pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

GSM Technology

The GSM network can be divided into four main parts:

  • The Mobile Station, which is carried by the subscriber
  • The Base Station Subsystem, which controls the radio link with the Mobile Station
  • The Network and Switching Subsystem, the main part of which is the Mobile services Switching Center and which performs the switching of calls between the mobile and other fixed or mobile network users, as well as management of mobile services, such as authentication
  • The Operation and Support Subsystem, which oversees the proper operation and setup of the network.

The International Telecommunication Union (ITU), which manages the international allocation of radio spectrum (among other functions) allocated the bands 890-915 MHz for the uplink (mobile station to base station) and 935-960 MHz for the downlink (base station to mobile station) for mobile networks in Europe. Since this range was already being used in the early 1980s by the analogue systems of the day, the CEPT had the foresight to reserve the top 10 MHz of each band for the GSM network that was still being developed. Eventually, GSM will be allocated the entire 2×25 MHz bandwidth.

Since radio spectrum is a limited resource shared by all users, a method must be devised to divide up the bandwidth among as many users as possible. The method chosen by GSM is a combination of FDMA and TDMA. The FDMA part involves the division by frequency of the total 25 MHz bandwidth into 124 carrier frequencies of 200 kHz bandwidth. One or more carrier frequencies are then assigned to each base station. Each of these carrier frequencies is then divided in time, using a TDMA scheme, into eight time slots. One time slot is used for transmission by the mobile and one for reception. They are separated in time so that the mobile unit does not receive and transmit at the same time, a fact that simplifies the electronics.

The uniqueness of GSM technology lies in the fact that users must insert Subscriber Identity Module Cards (SIM-Cards) in their handsets. SIM Cards are small chips delivered by the GSM service provider. These SIM cards contain crucial information such as a phone number and all billing co-ordinates and can store telephone numbers. This enables users to switch GSM handsets by simply pulling out their SIM Card and inserting it into another device. As a result, users can keep the same number although they’ve switched handsets. Users can also travel to certain areas of the U.S., or countries where the GSM network uses a different frequency, hire a mobile phone, plug in their SIM Card and receive all their phone calls and SMS messages using their own usual number.

The GSM phone system used with a notebook PC and PC Card provides a comprehensive plug-and-play solution for communications on the go. Data and fax capabilities at 9600bps, along with special features like international roaming and Short Message Service (SMS) enable mobile users to connect easily and reliably when travelling from country to country. Keep in mind that data capabilities are not automatic–GSM service providers must implement this functionality for mobile users to take advantage of it. Data services can be Mobile Originated or Mobile Terminated. Mobile Originated (MO) implies that users can send data from a remote location using the GSM network. Mobile Terminated (MT) means users can receive data, faxes or SMS messages on their notebook using the GSM network.

GSM

Calls made with the second-generation GSM systems available at the end of 1999 – whether voice or data – occupied a single time slot only, offering a data rate of only 9.6 Kbit/s. In theory multiple time slots can be joined together for higher rates – in similar fashion to the aggregation of a pair of ISDN lines to double throughput. The subsequent introduction of High Speed Circuit Switched Data (HSCSD) – which required an extension to the GSM standard to introduce a new radio link protocol – allowed the use of all eight time slots to achieve data rates of up to 76.8 Kbit/s.

It was in 1993 that the first bilateral roaming agreements were established, allowing reciprocal access between foreign GSM networks. These free mobile users from concerns about the various foreign dialling tones, access codes, country codes and incompatible plugs. Once users turn on their phones and log onto the network, the system finds them. Users are able to make voice calls, collect email and receive database updates just as if they were at home.

Fax, data and SMS roaming were first introduced in 1995. SMS had originally been used to indicate that voice mail was waiting, operating in a similar manner to two-way paging. It subsequently evolved into a fully functional mobile electronic messaging system, allowing SMS messages – of up to 160 characters – to be viewed, logged, sent and received on a portable computer.

By the end of the millennium there were approaching 700 GSM mobile networks – spanning more than 100 countries across Europe, the Americas, Iceland, Asia, Africa and Australasia. Furthermore, the introduction of GSM satellite roaming had extended the service to areas where terrestrial coverage was not available. Underlying the entire system, ensuring that it functioned as a cohesive entity, were the various international roaming agreements and the Memorandum of Understanding (MoU) which defined the GSM standards and the different phases of its worldwide implementation.

However, circuit-switched data is a somewhat selfish way of using limited resources, especially when users are running bursty applications like web browsing. Packet switching, as employed on Ethernet networks and the Internet backbone, is a far more appropriate technology for allowing resources to be shared between multiple users simultaneously. Enter General Packet Radio Service (GPRS), an upgrade to GSM mobile networks that adds a packet-switched layer and is expected to deliver data rates between 21 and 100 Kbit/s. More importantly, GPRS will allow operators to charge by volume of data transferred instead of time connected. In theory, this means that users could be permanently connected to the Internet whilst mobile, but only pay for accessing email or newly requested web pages.

  • GSM Technology
  • GPRS Technology
  • 3G Technology
  • WAP Technology
  • Bluetooth technology
  • GPS Technology
  • Galileo
  • IEEE 802.11b
  • IEEE 802.11a
  • HiperLAN2
  • IEEE 802.11g
  • WiFi Access
  • WiMAX Technology
  • HSDPA
  • IEEE 802.11n

Filed Under: Mobile Communications

Latest Articles

How to Open Control Panel in Windows 8 and 8.1

The Control Panel in Windows 8 is one of the most important areas of the operating system. This is where all the programs are that help you configure different sections of your operating system. The programs in the control panel can help you find information about your system, configure power … [Read More...]

Disk Defragmenting with Task Scheduler in Windows XP for Computer Maintenance

Scheduling Disk Defragmentation is a little different, inasmuch as it doesn't appear in the default list of software displayed by the the Scheduled Task Wizard. In this case you need to click Browse and locate the program in the Windows/system32 folder. Select the frequency … [Read More...]

Preparation Strategies to Score Well in Oracle 1Z0-808 Exam

Oracle 1Z0-808 is a highly valuable test that is recognized globally. It is an Oracle certification exam that is not easy to pass. Proper preparation using the best resources is the only way to excel in it. Thus, you are preparing to take the Oracle 1Z0-808 exam. Well, that’s one of the best … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Remove PrivacyGaurd 2010

Recommended Antivirus Software: Spyware Doctor with Antivirus Recommeneded Remote Computer Repair Company: http://www.pcninja.com PrivacyGuard 2010 … [Read More...]

SCSI Internal Mounting

Identify an available 5.25in drive bay into which to mount the drive. If you must use mounting rails, screw the rails into the lower pair of … [Read More...]

5 Tips to Secure Your Computer While Working From Home

Introduction Since its discovery in November of 2019, COVID-19 has grown to become a worldwide pandemic, forcing many people into the safety of … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors