This document describes the evolution of 2G and 3G mobile network architectures. It shows:
1) The separation of the control plane and user plane in 3GPP Release 4, with the MSC Server handling signaling and Media Gateways handling transmission.
2) How the MSC Server system provides operational expenditure savings by moving voice and signaling transmission to IP networks and separating equipment for more flexible siting.
3) How the MSC Server system allows investment protection by supporting existing services on GSM, EDGE, 3G and TDM, IP, and ATM transmission networks.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
GSM is the globel system of organation . It consists of
M.S,BSC MSC ,OMC,FIXED Phone.Mobile station is carried by
the subscriber.and base station subsystem control the radio
link with mobile station . The main part of system is
mobile switching center perform switching of calls between
the mobile and fixed or mobile network use. and operational
and maintainence center oversees the proper operation and
set up of the network. The MS and BSC communicate across
the um link or air interface and BSC&MSC communicate across
A interface.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
GSM is the globel system of organation . It consists of
M.S,BSC MSC ,OMC,FIXED Phone.Mobile station is carried by
the subscriber.and base station subsystem control the radio
link with mobile station . The main part of system is
mobile switching center perform switching of calls between
the mobile and fixed or mobile network use. and operational
and maintainence center oversees the proper operation and
set up of the network. The MS and BSC communicate across
the um link or air interface and BSC&MSC communicate across
A interface.
Describes key network elements and interfaces of LTE architecture. The steps of LTE/EPC Attach procedure are also illustrated.
Video at: https://www.youtube.com/playlist?list=PLgQvzsPaZX_bimBc5Wu4m6-cVD4bZDav9
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
This presentation covers:
1. Evolution of UMTS core network
2. Different 3GPP releases up gradation to UMTS architecture
3. UMTS Core network elements
4. Protocols used in UMTS core networks
5. MSC server and MGW
6. IMS architecture
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
Describes key network elements and interfaces of LTE architecture. The steps of LTE/EPC Attach procedure are also illustrated.
Video at: https://www.youtube.com/playlist?list=PLgQvzsPaZX_bimBc5Wu4m6-cVD4bZDav9
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
This presentation covers:
1. Evolution of UMTS core network
2. Different 3GPP releases up gradation to UMTS architecture
3. UMTS Core network elements
4. Protocols used in UMTS core networks
5. MSC server and MGW
6. IMS architecture
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
Introduction of opnet network simulator ali torabi
this article is in persian language.
opnet network simulator is a product of
OPNET Technologies, Inc.
In October 2012, OPNET was acquired by Riverbed Technology,
e2matrix is a leading Web Design and Development Company now in the field of Industrial training. We provide you 6 Month/6 Week Industrial training in PhP,Web Designing, Java, Dot Net, android Applications.
we also provide work for various technoligies with additional facilities-
RESEARCH PAPERS
OBJECTIVES
SYNOPSIS
IMPLEMENTATION
DOCUMENTATION
REPORT WRITING
PAPER PUBLICATION
Address-Opp. Phagwara Bus Stand, Above Bella
Pizza, Handa City Center, Phagwara,punjab
email addres-e2matrixphagwara@gmail.com
jalandhare2matrix@gmail.com
WEBSITE-www.e2matrix.com
CONTACT NUMBER --
09041262727
07508509730
7508509709
We faced so much difficulties in running Networking Simulators such as NS2, NS3, OPNET, and many more. Increasing Awareness and demand for stable simulator incorporates to other simulators, the OPNET simulator is one of the best solution. With the nays getting louder, the OPNET Modeler (similar to OPNET Simulator) is stronger competitor then other simulators.
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
In 2010 a number of practical high-profile attacks against GSM has been discussed and demonstrated. Still it should be noted that those only work against GSM (2G) which has been standardised in the early 90s. It was followed by the 3G family of standards in 2000 which in turn are currently superseded (better: complemented) by yet another generation (4G). LTE (4G) which is expected to be "the next big thing in mobile telco business" has an all-IP network architecture that is much flatter than the earlier architectures' ones.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
1. G S M 2G Bas ic N e twork Arch ite ctu re
Internet
GPRS (TCP/IP)
2G SGSN
PS Core
GGSN
GSM
mobile
BSS SRRi
Base Station Subsystem CS Core
BSC T
GSM BTS C
GSM S MSCi HLR
mobile M
mobile Indoor 2G
BTS PLMN/PSTN/ISDN
IN SCP
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
2. 3G PP R99 A rchitecture
Internet
GPRS (TCP/IP)
2G/3G SGSN
GGSN
GSM
mobile
BSS
CS Core SRRi
Base Station Subsystem
BSC T
GSM BTS C
GSM S MSCi HLR
mobile M
M
G
R W
N
C
3G MSC
mobile 3G BTS
(Node B) PLMN/PSTN/ISDN
IN SCP
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
3. MS C S erver - s eparates us er and control
plane
MSC 3GPP Rel99 MSC Server 3GPP Rel4
• MGW is a part of 3G MSC • MGW is separate from MSS
• GSM and 3G Circuit Switching • GSM and 3G Circuit Switched services
• Transmission is TDM • Transmission is IP (also ATM can be
used)
• Voice and signaling over IP
MS Ci - M11 MS S M12
A TDM based
Backbone & PSTN
A' H.248/Megaco
Sigtran
Packet based
Backbone (IP/ TM)
A
Iu-CS A & Iu-CS & TDM based PSTN
MGW - U1 .5 MGW - U2
control plane
user plane
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
4. 3G PP Rel. 4 A rchitecture
Network Operator
Application Plane
CAP/INAP CAP/INAP
APSE
HLR
MAP MAP
MSC
Server Control Plane
BICC-CS-2 / SIP-T MSC Server or GCS
Sigtran/ Sigtran/
Megaco, H248 Megaco, H248
GSM/EDGE BSS A User Plane
IP/MPLS/ATM
3G RAN Iu-CS PSTN
Backbone
MGW MGW
Control Plane and User plane separated in Rel-4
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
5. MS C S erver s ys tem brings OPE X s avings
Ne w M SC Se r ve r w o r l d
Vo ic e a n d s ig n a lin g l
o ve r I P
M S S N o t r a n s it s w it c h e s
needed
O &M S a v in g s
F r e e M S S s it e
GE RAN
l c a t io n
o
M GWs in u n m a n n e d
H .2 4 8
S ig t r a n B S C / RN C s it e s
U T RAN A H ig h c a p a c it y , s m a l l
M G W
T r f l s m sispsaio n s a v in g s
an o r
o ce
I P / AT M M G W
I u -CS L o c a l s w it c h in g
B a n d w id t h s a v in g s
PS TN / I S D N
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
6. Inves tment protection – C A PE X
s avings
I N
Fu l s u pport
l f o r e x is t in g
MA s e r v ic e s
P
C AP / I N A
GS M / E D GE s u p p o r t
C AP / I N AP /
M AP P
H L R
M AP M AP
T D M , I P a n d AT M
M S S M S S t r a n s m is s io n
3G
GE RAN GE RAN
Mc Mc L o n g t e r m in v e s t m e n t
A M G
I P / AT
M M G A
p r o t e c t io n
W Bac k b o W
ne Al M S C S e r v e r s y s t e m
l
U T RAN
U T RAN el ment s
e
l -CS
u l -CS
u
s u pport f u l I P M u l im e d ia ,
l t
PS T N / I S
DN
3 GP P Re l / Re l / Re l 7
.5 .6 .
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
7. Rel.4 Network Des ign with MS S and MG Ws
Network Operator
Application Plane
CAP/INAP CAP/INAP
APSE
HLR
MAP MAP
MSC
Server Control Plane
BICC-CS-2 / SIP-T MSC Server or GCS
Sigtran/ Sigtran/
Megaco, H248 Megaco, H248
GSM/EDGE BSS A User Plane
IP/MPLS/ATM
3G RAN Iu-CS PSTN
Backbone
MGW MGW
Control Plane and User plane separated in Rel-4
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
8. MS C S erver, MS S (M13.2)
2G/ CS traffic control in Rel4-based networks
3G
O v e r v ie w
Media transportation handled by MGW
• GSM and WCDMA call control and
F u n c t io n a l y
it mobility management
• Controls several MGWs
• VLR, SSP, SMS, CS-data
C a p a c it y • 1 ,200,000 subscribers
• 1 ,200,000 BHCA
• 1 ,200,000 SMS/
BH
• 41 ,500 simult. calls
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
9. Dis tributed Network A rchitecture of Us er Plane
M G W will b e locate d as clos e as th e acce s s ne twork to
h and le local s witch ing.
A MG
MSC Server W MSC Serverd e s 1 or m ore MG Ws
s ite inclu
A MG W s ite m ay h ave conne ctions to:
MGW Site 1 G S M BS S
WD C M A R AN
MGW Site 2
PS TN
O th e r M G W s ite s via an inte r-s ite b ackb one :
BSC MGW
A
MGW → Ibcb n
P ako e
GSM → A Mb c MGW e MGW
T ako bn BSC
→ TDMb c b n
ako e A
GSM
M G Ws o n th e s ite are conne cte d to e ach oth e r with an
RNC
IP/ATM/TDM
intra-s ite b ackb one
MGW Backbone
Iu
WCDMA Intra-s ite traffic is d is trib uMGW e ve nly am ong th e MG Ws on
te d RNC
Iu
th e s ite WCDMA
PSTN/
PLMN
PSTN/
PLMN
• Dimensioning can be done according to subscriber and traffic parameters
(number of 2G/3G subscribers, traffic per subscriber, call length, PSTN
interconnection point, used codec inside MSS network…)
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
10. MG W Dimens ioning C riteria
Th e M G W d oe s not inclu d e any s u b s crib e r d atab as e s s o it d oe s not
care ab ou t th e nu m b e r of s u b s crib e rs , only ab ou t th e am ou nt of
traffic ge ne rate d b y th os e s u b s crib e rs
M G W is d im e ns ione d b as e d on
B u s y H ou r C all Atte m p t (BH C A)
N u m b e r of S im u ltane ou s C alls
# of TD M P orts R e qu ire d
# of ATM P orts R e qu ire d
# of IP P orts R e qu ire d
# of TC U (Trans cod ing U nit) R e qu ire d
# of IS U (Inte rface S ignalling U nit) R e qu ire d
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
12. Integrated MS C S erver
S till s u p p orts fu ll M S C i fu nctionality
C ontains
G ate way M S C F u n ctionality
Vis ite d M S C F u nctionality
M e d ia G ate way C ontrol F u nction
2) MSS activation
MSCi - M11 1 ) M1 2 upgrade MSCi - M12 MSS
GMSC VMSC GMSC VMSC GMSC VMSC
Switching IWF Switching IWF Switching IWF
MGCF
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
13. S G W in MG W
MSC Server MSC Server
TDM
GSM BSS IP/ATM
BSC
2.
TDM
SGW SGW
ATM/IP 3.& 4.
ATM Backbone
PSTN/
1. MGW
PLMN
WCDMA
RNC
1) RANAP (SS7) / ATM <---> IP
2) BSSAP (SS7) / TDM <---> IP
SIGNALING 3) MAP/CAP/INAP (SS7 SCCP) / TDM <---> IP
TRANSPORT 4) ISUP/TUP/IUP (SS7 MTP3) / TDM <---> IP
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
14. Rel4 Network Interfaces & Protocols
HLR
Services
CAP BICC for Call
MAP
Control
H.248 for BICC, SIP
MSS ATM/IP (G)MSS
MGW control
Nc ISUP over IP
RANAP or
towards
BSSAP H.248 Mc
PSTN
towards IP H.248
radio Mc IP
network
RANAP AAL2/AAL5
AAL5/ATM ATM Nb SS7
PSTN
Iu- CS TDM
RTP
MGW IP (G)MGW
BSSAP
RNC AAL2
User data over
A
ATM BSC ATM or IP or TDM
TDM
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential
15. S ecurity Level: INTE RNA L
Thanks
www. hua we i. c o m
www.h u awe i.com
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential