Friday, April 5, 2019

GSM Implementation

GSM executionGSM Implementation in mixed places Transaction terminals SMS messaging can be use by machines like the EDC, POS terminals to accommodate transaction from the main server.Supply Chain Management The GSM M2M technology can be used to dol the needs of SCMs huge IT infrastructures with leased lines, selective information centre, work localises.Multiple Remote Data Collection Points With the help of the GSM modem attached to PCs, GSM electronic terminals PCs one can send and receive information from altogether oer the world. This help thickening to receive data from branch offices, business associates, wargonhouses, and vigorous straits.Large Transaction Volumes GSM SMS messaging is capable of handling large number of transaction data in a very small period of magazine as it can receive large number of messages on your server without internet connectivity. With the help of GSM at a judgment of conviction the shopkeeper can handle hundreds of transaction.High Upti me GSM officious ne dickensrk stool lavishly uptime as comp ard to opposite communication ne devilrks so it helps business. It can be used in communication industries as it doesnt require all kind of wires for setting up the network so there is no vexation of cutting of wires.Implementation of GSM Technology there atomic number 18 three main parts of the GSM meshwork* Mobile Station (MS)-The subscriber carries out this part.* Base Station Subsystem (BSS) - It controls radio set link with mobile station.* Network and displacement Subsystem (NSS)- This part keeps track of the call switching between two mobiles and to a fault looks over Memory direction and also between fixed network users and mobile.Network structureAll of the elements when combined together take on many GSM usefulness such(prenominal) as voice calls and SMS.Mobile Station Consists of* Mobile Equipment (ME)- These consist of equipment such as hand portable and vehicle mounted unit* Subscriber Identity M odule (SIM)- It is a chip size object which contains the information about the user like its identification, secret describes.The BSSIn the to a higher place plot the Base Station Subsystem (BSS) is shown containing the Base Station Controller (BSC) and the Base Transceiver Station (BTS) which are attached together on to A-bis port. The Packet Control Unit (PCU) is also shown connected to the BTS although the exact position of this depends on the vendors architecture. The Air Interface or Um is used to connect the mobile to the BSS which is connected by the A interface to the NSS.The NSSThe Network and Switching Subsystem(NSS)comprises of the disseminated multiple sclerosis connected via the SS7 network to the HLR. The AUC and EIR, although function differently from the HLR are shown together as combining them is a standard in all Vendors networks. The NSS is connected by the A interface to the BSS. It is straight off connected to the PSTN from the MSC. in that location is a lso a connection to the Packet Core (called the Gs) although this is optional and non continuously implemented.The GPRS Core NetworkThe GPRS Core Network shown here consists of SGSN which is connected to the BSS by the Gb interface and the GGSN. These two devices are connected together to a private IP network called the GPRS backbone shown as the Gn author Point.http//www.pulsewan.com/data101/gsm_basics.htmhttp//sinarsuryakomindo.blogspot.com/2008/10/gsm-history.htmlhttp//foosms.com/gsm.htmMODULATION TECHNIQUEModulation is the technique of embedment of a house into the carrier frequency (wave). There may be analog (includes FM, AM) or digital modulation. In digital modulation Binary set 0 and 1 is embedded in the carrier frequency by changing its frequency, amplitude or phase. In this way digital modulation may be ASK (Amplitude shift keying), FSK (Frequency shift keying) or PSK (Phase shift keying).In GSM, GMSK (Gaussian stripped shift keying, also known as Gaussian slobbere d Minimum Shift Keying) Modulation technique is used which is a type of FSK that continuously uses Phase modulation.Advantages of GMSK over otherwise techniques-* Being able to carry digital modulation and efficiently using spectrum.* Sidebands do non belong outwards from main carrier like other phase shift keying and and then, it avoids interference.* No discontinuities as remove in frequency occur at carrier zero crossing points.* Being continuous frequency shift keying modulation scheme.It uses the frequency hopping technique, which involves switching the call frequency many times per second for pledge.GMSK fundamentalsThe unique detailor of MSK (Maximum Shift Keying) is that frequency difference between the logical 1 and 0 states ever more(prenominal) represents to half of data rate, expressed in modulation index terms and always world equal to 0.5.MSK modulationSignal using MSK modulationSidebands extend can be easily traced in the while drawn for the spectrum of an MSK orient. Therefore before applying it to the carrier modulating signal is passed through a low pass riddle (Gaussian filter). Before filtering it must have narrow bandwidth, sharp cut-off and impulse response should have no overshoot. in conclusion MSK signal gets converted to GMSK modulation.Spectral density of MSK and GMSK signalsSpectral density of MSK and GMSK signalsGeneration of MSK ModulationThere are mainly two ways of to generate MSK modulation.Description of First way- The filtering of Modulating signal is done using Gaussian filter and then it is applied to frequency Modulator to set modulation index to 0.5. It is the simplest way. Its limitation lies in the fact that Modulation index must exactly equal to 0.5, which is practically not suitable as drifts are experienced by the components (which is not possible to be set exactly).Generating GMSK using a Gaussian filter and VCOGenerating GMSK using Gaussian filter VCODescription of second way- Quadrature Modulator ( or I-Q Modulator) is one of the ways. Here the phase of a signal lies in quadrature or 90 degrees to other one. It uses one signal, known as to be in-phase and another organism quadrature to the first one. Use of Modulator of this type the Modulator index is exactly maintained to 0.5 without any further setting. Thus it is lots easier to use and also it provides the required level of performance.Block diagram of I-Q modulator used to create GMSKBlock diagram of I-Q modulator used to create GMSKFor Demodulation the above techniques can be used in reverse.BASIC IMPLEMENTATION REQUIREMENTScomputer sturdyware AND SOFTWARE REQUIREMENTS-The three systems of GSM are* Switching system (SS)* Base station system (BSS)* Operation and bridge over system (OSS)The Switching System- It is responsible for all call dishing and other functions with following described units.GSM Network ElementsHome Location Register (HLR)-It is the most(prenominal) important database of an operator storing every important details of subscribe customer. Whenever a customer buys a modern connection his registration is made in HLR.Mobile work switching centre (MSC)-It performs telephone set switching functions of system including controlling calls to and from other telephone and data systems.visitant Location registers (VLR)-When a cubicle phone roams into a new MSC area, VLR connected to that MSC orisons for data about mobile station from HLR. Later VLR will not need to interrogate HLR whenever customer makes any call. Authentication centre (AUC)-It verifies each callers identity and ensures confidentiality of each call.Equipment Identity Register (EIR)-This database stores information of Mobile devices thus preventing calla from unauthorised or stolen ones.Base Station System- It consists ofBase Station Controllers (BSC)-It is the switch serving as physical links between MSC and BTS also providing functions like handover, cell configuration data, and control of communicate frequency (R F) power levels in BTS.Base Transceiver Stations (BTS)-It is the radio equipment which serves each cell in Network. A group of BTS are controlled by BSC.GSM Telecommunication TowerOperation and Support System (OMC)-This entity (connected to all equipment in switching System and to BSC) helps the operator to govern the whole system and cite customer cost-effective nutrition and maintenance activities need for GSM network.Additional Elements-Message centre (MXE)-It Handles SMS, voice mail, fax mail, email, and cell broadcast.Mobile divine serve up Node (MSN)-It governs Mobile intelligent network (IN) services.Gateway Mobile functions Switching Centre (GMSC)-It interconnects two networks. MSC then known as GMSC.GSM Interworking Unit (GIWU)-It consists of Hardwires and Software twain and acts as an interface to various network for data communication.Problems in Implementation of Technology- Implementation of GSM technology requires a number of equipment. umpteen equipment need to be installed like tall towers. These towers are fixed at proper area in line of sight. Also satellites functionality also requires attention. Installation of Several equipment and devices require huge amount of money. Thus GSM architecture is very costly. Maintenance of equipment used in GSM is practically not affordable time and again. There are several protocols applied in GSM Technology, resulting problem in implementation. There is possibility of breaking into GSM networks that use engrave text-only cryptanalysis encrypted communication. These attacks are based on security measure flaws of the GSM protocols, and work whenever the mobile phone supports A5/2. The available radio frequencies need to be re-used closer together and continuously within the network so that spectral capacity can be unlimited. There is huge consumption of power in GSM implementation, which is not convenient. GSM is also not secure as the sent signal or message is not so much hard to be decoded. So th e third party may avail of it somehow using some technology. approximately THE TECHNOLOGYGSM (Global System for Mobile communications originally from Groupe Special Mobile) is the most widely used digital cellular technology for transmitting mobile voice and data services in the world.It uses SIM (SubscriberIdentityModule) cards, which acts as digital identity, and is tied to the cellular network by searching for cells towards the towers (bts) in the nearby location.GSM is a second-generation (2G) cell phone system used by over 3 billion people across more than 212 countries and territories. In over twenty years of development, GSM has been continuously upgraded to provide better signal, speech quality and thus fulfil the mass demands. It also facilitates to roam, switch carriers and the operators without replacement of handsets.01-01-10The GSM technology originally originated by the European Conference of postal and Telecommunications Administrations (CEPT) in 1982 when it firstl y created Group Special Mobile (GSM) for the end of designing a pan-European mobile technology. European Telecommunications Standardization Institute (ETSI) later in 1991 adopted the GSM standard. GSM technology was firstly commercially lunched in 1991 in Finland, although it has been for testing purposes since 1980.01-01-5Newer versions of the standard are much compatible with the original GSM system. For example,Release 97,the General Packet Radio Service (GPRS) added the packet data capabilities to GSM technology. Release 99 introduced higher speed data transmission usingEnhanced Data rate for GSM Evolution(EDGE).It uses variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). Data is digitized and compressed and, sent down a channel with two other streams of user data, each in its own time slot. Most 2G GSM networks operates in the 900MHz or 1800MHz bands. It operates on quaternion different frequencies worldwide. GSM calls are either based on data or voice. Voice calls use audio codecs called half-rate, full-rate and enhanced full-rate. Data calls can turn the cell phone into a modem operating at 9600 bps having ability to carry 64 kbps to 120 Mbps of data rates.GSM technology even keeps people in theme song while roaming also as it home operators are having roaming collaboration with foreign operators.IMPORTANCE OF TECHNOLOGYGSM is the most commonplace, reliable and the fast growing wireless technology for mobile phones in the world. It has approximately covered the 89% share merchandise of the globular mobile telecom in more than 219 countries and territories with more than 3.8 billion people as per May 2009 study. Its signalling and speech channels being digital differs it from its and so pronounced as a second generation (2G) mobile phone system. This has also meant that data communication was easy to build into the system.It also provides the integ rated high-speed data, fax, paging, voice mail and short messages services (SMS) capabilities and thus offering communication to be secure, private and fraud prevented. some operators provide access to ISDN services to transmit data fast. Several offer GPRS eagerness to connect to high speed data communication channel (9600 bps).Global GSM GrowthGSM commercialize place share has grown at exponent rate over recent years. However the target to carry through 1 billion customers took 12 years (Feb 2004) but later it was a surprising fact that it get across the 2 billion mark only in another 2.5 years (By June 2006) and 3 billion GSM customers in another less than 2 years. Now the Telecoms and Media hope to surpass 5 billion targets by 2013.GSM is the legacy network of the evolution to the third generation (3G) technologies Universal Mobile Telecommunication System, (UMTS) also known as WCDMA, and High Speed Packet Access (HSPA).Maximum Mobile phones manufacturer develop their prod ucts based on GSM technology and all mobile companies provide their customers GSM networks.The Social Impact of Mobile TelephonyMobile telephony is undoubted one of the most superb developments telecommunications industry. The number of subscribers is rapidly increasing in tremendous way. More and more people are being connected to the telecom.GSM technology has greatly affected the social life. The various operators have been proving a number of offers to fascinate their customers. Due to aspects like reliability, security, voice and data transmission facilities GSM is much popular among the users. People are shifting to wireless communication from their fixed phones.Rapid increase in GSM marketPopularity Reasons of GSM Technology* Improved spectrum efficiency.* High speech quality.* International roaming.* Better signal quality.* stretch out voice, data and fax.* Offer secure communication and privacy.* Low-cost mobile sets and base stations (BSs).* Flexibility SIM. * High share market capture.* Low terminal and service cost.* ISDN compatibility.* Compatibility with Integrated Services Digital Network (ISDN) for data transmission.* Support for new services like VAS.Backbone for 3G and other evaluating technologiesGSM customer growth in IndiaHealth IssuesIt is the recent report card that use of GSM mobile technology poses Health Hazards. Its regular and continuous use for hours may create heath problems like irritations, allergies, headache, ears pain etc.It is fact proved by scientists that radio waves of frequencies that it utilises can create electrical fieldsin human cells and brain. Long term exposure may have adverse health effects too.Many question institutions controlled by government and independent bodies are continuously studying over it. Also research results are being revived by ICNIRP (International Commission on Non-Ionizing Radiation Protection) and the WHO (World Health Organisation) at global level.Use of cellular phone is highly restri cted to be turned off while in flight as the radio frequencies may interfere. The like case happens at hospitals as the radio signal may create interference with electronic medical devices at short rang or cause restlessness among patients.While driving use of cell phone is advised to avoid and in petrol pumps as the radio waves used in GSM technology may cause interference.d GSM credential-1. PURPOSE OF USING GSM SECURITY- As we know that security is the essential feature in any service. Hence, GSM network also follows sealed level of security in the services which it provides. Hence, there are mainly two security purposes which are kept in mind when it is concerned of the GSM network-First of all, to protect the Accessibility to the mobile services and secondly to prevent disclosure of any crucial information/data at the radio roadway to achieve the privacy regarding that particular data.2. THE SECURITY FEATURES OF THE GSM SERVICES- There are several features of the GSM servi ce for the security of its customers. Some features are stated below 1. Authentication is being provided to the registered customers only.2. The process of encryption is being used for secure data transfer.3. The identity of customer is being verified.4. The cellular phones are useless without a SIM card.5. A secret key Ki is being used to achieve authentication.3. Representation of the GSM Security- GSM security is equal in two ways-a. Authenticationb. EncryptionA. Authentication The process of authentication is being categorise in to various stages which are stated below-1. First of all an IMSI (International mobile subscriber Identity) is being send to the network by the mobile station.2. After that the IMSI is being received by the network and the KI corresponding to that IMSI is found.3. A 128 second gear random number (RAND) gets generated by the corresponding network and is send to the mobile station through the medium of air.4. Through the use of the algorithmic rule A3, the network (AuC) and the MS (SIM) use KI and RAND to produce a signed result (SRES).5. The SRES is being sent to the network by the MS.6. For the validity purpose network performs the testing on the received SRES.B. Encryption The process of encryption gets started by ciphering mode request (i.e. secretly executed request) command from the GSM network. After receiving the request the process of encryption and decryption of data gets performed by the mobile station. Different key stream is involved in the encryption of each frame over the air traffic. Different key stream is generated for each frame as the A5algorithm which is used to encrypt the data is initialised with the KC and the number of the frame to be executed resulting in the generation of different key stream.The same KC gets executed as long as it does not get verified by the MSC (Mobile services switching Centre) through the MS(mobile station) which results in the generation of the new KC. The Authentication of MS is an optional process and is usually not performed in the beginning of a call. Hence it is assured that the KC will not get changed during a particular call. As it gets switched off IMSI (International mobile subscriber identity) gets stored by the mobile station on the SIM card to assure that is gets available when it is switched on again. In the hardware of the mobile phone the A5 algorithm gets executed as data is being encrypted and decrypted through the air.4. The Algorithm used in the GSM Security There are three algorithms which are used in the GSM security-1 A3 The MS Authentication Algorithm- In the GSM model, A3 acts as the authentication algorithm. This algorithm generates a 32 bit output as it gets the RAND (128 bit random number) from the MSC (Mobile service switching Centre) and the secret key KI as input from the SIM. The size of KI and RAND is of 128 bits. The A3 algorithm is represented as a one-way hash function. This function produces an output which is of fixed dur ation as a random input is given to it. A COMP 128 algorithm is used for the A3 algorithm by every GSM operator in the world. This algorithm acts as the reference algorithm for the various tasks which has been pointed out by the GSM association.2 A8, The ciphering Key Generation Algorithm In the GSM network, A8 algorithm acts the session key algorithm. The A8 algorithm generates 64 bit output by taking two 128 bit input. The output generated is 64 bit session key KC. COMP128 acts the reference algorithm for the A8 algorithm also as it is there in the A3 algorithm. At one run, COMP128 generates both the session key KC as well as the SRES response.3 A5, the stream-ciphering algorithm In this algorithm encryption of data over the air occurs. For secure data, there are three possibilities in the case of GSM it includes the A5/0, A5/1 and the A5/2 algorithm. This algorithm came into existence because the GSM standard was designed for Europe and as per the export regulations it did not d eed over the implementation of the technology outside Europe.f Advantage of GSM Services- Following are the Advantage of GSM service -1First of all the GSM network is fully developed which means that it contains stability with proper features and services. Hence it has over 450 million subscribers worldwide.2 The other advantage of GSM network is that it contains better voice quality and low- cost alternatives to make calls, such as little(a) message service (SMS) . In the case of GSM network the quality of voice is fine inside the buildings. 3) another(prenominal) advantage of this service is that the equipments are easily available from the vendors who execute the following service. 4 GSM services provide the roaming facility to its customers so that they can use the service anywhere in the world. 5) GSM networks provide higher talk time due to its pulse nature of transmission and its ability to use routers. 6) GSM provides the facility of International Roaming which is highly s erious in context to its customers. 7 The presence of Smart Cards which acts as subscriber Identity Modules through which encryption of data occurs in a secure manner which is highly advantageous with respect to commercial background.8 in conclusion the common advantage of the GSM service is that it provides the user the freedom to choose a mobile set of his/her preference and the SIM card is also being selected by user of their choice. They also have the option of making the changes to both the equipments accordingly.Disadvantage of GSM Services- The GSM service has following Disadvantages-1 The first disadvantage is that the algorithms which are being used in this service for the security purpose is not available to the public.2 In the GSM service only Access security is being provided and the different communications occurs only in a fixed network.3 The major disadvantage of the GSM service is that it lacks the access to the American market.4 For the usage of this service, the user needs the requirement of higher power and the coordination between cell to cell.5 The network coverage of this technology is not better in the rural areas as compared to its competitor service of the CDMA technology.Reference http//sawaal.ibibo.com/computers-and-technology/what-advantages-gsm-technology-3g-technology-245344.htmlhttp//www.connectindia.in/posts/list/gsm-what-are-the-advantages-of-gsm-technology-how-it-works-910021.htmhttp//www.edaboard.com/ftopic200835.htmlhttp//in.answers.yahoo.com/question/index?qid=20070202053500AA6OrQthttp//www.gsm-security.net/papers/securityingsm.pdf http//cryptome.org/jya/gsm061088.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.