Você está na página 1de 3

IT351 - Mobile & Wireless Computing

Tutorial_5
1. Where and when can collisions occur while accessing the GSM system?
2. What is the temporary mobile subscriber identity (TMSI)? Who assigns it to a
user? Why?
3. What is the main role of GMSC in GSM network
4. Give reasons for a handover in GSM and the problems associated with it.
5. What are the functions of authentication and encryption in GSM? How is
system security maintained?
6. In GSM, each 200 KHz channel is subdivided into frames that are repeated
continuously. The duration of the frame is 4.615 ms that is further divided into
8 time slots. In each time slot a user can send 156.25 bit. What is the data-rate
for each user?
7. In GSM, TCH channel offers only 9.6 Kbits/sec for the user. Based on
calculations in problem 1, GSM can provide a much higher data rate (33.8
Kbit/s). Explain what lowers the data rate available to the user.
8. How can higher data rates be achieved in standard GSM ?
9. If five time slots allocated for a user, what will be the theoretical and actual
data-rate available to the user?
Homework
Explain all the steps required to locate a user roaming in different country so that he
can receive a call (MTC call) using his original GSM MSISDN telephone number
(you can use a graph + explanation)

Answers
1) Besides problems due to interference, collisions in GSM systems can only
occur during connection setup. Terminals have to access the base station using
a slotted Aloha scheme for the layer 2 signalling connection. During this
connection attempt several terminals may collide and have to repeat the
connection attempt. During data transmission or voice call no collision can
occur.
2) TMSI is a four byte number selected by the current VLR and is only valid
temporarily within the location area of the VLR. It is used for security to hide
the IMSI which would give away the exact identity of the user.
3) The GMSC main role is to act as a gateway between the GSM network and
other networks (e.g. PSTN, Internet,...). All the traffic come from outside the
GSM network pass by it and it is responsible to route the traffic to the correct
destination. Similarly, all traffic leaving the GSM networks pass by it.
4) The typical reason for a handover is a weaker signal from the current base
station compared with a neighbouring base station. Another reason could be
the current load situation: the network could decide to offload some users from
a crowded cell.
5) The first step is the authentication of the user against the SIM. This is done
using a simple PIN. Then, the SIM authenticates itself against the GSM
system. This second authentication is much stronger compared to the PIN.
This is because the operator is not really interested in who is using the system
as long as it is a valid and paying customer. Authentication with the system
uses a challenge response scheme with a shared secret on the SIM and in the
AuC. Neither the SIM nor the AuC will transmit this secret over the air or
reveal it to customers. Encryption only takes places between the MS and the
BSS. GSM does not provide strong encryption end-to-end or MS to the
gateway into the fixed network. System designers decided for over-the-air
encryption only as they thought that the system itself is trustworthy. Thus,
authentication of base stations against MSs was neglected, too. This opened
ways to fake base stations.

6) In each 4.615 ms the user sends 156.25 bit


In 1 sec the user send 156.25/(4.615*10-3) = 33.85Kbit
Data-rate for each user = 33.85Kbit/sec
7) The user sends his data + the forward error correction (FEC) to mitigate
transmission errors. Furthermore, bandwidth is needed for signalling, guard
spaces.

8) The classical data rate of GSM is 9.6 kbit/s. Using less forward error
correction (FEC) 14.4 kbit/s are available, too. These data rates are achievable
using a single time-slot per frame in a certain channel.
9) Theoretical data rate = 33.85 *5 = 169.2 Kbit/s
Actual data-rate = 9.6 *5 = 48 Kbit/s

Você também pode gostar