SlideShare a Scribd company logo
GSM - Addresses and Identifiers
Salman Khan
ID: 1309004
Session: 2013-14
Dept. of ICT
1
Outline
 Introduction
 International Mobile Station Equipment Identity (IMEI)
 International Mobile Subscriber Identity (IMSI)
 Mobile Subscriber ISDN Number (MSISDN)
 Mobile Station Roaming Number (MSRN)
 Location Area Identity (LAI)
 Temporary Mobile Subscriber Identity (TMSI)
 Local Mobile Subscriber Identity (LMSI)
 Cell Identifier (CI)
2
Introduction
GSM treats the users and the equipment in different
ways. Phone numbers, subscribers, and equipment
identifiers are some of the known ones. There are
many other identifiers that have been well-defined,
which are required for the subscriber’s mobility
management and for addressing the remaining
network elements.
3
International Mobile Station Equipment
Identity (IMEI)
 The International Mobile
Station Equipment Identity
(IMEI) looks more like a serial
number which distinctively
identifies a mobile station
internationally. This is allocated
by the equipment
manufacturer and registered
by the network operator, who
stores it in the Equipment
Identity Register (EIR).
4
Con’t
 Following are the parts of IMEI:
 Type Approval Code (TAC) : 6 decimal places, centrally assigned.
 Final Assembly Code (FAC) : 6 decimal places, assigned by the manufacturer.
 Serial Number (SNR) : 6 decimal places, assigned by the manufacturer.
 Spare (SP) : 1 decimal place.
 Thus, IMEI = TAC + FAC + SNR + SP.
5
International Mobile Subscriber Identity
(IMSI)
 Every registered user has an original International Mobile Subscriber Identity
(IMSI) with a valid IMEI stored in their Subscriber Identity Module (SIM).
 IMSI comprises of the following parts:
 Mobile Country Code (MCC) : 3 decimal places, internationally standardized.
 Mobile Network Code (MNC) : 2 decimal places, for unique identification of mobile
network within the country.
 Mobile Subscriber Identification Number (MSIN) : Maximum 10 decimal places,
identification number of the subscriber in the home mobile network.
6
Mobile Subscriber ISDN Number
(MSISDN)
 The authentic telephone number of a mobile station is the Mobile
Subscriber ISDN Number (MSISDN). Based on the SIM, a mobile station
can have many MSISDNs, as each subscriber is assigned with a separate
MSISDN to their SIM respectively.
7
Con’t8
Mobile Station Roaming Number (MSRN)
 Mobile Station Roaming Number (MSRN) is an interim location
dependent ISDN number, assigned to a mobile station by a regionally
responsible Visitor Location Register (VLA). Using MSRN, the incoming
calls are channeled to the MS.
 The MSRN has the same structure as the MSISDN.
 Country Code (CC) : of the visited network.
 National Destination Code (NDC) : of the visited network.
 Subscriber Number (SN) : in the current mobile network.
9
Location Area Identity (LAI)
 Within a PLMN, a Location Area identifies its own authentic Location
Area Identity (LAI). The LAI hierarchy is based on international standard
and structured in a unique format as mentioned below:
 Country Code (CC) : 3 decimal places.
 Mobile Network Code (MNC) : 2 decimal places.
 Location Area Code (LAC) : maximum 5 decimal places or maximum
twice 8 bits coded in hexadecimal (LAC < FFFF).
10
Temporary Mobile Subscriber Identity
(TMSI)
 Temporary Mobile Subscriber Identity (TMSI) can be
assigned by the VLR, which is responsible for the current
location of a subscriber. The TMSI needs to have only local
significance in the area handled by the VLR. This is stored on
the network side only in the VLR and is not passed to the
Home Location Register (HLR).
 Together with the current location area, the TMSI identifies a
subscriber uniquely.
 It can contain up to 4 × 8 bits.
11
Local Mobile Subscriber Identity (LMSI)
 Each mobile station can be assigned with a Local Mobile
Subscriber Identity (LMSI), which is an original key, by the
VLR. This key can be used as the auxiliary searching key for
each mobile station within its region. It can also help
accelerate the database access. An LMSI is assigned if the
mobile station is registered with the VLR and sent to the
HLR.
 LMSI comprises of four octets (4x8 bits).
12
Cell Identifier (CI)
 Using a Cell Identifier (CI), the individual cells that are within
an LA can be recognized.
 maximum (2 × 8) bits.
 Global Cell Identity = (LAI + CI).
13
That’s All
Thank you
14

More Related Content

What's hot

Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
Abidullah Zarghoon
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
shalet kochumuttath Shaji
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
Hamidreza Bolhasani
 
GSM Channel Concept
GSM Channel ConceptGSM Channel Concept
GSM Channel Concept
Md Mustafizur Rahman
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
Telebeansolutions
 
UMTS Protocols
UMTS ProtocolsUMTS Protocols
UMTS Protocols
Naveen Jakhar, I.T.S
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Zorays Solar Pakistan
 
Telecom Roaming Overview
Telecom Roaming OverviewTelecom Roaming Overview
Telecom Roaming Overview
Shilpin Pvt. Ltd.
 
TEMS PARAMETERS
TEMS PARAMETERSTEMS PARAMETERS
TEMS PARAMETERS
Tempus Telcosys
 
Call flow
Call flowCall flow
Overview Of Gsm Cellular Network &amp; Operations
Overview Of Gsm Cellular Network &amp; OperationsOverview Of Gsm Cellular Network &amp; Operations
Overview Of Gsm Cellular Network &amp; OperationsDeepak Sharma
 
International roaming technical view
International roaming technical viewInternational roaming technical view
International roaming technical view
Rawand Jaf
 
Tems layer3_messages
Tems  layer3_messagesTems  layer3_messages
Tems layer3_messages
badgirl3086
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
Justin MA (馬嘉昌)
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Gprs
GprsGprs

What's hot (20)

Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
GSM Channel Concept
GSM Channel ConceptGSM Channel Concept
GSM Channel Concept
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 
UMTS Protocols
UMTS ProtocolsUMTS Protocols
UMTS Protocols
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
Telecom Roaming Overview
Telecom Roaming OverviewTelecom Roaming Overview
Telecom Roaming Overview
 
TEMS PARAMETERS
TEMS PARAMETERSTEMS PARAMETERS
TEMS PARAMETERS
 
Call flow
Call flowCall flow
Call flow
 
Overview Of Gsm Cellular Network &amp; Operations
Overview Of Gsm Cellular Network &amp; OperationsOverview Of Gsm Cellular Network &amp; Operations
Overview Of Gsm Cellular Network &amp; Operations
 
International roaming technical view
International roaming technical viewInternational roaming technical view
International roaming technical view
 
Wcdma channels
Wcdma channels Wcdma channels
Wcdma channels
 
Handover in Telecom
Handover in TelecomHandover in Telecom
Handover in Telecom
 
Call flows
Call flowsCall flows
Call flows
 
Tems layer3_messages
Tems  layer3_messagesTems  layer3_messages
Tems layer3_messages
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Gprs
GprsGprs
Gprs
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 

Similar to GSM - Addresses and Identifiers

Gsm location management by Engr.Hedayat ullah shujaee
Gsm location management by  Engr.Hedayat ullah shujaeeGsm location management by  Engr.Hedayat ullah shujaee
Gsm location management by Engr.Hedayat ullah shujaee
Hedayatullah shujaee
 
Gsm
GsmGsm
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
Tempus Telcosys
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network Architecture
Ahmed Khaled
 
GSM
GSMGSM
gsm operation
gsm operationgsm operation
gsm operation
keyvan storer
 
Gsm security
Gsm securityGsm security
Gsm security
maicuong8
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecturesumit singh
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
satishnittana1
 
Ec module 3
Ec module 3Ec module 3
Ec module 3
Amarjith C K
 
Gsm1
Gsm1Gsm1
GSM System Architecture.pptx
GSM System Architecture.pptxGSM System Architecture.pptx
GSM System Architecture.pptx
AshutoshKumar899318
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
Saikiran Panjala
 

Similar to GSM - Addresses and Identifiers (20)

Gsm location management by Engr.Hedayat ullah shujaee
Gsm location management by  Engr.Hedayat ullah shujaeeGsm location management by  Engr.Hedayat ullah shujaee
Gsm location management by Engr.Hedayat ullah shujaee
 
Gsm
GsmGsm
Gsm
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
report
reportreport
report
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network Architecture
 
GSM
GSMGSM
GSM
 
Gsm
GsmGsm
Gsm
 
Gsm1
Gsm1Gsm1
Gsm1
 
gsm operation
gsm operationgsm operation
gsm operation
 
Gsm security
Gsm securityGsm security
Gsm security
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
 
Ec module 3
Ec module 3Ec module 3
Ec module 3
 
Gsm1
Gsm1Gsm1
Gsm1
 
GSM System Architecture.pptx
GSM System Architecture.pptxGSM System Architecture.pptx
GSM System Architecture.pptx
 
GSM Rating Overview
GSM Rating OverviewGSM Rating Overview
GSM Rating Overview
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

GSM - Addresses and Identifiers

  • 1. GSM - Addresses and Identifiers Salman Khan ID: 1309004 Session: 2013-14 Dept. of ICT 1
  • 2. Outline  Introduction  International Mobile Station Equipment Identity (IMEI)  International Mobile Subscriber Identity (IMSI)  Mobile Subscriber ISDN Number (MSISDN)  Mobile Station Roaming Number (MSRN)  Location Area Identity (LAI)  Temporary Mobile Subscriber Identity (TMSI)  Local Mobile Subscriber Identity (LMSI)  Cell Identifier (CI) 2
  • 3. Introduction GSM treats the users and the equipment in different ways. Phone numbers, subscribers, and equipment identifiers are some of the known ones. There are many other identifiers that have been well-defined, which are required for the subscriber’s mobility management and for addressing the remaining network elements. 3
  • 4. International Mobile Station Equipment Identity (IMEI)  The International Mobile Station Equipment Identity (IMEI) looks more like a serial number which distinctively identifies a mobile station internationally. This is allocated by the equipment manufacturer and registered by the network operator, who stores it in the Equipment Identity Register (EIR). 4
  • 5. Con’t  Following are the parts of IMEI:  Type Approval Code (TAC) : 6 decimal places, centrally assigned.  Final Assembly Code (FAC) : 6 decimal places, assigned by the manufacturer.  Serial Number (SNR) : 6 decimal places, assigned by the manufacturer.  Spare (SP) : 1 decimal place.  Thus, IMEI = TAC + FAC + SNR + SP. 5
  • 6. International Mobile Subscriber Identity (IMSI)  Every registered user has an original International Mobile Subscriber Identity (IMSI) with a valid IMEI stored in their Subscriber Identity Module (SIM).  IMSI comprises of the following parts:  Mobile Country Code (MCC) : 3 decimal places, internationally standardized.  Mobile Network Code (MNC) : 2 decimal places, for unique identification of mobile network within the country.  Mobile Subscriber Identification Number (MSIN) : Maximum 10 decimal places, identification number of the subscriber in the home mobile network. 6
  • 7. Mobile Subscriber ISDN Number (MSISDN)  The authentic telephone number of a mobile station is the Mobile Subscriber ISDN Number (MSISDN). Based on the SIM, a mobile station can have many MSISDNs, as each subscriber is assigned with a separate MSISDN to their SIM respectively. 7
  • 9. Mobile Station Roaming Number (MSRN)  Mobile Station Roaming Number (MSRN) is an interim location dependent ISDN number, assigned to a mobile station by a regionally responsible Visitor Location Register (VLA). Using MSRN, the incoming calls are channeled to the MS.  The MSRN has the same structure as the MSISDN.  Country Code (CC) : of the visited network.  National Destination Code (NDC) : of the visited network.  Subscriber Number (SN) : in the current mobile network. 9
  • 10. Location Area Identity (LAI)  Within a PLMN, a Location Area identifies its own authentic Location Area Identity (LAI). The LAI hierarchy is based on international standard and structured in a unique format as mentioned below:  Country Code (CC) : 3 decimal places.  Mobile Network Code (MNC) : 2 decimal places.  Location Area Code (LAC) : maximum 5 decimal places or maximum twice 8 bits coded in hexadecimal (LAC < FFFF). 10
  • 11. Temporary Mobile Subscriber Identity (TMSI)  Temporary Mobile Subscriber Identity (TMSI) can be assigned by the VLR, which is responsible for the current location of a subscriber. The TMSI needs to have only local significance in the area handled by the VLR. This is stored on the network side only in the VLR and is not passed to the Home Location Register (HLR).  Together with the current location area, the TMSI identifies a subscriber uniquely.  It can contain up to 4 × 8 bits. 11
  • 12. Local Mobile Subscriber Identity (LMSI)  Each mobile station can be assigned with a Local Mobile Subscriber Identity (LMSI), which is an original key, by the VLR. This key can be used as the auxiliary searching key for each mobile station within its region. It can also help accelerate the database access. An LMSI is assigned if the mobile station is registered with the VLR and sent to the HLR.  LMSI comprises of four octets (4x8 bits). 12
  • 13. Cell Identifier (CI)  Using a Cell Identifier (CI), the individual cells that are within an LA can be recognized.  maximum (2 × 8) bits.  Global Cell Identity = (LAI + CI). 13