T325 Summary T305 T325 B BLOCK 2 4 PART III T325. Session 1 Block III Part 2 Section 2 - Continous Network Architecture. Dr. Saatchi, Seyed Mohsen
|
|
- Coleen Nelson
- 6 years ago
- Views:
Transcription
1 T305 T325 B BLOCK 2 4 PART III T325 Summary Session 1 Block III Part 2 Section 2 - Continous Network Architecture [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your address] Prepared by: Dr. Saatchi, Seyed Mohsen T325
2 Block III Network Architecture Q1: Different protocols are used for 2G, 2.5G and 3G Q2: 2G and 2.5G : different protocol stacks are used for the control plane and the user plane Q3: 3G : same protocols are used for the control place and the user plane Q4: What is the different between 2G, 2.5G and 3G in using the protocols. 2G and 2.5G : different protocol stacks are used for the control plane and the user plane 3G : same protocols are used for the control place and the user plane Q5: Mention the protocols used in empty places for the layered protocols in 3G packet domain. Prepared by: Dr. Saatchi, Seyed Mohsen 2
3 Q6: Each service provides data in blocks called data units Q7: The set of blocks at each node is often known as the protocol stack Q8: The set of blocks at each node is often known as the protocol stack, give an example: PHY protocol: UE and Node B GPRS mobility management (GMM): UE and the SGSN Q9: in previous figure The UE and SGSN are not adjacent on the diagram, which means the GMM messages are carried over the intermediate nodes (Node B and RNC) by lower level protocols; in this case the radio resource control (RRC) and radio access network application protocol (RANAP). Q10: In previous figure these transport the GMM messages but do not alter them in any way, so the intermediate nodes are invisible to the GMM protocol. Prepared by: Dr. Saatchi, Seyed Mohsen 3
4 Q11: Each block can be thought of as communicating with the block of the same name at the other end point using the services of the layers below. Q12: Radio Link control (RLC) block in the RNC communicates with the RLC block in the UE, using the services of the medium access control (MAC) and PHY layers. Q13: Blocks communicating in this way are said to be communicating on a peer-topeer basis and the two blocks are often referred to as peer entities. Q14: Protocol interworking: A node converts from one protocol to another in each direction. Example: At the lowest level, the Node B has blocks labeled PHY and ATM Prepared by: Dr. Saatchi, Seyed Mohsen 4
5 Q15: Protocol interworking: A node converts from one protocol to another in each direction. Q16: The blocks labeled PHY refer to the physical layer of the radio interface, which comprises a number of different physical channels Q17: In 3G, the primary means of sharing the allocated radio bandwidth between these channels is W-CDMA Q18: What does the physical channels are used for: User traffic Transport of Signaling messages Management of the radio link itself. Q19: PHY interworks at the Node B with the ATM protocol Q10: ATM protocol is used to transport user traffic and Signaling messages across the fixed part of the network from the Node B to the SGSN (and the MSC for circuitswitched traffic) via the RNC Q11: The RRC, RLC and Mac protocols to consider are those which are used to manage the flow of data between the UE and the radio access network and to control the allocation of radio channels. Note: The end points for all of these protocols are the UE and the RNC (except for one specific case which need not concern us here). Prepared by: Dr. Saatchi, Seyed Mohsen 5
6 Q12: This means that in virtually all cases the; Node B does not participate in these protocols it simply forwards the data to the UE Q13: List some MAC Layer : Principal functions Prioritization between: data flows addressed to a single piece of UE data flows addressed to different pieces of UE. Multiplexing data units arriving from the upper layers onto the data units delivered to the physical layer and demultiplexing flows in the opposite direction. Encryption (if this has not been carried out by the RLC layer) Traffic volume measurement. Q14: List some responsibility of RLC layer: Segmentation of data units received from the next layer up (the RRC layer) into smaller data units to be forwarded to the MAC layer. Reassembling data units received from the MAC layer into larger data units for forwarding to the RRC layer. If instructed to do so, the RLC layer will also routinely acknowledge packets and retransmit those which are reported by the receiver to contain errors. Q15: List three types of communication channels (3G standards): Logical channels: data flows between the RLC blocks Transport channels: the data flows between the MAC blocks Physical channels: the data flows transmitted across the radio interface by the physical layer Q16: The top layer of the three is the RRC protocol, which handles most of the major functions in the radio network, List those functions: Setting up of physical radio channels Reporting of radio measurements Transport of Signaling messages between the mobile and the core network It also instructs the RLC layer whether or not to acknowledge packets. Q17: The three protocols (MAC/RLC/RRC) and the physical layer protocol PHY are classified together in the standards as the access stratum Note: The level which provides the UE with access to the core network Prepared by: Dr. Saatchi, Seyed Mohsen 6
7 Q18: Radio network controller needs to interact with the core network. Q19: Radio network controller needs to interact with the core network, this will done by using a protocol called RANAP. Q20: The RANAP, which is used to interact with the SGSN (and also the MSC in the circuit-switched domain). Q21: RANAP makes use of a version of the standard Signaling protocol used in the circuit-switched domain, Signaling System No. 7 (SS7). Q22: The version of SS7 used in RANAP has been modified to run over ATM. Prepared by: Dr. Saatchi, Seyed Mohsen 7
8 Q23: At the very top of the stack is the non-access stratum (NAS), which handles direct Signaling between the mobile and the core network. Q24: In the 3G packet domain, the principal constituent of the non-access stratum is the GMM protocol. Q25: IP addressing in fixed networks is hierarchical Network/subnetwork address and Host address. Q26: IP addressing in fixed networks is hierarchical is used for routing purposes Q27: List some problems of Mobility in IP-based Mobile networks in 3G If a device were to move from one subnetwork to another: It could be come invisible at the subnetwork routing level, since the top-level routing would direct the packets to the previous subnetwork. Since its IP address would almost certainly not match the addressing scheme of the new subnetwork, messages from the device might also be rejected by firewalls checking for valid source addresses. Prepared by: Dr. Saatchi, Seyed Mohsen 8
9 Q28: How to solve problem of Mobility in IP-based Mobile networks in 3G Solving the mobility problem for mobile data communication, therefore, depends on using the location information the network holds, in order to make the IP addressing system continue to work as the mobile moves from one subnetwork to another. A clever solution is for the network to put each IP packet inside another IP packet. The outer packet can then be used to get the message to the router to which the mobile device is currently connected, at which point this router extracts the inner packet and sends it directly to the mobile device. This approach is known as tunneling, and in GPRS and 3G it is provided using the GPRS tunneling protocol (GTP). Q29: GTP stands for GPRS tunneling protocol Q30: What will happen when an IP packet arrives at the GGSN from an external IP network addressed to an active mobile: GGSN adds the GTP header and the UDP header and puts the result in an IP packet addressed to the radio network controller in whose area the mobile is located. GGSN sends the packet through the appropriate tunnel, which ends at the relevant RNC. The RNC then extracts the inner IP packet and forwards it to the user equipment using the RRC protocol and the lower layers in the access stratum. The UE then handles the IP packet just as if it had received it from a local IP router. Prepared by: Dr. Saatchi, Seyed Mohsen 9
10 Q31: Packets from the UE to the GGSN follow a similar process and are routed by the GGSN to a specific external IP network depending on the session associated with the user traffic tunnel through which the packet arrived. Q32: What does the inner and outer level represent: Inner level represents the packet to be sent through the tunnel Outer level consists of the headers added by the tunnelling protocol. Q33: GTP uses the user datagram protocol (UDP) to send the tunnelled packets and also adds its own control header, which is used, among other things, to identify which tunnel is which. Q34: In GTP the session information in the packet-switched side of the network is stored in a series of tables maintained by the SGSN and the GGSN called the packet data protocol (PDP) context. Q35: In GTP structure each session is directed to a particular network physically connected to one GGSN, and this network is identified by a uniform resource locator (URL) known as the access point name (APN). Q36: In GTP structure the APN and the tunnel identifiers are held as part of the PDP context tables. Q37: Typical APNs point towards the internet via a network belonging to an internet service provider (ISP), or to a corporate data network. Prepared by: Dr. Saatchi, Seyed Mohsen 10
11 Q38: In addition to data transfers to single recipients, 3G also offers a multicast streaming and download service called the multimedia broadcast and multicast service (MBMS). Q39: MBMS stands for Multimedia broadcast and multicast service Q40: MBMS the Multimedia broadcast and multicast service allows an IP multicast tree to be constructed within the mobile network, eliminating the need to send multiple copies of the data across the network. Q41: Most networks offer additional facilities associated with the voice service, known as supplementary services. Q42: List some of supplementary services: Call forwarding, call on hold, notification of a waiting incoming call, conference calls, prevention of calls to or from a mobile handset, voice mail 3G networks allow video calls The user requests a video call using the normal phone number and the network attempts to set it up with the called party. Second most popular service offered by mobile networks (after voice calls) is texting, or SMS (short message service). Q43: In the circuit-switched domain, the Signaling required to set up and clear down calls uses the ISDN SS7 protocol, which can be seen as an early packet-based protocol. Q44: Text messaging makes use of the SS7 protocol to deliver the messages, avoiding the need to reserve bandwidth to transmit a message. Q45: Internet Access: the user is connected to the internet via an internet service provider working in partnership with the mobile network. Q46: Access to corporate networks through a virtual private network (VPN): typically utilize an IPsec tunnel in order to provide an additional layer of security. Note: IPsec is a set of protocols for making IP communication more secure. Prepared by: Dr. Saatchi, Seyed Mohsen 11
12 Q47: Multimedia Messaging Service (MMS): allows still pictures, video clips and audio messages to be sent, as well as much longer text messages than SMS permits. Q48: Streaming services present audiovisual content to the mobile device for buffering and immediate replay Q49: List two types of video streaming service: Mobile TV User can choose from a number of channels but is constrained by a programme schedule Content-on-demand. Content is downloaded to the mobile device and can be replayed several times The content provider may restrict the number of times the content can be played or specify an expiry date beyond which it is no longer available. Q50: How data services are provided? The user is provided with a standard APN, which is a URL specific to the mobile network and which needs to be selected as a setting on a mobile device or on a USIM card associated with the device The APN points towards the GGSN interface connected to the ISP s network, and the mobile device can use this to set up web browsing sessions. Prepared by: Dr. Saatchi, Seyed Mohsen 12
13 Q50: How data (Multimedia Messaging) services are provided? Multimedia messaging is similar in one way to text messaging, in that it makes use of a multimedia messaging centre (MMSC) which is used to store and forward messages. Unlike the SMSC, however, the MMSC is a fully IP-based device which can only be accessed through an IP network. When the user wants to send a message, the user equipment sets up a session using an APN (URL) pointing to the MMSC. Prepared by: Dr. Saatchi, Seyed Mohsen 13
14 Q51: How an authentication will process function in 2G and 3G? In 2G, authentication is the process used to prove to the network that the mobile device is genuine and allowed to use the network. In 3G, the process is mutual; it also allows the mobile to prove to itself that the network is genuine. In both 2G and 3G, authentication is a function of the non-access stratum Takes place between the user equipment (actually the USIM card) and the core network without the intervention of the radio access network. 1. On receipt of an authentication request, the SGSN sends a request to the AuC to begin the authentication process. 2. The AuC does this by calculating an authentication vector (AV), which is a sequence of, which includes the following five components: RAND : a random number. AUTN : the authentication token, which depends among other things on a sequence number SQN, which the UE and the AuC synchronise between them, and the random number RAND. XRES : an expected result, to be used by the SGSN to check the authentication response from the UE. Prepared by: Dr. Saatchi, Seyed Mohsen 14
15 CK : a temporary cipher key, to be used to encrypt the user data until the next authentication request. IK : a temporary integrity key, to be used to verify the integrity of Signaling messages to and from the UE. 3. SQN and RAND are used to prove that the AV has been freshly generated, to prevent replay attacks based on captured AVs. Good Luck,,, Prepared by: Dr. Saatchi, Seyed Mohsen 15
UMTS System Architecture and Protocol Architecture
UMTS System Architecture and Protocol Architecture Overview on overall system architecture UMTS network architecture and elements Mobile station High-level functions UMTS domains and strata UMTS/GPRS protocol
More informationUMTS Addresses and Identities Mobility and Session Management
UMTS Addresses and Identities Mobility and Session Management - Numbering, addressing and location identities - UE modes - Mobility management - Session management and QoS Numbering, Addressing and Location
More informationNew service standardisation approach
UMTS Part of the IMT 2000 family 3 nd Generation digital cellular mobile system Approximately old (GSM + GPRS) core network + new radio access network (UTRAN) including new radio interface (WCDMA) New
More informationEP B1 (19) (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION
(19) (11) EP 1 432 271 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.06. Bulletin /26 (1) Int Cl.: H04W 12/06 (09.01) H04L 9/32 (06.01) H04W 12/02
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationDAY 2. HSPA Systems Architecture and Protocols
DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationA Flow Label Based QoS Scheme for End-to-End Mobile Services
A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract
More information3GPP TS V9.2.0 ( )
TS 29.281 V9.2.0 (2010-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; General Packet Radio System (GPRS) Tunnelling Protocol User
More information3GPP TS V ( )
TS 29.281 V11.5.0 (2012-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; General Packet Radio System (GPRS) Tunnelling Protocol
More informationConfiguring Security on the GGSN
CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco
More informationCOPYRIGHTED MATERIAL. Contents. 1 Short Message Service and IP Network Integration 1. 2 Mobility Management for GPRS and UMTS 39
Acknowledgments Introduction xv xvii 1 Short Message Service and IP Network Integration 1 1.1 SMS-IP Integration with SM-SC 3 1.1.1 NCTU Short Message System 4 1.1.2 Statistics for SMS Delivery 7 1.2 isms
More information1. Do the Create PDP or Update PDP requests from the SGSN arrive at the GGSN?
Contents Introduction Background Information GGSN Behavior Cause Code 192 Error Example Scenarios Introduction This document describes the behavior of the Gateway General Packet Radio Service (GPRS) Supporting
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationAnalysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service
PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros
More informationGeneral Packet Radio Service (GPRS) 13 年 5 月 17 日星期五
General Packet Radio Service (GPRS) What is GPRS? GPRS (General Packet Radio Service) A packet oriented data service for IP and X.25 over GSM networks Enables packet-switched services on the resources
More information4 rd class Department of Network College of IT- University of Babylon
1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen
More informationCommunication Systems for the Mobile Information Society
Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix
More informationGPRS System Architecture
1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet
More informationGSM and Similar Architectures Lesson 13 GPRS
GSM and Similar Architectures Lesson 13 GPRS 1 Two switching modes Circuit Switching Packet switching 2 Circuit switching A connection first sets up Then the entire data transmits through the path that
More informationCHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS
CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.
More informationCommunication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016
Communication and Distributed Systems Seminar on : LTE Security By Anukriti Shrimal May 09, 2016 LTE network with interfaces LTE Security 2 Contents LTE Security : Why, What, How EPS Architecture Design
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationContents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications
Royal Holloway, University of London, IC3 Network Security, 13 November 2006 Contents GSM and UMTS Security Introduction to mobile telecommunications Second generation systems - GSM security Third generation
More informationImproved One-Pass IP Multimedia Subsystem Authentication for UMTS
Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Lili Gu RMIT University Melbourne, Australia l.gu@student.rmit.edu.au Abstract As defined in the 3GPP specifications, a UMTS user device
More informationGPRS for Mobile Internet
GPRS for Mobile Internet Emmanuel Seurre Patrick Savelli Pierre-Jean Pietri Artech House Boston London www. artechhouse. com Contents Acknowledgments xiii Introduction to the GSM System 1 1.1 1.1.1 1.1.2
More information3G/UMTS Complete Mobile Originated Circuit Switched Call Setup. July 2009, Turin
3G/UMTS Complete Mobile Originated Circuit Switched Call Setup July 2009, Turin 1. System Information (BCCH) The UE reads the System Information that is broadcast on BCCH. The information is not read
More information5. Functions and Procedures within GPRS
GPRS Functions Page 41 5. Functions and Procedures within GPRS Within GPRS-Networks a large row of Functions and procedures have to be realised to enable the transport of packet switched data. These Functions
More informationSystem Architecture Evolution
System Architecture Evolution Contents 2.1 Architecture of LTE 2.2 Communication Protocols 2.3 Example Information Flows 2.4 Bearer Management 2.5 State Diagrams 2.6 Spectrum Allocation 2.1 Architecture
More informationEnd-to-end IP Service Quality and Mobility - Lecture #6 -
End-to-end IP Quality and Mobility - Lecture #6 - Special Course in Networking Technology S-38.215 vilho.raisanen@nokia.com Planned contents & draft schedule 1. Introduction Jan 13th 2. Characteristics
More informationUnderstand iwag Solution for 3G Mobile Data
Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services
More informationWIDESTAR II Satellite Core Network System. any Access Point Name (APN) *2 available. APNs in any way. A FAX gateway. the existing satellite system.
WIDESTAR II Satellite Core Network System Mobile Satellite Communications Services SIP FAX Gateway Special Articles on WIDESTAR II High-speed Mobile Satellite Communications Service for Diverse Satellite
More informationNetwork Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013
Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session
More information3GPP TS V1.3.1 ( )
Technical Specification 3 rd Generation Partnership Project (); Technical Specification Group (TSG) RAN UTRAN Iu Interface RANAP Signalling [UTS 25.413] [UTS 25.413] 2 Reference (.PDF)
More informationGPRS security. Helsinki University of Technology S Security of Communication Protocols
GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting
More informationThe Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough
The Evolution and Future of Mobile Communication Systems Written by David G Ainscough Copyright 2001 D.G.Ainscough Chapter 5 : UMTS (Universal Mobile Telecommunication System)...3 5.1 UMTS Introduction...5
More informationOverview of GPRS and UMTS
CHAPTER 1 This chapter briefly introduces the 2.5G General Packet Radio Service (GPRS) and the 3G Universal Mobile Telecommunications System (UMTS) technologies, and their implementation in Cisco Gateway
More informationCOOPERATIVE PATENT CLASSIFICATION
CPC H04T 2014.07 Interleaved page 1 CPC COOPERATIVE PATENT CLASSIFICATION H04T INDEXING SCHEME RELATING TO STANDARDS FOR ELECTRIC COMMUNICATION TECHNIQUE ( CLASS H04 ) This scheme constitutes an nonassociated
More informationDelivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA LTE was designed as a data
More informationUSIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006
USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 Hyeyeon Kwon, Kyung-yul Cheon, Kwang-hyun Roh, Aesoon Park Electronics and Telecommunications Research Institute 161, Gajeong-dong,
More informationSh Gy. Ro Gx. Cx Ici. Mr Mj
Sh Ro Cx Ici SIP UT IMS Sv LTE Mr Mj Mi Mg ISC Mw LTE / VoLTE IMS Protocols Interfaces LTE Protocol Stack IMS Protocol Stack LTE (4G) IMS PSTN / LTE Ex : S1, S5, SGi LTE Control Plane Ex : S1, S10, S11,
More informationUMTS. Antti Siitonen. Technologist, MSc (EE), Radiolinja
UMTS Technologist, MSc (EE), Radiolinja Antti.Siitonen@radiolinja.fi T-110.300 Telecommunications architectures Lectures on 15.11.2001 Introduction to UMTS 1 Contents 1. Introduction to UMTS 1.1. Standards
More informationEnd-to-end IP Service Quality and Mobility - Lecture #5 -
End-to-end IP Service Quality and Mobility - Lecture #5 - Special Course in Networking Technology S-38.215 vilho.raisanen@nokia.com Planned contents & draft schedule 1. Introduction Jan 13th 2. Characteristics
More informationSecurity functions in mobile communication systems
Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts
More informationIPSec. Overview. Overview. Levente Buttyán
IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet
More informationETSI TS V3.1.0 ( )
Technical Specification Universal Mobile Telecommunications System (UMTS); UTRAN Iu Interface RANAP Signalling () 1 Reference RTS/TSGR-0325413UR1 Keywords UMTS 650 Route des Lucioles F-06921 Sophia Antipolis
More informationInternet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho
Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality
More informationUNIK4230: Mobile Communications Spring Semester, Per Hj. Lehne
UNIK4230: Mobile Communications Spring Semester, 2015 Per Hj. Lehne per-hjalmar.lehne@telenor.com 916 94 909 Network Architecture and Functionality 5 February 2015 Contents Network Architecture Protocol
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationRab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology
Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist
More information3GPP TR V7.0.0 ( )
TR 23.919 V7.0.0 (2007-06) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Direct Tunnel Deployment Guideline (Release 7) The present document
More informationLTE Security How Good Is It?
SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute
More informationMultimedia Broadcast and Multicast Service
This chapter provides information on (MBMS) functionality on GGSN. The product Administration Guides provide examples and procedures for configuration of basic services on the system. It is recommended
More informationL6: OSI Reference Model
EECS 3213 Fall 2014 L6: OSI Reference Model Sebastian Magierowski York University 1 Outline The OSI Reference Model An organized way of thinking about network design (from low-level to high-level considerations)
More informationConfiguring GPRS Tunneling Protocol Support
The GPRS Tunneling Protocol Support feature provides firewall support for General Packet Radio Switching (GPRS) Tunneling Protocol (GTP). GPRS is a data network architecture, which integrates with existing
More informationGPRS billing: getting ready for UMTS
GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationPart V. Appendices. Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN:
Part V Appendices Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN: 0-470-01807-0 A 3GPP Bearer Concepts In the following text, we shall review 3GPP (Third
More informationCustom Connect. All Area Networks. customer s guide to how it works version 1.0
All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationJP-3GA (R99) GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR)
JP-3GA-29.119(R99) GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) Version 1 Nov 30, 2000 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE JP-3GA-29.119(R99) GPRS Tunnelling
More informationSGSN in a 2.5G GPRS Network, page 1
, page 1 2.5G SGSN Configuration Components, page 2 How the 2.5G SGSN Works, page 4 Information Required for the 2.5G SGSN, page 7 This chapter outlines the basic configuration and operation of the Serving
More informationSignaling Protocol Structure in GSM
GSM Signaling Protocol Structure in GSM Signaling Protocol Structure in GSM Layer 1 is the physical layer which uses the channel structures over the air interface. Layer 2 is the data link layer and across
More informationGTP-U Service Configuration Mode Commands
GTP-U Service Configuration Mode Commands The GTP-U Service Configuration Mode is used to manage parameters applied to incoming GTP-U packets. Important The commands or keywords/variables that are available
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More information3GPP TS V ( )
Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Evolved Packet System (EPS); Sv interface (MME to MSC, and SGSN to MSC) for SRVCC ()
More informationdit Efficiency Issues in MPLS Transport for the UMTS Access Network E. Vázquez, M. Álvarez-Campana, A. B. García
Efficiency Issues in MPLS Transport for the UMTS Access Network E. Vázquez, M. Álvarez-Campana, A. B. García Dept. of Telematic Engineering Technical University of Madrid, Spain www..upm.es 1 Outline in
More information3GPP TS V ( )
Technical Specification 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN Iu interface RANAP signalling (Release 1999) The present document has been developed
More informationUMTS Terminal Equipment For All-IP Based Communications
UMTS Terminal Equipment For All-IP Based Communications M. Ricardo 1,2, J. Dias 3,2, G. Carneiro 2, J. Ruela 1,2 1. Faculdade de Engenharia da Universidade do Porto, Rua Dr. Roberto Frias, 4200, Porto,
More informationETSI TS V3.4.0 ( )
TS 133 103 V3.4.0 (2000-10) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Integration Guidelines (3GPP TS 33.103 version 3.4.0 Release 1999) 1 TS 133 103 V3.4.0
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room
More informationTS V6.1.0 ( )
Technical Specification Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); Interworking between the Public Land Mobile Network (PLMN) supporting GPRS and Packet
More informationETSI TS V6.4.0 ( )
TS 101 348 V6.4.0 (2001-02) Technical Specification Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); Interworking between the Public Land Mobile Network (PLMN)
More informationETSI TS V1.1.1 ( )
TS 101 863-6 V1.1.1 (2001-11) Technical Specification Digital Enhanced Cordless Telecommunications (); / Interworking Profile (IWP); Part 6: Packet switched data 2 TS 101 863-6 V1.1.1 (2001-11) Reference
More informationPOWER-ON AND POWER-OFF PROCEDURES
POWER-ON AND POWER-OFF PROCEDURES TABLE OF CONTENTS 1. Power-On Sequence 2. Network and Cell Selection 3. RRC Connection Establishment 4. Attach Procedure 5. Detach Procedure 1. POWER-ON SEQUENCE The following
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationIxLoad LTE Evolved Packet Core Network Testing: enodeb simulation on the S1-MME and S1-U interfaces
IxLoad LTE Evolved Packet Core Network Testing: enodeb simulation on the S1-MME and S1-U interfaces IxLoad is a full-featured layer 4-7 test application that provides realworld traffic emulation testing
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationUMTS Services. Part I: Basics Bearer services and teleservices Supplementary services Multimedia services QoS architecture
UMTS Services Part I: Basics Bearer services and teleservices Supplementary services Multimedia services QoS architecture References Kaaranen, et al, Ch. 7 Walke, et al, ch. 10 3GPP TS 22.101: service
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationNetwork management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:
Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized
More informationCisco IP Fragmentation and PMTUD
Table of Contents IP Fragmentation and PMTUD...1 Introduction...1 IP Fragmentation and Reassembly...1 Issues with IP Fragmentation...3 Avoiding IP Fragmentation: What TCP MSS Does and How It Works...4
More informationTable of Contents. Computer Networks and the Internet
Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1
More informationWIRELESS SYSTEM AND NETWORKING
LECTURE 6 WIRELESS SYSTEM AND NETWORKING References: Rappaport (Chapter 9 and 10) Bernhard (Chapter 3, 4 and 5) Garg (Chapter 8 and 9) Kaarenen (Chapter 1-5 and 9) WIRELESS EVOLUTION Japan Europe Americas
More informationWCDMA evolution: HSPA and MBMS
Chapter: 3G Evolution 8 WCDMA evolution: HSPA and MBMS Isael Diaz isael.diaz@eit.lth.se Department of Electrical and Information Technology 02-Apr-2009 3G Evolution - HSPA and LTE for Mobile Broadband
More informationIT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com
IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 4A0-M02 Title : Alcatel-Lucent Mobile Gateways for the LTE Evolved Packet Core Version : Demo 1 / 7
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15
More informationSystem Enhancements for Accessing Broadcast Services in All-IP Networks. Motivation
System Enhancements for ing Broadcast Services in All-IP Networks Patrick Stupar, Krishna Pandit, and Wolfgang Granzow Qualcomm CDMA Technologies GmbH Motivation 54.2 % 18.0 % 23.1 % 36.4 % Over 4 billion
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationIPv6 in 2G and 3G Networks. John Loughney. North American IPv6 Forum 2004
IPv6 in 2G and 3G Networks John Loughney North American IPv6 Forum 2004 Introduction Relevant IPv6 Status in the IETF Relevant IPv6 Status in 3GPP Relevant IPv6 Status in 3GPP2 Conclusion What IPv6 Brings
More informationNetwork.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components
Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess
More informationVPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009
VPN and IPsec Network Administration Using Linux Virtual Private Network and IPSec 04/2009 What is VPN? VPN is an emulation of a private Wide Area Network (WAN) using shared or public IP facilities. A
More informationSIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More information