing it is a quad-band phone (850/900/1800/1900 MHz). By purchasing a SIM card with minutes and a local number in the country you are visiting, you can make calls against the card to save yourself international roaming charges from your carrier back home. CDMA phones that are not card-enabled do not have this capability, however there are several countries that use CDMA networks. Check with your CDMA provider for your specific requirements.

According CDG.org, CDMA networks support over 270 million subscribers worldwide, while GSM.org tallies up their score at over 1 billion. As CDMA phones become R-UIM enabled and roaming contracts between networks improve, integration of the standards might eventually make differences all but transparent to the consumer. What is the difference between and cdma When it comes to choice of anything in life, there will be pro's and con's on both sides of the coin. This is the same for cellular network providers, when it comes to delivery the best service for mobile phones. The end user is only interested in getting the best coverage and best speed when it comes to data transfer, and those two factors alone are just two of the many things which can be influenced by which technology your cellular network employs. There could be a preferable network that caters to your demands better than the other. So what is the difference between GSM and CDMA, the two leading technologies? Both GSM (Global System for Mobile Communications) and CDMA (Code Division Multiple Access) are technologies that work on radio frequencies, with the mobile phone handset being the antennae receiving the signal. The range of each technology is different, and they also have different rates and modulation schemes, and that is why handsets are different between the two technologies. GSM uses SIM cards (Subscriber Identity Module) whereas, CDMA based phones do not. In the case of GSM networks, it is the SIM card that is tied to the network, where on CDMA networks it is the handset itself that is linked to the carrier. This means that a SIM card can be placed in pretty much any handset and still receive GSM coverage, but once a CDMA phone's subscription has ended, the phone is outmoded. CDMA technology has a version of the SIM card, the RUIM (Removable User Identity Module) but is not as widely popular in the US because it is the handsets which must be linked to the carrier. Third Generation technology (3G) is used by both systems, so is fully compatible with both. A handset that is 3G compatible can be used for both GSM carriers and for CDMA signals. Both technologies utilise important aspects of 3G in order to try and improve their subscriber benefits. The better and more reliable a service can be provided, the more customer satisfaction there will be. What is the difference between GSM and CDMA when it comes to service? There have been reports that GSM drops a lot more calls than CDMA, but this is unfounded by any firm data. Both types of carrier have issues with dropped calls when moving from the range of one transmitter to the next. GSM is widely regarded as having much better coverage in rural areas though, and is certainly the dominant technology for mobile phones across Europe. The main issue with mobile phones is of course, coverage. GSM leads the way when it comes to coverage across the world, because it is seen as more versatile and has also been accepted and used in more places, especially within Europe, where it is the standard mobile phone communications technology. Being able to swap SIM cards between phones is a big positive, especially when visiting foreign countries, for cheap local SIM cards can be used to save on roaming charges. Roaming charges are often applied more on CDMA networks, because they often have to borrow services from GSM carriers in rural places, and therefore the consumer will likely be hit with roaming charges. For the end user, there is unlikely to be much concern as to what is the difference between GSM and CDMA as they both provide a similar service. The consumer will just want the best plan for their money, and the coolest handset with all the wonderful digital features. It is just how that service serves you from behind the scenes, which is the major difference. Subscribers in both camps will claim that one is better than the other, and there really is, as a phone user, not much to choose between the two. It will all come down to a personal preference when choosing a cellular phone.

Architechture and Working Of GSM Networks

We have already read about how GSM technology had taken over mobile communication technologies and grown over to 214 countries around the world. Now it is important to learn how GSM network works and what is the architecture of GSM networks?. GSM network is consist of thee major systems, it can also be considered architecture of GSM networks. These three systems are SS, which is known to be The Switching System, BSS, it is The Base Station and the other important system is, The operation and support System for GSM networks.

Below all three systems are defined in details with sub systems of each system. The Switching System The Switching system is very operative system in which many crucial operations are conducted, SS systems holds five databases with in it which performs different functions. If we talk about major tasks of SS system it performs call processing and subscriber related functions. These five databases from SS systems are HLR, MSC, VLR, AUC and EIR. Let’s study each database in detail and learn what functions this little systems performs. HLR- Home Location Register:

HLR is database, which holds very important information of subscribers. It is mostly known for storing and managing information of subscribers. It contains subscriber service profile, status of activities, information about locations and permanent data of all sorts. When new connections are purchased, these subscribers are registered in HLR of mobile phone companies. MSC- Mobile Services Switching Center: MSC is also important part of SS, it handles technical end of telephony.It is build to perform switching functionality of the entire system. It’s most important task is to control the calls to and from other telephones, which means it controls calls from same networks and calls from other networks. Toll ticketing, common channel signaling, network interfacing etc are other tasks which MSC is responsible for.

VLR- Visitor Location Register: VLR performs very dynamic tasks; it is database which stores temporary data regarding subscribers which is needed by Mobile Services Switching Center-MSC VLR is directly connected to MSC, when subscribe moves to different MSC location, Visitor location register – VLR integrates to MSC of current location and requests the data about subscriber or Mobile station ( MS ) from the Home Location Register –HLR. When subscriber makes a call the Visitor location register-VLR will have required information for making call already and it will not required to connect to Home Register Location - HRL again. AUC- Authentication Center:

AUC is small unit which handles the security end of the system. Its major task is to authenticate and encrypt those parameters which verify user’s identification and hence enables the confidentiality of each call made by subscriber. Authentication center – AUC makes sure mobile operators are safe from different frauds most likely to happen when hackers are looking for even smallest loop wholes in systems. EIR – Equipment Identity Register: EIR is another important database which holds crucial information regarding mobile equipments. EIR helps in restricting for calls been stolen, mal functioning of any MS, or unauthorized access. AUC – Authentication center and EIR- Equipment Identity registers are either Stand-alone nodes or some times work together as combined AUC/EIR nodes for optimum performance. The Base Station System (BSS) The base station system have very important role in mobile communication. BSS are basically out door units which consist of iron rods and are usually of high length. BSS are responsible for connecting subscribers (MS) to mobile networks.All the communication is made in Radio transmission.The Base station System is further divided in two systems. These two systems, they are BSC, and BTS. Let’s study these two systems in detail.

BTS – The Base Transceiver Station: Subscriber, MS (Mobile Station) or mobile phone connects to mobile network through BTS; it handles communication using radio transmission with mobile station. As name suggests, Base transceiver Station is the radio equipment which receive and transmit voice data at the same time. BSC control group of BTSs. BSC – The Base Station Controller: The Base Station normally controls many cells, it registers subscribers, responsible for MS handovers etc. It creates physical link between subscriber (MS) and BTS , then manage and controls functions of it. It performs the function of high quality switch by handover over the MS to next BSC when MS goes out of the current range of BTS, it helps in connecting to next in range BTS to keep the connection alive within the network. It also performs functions like cell configuration data, control radio frequency in BTS. Data moves to MSC-Mobile switching center after BSC done processing it. MSC is switching center which acts as bridge between different mobile networks. Note: This image is graphical explaination of GSM Arhitecutre and Working of GSM Networks

Note: See the Video of GSM Arhcitechture to learn how GSM network works.

The Operation and Support System (OSS)

OMC- Operations and maintenance center is designed to connect to equipment of MSC- Mobile Switching Center and BSC-Base Station Controller. The implementation of OMC is called OSS-The Operations and Support System.OSS helps in mobile networks to monitor and control the complex systems.The basic reason for developing operation and support system is to provide customers a cost effective support and solutions. It helps in managing, centralizing, local and regional operational activities required for GMS networks. Maintaining mobile network organization, provide overview of network, support and maintenance activities are other important aspects of Operation and Support System

What is a basic technical difference in CDMA technology and GSM Technology in telecom sector?

CDMA is by a service providerm such as Verizon, Sprint, AT&T, and so fourth. GSM is by a third-party service, so if your a big tech guy, you can basically create your own service. (which is very expensive. Hope this helps an good luck!

CDMA: code division multiple access is one of the method in encrypt a code.like FDMA.

GSM:

GSM (Global System for Mobile communications: originally from Groupe Spécial Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80% of the global mobile market uses the standard.[1] GSM is used by over 3 billion people across more than 212 countries and territories.[2][3] Its ubiquity makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs from its predecessors in that both signaling and speech channels are digital, and thus is considered a second generation (2G) mobile phone system. This has also meant that data communication was easy to build into the system.

The ubiquity of the GSM standard has been an disadvantage to both consumers (who benefit from the ability to roam and switch carriers without switching phones) and also to network operators (who can choose equipment from any of the many vendors implementing GSM[4]). GSM also pioneered a low-cost (to the network carrier) alternative to voice calls, the Short message service (SMS, also called "text messaging"), which is now supported on other mobile standards as well. Another advantage is that the standard includes one worldwide Emergency telephone number, 112 [5] . This makes it easier for international travellers to connect to emergency services without knowing the local emergency number.

Newer versions of the standard were backward-compatible with the original GSM phones. For example, Release '97 of the standard added packet data capabilities, by means of General Packet Radio Service (GPRS). Release '99 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).