This document provides an overview of call routing in GSM networks. It discusses key components like the Home Location Register (HLR) and Visitor Location Register (VLR) that store subscriber data. It then describes different call routing scenarios like mobile originated calls, mobile terminated calls, and roaming calls. It explains the signaling process and interactions between network elements like the mobile station, base station, MSC, HLR, and other switches. Finally, it briefly discusses the handover process to transfer calls between base stations when a mobile changes location.
GSM uses frequency division duplexing with carriers separated by 200 kHz. Each carrier is divided into 8 time slots using TDMA. Logical channels like traffic channels and signaling channels are mapped onto these physical time slots. Traffic channels carry user data at either full rate or half rate, while signaling channels include broadcast, common, and dedicated control channels used for functions like synchronization, paging, call setup, and handover.
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
The document summarizes the call flow process in GSM networks. It describes the sequence of events that occur when a mobile subscriber makes a call to a landline, when a landline subscriber calls a mobile, and between two mobile subscribers. It also provides an overview of the user services, data services, supplementary services, and security features supported in GSM networks, such as encryption, authentication, and temporary identification numbers to protect subscriber privacy.
This document summarizes GSM architecture and call flows, including inter-MSC and intra-MSC call flows. Inter-MSC call flow occurs between two different MSCs, while intra-MSC call flow is between two BSCs within the same MSC. The inter-MSC call flow involves signaling between the BSC, MSC-O, MSC-T, HLR, and RNC to set up and release the call bearers. The intra-MSC call flow involves signaling between the MS-O, BSC-O, MSC/VLR, MGW, HLR, BSC-T, and MS-T to authenticate, set up, and release call bearers within a single MSC
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Mobile Originated Call Process in Simple WordsAssim Mubder
Call Setup
Different procedures are necessary depending on the initiating and terminating party:
Mobile Originating Call MOC: Call setup, which are initiated by an MS
Mobile Terminating Call MTC: Call setup, where an MS is the called party
Mobile Mobile Call MMC: Call: setup between two mobile subscribers; MMC thus consists of the execution of a MOC and a MTC one after the other.
Mobile Internal Call MIC: a special case of MMC; both MSs are in the same MSC area, possibly even in the same cell.
The document provides an overview of GSM architecture including:
1. GSM uses a cellular network architecture with base stations, base station controllers, mobile switching centers, and databases to manage subscriber identity and location.
2. The network allows for voice calls and data services including SMS, and provides security through subscriber authentication and encryption.
3. GSM is a global standard that enabled international roaming and continues to evolve to support higher data rates through technologies like GPRS, EDGE, and WCDMA.
The document discusses the GSM protocol stack and frame formatting. It describes the different layers of the protocol stack including the physical layer which handles radio transmission, the data link layer which provides error-free transmission, and the networking layer which is responsible for communication between network resources and mobility. It also discusses the signaling system 7 (SS7) standard and various application protocols used in GSM like BSSAP, BSSMAP, DTAP, ISUP, MAP, and TCAP. Furthermore, it explains the concepts of physical and logical channels in GSM and how logical channels can be mapped to physical channels.
GSM uses frequency division duplexing with carriers separated by 200 kHz. Each carrier is divided into 8 time slots using TDMA. Logical channels like traffic channels and signaling channels are mapped onto these physical time slots. Traffic channels carry user data at either full rate or half rate, while signaling channels include broadcast, common, and dedicated control channels used for functions like synchronization, paging, call setup, and handover.
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
The document summarizes the call flow process in GSM networks. It describes the sequence of events that occur when a mobile subscriber makes a call to a landline, when a landline subscriber calls a mobile, and between two mobile subscribers. It also provides an overview of the user services, data services, supplementary services, and security features supported in GSM networks, such as encryption, authentication, and temporary identification numbers to protect subscriber privacy.
This document summarizes GSM architecture and call flows, including inter-MSC and intra-MSC call flows. Inter-MSC call flow occurs between two different MSCs, while intra-MSC call flow is between two BSCs within the same MSC. The inter-MSC call flow involves signaling between the BSC, MSC-O, MSC-T, HLR, and RNC to set up and release the call bearers. The intra-MSC call flow involves signaling between the MS-O, BSC-O, MSC/VLR, MGW, HLR, BSC-T, and MS-T to authenticate, set up, and release call bearers within a single MSC
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Mobile Originated Call Process in Simple WordsAssim Mubder
Call Setup
Different procedures are necessary depending on the initiating and terminating party:
Mobile Originating Call MOC: Call setup, which are initiated by an MS
Mobile Terminating Call MTC: Call setup, where an MS is the called party
Mobile Mobile Call MMC: Call: setup between two mobile subscribers; MMC thus consists of the execution of a MOC and a MTC one after the other.
Mobile Internal Call MIC: a special case of MMC; both MSs are in the same MSC area, possibly even in the same cell.
The document provides an overview of GSM architecture including:
1. GSM uses a cellular network architecture with base stations, base station controllers, mobile switching centers, and databases to manage subscriber identity and location.
2. The network allows for voice calls and data services including SMS, and provides security through subscriber authentication and encryption.
3. GSM is a global standard that enabled international roaming and continues to evolve to support higher data rates through technologies like GPRS, EDGE, and WCDMA.
The document discusses the GSM protocol stack and frame formatting. It describes the different layers of the protocol stack including the physical layer which handles radio transmission, the data link layer which provides error-free transmission, and the networking layer which is responsible for communication between network resources and mobility. It also discusses the signaling system 7 (SS7) standard and various application protocols used in GSM like BSSAP, BSSMAP, DTAP, ISUP, MAP, and TCAP. Furthermore, it explains the concepts of physical and logical channels in GSM and how logical channels can be mapped to physical channels.
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
The document discusses different types of location updating procedures in mobile networks:
1. Location updating type normal occurs when a mobile subscriber (MS) moves to a new location area and needs to update the network of its new location.
2. IMSI attach is used when the MS powers back on in the same location area it was in when it entered detached mode.
3. Periodic registration is used to avoid unnecessary paging and prevent database failures. The MS registers at periodic intervals set by the network operator, from every 6 minutes to every hour.
The GSM system architecture is divided into three major systems: the Switching System (SS), the Base Station System (BSS), and the Operation and Support System (OSS). The SS handles call processing and subscriber functions and includes the MSC, HLR, VLR, and other registers. The BSS handles radio functions and includes the BSC and BTS. The OSS manages errors, configuration, faults, and performance across the network. Key interfaces include the A interface between MSC and BSS, the B interface between MSC and VLR, and the Um interface between MS and BTS.
This document discusses paging and location update procedures in cellular networks. It defines key terms like MSC, VLR, HLR, TMSI, LA, LAI, and describes how location areas are configured and how location updates and paging work. When a mobile moves to a new location area or PLMN, it performs a location update by sending a message to the new MSC/VLR, which updates the subscriber's HLR. Periodic and random location updates also allow the network to track mobile locations. Paging is used to find mobiles and deliver incoming calls based on location registration information.
This document provides an overview of UMTS network architecture and components. It describes the key elements of the UMTS Release 99 core network, including the circuit switched and packet switched domains. It also discusses the radio access network (UTRAN) and its components such as the radio network controller (RNC) and Node B. Finally, it summarizes the functions of the mobile switching center (MSC) and media gateway (MGW) in the UMTS network.
GSM is a digital cellular network standard that allows users to roam internationally. It has a modular architecture consisting of mobile stations, base station subsystems, and network switching subsystems. The mobile station includes a mobile equipment and SIM card. The base station subsystem comprises base transceiver stations and base station controllers. The network switching subsystem contains mobile switching centers, home and visitor location registers, and authentication centers that manage subscriber data and authentication. GSM uses cellular networks of hexagonal cells connected to base station controllers and switching centers to provide coverage over wide geographic areas.
The document discusses GPRS network architecture and processes. It describes how a mobile station (MS) attaches to and detaches from the GPRS network by communicating with the SGSN and HLR. It also describes how a temporary block flow (TBF) is established to enable data transfer between the MS and network. Additionally, it outlines how a packet data protocol (PDP) context is activated and deactivated to manage the subscriber's data session.
This document discusses mobility management (MM) in GPRS and UMTS networks. It describes the different MM states in GPRS (IDLE, STANDBY, READY) and UMTS (PMM-DETACHED, PMM-IDLE, PMM-CONNECTED). The MM contexts maintained by the MS, SGSN, and HLR/AUC are also outlined. Periodic and normal location update procedures performed by the MS to update its location are explained.
GPRS is a packet-based mobile data service on GSM networks. It provides higher speed data transmission than previous GSM data services. The GPRS architecture introduces two new network nodes - SGSN and GGSN. SGSN handles mobility management and packet transmission between MS and GGSN, while GGSN connects the GPRS network to external packet networks like the Internet. GPRS enhances the GSM network by allowing dynamic allocation of bandwidth and intermittent data transmission, making it suitable for bursty, low-volume data applications.
3G technologies enable higher bandwidth applications like video streaming and video calls by providing data rates up to 2Mbps. Common 3G standards include WCDMA, CDMA2000, and EDGE which evolved from 2G technologies like GSM and CDMA. These standards use technologies such as wider bandwidths and advanced modulation to increase speeds while maintaining compatibility with existing network infrastructure. Over 100 mobile operators worldwide have deployed 3G networks using these standards.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
IS-95 CDMA is an air interface standard that uses code division multiple access (CDMA). It employs various techniques to improve system capacity and performance, including bandwidth recycling, power control, soft handoffs, diversity combining, and variable rate vocoding. Key aspects of IS-95 include the use of quadrature phase shift keying modulation at a 1.2288 Mcps chip rate, forward error correction coding, and multiple logical channels (pilot, sync, paging, traffic) defined using orthogonal Walsh codes.
Roaming allows mobile subscribers to access voice and data services outside their home network coverage area by using a visited network. It requires roaming agreements between operators. There are several entities involved including home networks, visited networks, and clearing houses. Roaming can be national, international, or between different standards. Inbound roaming refers to customers of other operators using a home operator's network, while outbound refers to home customers using other networks. Roaming scenarios describe how calls are routed for subscribers roaming within and between networks. GSM technology benefits roaming by providing worldwide access across standards through a single number and device.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
The document discusses different channel assignment strategies for wireless networks, including fixed channel assignment where each cell is predetermined channels and dynamic channel assignment where channels are allocated on request based on factors like channel occupancy. It also describes a partially overlapping channel (FPOC) assignment strategy that aims to increase capacity while minimizing interference through intelligent channel allocation between neighboring nodes.
The document provides an overview of LTE (Long Term Evolution) network architecture and transmission schemes. It describes the simplified LTE network elements including eNB, MME, S-GW and P-GW. It explains the downlink transmission scheme using OFDMA and reference signal structure. It also covers uplink transmission using SC-FDMA, control and data channels as well as frame structure in both FDD and TDD modes.
Introduction to Cellular Mobile System,
Performance criteria,
uniqueness of mobile radio environment,
operation of cellular systems,
Hexagonal shaped cells,
Analog Cellular systems.
Digital Cellular systems
This chapter discusses the GPRS Mobility Management (GMM) and Session Management (SM) protocols. Section 3.1 covers GMM tasks such as procedures, routing areas, and state transitions. Section 3.2 covers SM, including the PDP state model, elements involved in PDP contexts, and PDP parameters. Section 3.3 discusses GMM/SM message formats. Sections 3.4 and 3.5 cover specific GMM and SM procedures.
GSM is the globel system of organation . It consists of
M.S,BSC MSC ,OMC,FIXED Phone.Mobile station is carried by
the subscriber.and base station subsystem control the radio
link with mobile station . The main part of system is
mobile switching center perform switching of calls between
the mobile and fixed or mobile network use. and operational
and maintainence center oversees the proper operation and
set up of the network. The MS and BSC communicate across
the um link or air interface and BSC&MSC communicate across
A interface.
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
The document discusses different types of location updating procedures in mobile networks:
1. Location updating type normal occurs when a mobile subscriber (MS) moves to a new location area and needs to update the network of its new location.
2. IMSI attach is used when the MS powers back on in the same location area it was in when it entered detached mode.
3. Periodic registration is used to avoid unnecessary paging and prevent database failures. The MS registers at periodic intervals set by the network operator, from every 6 minutes to every hour.
The GSM system architecture is divided into three major systems: the Switching System (SS), the Base Station System (BSS), and the Operation and Support System (OSS). The SS handles call processing and subscriber functions and includes the MSC, HLR, VLR, and other registers. The BSS handles radio functions and includes the BSC and BTS. The OSS manages errors, configuration, faults, and performance across the network. Key interfaces include the A interface between MSC and BSS, the B interface between MSC and VLR, and the Um interface between MS and BTS.
This document discusses paging and location update procedures in cellular networks. It defines key terms like MSC, VLR, HLR, TMSI, LA, LAI, and describes how location areas are configured and how location updates and paging work. When a mobile moves to a new location area or PLMN, it performs a location update by sending a message to the new MSC/VLR, which updates the subscriber's HLR. Periodic and random location updates also allow the network to track mobile locations. Paging is used to find mobiles and deliver incoming calls based on location registration information.
This document provides an overview of UMTS network architecture and components. It describes the key elements of the UMTS Release 99 core network, including the circuit switched and packet switched domains. It also discusses the radio access network (UTRAN) and its components such as the radio network controller (RNC) and Node B. Finally, it summarizes the functions of the mobile switching center (MSC) and media gateway (MGW) in the UMTS network.
GSM is a digital cellular network standard that allows users to roam internationally. It has a modular architecture consisting of mobile stations, base station subsystems, and network switching subsystems. The mobile station includes a mobile equipment and SIM card. The base station subsystem comprises base transceiver stations and base station controllers. The network switching subsystem contains mobile switching centers, home and visitor location registers, and authentication centers that manage subscriber data and authentication. GSM uses cellular networks of hexagonal cells connected to base station controllers and switching centers to provide coverage over wide geographic areas.
The document discusses GPRS network architecture and processes. It describes how a mobile station (MS) attaches to and detaches from the GPRS network by communicating with the SGSN and HLR. It also describes how a temporary block flow (TBF) is established to enable data transfer between the MS and network. Additionally, it outlines how a packet data protocol (PDP) context is activated and deactivated to manage the subscriber's data session.
This document discusses mobility management (MM) in GPRS and UMTS networks. It describes the different MM states in GPRS (IDLE, STANDBY, READY) and UMTS (PMM-DETACHED, PMM-IDLE, PMM-CONNECTED). The MM contexts maintained by the MS, SGSN, and HLR/AUC are also outlined. Periodic and normal location update procedures performed by the MS to update its location are explained.
GPRS is a packet-based mobile data service on GSM networks. It provides higher speed data transmission than previous GSM data services. The GPRS architecture introduces two new network nodes - SGSN and GGSN. SGSN handles mobility management and packet transmission between MS and GGSN, while GGSN connects the GPRS network to external packet networks like the Internet. GPRS enhances the GSM network by allowing dynamic allocation of bandwidth and intermittent data transmission, making it suitable for bursty, low-volume data applications.
3G technologies enable higher bandwidth applications like video streaming and video calls by providing data rates up to 2Mbps. Common 3G standards include WCDMA, CDMA2000, and EDGE which evolved from 2G technologies like GSM and CDMA. These standards use technologies such as wider bandwidths and advanced modulation to increase speeds while maintaining compatibility with existing network infrastructure. Over 100 mobile operators worldwide have deployed 3G networks using these standards.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
IS-95 CDMA is an air interface standard that uses code division multiple access (CDMA). It employs various techniques to improve system capacity and performance, including bandwidth recycling, power control, soft handoffs, diversity combining, and variable rate vocoding. Key aspects of IS-95 include the use of quadrature phase shift keying modulation at a 1.2288 Mcps chip rate, forward error correction coding, and multiple logical channels (pilot, sync, paging, traffic) defined using orthogonal Walsh codes.
Roaming allows mobile subscribers to access voice and data services outside their home network coverage area by using a visited network. It requires roaming agreements between operators. There are several entities involved including home networks, visited networks, and clearing houses. Roaming can be national, international, or between different standards. Inbound roaming refers to customers of other operators using a home operator's network, while outbound refers to home customers using other networks. Roaming scenarios describe how calls are routed for subscribers roaming within and between networks. GSM technology benefits roaming by providing worldwide access across standards through a single number and device.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
The document discusses different channel assignment strategies for wireless networks, including fixed channel assignment where each cell is predetermined channels and dynamic channel assignment where channels are allocated on request based on factors like channel occupancy. It also describes a partially overlapping channel (FPOC) assignment strategy that aims to increase capacity while minimizing interference through intelligent channel allocation between neighboring nodes.
The document provides an overview of LTE (Long Term Evolution) network architecture and transmission schemes. It describes the simplified LTE network elements including eNB, MME, S-GW and P-GW. It explains the downlink transmission scheme using OFDMA and reference signal structure. It also covers uplink transmission using SC-FDMA, control and data channels as well as frame structure in both FDD and TDD modes.
Introduction to Cellular Mobile System,
Performance criteria,
uniqueness of mobile radio environment,
operation of cellular systems,
Hexagonal shaped cells,
Analog Cellular systems.
Digital Cellular systems
This chapter discusses the GPRS Mobility Management (GMM) and Session Management (SM) protocols. Section 3.1 covers GMM tasks such as procedures, routing areas, and state transitions. Section 3.2 covers SM, including the PDP state model, elements involved in PDP contexts, and PDP parameters. Section 3.3 discusses GMM/SM message formats. Sections 3.4 and 3.5 cover specific GMM and SM procedures.
GSM is the globel system of organation . It consists of
M.S,BSC MSC ,OMC,FIXED Phone.Mobile station is carried by
the subscriber.and base station subsystem control the radio
link with mobile station . The main part of system is
mobile switching center perform switching of calls between
the mobile and fixed or mobile network use. and operational
and maintainence center oversees the proper operation and
set up of the network. The MS and BSC communicate across
the um link or air interface and BSC&MSC communicate across
A interface.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
This document provides an overview of GSM principles and network structure. It discusses key aspects of the GSM system including frequency reuse, multiple access techniques, network components, numbering plans and identifiers. The objectives are to understand the GSM system, its structure, protocols, channel combinations, radio techniques and the introduction of GPRS and EDGE. It contains detailed descriptions and illustrations of concepts such as cells, frequency division duplexing, time division multiple access, frequency planning and network interfaces.
The document outlines basic call flows for location updates, mobile originating calls (MOC), mobile terminating calls (MTC), and IP calls. It describes the key steps as:
1) Location update involves identity response, authentication between the SIM and MSC, update location requests, and ciphering.
2) For MOC, the mobile station sends a setup message with the dialed number, the MSC sends a send routing information message to the HLR, and the HLR responds with routing instructions allowing the call to be connected.
3) For MTC, the MSC requests a roaming number from the HLR, the HLR provides a number and the MSC pages the mobile station to alert
The document discusses UMTS planning and dimensioning processes. It describes:
1) The overall planning process which includes system dimensioning, radio network planning, pre-launch optimization, performance monitoring, and post-launch optimization.
2) The inputs, assumptions, and steps used for air interface dimensioning which includes uplink and downlink link budget analysis to determine coverage requirements and capacity needs.
3) Traffic modelling and load calculation methods to estimate subscriber traffic per cell based on factors like subscriber density, traffic profiles, and cell area.
1. The document describes different scenarios for GSM call routing including: when the called mobile subscriber is powered off, has call forwarding enabled to a PSTN number, has all incoming calls barred, or is unknown at the HLR.
2. It also provides an overview of the signaling process for a mobile originated call from requesting a channel to call setup, as well as the process for a mobile terminated call including paging the destination mobile and connecting the call upon answer.
3. Key network elements involved in call routing include the MS, BSS, MSC, VLR, HLR, GMSC and PSTN, and different messages are exchanged like address, routing info, and assignment messages to setup the
Call flow oma000003 gsm communication flowEricsson Saudi
The document summarizes several key GSM procedures including authentication and ciphering sequence, location update sequence, basic call sequences, and equipment identification. It provides detailed signaling diagrams to illustrate the message flows between different nodes in the network for these procedures.
1. Call routing in GSM involves routing calls from the mobile station (MS) through the base station subsystem (BSS) and mobile switching center (MSC) when originating a call or routing an incoming call to the MS.
2. For outgoing calls, the MS sends the dialed number to the BSS which sends it to the MSC. The MSC checks if the MS is allowed the service and asks the BSS to allocate resources before routing the call through the gateway MSC and local exchange.
3. For incoming calls, the call is first sent to the gateway MSC which signals the home location register (HLR). The HLR provides the visiting location register (VLR) which informs the
The document describes the process of setting up a call to or from a mobile station (MS). For a mobile terminated call, the network locates the MS and pages it to set up a signalling connection. Authentication and security procedures are then performed before a traffic channel is assigned for the call. For a mobile originated call, the MS sets up a signalling connection and informs the network of the number to call before being assigned a traffic channel to place the call. Both processes involve setting up signalling and traffic channels between the MS and network for the call connection.
The document describes the process of setting up a call in a GSM network. It discusses mobile terminated (MT) calls, where a call is made to a mobile subscriber, and mobile originated (MO) calls, where a call originates from a mobile subscriber. For MT calls, the network locates the subscriber's location through the HLR and allocates resources to establish a connection. For MO calls, the mobile subscriber establishes a connection and provides the number of the called party to the network to route the call. Common procedures like authentication and ciphering are also performed before the call is connected on an assigned traffic channel.
The document discusses the topics covered in modules about Global System for Mobile Communications (GSM). It provides an overview of GSM architecture and components like the mobile station, base station subsystem, network switching subsystem and their interfaces. It describes the different generations of cellular networks and GSM channels. It also covers concepts like cell planning, hardware for different network nodes, call paths for various call types, data services, mobile packet backbone network and the evolution of GSM.
The document provides an overview of GSM architecture and call flows. It describes the key components of the GSM network including the mobile station, base station subsystem, network switching subsystem, home location register, visitor location register and authentication center. It then details various location update call flows like IMSI attach, normal and periodic updates. It also summarizes the mobile to mobile and mobile to ISUP call flows and an intra-MSC handover call flow.
This document outlines the topics that will be covered in a GSM training course for professionals. The course covers 10 modules on topics related to GSM architecture, channel concepts, cell planning, hardware, call paths, data services, evolution to LTE, and more. Each module will provide an in-depth look at key aspects of GSM networks to help professionals gain expertise in this area.
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
This document discusses GSM network architecture and components. It describes the key elements like the MSC, HLR, VLR and their functions. It explains cell planning and frequency reuse. It also covers network identities, attaching and roaming processes, call setup, and charging systems like triggered charging for calls and SMS. Compound charging processes for originating calls, voucher refills through IVR are summarized.
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
GSM is a second generation cellular standard developed to provide voice services and data delivery using digital modulation. It was developed by Groupe Spécial Mobile in 1982 to replace incompatible analog cellular systems. GSM specifications were released in 1990 and it is now used in over 135 countries worldwide with over 1.3 billion subscribers. GSM services include teleservices like voice calls, data services like SMS and supplementary services like call waiting. The GSM network architecture consists of mobile stations, base station subsystems including BTS and BSC, and network switching subsystems including MSC, HLR, VLR and others. Future enhancements to GSM include HSCSD, GPRS and EDGE to provide higher data rates before
Kumar gunjan 20160213 mobile communication securitynullowaspmumbai
The document discusses mobile communication technologies and security issues in GSM. It provides an overview of the evolution of mobile communication from 1G to 2G technologies such as GSM. It describes the GSM architecture including components like the SIM card, authentication and encryption schemes, and GSM channels. It also outlines the basic call sequences for mobile-to-land and land-to-mobile calls. Finally, it discusses some security issues in the GSM network like vulnerabilities to sniffing and man-in-the-middle attacks.
A mobile station in GSM comprises several functional groups including the mobile terminal, terminal adapter, terminal equipment, and subscriber identity module. The network and switching subsystem is the main component of the public mobile network and controls switching, mobility management, and interconnection. It includes components like the mobile switching center, home location register, and visitor location register. The mobile switching center plays a central role in switching functions and mobility support.
This document provides an overview of GSM (Global System for Mobile Communications) including its key properties, structure, protocols, databases, security aspects, and extensions like HSCSD and GPRS. GSM is a digital cellular network that allows for roaming between networks and integration with fixed telephone networks. It uses TDMA and FDMA to allow multiple users to access the network simultaneously. Security features include subscriber identity modules (SIM cards), authentication of users, and encryption of communications. Extensions like HSCSD provide higher data rates and GPRS introduces packet switching to GSM networks.
GSM networks divide coverage areas into a hierarchy of locations to efficiently manage subscriber location and enable call delivery. The largest division is the Public Land Mobile Network (PLMN). Within a PLMN are Mobile Switching Center/Visitor Location Register (MSC/VLR) service areas, which are further divided into Location Areas (LA) containing groups of cells. As subscribers move between areas, they perform location updates to inform the network of their position. This allows more efficient paging for call delivery. [END SUMMARY]
The GSM network architecture consists of three major subsystems: the network and switching subsystem (NSS), the base station subsystem (BSS), and the operation and support subsystem (OSS). The BSS is composed of the base transceiver station (BTS), base station controller (BSC), and transcoder (TCU/TRAU). The BTS handles radio transmission/reception, the BSC manages radio resources and handles radio call processing, and the TCU converts between GSM and PSTN/ISDN formats. The NSS contains the mobile switching center (MSC), home location register (HLR), visitor location register (VLR), and equipment identity register (EIR), which manage subscriber
The document summarizes the GSM inter-BSC intra-MSC handover call flow where a mobile phone moves from the Rockville cell to the Bethesda cell while on a call. The Rockville BSC detects the mobile will have better signal in the Bethesda cell and sends a handover required message to the MSC. The MSC sends a handover request to the Bethesda BSC which allocates a channel. The Bethesda BSC sends a handover command to the mobile via the Rockville BSC. The mobile then tunes to the new channel and completes the handover while the call path is switched to maintain the call.
The document summarizes the GSM inter-BSC intra-MSC handover call flow where a mobile phone moves from the Rockville cell to the Bethesda cell while on a call. The Rockville BSC detects the mobile will have better signal in the Bethesda cell and sends a handover required message to the MSC. The MSC sends a handover request to the Bethesda BSC which allocates a channel. The Bethesda BSC sends a handover command to the mobile via the Rockville BSC. The mobile then tunes to the new channel and completes the handover while the call path is switched to maintain the call.
The document summarizes the GSM inter-BSC intra-MSC handover call flow where a mobile phone moves from the Rockville cell to the Bethesda cell while on a call. The Rockville BSC detects the mobile will have better signal in the Bethesda cell and sends a handover required message to the MSC. The MSC sends a handover request to the Bethesda BSC which allocates a channel. The Bethesda BSC sends a handover command to the mobile via the Rockville BSC. The mobile then tunes to the new channel and completes the handover process while maintaining the active call.
The document summarizes the steps in a mobile originated call (MOC) and mobile terminated call (MTC) in GSM networks. For a MOC, the mobile station uses random access to request a signaling channel, is allocated a channel, and sends its IMSI. It then sends a call setup request including authentication, ciphering, and the called number. For a MTC, the call is forwarded to the gateway MSC, signaled to the HLR, the VLR is requested, the responsible MSC is identified, the current MSC is contacted to page the mobile station and set up the connection if answered.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
2. Agenda
GSM-Introduction
Mobile Station (ME+SIM)
HLR, VLR
Location Update
Call Routing Scenarios
Mobile Originated Sequence
Mobile Terminated Sequence
Mobile-to-Mobile Long distance
Mobile in Roaming (Domestic, International)
Call Handover
Questions
4. HLR / VLR
Home Location Registers (HLR)
o permanent database about mobile subscribers in a large
service area(generally one per GSM network operator)
o database contains IMSI, MSISDN, prepaid/postpaid,
roaming restrictions, MSC/VLR, supplementary services.
Visitor Location Registers (VLR)
o Temporary database which updates whenever new MS
enters its area, by HLR database
o Controls those mobiles roaming in its area
o Reduces number of queries to HLR
o Database contains IMSI, TMSI, MSISDN, MSRN, Location
Area, authentication key
6. Brief Introdution to Location Update
Three types of Location Update :
IMSI Attach/
Detach
Normal Location Update
Periodic Location Update
7. Questions
Please give the sequence:
1.The called MS is powered off.
2.The called MS activates the CFU to a
PSTN No.
3.The called MS has been barred all
incoming call.
4.The Called MS are not known at HLR
8. 1. The called MS is powered off
AP Vodafone AP Airtel
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final
MSISDN
1 Address Message
( +91 9885 xxxxxx
MSISDN
2 Send Routing Info ( +91 9885 xxxxxx
3 Routing Info Ack
Subscriber Absent The Calling Mobile
hears the
announcement of
mobile is powered
off
9. 2. The called MS activates the CFU to a PSTN No.
MS BSS MSC VLR HLR GMSC PSTN
MSISDN
Initial and Final +91 9885 xxxxxx
1 Address Message
MSISDN
2 Send Routing Info +91 9885 xxxxxx
3 Routing Info Ack
CFN
+91 40 66235307
4 IFAM
10. 3. The called MS has been barred all incoming call.
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final MSISDN
1 Address Message +91 9885 xxxxxx
MSISDN
2 Send Routing Info
+91 9885 xxxxxx
3 Routing Info Ack
Call Barred
11. 4. The Called MS are not known at HLR
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final MSISDN
1 Address Message +91 9885 xxxxxx
MSISDN
2 Send Routing Info
+91 9885 xxxxxx
3 Routing Info Ack
Unknown Subscriber
14. Mobile Originated Sequence
MS BSS MSC VLR HLR PSTN
1 CHANNEL REQUEST Signaling Link request
DCCH ASSIGN Signaling Link Granted
SIGNALING LINK
ESTABLISHED
Channel request
2 REQ. FOR SERVICE
3 AUTHENTICATION
SET Cipher MODE
Setup Voice Call
4 SET-UP
Dailed digits …+91 40 66235307
5 EQUIP. ID REQ.
6 COMPLETE CALL
CALL PROCEEDING Call setup is in Process
15. Mobile Originated Sequence
MS BSS MSC VLR HLR PSTN
7 ASSIG. COMMAND
Switch from Signaling
ASSIG. COMPLETE Mode to Voice
+91 40 66235307
8.Initial and Final Address Switch routes the call to PSTN
Message (IFAM)
PSTN indicates to Switch
Address Complete(ACM)
< Called Subscriber Informed Via Ring
Alerting Ring Alert
MS hears ring
tone from land Passed to Mobile
phone Called Subscriber Answered
9 Answer (ANS)Connect
Switch Informs
Ring tone Call Answered
stops
10 Connect Acknowldge Acknowledge Call
Hi RK
Answered received
Speech Started
BILLING STARTS
16. Mobile Terminated Sequence
AP Vodafone AP Airtel
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final MSISDN
1 Address Message +91 9885 xxxxxx
MSISDN
IMSI +91 9885 xxxxxx
2 Send Routing Info
404 13 xxxxxxxxxx
3 Routing Info Ack
Initial and Final MSRN MSRN
Address Message 091 9885 xxxxxx (roaming number)
MSRN
091 9885 xxxxxx (roaming number)
4 Send Info For I/C
Call Setup
MSRN
5 Page
<PCH>
Paging Request
TMSI) TMSI) LAI & TMSI)
LAI – 404 13 location Area Code
17. Mobile Terminated Sequence
AP Vodafone AP Airtel
MS BSS MSC VLR HLR GMSC GMSC
6 Assignment Call Setup Request
Command
Assignment Call Setup Confirmed
Complete Ring Tone at
Ringtone Alert Acknowledge the Other
Alert Mobile
Address Complete
7 Connect Mobile Subscriber Answered
Ringing stops
Subscriber at Other
picks up Mobile
Connect ACK ANS Billing
starts
Speech Started Hello...
18. Mobile-to-Mobile Long Distance
2. Towers are serviced by
1. Cell phone transmits to a local base station
local towers
Radio tower
3. Basestations are
services by Mobil
Switching Station
Radio tower Base Station
Mobile Switching Station
5. Destination switch office
4. Regional Switch Office
receives call, and forwards
forwards calls
to Mobil Switching Station
Trunk
Regional Switch Office Regional Switch Office
Radio tower
Mobile Switching Station
Base Station
5. Mobile Switching
Station forwards to Base 6. Base Station forwards
Station to local towers.
Radio tower
7. Local towers complete
the loop
19. Mobile is in Roaming
2.Receiving Mobile on Roaming
3. Both Mobiles are on Roaming
The following is intended to help illustrate the four types (levels) of handover. Illustrated is a system consisting of two Mobile Switching Centres (MSCs) with three Base Station Systems (BSSs). Also depicted are cell coverage areas with example global cell identification codes for each base transceiver station. From the mobile station's reference point, it is unaware of the four levels of handover. The mobile station has two handover-related responsibilities: to provide signal measurements to its serving base station and to retune to a new radio channel when ordered to do so. Assume that the mobile and land stations are active in a call, the call is being controlled by MSC A, and the mobile is currently in cell area 234-01-100-54 . Intra-BSS/Intra Base Transceiver Station For this type of handover, the mobile station is handed off to a different radio channel within the same cell area: 234-01-100-54 . This is actually an unusual type of handover, since it is not triggered by poor signal strength – if it was, the candidate base station would be different from the serving BTS. A probable cause of this type of handover would be poor signal quality (not strength), possibly due to co-channel interference. For this type of handover, BSC 3 would allocate a new radio channel and instruct the mobile station to retune.