GSM and GPRS are cellular mobile systems that use different technologies for circuit-switched and packet-switched connections respectively. GSM uses frequency division duplexing and provides mobility through handovers between cells and location area updates. GPRS enhances GSM to provide packet-switched data services over the same radio interface and core network by adding packet control units and routers. Security in GSM includes authentication of users, ciphering of communications, and use of temporary identifiers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2. Examples of digital wireless systems
(all originally specified by ETSI)
GSM (Global System for Mobile communication) is a
cellular mobile system
• cellular concept
• high mobility (international roaming)
TETRA (TErrestrial Trunked RAdio) is an example of a
Professional/Privat Mobile Radio (PMR) system
• limited access (mainly for professional usage)
• limited mobility (but other advanced features)
DECT (Digital Enhanced Cordless Telecommunications)
is a cordless system
• low mobility (only within “isolated islands”)
next
lecture
3. Digital PLMN systems (status 2002)
IMT-2000
GSM
CDMA
2000
IS-136
GPRS
EDGE
IS-95
UMTS:
USA
2nd Generation (2G) 3rd Generation (3G) 4G
UTRA FDD
UTRA TDD
(PLMN = Public Land Mobile Network)
Packet
services
More radio
capacity
FDD
4. Duplexing
(separation of uplink/downlink transmission directions)
FDD (Frequency Division Duplexing)
(GSM/GPRS, TETRA, UTRA FDD)
TDD (Time Division Duplexing)
(DECT, UTRA TDD)
frequency
time
Uplink Downlink
UL DL UL DL
... ...
duplex separation
5. FDD vs. TDD
FDD TDD
Duplex filter is large and
expensive
Large MS-BS separation
=> inefficient
Different fading in
UL/DL
Same fading in UL/DL
Same UL/DL
bandwidth
Flexible UL/DL bandwidth
allocation
=> effect on power control
asymmetric services
=> indoor
6. GSM => cellular concept
The GSM network contains a large number of cells with
a base station (BS) at the center of each cell to which
mobile stations (MS) are connected during a call.
BS
BS
BS
BS
MS
If a connected MS
(MS in call phase)
moves between two
cells, the call is not
dropped.
Instead, the network
performs a handover
(US: hand-off).
7. GSM => mobility concept
The GSM network is divided into location areas (LA),
each containing a certain number of cells.
As long as an idle MS
(idle = switched on)
moves within a location
area, it can be reached
through paging.
If an idle MS moves between
two location areas, it cannot be
reached before it performs a
location update.
Location Area 1
Location Area 3
Location
Area 2
8. Original GSM system architecture
NSS
BSS
MS database
BTS
MS
MS
ME
SIM HLR
AuC
EIR
BSC
MSC
VLR
GMSC
= BS
BTS
10. GPRS: packet switched connections
NSS
BSS
GMSC
BSC
MSC
VLR
Packet switched
connection
Signaling
MS
Database
BTS
HLR
AuC
EIR
GGSN
IP
backbone
PCU
SGSN
TE ME
SIM
11. Upgrading from GSM to GSM/GPRS
NSS
BSS
GMSC
BSC
MSC
VLR
MS BTS
HLR
AuC
EIR
GGSN
IP
backbone
PCU
SGSN
• New MS/terminals
• Packet Control Unit (PCU)
• SGSN and GGSN routers
• software updates (BTS, HLR)
TE ME
SIM
12. Task division between MSC and TRAU
(TRAU = Transcoding and Rate Adaptation Unit)
NSS
BSS
BSC for
signalling only
13 kbit/s encoded speech is
packed into 16 kbit/s frame
Conventional
64 kbit/s
PCM signal
TRAU
BSC
BTS
MS
MS
MSC
VLR
13. Radio interface - multiple access techniques
Frequency division
Code
division
Time division
time
code nr.
frequency
14. Radio interface - physical channels
Frame of length 8 time slots
T S S T T T T T T S S T
T T T T T TT T T T T T T
T T T T T T T T T T T T
T T T T T T T T T T T T
Carrier 0
Carrier 1
Carrier 2
Carrier 3
TS2 TS2
TS0 TS1
Typically used for signaling
Time Slot
Physical channel = time slot
15. Radio interface - logical channels (GSM)
Traffic channels Control channels (for signaling)
TCH/F
TCH/H
Broadcast Common control Dedicated
SCH
FCCH
BCCH
PCH
AGCH
SDCCH
SACCH
FACCH
RACH
bidirectional
downlink
uplink
16. GSM burst structure
3 57 encrypted bits 1 26 training bits 1 57 encrypted bits 3 8.25
TS7 TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0 TS1
1 2 3 4 5 6 7 8 9 10
23 24 25 26
11 12 13 14 15
traffic or signaling info in burst?
SACCH
Idle
GSM normal burst: 156.25 bits (0.577 ms)
TDMA frame (4.615 ms):
TDMA multiframe:
= 26 TDMA frames (in case of TCH)
17. GSM speech encoding
260 bits
57 bits
260 bits
456 bits
57 bits 57 bits
bits 4, 12, 20, 28,
36, 44, etc. from
the 456 bit frame
Voice coding: 260 bits in 20 ms blocks (13 kbit/s) MS - TRAU
Channel coding: 456 coded bits (22.8 kbit/s) MS - BTS
Interleaving: 8 x 57 bits (22.8 kbit/s)
18. GSM signaling message encoding
184 bits
57 bits
456 bits
57 bits 57 bits
bits 4, 12, 20, 28,
36, 44, etc. from
the 456 bit frame
Signaling message is segmented into blocks of 184 bits:
Each block is coded into 456 bits (22.8 kbit/s)
Interleaving: 8 x 57 bits (22.8 kbit/s)
19. Task Management in GSM/GPRS
Session Management (SM) in GPRS
Call Control (CC) in GSM
Mobility Management (MM)
Radio Resource Management (RM)
MOC, MTC
PDP Context
Random access and channel reservation
Handover management
Ciphering (encryption) over radio interface
IMSI/GPRS Attach (switch on) and Detach (switch off)
Location updating (MS moves to other Location/Routing Area)
Authentication
1
3
2
4
5
6
Number
refers to the
remaining
slides
20. Who is involved in what?
MS BTS BSC MSC/VLR
RR
MM
CM / SM
SGSN
21. Random access in GSM/GPRS (1)
Communication between MS and network is not possible
before going through a procedure called random access.
Random access must consequently be used in
network originated activity
• paging, e.g. for a mobile terminated call in GSM
MS originated activity
• IMSI attach, IMSI detatch
• GPRS attach, GPRS detach
• location updating in GSM or GPRS
• mobile originated call in GSM
• SMS (short message service) message transfer
1
22. Random access in GSM/GPRS (2)
1. MS sends a short access burst over the Random
Access CHannel (RACH) in uplink using Slotted Aloha
(collision possibility retransmission)
2. After detecting the access burst, the network (BSC)
returns an ”immediate assignment” message which
includes the following information:
- allocated physical channel (frequency, time slot) in
which the assigned signalling channel is located
- timing advance (for correct time slot alignment)
3. The MS now sends a message on the dedicated
signalling channel assigned by the network, indicating
the reason for performing random access.
1
23. Four security measures in GSM
1) PIN code (authentication of SIM = local security
measure, network is not involved)
2) User authentication (performed by network)
3) Ciphering of information sent over air interface
4) Usage of TMSI (instead of IMSI) over air interface
IMSI = International Mobile Subscriber Identity
(globally unique identity)
TMSI = Temporary Mobile Subscriber Identity
(local and temporary identity)
24. Basic principle of user authentication
algorithm algorithm
The same? If yes,
authentication is successful
SIM
(in terminal)
Air
Interface
Network
Random number
Challenge
Response
Authentication key Authentication key
RAND
SRES
2
Ki Ki
25. Ciphering in GSM
algorithm algorithm
Ciphering key
Time info Ciphering key
Time info
MS BTS
Data Data
Ciphered data
Cipher command
(”time info”...)
For each call, a new ciphering key (Kc) is generated
during authentication both in MS and MSC (in same way
as authentication “response”).
3
Kc Kc
algorithm algorithm
26. Three security algorithms in GSM
(in UMTS many more …)
A3
Ki
Ciphered data
Time info (from network)
RAND (from network)
Data
SRES (to network)
A8
A5
Kc
Mobile Station (MS) Network
2
3
27. Three security algorithms in GSM
at the network side ...
A3
Ki RAND
Data
A8
A5
Kc
Serving MSC
MS AuC
RAND
Ciphered data
SRES
Kc
Time
info Ki
SRES SRES
Authentication
vector
?
2
3
28. Algorithm considerations
Using output and one or more inputs, it is in practice not
possible to calculate “backwards” other input(s)
“brute force approach”, “extensive search”
Key length in bits (N) is important (in case of brute force
approach 2N calculation attempts may be needed)
Strength of algorithm is that it is secret => bad idea!
“security through obscurity”
Better: open algorithm can be tested by engineering
community (security through strong algorithm)
2
3
29. Usage of TMSI in GSM
MS Network
Random access
Authentication
Start ciphering
IMSI detach New TMSI
allocated by
network
New TMSI stored in SIM
CM or MM transaction
TMSI
2
3
IMSI is never
sent over air
interface if
not absolutely
necessary!
30. Connectivity states in GSM/GPRS
Disconnected
Idle
Connected
Idle
Standby
Ready
MS is switched off (circuit mode)
location updates on LA basis
handovers, not location updates
MS is switched off (packet mode)
location updates on RA basis
location updates on cell basis
GSM
GPRS
4
31. GPRS connectivity state model
Idle
Ready
Standby
GPRS attach GPRS detach
Timer expired Transmission of packet
Standby
timer
expired
No location management,
MS not reachable
Location update when MS
changes cell
Location update when MS
changes routing area
4
32. MM “areas” in GSM/GPRS
Cell
Location Area (LA)
Routing Area (RA)
Location
updating
in GSM
Location updating in GPRS
(standby state)
Location updating in GPRS
(ready state)
4
33. Trade-off when choosing LA/RA size
Affects signalling load
If LA/RA size is very large (e.g. whole mobile network)
location updates not needed very often
paging load is very heavy
If LA/RA size is very small (e.g. single cell)
small paging load
location updates must be done very often
Affects capacity
+
+
4
34. Example: GSM location update (1)
ME
SIM
HLR
MSC
VLR 1
Most recently allocated TMSI and last visited LAI (Location
Area ID) are stored in SIM even after switch-off.
After switch-on, MS monitors LAI. If stored and monitored
LAI values are the same, no location updating is needed.
(most generic scenario)
MSC
VLR 2
LAI 1
IMSI
TMSI
LAI 1
IMSI
TMSI
IMSI
LAI 1
4
(in broadcast messages)
35. GSM location update (2)
ME
SIM
MSC
VLR 1
Different LAI values => location update required !
MSC
VLR 2
LAI 2
HLR
IMSI
LAI 1
IMSI
TMSI
LAI 1
IMSI
TMSI
4
(in broadcast
messages)
36. GSM location update (3)
ME
SIM
MSC
VLR 1
SIM sends old LAI and TMSI to VLR 2.
VLR 2 does not recognize TMSI since there is no TMSI-
IMSI context. Who is this user?
MSC
VLR 2
LAI 1, TMSI
HLR
IMSI
LAI 1
IMSI
TMSI
LAI 1
IMSI
TMSI
No TMSI - IMSI
context
4
37. GSM location update (4)
ME
SIM
MSC
VLR 1
However, VLR 2 can contact VLR 1 (address: LAI 1) and
request IMSI.
IMSI is sent to VLR 2.
MSC
VLR 2
HLR
IMSI
LAI 1
IMSI
TMSI
LAI 1
IMSI
TMSI IMSI
TMSI
IMSI
4
address:
LAI 1
38. GSM location update (5)
ME
SIM
MSC
VLR 1
Important: HLR must be updated (new LAI). If this is not
done, incoming calls can not be routed to new MSC/VLR.
HLR also requests VLR 1 to remove old user data.
MSC
VLR 2
HLR
IMSI
LAI 1
LAI 2
IMSI
TMSI
LAI 1
IMSI
TMSI
IMSI
TMSI
LAI 2
4
39. GSM location update (6)
ME
SIM
MSC
VLR 1
VLR 2 generates new TMSI and sends this to user. User
stores new LAI and TMSI safely in SIM.
Location update successful !
MSC
VLR 2
HLR
IMSI
LAI 2
LAI 1
IMSI
TMSI
LAI 2
TMSI
IMSI
TMSI
TMSI
LAI 2
TMSI
4
40. GSM identifiers (1)
MCC = Mobile Country Code (3 digits)
MNC = Mobile Network Code (2 digits)
MSIN = Mobile Subscriber Identity Number (10 digits)
Globally
unique
LAC
LAI
MCC = Mobile Country Code (3 digits)
MNC = Mobile Network Code (2 digits)
LAC = Location Area Code (10 digits)
=
Globally
unique
CI LAI + CI
= CGI
Cell Global
Identity
MSIN
IMSI = GSM ”internal
information”
41. GSM identifiers (2)
SN
CC
MSISDN
CC = Country Code (1-3 digits)
NDC = National Destination Code (1-3 digits)
SN = Subscriber Number
=
Globally
unique
E.164 numbering
format
TN
CC
MRSN
CC = Country Code (1-3 digits)
NDC = National Destination Code (1-3 digits)
TN = Temporary Number
=
Temporary
allocation
E.164 numbering
format
for routing to GMSC
for routing to MSC/VLR
subscriber database in HLR
temporary subscriber ID
42. GSM mobile terminated call (1)
BTS
ME
SIM
HLR
AuC
EIR
GMSC
BSC
MSC
VLR
Circuit switched connection
Signaling (ISUP, MAP)
MS
Database
Mobile terminated call = MTC
(64 kb/s PCM, 16 kb/s between TRAU and BTS,
13 kb/s encoded speech over air interface)
5
43. GSM mobile terminated call (2)
BTS
ME
SIM
HLR
AuC
EIR
BSC
MSC
VLR
MS
Call is routed to GMSC using MSISDN number of called
user (e.g. 040 1234567).
MSISDN number in fact points to database in HLR.
HLR is contacted. Under which MSC/VLR is user?
GMSC
5
44. GSM mobile terminated call (3)
BTS
ME
SIM
HLR
AuC
EIR
BSC
MSC
VLR
MS
HLR knows location of Serving MSC/VLR (when user
moves to another VLR, this is always recorded in HLR).
HLR requests MSRN (roaming number) from VLR.
MSRN is forwarded to GMSC.
GMSC
5
45. GSM mobile terminated call (4)
BTS
ME
SIM
HLR
AuC
EIR
BSC
MSC
VLR
MS
Call can now be routed to Serving MSC/VLR using ISUP
(may involve several intermediate switching centers).
MSC/VLR starts paging within Location Area (LA) in
which user is located, using TMSI for identification.
GMSC
5
46. GSM mobile terminated call (5)
BTS
ME
SIM
HLR
AuC
EIR
BSC
MSC
VLR
MS
Only the mobile user with the corresponding TMSI
responds to the paging.
Using random access procedure, user requests a
channel, e.g. SDCCH, for call control signaling.
GMSC
5
47. GSM mobile terminated call (6)
BTS
ME
SIM
HLR
AuC
EIR
BSC
MSC
VLR
MS
Signaling channel is set up. After authentication and
ciphering procedures, call control signaling continues.
Finally, the circuit switched connection is established up
to mobile user.
GMSC
5
48. GPRS attach / PDP session
GPRS attach
MS is assigned PDP (IP) address
Packet transmission can take place
Separate or combined GSM/GPRS attach
MS registers with an SGSN (authentication...)
Location update possible
PDP context is created
GPRS detach
PDP context terminated
Allocated IP address released
In case of
dynamic
address
allocation
6
DHCP
RADIUS
49. PDP context
PDP context describes characteristics of GPRS session
(session = “always on” connection)
PDP context information is stored in MS, SGSN and GGSN
MS
GGSN
SGSN
:::
:::
:::
:::
:::
:::
PDP type (e.g. IPv4)
PDP address = IP address of MS
(e.g. 123.12.223.9)
Requested QoS (priority, delay …)
Access Point Name (GGSN address
as seen from MS)
One user may have several PDP
sessions active
6
123.12.223.9
123.12.223.0
50. PDP context activation
MS GGSN
SGSN
:::
:::
Activate PDP context request
Create PDP context request
Create PDP context response
Activate PDP context accept :::
:::
:::
:::
IP address allocated to MS
Security functions
6
51. Packet transmission (1)
MS
(client)
GGSN
SGSN Server
(IP, WAP..)
IP
backbone
Dynamic IP address allocation has one problem:
it is difficult to handle a mobile terminated transaction
(external source does not know IP address of MS)
Fortunately, packet services are of client-server type
=> MS initiates packet transmission
?
6
52. Packet transmission (2)
MS
(client)
GGSN
SGSN Server
(IP, WAP..)
Packet is sent to SGSN. SGSN sends packet to GGSN
through GTP (GPRS Tunneling Protocol) tunnel.
Packet is tunneled
through IP backbone
IP address ... IP address IP payload
Tunneling = encapsulation of IP packet in GTP packet
... = APN of GGSN, used for routing through tunnel
6
53. Packet transmission (3)
MS
(client)
GGSN
SGSN Server
(IP, WAP..)
GGSN sends packet through external IP network (i.e.
Internet) to IP/WAP server.
Source IP addr. Dest. IP addr. IP payload
GGSN
Source IP
address:
GGSN
Server
6
54. Packet transmission (4)
MS
(client)
GGSN
SGSN Server
(IP, WAP..)
Server sends return packet via GGSN, GTP tunnel and
SGSN to MS.
Packets from server to MS are always routed via GGSN
(since this node has PDP context information).
Dest. IP
address:
GGSN
Dest. tunnel
address: SGSN
Dest. IP address: MS
6
55. Further information on GSM/GPRS
Books:
Many good books available (GSM)
Andersson: GPRS and 3G wireless applications, Wiley, 2001,
Chapter 3 (GPRS)
Web material:
www.comsoc.org/livepubs/surveys/public/4q99issue/
reprint4q.html (GSM system and protocol architecture)
www.comsoc.org/livepubs/surveys/public/3q99issue/
bettstetter.html (GPRS basics)
Part of this source is required course material