Mobile Communication Basics
Mobile Communication Basics
• In terrestrial communication high power transmitters are used so that the area
covered is large, example radio communication. In mobile or cellular
communication, low power transmitters are used. So the area covered is less
when compared with terrestrial Communication. Hence even for a small
location, more number of transmitters are required.
• Each cell can cover a limited number of mobile subscribers within its
boundaries. Each cell can have a base station with a number of RF channels.
• The difficulty in the early mobile radio systems was the reuse of same
frequencies throughout the system resulting in significant interference and lot
of bandwidth being dedicated to a single call.
The cellular system shown in the figure uses a number of low-power
transmitters called BSs to cover same area and to avoid the above difficulties.
Each cell is allocated a band of frequencies and is served by a base station. Each
base station consists of a transmitter, receiver and a control unit.
Frequency Reuse: In a cellular system, each cell has a base transceiver. The
transmission power is carefully controlled to allow communication within the
cell using a given frequency band by limiting the power of the frequency that
escapes the current cell into adjacent cells.
Key design issue is to determine the minimum separation between two cells
using the same frequency band so that the signals do not interfere with each
other.
By using hexagonal concept, we can divide the geographical area efficiently and
the number of transmitters deployed can be brought down. In reality, the shape
is irregular polygon. Hidden areas may not be properly covered through circular
shapes.
The cellular concept was developed in response to the limitations of
conventional mobile radio services. The main limitations of the previous mobile
communication systems are as follows:
3. If a user leaves the coverage area, they had to reinitiate the call on a different
frequency channel.
TDMA allows several users to share the same frequency band by dividing the
timescale into different time slots which are periodically allocated to each
mobile user for the duration of a call.
TDMA systems have the capability to split users into different time slots because
they transfer digital data. TDMA systems divide the radio spectrum into time
slots and each user is allowed to either transmit or receive in each time slots
(i.e., different users can use the same frequency in the same cell but at different
times).
Figure shows the principle of operation. Each row (frequency domain) in the
figure represents channel that is divided into three different time-slots (time
domain).
Calls in a TDMA system start in analog format and are sampled to transform
them to digital format. After the call is converted into digital format, the TDMA
system places the call into an assigned time slot.
Frequency division multiple access
The FDMA is the simplest scheme used to provide multiple access in analog
transmission. In FDMA systems, the radio frequency spectrum is divided into
several frequency bands that are separated by a certain guard band. Each
frequency band can be used simultaneously.
It can be observed from the figure that FDMA permits only one user per channel
because it allows the user to use the channel 100 percent of the time. Therefore,
only the frequency “dimension” is used to define channels.
Applications of FDMA
Walkie-talkies and mobile networks for closed user groups often use
FDMA.
Another example of FDMA is AM or FM radio broadcasting, where each
station has its own channel.
Early cellular telephony mostly used FDMA analog transmission.
Code division multiple access
CDMA allows transmissions to occupy the entire bandwidth at the same time
without interference.
CDMA uses unique spreading codes to spread the base band data before
transmission.
CDMA assigns to each user a unique code sequence that is used to code data
before transmission. If a receiver knows the code sequence related to any
particular user, then it can decode the received data.
The codes are shared by the mobile phone and the base station. The codes are
called Pseudorandom code sequences.
All the users can access the entire spectrum allocation all of the time. A user‟s
unique code separates the call from all other calls. Codes take the form of a
carefully designed one/zero sequence produced at a much higher rate than that
of the base band data.
Space division multiple access
In addition to frequency, time, and code domains, the spatial dimension can also
be used for multiplexing different data streams by transmitting these data
streams over different, non-overlapping transmission channels. The use of space
division multiplexing for multiple access is termed SDMA.
• Modern mobile phone networks use cells because radio frequencies are a
shared resource and are limited. Cell-sites and handsets change frequency
under computer control and use low-power transmitters so that a limited
number of radio frequencies can be simultaneously used by many callers
with less interference.
• All cell sites are connected to telephone exchanges (or switches), which in
turn connect to the public telephone network.
Components of a Cellular Mobile Network
• A cellular network is formed by connecting the following five components:
1. Mobile station (MS) , 2. Base station (BS), 3. Mobile switching centre (MSC)
4. Base station controller (BSC) and 5. Public switched telephone network
(PSTN)
• The function of each network component is described below:
1. Mobile station (MS):
• MSs are usually a mobile phone. Each mobile phone contains a transceiver
(transmitter and receiver), an antenna, and control circuitry. Antenna converts
the transmitted RF signal into an EM wave and the received EM waves into
an RF signal.
• The same antenna is used for both transmission and reception. A duplexer
switch multiplexes the same antenna for sending and receiving.
• The second part of the BS is the antenna and the feeder to connect the
antenna to the base transceiver station itself.
• It is important that the location, height, and orientation are all correct to
ensure that the required coverage is achieved.
If the antenna is too low or in a poor location, there will be
insufficient coverage, leaving a coverage “hole”.
If the antenna is too high and directed incorrectly, then the signal will
be heard well beyond the boundaries of the cell causing interference.
• BS or cell site antenna: Either omni-directional or directional antennas are
used as BS antennas in the wireless industry.
Base station controller (BSC):
• A number of BSs are connected to a BSC. An important function of BSC is that
it manages the “handoff” from one BS to another as a subscriber moves from
cell-to-cell.
• The BSC contains logic to control each of the BSs. Also, a group of BSCs are
in turn connected to a MSC via microwave link or telephone lines.
ii. Visitor location register (VLR): The VLR comes into action once the
subscriber leaves the coverage region. Unlike the HLR, the VLR is dynamic in
nature and interacts with the HLR when recoding the data of a particular mobile
subscriber. When the subscriber moves to another region, the database of the
subscriber is also shifted to the VLR of the new region.
iii. Authentication centre (AUC): The AUC (or AC) is responsible for policing
actions in the network. AUC protects the network against false subscribers and
protects the calls of regular subscribers.
There are two major keys in the GSM standards: the encryption of
communications between mobile users and the authentication of the users. The
encryption keys are held both in the mobile equipment and the AUC and the
information is protected against unauthorized access.
• PSTN is a cellular network that can be viewed as an interface between
mobile units and a telecommunication infrastructure. It is nothing but the
land-based section of the network.
• It is necessary that the BSs are connected to a switching network and that
network is to be connected to other networks such as the PSTN, so that calls
can be made to and from mobile subscribers.
Common Air Interface
• Communication between the BS and the mobiles is defined by a standard
common air interface (CAI) that specifies four different channels. The
channels used for voice transmission from the BS to mobiles are called
forward voice channels (FVC) and the channels used for voice transmission
from mobiles to the BS are called reverse voice channels (RVC).
• The forward control channel (FOCC) and reverse control channel (RECC)
establish the MS on the network (registration), to set up calls from the MS
and to set up calls coming in for a particular MS (called a mobile page). After
a call is established using the RECC and FOCC, the process switches to the
voice channels.
• Control channels are often called setup channels because they are only
involved in setting up a call and moving it to an unused voice channel.
Control channels transmit and receive data messages that carry call initiation
and service requests, and are monitored by mobiles when they do not have a
call in progress.
• Control channels are also sometimes called paging channels (BS to MS) in
the case of downlink, and access channels (MS to BS) in the case of uplink.
The paging channels are used to set up calls that originate from the BS, while
the access channel is used to set up calls that originate from the mobile.
Paging channel is designated as FOCC and the access channel as the RECC.
• Traffic channels: Traffic channels are active during voice conversations, but
they also do contain the digital information needed to keep a call up. A MS
thus tunes to and receives either a control channel or a traffic channel at any
given moment.
CELL PHONE FREQUENCIES AND CHANNELS:
• A cell phone carrier typically gets 832 radio frequencies to use in a city
(1988). Each cell phone uses two frequencies per call, a duplex channel. So
there are typically 395 voice channels per carrier. (The other 42 frequencies
are used for control channels).
• In each cell, about 56 voice channels are available. In other words, in any
cell, 56 people can be talking on their cell phone at one time. With digital
transmission methods (2G), the number of available channels increases.
• For example, a TDMA-based digital system can carry three times as many
calls as an analog system, so each cell has about 168 channels available.
• Channels (frequencies) used in one cell can be reused in another cell some
distance away, which allows a large number of stations to communicate using
a limited number of radio frequencies.
Channel Assignment
Fixed channel assignment (FCA): Channels are pre-allocated to the cells
during planning phase.
In FCA, each cell assigns its own frequency channel to the mobile subscribers
within its cell. Channel assignment is primarily made in such a way that
channels assigned adjacently within a cell do not interfere with each other.
In FCA, the area is partitioned into a number of cells, and a number of channels
are assigned to each cell according to some reuse pattern, depending on the
desired signal quality.
Advantages of FCA:
• Fixed parameters (power, frequency) for transceivers.
• Good performance under uniform- and/or high-traffic loads as cells
independently decide their channel allocation decisions.
Disadvantage:
If each cell is allocated to a pre-determined set of voice channels then a newly
arriving call is blocked, as all the channels are occupied.
In dynamic channel assignment (DCA), the central common pool maintains all
the available channels. Channels are assigned dynamically as new requests for
radio resource (for a fresh originating call or handoff of existing call) arrive in
the system.
This also implies that when the use of assigned channel is completed, the
channel currently in use is returned back to the central pool.
Advantages of DCA:
• No fixed channels are assigned to each cell.
• Out of the available channels, any channel can be assigned to any cell on need
basis.
The serving base station (BS) requests a channel from the MSC whenever a call
request is made.
DCA schemes perform better under non-uniform and low traffic density. FCA
performs well under high density and uniform traffic conditions.
Channel sharing can be done from one of the two adjacent sectors of the
neighboring cells in a sectored cellular system configuration. Shared channels
can be returned back when the channels become available in the shared sector.
The channel can also be ordered based on which channels provide better
performance. Channel sharing always increases the trunking (handling of
multiple signals) efficiency of the channels.
Channel Borrowing:
• It is a combination of fixed and dynamic channel assignment. A channel set is
nominally assigned to each cell.
• When all the channels in a cell are occupied, the cell borrows channels from
other cells to accommodate the incoming new/handoff calls, as long as the
borrowed channels do not interfere with the ones used by existing calls.
Otherwise the call is blocked.
• The channel borrowing schemes are more flexible in the sense that by “moving”
(borrowing) channels from less busy cells to more busy cells, a balanced
performance throughout the system can be achieved.
• Borrowing a channel x carries a penalty: cells that were originally allocated this
channel x, may not be able to use this channel, since they may be within the co-
channel interference range of the cell that borrowed the channel.
• Thus the decreased blocking probability at the cell that borrowed a channel is
obtained at the cost of decreasing the capacity of other cells, which in turn causes
QoS degradation in these cells.
CELL PHONE NETWORK TECHNOLOGIES / ARCHITECTURE:
In a cellular mobile communication system, the service area is divided into many
small areas called cells. A cell station is installed in each, and tracking connections
are carried out in accordance with the movements of the user.
As users move across multiple cells in this system, it is always necessary to identify
the cell in which the mobile stations are located. The essential control technologies
to smoothly continue communications as users move across cells are “location
registration” and “hand-over”.
The cell configuration in mobile communication includes both large zone systems in
which a single base station covers the entire service area, and cellular systems in
which the service area is divided into several smaller areas, each of which has a base
station.
Although the large zone system can cover a larger service area as the radio waves
can reach greater distances, the repeated use of frequencies is not possible except in
more distant locations.
Since the cellular system can repeatedly use limited frequency resources, it can cover
global-scale service area with only a small number of frequency bandwidths.
The basic consideration in cell configuration relates to the cell-shape repetition
pattern. A method in which cells are combined in a pattern of hexagons has
proved effective in both systems.
Cells are amorphous (no uniform shape among cells), not have constant sizes
and overlap in areas of coverage. Area of coverage of a cell is determined by the
distance limits for which a user can place a call with acceptable QoS.
A useful modeling tool for cellular planning is the hexagonal cell layout. It
minimizes cell overlap.
Location Registration:
Under a cellular mobile communication system, connections cannot be
automatically made unless the network side always identifies where the mobile
unit is located as the unit itself is continuously moving, unlike the situation with
a fixed telephone. The process that carries out this essential function is known as
location registration.
Location information is registered in the network via signals from the cell
station to the mobile unit. When a location change is subsequently detected, the
mobile unit updates its internal location registration and notifies the network.
When the mobile unit is turned on, the mobile unit uses signal from the cell
station to compare the location information stored within its internal memory,
and notifies the network about the new location registration details if it detects
any difference.
Handoff
There are cases in which a mobile unit traverses multiple cells of a cellular mobile
communication system during a call. This demands the use of “hand-over”, the
radio channel is switched over automatically to the appropriate cell during the call.
When a registered phone moves closer to a stronger tower, the call is „handed off‟.
The call is then routed through the new tower. This handoff is fully automatic and
is generally transparent to the user. Sometimes, for technical reasons, a call may
be routed to a weaker tower.
Handover may take place in several conditions:
1. within the cell: Intra-cell handover
2. between cells in the same cell layer: Inter-cell handover
3. between cells of different layers: Interlayer handover
4. between cells of different networks: Internetwork handover
Handoff operation identifies a new base station and reallocates the voice and
control channels to the new base station. Handoff must ensure that the drop in
the measured signal is not due to momentary fading and that the mobile is
actually moving away from the serving base station.
Dwell time: The time over which a call may be maintained within a cell without
handoff. Dwell time depends on propagation, interference, distance and speed.
Hard Handoff: Early systems used a hard handoff. In a hard handoff, a mobile
station only communicates with one base station. When the mobile station
moves from one cell to another, communication must first be broken with the
previous base station before communication can be established with the new
one.
This may create a rough transition. The mobile ends communication with old
base station BEFORE beginning communication with the new one.
Soft Handoff: New systems use a soft handoff. In this case, a mobile station can
communicate with two base stations at the same time. This means that, during
handoff, a mobile station may continue with the new base station before
breaking off from the old one.
The mobile begins communication with the new base station BEFORE
ENDING communications with the old.
Roaming: Roaming means a user can have access to communication or can be
reached where there is coverage. A service provider usually has limited coverage.
Intersystem handoff: Happens when a mobile moves from one cellular system
to a different cellular system controlled by a different MSC. Handoff requests is
much important than handling a new call.
The reason for handoff failures are:
a) No channel is available on selected BS
b) Handoff is denied by the network for reasons such as lack of resources.
For example, no bridge or no suitable channel card or the mobile station
may have exceeded some limit on the number of handoffs that may be
attempted in some period of time.
c) It takes the network too long to set up the handoff after it has been initiated.
d) The target link fails in some way during the execution of handoff.
Frequency Reuse:
• Cellular technology enables mobile communication because they use
complex two-way radio system between the mobile unit and the wireless
network.
• It uses radio frequencies (radio channels) over and over again throughout a
market with minimal interference, to serve a large number of simultaneous
conversations. This concept is the central principle to cellular design and is
called frequency reuse.
• Most frequency reuse plans are produced in groups of seven cells. Same
frequency is reused by each sector.
• The number of cells per cluster defines the reuse pattern and this is a function
of the cellular geometry. Cell sizes vary from some 100m up to 35 km
depending on user density, geography, transceiver power etc. The hexagonal
shape of cell is idealized.
• By limiting the coverage area to be within the boundary of the cell, the
channel groups may be reused to cover different cells.
• Consider a cellular system which has a total of S duplex channels. Each cell
is allocated a group of k channels, k<S. The S channels are divided among N
cells.
• Then the total number of available radio channels is given by S=kN
• The N cells which use the complete set of channels is called a cluster. The
cluster can be repeated M times within the system. The total number of
channels C is used as a measure of capacity where C=MkN = MS.
• The capacity is directly proportional to the number of replication cluster
factor M. The cluster size N, is typically equal to 4, 7 or 12. Small N is
desirable to maximize capacity.
• The frequency reuse factor is given by 1/N.
Cell Splitting
• Cell splitting increases the capacity of cellular system since it increases the
number of times the channel are reused.
• The original congested bigger cell is called macro-cell and the smaller cells
are called micro-cells.
• It uses 800 MHz ISM band and two separate analog channels: forward and
reverse analog channels. The band between 824 to 849 MHz is used for
reverse communication from MS To BS. The band between 869 to 894 MHz
is used for forward communication from BS to MS. Each band is divided into
83230 khz channels.
• 2G technology supports data, speech, FAX, SMS, and WAP services. The
frequency bands used by GSM are 890–960 MHz and 1710–1880 MHz.
• Global system for mobile (GSM) was the first commercially operated digital
cellular system and uses TDMA/frequency-division duplexing (FDD).
• The 2.5G was started in 1998 with added GPRS and enhanced data rates for
GSM evolution (EDGE). In addition to the hyper text transfer protocol
(HTTP), it supports the wireless access protocol (WAP) through which web
pages can be viewed on the small screen of a mobile phone or any handheld
device, which led to mobile commerce (m-commerce).
THIRD GENERATION:
• Third Generation (3G) arrived because of low speed and incompatible
technologies used in previous generations.
• The main features of (3G) is that it allows higher data transmission rates and
increased capacity for the traditional voice call and high speed data
applications such as Global roaming, Internet mobile, video conferencing,
video calls and 3D gaming.
• Goal of the 3G technologies are mentioned below:
Allow both digital data and voice communication.
To facilitate Universal personal communication.
Listen music, watch movie, access internet video conferencing, etc.
Fourth Generation :
• 4G is called as MAGIC because the user can use the mobile multimedia at
anytime, anywhere with Global mobility support on integrated wireless
solution and customized personal service at high speed data rates than
previous generations.
• 4G will be a fully IP-based integrated system. 4G will be capable of
providing between 100 Mbps and 1 Gbit/s speed both indoor and outdoor
with premium quality and high security.
• GSM supports 200 full duplex channels per cell, where each channel uses
different uplink and downlink frequency.
Security functions: access control, authentication via chip card and PIN.
The GSM network architecture consists of three major subsystems:
• Mobile Station (MS)
• Base Station Subsystem (BSS)
• Network and Switching Subsystem (NSS)
• The BSC is responsible for the allocation of radio resources to a mobile call and
for the handovers that are made between base stations under its control. Other
handovers are under control of the MSC.
• Each BSC connects to a number of base transceiver station (BTS) which, in turn,
provide radio interfaces for mobile devices. BSC manages the radio resources for
one or more BTSs.
• It handles radio channel setup, frequency hopping and handovers. The BSC also
translates the 13kbps voice channel used over the radio link to the standard
64kbps channel used by the public Switched Telephone Network or ISDN.
Functions performed by the BSC :
• Processing of signals.
• Controlling signals to the connected BTSs and control of handover of signals
from one BTS to another within a BSS.
• Control and handover of the signals from BSC to MSC.
• Traffic control by continuous measurement of the frequency channel
spectrum being used at any given instant.
• Authentication, encryption and decryption of data.
• Updating location registry of the MSs.
Base transceiver station houses the radio transceiver that defines a cell and
handles the radio link protocols with the mobile stations. BTS serves one or
more cells in cellular Network and contains more than one transceiver.
• The Home Location Register (HLR) and the Visitor Location Register (VLR)
are located within the MSC.
• Each mobile user has only one HLR record worldwide, which is updated
constantly on a real-time basis. Each MS must register at a specific HLR of a
specific MSC. The HLR contacts AUC in the network subsystem for
authentication.
• The database contains other useful information like tele-services and bearer
services, subscription Information, Service restrictions etc.
• The HLR manages the location updates as mobile phones roam. HLR
connects and interacts with a number of other components on the system like:
• VLR controls those mobiles roaming in its area and reduces number of
queries to HLR. Its database contains IMSI, TMSI, Location Area and
authentication key. If a roamer makes a call the VLR will have the
information needed for the call setup.
• EIR can also block phones that are malfunctioning and disturb the network.
The EIR feature is used to reduce the number of GSM mobile handset thefts
by providing a mechanism to assist network operators in preventing stolen or
disallowed handsets from accessing the network.
a) Black list – Mobile Stations (MS) on the Black list will be denied access to
the network.
b) White List – MS‟s on the White List will be allowed access to the network.
c) Gray List – MS‟s on the Gray List will be allowed on the network, but may be
tracked.
Authentication Centre (AUC):
• The AUC verifies the identity of the user and ensures the confidentiality of
each call. The AUC holds a secret key that is shared between the SIM and the
network.
• The key never leaves the SIM nor the AUC. Network nodes can request the
encryption key by answering a set of challenges sent by the AUC. A challenge
is then sent to the mobile station and if the response matches the subscriber is
authenticated.
Suppose that there is a call for the user (call goes to the home MSC) :
a) User in Home area: Home MSC delivers the call immediately.
b) User in Roaming: Home MSC contacts the VLR to determine the
appropriate switch in the roaming area to handle the arriving call and then
transfers the call to the roaming area MSC.
• Each IMSI contains a unique mobile country code (MCC), a mobile network
code(MNC), and a ciphering key (Kc) for authentication center (AuC) in the
GSM network subsystem.
• Equipment Identity Register (EIR) contains a list of all valid mobiles.
Authentication Center (AuC) stores the secret keys of all SIM cards.
SIM Card
• Under the GSM framework, a mobile device is referred to as a Mobile
Station and is partitioned into two distinct components: the Universal
Integrated Circuit Card (UICC) and the Mobile Equipment (ME).
• The ME and the radio handset portion cannot fully function without a UICC.
The UICC‟s main purpose entails authenticating the user of the mobile
device to the network providing access to subscribed services.
• The UICC also offers storage for personal information, such as phonebook
entries, text messages; last numbers dialed (LND) and service-related
information.
• This allows user to retain his or her information even after switching off the
handset. Alternatively, the user can also change service providers while
retaining the handset simply by changing the SIM. SIM card securely stores
the service subscriber key having 15 digit.
BSS interface
• Um interface : Mobile station and base station subsystem communicates
across Um interface, also known as air interface or radio link.
• Abis interface : Base transceiver station (BTS) and base station controller
(BSC) communicates across Abis interface.
• A interface : Base station subsystem communicates with mobile service
switching center across A interface.
GSM Channels
• Physical channel corresponds to a time slot on a frequency carrier. There are
8 physical channels per carrier in GSM. Physical channel can be used to
transmit speech, data or signaling information.
• The channel from the base station to the mobile unit is known as the
downlink or forward channel. The channel from the mobile unit to the base
station is known as the uplink or reverse channel.
Digital cell phone components
• Cell phone is composed of two components: Radio Frequency (RF) and
baseband. RF is the mode of communication for wireless technologies of all
kinds including cordless phones, Radar, ham radio, GPS, radio and television
broadcast. RF waves are electromagnetic waves which propagate at the speed
of light.
• Since NAND Flash Memory cells can be re-used for only a limited amount
of time before they become unreliable, wear leveling algorithms are used to
increase the lifespan of flash memory storage, by arranging data so that
erasures and rewrites are distributed evenly.
• Each cell contains at least one radio tower. Each cell is also assigned number of
frequency channels that correspond to radio base stations. Other cells can use
the same frequencies as long as they are not adjacent.
Flash memory and ROM chips of the mobile phone act as storage location
for the phone. The power and radio frequency section of the phone, phone
recharging and power management are controlled by this chip.
SIM card (Subscriber Identification module (SIM)) is a type of Smart Card
used in mobile phone. The SIM is a detachable smart card containing the
user's subscription information and phone book.
• Mobile phones have special code associated with them. These include:
Electronic serial number (ESN): It is a unique 32 bit number programmed
in the phone. ESN is a permanent part of the phone while MIN and SIC
codes are programmed in the phone when your service plan is selected and
activated.
Mobile identification number (MIN): It is 10 digit number derived from
the phone's number.
System Identification Code (SID): It is unique 5 digit number that is
assigned to each carrier by the FCC (Federal Communication Commission).
• SMS also guarantees delivery of the short message by the network. Temporary
failures are identified, and the short message is stored in the network until the
destination becomes available.
• SMS messages are transported in the core network. The SMSC can send SMS
messages to the end device using a maximum payload of 140 octets. This
defines the upper bound of an SMS message to be 160 characters using 7 bit
encoding.
• Send or Receive during voice or data calls: SMS messaging makes use of a
separate channel, normally used for transfer of control messaging to transfer its
packets.
• Being out of band, this means voice and data calls will not be interrupted by
SMS transfer. Furthermore, the low bandwidth requirements of transmitting
short alphanumeric strings allow messaging worldwide with very low
latency. This of course depends upon network operator agreements.
• The SMSC relays SMS messages from a Mobile Equipment (ME) to another
ME. The SMS is sent to the nearest call master, forwarded to the SMSC. The
SMSC stores the SMS and then attempts to deliver it to the destination ME.
• External messaging entities such as web and email are inputs to the networks.
These feed directly into the SMSC. This example has the SMSC connected to
two separate base stations. Two signal transfer points link the SMSC to the
mobile switching center.
• The HLR is accessed through the signal transfer point and the VLR feeds
directly into the MSC. Finally the MSC transmits to the base station. The base
station then provides the wireless link to all mobile stations, mobile phones.
Step 1: The mobile station is powered on and registered with the network.
Step 3: The MSC interrogates the VLR to verify that the message transfer does
not violate the supplementary services invoked or the restrictions imposed.
Step 4: The MSC sends the short message to the SMSC using the forward short
message operation.
Step 6: The short message is submitted from the ESME (External Short
Message Entity) to the SMSC.
Step 7: After completing its internal processing, the SMSC interrogates the
HLR.
Step 8: The SMSC sends the short message to the MSC using forward short
message operation.
Step 9: The MSC retrieves the subscriber information from the VLR. This
operation may include an authentication procedure.
Step 10: The MSC transfers the short message to the mobile station.
Step 11: The MSC returns to the SMSC the outcome of the forward short
message operation.
Step 12: If requested by the ESME, the SMSC returns a status report indicating
delivery of the short message.
Step 13: The SMSC acknowledges to the MSC the successful outcome of the
forward short message operation.
VOICE CALLS:
• Cell Phones are used to - Store contact information, Make task or to-do lists,
Send or receive e-mail, Get information (news, entertainment, stock quotes)
from the Internet, Play games, Watch TV, Send text messages, Take photos
and videos etc.
• Cell phones have low-power transmitters in them. Many cell phones have two
signal strengths: 0.6 watts and 3 watts. The base station is also transmitting at low
power. Low-power transmitters have two advantages:
• The cellular approach requires a large number of base stations in a city of any
size. A typical large city can have hundreds of towers. But because so many
people are using cell phones, costs remain low per user.
• Each carrier in each city also runs one central office called the Mobile Telephone
Switching Office (MTSO). This office handles all of the phone connections to
the normal land-based phone system and controls all of the base stations in the
region.
Cell-phone Codes
• All cell phones have special codes associated with them. These codes are
used to identify the phone, the phone's owner and the service provider.
• When the phone is switched on, it listens for an SID (System Identification
Code) on the control channel. The control channel is a special frequency that
the phone and base station use to negotiate about call set-up and channel
changing. If the phone cannot find any control channels to listen to, it knows it
is out of range and displays a "no service" message.
• When it receives the SID, the phone compares it to the SID programmed into
the phone. If the SIDs match, the phone knows that the cell it is
communicating with is part of its home system.
• Along with the SID, the phone also transmits a registration request, and the
MTSO keeps track of the phone's location in a database -- this way, the MTSO
knows which cell you are in when it wants to ring your phone.
• The MTSO gets the call, and tries to find you. It looks in its database to see
which cell you are in. The MTSO picks a frequency pair that your phone will
use in that cell to take the call.
• The MTSO communicates with your phone over the control channel to tell it
which frequencies to use, and once your phone and the tower switch on those
frequencies, the call is connected.
• As you move toward the edge of your cell, your cell's base station notes that
your signal strength is diminishing. Meanwhile, the base station in the cell
you are moving toward (which is listening and measuring signal strength on
all frequencies, not just its own one-seventh) sees your phone's signal
strength increasing.
• The two base stations coordinate with each other through the MTSO, and at
some point, your phone gets a signal on a control channel telling it to change
frequencies. This handoff switches your phone to the new cell.
• If the SID on the control channel does not match the SID programmed into
your phone, then the phone knows it is roaming. The MTSO of the cell that
you are roaming in contacts the MTSO of your home system, which then
checks its database to confirm that the SID of the phone you are using is
valid. Your home system verifies your phone to the new MTSO, which then
tracks your phone as you move through its cells.
Difference between CDMA and GSM:
1. Explain the various multiple access techniques in detail.
2. Compare the various multiple access techniques.
3. Explain in detail about channel sharing, channel borrowing and
Hand-off.
4. Explain the various generations of cellular mobile system.
5. Explain the various components of a cellular mobile system.
6. Explain in detail about GSM architecture.
7. Explain the components of digital cell phone.
8. Explain the SMS operation of cellular phones.
9. Explain the voice call operations of cellular phone.