Typical Call Flow in GSM
The typical signaling sequences shows the following features-:
Location updating
Mobile call origination
Mobile call termination
Authentication and ciphering
Inter-MSC call handoff
Location Updating
The MS sends a location update request to VLR (new) via the BSS and MSC.
The VLR sends the location update message to HLR serving the MS which include the address of the VLR(new) and IMSI of the MS. This updating of HLR is not required if the new LA is served by the same VLR.
The service and security related data for the MS is downloaded to the new VLR.
The MS is sent an ackowledgement of successful location update.
The HLR requests the old VLR to delete data related to relocated MS.
Mobile Call Origination
Mobile call termination
The PSTN (public switched telephone network) user dials the MSISDN of the called user in GSM.
The LE routes the call to GMSC of the called user .
The GMSC uses the dialed MSISDN to determine the serving HLR for the GSM user and interrogates it to obtain the required routing number.
The HLR requests the current serving VLR for the called MSfor a MSRN (MS roaming number) so that the call can be routed to correct MSC.
The VLR passes the MSRN to the HLR.
The HLR passes the MSRN to the GMSC.
Using the MSRN the GMSC routes the call to the serving MSC.
The MSC interrogates the VLR for the current location area identity (LAI) for the MS.
The VLR provides LAI for the MS.
The MSC pages the MS via appropriate BSS. The MS responds to the page and sets up the neccessary signaling links.
When the BSS has established the neccessary radio links , the MSC is informed and the call is delivered to the MS.
When the MS answers the call , the connection is completed to the calling PSTN user.
Authentication and Encryption
At terminal location update , VLR sends IMSI to HLR
HLR returns security triplets (RAND,SRES,Kc) to the VLR.
For authentication and ciphering the VLR sends RAND to the MS.
Using stored A3 algorithm and secret key Ki stored in the SIM, and RAND provided by the VLR, the MS calculates the SRES and return it to VLR. Using A8 algorithm and Ki , the MS also calculates the cipher key Kc.
If the SRES returned by the MS matches with the stored SRES in the VLR , the VLR sends the cipher key Kc to the BTS which uses Kc for ciphering the radio path(downlink).
The MS uses it's Kc to cipher the radio path (uplink) using encryption algorithm A5.
Inter-MSC Handoff
BSC A informs MSC A that MS needs handover from BTS A to BTS B.
MSC A informs MSC B that handover from BTS A to BTS B is underway.
MSC A commands BSC A/BTS A to proceed with handover to BTS B.
BTS A commands MS to change to a specified channel on BTS B.
MS informs BTS B that it is on specified channel.
BTS B informs BSC A/MSC A that handover is complete.
MSC B informs MSC A that handover to BTS B is complete.