Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh.

Size: px
Start display at page:

Download "Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh."

Transcription

1 Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh. A Abstract-The current scenario in mobile networks is that we make use of one network or utmost two networks at a particular point of time using a single mobile unit. The goal of this paper is to utilize the benefits of any number of networks (Airtel, BSNL, etc.,) using a single SIM card. This is achieved by storing the user details in all the subscribed mobile network provider s HLRs. Normally a user details will be stored only in the HLR of the subscribed network provider. Hence the mobile station can access this one and only network by scanning and accessing that particular frequency. But when this user detail is stored in more than one network provider s HLR, the mobile station can scan and access all the respective networks where the user details are being stored. This principle is used for providing multiple mobile services using a single SIM mobile system. 4-digit Personal Identification Number (PIN). In order to unlock a card, the user must enter the PIN. If a PIN is entered incorrectly three times in a row, the card blocks itself and cannot be used. It can only be unlocked with an 8-digit Personal Unblocking Key (PUK), which is also stored on the SIM card. Index Terms: BSC, GMSC, GSM, IMEI, MSC I. GSM NETWORK ARCHITECTURE A. Mobile Station (MS) The Mobile Station (MS) is made up of two components: Mobile Equipment (ME) refers to the physical phone itself. The phone must be able to operate on a GSM network. Older phones operated on a single band only. The new phones are dual-band, triple-band, and even quad-band capability. A quad-band phone has the technical capability to operate on any GSM network worldwide. Each phone is uniquely identified by the International Mobile Equipment Identity (IMEI) number. This number is burned into the phone by the manufacturer. The IMEI can usually be found by removing the battery of the phone and reading the panel in the battery well. It is possible to change the IMEI on a phone to reflect a different IMEI. This is known as IMEI spoofing or IMEI cloning. This is usually done on stolen phones. The average user does not have the technical ability to change a phone's IMEI. Subscriber Identity Module (SIM) - The SIM is a small smart card that is inserted into the phone and carries information specific to the subscriber, such as IMSI, TMSI, Ki (used for encryption), Service Provider Name (SPN), and Local Area Identity (LAI). The SIM can also store phone numbers (MSISDN) dialled and received, the KC (used for encryption), phone books, and data for other applications. A SIM card can be removed from one phone, inserted into another GSM capable phone and the subscriber will get the same service as always. Each SIM card is protected by a Fig. 1. Base Transceiver Station (BTS) [1] Base Transceiver Station (BTS) - The BTS is the Mobile Station's access point to the network. It is responsible for carrying out radio communications between the network and the MS. It handles speech encoding, encryption, multiplexing (TDMA), and modulation/demodulation of the radio signals. It is also capable of frequency hopping. A BTS will have between 1 and 16 Transceivers (TRX), depending on the geography and user demand of an area. Each TRX represents one ARFCN. One BTS usually cover a single 120 degree sector of an area. Usually a tower with 3 BTSs will accommodate all 360 degrees around the tower. However, depending on geography and user demand of an area, a cell may be divided up into one or two sectors, or a cell may be serviced by several BTSs with redundant sector coverage. A BTS is assigned a Cell Identity. The cell identity is 16-bit number (double octet) that identifies that cell in a particular Location Area. The cell identity is part of the Cell Global Identification (CGI), which is discussed in the section about the Visitor Location Register (VLR). Fig Sector [1] 99

2 Base Station Controller (BSC) - The BSC controls multiple BTSs. It handles allocation of radio channels, frequency administration, power and signal measurements from the MS, and handovers from one BTS to another (if both BTSs are controlled by the same BSC). A BSC also functions as a funneler. It reduces the number of connections to the Mobile Switching Center (MSC) and allows for higher capacity connections to the MSC. Fig. 5 Mobile Switching Center [1] The interface between the BSC and the MSC is known as the A Interface Gateway Mobile Switching Center (GMSC) There is another important type of MSC, called a Gateway Mobile Switching Center (GMSC). The GMSC functions as a gateway between two networks. If a mobile subscriber wants to place a call to a regular landline, then the call would have to go through a GMSC in order to switch to the Public Switched Telephone Network (PSTN). Fig. 3 Base Station Controller [1] A BSC may be collocated with a BTS or it may be geographically separate. It may even be collocated with the Mobile Switching Center (MSC). The Base Transceiver Station (BTS) and the Base Station Controller (BSC) together make up the Base Station System (BSS). Fig. 6 Gateway Mobile Switching Center [1] For example, if a subscriber on the Cingular network wants to call a subscriber on a T-Mobile network, the call would have to go through a GMSC. Fig. 4 Base Station System [1] Mobile Switching Center (MSC) - The MSC is the heart of the GSM network. It handles call routing, call setup, and basic switching functions. An MSC handles multiple BSCs and also interfaces with other MSC's and registers. It also handles inner-bsc handcuffs as well as coordinates with other MSC's for inter-msc handoffs. Fig. 7 Connections between Two Networks [1] Home Location Register (HLR) - The HLR is a large database that permanently stores data about subscribers. The HLR maintains subscriber-specific information such as the 100

3 MSISDN, IMSI, and current location of the MS, roaming restrictions, and subscriber supplemental features. There is logically only one HLR in any given network, but generally speaking each network has multiple physical HLRs spread out across its network. Cell Global Identification (CGI) The CGI is a number that uniquely identifies a specific cell within its location area, network, and country. The CGI is composed of the MCC, MNC, LAI, and Cell Identity (CI) Visitor Location Register (VLR) - The VLR is a database that contains a subset of the information located on the HLR. It contains similar information as the HLR, but only for subscribers currently in its Location Area. There is a VLR for every Location Area. The VLR reduces the overall number of queries to the HLR and thus reduces network traffic. VLRs are often identified by the Location Area Code (LAC) for the area they service. Fig. 8 Visitor Location Register [1] Table 2 cell Global Identity [1] The VLR also has one other very important function: the assignment of a Temporary Mobile Subscriber Identity (TMSI). TMSIs are assigned by the VLR to a MS as it comes into its Location Area. TMSIs are unique to a VLR. TMSIs are only allocated when in cipher mode. Equipment Identity Register (EIR) - The EIR is a database that keeps track of handsets on the network using the IMEI. There is only one EIR per network. It is composed of three lists: the white list, the gray list, and the blacklist. The blacklist is a list if IMEIs that are to be denied service by the network for some reason. Reasons include the IMEI being listed as stolen or cloned or if the handset is malfunctioning or doesn't have the technical capabilities to operate on the network. The gray list is a list of IMEIs that are to be monitored for suspicious activity. This could include handsets that are behaving oddly or not performing as the network expects it to. The white list is an unpopulated list. That means if an IMEI is not on the black list or on the gray list, then it is considered good and is "on the white list". The interface between the MSC and the EIR is called the F Interface. [1] Location Area Code (LAC) A LAC is a fixed-length code (two octets) that identifies a location area within the network. Each Location Area is serviced by a VLR, so we can think of a Location Area Code (LAC) being assigned to a VLR. Location Area Identity (LAI) An LAI is a globally unique number that identifies the country, network provider, and LAC of any given Location Area, which coincides with a VLR. It is composed of the Mobile Country Code (MCC), the Mobile Network Code (MNC), and the Location Area Code (LAC). The MCC and the MNC are the same numbers used when forming the IMSI. Table 1 Location Area Identities (LAI) [1] Fig. 9 Equipment Identity Register [1] The authentication Center (AuC) - The AuC handles the authentication and encryption tasks for the network. The Auc stores the Ki for each IMSI on the network. It also generates crypto variables such as the RAND, SRES, and KC. Although 101

4 it is not required, the AuC is normally physically collocated with the HLR. Fig. 10 Authentication Center [1] There is one last interface that we haven't discussed. The interface between the HLR and a GMSC is called the C Interface. You will see it in the full network diagram below. This completes the introduction to the network architecture of a GSM network. Below you will find a network diagram with all of the components as well as the names of all of the interfaces. Fig. 11 Full GSM Network [1] II. EXISTING SYSTEM A smart space, such as smart sensor rooms, an office, or simply an area, requires a smart telephony network for an effective voice communication between users. Nowadays, modern Private Branch Exchange (PBX) system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically, i.e. people still need to make the call forwarding setting manually. They proposed a system with an algorithm named 2D location-aware for tracking a person in a smart space. According to the ever-changing environment, the system performs an on-the-fly configuration to provide a dynamic telephony network. In other words, they aimed to make all the telephones in the network available to every user in the smart space for receiving his phone calls without any manual call forwarding settings. Most people might have such kind of experience: try to get in touch with someone in a company by dialling its general phone number plus his extension number. After a few ring tones, the caller may only hear a voice message: Sorry, the person you are trying to reach is not available now. Please try again later or press 0 to leave a message. After a while, the caller may be lucky enough to reach the staff by calling again and again. This indeed requires too much time to find a person. No doubt, this problem can be easily resolved by providing every staff a wireless or cordless phone and the staff could be reached under most circumstances. Apparently, however, this solution brings out many other concerns as well, such as equipment costs, battery lifetime, interference and handover, etc. A smart space [3], such as smart sensor rooms, simply an office or even a whole building, is supposed to detect all the users in the space [4] and serve them. One of the important services they believe is the smart telephony network for an effective voice communication. Nowadays, modern Private Branch Exchange (PBX) [5] system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically, i.e. people still need to make the call forwarding setting manually. Hence they proposed a different solution to serve the same purpose. With their solution, their user would no longer miss a single call simply because all the telephones in the system belong to him/her. Their proposed system will assign each employee in the company a unique extension number, say 168 for Employee A. Obviously, while he/she is working on his/her working station, its phone s extension number is "168". Yet, he/she may leave from his/her desk for a conference room to have a discussion with Employee B. Their system would then automatically instruct PBX or IP-PBX switch to reassign a new extension number 168 to the phone nearest to Employee A, i.e. the phone in the conference room. Similarly, their system would execute the same procedure for Employee B too. Thus, the system will forward all their incoming calls to the phone in the conference room and therefore, these 2 employees, even away from their working stations, will not miss a single call throughout their discussion. If no fixed phone is located around them, the system will forward their incoming calls to their cellular phones automatically. Their system has two advantages comparing with other call forwarding systems and those are: users do not need to know any telephone number or activate the call forwarding service; and their system can be installed in some particular places where mobile phone is forbidden, such as a hospital.[2] III. PROPOSED SYSTEM The basic concept of this paper is that we become the subscriber of a mobile network to which we want to communicate. That is if we want to call a BSNL mobile system then we become a BSNL subscriber for that point of time until the communication is completed. Later if we want 102

5 to communicate an Airtel mobile system then we become the subscriber of Airtel for that communication instant. At present, a mobile station (MS) can receive and scan all the frequencies of radio frequency spectrum allocated for cellular networks. The cellular frequencies (BSNL, Airtel, and other similar mobile networks) can be received and scanned by a mobile station but cannot access all the frequencies. A mobile station can access only the frequency of the network provider to which it is subscribed. That is, the subscribed network provider will have the user details in the HLR which is attached to the MSC, which will make the mobile station as a subscribed unit under that mobile network so that the mobile unit can access its frequency. So we propose that if the user detail of a particular mobile system is present in multiple HLRs of different mobile networks, then that particular mobile system can get access to the mobile networks where its details are stored in the respective HLRs. The below figure 3 shows an example of the proposed concept. At this point of time, we assume that the user detail of a mobile system is present in the HLRs of two network providers (BSNL and Airtel). number of mobile networks. The drawbacks of the existing system and benefits of this proposed concept are listed below. IV. DRAWBACKS OF EXISTING SYSTEM A. Customer s Side: Network coverage Cost of services (Call, SMS, data, etc.) Need for dual/triple SIM mobile phones B. Mobile phone manufacturer s Side: Huge investments in R&D for developing dual/triple SIM phones High end single SIM mobile (iphone 4s) is affordable, but not preferred by corporate people C. Network provider s Side: Loss of customers because of one of their bad service V. BENEFITS OF PROPOSED CONCEPT A. Customer s Side: In case of emergency Choosing the cheapest service Can use the existing single SIM mobile phone B. Mobile phone manufacturer s Side: Can invest a lot in developing the User Interface and other software areas C. Network provider s Side: Gain of customers because of one of their best service Fig. 12 Proposed Model Let us assume that a mobile system is in a cell which consists of BTS (towers) of both BSNL and Airtel mobile networks. Case 1: (If we want to communicate to BSNL customer) The mobile system is made to scan the frequency spectrum to find and get access to BSNL network as we are going to communicate to a BSNL customer. Now the mobile system will get access to the BSNL network as the user detail of this mobile unit ( ) exists in the HLR of BSNL s MSC. Now we can communicate with any BSNL customer at a considerably low cost compared to other network providers as this communication is considered to be within the BSNL s network. Case 2: (If we want to communicate to Airtel customer) The mobile system is made to scan the frequency spectrum to find and get access to Airtel network as we are going to communicate to an Airtel customer. Now the mobile system will get access to the Airtel network as the user detail of this mobile unit ( ) exists in the HLR of Airtel s MSC. Now we can communicate with any Airtel customer at a considerably low cost compared to other network providers as this communication is considered to be within the Airtel s network. This proposed concept can be extended to any REFERENCES [1] twork_architecture [2] Heng-Chih Huang, Yueh-Min Huang, And Kuan- Chieh Chiu, A Location-Aware Call Forwarding Manager System For A Smart Telephony Network Of The Smart Space, International Journal On Smart Sensing And Intelligent Systems, Vol. 2, No. 1, March 2009 [3] Gu, H.-L., Shi, Y.-C., Xu, G.-Y., He, W.-S., Zhang, B.-P., SLAP: a Location-aware Software Infrastructure for Smart Space, SEUS Third IEEE Workshop on (2005), [4] Liyanage C De Silva, Audiovisual Sensing Of Human Movements For Home-Care And Security In A Smart Environment, International Journal On Smart Sensing and Intelligent Systems, Volume. 1, Issue 1, (2008), [5] Du, A.T., Private PBX networks: Cost effective communications solutions, 3rd AFRICON Conference (1992) AUTHOR S PROFILE Boobalan P B.Tech., M.Tech., MISTE, Ph.D Assistant Professor, Department of Information Technology, 103

6 Pondicherry Engineering College Publications: ISSN: "Enhancement of Path-Based QoS Provisioning for Optical Burst Switching Networks", IJITE ISSN: , Vol 3, "Improving QoS Aware Active Queue Management Scheme for Multimedia Services", IJITE ISSN: , Vol 3, "Delayed Reservation Differential Service for Multimedia Traffic in Optical Burst Switched Networks", IJCSE ISSN : , Vol 3, "Controlling Burst Loss Ratio in OBS Using Feedback Control and Dynamic Techniques", IJCSE ISSN : , Vol 3, 2011 Research work: 1. "Modelling A Multimedia Traffic For Burst Assembly", "Improving Transmission Speed of Multimedia Data Traffic over Optical Burst Swiching Networks", "Improving QoS for Multimedia Traffic over Optical Burst Switching Networks", "Improving TCP Performance Over OBS Networks using Multi-Queue Burst Assembly Scheme", 2009 Krishna P Final year, B.Tech, Information Technology, Pondicherry Engineering College Udhayakumar P Final year, B.Tech, Information Technology, Pondicherry Engineering College Santhosh A Final year, B.Tech, Information Technology, Pondicherry Engineering College 104

Chapter 3 GSM and Similar Architectures

Chapter 3 GSM and Similar Architectures CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Pertemuan 7 GSM Network. DAHLAN ABDULLAH

Pertemuan 7 GSM Network. DAHLAN ABDULLAH Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

GSM System Overview. Ph.D. Phone Lin.

GSM System Overview. Ph.D. Phone Lin. GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

Internal. GSM Fundamentals.

Internal. GSM Fundamentals. Internal GSM Fundamentals www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Chapter 1 GSM System Overview Chapter 2 GSM Network Structure Chapter 3 Service Area and Number Planning Chapter

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives Recap of previous modules Basic functions of Network Sub System Entities that form NSS namely MSC,GMSC,HLR and VLR Functions

More information

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: ) E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology

More information

Security of Cellular Networks: Man-in-the Middle Attacks

Security of Cellular Networks: Man-in-the Middle Attacks Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%

More information

Communication Networks 2 Signaling 2 (Mobile)

Communication Networks 2 Signaling 2 (Mobile) Communication Networks 2 Signaling 2 (Mobile) Gusztáv Adamis BME TMIT 2017 GSM signaling Signaling of GSM is based on the ISDN signaling systems SS7/DSS1 But, because of mobility, roaming, radio access

More information

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS

More information

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION The most important part of any project i.e., implementation. It describes the various functionalities step by step under each module with their outputs.

More information

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 8: GSM Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline

More information

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013 Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions

More information

Mobile Communications

Mobile Communications Mobile Communications 3GPP Public Land Mobile Networks: GSM, GPRS Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 What is the architecture of the GSM network network elements, interfaces,

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only E3-E4 (CM MODULE) CDMA 2000 1x & EV-DO WELCOME This is a presentation for the E3-E4 Technical (CM- Module)fortheTopic:CDMA20001x&EV-DO Eligibility: Those who have got the upgradation frome3toe4. This presentation

More information

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

COMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2

COMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2 COMP327 Mobile Computing Session: 2016-2017 Lecture Set 5 - Wireless Communication Part 2 51 SIM (Subscriber Identity Modules) Smart cards that are inserted into the GSM phone to identify the user Stores

More information

Designing Authentication for Wireless Communication Security Protocol

Designing Authentication for Wireless Communication Security Protocol Designing Authentication for Wireless Communication Security Protocol Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi Abstract Security is considered an important issue for mobile

More information

Mobility and Security Management in the GSM System

Mobility and Security Management in the GSM System IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 ISBN: 2878-8719 PP 13-18 National Symposium on engineering and Research Mobility and Security Management in the GSM System 1 Mr. Yogesh S. Amle 2 Mr.

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

GSM Mobility Management

GSM Mobility Management GSM Mobility Management Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Location Update Basic Call Origination and Termination Procedures Mobility Databases Failure Restoration

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

Sniffer. J.DEEPTHI Associate Professor & HOD, Department of CSE,

Sniffer. J.DEEPTHI Associate Professor & HOD, Department of CSE, EDULAKANTI KAVYA B.Tech Student, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill), Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. Edulakanti Kavya* et al. Sniffer Mr. T. PAVAN KUMAR Associate

More information

Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography.

Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography. Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography T K Mohanta 1, R K Samantaray 2, S Panda 3 1. Dept.of Electronics & Communication.Engg, Sudhananda Engg & Research

More information

Wireless Communications

Wireless Communications Wireless Communications Lecture 6: Mobility Management Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr.-Ing. Bin Han binhan@eit.uni-kl.de Institute of Wireless

More information

Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning

Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning Getting paid Prevent (limit) subscriber fraud Ensure accurate clearing with other operators Reduce churn Ensure

More information

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm.

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Garba S. (1), Abdu-Aguye U.-F., Raubilu A.A., Ibrahim Y. Department of Electrical and Computer Engineering,

More information

28 Deploying IN Services in a Mobile Environment

28 Deploying IN Services in a Mobile Environment 28 Deploying IN Services in a Mobile Environment D. Haran Comverse Network Systems 170 Crossways Park Drive, Woodbury, New York 11797 USA Tel: (516) 677-7200, Fax: (516) 677-7355 E-mail danny_haran@comverse.com

More information

Technical description of international mobile roaming May 2010

Technical description of international mobile roaming May 2010 Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of

More information

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice

More information

Data and Voice Signal Intelligence Interception Over The GSM Um Interface

Data and Voice Signal Intelligence Interception Over The GSM Um Interface ISSN (Online): 2394-3858 ISSN (Print): 2394-3866 International Journal of Research and Innovations in Science & Technology, SAINTGITS College of Engineering, INDIA www.journals.saintgits.org Research paper

More information

Quad BRI GSM Gateway with 8 GSM Ports

Quad BRI GSM Gateway with 8 GSM Ports Quad BRI GSM Gateway with 8 GSM Ports HG-2000/3U Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-2000/3U 3 Contents

More information

Mobile Security / /

Mobile Security / / Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G,

More information

ETSI ETR 341 TECHNICAL December 1996 REPORT

ETSI ETR 341 TECHNICAL December 1996 REPORT ETSI ETR 341 TECHNICAL December 1996 REPORT Source: ETSI DECT Reference: DTR/RES-03058 ICS: 33.020 Key words: DECT, GSM, DSS1, ISDN Radio Equipment and Systems (RES); Digital Enhanced Cordless Telecommunications/

More information

Integration of voice and data in an m-commerce situation

Integration of voice and data in an m-commerce situation Integration of voice and data in an m-commerce situation Master Thesis 26 January, 2001 Fredrik Oljeqvist d96-fol@nada.kth.se Assignor Examiner Academic supervisor Industrial supervisor Benefactor Location

More information

A Survey on Cost Effective Survivable Network Design in Wireless Access Network

A Survey on Cost Effective Survivable Network Design in Wireless Access Network A Survey on Cost Effective Survivable Network Design in Wireless Access Network K.Rajalakshmi and Krishna Gopal Department of Computer Science, Jaypee Institute of Information Technology, Noida ABSTRACT

More information

RF OPTIMIZATION FOR QUALITY IMPROVEMENT IN GSM NETWORK

RF OPTIMIZATION FOR QUALITY IMPROVEMENT IN GSM NETWORK International Journal of Electrical Engineering & Technology (IJEET) Volume 6, Issue 8, Sep-Oct, 2015, pp.53-62, Article ID: IJEET_06_08_006 Available online at http://www.iaeme.com/ijeetissues.asp?jtype=ijeet&vtype=6&itype=8

More information

A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK

A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 63 67 A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK

More information

3G TS V3.1.0 ( )

3G TS V3.1.0 ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Organization of subscriber data () The present document has been developed within the 3 rd Generation

More information

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013 Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session

More information

Understanding Carrier Wireless Systems

Understanding Carrier Wireless Systems Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding

More information

Chapter 2 The 3G Mobile Communications

Chapter 2 The 3G Mobile Communications Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

ETSI TS V6.4.0 ( )

ETSI TS V6.4.0 ( ) TS 100 526 V6.4.0 (2000-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Organization of subscriber data (GSM 03.08 version 6.4.0 Release 1997) GLOBAL SYSTEM FOR MOBILE

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 2: Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Sep. 2006 1 Outline Introduction

More information

Evolution from GSM to UMTS

Evolution from GSM to UMTS 2 Evolution from GSM to UMTS Evolution is one of the most common terms used in the context of UMTS. Generally it is understood to mean the technical evolution, i.e. how and what kind of equipment and in

More information

Section 4 GSM Signaling BSSMAP

Section 4 GSM Signaling BSSMAP Section 4 GSM Signaling BSSMAP BSS management messages (BSSMAP) between MSC and BSS (BSC/ BTS), which are necessary for resource management, handover control, paging order etc. The BSSMAP messages can

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless

More information

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003

More information

Short Message Service (SMS)

Short Message Service (SMS) TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers

More information

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced

More information

Mobile Advantage Wireless Office A digital wireless office system for TDMA/136 networks

Mobile Advantage Wireless Office A digital wireless office system for TDMA/136 networks Mobile Advantage Wireless Office A digital wireless office system for TDMA/136 networks Rune Johanson, Mikael Nilsson and Torbjörn Ward Ericsson s digital wireless office system was developed especially

More information

1 Wireless Network Architecture

1 Wireless Network Architecture CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects

More information

ETSI TS V7.1.0 ( )

ETSI TS V7.1.0 ( ) TS 100 522 V7.1.0 (2000-02) Technical Specification Digital cellular telecommunications system (Phase 2+); Network architecture (GSM 03.02 version 7.1.0 Release 1998) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS

More information

GSM System Protocol Architecture

GSM System Protocol Architecture GSM System Protocol Architecture References: Jörg Erbespächer, Hans Jörg Vogel, Christian Bettstetter, GSM: Switching services and protocols, Wiley 2001, ISBN 0-471-499903-X Schiller: Mobile communications,

More information

Chapter 3: GSM Mobility Management

Chapter 3: GSM Mobility Management Chapter 3: GSM Mobility Management (18 Marks) GSM Location Update Mobility Databases Failure Restoration - VLR Failure Restoration, HLR Failure Restoration VLR Identification Algorithm VLR Overflow Control

More information

UNIT II NETWORKING

UNIT II NETWORKING UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

Opportunities and Challenges in India s Growing Computing and Wireless Broadband Market

Opportunities and Challenges in India s Growing Computing and Wireless Broadband Market Opportunities and Challenges in India s Growing Computing and Wireless Broadband Market Abhay Karandikar Department of Electrical Engineering IIT Bombay 1 Digital Divide Second Largest Telecom Market-600

More information

Security issues in mobile communications

Security issues in mobile communications University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 1994 Security issues in mobile communications Chenthurvasan Duraiappan

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room

More information

UMTS Addresses and Identities Mobility and Session Management

UMTS Addresses and Identities Mobility and Session Management UMTS Addresses and Identities Mobility and Session Management - Numbering, addressing and location identities - UE modes - Mobility management - Session management and QoS Numbering, Addressing and Location

More information

Client Server Programming and GSM Networking Protocols (SS7 Signaling)

Client Server Programming and GSM Networking Protocols (SS7 Signaling) Client Server Programming and GSM Networking Protocols (SS7 Signaling) Synopsis Getting the Right Knowledge to the Right People at the Right Time Our interactive, accelerated learning experience teaches

More information

WELCOME Mobile Applications Testing. Copyright

WELCOME Mobile Applications Testing. Copyright WELCOME Mobile Applications Testing 1 Mobile Applications Testing List of MUST HAVE to survive this class Required Google Drive account Google email Flash Drive Mobile Phone (iphone/android) Desired Have

More information

TELE4652 Mobile and Satellite Communication Systems

TELE4652 Mobile and Satellite Communication Systems TELE4652 Mobile and Satellite Communication Systems Lecture 9 GSM GSM, the Global System for Mobile Communications, was the second generation mobile cellular standard developed as a pan-european standard.

More information

DraftETSI EN V5.3.0 ( )

DraftETSI EN V5.3.0 ( ) Draft EN 300 927 V5.3.0 (2000-07) European Standard (Telecommunications series) Digital cellular telecommunications system (Phase 2+); Numbering, addressing and identification (GSM 03.03 version 5.3.0

More information

SMARTPHONES AND MOBILE PHONE TECHNOLOGY MOBILE TECHNOLOGY BASICS. Lecture: 2 Instructor Mazhar Hussain

SMARTPHONES AND MOBILE PHONE TECHNOLOGY MOBILE TECHNOLOGY BASICS. Lecture: 2 Instructor Mazhar Hussain SMARTPHONES AND MOBILE PHONE TECHNOLOGY MOBILE TECHNOLOGY BASICS Lecture: 2 Instructor Mazhar Hussain WIRELESS AND MOBILE COMMUNICATION Blog https://mazharhussainatisp.wordpress.com Email: Mazhar.hussain@isp.edu.pk

More information

Method and Device to Communicate via SMS After a Security Intrusion

Method and Device to Communicate via SMS After a Security Intrusion Abstract Method and Device to Communicate via SMS After a Security Intrusion Vishy Karri 1, Daniel J.S. Lim 2 School of Engineering, University of Tasmania Hobart, Australia Vishy.Karri@utas.edu.au & jsdlim@utas.edu.au

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15

More information

Security Management System of Cellular Communication: Case Study

Security Management System of Cellular Communication: Case Study Security Management System of Cellular Communication: Case Study Othman O. Khalifa, Abdulrazzag Aburas, A. Al Bagul, Meftah Hrairi, Muhammad Shahril bin Shahbuddin, and Harman bin Mat Kasa Abstract Cellular

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Volume 1 Issue 6 (July 2014)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Volume 1 Issue 6 (July 2014) HOME APPLIANCE CONTROL FOR USERS WITH MOTOR DISABILITIES USING SMART PHONE Shruthi.J 1, Ramya.S 2, Bharathi.R 3 Department of Computer Science and Engineering, BMSIT, Bangalore-64 Abstract In our surroundings,

More information

Moving Forward on MEID. March, Contacts Bill Dahnke, David Crowe A RCA Webinar

Moving Forward on MEID. March, Contacts Bill Dahnke, David Crowe A RCA Webinar Moving Forward on MEID March, 2008 Contacts Bill Dahnke, David Crowe meid@cdg.org d A RCA Webinar Moving Forward on MEID Mobile devices must be identified by a unique code for a variety of reasons. The

More information

Hypermedia HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description January 2013

Hypermedia HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description January 2013 Hypermedia HG-4000/3U VoIP GSM Gateway Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description January 2013 Contents Next Page Hypermedia HG-4000/3U 2 Contact Information

More information

Implementing Mobile Virtual Network Operations in Bangladesh

Implementing Mobile Virtual Network Operations in Bangladesh WWW.JOURNALOFCOMPUTING.ORG 39 Implementing Mobile Virtual Network Operations in Bangladesh Md. Whaiduzzaman and Mahfuzul Hoque Bhuiyan Abstract Infact, a full MVNO consists of a Home Location Register

More information

Hands-On Modern Mobile and Long Term Evolution LTE

Hands-On Modern Mobile and Long Term Evolution LTE Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation

More information

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

Chapter 10: Wireless Networking. School of information science and Engineering, SDU Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 101 377-3-2 V1.1.1 (2001-03) Technical Specification GEO-Mobile Radio Interface Specifications; Part 3: Network specifications; Sub-part 2: Network Architecture; GMR-2 03.002 2 TS 101 377-3-2 V1.1.1

More information

Mobile Systems Challenges in Next Generation Networks

Mobile Systems Challenges in Next Generation Networks International Journal of Future Generation Communication and Networking 15 Mobile Systems Challenges in Next Generation Networks Seyed Ali Alavian, Jahangir Dadkhah Chimeh Faculty of Applied Science of

More information

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE

More information

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3! 20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients

More information

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Diminishing Signaling Traffic for Authentication in Mobile Communication System

Diminishing Signaling Traffic for Authentication in Mobile Communication System Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,

More information

The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility

The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility Table of content On-site Wireless telephony on your IP Network 3 Key Applications 6 10 reasons for Business Mobility

More information

Please refer to the usage guidelines at or alternatively contact

Please refer to the usage guidelines at  or alternatively contact Irving, Philip and Ochang, Pascal A (2016) Evolutionary Analysis of GSM, UMTS and LTE Mobile Network Architectures. World Scientific News, 54. pp. 27-39. ISSN 2392-2192 Downloaded from: http://sure.sunderland.ac.uk/7512/

More information

University of Agder Department of Information and Communication Technology EXAM

University of Agder Department of Information and Communication Technology EXAM University of Agder Department of Information and Communication Technology EXAM Course code: IKT 444 Course title: Mobile Communication Networks Date: Tuesday, 6 th December 2016 Duration: 09:00 13:00

More information