The Operations Support System is a conglomeration of processes, data, applications, and tech that allows providers to manage their network. Carriers can use their OSS to:. GSM networks are now three decades old, and there are three generations of cellular networks with far higher data transfer rates, more secure connections, and advanced networking capabilities.
Over the years, telecommunications organizations have implemented upgrades to get more mileage out of GSM-based networks, but in several countries 2G is coming to an end. Modern IoT manufacturers need to evaluate whether 2G connectivity is still a viable option for their application in the region where they want to deploy. While many parts of the world still use 2G networks , cellular carriers began sunsetting their 2G networks as early as This is because the radio frequency RF spectrum is a finite resource, and 2G networks are using parts of the spectrum that could be better used by more advanced technologies.
Think of the RF spectrum like a theater with limited seating. Now, cellular providers are changing the reservations so that their 3G, 4G, and 5G networks can occupy these seats. Other countries who are not as far with deploying newer standards may still use 2G as the main connectivity option. So it can still be useful to design a device that can connect to GSM networks. GSM played a foundational role in modern cellular communications. And while some operators are transitioning to newer networks, this technology is still immensely popular for its global availability and extremely low-cost connectivity.
Need help connecting your devices? It is a network of neighboring radio cells which provide a complete coverage of the service area. Base Station Controller : It controls operation of one more Base Transceiver Stations, basically the handover or power control. It consists of a database comprising the whole maintenance status of the BTS, quality of radio and terrestrial resources and BTS operations software. It compresses or decompresses speech from the mobile station. However, it is not used for data connections.
Network Switching Subsystem : It provides the complete set of control and database functions needed to set up a call using encryption, authentication and roaming features. It basically provides network connection to the Mobile Station.
It consists of the below given elements. Apart from the normal functionary, it supports additional functionality like registration, authentication, call location and call routing to the subscriber.
Home Location Register : It is a repository which stores data belonging to large number of subscribers. It is basically a large database which administers data of each subscriber. It comes to act in case of roaming where a subscriber moves from one location to another.
Frequency Division Multiple Access: It involves dividing a frequency band into multiple bands such that each sub-divided frequency band is allotted to a single subscriber. Each base station is allotted one or more carrier frequencies.
Time Division Multiple Access: It involves allotting same frequency channel to different subscribers by dividing the frequency band into multiple time slots. Each TDMA frame lasts for 4. Each time slot or a physical channel within this frame lasts for microseconds and data is transmitted in the time slot in form of bursts. It also contains the Equipment Identity Register which maintains an account of all the mobile equipment wherein each mobile is identified by its own IMEI number.
This subsystem includes two elements which are discussed below. This controller manages the resources of radio to control different items like handover in the collection of BTSs, assigns channels. It converses with the Base Transceiver Stations over Abis interface. The subsystem element in the base station of the GSM network uses the radio allowable technology to allow a number of operators to right to use the system concurrently.
Every channel supports up to 8 operators by allowing a base station to include different channels; a huge number of operators could be accommodated through every base station. These are located carefully through the provider of the network to allow whole area coverage.
This area can be enclosed with a base station that is often being called a cell. Because it is not achievable to stop the signals from overlapping into the nearby cells and channels which are used in single-cell are not utilized in the next.
It is the mobile phone which consists of the transceiver, the display, and the processor and is controlled by a SIM card operating over the network. At present, their dimension has reduced radically whereas the functionality level has very much increased.
And one more benefit is that the time among charges has drastically enlarged. The mobile station includes a number called the IMEI. It is accessed by the network during registration to check whether the equipment has been reported as stolen.
It should be noted down that when the number of BS enhances through the subscriber population scaling then some of the preservation tasks are moved to the base transceiver stations so that the ownership cost of the system can be reduced. The GSM network architecture of 2G mainly follows a logical technique of operation.
This is very simple as compared with present architectures of mobile phone network which utilize software-defined units to allow extremely supple operation. When the GSM system is digital, then the network is a data network. The security strategies standardized for the GSM system make it the most secure telecommunications standard currently accessible.
Although the confidentiality of a call and secrecy of the GSM subscriber is just ensured on the radio channel, this is a major step in achieving end-to-end security. A GSM modem is a device that can be either a mobile phone or a modem device that can be used to make a computer or any other processor communicate over a network.
It can be connected to a computer through serial, USB, or Bluetooth connection. The GSM modem has a wide range of applications in transaction terminals, supply chain management, security applications, weather stations, and GPRS mode remote data logging.
These days, the GSM mobile terminal has become one of the items that are constantly with us. The requirement for a person to be reachable or to call anyone at any time is very appealing. This project, as the name says the project is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access to appliances and allowing breach control at home.
The system proposes two sub-systems. The appliance control subsystem enables the user to control home appliances remotely and the security alert subsystem gives automatic security monitoring. The second aspect is that of security alert which is achieved in a way that on the detection of intrusion, the system allows automatic generation of SMS thus alerting the user against security risk.
GSM technology will allow communication anywhere, anytime, and with anyone. The functional architecture of GSM employing intelligent networking principles, and its ideology, which provides the development of GSM is the first step towards a true personal communication system that enough standardization to ensure compatibility.
In both situations, the only way which can provide a solution is by using the mobile communication system.
0コメント