SlideShare a Scribd company logo
LOCALIZATION & CALLING,
HANDOVER,SECURITY
N.SURATHAVANI MSc(Information
Technology)
Nadar Saraswathi college of arts
& science.Theni.
LOCALIZATION & CALLING:
GSM (Global System for mobile
communication) provides many useful
services in which, one of the most important is
the automatic, worldwide localization of users.
For localization of users, GSM performs
periodic location updates even if a user does
not use the mobile phones or some other
devices but user should not be out of GSM
network and is not completely switched off
their devices.
GSM USES TWO TYPES OF
DATABASES:
Home Location Register (HLR)
Visitor Location Register (VLR)
HOME LOCATION REGISTER
(HLR):
The Home Location Register is a
database from a mobile network in
which information from all mobile
subscribers is stored.
VISITOR LOCATION REGISTER
(VLR):
VLR is responsible for the MS (Mobile
Station) to inform the HLR about
location changes.
As soon as user moves from one
location to another location, the HLR
sends all user data needed to the new
VLR (New Location). Changing of one
VLR to another VLR and their
uninterrupted services is called as
Roaming.
ROAMING CAN BE TAKEN PLACE AS
FOLLOWS:
Within the network of one
provider.
Between two providers in one
country (National Roaming).
Different providers in different
countries (International
Roaming)
TO LOCATE AN MS NEEDED:
Mobile station international ISDN
number (MSISDN).
International mobile subscriber identity
(IMSI).
Temporary mobile subscriber identity
(TMSI).
Mobile station roaming number (MSRN)
HANDOVER:
A handover is a process in
telecommunications and mobile
communications in which a connected
cellular call or a data session is
transferred from one cell site to another
without disconnecting the session.
Cellular services are based on mobility
and handover, allowing the user to be
moved from one cell site range to
another or to be switched to the nearest
cell site for better performance.
Handovers are a core element in
planning and deploying cellular
networks.
It allows users to create data sessions or
connect phone calls on the move.
This process keeps the calls and data
sessions connected even if a user
moves from one cell site to another
TYPES OF HANDOVERS:
Hard Handover
Soft Handover
HARD HANDOVER:
An instantaneous handover in
which the existing connection is
terminated and the connection to
the destination channel is made.
It is also known as a break-before-
make handover. The process is so
instantaneous that the user does
not hear any noticeable
interruption.
SECURITY:
The authentication protocols used in
GSM are described in a number of
places, such as (which also describes
the mechanisms in an incompatible
U.S. system).
But the industry tried to keep secret
the cryptographic and other protection
mechanisms that form the core of the
GSM security system.
There’s a personal identification
number, which you use to unlock the
card. In theory, this stops stolen mobiles
being used. In practice, many networks
set an initial PIN of 0000, and most
users never change it.
There’s an international mobile
subscriber identification (IMSI), a unique
number that maps on to your mobile
phone number.
Finally there is a subscriber
authentication key Ki, a 128-bit number
that serves to authenticate that IMSI
and is known to your home network.
Telecom System Security:

More Related Content

What's hot

FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
Sammar Khan
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
getvibha
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networking
Dr. Hamdan Al-Sabri
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
Agrima Kothari
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
HimaBindu Valiveti
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
Çãñdál Lïght
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
Vipul Kumar Maurya
 
Data management issues
Data management issuesData management issues
Data management issues
Neha Bansal
 
The Physical Layer
The Physical LayerThe Physical Layer
The Physical Layer
adil raja
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
Maulik Patel
 
Hiperlan
HiperlanHiperlan
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
Alan Percy
 
Global System for Mobile (GSM)
Global System for Mobile (GSM)Global System for Mobile (GSM)
Global System for Mobile (GSM)
AakankshaR
 
Cellular Telephone Systems
Cellular Telephone SystemsCellular Telephone Systems
Cellular Telephone Systems
Shantanu Krishna
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
Ramakrishna Pulikonda
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
Prajakta Rane
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
rajisri2
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
Naveen Jakhar, I.T.S
 

What's hot (20)

FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networking
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Data management issues
Data management issuesData management issues
Data management issues
 
The Physical Layer
The Physical LayerThe Physical Layer
The Physical Layer
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Global System for Mobile (GSM)
Global System for Mobile (GSM)Global System for Mobile (GSM)
Global System for Mobile (GSM)
 
Cellular Telephone Systems
Cellular Telephone SystemsCellular Telephone Systems
Cellular Telephone Systems
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 

Similar to Mobile computing vani

mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
itsjadu
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA Principles
Ali Ibrahim
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptx
NidhiChandra24
 
Gsm1
Gsm1Gsm1
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
Fabiha Ain
 
Test
TestTest
GSM
GSMGSM
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
Hina Saxena
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
OWASP Delhi
 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM Security
Ankit Mulani
 
gsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdfgsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdf
hazhamina
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
hazhamina
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
Dawood Aqlan
 
Vendor Location Base Services1
Vendor Location Base Services1Vendor Location Base Services1
Vendor Location Base Services1
Anthony Crenshaw
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
eSAT Publishing House
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
Santhosh Krishna
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
Rahul kulshrestha
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
Don Norwood
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication system
Tamilarasan N
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
CSCJournals
 

Similar to Mobile computing vani (20)

mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA Principles
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptx
 
Gsm1
Gsm1Gsm1
Gsm1
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Test
TestTest
Test
 
GSM
GSMGSM
GSM
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM Security
 
gsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdfgsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdf
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
Vendor Location Base Services1
Vendor Location Base Services1Vendor Location Base Services1
Vendor Location Base Services1
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication system
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 

More from SanSan149

Sdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdmSdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdm
SanSan149
 
Histogram process spatial filtering
Histogram process spatial filteringHistogram process spatial filtering
Histogram process spatial filtering
SanSan149
 
Telecommunication system gms mobile service
Telecommunication system gms mobile serviceTelecommunication system gms mobile service
Telecommunication system gms mobile service
SanSan149
 
Adaptive filters and band reject filters
Adaptive filters and band reject filtersAdaptive filters and band reject filters
Adaptive filters and band reject filters
SanSan149
 
Hema rdbms
Hema rdbmsHema rdbms
Hema rdbms
SanSan149
 
SDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDMSDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDM
SanSan149
 
joins and subqueries in big data analysis
joins and subqueries in big data analysisjoins and subqueries in big data analysis
joins and subqueries in big data analysis
SanSan149
 
Hadoop storage
Hadoop storageHadoop storage
Hadoop storage
SanSan149
 
Normalization
NormalizationNormalization
Normalization
SanSan149
 
Manageral aspects of software maintance
Manageral aspects of software maintanceManageral aspects of software maintance
Manageral aspects of software maintance
SanSan149
 
Common language runtime clr
Common language runtime clrCommon language runtime clr
Common language runtime clr
SanSan149
 

More from SanSan149 (11)

Sdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdmSdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdm
 
Histogram process spatial filtering
Histogram process spatial filteringHistogram process spatial filtering
Histogram process spatial filtering
 
Telecommunication system gms mobile service
Telecommunication system gms mobile serviceTelecommunication system gms mobile service
Telecommunication system gms mobile service
 
Adaptive filters and band reject filters
Adaptive filters and band reject filtersAdaptive filters and band reject filters
Adaptive filters and band reject filters
 
Hema rdbms
Hema rdbmsHema rdbms
Hema rdbms
 
SDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDMSDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDM
 
joins and subqueries in big data analysis
joins and subqueries in big data analysisjoins and subqueries in big data analysis
joins and subqueries in big data analysis
 
Hadoop storage
Hadoop storageHadoop storage
Hadoop storage
 
Normalization
NormalizationNormalization
Normalization
 
Manageral aspects of software maintance
Manageral aspects of software maintanceManageral aspects of software maintance
Manageral aspects of software maintance
 
Common language runtime clr
Common language runtime clrCommon language runtime clr
Common language runtime clr
 

Recently uploaded

What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 

Mobile computing vani

  • 1. LOCALIZATION & CALLING, HANDOVER,SECURITY N.SURATHAVANI MSc(Information Technology) Nadar Saraswathi college of arts & science.Theni.
  • 2. LOCALIZATION & CALLING: GSM (Global System for mobile communication) provides many useful services in which, one of the most important is the automatic, worldwide localization of users. For localization of users, GSM performs periodic location updates even if a user does not use the mobile phones or some other devices but user should not be out of GSM network and is not completely switched off their devices.
  • 3. GSM USES TWO TYPES OF DATABASES: Home Location Register (HLR) Visitor Location Register (VLR)
  • 4. HOME LOCATION REGISTER (HLR): The Home Location Register is a database from a mobile network in which information from all mobile subscribers is stored.
  • 5. VISITOR LOCATION REGISTER (VLR): VLR is responsible for the MS (Mobile Station) to inform the HLR about location changes. As soon as user moves from one location to another location, the HLR sends all user data needed to the new VLR (New Location). Changing of one VLR to another VLR and their uninterrupted services is called as Roaming.
  • 6. ROAMING CAN BE TAKEN PLACE AS FOLLOWS: Within the network of one provider. Between two providers in one country (National Roaming). Different providers in different countries (International Roaming)
  • 7. TO LOCATE AN MS NEEDED: Mobile station international ISDN number (MSISDN). International mobile subscriber identity (IMSI). Temporary mobile subscriber identity (TMSI). Mobile station roaming number (MSRN)
  • 8.
  • 9. HANDOVER: A handover is a process in telecommunications and mobile communications in which a connected cellular call or a data session is transferred from one cell site to another without disconnecting the session. Cellular services are based on mobility and handover, allowing the user to be moved from one cell site range to another or to be switched to the nearest cell site for better performance.
  • 10. Handovers are a core element in planning and deploying cellular networks. It allows users to create data sessions or connect phone calls on the move. This process keeps the calls and data sessions connected even if a user moves from one cell site to another
  • 11. TYPES OF HANDOVERS: Hard Handover Soft Handover
  • 12. HARD HANDOVER: An instantaneous handover in which the existing connection is terminated and the connection to the destination channel is made. It is also known as a break-before- make handover. The process is so instantaneous that the user does not hear any noticeable interruption.
  • 13. SECURITY: The authentication protocols used in GSM are described in a number of places, such as (which also describes the mechanisms in an incompatible U.S. system). But the industry tried to keep secret the cryptographic and other protection mechanisms that form the core of the GSM security system.
  • 14. There’s a personal identification number, which you use to unlock the card. In theory, this stops stolen mobiles being used. In practice, many networks set an initial PIN of 0000, and most users never change it. There’s an international mobile subscriber identification (IMSI), a unique number that maps on to your mobile phone number.
  • 15. Finally there is a subscriber authentication key Ki, a 128-bit number that serves to authenticate that IMSI and is known to your home network. Telecom System Security: