Glossary Third-generation mobile communications standard. It connects not only people, but also a vast number of sensors.
Base station subsystem — the base stations and their controllers Network and Switching Subsystem — the part of the network most similar to a fixed network, sometimes just called the "core network" GPRS Core Network — the optional part which allows packet-based Internet connections Operations support system OSS — network maintenance Base station subsystem[ edit ] GSM cell site antennas in the Deutsches MuseumMunichGermany GSM is a cellular networkwhich means that cell phones connect to it by searching for cells in the immediate vicinity.
There are five different cell sizes in a GSM network— macromicropicofemtoand umbrella cells. The coverage area of each cell varies according to the implementation environment. Macro cells can be regarded as cells where the base station antenna is installed on a mast or a building above average rooftop level.
Micro cells are cells whose antenna height is under average rooftop level; they are typically used in urban areas.
Picocells are small cells whose coverage diameter is a few dozen meters; they are mainly used indoors. Umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in coverage between those cells. Cell horizontal radius varies depending on antenna height, antenna gain, and propagation conditions from a couple of hundred meters to several tens of kilometres.
There are also several implementations of the concept of an extended cell,  where the cell radius could be double or even more, depending on the antenna system, the type of terrain, and the timing advance.
Indoor coverage is also supported by GSM and may be achieved by using an indoor picocell base station, or an indoor repeater with distributed indoor antennas fed through power splitters, to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system.
These are typically deployed when significant call capacity is needed indoors, like in shopping centers or airports. However, this is not a prerequisite, since indoor coverage is also provided by in-building penetration of the radio signals from any nearby cell.
GSM carrier frequencies[ edit ] Main article: Regardless of the frequency selected by an operator, it is divided into timeslots for individual phones. This allows eight full-rate or sixteen half-rate speech channels per radio frequency.
These eight radio timeslots or burst periods are grouped into a TDMA frame. Half-rate channels use alternate frames in the same timeslot. The channel data rate for all 8 channels is Voice codecs[ edit ] GSM has used a variety of voice codecs to squeeze 3.
Originally, two codecs, named after the types of data channel they were allocated, were used, called Half Rate 6. These used a system based on linear predictive coding LPC. In addition to being efficient with bitrate s, these codecs also made it easier to identify more important parts of the audio, allowing the air interface layer to prioritize and better protect these parts of the signal.
Finally, with the development of UMTSEFR was refactored into a variable-rate codec called AMR-Narrowbandwhich is high quality and robust against interference when used on full-rate channels, or less robust but still relatively high quality when used in good radio conditions on half-rate channel.
The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can change operators while retaining the handset simply by changing the SIM.
SIM lock Sometimes mobile network operators restrict handsets that they sell for use with their own network. This is called locking and is implemented by a software feature of the phone. A subscriber may usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or use software and websites to unlock the handset themselves.
It is possible to hack past a phone locked by a network operator. It has considered the user authentication using a pre-shared key and challenge-responseand over-the-air encryption. However, GSM is vulnerable to different types of attack, each of them aimed at a different part of the network.
The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. Serious weaknesses have been found in both algorithms: Since different efforts have been made in order to crack the A5 encryption algorithms.
The most commonly deployed GPRS ciphers were publicly broken in They also noted that some carriers do not encrypt the data i.Jul 28, · Share Optional Feature Description of Huawei UMTS RAN Embed size(px) Link. Share. of Report. All materials on our website are shared by users.
If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you. Related Documents. Share.
UTRAN (short for "Universal Terrestrial Radio Access Network") is a collective term for the network and equipment that connects mobile handsets to the public telephone network or the Internet.
It contains the base stations, which are called Node B's and Radio Network Controllers. 5G is the communication standard of the future and is expected to be introduced from It connects not only people, but also a vast number of sensors. By doing so, 5G paves the way for the Internet of metin2sell.com, heating systems and even trash cans are becoming involved in the net, posing completely different challenges than flesh-and-blood network users.
Radio Network Subsystem (RNS): The RNS also known as the UMTS Radio Access Network, UTRAN, is the equivalent of the previous Base Station Subsystem or BSS in GSM. It provides and manages the air interface fort he overall network. The Universal Mobile Telecommunications System UMTS specifies a complete network system, which includes the radio access network (UMTS Terrestrial Radio Access Network, or UTRAN), the core network General Description - Describes basic differences between FDD and TDD.
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.