.jpg)
GSM, which stands for Global System for Mobile communications, reigns as the world’s most widely used cell phone technology. Cell phones use a cell phone service carrier’s GSM network by searching for cell phone towers in the nearby area. The origins of GSM can be traced back to 1982 when the Groupe Spécial Mobile (GSM) was created by the European Conference of Postal and Telecommunications Administrations (CEPT) for the purpose of designing a pan-European mobile technology.
• The
GSM standard has been an advantage to both consumers, who may benefit from the
ability to roam and switch carriers without replacing phones, and also to
network operators, who can choose equipment from many GSM equipment vendors.
GSM also pioneered low-cost implementation of the short message service (SMS),
also called text messaging, which has since been supported on other mobile
phone standards as well. The standard includes a worldwide emergency telephone
number feature.
Technical details
GSM cell site antennas in the Deutsches
Museum, Munich, Germany GSM is a cellular network, which means that mobile
phones connect to it by searching for cells in the immediate vicinity. There
are five different cell sizes in a GSM network—macro, micro, pico, femto and
umbrella cells. The coverage area of each cell varies according to the
implementation environment. Macro cells can be regarded as cells where the base
station antenna is installed on a mast or a building above average roof top
level. Micro cells are cells whose antenna height is under average roof top
level; they are typically used in urban areas. Picocells are small cells whose
coverage diameter is a few dozen metres; they are mainly used indoors.
Femtocells are cells designed for use in residential or small business
environments and connect to the service provider’s network via a broadband
internet connection. Umbrella cells are used to cover shadowed regions of
smaller cells and fill in gaps in coverage between those cells.
GSM carrier frequencies
GSM networks operate in a number of different
carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS
frequency bands for 3G), with most 2G GSM networks operating in the 900 MHz or
1800 MHz bands. Where these bands were already allocated, the 850 MHz and 1900
MHz bands were used instead (for example in Canada and the United States). In
rare cases the 400 and 450 MHz frequency bands are assigned in some countries
because they were previously used for first-generation systems.Most 3G networks
in Europe operate in the 2100 MHz frequency band.
Voice codecs
GSM has used a variety of voice codecs to
squeeze 3.1 kHz audio into between 6.5 and 13 kbit/s. Originally, two codecs,
named after the types of data channel they were allocated, were used, called
Half Rate (6.5 kbit/s) and Full Rate (13 kbit/s). These used a system based
upon linear predictive coding (LPC). In addition to being efficient with bitrates,
these codecs also made it easier to identify more important parts of the audio,
allowing the air interface layer to prioritize and better protect these parts
of the signal.
Network structure
The network is structured into a number of discrete
sections:
• The
Base Station Subsystem (the base stations and their controllers).
• the
Network and Switching Subsystem (the part of the network most similar to a
fixed network). This is sometimes also just called the core network.
• The
GPRS Core Network (the optional part which allows packet based Internet
connections).
Subscriber Identity Module (SIM)
One of the key features of GSM is the
Subscriber Identity Module, commonly known as a SIM card. The SIM is a
detachable smart card containing the user's subscription information and phone
book. This allows the user to retain his or her information after switching
handsets. Alternatively, the user can also change operators while retaining the
handset simply by changing the SIM. Some operators will block this by allowing
the phone to use only a single SIM, or only a SIM issued by them; this practice
is known as SIM locking.
Phone locking
Sometimes mobile network operators restrict
handsets that they sell for use with their own network. This is called locking
and is implemented by a software feature of the phone. Because the purchase
price of the mobile phone to the consumer is typically subsidized with revenue
from subscriptions, operators must recoup this investment before a subscriber
terminates service. A subscriber may usually contact the provider to remove the
lock for a fee, utilize private services to remove the lock, or make use of
free or fee-based software and websites to unlock the handset themselves.
GSM service security
GSM was designed with a moderate level of
service security. The system was designed to authenticate the subscriber using
a pre-shared key and challenge-response. Communications between the subscriber
and the base station can be encrypted. The development of UMTS introduces an
optional Universal Subscriber Identity Module (USIM), that uses a longer
authentication key to give greater security, as well as mutually authenticating
the network and the user - whereas GSM only authenticates the user to the
network (and not vice versa). The security model therefore offers
confidentiality and authentication, but limited authorization capabilities, and
no non-repudiation.
GSM uses several cryptographic algorithms for
security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air
voice privacy. A5/1 was developed first and is a stronger algorithm used within
Europe and the United States; A5/2 is weaker and used in other countries.
Serious weaknesses have been found in both algorithms: it is possible to break
A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico
Computing, Inc revealed its ability and plans to commercialize FPGAs that allow
A5/1 to be broken with a rainbow table attack. The system supports multiple
algorithms so operators may replace that cipher with a stronger one.
GSM features:
• gsmd
daemon by Openmoko
• OpenBTS
develops a Base transceiver station
• OpenBSC
is developing a minimalistic, self-contained GSM network
• The
GSM Software Project aims to build a GSM analyzer for less than $1000
• OsmocomBB
developers intend to replace the proprietary baseband GSM stack with a free
software implementation
Issues with patents and open source
Patents remain a problem for any open source
GSM implementation, because it is not possible for GNU or any other free
software distributor to guarantee immunity from all lawsuits by the patent
holders against the users. Furthermore new features are being added to the
standard all the time which means they have patent protection for a number of
years.
Universities and Colleges offer lot of advanced degree
courses in Finance with thesis and Research programmes. Online Institues like
Onlinehomeworksite also offers Special Online courses in Finance assignment
help, Finance homework help and tutoring services. Students must use of these
service and excel in their studies. For further details contact them at for a
free quote: info@onlinehomeworksite.com.









