SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
8          Switching system

    Objectives
    After this chapter the student will:
    • be able to describe the functionality of MSC/VLR, GMSC and
      HLR.
    • understand the procedures for authentication, ciphering and
      identification.
    • be familiar with the nodes handling SMS and data transmission.



       8.1 INTRODUCTION .......................................................................... 2

       8.2 MSC/VLR................................................................................. 3
         General .......................................................................................... 3
         Mobile services Switching Centre (MSC)...................................... 3
         Visitor Location Register (VLR) .................................................... 3
         MSC/VLR functions ....................................................................... 3

       8.3 GATEWAY MSC (GMSC).......................................................... 5

       8.4 HOME LOCATION REGISTER (HLR) ........................................... 5

       8.5 AUC AND EIR ........................................................................... 6
         General .......................................................................................... 6
         AUC - AUthentication Centre........................................................ 6
         EIR - Equipment Identity Register ................................................. 7
         TMSI .............................................................................................. 7

       8.6 SHORT MESSAGE SERVICES CENTRE (SMS-C).......................... 8

       8.7 INTER WORKING FUNCTIONS (IWF) .......................................... 8




Michael Quek                                                                                                     1
8.1 Introduction
          The switching system is the GSM connection to other networks and allows
          calls to be set up to and from the MS. This involves switching and routing
          as well as checking different registers for location, subscription and
          equipment of the MS.



                                Switching                               AUC
                                System

                                                                        HLR
                                                                                EIR

                                                         VLR
               other            GMSC
                                                                        MSC
               networks



                                                                        BSC

                              AUC    AUthentication Centre
                              BTS    Base Transceiver Station
                              BSC    Base Station Controller
                              EIR    Equipment Identity Register
                              GMSC   Gateway MSC
                              HLR    Home Location Register
                              MS     Mobile Station
                              MSC    Mobile services Switching Centre
                              VLR    Visitor Location Register                BTS     MS
          GSM Network


          Switching and routing
          MSC - Mobile services Switching Centre
          GMSC - Gateway MSC

          Subscriber registers
          VLR - Visitor Location Register
          HLR - Home Location Register

          Security functions
          AUC - AUthentication Centre
          EIR - Equipment Identity Register

          Non-voice traffic
          SMS-C - Short Message Services Centre
          IWF – Inter Working Functions




Michael Quek                                                                               2
8.2 MSC/VLR

          General
          The main responsibility of the MSC is to route and set up calls to and from
          the MS. For this it needs subscriber information which is stored in the
          VLR. In every MS activity involving the network the MSC and VLR has to
          communicate. The amount of signalling between these nodes has
          practically lead to an integration. Still they are two logical units specified
          by GSM but in the existing implementations the interface between them is
          internal following the standard of the supplier.


          Mobile services Switching Centre (MSC)
          The MSC is mainly an exchange with switching capacity. It handles in-
          and outgoing trunks, the PCM-links and the functions for signalling to
          other switches in GSM as well as other networks. It also has functions for
          supervision of the calls and routines for charging and statistics. So far the
          MSC can be compared with any ordinary switch in the fixed network. It is
          the ability to handle mobile calls that turns it into an MSC.


          Visitor Location Register (VLR)
          Due to the fact that the MS can roam in a large geographical area it is
          necessary to have a distributed register for the subscriber information. The
          VLR is a database that holds a file for the MSs present in the area
          controlled by the connected MSC, a file which will be erased in that
          specific VLR when the MS leaves that area. The files are registered on
          IMSI and contains information about the subscription, classmark of MS,
          the address to the HLR where the MS is registered, parameters for
          authentication, ciphering as well as dynamic data such as location, state of
          MS and status of services. The information is fetched from the HLR on
          request from the VLR e.g. during the location updating.


          MSC/VLR functions
          To handle mobile calls the following functions are needed in the
          MSC/VLR
          • call setup and supervision, special for mobile calls
          • authentication and identification
          • establishing and maintaining a continuous speech path to a
            moving subscriber
          • privacy on the air
          • handling subscriber data and updating registers
          These functions can be related to two different areas.




Michael Quek                                                                               3
1. MS connection
          The signalling to establish and maintain a connection with the MS is done
          with a protocol developed for GSM called BSSAP (Base Station System
          Application Part). This protocol consists of different entities, each with its
          own functions.

          CM - Connection Management - is responsible for the call control i.e. call
          establishment, supervision and clearing. It also handles supplementary
          services and functions for short messages.

          MM - Mobility Management - deals with the consequences of mobility i.e.
          registration and security. Registration is the different types of location
          updating initiated by the MS. Security functions means the procedures for
          authentication, identification and TMSI assignment.

          RR - Radio Resource management - is handled through the BSS and
          concerns the establishing and maintaining of the radio channel. It co-
          ordinates paging and different handover procedures and also keeps
          translation tables for cell or location area identity into BSC identity. The
          start of ciphering is also handled by this entity. The MSC/VLR also needs
          the ability to assign and clear call paths on the trunks to the BSC, and
          handle the associated signalling.

          2. Switching system connection
          The signalling to and from the HLR could e.g. be concerning an entering
          or leaving MS when the HLR or the VLR has to be updated with new
          subscriber information. Another reason is a request sent from the VLR to
          the HLR, for new triplets for authentication. During the setup of a mobile
          terminated call signalling is needed for the provision of a roaming number
          for the GMSC to route the call.

          MSC/VLR also has to communicate with other MSC/VLRs during some
          handover procedures. The signalling between the nodes in the switching
          system to keep the registers updated is done with a protocol developed for
          GSM called MAP (Mobile Application part).




Michael Quek                                                                               4
8.3 Gateway MSC (GMSC)
          A mobile terminated call is always routed to a GMSC, specific for that MS
          operator. The task for the GMSC is to find the MS and route the call to the
          MSC/VLR controlling that area. The GMSC will ask the HLR for routing
          information and then reroute the call to the MSC/VLR using the roaming
          number in the reply. The gateway function could be implemented in an
          ordinary MSC/VLR



   8.4 Home Location Register (HLR)
          The HLR is the main database that holds files for all the MSs in an
          operator’s network. There is one HLR per operator but it can be separated
          geographically into smaller units. The files are registered on IMSI and
          contains information about the subscription, MSISDN, parameters for
          authentication and ciphering as well as dynamic data such as the address to
          the present MSC/VLR, status of supplementary services and in some cases
          state of MS.

          The HLR uses the MAP protocol to communicate with the MSC/VLR,
          GMSC and in some networks also the AUC. On a location updating
          request from a MSC/VLR concerning an entering MS, i.e. a new visitor,
          the HLR will execute several operations. It will register the new VLR
          address in the database, send the subscriber information to that new VLR
          and also tell the old VLR to erase that subscriber’s information. The VLR
          can thus be seen as a distributed HLR holding information only about the
          MSs served by that MSC/VLR.

          During the setup of a mobile terminated call the HLR will be requested by
          the GMSC to provide routing information for rerouting. The HLR will
          fetch that information from the correct MSC/VLR, or the database in case
          of a forwarding number, and send it to the GMSC.

          The HLR will also provide triplets for authentication and ciphering on
          request from VLR. These triplets have been produced in AUC and fetched
          by the HLR and stored in the database.




Michael Quek                                                                            5
8.5 AUC and EIR

          General
          Much effort has been put into security in GSM due to problems in older
          mobile systems. The security aspects can be divided into first identification
          and verification of a correct MS so that unauthorised, barred or stolen
          equipment cannot be used and second privacy on the radio channel.

          The MS is checked by the authentication procedure for the subscription -
          the SIM-card - and the identification procedure for the phone - the mobile
          equipment (ME). The privacy on the air is achieved by ciphering the
          information, speech and data, and by using a Temporary Mobile Subscriber
          Identity (TMSI) for the subscriber. The AUC is the node that generates
          parameters, triplets, for authentication of the subscriber and ciphering
          while the EIR is a database for the identification of the mobile equipment.

          AUC - AUthentication Centre
          The authentication centre produces triplets for each and every subscriber in
          that operators network and the triplets will be sent to the HLR on request.
          The AUC contains a database with IMSI and Ki, the authentication key.
          IMSI and Ki are also stored on the SIM-card in the MS. These two
          parameters together with a random number, (RAND), generated in the
          AUC will be input data to algorithms. This will produce the ”Signed
          RESponse” (SRES) and the key for ciphering (Kc). RAND, SRES and Kc
          will form a triplet.

                                                                    AUC
                           Database


                       IMSI            Ki
                                                                   Algorithm A8
                                                                    Ciphering
                    Random number generation

                                                                   Algorithm A3
                                                                  Authentication



                                  RAND                                             RAND     SRES    Kc

                                                                                          Triplet
                    IMSI      International Mobile Subscriber Identity
                    Ki        Authentication Key
                    RAND      Random number
                    SRES      Signed RESponse
                    Kc        Ciphering Key

          Generation of triplets in AUC




Michael Quek                                                                                             6
Authentication procedure
          The authentication procedure is initiated from the MSC/VLR by sending
          RAND to the MS. The MSC/VLR has fetched the triplets from the HLR.
          Now the MS calculates the SRES and Kc using the same algorithms as the
          AUC. The calculated SRES will be sent to the MSC/VLR which compares
          the SRES received from the MS with the one in the triplet from the AUC.
          If the two are the same access will be granted. The calculated Kc will be
          stored on the SIM-card.

          Ciphering start procedure
          The ciphering start procedure is initiated from the MSC/VLR by sending a
          message Cipher Mode Command containing the Kc. The Kc will be
          removed from the message by the BTS before sending it on to the MS, so
          that the Kc will never be sent on the air. When the MS receives this
          message it will send the message Cipher Mode Complete in cipher mode
          using the calculated Kc stored on the SIM-card. If the BTS can decipher
          this message it will inform the MSC/VLR that ciphering has started.


          EIR - Equipment Identity Register
          The EIR is a database containing the identity numbers for the mobile
          equipment, IMEI. These numbers are put on a black list if the equipment
          has been barred for some reason, on a grey list if it is not yet type approved
          or has bad behaviour and on the white list if there is no restrictions in using
          the equipment.

          Equipment identification procedure
          The equipment identification procedure is initiated from the MSC/VLR by
          sending a message Identity Request for the IMEI. The MS is now forced to
          reply by sending the IMEI which will be sent to the EIR by the MSC/VLR.
          Depending on the result from the EIR i.e. on what list the IMEI was found,
          the MSC/VLR will grant or deny access.


          TMSI
          The Temporary Mobile Subscriber Identity number is used to cover IMSI,
          the real identity, so that no tracing and identification can be done by
          listening to the traffic on the air. TMSI is allocated by the MSC/VLR and
          is only valid in one MSC Service area. This means that when the MS
          changes MSC Service area the MS need a new TMSI allocated by the new
          MSC/VLR. After the allocation, which could be done during location
          updating, the MS should use TMSI instead of IMSI in any connection with
          the network.

          There is also a gain from the operators point of view in using TMSI
          because it is only half the length of IMSI. This doubles the paging capacity
          in the network.




Michael Quek                                                                                7
8.6 Short Message Services Centre (SMS-C)
          The short messages point-to-point are handled by a SMS-C. Short
          messages can have the length of up to 160 alphanumerical characters and
          can be sent to and from the MS.

          The SMS-C works together with the HLR and MSC/VLR and a gateway
          function for SMS in the same way as for setting up calls. The short
          messages can be buffered in the SMS-C and sent again if the MS cannot
          receive the message the first time.



   8.7 Inter Working Functions (IWF)
          GSM is capable of handling not only speech but also data. In order to
          handle the different bit rates there is a need for modems. These, placed in
          the IWF, can be used by a MSC/VLR when setting up a data call and will
          then be connected through the switch.

          The data services that the IWF shall be able to handle according to the
          GSM specification is synchronous 1,2 - 9,6 kbit/s and asynchronous 0.3 -
          9,6 kbit/s. Also, it must be able to handle different access protocols (e.g.
          X.28 and X.32) used in data networks and different modem type standards
          (e.g. V.21 and V.22).

          From GSM point of view the transmission can be transparent or non-
          transparent which implies that signal processing is being used or not. The
          IWF also has to perform the rate adaptation from bit rate used on the air
          interface to the wanted bit rate.




Michael Quek                                                                             8

Weitere ähnliche Inhalte

Was ist angesagt?

Asynchronous Transfer Mode Project
Asynchronous Transfer Mode ProjectAsynchronous Transfer Mode Project
Asynchronous Transfer Mode ProjectUbraj Khadka
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeaniston0108
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network LayerYubraj C.
 
Day 02 gsm-network_architecture
Day 02 gsm-network_architectureDay 02 gsm-network_architecture
Day 02 gsm-network_architecturehaider04
 
Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocolPratit Khare
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMSseanraz
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Meenakshi Devi
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansTelebeansolutions
 
Module1 part2
Module1 part2Module1 part2
Module1 part2raksharao
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobilePartha Bhunia
 
ALLAH WASAYA short_message_service
ALLAH WASAYA short_message_serviceALLAH WASAYA short_message_service
ALLAH WASAYA short_message_servicemuhsin sheeraz
 
2 gsm network structure
2 gsm network structure2 gsm network structure
2 gsm network structurekeyvan storer
 

Was ist angesagt? (20)

Gsm
GsmGsm
Gsm
 
Asynchronous Transfer Mode Project
Asynchronous Transfer Mode ProjectAsynchronous Transfer Mode Project
Asynchronous Transfer Mode Project
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
 
Day 02 gsm-network_architecture
Day 02 gsm-network_architectureDay 02 gsm-network_architecture
Day 02 gsm-network_architecture
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Atm
AtmAtm
Atm
 
Forouzan atm
Forouzan atmForouzan atm
Forouzan atm
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocol
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMS
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
 
Short message service
Short message serviceShort message service
Short message service
 
P26093098
P26093098P26093098
P26093098
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
Module1 part2
Module1 part2Module1 part2
Module1 part2
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
 
ALLAH WASAYA short_message_service
ALLAH WASAYA short_message_serviceALLAH WASAYA short_message_service
ALLAH WASAYA short_message_service
 
2 gsm network structure
2 gsm network structure2 gsm network structure
2 gsm network structure
 

Andere mochten auch

Andere mochten auch (9)

Location Updating
Location UpdatingLocation Updating
Location Updating
 
Aberration_Errors
Aberration_ErrorsAberration_Errors
Aberration_Errors
 
Linear Lighting Design Notes
Linear Lighting Design NotesLinear Lighting Design Notes
Linear Lighting Design Notes
 
Cell Planning
Cell PlanningCell Planning
Cell Planning
 
Agri travel brochure en
Agri travel brochure enAgri travel brochure en
Agri travel brochure en
 
Access And Radio Theory
Access And Radio TheoryAccess And Radio Theory
Access And Radio Theory
 
Call Setup
Call SetupCall Setup
Call Setup
 
Handover
HandoverHandover
Handover
 
SMS
SMSSMS
SMS
 

Ähnlich wie Switching System

GSM Archiitrcture - Ufone PPT
GSM Archiitrcture - Ufone PPTGSM Archiitrcture - Ufone PPT
GSM Archiitrcture - Ufone PPTWaqas Ahmed Nawaz
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMSuryani Ilias
 
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptxHUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptxyoussef827458
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Jay Nagar
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless CommunicationDon Norwood
 
Mobile and information society
Mobile and information societyMobile and information society
Mobile and information societyIlyaas Hussain
 
Global system for mobile communication
Global system for mobile communicationGlobal system for mobile communication
Global system for mobile communicationbhartis3
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptxhazhamina
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentFabiha Ain
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptHazemElabed2
 
GSM.pptx-MorelaHTENG.pptx
GSM.pptx-MorelaHTENG.pptxGSM.pptx-MorelaHTENG.pptx
GSM.pptx-MorelaHTENG.pptxPoojaG86
 

Ähnlich wie Switching System (20)

GSM Archiitrcture - Ufone PPT
GSM Archiitrcture - Ufone PPTGSM Archiitrcture - Ufone PPT
GSM Archiitrcture - Ufone PPT
 
GSM architecture
GSM architectureGSM architecture
GSM architecture
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEM
 
Lecture 8 9
Lecture 8 9Lecture 8 9
Lecture 8 9
 
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptxHUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Gsm1
Gsm1Gsm1
Gsm1
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Gsm basics
Gsm   basicsGsm   basics
Gsm basics
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
Sms
Sms Sms
Sms
 
Mobile and information society
Mobile and information societyMobile and information society
Mobile and information society
 
Global system for mobile communication
Global system for mobile communicationGlobal system for mobile communication
Global system for mobile communication
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
GSM
GSMGSM
GSM
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
 
GSM.pptx-MorelaHTENG.pptx
GSM.pptx-MorelaHTENG.pptxGSM.pptx-MorelaHTENG.pptx
GSM.pptx-MorelaHTENG.pptx
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 

Mehr von Sokunth Che

Authentication and Ciphering
Authentication and CipheringAuthentication and Ciphering
Authentication and CipheringSokunth Che
 
Base Station System
Base Station SystemBase Station System
Base Station SystemSokunth Che
 
GSM Among Other Systems
GSM Among Other SystemsGSM Among Other Systems
GSM Among Other SystemsSokunth Che
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesSokunth Che
 
Basic english usage
Basic english usageBasic english usage
Basic english usageSokunth Che
 

Mehr von Sokunth Che (7)

Authentication and Ciphering
Authentication and CipheringAuthentication and Ciphering
Authentication and Ciphering
 
Base Station System
Base Station SystemBase Station System
Base Station System
 
Mobile Station
Mobile StationMobile Station
Mobile Station
 
Air Interface
Air InterfaceAir Interface
Air Interface
 
GSM Among Other Systems
GSM Among Other SystemsGSM Among Other Systems
GSM Among Other Systems
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologies
 
Basic english usage
Basic english usageBasic english usage
Basic english usage
 

Kürzlich hochgeladen

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Kürzlich hochgeladen (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Switching System

  • 1. 8 Switching system Objectives After this chapter the student will: • be able to describe the functionality of MSC/VLR, GMSC and HLR. • understand the procedures for authentication, ciphering and identification. • be familiar with the nodes handling SMS and data transmission. 8.1 INTRODUCTION .......................................................................... 2 8.2 MSC/VLR................................................................................. 3 General .......................................................................................... 3 Mobile services Switching Centre (MSC)...................................... 3 Visitor Location Register (VLR) .................................................... 3 MSC/VLR functions ....................................................................... 3 8.3 GATEWAY MSC (GMSC).......................................................... 5 8.4 HOME LOCATION REGISTER (HLR) ........................................... 5 8.5 AUC AND EIR ........................................................................... 6 General .......................................................................................... 6 AUC - AUthentication Centre........................................................ 6 EIR - Equipment Identity Register ................................................. 7 TMSI .............................................................................................. 7 8.6 SHORT MESSAGE SERVICES CENTRE (SMS-C).......................... 8 8.7 INTER WORKING FUNCTIONS (IWF) .......................................... 8 Michael Quek 1
  • 2. 8.1 Introduction The switching system is the GSM connection to other networks and allows calls to be set up to and from the MS. This involves switching and routing as well as checking different registers for location, subscription and equipment of the MS. Switching AUC System HLR EIR VLR other GMSC MSC networks BSC AUC AUthentication Centre BTS Base Transceiver Station BSC Base Station Controller EIR Equipment Identity Register GMSC Gateway MSC HLR Home Location Register MS Mobile Station MSC Mobile services Switching Centre VLR Visitor Location Register BTS MS GSM Network Switching and routing MSC - Mobile services Switching Centre GMSC - Gateway MSC Subscriber registers VLR - Visitor Location Register HLR - Home Location Register Security functions AUC - AUthentication Centre EIR - Equipment Identity Register Non-voice traffic SMS-C - Short Message Services Centre IWF – Inter Working Functions Michael Quek 2
  • 3. 8.2 MSC/VLR General The main responsibility of the MSC is to route and set up calls to and from the MS. For this it needs subscriber information which is stored in the VLR. In every MS activity involving the network the MSC and VLR has to communicate. The amount of signalling between these nodes has practically lead to an integration. Still they are two logical units specified by GSM but in the existing implementations the interface between them is internal following the standard of the supplier. Mobile services Switching Centre (MSC) The MSC is mainly an exchange with switching capacity. It handles in- and outgoing trunks, the PCM-links and the functions for signalling to other switches in GSM as well as other networks. It also has functions for supervision of the calls and routines for charging and statistics. So far the MSC can be compared with any ordinary switch in the fixed network. It is the ability to handle mobile calls that turns it into an MSC. Visitor Location Register (VLR) Due to the fact that the MS can roam in a large geographical area it is necessary to have a distributed register for the subscriber information. The VLR is a database that holds a file for the MSs present in the area controlled by the connected MSC, a file which will be erased in that specific VLR when the MS leaves that area. The files are registered on IMSI and contains information about the subscription, classmark of MS, the address to the HLR where the MS is registered, parameters for authentication, ciphering as well as dynamic data such as location, state of MS and status of services. The information is fetched from the HLR on request from the VLR e.g. during the location updating. MSC/VLR functions To handle mobile calls the following functions are needed in the MSC/VLR • call setup and supervision, special for mobile calls • authentication and identification • establishing and maintaining a continuous speech path to a moving subscriber • privacy on the air • handling subscriber data and updating registers These functions can be related to two different areas. Michael Quek 3
  • 4. 1. MS connection The signalling to establish and maintain a connection with the MS is done with a protocol developed for GSM called BSSAP (Base Station System Application Part). This protocol consists of different entities, each with its own functions. CM - Connection Management - is responsible for the call control i.e. call establishment, supervision and clearing. It also handles supplementary services and functions for short messages. MM - Mobility Management - deals with the consequences of mobility i.e. registration and security. Registration is the different types of location updating initiated by the MS. Security functions means the procedures for authentication, identification and TMSI assignment. RR - Radio Resource management - is handled through the BSS and concerns the establishing and maintaining of the radio channel. It co- ordinates paging and different handover procedures and also keeps translation tables for cell or location area identity into BSC identity. The start of ciphering is also handled by this entity. The MSC/VLR also needs the ability to assign and clear call paths on the trunks to the BSC, and handle the associated signalling. 2. Switching system connection The signalling to and from the HLR could e.g. be concerning an entering or leaving MS when the HLR or the VLR has to be updated with new subscriber information. Another reason is a request sent from the VLR to the HLR, for new triplets for authentication. During the setup of a mobile terminated call signalling is needed for the provision of a roaming number for the GMSC to route the call. MSC/VLR also has to communicate with other MSC/VLRs during some handover procedures. The signalling between the nodes in the switching system to keep the registers updated is done with a protocol developed for GSM called MAP (Mobile Application part). Michael Quek 4
  • 5. 8.3 Gateway MSC (GMSC) A mobile terminated call is always routed to a GMSC, specific for that MS operator. The task for the GMSC is to find the MS and route the call to the MSC/VLR controlling that area. The GMSC will ask the HLR for routing information and then reroute the call to the MSC/VLR using the roaming number in the reply. The gateway function could be implemented in an ordinary MSC/VLR 8.4 Home Location Register (HLR) The HLR is the main database that holds files for all the MSs in an operator’s network. There is one HLR per operator but it can be separated geographically into smaller units. The files are registered on IMSI and contains information about the subscription, MSISDN, parameters for authentication and ciphering as well as dynamic data such as the address to the present MSC/VLR, status of supplementary services and in some cases state of MS. The HLR uses the MAP protocol to communicate with the MSC/VLR, GMSC and in some networks also the AUC. On a location updating request from a MSC/VLR concerning an entering MS, i.e. a new visitor, the HLR will execute several operations. It will register the new VLR address in the database, send the subscriber information to that new VLR and also tell the old VLR to erase that subscriber’s information. The VLR can thus be seen as a distributed HLR holding information only about the MSs served by that MSC/VLR. During the setup of a mobile terminated call the HLR will be requested by the GMSC to provide routing information for rerouting. The HLR will fetch that information from the correct MSC/VLR, or the database in case of a forwarding number, and send it to the GMSC. The HLR will also provide triplets for authentication and ciphering on request from VLR. These triplets have been produced in AUC and fetched by the HLR and stored in the database. Michael Quek 5
  • 6. 8.5 AUC and EIR General Much effort has been put into security in GSM due to problems in older mobile systems. The security aspects can be divided into first identification and verification of a correct MS so that unauthorised, barred or stolen equipment cannot be used and second privacy on the radio channel. The MS is checked by the authentication procedure for the subscription - the SIM-card - and the identification procedure for the phone - the mobile equipment (ME). The privacy on the air is achieved by ciphering the information, speech and data, and by using a Temporary Mobile Subscriber Identity (TMSI) for the subscriber. The AUC is the node that generates parameters, triplets, for authentication of the subscriber and ciphering while the EIR is a database for the identification of the mobile equipment. AUC - AUthentication Centre The authentication centre produces triplets for each and every subscriber in that operators network and the triplets will be sent to the HLR on request. The AUC contains a database with IMSI and Ki, the authentication key. IMSI and Ki are also stored on the SIM-card in the MS. These two parameters together with a random number, (RAND), generated in the AUC will be input data to algorithms. This will produce the ”Signed RESponse” (SRES) and the key for ciphering (Kc). RAND, SRES and Kc will form a triplet. AUC Database IMSI Ki Algorithm A8 Ciphering Random number generation Algorithm A3 Authentication RAND RAND SRES Kc Triplet IMSI International Mobile Subscriber Identity Ki Authentication Key RAND Random number SRES Signed RESponse Kc Ciphering Key Generation of triplets in AUC Michael Quek 6
  • 7. Authentication procedure The authentication procedure is initiated from the MSC/VLR by sending RAND to the MS. The MSC/VLR has fetched the triplets from the HLR. Now the MS calculates the SRES and Kc using the same algorithms as the AUC. The calculated SRES will be sent to the MSC/VLR which compares the SRES received from the MS with the one in the triplet from the AUC. If the two are the same access will be granted. The calculated Kc will be stored on the SIM-card. Ciphering start procedure The ciphering start procedure is initiated from the MSC/VLR by sending a message Cipher Mode Command containing the Kc. The Kc will be removed from the message by the BTS before sending it on to the MS, so that the Kc will never be sent on the air. When the MS receives this message it will send the message Cipher Mode Complete in cipher mode using the calculated Kc stored on the SIM-card. If the BTS can decipher this message it will inform the MSC/VLR that ciphering has started. EIR - Equipment Identity Register The EIR is a database containing the identity numbers for the mobile equipment, IMEI. These numbers are put on a black list if the equipment has been barred for some reason, on a grey list if it is not yet type approved or has bad behaviour and on the white list if there is no restrictions in using the equipment. Equipment identification procedure The equipment identification procedure is initiated from the MSC/VLR by sending a message Identity Request for the IMEI. The MS is now forced to reply by sending the IMEI which will be sent to the EIR by the MSC/VLR. Depending on the result from the EIR i.e. on what list the IMEI was found, the MSC/VLR will grant or deny access. TMSI The Temporary Mobile Subscriber Identity number is used to cover IMSI, the real identity, so that no tracing and identification can be done by listening to the traffic on the air. TMSI is allocated by the MSC/VLR and is only valid in one MSC Service area. This means that when the MS changes MSC Service area the MS need a new TMSI allocated by the new MSC/VLR. After the allocation, which could be done during location updating, the MS should use TMSI instead of IMSI in any connection with the network. There is also a gain from the operators point of view in using TMSI because it is only half the length of IMSI. This doubles the paging capacity in the network. Michael Quek 7
  • 8. 8.6 Short Message Services Centre (SMS-C) The short messages point-to-point are handled by a SMS-C. Short messages can have the length of up to 160 alphanumerical characters and can be sent to and from the MS. The SMS-C works together with the HLR and MSC/VLR and a gateway function for SMS in the same way as for setting up calls. The short messages can be buffered in the SMS-C and sent again if the MS cannot receive the message the first time. 8.7 Inter Working Functions (IWF) GSM is capable of handling not only speech but also data. In order to handle the different bit rates there is a need for modems. These, placed in the IWF, can be used by a MSC/VLR when setting up a data call and will then be connected through the switch. The data services that the IWF shall be able to handle according to the GSM specification is synchronous 1,2 - 9,6 kbit/s and asynchronous 0.3 - 9,6 kbit/s. Also, it must be able to handle different access protocols (e.g. X.28 and X.32) used in data networks and different modem type standards (e.g. V.21 and V.22). From GSM point of view the transmission can be transparent or non- transparent which implies that signal processing is being used or not. The IWF also has to perform the rate adaptation from bit rate used on the air interface to the wanted bit rate. Michael Quek 8