This talk will provide an in-depth treatment of satellite telephony networks from a security perspective. The overall system seems secure, but in reality, it cannot be expected to be fully reliable.
We will briefly cover the satellite mobile system architecture, then discuss GMR (GEO-Mobile Radio) system elements, e.g. GSS (Gateway Station Subsystem), MES (Mobile Earth Station), AOC (Advanced Operation Center), and TCS (Traffic Control Subsystem) for GMR-1 systems and NCC (Network Control Center), GW (Gateway), SCF (Satellite Control Facility) and CMIS (Customer Management Information System) for GMR-2 systems.
From there, we will discuss the security issues of GMR system as it shares similar vulnerabilities with GSM–GMR is derived from the terrestrial digital cellular standard GSM and support access to GSM core networks, along with some interesting demos.
Time permitting, a question and answer session at the end of the presentation will allow participants to cover any additional issues in satellite telephony system they’d like to discuss.
Tutorial Content
This tutorial provides a broad-based discussion of radar system, covering the following topics:
-Introduction to Radars in Military and Commercial Applications
-Radar System Block Diagram
-Radar Antennas (slotted waveguide array, planar array), Transmitter (magnetron, solid-state), Receiver, Pedestal and Radome
-Plot Extraction, Tracking Algorithms and Display
-Radar Range Equation, Detection Performance
-Wave Propagation and Radar Cross Section
-Emerging and Advanced Radar Systems (phased-array, multi-beam, multi-mode, FMCW, solid-state)
In the discussion, practical systems, technical specifications and data will be used to enhance learning.In addition, simulation results will also be used to present findings.
The objective of the tutorial session is to equip participants with solid understanding of radar systems for system level applications and prepare them for advanced and professional radar courses, projects and research.
This tutorial is designed and developed based on the following references:
[1] G. W. Stimson, Introduction to Airborne Radar Second Edition, Scitech Publishing, 1998.
[2] L. V. Blake, A Guide to Basic Pulse-Radar Maximum-Range Calculation, NRL Report 6930, 1969.
[3] K. H. Lee, Radar Systems for Nanyang Technological University, TBSS, 2014.
In electronics, crosstalk is any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Crosstalk is usually caused by undesired capacitive, inductive, or conductive coupling from one circuit or channel to another.
Crosstalk is a significant issue in structured cabling, audio electronics, integrated circuit design, wireless communication and other communications systems.
Physical design means --->> netlist (.v ) converted into GDSII form(layout form)
logical connectivity of cells converted into physical connectivity.
During physical design, all design components are instantiated with their geometric representations. In other words, all macros, cells, gates, transistors, etc., with fixed shapes and sizes per fabrication layer, are assigned spatial locations (placement) and have appropriate routing connections (routing) completed in metal layers.
Physical design directly impacts circuit performance, area, reliability, power, and manufacturing yield. Examples of these impacts are discussed below.
Performance: long routes have significantly longer signal delays.
Area: placing connected modules far apart results in larger and slower chips.
Reliability: A large number of vias can significantly reduce the reliability of the circuit.
Power: transistors with smaller gate lengths achieve greater switching speeds at the cost of higher leakage current and manufacturing variability; larger transistors and longer wires result in greater dynamic power dissipation.
Yield: wires routed too close together may decrease yield due to electrical shorts occurring during manufacturing, but spreading gates too far apart may also undermine yield due to longer wires and a higher probability of opens
Placement is the process of determining the locations of circuit devices on a die
surface. It is an important stage in the VLSI design flow, because it affects routability, performance, heat distribution, and to a less extent, power consumption of a
design. Traditionally, it is applied after the logic synthesis stage and before the
routing stage. Since the advent of deep submicron process technology around
the mid-1990s, interconnect delay, which is largely determined by placement,
has become the dominating component of circuit delay. As a result, placement
information is essential, even in early design stages, to achieve better circuit performance. In recent years, placement techniques have been integrated into the
logic synthesis stage to perform physical synthesis and into the architecture
design stage to perform physical-aware architecture design
Equivalence checking is a portion of a larger discipline called formal verification. This technology uses mathematical modeling techniques to prove that two representations of design exhibit the same behavior. This approach should not be confused with functional verification, which uses exhaustive simulation to verify the correctness of a design.
Once a verified version of a design has been identified, equivalence checking can be used to determine if an alternate representation of the design behaves the same as the verified version. This technique does not use input vectors so it is more efficient.
Equivalence checking is useful to verify that a design’s function has not changed after an operation like synthesis, or after a functional ECO has been applied.
4G-LTE Paging is made simple and easy. How is paging handled in NAS, RRC and Physical layer. With DRX cycle, how will UE NOT miss any paging and synchronised? How to implement paging in RRC?
Tutorial Content
This tutorial provides a broad-based discussion of radar system, covering the following topics:
-Introduction to Radars in Military and Commercial Applications
-Radar System Block Diagram
-Radar Antennas (slotted waveguide array, planar array), Transmitter (magnetron, solid-state), Receiver, Pedestal and Radome
-Plot Extraction, Tracking Algorithms and Display
-Radar Range Equation, Detection Performance
-Wave Propagation and Radar Cross Section
-Emerging and Advanced Radar Systems (phased-array, multi-beam, multi-mode, FMCW, solid-state)
In the discussion, practical systems, technical specifications and data will be used to enhance learning.In addition, simulation results will also be used to present findings.
The objective of the tutorial session is to equip participants with solid understanding of radar systems for system level applications and prepare them for advanced and professional radar courses, projects and research.
This tutorial is designed and developed based on the following references:
[1] G. W. Stimson, Introduction to Airborne Radar Second Edition, Scitech Publishing, 1998.
[2] L. V. Blake, A Guide to Basic Pulse-Radar Maximum-Range Calculation, NRL Report 6930, 1969.
[3] K. H. Lee, Radar Systems for Nanyang Technological University, TBSS, 2014.
In electronics, crosstalk is any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Crosstalk is usually caused by undesired capacitive, inductive, or conductive coupling from one circuit or channel to another.
Crosstalk is a significant issue in structured cabling, audio electronics, integrated circuit design, wireless communication and other communications systems.
Physical design means --->> netlist (.v ) converted into GDSII form(layout form)
logical connectivity of cells converted into physical connectivity.
During physical design, all design components are instantiated with their geometric representations. In other words, all macros, cells, gates, transistors, etc., with fixed shapes and sizes per fabrication layer, are assigned spatial locations (placement) and have appropriate routing connections (routing) completed in metal layers.
Physical design directly impacts circuit performance, area, reliability, power, and manufacturing yield. Examples of these impacts are discussed below.
Performance: long routes have significantly longer signal delays.
Area: placing connected modules far apart results in larger and slower chips.
Reliability: A large number of vias can significantly reduce the reliability of the circuit.
Power: transistors with smaller gate lengths achieve greater switching speeds at the cost of higher leakage current and manufacturing variability; larger transistors and longer wires result in greater dynamic power dissipation.
Yield: wires routed too close together may decrease yield due to electrical shorts occurring during manufacturing, but spreading gates too far apart may also undermine yield due to longer wires and a higher probability of opens
Placement is the process of determining the locations of circuit devices on a die
surface. It is an important stage in the VLSI design flow, because it affects routability, performance, heat distribution, and to a less extent, power consumption of a
design. Traditionally, it is applied after the logic synthesis stage and before the
routing stage. Since the advent of deep submicron process technology around
the mid-1990s, interconnect delay, which is largely determined by placement,
has become the dominating component of circuit delay. As a result, placement
information is essential, even in early design stages, to achieve better circuit performance. In recent years, placement techniques have been integrated into the
logic synthesis stage to perform physical synthesis and into the architecture
design stage to perform physical-aware architecture design
Equivalence checking is a portion of a larger discipline called formal verification. This technology uses mathematical modeling techniques to prove that two representations of design exhibit the same behavior. This approach should not be confused with functional verification, which uses exhaustive simulation to verify the correctness of a design.
Once a verified version of a design has been identified, equivalence checking can be used to determine if an alternate representation of the design behaves the same as the verified version. This technique does not use input vectors so it is more efficient.
Equivalence checking is useful to verify that a design’s function has not changed after an operation like synthesis, or after a functional ECO has been applied.
4G-LTE Paging is made simple and easy. How is paging handled in NAS, RRC and Physical layer. With DRX cycle, how will UE NOT miss any paging and synchronised? How to implement paging in RRC?
Overview of Photonics Research at Calit2: Scaling from Nanometers to the EarthLarry Smarr
10.03.26
UCSD-NICT Joint Symposium on Innovative Lightwave,
Millimeter-Wave and THz Technologies
for Future Sustainable Network
Title: Overview of Photonics Research at Calit2: Scaling from Nanometers to the Earth
La Jolla, CA
How TCP/IP attacks can be applied in satellite communications. Interesting example on how to achieve anonymous Internet connection using DVB and some tricks. Presented in
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Adtran
At UTC, Daniel Burch and Dustin Williams discussed the challenges posed by satellite-delivered PNT services, introduced alternative timing technologies and outlined best practices for establishing secure, future-proof and assured timing services. These innovations are not only necessary for the present, but they also meet the rigorous requirements of emerging private LTE/5G networks. Learn more about the urgent threats to critical energy infrastructure and the solutions being adopted to mitigate these risks.
A fast-paced tutorial on satellite image geometry.
Mono & stereo collection geometry.
Effects of collection geometry on image quality, perspective and accuracy.
RPC & Physical Camera Models
Geometry of scan-oriented, map-oriented, orthorectified, and stereo image products
This tutorial for producers and users of satellite imagery provides a common vocabulary and understanding of collection and product geometry and effects.
Satellite RF Communications and Onboard Processing Course SamplerJim Jenkins
Successful systems engineering requires a broad understanding of the important principles of modern satellite communications and onboard data processing. This course covers both theory and practice, with emphasis on the important system engineering principles, tradeoffs, and rules of thumb. The latest technologies are covered, including those needed for constellations of satellites.
This course is recommended for engineers and scientists interested in acquiring an understanding of satellite communications, command and telemetry, onboard computing, and tracking. Each participant will receive a complete set of notes.
Waluku: Answering Astronomy Questions through Social MediaJim Geovedi
langitselatan as one of the established astronomy community in Indonesia have been actively use social media to interact and discussion with their members and general public. Since 2011 langitselatan received question from public to answer in the form of blog article and now planning to extensively use social media network for astronomy outreach.
This paper reports the development and implementation of Waluku, an online astronomy knowledge base management system with the extension of the dialogue based natural language chatbot on the Twitter social network, that creates responses based on information extracted from langitselatan blog articles, Wikipedia articles and community supplied answers.
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Jim Geovedi
Dalam bahasa yang sama, kata yang paling sering digunakan, jumlah huruf per kata, serta berbagai statistik lain yang terkait dengan distribusi frekuensi sangat bergantung kepada ragam yang digunakan. Makalah ini menelaah perbandingan distribusi frekuensi kata antara empat ragam bahasa Indonesia yang populer di internet, yaitu Kompas (media massa), Wikipedia bahasa Indonesia (ensiklopedia), Twitter (mikroblog), dan Kaskus (forum). Kajian dilakukan dengan menggunakan korpus yang diambil dari data yang tersedia secara publik di internet serta diproses dengan menggunakan bahasa pemrograman Python serta beberapa pustaka pemrograman yang bersumber terbuka. Hasil kajian menunjukkan adanya perbedaan distribusi yang cukup tajam di antara keempat ragam bahasa Indonesia ini. Kompas banyak menggunakan kata akan karena sifat beritanya; Wikipedia banyak menggunakan kata adalah karena sifat deskriptifnya; Twitter banyak menggunakan kata aku karena sifat subjektifnya; Kaskus banyak menggunakan kata gan yang merupakan kata khas komunitas ini. Kajian ini juga memberikan beberapa hal yang harus diperhatikan dalam kajian serupa seperti penyiapan dan pembersihan data korpus dan leksikon. Kajian ini diharapkan dapat memberikan dasar penelitian lebih lanjut dalam bidang distribusi frekuensi dan analisis korpus bahasa Indonesia.
Satellite Hacking — Intro by Indianz (2012)Jim Geovedi
A very good introduction by IndianZ (Martin Rutishauser) about Satellite Hacking. He also brought up some information that missed in my satellite hacking talks. Highly recommended for those who are interested in the subject.
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
In 2010 a number of practical high-profile attacks against GSM has been discussed and demonstrated. Still it should be noted that those only work against GSM (2G) which has been standardised in the early 90s. It was followed by the 3G family of standards in 2000 which in turn are currently superseded (better: complemented) by yet another generation (4G). LTE (4G) which is expected to be "the next big thing in mobile telco business" has an all-IP network architecture that is much flatter than the earlier architectures' ones.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
3. “ WHEN TERRESTRIAL
COMMUNICATION FAIL,
WE PREVAIL! ”
Arthur C. Clarke
1917-2008
4. Satellite Communications
Broadcast Video to
Cable Headends
Local ISPs
Direct Broadcast TV Video
Last-mile Broadband Contribution
Corporate Data Networks Teleport PSTN
(Interactive & Multicast) End Users
Teleport Internet
End Users
5. Dan Veeneman
Low Earth Orbit Satellites
Dan Veeneman
Future & Existing Satellite Systems
Warezzman
DVB Satellite Hacking
Jim Geovedi, Raditya Iryandi,
Hacking a Bird in the Sky: Hijacking VSAT Connection
Jim Geovedi, Raditya Iryandi, Anthony Zboralski
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Adam Laurie
$atellite Hacking for Fun & Pr0fit!
Leonardo Nve Egea, Christian Martorella
Playing in a Satellite Environment 1.2
Jim Geovedi, Raditya Iryandi
Hacking Satellite: A New Universe to Discover
Jim Geovedi, Raditya Iryandi, Raoul Chiesa
Hacking a Bird in the Sky: The Revenge of Angry Birds
Jim Geovedi
Satellite Telephony Security: What Is and What Will Never Be
1996 1998 2004 2006 2008 2009 2011
11. Satellite Orbits
average distance to moon:
384,400 km
Medium Earth Orbit
Altitude: 8,000-20,000 km
EARTH Low Earth Orbit
Altitude: 500-2,000 km
Geostationary Orbit
Altitude: 35,786 km
Highly Elliptical Orbit
Altitude: >35,786 km
13. LEO Communication Satellite Constellation System
Return Link
Forward Link
LEO LEO
Satellite i Satellite i+1
Intersatellite Link
(ISL)
Orbital Altitude
Feeder Feeder Terminal Terminal
Downlink Uplink Downlink Uplink
Gateway
End User
Terminal
PSTN Cellular
17. CDMA (Code Division Multiple Access)
++++++++++++++++++++++++++++++++++++++++++
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
oooooooooooooooooooooooooooooooooooooooooo
------------------------------------------
Transponder
f1 f1 f1 f1
21. Spotbeams: Regional Coverage
E
F D
A L
G C
B K
H J
E E E E E I
F D F D F D F D F D
A L A L A L A L A L
G C G C G C G C G C
B K B K B K B K B K
H J H J H J H J H J
E I E I E I E I E I E
F D F D F D F D F D F D
E A L A L A L A L A L A L
D G C G C G C G C G C G C
A L B K B K B K B K B K B K
C H J H J H J H J H H
J J
B K I E I E I E I E I E I
J F D F D F D F D F D
I E A L A L A L A L A L
F D G C G C G C G C G C
A L B K B K B K B K B K
G C H J H J H J H J H J
B K I I E I E I E I
H J E F D F D F D
I F D A L A L A L
A L G C G C G C
G C B K B K B K
B K H J H J H J
H J E I E I E
E I E
I F D F D F D
F D F D
A L A L A L A L A L E
G C G C G C G C G C F D
B K B K B K B K B K A L
H J H J H J H J H J G C
I I I E I E I B K
E E
F D F D F D F D H J
A L A L A L A L I
G C G C G C G C
B K B K B K B K
H J H J H J H J
I I
25. GMR-1 System Elements
Space segment
Feeder links
Gateway Station
Spotbeam coverage
at L-Band
GS
SOC
PSTN
Mobile Earth Stations
Gateway Stations
26. GMR-1 Protocol Architecture
Satellite
MES GSC +
GTS + GSM
MSC
TCS
GMR-1 Um-Interface
CM CM
GSM
SIM
MM MM
RR RR BSSMAP BSSMAP
GPS
RECEIVER
DLL DLL SCCP SCCP
PHYS PHYS MTP MTP
PHYS PHYS
Spotbeams Feeder Link GSM/A-Interface
L-Band Ku or C-Band (CCS7)
27. GMR-1 Logical Channel Mapping onto Physical Channel
DOWNLINK
LOGICAL PHYSICAL PHYSICAL
CONTROL ENTITIES
CHANNELS CHANNELS RESOURCE
USER CHANNELS
MAPPING
TCH Timeslot Frequency
Traffic Number (RF Channels)
TDMA Frame
Sequence
CCH
Time
Control and RF Channel
(Timeslots)
Signalling
UPLINK
MOBILE EARTH STATION SATELLITE
28. GMR-1 (GSM-based) Services
• Standard GSM-based services (Phase 2)
• Roaming
• Single number routing
• Numbers and addressing
• Authentication and privacy
29. GMR-1 Extended Services
• Single-hopped terminal-to-terminal calls
• Optimal routing
• High penetration alerting
• Position based services
31. GMR-2 System Elements
Traffic GEO Satellite
Signalling
C-Band L-Band
Gateway 1 C-Band
C-Band
C-Band
PSTN User
Terminals
PN
Gateway 2
PLMN Satellite Control
Facility
PSTN
Gateway 3
PN Network Control
Centre
PLMN PSTN
PN Customer Management
Information System
PLMN
33. L-band Spotbeams for MSS Users
E
F D
A L
G C
B K
H J
E E E E E I
F D F D F D F D F D
A L A L A L A L A L
G C G C G C G C G C
B K B K B K B K B K
H J H J H J H J H J
E I E I E I E I E I E
F D F D F D F D F D F D
E A L A L A L A L A L A L
D G C G C G C G C G C G C
A L B K B K B K B K B K B K
C H J H J H J H J H H
J J
B K I E I E I E I E I E I
J F D F D F D F D F D
I E A L A L A L A L A L
F D G C G C G C G C G C
A L B K B K B K B K B K
G C H J H J H J H J H J
B K I I E I E I E I
H J E F D F D F D
I F D A L A L A L
A L G C G C G C
G C B K B K B K
B K H J H J H J
H J E I E I E
E I E
I F D F D F D
F D F D
A L A L A L A L A L E
G C G C G C G C G C F D
B K B K B K B K B K A L
H J H J H J H J H J G C
I I I E I E I B K
E E
F D F D F D F D H J
Traffic A L A L A L A L I
G C G C G C G C
Signalling B K B K B K B K
H J H J H J H J
I I
34. GMR-2 Gateway Internal Structure
Databases
HLR & VLR
GA
RF/IF TCE GSC MSC
PSTN
GA Gateway Antenna
TCE Traffic Channel Equipment PN
GSC Gateway Station Controller
MSC Mobile Switching Center
GSM
36. Satellite Phone Interception
• Law-enforcements require tapping
• Test equipment
• Limited use of encryption
• Modifiable phone equipment
37. Tactical Interception
Receives L-band from satellite and line-of-
sight from handset
Strategic Interception
Receives L-band from satellite and C-band
from satellite
39. Tactical Satellite Interception Operation
1.5 GHz
DOWN
1.6 GHz
UP
6 GHz 1.5 GHz
UP DOWN
3.5 GHz MES
DOWN
1.6 GHz
RADIO LINE-OF-SIGHT
Gateway Monitoring
Agent
41. Call Analysis
• Spotbeam IDs, GPS co- • TMSI called by MES.
ordinates, operating
frequency.
• Mobile or Fixed Originated Call
(Voice, Fax, Data or SMS).
• Date, time and duration of call. • Terminal type.
• MES IMSI. • Ciphering key sequence
• GPS co-ordinates of MES. number.
• Random Reference Number • RAND and SRES.
(CallerID).
• Encryption Algorithm
42. Strategic Satellite Interception Operation
1.5 GHz
DOWN
1.6 GHz
UP
6 GHz 1.5 GHz
UP DOWN
3.5 GHz MES
DOWN 3.5 GHz
DOWN
Gateway
Monitoring
Centre