The document provides an overview of Intelligent Network (IN) and Public Land Mobile Network (PLMN) concepts and technologies.
(1) IN moves intelligence from exchanges to distributed computer nodes, allowing flexible service development and customization. PLMN provides mobility through cellular infrastructure and mobility management functions.
(2) Key IN elements are SCP, SSP, and IP. PLMN elements include MSC, VLR, HLR, AuC, and EIR. Security involves authentication between SIM and AuC using algorithms. Mobility is managed through location updating between MS, VLR, and HLR.
(3) Example IN services are freephone, VPN, and number port
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesShameer KC
This document proposes implementing an intelligent CDMA network framework called WIN-SMS that would allow for advanced SMS services. It details trigger detection points and messaging that would need to be defined to support WIN processing for SMS scenarios. This would provide a common billing platform and ability to implement advanced SMS features similarly to voice call services. Some key benefits include easier development of new services and a unified approach to billing, though it could impact network capacity. The framework would distribute service logic across network components using standardized interfaces.
CDMA Wireless Intelligent Network for advanced SMSShameer KC
This document proposes implementing an intelligent CDMA network framework called WIN-SMS that would allow for advanced SMS services. It details trigger points for SMS processing that would interface with the existing Wireless Intelligent Network (WIN) used for voice calls. This would allow SMS to leverage the WIN capabilities for a common billing platform and advanced features like SMS forwarding. Key benefits include a unified billing solution and ability to develop new SMS-based services using the WIN model. Challenges include increased network usage and processing requirements compared to basic SMS processing.
GSM networks divide coverage areas into a hierarchy of locations to efficiently manage subscriber location and enable call delivery. The largest division is the Public Land Mobile Network (PLMN). Within a PLMN are Mobile Switching Center/Visitor Location Register (MSC/VLR) service areas, which are further divided into Location Areas (LA) containing groups of cells. As subscribers move between areas, they perform location updates to inform the network of their position. This allows more efficient paging for call delivery. [END SUMMARY]
The document provides an overview of GSM architecture and call flows. It describes the key components of the GSM network including the mobile station, base station subsystem, network switching subsystem, home location register, visitor location register and authentication center. It then details various location update call flows like IMSI attach, normal and periodic updates. It also summarizes the mobile to mobile and mobile to ISUP call flows and an intra-MSC handover call flow.
The document discusses the design of call flow and control models in GSM networks using Wireless Intelligent Networks (WIN). It introduces WIN and how it is used to provide an independent, intelligent network for both mobile and fixed networks. It then describes how WIN connects and interacts with the components of a GSM network like BTS, BSC, MSC, HLR, VLR to control call flows and enable value-added services. The document provides a high-level overview of the call flow process between different network elements when a call is made from one subscriber to another.
The document provides details about a proposed IP telephony solution for Steel Authority of India consisting of server-based call processing with redundancy and various media gateways. The solution includes three call server stacks for redundancy between the main plant exchange building and backup admin building. It also describes local survivability at remote sites using a passive communication server if the link to the main call servers fails. The solution supports various TDM interfaces and services integrated with the call servers like voice mail, conferencing, and a complaint logging IVR system. Management is provided through an NMS for configuration, alarms, and call billing.
This document provides an overview of Global System for Mobile Communications (GSM) including its key objectives, services offered, network architecture and components, operations, signaling, and other aspects. The main points are:
GSM aims to provide improved spectrum efficiency, international roaming, low-cost devices, high-quality voice calls, and support for new data services. The core network consists of mobile stations, base station subsystems, network switching subsystems, and operation support subsystems. GSM uses TDMA/FDMA to allow multiple users to access the network simultaneously and efficiently. Signaling in GSM networks allows for call establishment, management, and control between different network elements.
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesShameer KC
This document proposes implementing an intelligent CDMA network framework called WIN-SMS that would allow for advanced SMS services. It details trigger detection points and messaging that would need to be defined to support WIN processing for SMS scenarios. This would provide a common billing platform and ability to implement advanced SMS features similarly to voice call services. Some key benefits include easier development of new services and a unified approach to billing, though it could impact network capacity. The framework would distribute service logic across network components using standardized interfaces.
CDMA Wireless Intelligent Network for advanced SMSShameer KC
This document proposes implementing an intelligent CDMA network framework called WIN-SMS that would allow for advanced SMS services. It details trigger points for SMS processing that would interface with the existing Wireless Intelligent Network (WIN) used for voice calls. This would allow SMS to leverage the WIN capabilities for a common billing platform and advanced features like SMS forwarding. Key benefits include a unified billing solution and ability to develop new SMS-based services using the WIN model. Challenges include increased network usage and processing requirements compared to basic SMS processing.
GSM networks divide coverage areas into a hierarchy of locations to efficiently manage subscriber location and enable call delivery. The largest division is the Public Land Mobile Network (PLMN). Within a PLMN are Mobile Switching Center/Visitor Location Register (MSC/VLR) service areas, which are further divided into Location Areas (LA) containing groups of cells. As subscribers move between areas, they perform location updates to inform the network of their position. This allows more efficient paging for call delivery. [END SUMMARY]
The document provides an overview of GSM architecture and call flows. It describes the key components of the GSM network including the mobile station, base station subsystem, network switching subsystem, home location register, visitor location register and authentication center. It then details various location update call flows like IMSI attach, normal and periodic updates. It also summarizes the mobile to mobile and mobile to ISUP call flows and an intra-MSC handover call flow.
The document discusses the design of call flow and control models in GSM networks using Wireless Intelligent Networks (WIN). It introduces WIN and how it is used to provide an independent, intelligent network for both mobile and fixed networks. It then describes how WIN connects and interacts with the components of a GSM network like BTS, BSC, MSC, HLR, VLR to control call flows and enable value-added services. The document provides a high-level overview of the call flow process between different network elements when a call is made from one subscriber to another.
The document provides details about a proposed IP telephony solution for Steel Authority of India consisting of server-based call processing with redundancy and various media gateways. The solution includes three call server stacks for redundancy between the main plant exchange building and backup admin building. It also describes local survivability at remote sites using a passive communication server if the link to the main call servers fails. The solution supports various TDM interfaces and services integrated with the call servers like voice mail, conferencing, and a complaint logging IVR system. Management is provided through an NMS for configuration, alarms, and call billing.
This document provides an overview of Global System for Mobile Communications (GSM) including its key objectives, services offered, network architecture and components, operations, signaling, and other aspects. The main points are:
GSM aims to provide improved spectrum efficiency, international roaming, low-cost devices, high-quality voice calls, and support for new data services. The core network consists of mobile stations, base station subsystems, network switching subsystems, and operation support subsystems. GSM uses TDMA/FDMA to allow multiple users to access the network simultaneously and efficiently. Signaling in GSM networks allows for call establishment, management, and control between different network elements.
This document provides an overview of the transport layer and transport layer protocols. It discusses the functions of the transport layer including process-to-process communication using port numbers, multiplexing and demultiplexing, and reliable data transfer. It describes two main transport layer protocols: UDP, which provides connectionless and unreliable data transfer, and TCP, which provides connection-oriented and reliable data transfer. The document outlines key aspects of UDP and TCP including packet formats, connection establishment processes, and services provided.
Operation and mainetainence of switch pptIsha Negi
This document discusses various topics related to telecommunications systems including:
1. An overview of the Tata group, a global conglomerate headquartered in India with over $96 billion in revenue across many industries.
2. Descriptions of GSM and CDMA mobile communication standards including their history, key aspects like frequency bands and access methods.
3. Components of cellular networks including switching systems, HLR, MSC, VLR, and other databases.
4. Concepts like PRI interfaces, E1 carriers, signaling channels, and call tracing tools.
The document discusses intelligent networks and their operation. It introduces intelligent network components like the service control point (SCP) and service switching point (SSP). It describes how intelligent network services are registered and originated, going through authentication, announcement, and call routing procedures. It also addresses related standards, performance evaluation methods, and technical issues regarding security, evolution to IP networks, and cost effectiveness.
The document provides an overview of GSM rating and call charging. It discusses the structure of call detail records (CDRs) generated in the GSM network, which contain call information used for rating calls and calculating charges. Different types of CDRs are generated for various call scenarios, such as mobile originating calls, roaming calls, call forwarding, SMS, and supplementary services. The rating module processes the CDRs by matching call records, calculating appropriate charges, and storing results in billing tables to generate customer invoices.
The document provides an overview of GSM system components and protocols. It discusses key aspects of GSM including that it uses TDMA and FDD, describes the development of GSM standards over time, and outlines the main network components like the BTS, BSC, MSC, HLR, VLR, and interfaces between them. It also discusses protocols like IMSI, TMSI, IMEI, LAI and their roles in the GSM network.
This document provides an overview of Global System for Mobile Communications (GSM) technology. It discusses the history and development of GSM standards, the cellular network structure involving base stations, base station controllers, mobile switching centers and other components. It also describes key concepts such as frequency division multiple access, time division multiple access, mobility management, call management, and identifies used in GSM networks including IMSI, TMSI, IMEI. The document outlines the protocol architecture and functions of various nodes in the GSM network.
This document discusses several VPN technologies including:
1. Naked DMVPN which allows direct spoke-to-spoke tunnels without traversing the hub to lower costs and increase bandwidth.
2. Protected DMVPN which adds IPsec encryption to DMVPN tunnels for added security using ISAKMP/IKE and crypto profiles.
3. IKE call admission control which discusses IKEv1 and IKEv2 protocols used to set up IPsec security associations and their differences like improved NAT traversal and liveness detection in IKEv2.
The document describes the architecture of GSM networks. It discusses the key components including the mobile station, base station subsystem (BSS), and network subsystem (NSS). The mobile station consists of mobile equipment and a subscriber identity module (SIM) card. The BSS comprises base transceiver stations and a base station controller. The NSS combines switches like the mobile switching center with databases like the home location register and visitor location register that track subscriber locations and identities.
The document provides an overview of the Global System for Mobile communications (GSM) network. It discusses why GSM was chosen, including factors like deregulation, competition, customer needs, and technological advances. The core sections describe GSM's system architecture, including the mobile station, base station subsystem, network switching subsystem, and their components. Call flows and key services like teleservices, bearer services, and supplementary services are also outlined.
This document summarizes key aspects of client/server architecture and process-to-process delivery. It explains that the transport layer is responsible for process-to-process delivery by using a combination of IP addresses and port numbers to uniquely identify the client and server processes. It describes how client processes use ephemeral port numbers while server processes must use well-known port numbers, and how the combination of an IP address and port number forms a socket address that uniquely identifies a process.
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
GSM is a cellular communication standard developed in Europe in the 1980s. It uses a combination of FDMA and TDMA to allow multiple users to access the network simultaneously. The network consists of mobile stations, base transceiver stations, base station controllers, mobile switching centers, home location registers and other components. Handoffs between base stations are performed to maintain connectivity as users move between different areas.
The document discusses Wide Band Division Multiple Access (WCDMA) and provides details about its history, frequency bands used, network architecture, channels, and key components like Node B, RNC, CN, HLR, VLR, AuC, EIR, and OMC. WCDMA is a 3G mobile communication system standardized by ITU in 1985 as IMT-2000. It uses CDMA technology and allows multiple users to access the same frequency channel simultaneously through the use of unique codes.
VoIP uses packet networks to carry voice calls in addition to data. It works by converting analog voice signals to digital data packets which are transmitted over IP networks and reconverted to analog at the receiving end. Key components include IP phones, signaling servers, and protocols like SIP and H.323 which handle call setup and signaling. Quality of service for VoIP depends on factors like packet loss, delay, and jitter which can be managed through queuing and reserving bandwidth for voice traffic.
Short Message Service (SMS) allows mobile devices to exchange short text messages and was first used in 1992; it works by sending text messages through a Short Message Service Center (SMSC) which delivers the message to the intended recipient's mobile device using cellular network protocols. SMS is widely used for communication, advertising, and value added services but many have switched to messaging apps for lower costs as SMS usage in India has declined significantly since 2013 with the rise of internet-based messaging platforms.
The document discusses the Public Switched Telephone Network (PSTN) in Bharat Sanchar Nigam Limited (BSNL), India's state-owned telecom company. It describes the evolution of the network from analog to digital exchanges and the types of exchanges currently used, including NT switches from vendors like Siemens, Alcatel, Lucent and Ericsson. It also discusses the network organization, interconnection with private operators, numbering scheme, and basic and supplementary services offered on the landline network like ISDN, call waiting, call forwarding etc.
Presented by Tobias Engel <tobias@ccc.de>
Available to download from: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
Shared with permission
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
This document provides an overview of the transport layer and transport layer protocols. It discusses the functions of the transport layer including process-to-process communication using port numbers, multiplexing and demultiplexing, and reliable data transfer. It describes two main transport layer protocols: UDP, which provides connectionless and unreliable data transfer, and TCP, which provides connection-oriented and reliable data transfer. The document outlines key aspects of UDP and TCP including packet formats, connection establishment processes, and services provided.
Operation and mainetainence of switch pptIsha Negi
This document discusses various topics related to telecommunications systems including:
1. An overview of the Tata group, a global conglomerate headquartered in India with over $96 billion in revenue across many industries.
2. Descriptions of GSM and CDMA mobile communication standards including their history, key aspects like frequency bands and access methods.
3. Components of cellular networks including switching systems, HLR, MSC, VLR, and other databases.
4. Concepts like PRI interfaces, E1 carriers, signaling channels, and call tracing tools.
The document discusses intelligent networks and their operation. It introduces intelligent network components like the service control point (SCP) and service switching point (SSP). It describes how intelligent network services are registered and originated, going through authentication, announcement, and call routing procedures. It also addresses related standards, performance evaluation methods, and technical issues regarding security, evolution to IP networks, and cost effectiveness.
The document provides an overview of GSM rating and call charging. It discusses the structure of call detail records (CDRs) generated in the GSM network, which contain call information used for rating calls and calculating charges. Different types of CDRs are generated for various call scenarios, such as mobile originating calls, roaming calls, call forwarding, SMS, and supplementary services. The rating module processes the CDRs by matching call records, calculating appropriate charges, and storing results in billing tables to generate customer invoices.
The document provides an overview of GSM system components and protocols. It discusses key aspects of GSM including that it uses TDMA and FDD, describes the development of GSM standards over time, and outlines the main network components like the BTS, BSC, MSC, HLR, VLR, and interfaces between them. It also discusses protocols like IMSI, TMSI, IMEI, LAI and their roles in the GSM network.
This document provides an overview of Global System for Mobile Communications (GSM) technology. It discusses the history and development of GSM standards, the cellular network structure involving base stations, base station controllers, mobile switching centers and other components. It also describes key concepts such as frequency division multiple access, time division multiple access, mobility management, call management, and identifies used in GSM networks including IMSI, TMSI, IMEI. The document outlines the protocol architecture and functions of various nodes in the GSM network.
This document discusses several VPN technologies including:
1. Naked DMVPN which allows direct spoke-to-spoke tunnels without traversing the hub to lower costs and increase bandwidth.
2. Protected DMVPN which adds IPsec encryption to DMVPN tunnels for added security using ISAKMP/IKE and crypto profiles.
3. IKE call admission control which discusses IKEv1 and IKEv2 protocols used to set up IPsec security associations and their differences like improved NAT traversal and liveness detection in IKEv2.
The document describes the architecture of GSM networks. It discusses the key components including the mobile station, base station subsystem (BSS), and network subsystem (NSS). The mobile station consists of mobile equipment and a subscriber identity module (SIM) card. The BSS comprises base transceiver stations and a base station controller. The NSS combines switches like the mobile switching center with databases like the home location register and visitor location register that track subscriber locations and identities.
The document provides an overview of the Global System for Mobile communications (GSM) network. It discusses why GSM was chosen, including factors like deregulation, competition, customer needs, and technological advances. The core sections describe GSM's system architecture, including the mobile station, base station subsystem, network switching subsystem, and their components. Call flows and key services like teleservices, bearer services, and supplementary services are also outlined.
This document summarizes key aspects of client/server architecture and process-to-process delivery. It explains that the transport layer is responsible for process-to-process delivery by using a combination of IP addresses and port numbers to uniquely identify the client and server processes. It describes how client processes use ephemeral port numbers while server processes must use well-known port numbers, and how the combination of an IP address and port number forms a socket address that uniquely identifies a process.
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
GSM is a cellular communication standard developed in Europe in the 1980s. It uses a combination of FDMA and TDMA to allow multiple users to access the network simultaneously. The network consists of mobile stations, base transceiver stations, base station controllers, mobile switching centers, home location registers and other components. Handoffs between base stations are performed to maintain connectivity as users move between different areas.
The document discusses Wide Band Division Multiple Access (WCDMA) and provides details about its history, frequency bands used, network architecture, channels, and key components like Node B, RNC, CN, HLR, VLR, AuC, EIR, and OMC. WCDMA is a 3G mobile communication system standardized by ITU in 1985 as IMT-2000. It uses CDMA technology and allows multiple users to access the same frequency channel simultaneously through the use of unique codes.
VoIP uses packet networks to carry voice calls in addition to data. It works by converting analog voice signals to digital data packets which are transmitted over IP networks and reconverted to analog at the receiving end. Key components include IP phones, signaling servers, and protocols like SIP and H.323 which handle call setup and signaling. Quality of service for VoIP depends on factors like packet loss, delay, and jitter which can be managed through queuing and reserving bandwidth for voice traffic.
Short Message Service (SMS) allows mobile devices to exchange short text messages and was first used in 1992; it works by sending text messages through a Short Message Service Center (SMSC) which delivers the message to the intended recipient's mobile device using cellular network protocols. SMS is widely used for communication, advertising, and value added services but many have switched to messaging apps for lower costs as SMS usage in India has declined significantly since 2013 with the rise of internet-based messaging platforms.
The document discusses the Public Switched Telephone Network (PSTN) in Bharat Sanchar Nigam Limited (BSNL), India's state-owned telecom company. It describes the evolution of the network from analog to digital exchanges and the types of exchanges currently used, including NT switches from vendors like Siemens, Alcatel, Lucent and Ericsson. It also discusses the network organization, interconnection with private operators, numbering scheme, and basic and supplementary services offered on the landline network like ISDN, call waiting, call forwarding etc.
Presented by Tobias Engel <tobias@ccc.de>
Available to download from: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
Shared with permission
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
2. Intelligent Network (IN) Concept
The intelligent network concept: intelligence is taken
out of exchanges and placed in computer nodes that
are distributed throughout the network.
Intelligence => access to various databases
This provides the network operator with the means
to develop and control services more efficiently. New
capabilities can be rapidly introduced into the
network. Once introduced, services are easily
customized to meet individual customer's needs.
3. Intelligent Network (IN) Concept
Exchange
STP SCP
SSP
Service Control Point
(a network element containing
the service logic, a database or
register)
Service Switching Point
(enables service triggering in an
exchange)
MAP
INAP
CAP
ISUP
Operator implements service logic (IN Service)
4. IN service subscriber and customer
In a typical IN service scenario, the network operator
or a 3rd party service provider implements the service
for one or several subscribers, after which customers
can use the service.
Service subscriber = company offering the service
(e.g. the 0800 number that anybody can call)
Customers = those who use the service (e.g. those
who call the 0800 number)
Confusion possible:
IN service subscriber PSTN subscriber
5. Typical call-related IN procedure (1)
SSP
Exchange
SCP
1.
2.
3.
4.
5.
Exchange
1. Call routing proceeds up to Exchange
2. Trigger activated in Basic Call State Model at SSP
3. SSP requests information from SCP (database)
4. SCP provides information
5. Call routing continues (routing to next exchange)
based on information received from SCP
6. SSP
Exchange
SCP
1.
2.
3.
4.
5.
Exchange
2. Trigger activated in Basic Call State Model at SSP
Typical triggers:
Called number (or part of number)
Called user (destination) is busy
Called user does not answer in predefined time
Typical call-related IN procedure (2)
7. SSP
Exchange
1.
2.
3.
5.
Exchange
Example: Number translation in SCP
SSP sends 800 number (0800 1234)
SCP translates into ”real” number which
is used for routing the call
(+358 9 1234567)
4. SCP provides information
SCP
Typical call-related IN procedure (3)
translation
may be
based on
several
variables
4.
8. Destination 1
SCP decides the destination of the call depending on the
calling time or date:
9.00 - 17.00 => Destination 1
17.00 - 9.00 => Destination 2
SCP
Examples of how SCP can affect call (1)
Destination 2
SSP
Exchange
Called number
Time or date
9. Destination 1
SCP decides the destination of the call depending on the
location of calling user:
Calling user in southern Finland => Destination 1
Calling user in northern Finland => Destination 2
SCP
Examples of how SCP can affect call (2)
Destination 2
SSP
Exchange
Called number, Calling number
10. Destination 1
SCP decides the destination of the call depending on the
traffic load in the network:
Traffic load situation 1 => Destination 1
Traffic load situation 2 => Destination 2
SCP
Examples of how SCP can affect call (3)
Destination 2
SSP
Exchange
Called number
Network load
11. Intelligent Peripheral (IP) can (a) send announcements
to the user (usually: calling user) and (b) receive DTMF
digits from the user. IP is not a database; connection to
exchange not via SS7, instead via digital TDM channels.
SCP
Additional IN features (1)
SSP
Exchange Exchange
IP
12. Typical applications:
1) Whenever services need user interaction
2) User authentication
SCP
Additional IN features (2)
SSP
Exchange Exchange
IP
13. SCP
User interaction in IN service
SSP
Exchange Exchange
IP
1.
4.
2.
3.
1. SCP orders IP to select and send announcement
2. IP sends announcement to calling user
3. User replies by giving DTMF number(s) to IP
4. IP sends number information to SCP in a signalling
message
Announcement:
“for this .. press 1,
for that .. press 2”
14. SCP
User authentication (1)
SSP
Exchange Exchange
IP
1.
4.
2.
3.
1. SCP orders IP to select and send announcement
2. IP sends announcement to calling user
3. User gives authentication code (in DTMF form) to IP
4. IP sends authentication code to SCP in a signalling
message
Announcement:
“please press your
PIN code ...”
15. SCP
User authentication (2)
SSP
Exchange
IP
1.
3.
2.
Display message:
“please press your
PIN code ...”
When connected to the network via a digital
subscriber line, the calling user can be
notified with a digital message (“please press
your PIN code ...”) instead of having to use
the corresponding voice announcement.
1.
16. IN services
A large number of IN services can be implemented by
combining different “building blocks”:
Called number translation (at SCP)
Routing decision based on calling number,
time, date, called user busy, called user
alerting timeout, network load ...
Announcements (from IP) or user notification
(<= ISDN user signalling)
DTMF number reception (at IP) and analysis
(at SCP)
Customised charging (at exchanges)
•
•
•
•
•
17. IN service examples
“Traditional” IN services:
- Freephone / customised charging schemes
- Virtual Privat Network (VPN)
- Number portability
- Televoting
“IN” in mobile networks:
- Mobility management (HLR, VLR = databases)
- Security management (Authentication ...)
- Additional IN services in mobile networks =>
CAMEL (Customised Applications for Mobile
networks Enhanced Logic)
18. Freephone (800) service
User calls 0800 76543. SSP sends this number to SCP
which after number analysis sends back to SSP the
real destination address (09 1234567) and call can be
routed to the destination. Called party is charged.
SSP
Exchange
SCP
1.
2.
3.
4.
5.
Destination
Charging: Destination (service subscriber)
pays the bill
19. Premium rate service
User calls 0200 34343. SSP sends this number to SCP
which after number analysis sends back to SSP the
real destination address (09 676567) and call can be
routed to the destination. Calling party is charged.
SSP
Exchange
SCP
1.
2.
3.
4.
5.
Destination
Charging: Calling user (customer) pays the (usually rather
expensive) bill. Both service subscriber and service provider
or network operator make profit!
20. Virtual private network (VPN) service
A VPN provides corporate customers with a private
number plan within the PSTN. The customer dials a
private (short) number instead of the complete public
number in order to contact another user within the VPN.
User authentication is usually required.
SSP
Exchange
SCP
Destination
IP
User authentication
Number translation: 1212 => 09 1234567
Customised charging
21. Screening of incoming calls
This is an example of an IN service related to the call
destination end. Alert called user only if calling number
is 121212 or 234567, otherwise do something else (e.g.
reject call or redirect call to another destination).
SSP
Exchange
SCP
Called user
Calling number = 121212 or 234567: Accept
All other calling numbers: Reject or redirect
Local exchange of called user
22. VLR
Mobile terminated call (MTC)
By far the most important "IN service" is mobility
management during a mobile terminated call (MTC),
which means finding out under which exchange or
mobile switching center (MSC) a mobile user is
roaming, so that the call can be routed to this
exchange. More about this later.
GMSC
HLR
1.
2.
5.
6.
Serving MSC
3.
4.
7.
23. More about IN and IN services…
The link www.iec.org/online/tutorials/in provides some
examples in Section 10 (AIN Service Creation Examples),
for instance:
Example
of service
creation
template:
24. PLMN
Public Land Mobile Network
(official name for mobile network)
• Circuit-switched (CS) core network
(radio access network is not part of
this course)
• Basic concepts and network elements
• Mobility management in PLMN
25. Cellular concept
A cellular network contains a large number of cells with
a base station (BS) at the center of each cell to which
mobile stations (MS) are connected during a call.
BS
BS
BS
BS
MS
If a connected MS
(MS in call phase)
moves between two
cells, the call is not
dropped.
Instead, the network
performs a handover
(USA: handoff).
26. Mobility concept
A cellular network is divided into location areas (LA),
each containing a certain number of cells.
As long as an idle MS
(idle = switched on)
moves within a location
area, it can be reached
through paging.
If an idle MS moves between
two location areas, it cannot be
reached before it performs
location updating.
Location Area 1
Location Area 3
Location
Area 2
27. Architecture of a mobile network
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
MSC
VLR
HLR
AuC
EIR
PSTN
Internet
MS
28. Serving MSC
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
MSC
VLR
HLR
AuC
EIR
PSTN
Internet
The serving mobile switching
center (MSC) is the mobile
counterpart to the local
exchange in the PSTN.
This is the MSC that is currently
serving a mobile user.
29. VLR
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
The visitor location register
stores temporary information
on mobile users roaming in a
location area under the
control of the MSC/VLR.
MSC
VLR
30. Gateway MSC
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
MSC
VLR
The gateway MSC (located in the home
PLMN of a mobile user) is the first contact
point in the mobile network when there is
an incoming call to the mobile user.
31. HLR
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
The home location register
stores information on mobile
users belonging to this mobile
network (e.g. subscription data
and present VLR under which
the mobile user is roaming).
MSC
VLR
32. AuC
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
The authentication center safely
stores authentication keys (Ki)
of mobile subscribers belonging
to this mobile network.
MSC
VLR
33. EIR
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
The equipment identity register
stores information on stolen
handsets (not stolen SIMs).
MSC
VLR
34. SIM
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
Important mobile user information is stored in the
subscriber identity module within the handset.
MSC
VLR
SIM
35. CS core network
GSM
BSS
3G
RAN
PS core network
CS core network
GMSC
HLR
AuC
EIR
PSTN
Internet
MSC
VLR
The CS core network architecture is
basically the same in 2G (GSM) and 3G
mobile networks.
In North America, IS-MAP signalling is
used instead of GSM-MAP signalling.
Europe: GSM core network
N. America: ANSI-41 core network
36. Basic functions in a mobile network
Session Management (SM)
Call Control (CC)
Mobility Management (MM)
Radio Resource Management (RRM)
MOC, MTC
PDP Context
Random access and channel reservation
Handover management
Ciphering (encryption) over radio interface
IMSI/GPRS Attach (switch on) and Detach (switch off)
Location updating (MS moves to other Location Area)
Authentication
1
2
3
4
Number
refers to
following
slides in the
the slide set
Later lecture
38. Random access in a mobile network
Communication between MS and network is not possible
before going through a procedure called random access.
Random access must consequently be used in:
Network-originated activity
• paging, e.g. for a mobile terminated call (MTC)
MS-originated activity
• IMSI attach, IMSI detatch
• GPRS attach, GPRS detach
• location updating
• mobile originated call (MOC)
• SMS (short message service) message transfer
1
39. Random access in action (GSM)
1. MS sends a short access burst over the Random
Access CHannel (RACH) in uplink using Slotted Aloha (in
case of collision => retransmission after random time)
2. After detecting the access burst, the network returns
an ”immediate assignment” message which includes the
following information:
- allocated physical channel (frequency, time slot) in
which the assigned signalling channel is located
- timing advance (for correct time slot alignment)
3. The MS now sends a message on the dedicated
signalling channel assigned by the network, indicating
the reason for performing random access.
1
40. Multiplexing vs. multiple access
In downlink, multiplexing (e.g. TDM)
In uplink, multiple access (e.g. TDMA)
Multiple access is always associated with random
access. MS requests signalling channel, and network
decides which channel (e.g. time slot) will be used.
Network decides channel…
Network decides channel also in this case
41. 1) PIN code (local authentication of handset
=> local security measure, network is not involved)
2) Authentication (performed by network)
3) Ciphering of information sent over air interface
4) Usage of TMSI (instead of IMSI) over air interface
IMSI = International Mobile Subscriber Identity
(globally unique identity)
TMSI = Temporary Mobile Subscriber Identity
(local and temporary identity)
Security measures in a mobile network
42. Algorithm Algorithm
The same? If yes,
authentication is successful
SIM
(in handset)
Air
interface
Network (algorithm
running in AuC)
Random number
Challenge
Response
Authentication key Authentication key
RAND
SRESS
Ki Ki
Basic principle of authentication
2
SRESA
43. Algorithm for calculating SRES runs within SIM (user
side) and AuC (network side). The authentication key
(Ki) is stored safely in SIM and AuC, and remains there
during authentication.
The two SRES values are compared in the VLR.
Where does the algorithm run?
2
AuC
SIM
VLR
Air interface
SRESS SRESA
RAND
Ki Ki
44. Using output and one or more inputs, it is in practice
not possible to calculate “backwards” other input(s),
“brute force approach”, “extensive search”
Key length in bits (N) is important (in case of brute
force approach 2N calculation attempts may be needed)
Strength of algorithm is that it is secret => bad idea!
“Security through obscurity”
Better: open algorithm can be tested by engineering
community (security through strong algorithm)
Algorithm considerations
2
45. HLR
MSC
VLR 1
Most recently allocated TMSI and last visited LAI (Location
Area ID) are stored in SIM even after switch-off.
After switch-on, MS monitors LAI. If stored and monitored
LAI values are the same, no location updating is needed.
(Most generic scenario, see van Bosse for details)
MSC
VLR 2
IMSI
LAI 1
TMSI
LAI 1
IMSI
LAI 1
3
(in broadcast messages)
Case study: Location updating (1)
SIM
IMSI
TMSI
46. SIM
MSC
VLR 1
MS has moved from a cell belonging to VLR 1 to another
cell belonging to VLR 2.
MS notices that the LAI values are different => location
update is required!
MSC
VLR 2
LAI 2
HLR
(in broadcast
messages)
3 Location updating (2)
IMSI
LAI 1
IMSI
TMSI
IMSI
LAI 1
TMSI
47. SIM
MSC
VLR 1
MSC
VLR 2
HLR
3 Location updating (3)
IMSI
LAI 1
SIM sends old LAI (i.e., LAI 1) and TMSI to VLR 2.
VLR 2 does not recognize TMSI since there is no TMSI-
IMSI context. Who is this user?
LAI 1, TMSI
No TMSI - IMSI context!
IMSI
TMSI
IMSI
LAI 1
TMSI
48. SIM
MSC
VLR 1
MSC
VLR 2
HLR
3 Location updating (4)
IMSI
LAI 1
However, VLR 2 can contact VLR 1 (address: LAI 1) and
request IMSI.
IMSI is sent to VLR 2. There is now a TMSI-IMSI context.
IMSI
Address: LAI 1
IMSI
TMSI
IMSI
TMSI
IMSI
LAI 1
TMSI
49. SIM
MSC
VLR 1
MSC
VLR 2
HLR
3 Location updating (5)
IMSI
TMSI
Important: HLR must be updated (new LAI). If this is not
done, incoming calls can not be routed to new MSC/VLR.
HLR also requests VLR 1 to remove old user data.
IMSI
TMSI
IMSI
LAI 1
LAI 2
LAI 2
IMSI
LAI 1
TMSI
50. SIM
MSC
VLR 1
MSC
VLR 2
HLR
3 Location updating (6)
IMSI
LAI 2
VLR 2 generates new TMSI and sends this to user. User
stores new LAI and TMSI safely in SIM.
Location updating was successful!
IMSI
LAI 1
TMSI
LAI 2
TMSI
LAI 2
TMSI
IMSI
TMSI
TMSI
51. Trade-off when choosing LA size
Affects signalling load
If LA size is very large (e.g. whole mobile network)
location updating not needed very often
paging load is very heavy
If LA size is very small (e.g. single cell)
small paging load
location updating must be done very often
High paging channel capacity required
+
+
3
52. Role of TMSI
MS Network
Random access
Authentication
Start ciphering
IMSI detach New TMSI
allocated by
network
New TMSI stored in SIM
CC or MM transaction
Uses
TMSI
IMSI is not
sent over air
interface if
not absolutely
necessary!
53. Mobile network identifiers (1)
SN
CC
MSISDN
CC = Country Code (1-3 digits)
NDC = National Destination Code (1-3 digits)
SN = Subscriber Number
NDC
=
Globally
unique
number
E.164 numbering
format
Mobile station ISDN (MSISDN) numbers are based on the
ITU-T E.164 numbering plan and can therefore be used for
routing a circuit-switched call.
When the calling (PSTN or PLMN) user dials an MSISDN
number, the call is routed to the gateway MSC (GMSC)
located in the home network of the called (mobile) user.
54. Mobile network identifiers (2)
TN
CC
MSRN
CC = Country Code (1-3 digits)
NDC = National Destination Code (1-3 digits)
TN = Temporary Number
NDC
=
Temporarily
allocated
number
E.164 numbering
format
Mobile station roaming numbers (MSRN) are also based
on the ITU-T E.164 numbering plan and can therefore be
used for routing a circuit-switched call.
The MSRN is selected by the MSC/VLR serving the called
(mobile) user, sent to the GMSC, and used for routing the
call from the GMSC to the serving MSC.
55. Mobile network identifiers (3)
MSIN
MCC
IMSI
MCC = Mobile Country Code (3 digits)
MNC = Mobile Network Code (2 digits)
MSIN = Mobile Subscriber Identity Number
(10 digits)
MNC
= E.212 numbering
format
The international mobile station identity (IMSI) is based
on the ITU-T E.212 numbering plan and cannot be used
for routing a circuit-switched call (exchanges or switching
centers do not understand such numbers).
The IMSI is stored in the HLR and SIM of the mobile user.
Globally
unique
number
56. Mobile network identifiers (4)
LAC
MCC
LAI
MCC = Mobile Country Code (3 digits)
MNC = Mobile Network Code (2 digits)
LAC = Location Area Code (10 digits)
MNC
= E.212 numbering
format
The location area identity (LAI) points to a location area
belonging to a certain MSC/VLR. This identity must be
stored in the HLR so that mobile terminated calls can be
routed to the correct serving MSC/VLR.
Globally
unique
number
IMEI ≈ ”Serial number of handset” (not SIM)
57. 4 Case study: Mobile terminated call (1)
VLR
1. Using the MSISDN number (dialled by the calling
user located in the PSTN or the PLMN of another
operator) and standard SS7/ISUP signalling, the
call is routed to the GMSC in the home network of
the called mobile user.
GMSC
HLR
1.
2.
4.
5.
Serving MSC
3.
4.
6.
(see van Bosse for details)
58. 4 Mobile terminated call (2)
VLR
GMSC
HLR
1.
2.
4.
5.
Serving MSC
3.
4.
6.
2. The GMSC contacts the HLR of the called mobile
user. The SS7/MAP signalling message contains
the MSISDN number which points to the mobile
user record (containing IMSI, LAI where user is
roaming, etc.) in the HLR database.
59. 4 Mobile terminated call (3)
VLR
GMSC
HLR
1.
2.
4.
5.
Serving MSC
3.
4.
6.
3. Using global title translation (GTT), the HLR
translates the IMSI and LAI information into the
signalling point code of the serving MSC/VLR.
The HLR sends SS7/MAP request “Provide roaming
number” (i.e. MSRN) to the VLR.
60. 4 Mobile terminated call (4)
VLR
GMSC
HLR
1.
2.
4.
5.
Serving MSC
3.
4.
6.
4. The VLR selects a temporary MSRN. Note that
there must be binding between MSRN and IMSI in
the VLR.
The VLR sends the MSRN to the GMSC (using
SS7/MAP signalling).
MSRN IMSI
61. 4 Mobile terminated call (5)
VLR
GMSC
HLR
1.
2.
4.
5.
Serving MSC
3.
4.
6.
5. Using the MSRN number and standard SS7/ISUP
signalling, the call is routed to the serving MSC.
Although not shown in the figure, there may be
intermediate switching centers (serving MSC/VLR
may be located at the other end of the world).
62. 4 Mobile terminated call (6)
VLR
GMSC
HLR
1.
2.
4.
5.
Serving MSC
3.
4.
6.
6. MSC/VLR starts paging within the location area
(LA) in which the called mobile user is located,
using TMSI for identification. Only the mobile user
with the corresponding TMSI responds to the
paging via the random access channel (RACH).
MSRN IMSI
IMSI TMSI