wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How the mobile IP is used in GSM architecture.

profile
Genius Ape
Dec 06, 2017
0 Likes
0 Discussions
1347 Reads
How the mobile IP is used in GSM architecture.     AUTHOR : Shashank Rajendraprasad Shukla       Aim:- To study how the mobile IP is used in GSM architecture.

Abstract:-

The international operation of a GSM system includes among others the interoperability with other GSM networks (including different countries) and with ISDN networks, as well as the information exchange among network operators (billing, statistical data, subscriber complaints, invalid IMEI etc.).This case study will highlight the emergence of GSM over the 1G: Analog Cellular Networks.

Introduction:-

Cellular communication means that there are a lot of different areas, looks like cell, contain communication system devices, such as antennas, base stations. If the base station antenna power is high, it means that it serves large areas. Otherwise, if the antenna power is low, it means that it serves little areas. However there are other parameters which affect the convergence. For example, to achieve a good communication in crowded areas, convergence should be reduced and the channel capacity should be increased. A lot of adjacent cells create the clusters. Clusters can have different amount of cells and each cell uses different frequency to avoid interference. These cluster structures repeat itself in different communication areas.

Mobile IP

Shows a generic Mobile IP network. The mobile device attaches to a network through a router that terminates a radio interface1. Inside the network there are two mobility agents: a home agent and a foreign agent. Each mobile node has two addresses assigned to it. A home address that corresponds to its home network and a care-of address that corresponds to the network to which it is currently attached. When a mobile device attaches to a network, it receives a care-of address from the serving network. This is often the address of an interface on the foreign agent serving the mobile device. The mobile device then registers this address with its home agent. Mobile security associations are required between the mobile device and its home agent. In addition, further security associations may exist between the mobile device and the foreign agent, and the foreign and home agents. When packets are sent to the mobile device by a corresponding host, they are addressed to the home address of the mobile node. These packets are routed through the Internet as normal IP packets until they reach the home network of the mobile device. In the home network, the home agent of the mobile device intercepts these packets. The home agent encapsulates these packets inside packets that are addressed to the care-of address of the mobile device. These packets are then routed on the Internet as normal IP packets until they reach the foreign agent corresponding to the mobile device. In this way packets are tunneled through the network. The foreign agent decapsulates the original IP packets and forwards them to the mobile device. Packets sent from the mobile device may be treated as normal IP packets. When a mobile device moves between points of attachment on a network and changes foreign agent, it receives a new care-of address, and re-registers with its home agent. In this way, mobility management is performed. Mobile IP also defines mechanisms allowing mobile devices to perform their own decapsulation functions, by means of a co-located care-of address. In addition, the IETF is working on an extension to Mobile IP called route optimization [8], allowing the home agent to inform corresponding hosts about the current care-of address of mobile devices. Route optimization also allows packets to be forwarded from an old foreign agent to a new foreign agent, enabling smoother handoffs.

GSM:

GSM, the Global System for Mobile communications, is a digital cellular communications system that has rapidly gained acceptance and market share worldwide. In addition to digital transmission, GSM comprises many advanced services and features, including ISDN (Integrated Services Digital Network) compatibility and worldwide roaming in other GSM networks. GSM architecture is a combination of three subsystems: Base Station Subsystem (BSS), Network Switching Subsystem (NSS) & Operation Support Subsystem (OSS). BSS consists of Base Transceiver System (BTS) and Base System Controller (BSC) which connects with Mobile Station (MS). NSS consists of MSC which connects with BSC. OSS maintains BSS and NSS. GSM channels are responsible for connecting two MS’s. It consists of two channels: Traffic Channels (TCH) which makes data flow between two MS’s possible and Control Channels (CCH) which supervises the signaling and synchronization between the base station and mobile station. This paper will give an overview of GSM system architecture & its channels. Some of the basic criteria for their proposed system were:
  • Good subjective speech quality
  • Low terminal and service cost
  • Support for international roaming
  • Ability to support handheld terminals
  • Support for range of new services and facilities
  • Spectral efficiency
  • ISDN compatibility
Mobile IP may work in a GSM network. We consider four issues with mobility management: detecting a change in network attachment, micro mobility, paging, and roaming.

Conclusion:-

The communication development and the increase of living standard of people are directly related to the more use of cellular mobile. Cellular mobile radio-the high end sophisticated technology that enables everyone to communicate anywhere with anybody. The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world. In this case study we have tried to give and over view of the GSM system. We hope that we gave the general flavor of GSM and the philosophy behind its design. The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality. The features and benefits expected in the GSM systems are superior speech quality, low terminal, operational and service costs, a high level security, providing international roaming support of low power hand portable terminals and variety of new services and network facilities. In near forth coming days, the third generation mobile telephony becomes available whole over the world, which will give the facility of videoconference in mobile telephone. References:-
  1. La Porta, T.F., Salgarelli, L. and Foster, G.T., 1999. Mobile IP and wide area wireless data. In Wireless Communications and Networking Conference, 1999. WCNC. 1999 IEEE(Vol. 3, pp. 1528-1532). IEEE.
  2. Digital Cellular Telecommunication System, General Packet Radio Service (GSM 02.60, version 6.1), ETSI, 1997.
  3. Digital Cellular Telecommunication System, Enhanced Data Rates for GSM Evolution - Project Plan and Open Issues for EDGE (GSM 10.59, version 1.6), ETSI, 1997.
  4. E. Perkins, “IP Mobility Support,” IETF RFC 2002, October 1996.
  5. Digital Cellular Telecommunication System, Network Architecture (GSM 3.02, version 6.1), ETSI, 1997.
  6. 800 MHz TDMA Cellular Radio Interface – Mobile Station – Base Station Compatibility, EIA/TIA IS-136, 1994
  7. Mobile Station – Base Station Compatibility Standard for Dual-Mode Wide Band Spread Spectrum Cellular System, EIA/TIA IS-95, 1993.
  8. IEEE Personal Communications Magazine Special Issue, “Third Generation Mobile Systems in Europe,” Davide Grillo Guest Editor, Vol. 5, No. 2, April, 1998.
  9. E. Perkins, D. Johnson, “Route Optimizations for Mobile IP,” Internet Draft, November, 1997.
  10. Calhoun and C. E. Perkins, DIAMETER Mobile IP Extensions, Internet Draft, November 1998.
  11. Kent and R. Atkinson, Security Architecture for the Internet Protocol, IETF RFC 2401, November 1998.
  12. K. Zao and M. Condell, Use of IPSec in Mobile IP, Internet Draft, November 1997.
 

>>>>>Download the whole research article from here<<<<<


Comments ()


Sign in

Read Next

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

Dos (Denial of service) Attack

Blog banner

Hey Aryan here

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Spyware

Blog banner

Artical on FreshBooks

Blog banner

Note Taker App

Blog banner

Importance of modern technology era

Blog banner

All you need to know about Cassandra

Blog banner

?How long does wisdom tooth pain last?

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Types of Viruses

Blog banner

Time Series Analysis

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

THREADS (assignment 1)

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Linux Threads:

Blog banner

A True Friendship

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Critical success factors

Blog banner

Reconnaissance

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Evolution of Operating System

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

LIMITED EDITION

Blog banner

What is E-commerce

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

NETWORK SECURITY RISKS

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

What is M-commerce and how it's work

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Deadlock and Starvation

Blog banner

Functions Of Operating Systems

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Junk food vs healthy food

Blog banner

Data Lake

Blog banner

Blockchain Transactions

Blog banner