Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh.
|
|
- Rosa Bradley
- 6 years ago
- Views:
Transcription
1 Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh. A Abstract-The current scenario in mobile networks is that we make use of one network or utmost two networks at a particular point of time using a single mobile unit. The goal of this paper is to utilize the benefits of any number of networks (Airtel, BSNL, etc.,) using a single SIM card. This is achieved by storing the user details in all the subscribed mobile network provider s HLRs. Normally a user details will be stored only in the HLR of the subscribed network provider. Hence the mobile station can access this one and only network by scanning and accessing that particular frequency. But when this user detail is stored in more than one network provider s HLR, the mobile station can scan and access all the respective networks where the user details are being stored. This principle is used for providing multiple mobile services using a single SIM mobile system. 4-digit Personal Identification Number (PIN). In order to unlock a card, the user must enter the PIN. If a PIN is entered incorrectly three times in a row, the card blocks itself and cannot be used. It can only be unlocked with an 8-digit Personal Unblocking Key (PUK), which is also stored on the SIM card. Index Terms: BSC, GMSC, GSM, IMEI, MSC I. GSM NETWORK ARCHITECTURE A. Mobile Station (MS) The Mobile Station (MS) is made up of two components: Mobile Equipment (ME) refers to the physical phone itself. The phone must be able to operate on a GSM network. Older phones operated on a single band only. The new phones are dual-band, triple-band, and even quad-band capability. A quad-band phone has the technical capability to operate on any GSM network worldwide. Each phone is uniquely identified by the International Mobile Equipment Identity (IMEI) number. This number is burned into the phone by the manufacturer. The IMEI can usually be found by removing the battery of the phone and reading the panel in the battery well. It is possible to change the IMEI on a phone to reflect a different IMEI. This is known as IMEI spoofing or IMEI cloning. This is usually done on stolen phones. The average user does not have the technical ability to change a phone's IMEI. Subscriber Identity Module (SIM) - The SIM is a small smart card that is inserted into the phone and carries information specific to the subscriber, such as IMSI, TMSI, Ki (used for encryption), Service Provider Name (SPN), and Local Area Identity (LAI). The SIM can also store phone numbers (MSISDN) dialled and received, the KC (used for encryption), phone books, and data for other applications. A SIM card can be removed from one phone, inserted into another GSM capable phone and the subscriber will get the same service as always. Each SIM card is protected by a Fig. 1. Base Transceiver Station (BTS) [1] Base Transceiver Station (BTS) - The BTS is the Mobile Station's access point to the network. It is responsible for carrying out radio communications between the network and the MS. It handles speech encoding, encryption, multiplexing (TDMA), and modulation/demodulation of the radio signals. It is also capable of frequency hopping. A BTS will have between 1 and 16 Transceivers (TRX), depending on the geography and user demand of an area. Each TRX represents one ARFCN. One BTS usually cover a single 120 degree sector of an area. Usually a tower with 3 BTSs will accommodate all 360 degrees around the tower. However, depending on geography and user demand of an area, a cell may be divided up into one or two sectors, or a cell may be serviced by several BTSs with redundant sector coverage. A BTS is assigned a Cell Identity. The cell identity is 16-bit number (double octet) that identifies that cell in a particular Location Area. The cell identity is part of the Cell Global Identification (CGI), which is discussed in the section about the Visitor Location Register (VLR). Fig Sector [1] 99
2 Base Station Controller (BSC) - The BSC controls multiple BTSs. It handles allocation of radio channels, frequency administration, power and signal measurements from the MS, and handovers from one BTS to another (if both BTSs are controlled by the same BSC). A BSC also functions as a funneler. It reduces the number of connections to the Mobile Switching Center (MSC) and allows for higher capacity connections to the MSC. Fig. 5 Mobile Switching Center [1] The interface between the BSC and the MSC is known as the A Interface Gateway Mobile Switching Center (GMSC) There is another important type of MSC, called a Gateway Mobile Switching Center (GMSC). The GMSC functions as a gateway between two networks. If a mobile subscriber wants to place a call to a regular landline, then the call would have to go through a GMSC in order to switch to the Public Switched Telephone Network (PSTN). Fig. 3 Base Station Controller [1] A BSC may be collocated with a BTS or it may be geographically separate. It may even be collocated with the Mobile Switching Center (MSC). The Base Transceiver Station (BTS) and the Base Station Controller (BSC) together make up the Base Station System (BSS). Fig. 6 Gateway Mobile Switching Center [1] For example, if a subscriber on the Cingular network wants to call a subscriber on a T-Mobile network, the call would have to go through a GMSC. Fig. 4 Base Station System [1] Mobile Switching Center (MSC) - The MSC is the heart of the GSM network. It handles call routing, call setup, and basic switching functions. An MSC handles multiple BSCs and also interfaces with other MSC's and registers. It also handles inner-bsc handcuffs as well as coordinates with other MSC's for inter-msc handoffs. Fig. 7 Connections between Two Networks [1] Home Location Register (HLR) - The HLR is a large database that permanently stores data about subscribers. The HLR maintains subscriber-specific information such as the 100
3 MSISDN, IMSI, and current location of the MS, roaming restrictions, and subscriber supplemental features. There is logically only one HLR in any given network, but generally speaking each network has multiple physical HLRs spread out across its network. Cell Global Identification (CGI) The CGI is a number that uniquely identifies a specific cell within its location area, network, and country. The CGI is composed of the MCC, MNC, LAI, and Cell Identity (CI) Visitor Location Register (VLR) - The VLR is a database that contains a subset of the information located on the HLR. It contains similar information as the HLR, but only for subscribers currently in its Location Area. There is a VLR for every Location Area. The VLR reduces the overall number of queries to the HLR and thus reduces network traffic. VLRs are often identified by the Location Area Code (LAC) for the area they service. Fig. 8 Visitor Location Register [1] Table 2 cell Global Identity [1] The VLR also has one other very important function: the assignment of a Temporary Mobile Subscriber Identity (TMSI). TMSIs are assigned by the VLR to a MS as it comes into its Location Area. TMSIs are unique to a VLR. TMSIs are only allocated when in cipher mode. Equipment Identity Register (EIR) - The EIR is a database that keeps track of handsets on the network using the IMEI. There is only one EIR per network. It is composed of three lists: the white list, the gray list, and the blacklist. The blacklist is a list if IMEIs that are to be denied service by the network for some reason. Reasons include the IMEI being listed as stolen or cloned or if the handset is malfunctioning or doesn't have the technical capabilities to operate on the network. The gray list is a list of IMEIs that are to be monitored for suspicious activity. This could include handsets that are behaving oddly or not performing as the network expects it to. The white list is an unpopulated list. That means if an IMEI is not on the black list or on the gray list, then it is considered good and is "on the white list". The interface between the MSC and the EIR is called the F Interface. [1] Location Area Code (LAC) A LAC is a fixed-length code (two octets) that identifies a location area within the network. Each Location Area is serviced by a VLR, so we can think of a Location Area Code (LAC) being assigned to a VLR. Location Area Identity (LAI) An LAI is a globally unique number that identifies the country, network provider, and LAC of any given Location Area, which coincides with a VLR. It is composed of the Mobile Country Code (MCC), the Mobile Network Code (MNC), and the Location Area Code (LAC). The MCC and the MNC are the same numbers used when forming the IMSI. Table 1 Location Area Identities (LAI) [1] Fig. 9 Equipment Identity Register [1] The authentication Center (AuC) - The AuC handles the authentication and encryption tasks for the network. The Auc stores the Ki for each IMSI on the network. It also generates crypto variables such as the RAND, SRES, and KC. Although 101
4 it is not required, the AuC is normally physically collocated with the HLR. Fig. 10 Authentication Center [1] There is one last interface that we haven't discussed. The interface between the HLR and a GMSC is called the C Interface. You will see it in the full network diagram below. This completes the introduction to the network architecture of a GSM network. Below you will find a network diagram with all of the components as well as the names of all of the interfaces. Fig. 11 Full GSM Network [1] II. EXISTING SYSTEM A smart space, such as smart sensor rooms, an office, or simply an area, requires a smart telephony network for an effective voice communication between users. Nowadays, modern Private Branch Exchange (PBX) system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically, i.e. people still need to make the call forwarding setting manually. They proposed a system with an algorithm named 2D location-aware for tracking a person in a smart space. According to the ever-changing environment, the system performs an on-the-fly configuration to provide a dynamic telephony network. In other words, they aimed to make all the telephones in the network available to every user in the smart space for receiving his phone calls without any manual call forwarding settings. Most people might have such kind of experience: try to get in touch with someone in a company by dialling its general phone number plus his extension number. After a few ring tones, the caller may only hear a voice message: Sorry, the person you are trying to reach is not available now. Please try again later or press 0 to leave a message. After a while, the caller may be lucky enough to reach the staff by calling again and again. This indeed requires too much time to find a person. No doubt, this problem can be easily resolved by providing every staff a wireless or cordless phone and the staff could be reached under most circumstances. Apparently, however, this solution brings out many other concerns as well, such as equipment costs, battery lifetime, interference and handover, etc. A smart space [3], such as smart sensor rooms, simply an office or even a whole building, is supposed to detect all the users in the space [4] and serve them. One of the important services they believe is the smart telephony network for an effective voice communication. Nowadays, modern Private Branch Exchange (PBX) [5] system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically, i.e. people still need to make the call forwarding setting manually. Hence they proposed a different solution to serve the same purpose. With their solution, their user would no longer miss a single call simply because all the telephones in the system belong to him/her. Their proposed system will assign each employee in the company a unique extension number, say 168 for Employee A. Obviously, while he/she is working on his/her working station, its phone s extension number is "168". Yet, he/she may leave from his/her desk for a conference room to have a discussion with Employee B. Their system would then automatically instruct PBX or IP-PBX switch to reassign a new extension number 168 to the phone nearest to Employee A, i.e. the phone in the conference room. Similarly, their system would execute the same procedure for Employee B too. Thus, the system will forward all their incoming calls to the phone in the conference room and therefore, these 2 employees, even away from their working stations, will not miss a single call throughout their discussion. If no fixed phone is located around them, the system will forward their incoming calls to their cellular phones automatically. Their system has two advantages comparing with other call forwarding systems and those are: users do not need to know any telephone number or activate the call forwarding service; and their system can be installed in some particular places where mobile phone is forbidden, such as a hospital.[2] III. PROPOSED SYSTEM The basic concept of this paper is that we become the subscriber of a mobile network to which we want to communicate. That is if we want to call a BSNL mobile system then we become a BSNL subscriber for that point of time until the communication is completed. Later if we want 102
5 to communicate an Airtel mobile system then we become the subscriber of Airtel for that communication instant. At present, a mobile station (MS) can receive and scan all the frequencies of radio frequency spectrum allocated for cellular networks. The cellular frequencies (BSNL, Airtel, and other similar mobile networks) can be received and scanned by a mobile station but cannot access all the frequencies. A mobile station can access only the frequency of the network provider to which it is subscribed. That is, the subscribed network provider will have the user details in the HLR which is attached to the MSC, which will make the mobile station as a subscribed unit under that mobile network so that the mobile unit can access its frequency. So we propose that if the user detail of a particular mobile system is present in multiple HLRs of different mobile networks, then that particular mobile system can get access to the mobile networks where its details are stored in the respective HLRs. The below figure 3 shows an example of the proposed concept. At this point of time, we assume that the user detail of a mobile system is present in the HLRs of two network providers (BSNL and Airtel). number of mobile networks. The drawbacks of the existing system and benefits of this proposed concept are listed below. IV. DRAWBACKS OF EXISTING SYSTEM A. Customer s Side: Network coverage Cost of services (Call, SMS, data, etc.) Need for dual/triple SIM mobile phones B. Mobile phone manufacturer s Side: Huge investments in R&D for developing dual/triple SIM phones High end single SIM mobile (iphone 4s) is affordable, but not preferred by corporate people C. Network provider s Side: Loss of customers because of one of their bad service V. BENEFITS OF PROPOSED CONCEPT A. Customer s Side: In case of emergency Choosing the cheapest service Can use the existing single SIM mobile phone B. Mobile phone manufacturer s Side: Can invest a lot in developing the User Interface and other software areas C. Network provider s Side: Gain of customers because of one of their best service Fig. 12 Proposed Model Let us assume that a mobile system is in a cell which consists of BTS (towers) of both BSNL and Airtel mobile networks. Case 1: (If we want to communicate to BSNL customer) The mobile system is made to scan the frequency spectrum to find and get access to BSNL network as we are going to communicate to a BSNL customer. Now the mobile system will get access to the BSNL network as the user detail of this mobile unit ( ) exists in the HLR of BSNL s MSC. Now we can communicate with any BSNL customer at a considerably low cost compared to other network providers as this communication is considered to be within the BSNL s network. Case 2: (If we want to communicate to Airtel customer) The mobile system is made to scan the frequency spectrum to find and get access to Airtel network as we are going to communicate to an Airtel customer. Now the mobile system will get access to the Airtel network as the user detail of this mobile unit ( ) exists in the HLR of Airtel s MSC. Now we can communicate with any Airtel customer at a considerably low cost compared to other network providers as this communication is considered to be within the Airtel s network. This proposed concept can be extended to any REFERENCES [1] twork_architecture [2] Heng-Chih Huang, Yueh-Min Huang, And Kuan- Chieh Chiu, A Location-Aware Call Forwarding Manager System For A Smart Telephony Network Of The Smart Space, International Journal On Smart Sensing And Intelligent Systems, Vol. 2, No. 1, March 2009 [3] Gu, H.-L., Shi, Y.-C., Xu, G.-Y., He, W.-S., Zhang, B.-P., SLAP: a Location-aware Software Infrastructure for Smart Space, SEUS Third IEEE Workshop on (2005), [4] Liyanage C De Silva, Audiovisual Sensing Of Human Movements For Home-Care And Security In A Smart Environment, International Journal On Smart Sensing and Intelligent Systems, Volume. 1, Issue 1, (2008), [5] Du, A.T., Private PBX networks: Cost effective communications solutions, 3rd AFRICON Conference (1992) AUTHOR S PROFILE Boobalan P B.Tech., M.Tech., MISTE, Ph.D Assistant Professor, Department of Information Technology, 103
6 Pondicherry Engineering College Publications: ISSN: "Enhancement of Path-Based QoS Provisioning for Optical Burst Switching Networks", IJITE ISSN: , Vol 3, "Improving QoS Aware Active Queue Management Scheme for Multimedia Services", IJITE ISSN: , Vol 3, "Delayed Reservation Differential Service for Multimedia Traffic in Optical Burst Switched Networks", IJCSE ISSN : , Vol 3, "Controlling Burst Loss Ratio in OBS Using Feedback Control and Dynamic Techniques", IJCSE ISSN : , Vol 3, 2011 Research work: 1. "Modelling A Multimedia Traffic For Burst Assembly", "Improving Transmission Speed of Multimedia Data Traffic over Optical Burst Swiching Networks", "Improving QoS for Multimedia Traffic over Optical Burst Switching Networks", "Improving TCP Performance Over OBS Networks using Multi-Queue Burst Assembly Scheme", 2009 Krishna P Final year, B.Tech, Information Technology, Pondicherry Engineering College Udhayakumar P Final year, B.Tech, Information Technology, Pondicherry Engineering College Santhosh A Final year, B.Tech, Information Technology, Pondicherry Engineering College 104
Chapter 3 GSM and Similar Architectures
CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols
More informationGLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,
More informationPertemuan 7 GSM Network. DAHLAN ABDULLAH
Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics
More informationCellular Communication
Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).
More informationCellular Mobile Systems and Services (TCOM1010) GSM Architecture
GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication
More informationBasics of GSM in depth
This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets
More informationGSM System Overview. Ph.D. Phone Lin.
GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data
More informationUNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase
UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of
More informationInternal. GSM Fundamentals.
Internal GSM Fundamentals www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Chapter 1 GSM System Overview Chapter 2 GSM Network Structure Chapter 3 Service Area and Number Planning Chapter
More informationInformation Technology Mobile Computing Module: GSM Handovers
Information Technology Mobile Computing Module: GSM Handovers Learning Objectives Recap of previous modules Basic functions of Network Sub System Entities that form NSS namely MSC,GMSC,HLR and VLR Functions
More informationE2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )
E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology
More informationSecurity of Cellular Networks: Man-in-the Middle Attacks
Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%
More informationCommunication Networks 2 Signaling 2 (Mobile)
Communication Networks 2 Signaling 2 (Mobile) Gusztáv Adamis BME TMIT 2017 GSM signaling Signaling of GSM is based on the ISDN signaling systems SS7/DSS1 But, because of mobility, roaming, radio access
More information10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.
10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS
More informationCHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION
CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION The most important part of any project i.e., implementation. It describes the various functionalities step by step under each module with their outputs.
More informationEUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD
EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System
More informationNexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper
Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the
More informationWireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 8: GSM Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline
More informationAdvanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013
Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions
More informationMobile Communications
Mobile Communications 3GPP Public Land Mobile Networks: GSM, GPRS Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 What is the architecture of the GSM network network elements, interfaces,
More informationThreat patterns in GSM system. Basic threat patterns:
Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the
More informationE3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only
E3-E4 (CM MODULE) CDMA 2000 1x & EV-DO WELCOME This is a presentation for the E3-E4 Technical (CM- Module)fortheTopic:CDMA20001x&EV-DO Eligibility: Those who have got the upgradation frome3toe4. This presentation
More informationGSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationCOMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2
COMP327 Mobile Computing Session: 2016-2017 Lecture Set 5 - Wireless Communication Part 2 51 SIM (Subscriber Identity Modules) Smart cards that are inserted into the GSM phone to identify the user Stores
More informationDesigning Authentication for Wireless Communication Security Protocol
Designing Authentication for Wireless Communication Security Protocol Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi Abstract Security is considered an important issue for mobile
More informationMobility and Security Management in the GSM System
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 ISBN: 2878-8719 PP 13-18 National Symposium on engineering and Research Mobility and Security Management in the GSM System 1 Mr. Yogesh S. Amle 2 Mr.
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationGSM Mobility Management
GSM Mobility Management Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Location Update Basic Call Origination and Termination Procedures Mobility Databases Failure Restoration
More informationSignaling System 7 (SS7) By : Ali Mustafa
Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network
More informationSniffer. J.DEEPTHI Associate Professor & HOD, Department of CSE,
EDULAKANTI KAVYA B.Tech Student, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill), Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. Edulakanti Kavya* et al. Sniffer Mr. T. PAVAN KUMAR Associate
More informationSecure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography.
Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography T K Mohanta 1, R K Samantaray 2, S Panda 3 1. Dept.of Electronics & Communication.Engg, Sudhananda Engg & Research
More informationWireless Communications
Wireless Communications Lecture 6: Mobility Management Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr.-Ing. Bin Han binhan@eit.uni-kl.de Institute of Wireless
More informationPractical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning
Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning Getting paid Prevent (limit) subscriber fraud Ensure accurate clearing with other operators Reduce churn Ensure
More informationSecuring SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm.
Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Garba S. (1), Abdu-Aguye U.-F., Raubilu A.A., Ibrahim Y. Department of Electrical and Computer Engineering,
More information28 Deploying IN Services in a Mobile Environment
28 Deploying IN Services in a Mobile Environment D. Haran Comverse Network Systems 170 Crossways Park Drive, Woodbury, New York 11797 USA Tel: (516) 677-7200, Fax: (516) 677-7355 E-mail danny_haran@comverse.com
More informationTechnical description of international mobile roaming May 2010
Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of
More informationDimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks
Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice
More informationData and Voice Signal Intelligence Interception Over The GSM Um Interface
ISSN (Online): 2394-3858 ISSN (Print): 2394-3866 International Journal of Research and Innovations in Science & Technology, SAINTGITS College of Engineering, INDIA www.journals.saintgits.org Research paper
More informationQuad BRI GSM Gateway with 8 GSM Ports
Quad BRI GSM Gateway with 8 GSM Ports HG-2000/3U Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-2000/3U 3 Contents
More informationMobile Security / /
Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G,
More informationETSI ETR 341 TECHNICAL December 1996 REPORT
ETSI ETR 341 TECHNICAL December 1996 REPORT Source: ETSI DECT Reference: DTR/RES-03058 ICS: 33.020 Key words: DECT, GSM, DSS1, ISDN Radio Equipment and Systems (RES); Digital Enhanced Cordless Telecommunications/
More informationIntegration of voice and data in an m-commerce situation
Integration of voice and data in an m-commerce situation Master Thesis 26 January, 2001 Fredrik Oljeqvist d96-fol@nada.kth.se Assignor Examiner Academic supervisor Industrial supervisor Benefactor Location
More informationA Survey on Cost Effective Survivable Network Design in Wireless Access Network
A Survey on Cost Effective Survivable Network Design in Wireless Access Network K.Rajalakshmi and Krishna Gopal Department of Computer Science, Jaypee Institute of Information Technology, Noida ABSTRACT
More informationRF OPTIMIZATION FOR QUALITY IMPROVEMENT IN GSM NETWORK
International Journal of Electrical Engineering & Technology (IJEET) Volume 6, Issue 8, Sep-Oct, 2015, pp.53-62, Article ID: IJEET_06_08_006 Available online at http://www.iaeme.com/ijeetissues.asp?jtype=ijeet&vtype=6&itype=8
More informationA NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK
International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 63 67 A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK
More information3G TS V3.1.0 ( )
Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Organization of subscriber data () The present document has been developed within the 3 rd Generation
More informationNetwork Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013
Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session
More informationUnderstanding Carrier Wireless Systems
Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding
More informationChapter 2 The 3G Mobile Communications
Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century
More informationSemi-Active GSM Monitoring System SCL-5020SE
Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and
More informationCity Research Online. Permanent City Research Online URL:
Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June
More informationA Centralized Approaches for Location Management in Personal Communication Services Networks
A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,
More informationETSI TS V6.4.0 ( )
TS 100 526 V6.4.0 (2000-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Organization of subscriber data (GSM 03.08 version 6.4.0 Release 1997) GLOBAL SYSTEM FOR MOBILE
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationWireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 2: Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Sep. 2006 1 Outline Introduction
More informationEvolution from GSM to UMTS
2 Evolution from GSM to UMTS Evolution is one of the most common terms used in the context of UMTS. Generally it is understood to mean the technical evolution, i.e. how and what kind of equipment and in
More informationSection 4 GSM Signaling BSSMAP
Section 4 GSM Signaling BSSMAP BSS management messages (BSSMAP) between MSC and BSS (BSC/ BTS), which are necessary for resource management, handover control, paging order etc. The BSSMAP messages can
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationShort Message Service (SMS)
TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationGSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL
GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced
More informationMobile Advantage Wireless Office A digital wireless office system for TDMA/136 networks
Mobile Advantage Wireless Office A digital wireless office system for TDMA/136 networks Rune Johanson, Mikael Nilsson and Torbjörn Ward Ericsson s digital wireless office system was developed especially
More information1 Wireless Network Architecture
CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects
More informationETSI TS V7.1.0 ( )
TS 100 522 V7.1.0 (2000-02) Technical Specification Digital cellular telecommunications system (Phase 2+); Network architecture (GSM 03.02 version 7.1.0 Release 1998) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS
More informationGSM System Protocol Architecture
GSM System Protocol Architecture References: Jörg Erbespächer, Hans Jörg Vogel, Christian Bettstetter, GSM: Switching services and protocols, Wiley 2001, ISBN 0-471-499903-X Schiller: Mobile communications,
More informationChapter 3: GSM Mobility Management
Chapter 3: GSM Mobility Management (18 Marks) GSM Location Update Mobility Databases Failure Restoration - VLR Failure Restoration, HLR Failure Restoration VLR Identification Algorithm VLR Overflow Control
More informationUNIT II NETWORKING
UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationOpportunities and Challenges in India s Growing Computing and Wireless Broadband Market
Opportunities and Challenges in India s Growing Computing and Wireless Broadband Market Abhay Karandikar Department of Electrical Engineering IIT Bombay 1 Digital Divide Second Largest Telecom Market-600
More informationSecurity issues in mobile communications
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 1994 Security issues in mobile communications Chenthurvasan Duraiappan
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room
More informationUMTS Addresses and Identities Mobility and Session Management
UMTS Addresses and Identities Mobility and Session Management - Numbering, addressing and location identities - UE modes - Mobility management - Session management and QoS Numbering, Addressing and Location
More informationClient Server Programming and GSM Networking Protocols (SS7 Signaling)
Client Server Programming and GSM Networking Protocols (SS7 Signaling) Synopsis Getting the Right Knowledge to the Right People at the Right Time Our interactive, accelerated learning experience teaches
More informationWELCOME Mobile Applications Testing. Copyright
WELCOME Mobile Applications Testing 1 Mobile Applications Testing List of MUST HAVE to survive this class Required Google Drive account Google email Flash Drive Mobile Phone (iphone/android) Desired Have
More informationTELE4652 Mobile and Satellite Communication Systems
TELE4652 Mobile and Satellite Communication Systems Lecture 9 GSM GSM, the Global System for Mobile Communications, was the second generation mobile cellular standard developed as a pan-european standard.
More informationDraftETSI EN V5.3.0 ( )
Draft EN 300 927 V5.3.0 (2000-07) European Standard (Telecommunications series) Digital cellular telecommunications system (Phase 2+); Numbering, addressing and identification (GSM 03.03 version 5.3.0
More informationSMARTPHONES AND MOBILE PHONE TECHNOLOGY MOBILE TECHNOLOGY BASICS. Lecture: 2 Instructor Mazhar Hussain
SMARTPHONES AND MOBILE PHONE TECHNOLOGY MOBILE TECHNOLOGY BASICS Lecture: 2 Instructor Mazhar Hussain WIRELESS AND MOBILE COMMUNICATION Blog https://mazharhussainatisp.wordpress.com Email: Mazhar.hussain@isp.edu.pk
More informationMethod and Device to Communicate via SMS After a Security Intrusion
Abstract Method and Device to Communicate via SMS After a Security Intrusion Vishy Karri 1, Daniel J.S. Lim 2 School of Engineering, University of Tasmania Hobart, Australia Vishy.Karri@utas.edu.au & jsdlim@utas.edu.au
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15
More informationSecurity Management System of Cellular Communication: Case Study
Security Management System of Cellular Communication: Case Study Othman O. Khalifa, Abdulrazzag Aburas, A. Al Bagul, Meftah Hrairi, Muhammad Shahril bin Shahbuddin, and Harman bin Mat Kasa Abstract Cellular
More informationThe Cellular Interceptor CC2800 Series
The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.
More informationInternational Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Volume 1 Issue 6 (July 2014)
HOME APPLIANCE CONTROL FOR USERS WITH MOTOR DISABILITIES USING SMART PHONE Shruthi.J 1, Ramya.S 2, Bharathi.R 3 Department of Computer Science and Engineering, BMSIT, Bangalore-64 Abstract In our surroundings,
More informationMoving Forward on MEID. March, Contacts Bill Dahnke, David Crowe A RCA Webinar
Moving Forward on MEID March, 2008 Contacts Bill Dahnke, David Crowe meid@cdg.org d A RCA Webinar Moving Forward on MEID Mobile devices must be identified by a unique code for a variety of reasons. The
More informationHypermedia HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description January 2013
Hypermedia HG-4000/3U VoIP GSM Gateway Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description January 2013 Contents Next Page Hypermedia HG-4000/3U 2 Contact Information
More informationImplementing Mobile Virtual Network Operations in Bangladesh
WWW.JOURNALOFCOMPUTING.ORG 39 Implementing Mobile Virtual Network Operations in Bangladesh Md. Whaiduzzaman and Mahfuzul Hoque Bhuiyan Abstract Infact, a full MVNO consists of a Home Location Register
More informationHands-On Modern Mobile and Long Term Evolution LTE
Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation
More informationChapter 10: Wireless Networking. School of information science and Engineering, SDU
Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate
More informationETSI TS V1.1.1 ( )
TS 101 377-3-2 V1.1.1 (2001-03) Technical Specification GEO-Mobile Radio Interface Specifications; Part 3: Network specifications; Sub-part 2: Network Architecture; GMR-2 03.002 2 TS 101 377-3-2 V1.1.1
More informationMobile Systems Challenges in Next Generation Networks
International Journal of Future Generation Communication and Networking 15 Mobile Systems Challenges in Next Generation Networks Seyed Ali Alavian, Jahangir Dadkhah Chimeh Faculty of Applied Science of
More informationMobile forensics. SMS (Short Message Service) EMS, MMS, CBS
Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE
More informationLast time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!
20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients
More informationCell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking
The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationDiminishing Signaling Traffic for Authentication in Mobile Communication System
Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,
More informationThe ultimate IP DECT communication devices for voice, text messaging and inhouse mobility
The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility Table of content On-site Wireless telephony on your IP Network 3 Key Applications 6 10 reasons for Business Mobility
More informationPlease refer to the usage guidelines at or alternatively contact
Irving, Philip and Ochang, Pascal A (2016) Evolutionary Analysis of GSM, UMTS and LTE Mobile Network Architectures. World Scientific News, 54. pp. 27-39. ISSN 2392-2192 Downloaded from: http://sure.sunderland.ac.uk/7512/
More informationUniversity of Agder Department of Information and Communication Technology EXAM
University of Agder Department of Information and Communication Technology EXAM Course code: IKT 444 Course title: Mobile Communication Networks Date: Tuesday, 6 th December 2016 Duration: 09:00 13:00
More information