ANALYSIS OF CELLULAR DATA COMMUNICATION FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID PROJECT

Size: px
Start display at page:

Download "ANALYSIS OF CELLULAR DATA COMMUNICATION FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID PROJECT"

Transcription

1 ANALYSIS OF CELLULAR DATA COMMUNICATION FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID Harish Maiya B.E., Visveswaraiah Technological University, Karnataka, India, 2006 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in COMPUTER ENGINEERING at CALIFORNIA STATE UNIVERSITY, SACRAMENTO SPRING 2011

2 ANALYSIS OF CELLULAR DATA COMMUNICATION FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID A Project by Harish Maiya Approved by:, Committee Chair Isaac Ghansah, Ph.D., Second Reader Fethi Belkhouche, Ph.D. Date ii

3 Student: Harish Maiya I certify that this student has met the requirements for format contained in the University format manual, and that this project is suitable for shelving in the Library and credit is to be awarded for the Project., Graduate Coordinator Suresh Vadhva, Ph.D. Date Department of Computer Engineering iii

4 Abstract of ANALYSIS OF CELLULAR DATA COMMUNICATION FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID by Harish Maiya Infrastructure of Smart Grid system relies on communication between electricity producer and consumer domain. Consumer domain consists of Neighborhood Area Network which connects smart meters installed at homes or businesses of consumers, Home Area Network which connects all appliances at home to Utility AMI Network (on producer side). Few candidates or protocols considered for implementing Neighborhood Area Network (NAN) are Cellular communication, IEEE , , , Optical fiber network, Power line network. Project aims to provide an analysis on Cellular data communication protocol considering its different standards, implementation details, advantages, disadvantages, security issues, reliability, time critical communication, maintenance, power, and cost factors. Studies are conducted on standards in Cellular communication such as CDMA, GSM, (2G) UMTS, WCDMA (3G) and 4G protocols and gauge factors of bandwidth, coverage, and resource usage and identify effective and efficient way to implement NAN. Analysis on Short Message Service (SMS) which is preferred mode for communication in NAN is carried iv

5 out. Project intends to identify potential issues which affect the confidentiality, integrity, and availability of information flow through cellular communication channel when it is implemented in the Smart Grid. Investigations are carried out on application of information security best practice(s) to NAN in Smart grid and to what extent they are applied. Comparisons are done on different candidate protocols for NAN and make few recommendations, identify few research areas and open issues if any., Committee Chair Isaac Ghansah Ph.D. Date v

6 DEDICATION To my parents, teachers and friends vi

7 ACKNOWLEDGEMENT I am grateful to all the people who have helped and guided me in successful completion of my Masters Project. My sincere thanks to the project supervisor Dr. Isaac Ghansah, for providing me the opportunity to work on Smart Grid and guiding me throughout the project. My heartfelt thanks to Dr. Kwai-Ting Lan for being second reader and providing me with invaluable inputs on revising my report. I am thankful to Dr. Suresh Vadhva for his invaluable support throughout my graduate program. Special thanks to my friends Arti Arora and Adithya Shreyas for helping me with their ideas and by reviewing my project report. I would like to thank my seniors and all my friends who have been there for me throughout this graduate program. I would take this opportunity to acknowledge and appreciate the efforts of California State University, Sacramento for providing the facilities and environment conducive for students to nurture their career. Most importantly I would like to thank my parents Suryanarayana, Radha, my sister Sowmya, and bro-in-law Vinay for their true love and moral support. vii

8 TABLE OF CONTENTS Page Dedication... vi Acknowledgement... vii List of Tables... x List of Figures xi Chapter 1. INTRODUCTION Traditional Grid Need for Smart Grid Smart Grid Neighborhood Area Network Scope of the Project REQUIREMENTS FOR NEIGHBORHOOD AREA NETWORK CELLULAR COMMUNICATION Features and Standards Candidates for Implementing NAN Global System for Mobile Communications (GSM) GSM Core Network CDMA One or IS G Systems and UMTS (Universal Mobile Telecommunications System) W-CDMA G-LTE Advanced SHORT MESSAGE SERVICE (SMS) IN CELLULAR COMMUNICATION Implementation Details Vulnerability and Example Attacks Counter Measures, Solutions GENERATION IN CELLULAR WIRELESS STANDARDS viii

9 5.1 1G,2G,3G,4G Overview of Standards Evaluation of Parameters of Cellular Standards Security Issues and Mechanisms in Cellular Standards Wireless Application Protocol (WAP) COMPARISON OF CANDIDATE NETWORK PROTOCOLS FOR NAN Introduction IEEE IEEE IEEE Power Line Communication Optical Fiber Communication Wireless Mesh Networks Cellular Network Over Other Candidates CONCLUSION Project Results Challenges and Outstanding Works Future Works and Potential Research Topics Appendix Glossary References ix

10 LIST OF TABLES Page Table 1: Network Types, Coverage and Bandwidth Table 2: IEEE Standards and its Variations Table 3: Summary of Technologies for NAN x

11 LIST OF FIGURES Page Figure 1: Traditional Grid... 2 Figure 2: Smart Grid... 5 Figure 3: Smart Grid... 7 Figure 4: Customer Domain: NAN, gateway and HAN Figure 5: Smart Grid Building Blocks Figure 6: Hierarchical Organization of Communication Networks Figure 7: Operation of Cells in Network. Frequency (F) reuses factor or pattern 1/ Figure 8: Structure of GSM network [9] Figure 9: GSM Core Network Architecture Figure 10: Authentication and Key agreement Figure 11: Radio Link Encryption Figure 12: Temporary ID management Figure 13: Structure of UMTS network Figure 14: High Level description of SMS delivery in an SS7 network Figure 15: Overview of SMS delivery on the wireless interface Figure 16: Signaling Data Integrity Mechanism Figure 17: Air Interface Confidentiality Mechanism Figure 18: KASUMI Block Cipher Figure 19: WAP1, WAP 2 Protocol Stack Figure 20: Generic Data Frame Figure 21: Frame Control field Figure 22: IP based WiMAX Network Architecture Figure 23: Wireless Mesh Network [28] xi

12 1 Chapter 1 INTRODUCTION 1.1.Traditional Grid The traditional power grid which was designed several decades ago has performed satisfactorily to cater electricity to the nation until only recent past. However, the system appears ill equipped on several fronts to meet the requirements of the present and future needs. Reliability factor of the grid has declined over last few years. A large number of outages have affected numerous consumers causing inconvenience and loss in revenue [3]. Modernization of the current electric grid is imperative to national efforts to increase energy efficiency, transition to renewable sources of energy, reduce greenhouse gas emissions and build a sustainable economy that ensures prosperity for current and future generations. The Figure 1 [2] shows the traditional power grid which has unidirectional flow of energy from the electricity generation and transmission units to the end user. The grid consists of the transmission system which includes power generation plants, step up transformers, high voltage power lines and substations. The distribution system consists of substations; step down transformers, pole-top transformers, and medium voltage power lines. The power plants generate electricity and step up the voltage for long distance transmissions using step-up transformers. Further, electricity is transmitted across the high power transmission lines over long distances to substations where the voltage is stepped down before transmitting over the medium

13 voltage power lines to the customer premises. The pole-top transformers further step down the voltage to suit the residential and commercial specifications. 2 Figure 1: Traditional Grid The existing power grid infrastructure is largely analog and electromechanical and it is built on producer controlled model where power flows in one direction. With significant advancements in computer systems, electronic devices, internet and communications there exists vast disparity between traditional grid infrastructure and these advanced technologies. Electricity supply for present generation relies on infrastructure which is aged out. Whether or not there is a need for the power supply to a region, or consumer, the utility supplies scheduled amount of power to regions under its coverage. This lack of

14 3 communication to inform the utilities, about the demand for power and the utilities to appropriately respond back to the consumer is the missing component in the current grid. As the demand for power is on increase, it is very important that there be an effective communication between the consumers and the utilities for power supply based on customer needs Need for Smart Grid Smart Grid is an infrastructure which intends to provide electricity supply to consumers based on their demand, there is two way communication between producer or utilities and consumers. Utilizing latest technical advancements in the areas of computer systems, internet, communication and electronics devices, Smart Grid envisages providing efficient, reliable and secure electricity supply to the consumers. Below are the benefits of implementing the Smart Grid. RELIABILITY Present electricity grid architecture lacks the outage management system which is directly affecting the reliability of the grid. The utilities are informed of the blackouts or outages, if and only if, a customer rings them up notifying an outage. These blackouts results in billions of dollar losses to household and businesses [3]. An intelligent grid, like Smart Grid with effective communications infrastructure detects an outage immediately and notifies a utility office about the outage; also they could be avoided

15 when power is redirected to the place where the outage is predicted. To achieve an improved reliability, a smarter grid is the need of the hour. 4 RENEWABLE ENERGY Use of renewable energy sources is gaining momentum at present days, reasons are to reduce the carbon emissions, dependency on oil and lower the cost of electricity over the longer run. Power from renewable energy sources like solar, wind, geothermal and tidal are low power and intermittent when compared to the traditional power generation. These intermittent sources need a distributed generation to harness the power and sell it to the utility offices close by. To handle both the distributed and intermittent power sources, we need a smarter grid. SECURITY One of the aspects of Security in the systems is Availability.The current centralized grid is vulnerable in the sense that in case of attacks there could be a significant outage and reconstruction of such huge electricity infrastructure in a short time would take too long time. In case of attacks, a significant area is affected with lack of power supply. Having the power generation distributed would help us reduce the devastating effect of terror attacks or any natural disasters. [5]

16 Smart Grid Figure 2[2] shows the infrastructure of Smart grid, we can see there is an integration of Information technology, communication and electronic devices with Power grid to deliver two way flow of information into the system. Figure 2: Smart Grid Smart Grid is an electricity infrastructure which consists of devices installed at homes and businesses throughout the electricity distribution grid for the purpose of energy monitoring; the system utilizes computer, networking and communications technologies all the way from the generation, transmission and distribution of electricity to consumer

17 6 appliances and equipments. This set up provides consumers the ability to monitor and control energy consumption comprehensively in real time across the smart communication network. The consumers that generate energy from sources such as: solar, wind or other systems, can also carry out business with the utilities by outsourcing the surplus energy that they generate. As seen in the Figure 3 [4], the sensors detect the variations and fluctuations in the electricity and send information signals to the demand management systems. At the demand management system, decision signals are generated, so as to increase or decrease the electricity generation and these signals are sent out to the processors. The processors, without any need for human intervention, would execute these instructions and take appropriate actions instantaneously.

18 7 Figure 3: Smart Grid Smart grid as an intelligent system is capable of sensing the system overload and rerouting power to prevent outages and give resolution to conditions faster than a user could respond. It is efficient as it meets the user s increasing demand without adding infrastructure. It is accommodating as the user can do business with the utilities by pumping energy back to the utilities with renewable sources like wind, solar and other sources. The consumer has the ease to choose the energy consumption profile and

19 8 customize it according to his/her preferences. For this reason along with the real-time communication between the customer and the utilities makes it motivating for use of Smart Grid. It is capable of delivering power, free of spikes, disturbances and interrupts which is the main requirement for the data centers and could be termed as quality-focused power supply infrastructure. Since, the Smart Grid s deployment would be made distributed and not centralized; it becomes secure and provides resistance to natural and terror attacks. All these features make Smart Grid intelligent, efficient, accommodating, motivating, opportunistic, quality-focused, and resilient and lastly green as the carbon emissions are lowered with increased efficiency. [5] 1.4. Neighborhood Area Network The efficiency of Smart Grid greatly depends on communication networks. Communication on the customer domain consists of Neighborhood Area Network which connects the utility to the smart meters installed in the homes of the consumers, the gateway and finally to Home Area Network which connects all the appliances at consumers home. In Smart Grid, NAN has a role to play in the HOME-to-HOME or HOME-to-GRID communication. Neighborhood Area Networks [NAN] are a type of packet switched mobile data networks whose geographical coverage area could be anywhere from the coverage of a LAN (Local Area Networks) which is about few meters, to MAN (Metropolitan Area Networks), to WAN (Wide Area Networks) which are up to several miles.

20 9 Communication in NAN can be broadly classified into two types: DATA COMMUNICATION The utility offices collect the electricity usage information from consumers on a timely basis to build a future demand statistics. Example: a smart device which is part of a room heater sending the usage or power consumption information every minute to the smart meter in kilo watt hour [kwh] units and the smart meters in turn send the information back to the utility office. CONTROL COMMUNICATION Real time signals to control the devices at the consumer or business premises are part of control communication. Example for this could be turning off the room heaters for a certain period of time, on request from the consumer during the peak hours when the price per unit usage is high. To explain this better, we consider an example of IEEE standard where the communication could between three main entities, reduced functional devices, fully functional devices and the utility offices. Reduced functional devices are those devices that carriers limited functionality to lower cost and complexity. Fully functional devices support all IEEE functions and features specified by the standard. Further, the data communication could be between the reduced functional devices [RFD] (smart devices installed in homes like heater, refrigerators, air conditioners etc.) and the fully

21 10 functional devices [FFD] (say smart meters), and, between the FFD s to the utility office. Similarly, the control communication would be from the utility office to the FFD s and from FFD s to the RFD s. The communication between the RFD s and the FFD s installed at home and business premises is part of Home Area Network [HAN] and the communication between the FFD s and the utility offices is part of Neighborhood Area Network. A set of FFD s (say smart meters from a group of houses) would communicate with a device on a pole and this device would in turn communicate with the utility offices over the neighborhood area network. And each such device on the pole is interconnected thereby forming a mesh like network constituting a neighborhood area network. Neighborhood Area Networks [NAN] are a type of packet switched mobile data networks. NANs are flexible packet switched networks whose geographical coverage area could be anywhere from the coverage of a LAN, to MAN, to WAN. The order of the day in networking is to provide complete ubiquity, i.e., every device location is connected to millions of locations and across ten thousands of square miles. The solution for complete ubiquity is wireless neighborhood area network [WNAN] [5].The ubiquitous network requirements for Smart Grid are identified as: reliable, secure, power efficient, low latency, low cost, diverse path, scalable technology, ability to support bursty, asynchronous upstream traffic to name a few.

22 11 In this report, we mainly focus on the communication sector of Smart Grid, where analysis of communication protocols for neighborhood area network of Smart Grid in particular is carried out. 1.5.Scope of the Project Aim of this project is to provide an insight on cellular communication protocol, which is leading candidate for implementing the neighborhood area network for Smart Grid. Study on various standards, modes of communication in particular SMS, security concerns, and different generations of protocols and finally comparisons with other candidate networks are carried out. Chapter 2 acquaints us on neighborhood area network, its requirements for Smart Grid and its significance in Smart Grid. Chapter 3 emphasizes various standards of cellular communication such as GSM, CDMA, UMTS, WCDMA, LTE advanced. Chapter 4 discusses Short Message Service (SMS) operations and its issues. Following this would be the discussion on different generation of Cellular wireless standard as part of Chapter 5. In Chapter 6 there is comparison and overview of other candidates for implementing neighborhood area network; Chapter 7 would identify such research areas in neighborhood area network as part of the customer domain for Smart Grid. Finally we arrive at conclusion of this project in Chapter 8.

23 12 Chapter 2 REQUIREMENTS FOR NEIGHBORHOOD AREA NETWORK Building blocks of Smart Grid include automated distribution and control system, power quality monitoring and substation automation, and a communication infrastructure which implements utilities interaction with devices on the customer domain and distributed power generation and storage facilities [7]. As in Figure 4[8] Customer domain consists of a Neighborhood Area network which connects the utility to the smart meter installed in the homes of the consumer, the gateway and then home area network which connects all the appliances at home.

24 13 Figure 4: Customer Domain: NAN, gateway and HAN Smart grid utilities should be capable to support multiple communication networks such as Home Area Network [HAN], Neighborhood Area Network [NAN] and Wide Area Network [WAN] for various applications like consumer energy efficiency, advanced metering and distribution automation [See Figure 5] [4].

25 14 Figure 5: Smart Grid Building Blocks Building blocks of Smart Grid is as shown in Figure 5[4], it comprises Power System Layer, Control Layer, Communications Layer, Security Layer, IT Infrastructure Layer and the Application Layer. The Communications Layer is further divided into three sub divisions. They are: Part of the customer domain is Home Area Network [HAN]; it involves the communication between the devices installed at the residential or commercial premises to their respective Smart Meters.

26 15 Neighborhood Area Network [NAN] is the communication network that bring the communications between the utilities and the Smart Meters installed at the customer stations. Wide Area Network [WAN] is the communication network responsible for the backhaul communications. The Smart Grid communication requirements at high level, is described below [9]: SECURE Privacy, Integrity and Confidentiality are the three main focus areas in communication across the network. Hence, an end-to-end security must be provided to protect user information and protect the network from unauthorized access. RELIABLE The network has to provide maximum availability by incorporating fault tolerance mechanisms and self-healing failover at each tier of the network. It must provide an always-on communication as part of the electric grid. FLEXIBLE The coverage has to be consistent over smaller rural regions to larger urban areas. The communication network has to have the flexibility to cover the same disparate territories as the grid itself.

27 16 SCALABLE The network needs to be scalable to meet the current and future requirements. It should be capable of supporting the changing requirements over time to accommodate the current simple meter reading to the future multi-application that span from demand-side management to distribution automation. Also, it should be upgradeable and interoperable to ensure future-proof solution. COST-EFFECTIVE The capital and operational expenses of a communication network needs to be within the potential savings. The typical characteristics of different communication network layers could be summarized as shown below in Table 1. Home Area Network Neighborhoo d Area Network Distribution/ Wide Area Network Scale of Coverage Bandwidth Required Example for Communication Technologies 1000 of Sq. Feet 1-10 Kbps ZigBee 1 10 Sq. Miles Kbps 900 MHz 1000s Sq. Miles 500 Kbps 10 Mbps 3G/802.11/WiMAX Core Mbps Fiber Table 1: Network Types, Coverage and Bandwidth

28 17 Representation of above table of information is shown in the Figure 6[4]. Figure 6: Hierarchical Organization of Communication Networks Scope of our discussion lies on the Neighborhood Area Network [NAN], which requires higher bandwidths ranging anywhere from 10 Kbps to 100Kbps to suffice the meter reading, demand response, remote disconnect and coverage area of 1-10 sq miles. Further focus is made on implementation on Neighborhood Area Network, choosing technology which meets all requirements of NAN and satisfying aspects of security, scalability, reliability and cost. Cellular data communication which is very successful in bringing voice, data communication to millions of consumers, businesses worldwide, being cost effective, reachable, scalable, there also happen to be more research, innovations and up gradations happening every year in the field of cellular communication. Cellular communication as implementation technology for Neighborhood Area Network in Smart grid is considered and evaluated for various parameters, issues.

29 18 Further chapters focus extensively on Cellular communication, its operation details, various standards involved, modes for communication, various generations of protocols, performance, security issues.

30 19 Chapter 3 CELLULAR COMMUNICATION 3.1 Features and Standards Introduction: Cellular network and technology has been highly successful in providing voice, data communication for millions of users worldwide. It is ubiquitous, convenient to use, easy to install and incurs low maintenance cost for its services. Cellular coverage is excellent because it directly corresponds to the population concentration and proportional to number of users of power and its distribution. Cellular communication is already established and has 95% coverage extended to consumers and hence no additional efforts for installations are required. Continuous advances and researches in cellular technology (2G, 3G, to recent 4G standards and bandwidths) and competitive pricing among carriers create an ideal environment for the implementing Neighborhood Area Network of Smart grid. Features: Cellular network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver known as a cell site or base station. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to communicate

31 20 with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission. As seen in Figure 9 [9] In a cellular radio system, a land area to be supplied with radio service is divided into regular shaped cells, which can be hexagonal, square, circular or some other irregular shapes, although hexagonal cells are conventional. Each of these cells is assigned multiple frequencies (f1 - f6) which have corresponding radio base stations. The group of frequencies can be reused in other cells, provided that the same frequencies are not reused in adjacent neighboring cells as that would cause co-channel interference. The increased capacity in a cellular network, compared with a network with a single transmitter, comes from the fact that the same radio frequency can be reused in a different area for a completely different transmission. If there is a single plain transmitter, only one transmission can be used on any given frequency. Unfortunately, there is inevitably some level of interference from the signal from the other cells which use the same frequency. This means that, in a standard FDMA system, there must be at least a one cell gap between cells which reuse the same frequency.

32 21 Figure 7: Operation of Cells in Network. Frequency (F) reuses factor or pattern 1/4 Cell signal encoding: To distinguish signals from several different transmitters, frequency division multiple access (FDMA) and code division multiple access (CDMA) are developed. With FDMA, the transmitting and receiving frequencies used in each cell are different from the frequencies used in each neighboring cell. In next sections we discuss about major Cellular communication standards such GSM, CDMA-One, from 2 nd Generation (2G) and UMTS, WCDMA from 3 rd Generation (3G).

33 Candidates for Implementing NAN Global System for Mobile Communications (GSM) GSM is the world's most popular standard for mobile telephone, in which both signaling and speech channels are digital, and falls under second generation (2G) mobile phone system. In GSM cellular network, mobile phones connect to base stations by searching for cells in the immediate vicinity. Cell horizontal radius varies depending on antenna height, antenna gain and propagation conditions from a couple of hundred meters to several tens of miles. GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks operating in the 850 MHz or MHz bands. (In Canada and United States). Carriers in US using GSM are AT&T and T-Mobile. Enhanced Data GSM Environment (EDGE) which is faster GSM service can deliver data rates up to 384kbps on a broadband. The GSM network as seen in Figure 10 [9] is structured into a number of discrete sections: The Base Station Subsystem (the base stations and their controllers).

34 23 Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network. The GPRS Core Network (optional part which allows packet based Internet connections). The Operations support system (OSS) for maintenance of the network. Figure 8: Structure of GSM network [9]

35 24 Subscriber Identity Module (SIM): One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking. When GSM is chosen to implement NAN systems in Smart Grid, SIM cards could be inserted in smart meters and devices which would transmit meter data from home to utilities offices, producer sites over the built-in wireless network. Carrier for a particular locality can be chosen based on signal coverage, cost and bandwidth of data transmitted. GSM service security: GSM was designed with a moderate level of service security. The system authenticates the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. GSM only authenticates the user to the network and not vice versa. The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM Security Features:

36 25 Secure access: Operator can authenticate user identity for billing and preventing fraudulent calls by masqueraders Control and data signal confidentiality: Protect voice, data, and control (e.g., dialed telephone numbers) from eavesdropping Anonymity: Protect attackers from using known info (e.g., IMSI) from tracking user's location or identifying user's calls SUBSCRIBER IDENTITY CONFIDENTIALITY: Temporary Mobile Subscriber Identity [TMSI] is used to ensure subscriber identity confidentiality. TMSI is a pseudo random number generated and issued by the Visitor Location Register [VLR] and TMSI is valid only in the area it was issued. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertextonly attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack. [10] The system supports multiple algorithms so operators may replace that cipher with a stronger one. In 2010, there was report stating, a group of cryptographers had developed an attack that broke Kasumi, the encryption algorithm used to secure traffic on 3G GSM wireless

37 networks. The technique enabled attackers to recover a full key by using a tactic known as a Related-key attack. [11] GSM Core Network GSM core network is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and allows mobile devices to communicate with each other and telephones in the wider Public Switched Telephone Network or (PSTN). The architecture contains specific features and functions which are needed because the phones are not fixed in one location. Figure 9 [12] shows schematic of GSM Core Network Architecture.

38 27 Figure 9: GSM Core Network Architecture MS: Mobile Station; SIM: Subscriber Identity Module; MSC: Mobile Switching Centre VLR: Visitor Location Register; HLR: Home Location Register; AuC: Authentication Centre Mobile switching center (MSC): The mobile switching center (MSC) is the primary service delivery node for GSM/CDMA, responsible for routing voice calls and SMS as well as other services (such as conference calls, FAX and circuit switched data).

39 28 The MSC sets up and releases the end-to-end connection, handles mobility and hand-over requirements during the call and takes care of charging and real time pre-paid account monitoring. In the GSM mobile phone system, in contrast with earlier analogue services, fax and data information is sent directly digitally encoded to the MSC. Only at the MSC is this recoded into an "analogue" signal (although actually this will almost certainly mean sound encoded digitally as PCM signal in a 64-kbit/s timeslot, known as a DS0 in America). The gateway MSC (G-MSC) is the MSC that determines which visited MSC the subscriber who is being called is currently located. It also interfaces with the PSTN. All mobile to mobile calls and PSTN to mobile calls are routed through a G-MSC. The term is only valid in the context of one call since any MSC may provide both the gateway function and the Visited MSC function; however, some manufacturers design dedicated high capacity MSCs which do not have any BSSs connected to them. These MSCs will then be the Gateway MSC for many of the calls they handle. The visited MSC (V-MSC) is the MSC where a customer is currently located. The VLR associated with this MSC will have the subscriber's data in it. The anchor MSC is the MSC from which a handover has been initiated. The target MSC is the MSC toward which a Handover should take place.

40 29 Mobile switching centre server (MSCS): The mobile switching centre server is a soft-switch variant of the mobile switching centre, which provides circuit-switched calling, mobility management, and GSM services to the mobile phones roaming within the area that it serves. MSS functionality enables split between control (signaling) and user plane (bearer in network element called as media gateway/mg), which guarantees better placement of network elements within the network. MSS and MGW media gateway makes it possible to cross-connect circuit switched calls switched by using IP, ATM AAL2 as well as TDM. Other GSM core network elements connected to the MSC: The home location register (HLR) for obtaining data about the SIM and mobile services ISDN number (MSISDN; i.e., the telephone number). The base station subsystem which handles the radio communication with 2G and 2.5G mobile phones. The UMTS terrestrial radio access network (UTRAN) which handles the radio communication with 3G mobile phones. The visitor location register (VLR) for determining where other mobile subscribers are located. Other MSCs for procedures such as handover. Procedures implemented Tasks of the MSC include:

41 30 Delivering calls to subscribers as they arrive based on information from the VLR. Connecting outgoing calls to other mobile subscribers or the PSTN. Delivering SMSs from subscribers to the short message service centre (SMSC) and vice versa. Arranging handovers from BSC to BSC. Carrying out handovers from this MSC to another. Supporting supplementary services such as conference calls or call hold. Generating billing information. Home locations register (HLR): The home location register (HLR) is a central database that contains details of each mobile phone subscriber that is authorized to use the GSM core network. There can be several logical, and physical, HLRs per public land mobile network (PLMN), though one international mobile subscriber identity (IMSI)/MSISDN pair can be associated with only one logical HLR (which can span several physical nodes) at a time. The HLRs store details of every SIM card issued by the mobile phone operator. Each SIM has a unique identifier called an IMSI which is the primary key to each HLR record. The next important items of data associated with the SIM are the MSISDNs, which are the telephone numbers used by mobile phones to make and receive calls. The primary MSISDN is the number used for making and receiving voice calls and SMS, but it is possible for a SIM to have other secondary MSISDNs associated with it for fax and data

42 31 calls. Each MSISDN is also a primary key to the HLR record. The HLR data is stored for as long as a subscriber remains with the mobile phone operator. [14] Examples of other data stored in the HLR against an IMSI record are: GSM services that the subscriber has requested or been given. GPRS settings to allow the subscriber to access packet services. Current location of subscriber (VLR and serving GPRS support node/sgsn). Call diverts settings applicable for each associated MSISDN. The HLR is a system which directly receives and processes MAP transactions and messages from elements in the GSM network, for example, the location update messages received as mobile phones roam around. Other GSM core network elements connected to the HLR The HLR connects to the following elements: The G-MSC for handling incoming calls The VLR for handling requests from mobile phones to attach to the network The SMSC for handling incoming SMs The voice mail system for delivering notifications to the mobile phone that a message is waiting The AUC for authentication and ciphering and exchange of data (triplets) Procedures implemented The main function of the HLR is to manage the fact that SIMs and phones move around a lot. The following procedures are implemented to deal with this:

43 32 Manage the mobility of subscribers by means of updating their position in administrative areas called 'location areas', which are identified with a LAC. The action of a user of moving from one LA to another is followed by the HLR with a Location area update procedure. Send the subscriber data to a VLR or SGSN when a subscriber first roams there. Broker between the G-MSC or SMSC and the subscriber's current VLR in order to allow incoming calls or text messages to be delivered. Remove subscriber data from the previous VLR when a subscriber has roamed away from it. Authentication centre (AUC): Figure 10 [12] shows schematic of Authentication and Key agreement

44 33 Figure 10: Authentication and Key agreement Description The authentication centre (AUC) is a function to authenticate each SIM card that attempts to connect to the GSM core network (typically when the phone is powered on). Once the authentication is successful, the HLR is allowed to manage the SIM and services described above. An encryption key is also generated that is subsequently used to encrypt all wireless communications (voice, SMS, etc.) between the mobile phone and the GSM core network. If the authentication fails, then no services are possible from that particular combination of SIM card and mobile phone operator attempted. There is an additional form of

45 34 identification check performed on the serial number of the mobile phone described in the EIR section below, but this is not relevant to the AUC processing. Proper implementation of security in and around the AUC is a key part of an operator's strategy to avoid SIM cloning. The AUC does not engage directly in the authentication process, but instead generates data known as triplets for the MSC to use during the procedure. The security of the process depends upon a shared secret between the AUC and the SIM called the Ki. The Ki is securely burned into the SIM during manufacture and is also securely replicated onto the AUC. This Ki is never transmitted between the AUC and SIM, but is combined with the IMSI to produce a challenge/response for identification purposes and an encryption key called Kc for use in over the air communications. Other GSM core network elements connected to the AUC The AUC connects to the following elements: the MSC which requests a new batch of triplet data for an IMSI after the previous data have been used. This ensures that same keys and challenge responses are not used twice for a particular mobile. Procedures implemented: The AUC stores the following data for each IMSI: the Ki

46 35 Algorithm id. (The standard algorithms are called A3 or A8, but an operator may choose a proprietary one). When the MSC asks the AUC for a new set of triplets for a particular IMSI, the AUC first generates a random number known as RAND. This RAND is then combined with the Ki to produce two numbers as follows: The Ki and RAND are fed into the A3 algorithm and the signed response (SRES) is calculated. The Ki and RAND are fed into the A8 algorithm and a session key called Kc is calculated. The numbers (RAND, SRES, Kc) form the triplet sent back to the MSC. When a particular IMSI requests access to the GSM core network, the MSC sends the RAND part of the triplet to the SIM. The SIM then feeds this number and the Ki (which is burned onto the SIM) into the A3 algorithm as appropriate and an SRES is calculated and sent back to the MSC. If this SRES matches with the SRES in the triplet (which it should if it is a valid SIM), then the mobile is allowed to attach and proceed with GSM services. After successful authentication, the MSC sends the encryption key Kc to the base station controller (BSC) so that all communications can be encrypted and decrypted. Of course, the mobile phone can generate the Kc itself by feeding the same RAND supplied during authentication and the Ki into the A8 algorithm.

47 36 The AUC is usually collocated with the HLR, although this is not necessary. Whilst the procedure is secure for most everyday use, it is by no means crack proof. Therefore a new set of security methods was designed for 3G phones. [16] Figure 11 [14] shows schematic of encryption using A5 algorithm. Figure 11: Radio Link Encryption Visitor locations register (VLR): Description The visitor location register is a database of the subscribers who have roamed into the jurisdiction of the MSC (Mobile Switching Center) which it serves. Each base station in

48 37 the network is served by exactly one VLR; hence a subscriber cannot be present in more than one VLR at a time. The data stored in the VLR has either been received from the HLR, or collected from the MS (Mobile station). In practice, for performance reasons, most vendors integrate the VLR directly to the V-MSC and, where this is not done, the VLR is very tightly linked with the MSC via a proprietary interface. Whenever an MSC detects a new MS in its network, in addition to creating a new record in the VLR, it also updates the HLR of the mobile subscriber, apprising it of the new location of that MS. If VLR data is corrupted it can lead to serious issues with text messaging and call services. Figure 12 [14] shows schematic of Temporary ID management using VLR

49 38 Figure 12: Temporary ID management Data stored include: IMSI (the subscriber's identity number). Authentication data. MSISDN (the subscriber's phone number). GSM services that the subscriber is allowed to access. access point (GPRS) subscribed. The HLR address of the subscriber.

50 39 Other GSM core network elements connected to the VLR The VLR connects to the following elements: The V-MSC to pass required data for its procedures; e.g., authentication or call setup. The HLR to request data for mobile phones attached to its serving area. Other VLRs to transfer temporary data concerning the mobile when they roam into new VLR areas. For example, the temporal mobile subscriber identity (TMSI). Procedures implemented The primary functions of the VLR are: To inform the HLR that a subscriber has arrived in the particular area covered by the VLR. To track where the subscriber is within the VLR area (location area) when no call is ongoing. To allow or disallow which services the subscriber may use. To allocate roaming numbers during the processing of incoming calls. To purge the subscriber record if a subscriber becomes inactive whilst in the area of a VLR. The VLR deletes the subscriber's data after a fixed time period of inactivity and informs the HLR (e.g., when the phone has been switched off and left off or when the subscriber has moved to an area with no coverage for a long time).

51 40 To delete the subscriber record when a subscriber explicitly moves to another, as instructed by the HLR. Equipment identities register (EIR): The equipment identity register is often integrated to the HLR. The EIR keeps a list of mobile phones (identified by their IMEI) which are to be banned from the network or monitored. This is designed to allow tracking of stolen mobile phones. In theory all data about all stolen mobile phones should be distributed to all EIRs in the world through a Central EIR. It is clear, however, that there are some countries where this is not in operation. The EIR data does not have to change in real time, which means that this function can be less distributed than the function of the HLR. The EIR is a database that contains information about the identity of the mobile equipment that prevents calls from stolen, unauthorized or defective mobile stations. Some EIR also have the capability to log Handset attempts and store it in a log file CDMA One or IS-95 CDMA One is a second generation mobile telecommunications standard that uses CDMA, which is a multiple access scheme for digital radio, to send voice, data and signaling data between mobile telephones and cell sites. CDMA, "code division multiple access" uses a digital modulation called spread spectrum which spreads the voice data over a very wide channel in pseudorandom fashion using a user or cell specific pseudorandom code. The receiver undoes the randomization to

52 41 collect the bits together and produce the original data. As the codes are pseudorandom and selected in such a way as to cause minimal interference to one another, multiple users can talk at the same time and multiple cells can share the same frequency. This causes an added signal noise forcing all users to use more power, which in exchange decreases cell range and battery life. When CDMAone technology is chosen to implement in Neighborhood Area Networks of Smart Grid; Smart devices and Smart meters of NAN will be using CDMA locks, IC chips and linked to particular cellular carriers. In USA service providers of CDMA include Verizon, Sprint operating in frequency band below 3000MHz. CDMA can provide up to Mbit/s of Uplink and downlink capacity. Below are advantages of using CDMAOne/IS-95 1) Capacity is IS-95's biggest asset; it can accommodate more users per MHz of bandwidth than any other technology. 2) Has no built-in limit to the number of concurrent users. 3) Uses precise clocks that do not limit the distance a tower can cover. 4) Consumes less power and covers large areas so cell size in IS-95 is larger. 5) Able to produce a reasonable call with lower signal (cell phone reception) levels.

53 42 6) CDMAOne uses soft handoff, reducing the likelihood of dropped calls. 7) IS-95's variable rate voice coders reduce the rate being transmitted when speaker is not talking, which allows the channel to be packed more efficiently. 8) Has a well-defined path to higher data rates. Below are disadvantages of using CDMAOne/IS-95 1) Most technologies are patented and must be licensed from Qualcomm. 2) Breathing of base stations, where coverage area shrinks under load. As the number of subscribers using a particular site goes up, the range of that site goes down. 3) Because IS-95 towers interfere with each other, they are normally installed on much shorter towers. Because of this, IS-95 may not perform well in hilly terrain. 4) Even barring subsidy locks, CDMA phones are linked by ESN to a specific network, thus phones are typically not portable across providers G Systems and UMTS (Universal Mobile Telecommunications System) 3G Systems were developed to provide global mobility with wide range of services which includes telephony, paging, messaging, Internet and broadband data. International Telecommunication Union (ITU) is the organization which defined the standard for third generation systems, referred to as International Mobile Telecommunications 2000 (IMT-

54 ). Third Generation Partnership Project (3GPP) which was formed performs technical specification work and technical development of 3G technology. Universal Mobile Telecommunications System (UMTS) is one of the third-generation (3G) mobile telecommunications technologies which is specified by 3GPP and is part of the global ITU IMT-2000 standard. UMTS, using 3GPP, can support maximum data transfer rates of up to 45 Mbit/s (with HSPA+),[12] although at the moment users in deployed networks can expect a transfer rate of up to 384 kbit/s for R99 handsets, and 7.2 Mbit/s for HSDPA handsets in the downlink connection. This is still much greater than the 9.6 kbit/s of a single GSM errorcorrected circuit switched data channel and 14.4 kbit/s for CDMAOne. UMTS Architecture A UMTS network consists of three interacting domains; Core Network (CN), UMTS Terrestrial Radio Access Network (UTRAN) and User Equipment (UE). The main function of the core network is to provide switching, routing and transit for user traffic. Core network also contains the databases and network management functions. The basic Core Network architecture for UMTS as seen in Figure 13 [18] is based on GSM network with GPRS. All equipment has to be modified for UMTS operation and services. The UTRAN provides the air interface access method for User Equipment. Base Station is referred as Node-B and control equipment for Node-B's is called Radio

55 Network Controller (RNC). 44 Figure 13: Structure of UMTS network UMTS provides several different terrestrial air interfaces, called UMTS Terrestrial Radio Access (UTRA). [14] All air interface options are part of ITU's IMT In the currently most popular variant for cellular mobile telephones, W-CDMA (IMT Direct Spread) is used. UMTS has enhanced security features compared to 2G protocols such as GSM, CDMA. Below are security features implemented in UMTS, Entity authentication:

Global System for Mobile Communication Technology

Global System for Mobile Communication Technology Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special

More information

The GSM and GPRS network T-110.300/301

The GSM and GPRS network T-110.300/301 The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM v. CDMA: Technical Comparison of M2M Technologies GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple

More information

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014 Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch

More information

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen

More information

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals. Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Global System for Mobile Communication (GSM)

Global System for Mobile Communication (GSM) Global System for Mobile Communication (GSM) Definition Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization

More information

Wireless Mobile Telephony

Wireless Mobile Telephony Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 Durresi@cis.ohio-state.edu http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog

More information

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of

More information

Wireless Cellular Networks: 1G and 2G

Wireless Cellular Networks: 1G and 2G Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available

More information

2G/3G Mobile Communication Systems

2G/3G Mobile Communication Systems 2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management

More information

Development of Wireless Networks

Development of Wireless Networks Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.

More information

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre 1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information

GSM Architecture Training Document

GSM Architecture Training Document Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.

More information

Global System for Mobile Communications (GSM)

Global System for Mobile Communications (GSM) Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE Thi-Mai-Trang.Nguyen@lip6.fr UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security

More information

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

White Paper ON Dual Mode Phone (GSM & Wi-Fi) White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

2G Mobile Communication Systems

2G Mobile Communication Systems 2G Mobile Communication Systems 2G Review: GSM Services Architecture Protocols Call setup Mobility management Security HSCSD GPRS EDGE References Jochen Schiller: Mobile Communications (German and English),

More information

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3. Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke uwe@iig.uni-freiburg.de Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

2 System introduction

2 System introduction 2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communications TCS 455 Dr. Prapun Suksompong prapun@siit.tu.ac.th Lecture 26 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read the following from the SIIT online

More information

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi

!!! # $ % & & # ' (! ) * +, -!!. /  0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi !!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)

More information

3GPP Wireless Standard

3GPP Wireless Standard 3GPP Wireless Standard Shishir Pandey School of Technology and Computer Science TIFR, Mumbai April 10, 2009 Shishir Pandey (TIFR) 3GPP Wireless Standard April 10, 2009 1 / 23 3GPP Overview 3GPP : 3rd Generation

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

Wireless Broadband Access

Wireless Broadband Access Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term

More information

Appendix A: Basic network architecture

Appendix A: Basic network architecture Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded

More information

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National

More information

Cellular Network Organization

Cellular Network Organization Cellular Networks Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells o Each served by its own antenna o Served by base station consisting of transmitter,

More information

Evolution of GSM in to 2.5G and 3G

Evolution of GSM in to 2.5G and 3G CMPE 477 Wireless and Mobile Networks Evolution of GSM in to 2.5G and 3G New Data Services for GSM CMPE 477 HSCSD GPRS 3G UMTS IMT2000 UMTS Architecture UTRAN Architecture Data services in GSM I Data transmission

More information

Narrowband and Broadband Access Technologies

Narrowband and Broadband Access Technologies Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya (LKaya@ieee.org)

More information

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies

More information

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical

More information

1. Introduction: The Evolution of Mobile Telephone Systems

1. Introduction: The Evolution of Mobile Telephone Systems IEC: The Global System for Mobile Communication Tutorial: Index Page 1 of 14 Global System for Mobile Communication (GSM) Tutorial Definition Global System for Mobile Communication (GSM) is a globally

More information

Review of Cell Phone Technology

Review of Cell Phone Technology Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

GSM BASICS GSM HISTORY:

GSM BASICS GSM HISTORY: GSM BASICS GSM HISTORY: In 1982 the Nordic PTTs sent a proposal to CEPT (Conference of European Postal & telegraph Administration) to study and to improve digital cellular technology by forming a team

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

PM ASSIGNMENT. Security in Mobile Telephony and Voice over IP

PM ASSIGNMENT. Security in Mobile Telephony and Voice over IP PM ASSIGNMENT Security in Mobile Telephony and Voice over IP Christian Wallin Christian.wallin.7513@student.uu.se Danlu Fu danlu.fu.6095@student.uu.se David Alfonso david.alfonso.5823@student.uu.se 1.

More information

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating

More information

192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]

192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] 192620010 Mobile & Wireless Networking Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] Geert Heijenk Outline of Lecture 5 Cellular Systems (UMTS / LTE) (1/2) q Evolution of cellular

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur ABSTRACT W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived

More information

Network Communications System. Redefining Intelligent Utility Communications

Network Communications System. Redefining Intelligent Utility Communications Network Communications System Redefining Intelligent Utility Communications Technology that takes you from today to tomorrow. FlexNet Technology you can trust FlexNet is a robust, high-powered solution

More information

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Reporte Técnico No. CCC-04-002 27 de febrero de 2004 Coordinación de Ciencias Computacionales

More information

FPGAs in Next Generation Wireless Networks

FPGAs in Next Generation Wireless Networks FPGAs in Next Generation Wireless Networks March 2010 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503) 268-8000 www.latticesemi.com 1 FPGAs in Next Generation

More information

Mobile Services (ST 2010)

Mobile Services (ST 2010) Mobile Services (ST 2010) Chapter 2: Mobile Networks Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 2 Mobile Networks 2.1 Infrastructure

More information

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish

More information

Chapters 1-21 Introduction to Wireless Communication Systems

Chapters 1-21 Introduction to Wireless Communication Systems Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova

More information

IMT-2000 Network Architecture

IMT-2000 Network Architecture IMT-2000 Network Architecture vtoshio Shimoe vtakamichi Sano (Manuscript received May 31, 2002) International Mobile Telecommunication-2000 (IMT-2000) is a third-generation mobile communication system.

More information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel

NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel Mobile Networks Next Generation Mobile Networks Keith A. Benjamin Operations Manager South Cluster LIME (Cable & Wireless) Global Markets Global Markets

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS QUICK LOOK ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS The Cisco RAN Optimization solution offers alternative radio access network (RAN) backhaul transport and data offload

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

Cellular Technology Sections 6.4 & 6.7

Cellular Technology Sections 6.4 & 6.7 Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

An Example of Mobile Forensics

An Example of Mobile Forensics An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk k.c.hilton@staffs.ac.uk www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network

More information

What is telecommunication? electronic communications? What is telephony?

What is telecommunication? electronic communications? What is telephony? What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

GSM Risks and Countermeasures

GSM Risks and Countermeasures GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked

More information

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure

More information

How To Understand Cellular Communications

How To Understand Cellular Communications Definition Cellular Communications A cellular mobile communications system uses a large number of low-power wireless transmitters to create cells the basic geographic service area of a wireless communications

More information

Mobile Phone Security. Hoang Vo Billy Ngo

Mobile Phone Security. Hoang Vo Billy Ngo Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: Cellular Overview: 3G and 4G http://lyle.smu.edu/~skangude/eets8316.html Dr. Shantanu Kangude skangude@lyle.smu.edu Third Generation Systems High-speed wireless

More information

GSM System. Global System for Mobile Communications

GSM System. Global System for Mobile Communications GSM System Global System for Mobile Communications Introduced in 1991. Settings of standards under ETSI (European Telecommunication Standards Institute) Services - Telephone services - Data services -

More information

What is telecommunication? electronic communications. service?

What is telecommunication? electronic communications. service? What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

The future of mobile networking. David Kessens <david.kessens@nsn.com>

The future of mobile networking. David Kessens <david.kessens@nsn.com> The future of mobile networking David Kessens Introduction Current technologies Some real world measurements LTE New wireless technologies Conclusion 2 The future of mobile networking

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Use of MPLS in Mobile Backhaul Networks

Use of MPLS in Mobile Backhaul Networks Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile

More information

EE 4105 Communication Engg-II Dr. Mostafa Zaman Chowdhury Slide # 1

EE 4105 Communication Engg-II Dr. Mostafa Zaman Chowdhury Slide # 1 EE 4105 Communication Engg-II Dr. Mostafa Zaman Chowdhury Slide # 1 1 Circuit-Switched Systems In a circuit-switched system, each traffic channel is dedicated to a user until its cell is terminated. Circuit

More information

Security Requirements for Wireless Networking

Security Requirements for Wireless Networking Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END

More information

GSM System Architecture

GSM System Architecture Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

SPYTEC 3000 The system for GSM communication monitoring

SPYTEC 3000 The system for GSM communication monitoring SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption

More information

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256

More information

Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and

Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: Wireless Telecommunication Systems GSM, GPRS,

More information

PDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS

PDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS UMTS Generations of mobile systems Generation 1 (1980-1995) 2 (1992-2000) 2,5 (1999-2010) 3 (2004-20?) Names NMT (Nordic Mobile Telephone); 450 MHz, 900 MHz AMPS (Advance Mobile Telephone System); USA

More information

Mobile Services (ST 2010)

Mobile Services (ST 2010) Mobile Services (ST 2010) Chapter 3: Mobility Management Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 3 Mobility Management 3.1 Handover

More information

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

FIBRE TO THE BTS IMPROVING NETWORK FLEXIBILITY & ENERGY EFFICIENCY

FIBRE TO THE BTS IMPROVING NETWORK FLEXIBILITY & ENERGY EFFICIENCY FIBRE TO THE BTS IMPROVING NETWORK FLEXIBILITY & ENERGY EFFICIENCY (Study Paper by FLA Division) Ram Krishna Dy. Director General (FLA) TEC New Delhi, DoT, Govt. of India. E-mail: ddgfla.tec@gov.in Mrs.

More information

Wireless Access of GSM

Wireless Access of GSM Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade

More information

Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation

Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation (Semtech White Paper October 2008) INTRODUCTION For carriers to leverage cost-effective IP networks to

More information

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with

More information

Lecture 1. Introduction to Wireless Communications 1

Lecture 1. Introduction to Wireless Communications 1 896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

Nokia Siemens Networks LTE 1800 MHz Introducing LTE with maximum reuse of GSM assets

Nokia Siemens Networks LTE 1800 MHz Introducing LTE with maximum reuse of GSM assets Nokia Siemens Networks LTE 1800 MHz Introducing LTE with maximum reuse of GSM assets White paper Table of contents 1. Overview... 3 2. 1800 MHz spectrum... 3 3. Traffic Migration... 5 4. Deploying LTE-GSM

More information

Wireless Cellular Networks: 3G

Wireless Cellular Networks: 3G Wireless Cellular Networks: 3G Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 7-1 Overview Wireless

More information

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile

More information