SlideShare ist ein Scribd-Unternehmen logo
1 von 62
Introduction to SMS, MMS,
Modems & Gateways
By Michael Wakahe, June 2010
SMS & SIM
• Development of international SMS and
SIM standards and interoperable
application platforms for SIM and SMS
Toolkit and Interpreter have been
standardized for SIM and USIM by ETSI &
3GPP.
• They are solution based standards.
SMS & SIM
• SIM means “Subscriber Identity Module”
• Its original purpose (and continuing role) was to
identify a particular mobile user to the network in
a secure and consistent manner.
• To accomplish this, the SIM stores a private
digital key that is unique to each subscriber and
known only to the wireless carrier.
• The key is used to encrypt the traffic to and from
the handset.
SMS & SIM
• The SIM is a smart chip that was designed
as a secure, tamper-resistant environment
for the cryptographic keys that GSM
carriers use to:
– authenticate individual subscribers to the
network connection and
– track those subscribers’ activities once they
are on the air
SMS & SIM
• The SIM is owned and controlled by
network operator.
• It sports an API and can host multiple
applications.
• A SIM is a just a smart card that happens
to have a mobile phone as its reader.
SMS & SIM
• From its first use in a GSM phone until very
recently, a SIM was an 8-bit microcontroller,
usually an Intel 8051 or a Motorola 6805.
• The amount of memory in the SIM has grown.
Initially containing only 256 bytes of RAM and 3
kilobytes of EEPROM, it has grown to 1,024
bytes of RAM and 32 kilobytes of EEPROM
(2002)
SMS & SIM
• All the software for the SIM - the operating
system and the code that handles the file
system and the APDUs - is burned into 32
to 64 kilobytes of ROM.
• The 80 odd data files are kept in the
EEPROM, and the RAM is used as an I/O
buffer for communication with the handset.
SMS & SIM
• This is about all that is needed for the SIM
to perform its cryptographic duties
• Also provide some relatively trivial
telephony services such as storing a
phone book of frequently dialled numbers.
SMS & SIM
• Beginning in mid-1990s, as new
applications started to find their way onto
the mobile telephone, SIM started to
morph into a full fledged application
platform.
• This put all kinds of evolutionary pressure
on the SIM operating software and the
SIM hardware.
SMS & SIM
• The software started to sprout virtual machines,
principally the Java virtual machine, to host non
telephony applications,
• The hardware started to grow additional memory
and computational abilities.
• Roughly speaking, there have been three
generations of SIMs.
SMS & SIM
Generation Name Characteristic
1 Purpose-built
SIM
SIM performs network authentication
and universal telephony services such
as phone book and SMS message
storage
2 SIM with
applications
Additional customer-specific services
can be added as SIM Toolkit (STK)
applications after the SIM is in the
field
3 SIM as an
application
SIM is one of the multiple telephony
applications, specifically the
authentication application, on the
platform
SMS & SIM
• SIM maintains a constant connection to the
network as long as the mobile device remains
on.
• The only way to ensure that the SIM can
accomplish its handoff of subscribers from one
network to another without interrupting
communication is to base all of its functions on
very detailed international standards.
SMS & SIM
• Every GSM equipment manufacturer and
carrier adheres to these standards, which
cover everything including:
– physical size
– characteristics of the chip
– the way it handles and stores incoming
information.
SMS & SIM
• Because smart cards were designed to be
extremely difficult to crack under a variety
of attacks, the smart card’s core
electronics and design architecture were
adopted as the base of the SIM.
• Building applications for the SIM has a lot
in common with designing smart card
applications
SMS & SIM
• Typically there is a testing and certification
process required for any application that is
not developed directly by the network
providers or SIM vendors.
SMS & SIM
The SIM Application Toolkit (SAT), defined in [3GPP-
31.111], defines mechanisms for allowing SIM-hosted
applications to interact with the mobile equipment. This
includes:
• Profile download: this mechanism allows the mobile
equipment to inform the SIM about its capabilities.
• Proactive SIM: a proactive SIM can issue commands to
the mobile equipment.
• Data download to SIM
SMS & SIM
• Menu selection: this mechanism allows the (U)SIM to define
menu items and to be notified by the mobile equipment when
the subscriber has selected one of the menu items.
• Call control by SIM: here the SIM performs a control prior to
the establishment of calls by the mobile equipment. This
allows the SIM to authorize or reject the call establishment or
to modify the parameters of the call to be established.
• Control of outgoing messages by SIM: with this mechanism,
the SIM performs a control prior to the sending of messages
by the mobile equipment. This allows the SIM to authorize or
reject the sending of a message.
SMS & SIM
• Event download: allows the SIM to provide a set of
events to be monitored by the mobile equipment. If an
event occurs then the mobile equipment notifies the SIM.
• Security: this mechanism ensures data confidentiality,
data integrity and data sender validation.
• Timer expiration: the SIM can manage a set of timers
running physically in the mobile equipment.
• Bearer independent protocol: enables SIM to establish a
data connection between SIM and mobile equipment and
between mobile equipment and a remote server.
SMS & SIM
• 3 primary drawbacks with downloaded
applications are:
– Occupy precious space in the EEPROM of the SIM
– Hard to manage. Network operator has to check that
they are clean, process of downloading onto SIM has
to be airtight
– Human interface. No matter whose application it is,
the subscriber can’t figure out how to use it will call
their network operator implying call training & call
centre expenses
SMS & SIM
• In 1998, Across Wireless (now Sonera
SmartTrust) came up with a solution to
these problems that still harnessed the full
capability of the SIM.
• They installed a microbrowser on the SIM
that could interpret downloaded mark-up
language pages.
SMS & SIM
With microbrowser:
• Downloaded pages were thrown away after they were
interpreted so that they didn’t burn up EEPROM space.
• Mark-up languages were much simpler than procedural
languages so they could be checked automatically for
deviant behaviour.
• Publication of a style manual and quick manual checks
when the application was certified could standardize and
homogenize the human interface and minimize number
of calls to customer service.
SMS & SIM
Figure: Inward and outward
APIs for SIM applications.
SMS & SIM
• The SIM microbrowser is a byte-code
interpreter that allows the SIM to:
– download, display, interact with the
subscriber,
– and communicate with your application with a
Web-based set of instructions
– and then throw away the instructions once the
interaction has been completed.
SMS & SIM
• This “fire-and-forget” model of user interaction
fits very well with constraints and capabilities of
the SIM.
• As a result, many network operators favour SIM
microbrowser as a more lightweight and easily
controlled way to get value-added applications to
their customers than the more difficult &
administratively expensive executable program
model.
SMS & SIM
• The second, less widely used, model of
computation is where you install your application
code directly on the SIM just as you might install
a new program on your PC.
• Building an executable program for the SIM is
much more complex than simply sending pages
to a program already installed on the SIM, as
with the microbrowser.
SMS & SIM
• Whether you are building a microbrowser
application or an executable program
application, your code is written against an
API inside that SIM.
• This interface is described by ETSI TS
102.223 — Smart cards; card application
toolkit
SMS & SIM
• As shown in the figure, a SIM application has to
deal with two APIs.
• The inward-looking one provides a standard,
small, OS services to the application such as file
reading and writing and computational functions.
• The outward-looking one connects the SIM
application to the human interface capabilities of
the handset and to the network.
SMS & SIM
• Two types of information flow between your SIM
application and the outside world.
• Only difference is who initiates the conversation.
• If SIM initiates the conversation, flow is called a
“proactive command”; your application is asking the
handset to do something.
• If handset initiates the conversation, flow is called an
“event download”; the handset is the application that
made something happen
SMS & SIM
• As of late 2001, there are 31 proactive
commands on the SAT API.
• These include: DISPLAY TEXT, GET
INKEY, GET INPUT, MORE TIME, PLAY
TONE, POLL INTERVAL, REFRESH, SET
UP MENU, RECEIVE DATA, SEND
DATA, SEND USSD, SET UP CALL, RUN
AT COMMAND
SMS & SIM
• As more SIMs capable of running virtual
machines such as Java come to market,
you can also develop applications that can
be downloaded over the air — as long as
the application is acceptable to the
wireless carrier.
SMS & SIM
• SMS = Short Message Service
• According to the GSM Association, “Each
short message is:
– up to 160 characters in length when Latin
alphabets are used,
– and 70 characters in length when non-Latin
alphabets such as Arabic and Chinese are
used.
SMS & SIM
• Short messages can be encoded using a
variety of alphabets:
– the default GSM 7-bit alphabet
– the 8-bit data alphabet
– 16-bit UTF-16 alphabet
•
SMS & SIM
• Characters in languages such as Arabic,
Chinese, Korean, Japanese or Cyrillic
alphabet languages must be encoded
using the 16-bit UTF-16 character
encoding
SMS & SIM
• Depending on which alphabet the
subscriber has configured in the handset,
this leads to the maximum individual Short
Message sizes of:
– 160 7-bit characters,
– 140 8-bit characters,
– or 70 16-bit characters (including spaces).
SMS & SIM
• An SMS message nearly always gets
through.
• If mobile phone isn’t on when you send a
message, the system holds it until the
phone is turned on and then delivers it.
• The system also can generate a return
receipt that tells you that the message has
been delivered.
SMS & SIM
• SMS messages are encrypted, so there is
no fear that your message will be
snatched out of the air and read.
• You can also add your own encryption to
an SMS message so that not even the
phone company can read what you are
sending.
SMS & SIM
Figure: Message flow from server to screen.
SMS & SIM
Figure: Message flow from
desktop PC to mobile handset.
SMS & SIM
• The SMS protocol stack is composed of
four layers:
– the application layer,
– the transfer layer,
– the relay layer
– the link layer.
SMS & SIM
• SMS-based applications are directly
based on the transfer layer.
• If you are willing to develop applications,
for which SMS is a building block, needs
to master the transfer layer.
SMS & SIM
Figure: SMS message headers.
SMS & SIM
• There are six kinds of messages that
flow in the SMS network at the transfer
layer
1. SMS-SUBMIT “submits” a message to the
SMSC, generally for forward transmission to
another mobile device
2. SMS-COMMAND goes to the SMSC and
tells it to do something
SMS & SIM
• Four of the six messages go from the
network to the mobile device.
• Of these, only one carries a message
from another mobile device:
• SMS-DELIVER delivers a message from
another mobile
SMS & SIM
• The other three messages are generated by the
network itself and tell the mobile what is going
on.
– SMS-SUBMIT-REPORT reports on the results of an
SMS-SUBMIT or an SMS-COMMAND
– SMS-DELIVER-REPORT reports on the success or
failure of the delivery of an SMS-DELIVER or SMS-
STATUS-REPORT message
– SMS-STATUS-REPORT reports on the results of an
SMS-COMMAND message
SMS & SIM
Figure: The six message types in
SMS message traffic.
SMS & SIM
Figure: Message transfer between two SMEs
SMS & SIM
Figure: Message transfer
SMS & SIM
• The sounds and pictures that accompany
SMS messages should not be confused
with ringtones, operator logos, wake-up
logos, group graphics and other such
features that personalize the handset.
SMS & SIM
• These features usually are delivered to and
installed on your phone using SMS
• But they are embedded in special SMS
messages that are handled by the handset
• These handset personalization sound and
graphic features also tend to be proprietary to
particular handsets and particular network
operators
SMS & SIM
• Many GSM operators offer direct
connections to the short message centers.
These can be dial-up, X.25, or Internet
connections.
• Many different protocols are used on
these connections, and the majority of
these are proprietary to the company that
sold the SMSC to the operator.
SMS & SIM
• Examples of these protocols are:
– SMSC Vendor SMSC Connection Protocol
– ADC NewNet SMCI (Short Message Client Interface)
– CMG UCP (Universal Computer Protocol)
– CMG EMI (External Machine Interface)
– Comverse ISMSC (Intelligent Short Message Service Center)
– Ericsson CAP II (Computer Access Protocol #2)
– Logica SMPP (Short Message Peer to Peer)
– Motorola CDMP (Cellular Digital Messaging Protocol)
– Nokia CIMD (Computer Interface to Message Distribution)
– SEMA OIS (Open Interface Specification)
– SEMA SMS2000
SMS & SIM
• Quite unlike SMS, which was not initially
envisioned to be a major source of income, the
SIM was developed explicitly to enable network
operators to create new revenue streams.
• However, unlike SMS, it has taken a long time to
generate widespread availability of SIM based
applications.
• Nonetheless, all of the necessary building blocks
are in place.
SMS & SIM
Consumer Applications based on SMS:
– Person-to-person Messaging
– Information Services
– Voice Message and Fax Notifications
– Internet Email Alerts
– Download Services
– Chat Applications
– Smart Messaging
SMS & SIM
Corporate Applications based on SMS:
– Vehicle Positioning
– Remote Monitoring
SMS & SIM
Operator Applications Based on SMS
– SIM Lock
– SIM Updates
– Message Waiting Indicator
– WAP Push
MMS
• MMS allows the exchange of multimedia
messages in the context of person-to
person and machine-to-person scenarios.
• This includes the possibility of composing
multimedia messages as ‘slideshow’
presentations (i.e. combination of text,
audio and pictures, all choreographed
over time).
MMS
• With MMS, a subscriber is able to
compose a message and send it to
Internet mail recipients.
• In addition, the MMS subscriber can
retrieve message originating from Internet
users.
MMS
• The setting of the Multimedia Messaging
Service is more complex than SMS and
the definition of MMS
• Has required a tremendous workload from
several standardization development
organizations.
MMS
MMS
• In an MMS environment, network elements
communicate via a set of interfaces.
• Each interface supports a number of operations such as
message submission, message retrieval, message
forwarding.
• Several interfaces have been standardized in order to
ensure interoperability between devices produced by
various manufacturers.
• Other interfaces have not been standardized and are
therefore the subject of proprietary implementations.
MMS
In comparison with SMS and EMS, MMS has the following
advantages:
• Multimedia messages can contain a wide range of
content formats such as colour images/animations,
video, etc. Additionally, messages can be organized as
compact multimedia slideshows.
• Interoperability between MMS and the Email service has
been significantly improved.
• MMS is well integrated with innovative devices/services
such as camera accessories, remote photo albums.
• MMS is a future-proof technology and will be the subject
of many evolutions in the near future.
MMS
It has the following drawbacks:
• MMS is a very recent service and MMS-capable
devices (handsets and MMSCs) are not yet
widely available. This prevents global
introduction of MMS for all market segments.
• Unlike EMS, MMS requires several network
infrastructure extensions in order to operate
properly (e.g. MMSC, additional WAP gateway).

Weitere ähnliche Inhalte

Was ist angesagt?

CDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesCDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
Shameer KC
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMS
seanraz
 
Mobile communication cdr
Mobile communication cdrMobile communication cdr
Mobile communication cdr
Vivek Paripudi
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
vish0110
 

Was ist angesagt? (20)

SMS & MMS Technologies
SMS & MMS TechnologiesSMS & MMS Technologies
SMS & MMS Technologies
 
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesCDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
 
Ch6
Ch6Ch6
Ch6
 
Sms &mms
Sms &mmsSms &mms
Sms &mms
 
ALLAH WASAYA short_message_service
ALLAH WASAYA short_message_serviceALLAH WASAYA short_message_service
ALLAH WASAYA short_message_service
 
10 slides sms
10 slides sms10 slides sms
10 slides sms
 
SMPP
SMPPSMPP
SMPP
 
Sms
Sms Sms
Sms
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMS
 
Building SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPPBuilding SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPP
 
Mobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael HanleyMobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael Hanley
 
Squire Technologies: Short Message Service Centre
Squire Technologies: Short Message Service CentreSquire Technologies: Short Message Service Centre
Squire Technologies: Short Message Service Centre
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Mobile communication cdr
Mobile communication cdrMobile communication cdr
Mobile communication cdr
 
Sms, Mms & Short Codes
Sms, Mms & Short CodesSms, Mms & Short Codes
Sms, Mms & Short Codes
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
GSM Rating Overview
GSM Rating OverviewGSM Rating Overview
GSM Rating Overview
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Gsm
GsmGsm
Gsm
 

Andere mochten auch

MMS Introduction
MMS IntroductionMMS Introduction
MMS Introduction
mamahow
 
Teenagers’ short message service (sms)
Teenagers’ short message service (sms)Teenagers’ short message service (sms)
Teenagers’ short message service (sms)
juniato
 
CV_-_Dr._Bharat_Mody-_May_2016
CV_-_Dr._Bharat_Mody-_May_2016CV_-_Dr._Bharat_Mody-_May_2016
CV_-_Dr._Bharat_Mody-_May_2016
Dr. Bharat Mody
 
Ukrainian domain-rankings
Ukrainian domain-rankingsUkrainian domain-rankings
Ukrainian domain-rankings
Watcher
 
Una revisión sobre las concepciones alternativas de los estudiantes en relaci...
Una revisión sobre las concepciones alternativas de los estudiantes en relaci...Una revisión sobre las concepciones alternativas de los estudiantes en relaci...
Una revisión sobre las concepciones alternativas de los estudiantes en relaci...
angelo26_
 

Andere mochten auch (17)

MMS Introduction
MMS IntroductionMMS Introduction
MMS Introduction
 
Short Message
Short MessageShort Message
Short Message
 
Teenagers’ short message service (sms)
Teenagers’ short message service (sms)Teenagers’ short message service (sms)
Teenagers’ short message service (sms)
 
Instant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenuesInstant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenues
 
Text Messaging
Text MessagingText Messaging
Text Messaging
 
CH Hareesh kumar
CH Hareesh kumarCH Hareesh kumar
CH Hareesh kumar
 
Vocales
Vocales Vocales
Vocales
 
CV_-_Dr._Bharat_Mody-_May_2016
CV_-_Dr._Bharat_Mody-_May_2016CV_-_Dr._Bharat_Mody-_May_2016
CV_-_Dr._Bharat_Mody-_May_2016
 
Optional Webinar LIST 5373 April 26 2016
Optional Webinar LIST 5373 April 26 2016Optional Webinar LIST 5373 April 26 2016
Optional Webinar LIST 5373 April 26 2016
 
Ukrainian domain-rankings
Ukrainian domain-rankingsUkrainian domain-rankings
Ukrainian domain-rankings
 
Proyecto tecnologico
Proyecto tecnologicoProyecto tecnologico
Proyecto tecnologico
 
Una revisión sobre las concepciones alternativas de los estudiantes en relaci...
Una revisión sobre las concepciones alternativas de los estudiantes en relaci...Una revisión sobre las concepciones alternativas de los estudiantes en relaci...
Una revisión sobre las concepciones alternativas de los estudiantes en relaci...
 
Social Media Trends in Higher Education
Social Media Trends in Higher EducationSocial Media Trends in Higher Education
Social Media Trends in Higher Education
 
Voleibol
VoleibolVoleibol
Voleibol
 
StaciaNY
StaciaNYStaciaNY
StaciaNY
 
CDE Marketplace: TTP
CDE Marketplace: TTPCDE Marketplace: TTP
CDE Marketplace: TTP
 
Jak zarabiać na profesjonalnym blogowaniu? - Gniewomir Świechowski, BloMedia
Jak zarabiać na profesjonalnym blogowaniu? - Gniewomir Świechowski, BloMediaJak zarabiać na profesjonalnym blogowaniu? - Gniewomir Świechowski, BloMedia
Jak zarabiać na profesjonalnym blogowaniu? - Gniewomir Świechowski, BloMedia
 

Ähnlich wie Introduction to SMS, MMS, Modems & Gateways

Roamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRoamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay Overview
Robert Bent
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
ardhita banu adji
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
servicesmobiles.fr
 

Ähnlich wie Introduction to SMS, MMS, Modems & Gateways (20)

Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
e-Sim Sharing (extract)
e-Sim Sharing (extract)e-Sim Sharing (extract)
e-Sim Sharing (extract)
 
Project gsm
Project gsmProject gsm
Project gsm
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
Seminar
SeminarSeminar
Seminar
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
 
M2M Day Two
M2M Day TwoM2M Day Two
M2M Day Two
 
eSIM Deep Dive
eSIM Deep DiveeSIM Deep Dive
eSIM Deep Dive
 
Dazzzling Diamond_Round 1_Checkmate.pptx
Dazzzling Diamond_Round 1_Checkmate.pptxDazzzling Diamond_Round 1_Checkmate.pptx
Dazzzling Diamond_Round 1_Checkmate.pptx
 
E banking
E   bankingE   banking
E banking
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Roamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRoamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay Overview
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
Report on gsm vodafone
Report on gsm vodafoneReport on gsm vodafone
Report on gsm vodafone
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
 
GSM
GSM GSM
GSM
 
Report demo(1)
Report demo(1)Report demo(1)
Report demo(1)
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 

Mehr von tawi123

Mehr von tawi123 (20)

Tax Compliance Certificate, May 2016 - May 2017
Tax Compliance Certificate, May 2016 -  May 2017Tax Compliance Certificate, May 2016 -  May 2017
Tax Compliance Certificate, May 2016 - May 2017
 
XHTML and CSS
XHTML and CSSXHTML and CSS
XHTML and CSS
 
Survey of WML
Survey of  WMLSurvey of  WML
Survey of WML
 
Server Side Technologies
Server Side TechnologiesServer Side Technologies
Server Side Technologies
 
Software Tools Overview
Software Tools OverviewSoftware Tools Overview
Software Tools Overview
 
Overview of Java
Overview of JavaOverview of Java
Overview of Java
 
Mobile Internet Standards
Mobile Internet StandardsMobile Internet Standards
Mobile Internet Standards
 
Mobile Internet Best Practices
Mobile Internet Best PracticesMobile Internet Best Practices
Mobile Internet Best Practices
 
Introduction to Mobile Internet
Introduction to Mobile InternetIntroduction to Mobile Internet
Introduction to Mobile Internet
 
Mobile Website Development
Mobile Website DevelopmentMobile Website Development
Mobile Website Development
 
Brief on Device Awareness and Content Adaptation
Brief on Device Awareness and Content AdaptationBrief on Device Awareness and Content Adaptation
Brief on Device Awareness and Content Adaptation
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
 
Workstation Exercises
Workstation ExercisesWorkstation Exercises
Workstation Exercises
 
Work Injury Benefits Act 2007
Work Injury Benefits Act 2007Work Injury Benefits Act 2007
Work Injury Benefits Act 2007
 
The Kenya Information and Communications Consumer Protection Regulations 2010
The Kenya Information and Communications Consumer Protection Regulations 2010The Kenya Information and Communications Consumer Protection Regulations 2010
The Kenya Information and Communications Consumer Protection Regulations 2010
 
Tax KRA Compliance Certificate
Tax KRA Compliance CertificateTax KRA Compliance Certificate
Tax KRA Compliance Certificate
 
Tawi Staff Handbook 2015
Tawi Staff Handbook 2015Tawi Staff Handbook 2015
Tawi Staff Handbook 2015
 
Tawi SMS-USSD Customer Agreement
Tawi SMS-USSD Customer AgreementTawi SMS-USSD Customer Agreement
Tawi SMS-USSD Customer Agreement
 
Tawi SMS Application Form - SMS Short Code
Tawi SMS Application Form - SMS Short CodeTawi SMS Application Form - SMS Short Code
Tawi SMS Application Form - SMS Short Code
 
Tawi Product Overview
Tawi Product OverviewTawi Product Overview
Tawi Product Overview
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Introduction to SMS, MMS, Modems & Gateways

  • 1. Introduction to SMS, MMS, Modems & Gateways By Michael Wakahe, June 2010
  • 2. SMS & SIM • Development of international SMS and SIM standards and interoperable application platforms for SIM and SMS Toolkit and Interpreter have been standardized for SIM and USIM by ETSI & 3GPP. • They are solution based standards.
  • 3. SMS & SIM • SIM means “Subscriber Identity Module” • Its original purpose (and continuing role) was to identify a particular mobile user to the network in a secure and consistent manner. • To accomplish this, the SIM stores a private digital key that is unique to each subscriber and known only to the wireless carrier. • The key is used to encrypt the traffic to and from the handset.
  • 4. SMS & SIM • The SIM is a smart chip that was designed as a secure, tamper-resistant environment for the cryptographic keys that GSM carriers use to: – authenticate individual subscribers to the network connection and – track those subscribers’ activities once they are on the air
  • 5. SMS & SIM • The SIM is owned and controlled by network operator. • It sports an API and can host multiple applications. • A SIM is a just a smart card that happens to have a mobile phone as its reader.
  • 6. SMS & SIM • From its first use in a GSM phone until very recently, a SIM was an 8-bit microcontroller, usually an Intel 8051 or a Motorola 6805. • The amount of memory in the SIM has grown. Initially containing only 256 bytes of RAM and 3 kilobytes of EEPROM, it has grown to 1,024 bytes of RAM and 32 kilobytes of EEPROM (2002)
  • 7. SMS & SIM • All the software for the SIM - the operating system and the code that handles the file system and the APDUs - is burned into 32 to 64 kilobytes of ROM. • The 80 odd data files are kept in the EEPROM, and the RAM is used as an I/O buffer for communication with the handset.
  • 8. SMS & SIM • This is about all that is needed for the SIM to perform its cryptographic duties • Also provide some relatively trivial telephony services such as storing a phone book of frequently dialled numbers.
  • 9. SMS & SIM • Beginning in mid-1990s, as new applications started to find their way onto the mobile telephone, SIM started to morph into a full fledged application platform. • This put all kinds of evolutionary pressure on the SIM operating software and the SIM hardware.
  • 10. SMS & SIM • The software started to sprout virtual machines, principally the Java virtual machine, to host non telephony applications, • The hardware started to grow additional memory and computational abilities. • Roughly speaking, there have been three generations of SIMs.
  • 11. SMS & SIM Generation Name Characteristic 1 Purpose-built SIM SIM performs network authentication and universal telephony services such as phone book and SMS message storage 2 SIM with applications Additional customer-specific services can be added as SIM Toolkit (STK) applications after the SIM is in the field 3 SIM as an application SIM is one of the multiple telephony applications, specifically the authentication application, on the platform
  • 12. SMS & SIM • SIM maintains a constant connection to the network as long as the mobile device remains on. • The only way to ensure that the SIM can accomplish its handoff of subscribers from one network to another without interrupting communication is to base all of its functions on very detailed international standards.
  • 13. SMS & SIM • Every GSM equipment manufacturer and carrier adheres to these standards, which cover everything including: – physical size – characteristics of the chip – the way it handles and stores incoming information.
  • 14. SMS & SIM • Because smart cards were designed to be extremely difficult to crack under a variety of attacks, the smart card’s core electronics and design architecture were adopted as the base of the SIM. • Building applications for the SIM has a lot in common with designing smart card applications
  • 15. SMS & SIM • Typically there is a testing and certification process required for any application that is not developed directly by the network providers or SIM vendors.
  • 16. SMS & SIM The SIM Application Toolkit (SAT), defined in [3GPP- 31.111], defines mechanisms for allowing SIM-hosted applications to interact with the mobile equipment. This includes: • Profile download: this mechanism allows the mobile equipment to inform the SIM about its capabilities. • Proactive SIM: a proactive SIM can issue commands to the mobile equipment. • Data download to SIM
  • 17. SMS & SIM • Menu selection: this mechanism allows the (U)SIM to define menu items and to be notified by the mobile equipment when the subscriber has selected one of the menu items. • Call control by SIM: here the SIM performs a control prior to the establishment of calls by the mobile equipment. This allows the SIM to authorize or reject the call establishment or to modify the parameters of the call to be established. • Control of outgoing messages by SIM: with this mechanism, the SIM performs a control prior to the sending of messages by the mobile equipment. This allows the SIM to authorize or reject the sending of a message.
  • 18. SMS & SIM • Event download: allows the SIM to provide a set of events to be monitored by the mobile equipment. If an event occurs then the mobile equipment notifies the SIM. • Security: this mechanism ensures data confidentiality, data integrity and data sender validation. • Timer expiration: the SIM can manage a set of timers running physically in the mobile equipment. • Bearer independent protocol: enables SIM to establish a data connection between SIM and mobile equipment and between mobile equipment and a remote server.
  • 19. SMS & SIM • 3 primary drawbacks with downloaded applications are: – Occupy precious space in the EEPROM of the SIM – Hard to manage. Network operator has to check that they are clean, process of downloading onto SIM has to be airtight – Human interface. No matter whose application it is, the subscriber can’t figure out how to use it will call their network operator implying call training & call centre expenses
  • 20. SMS & SIM • In 1998, Across Wireless (now Sonera SmartTrust) came up with a solution to these problems that still harnessed the full capability of the SIM. • They installed a microbrowser on the SIM that could interpret downloaded mark-up language pages.
  • 21. SMS & SIM With microbrowser: • Downloaded pages were thrown away after they were interpreted so that they didn’t burn up EEPROM space. • Mark-up languages were much simpler than procedural languages so they could be checked automatically for deviant behaviour. • Publication of a style manual and quick manual checks when the application was certified could standardize and homogenize the human interface and minimize number of calls to customer service.
  • 22. SMS & SIM Figure: Inward and outward APIs for SIM applications.
  • 23. SMS & SIM • The SIM microbrowser is a byte-code interpreter that allows the SIM to: – download, display, interact with the subscriber, – and communicate with your application with a Web-based set of instructions – and then throw away the instructions once the interaction has been completed.
  • 24. SMS & SIM • This “fire-and-forget” model of user interaction fits very well with constraints and capabilities of the SIM. • As a result, many network operators favour SIM microbrowser as a more lightweight and easily controlled way to get value-added applications to their customers than the more difficult & administratively expensive executable program model.
  • 25. SMS & SIM • The second, less widely used, model of computation is where you install your application code directly on the SIM just as you might install a new program on your PC. • Building an executable program for the SIM is much more complex than simply sending pages to a program already installed on the SIM, as with the microbrowser.
  • 26. SMS & SIM • Whether you are building a microbrowser application or an executable program application, your code is written against an API inside that SIM. • This interface is described by ETSI TS 102.223 — Smart cards; card application toolkit
  • 27. SMS & SIM • As shown in the figure, a SIM application has to deal with two APIs. • The inward-looking one provides a standard, small, OS services to the application such as file reading and writing and computational functions. • The outward-looking one connects the SIM application to the human interface capabilities of the handset and to the network.
  • 28. SMS & SIM • Two types of information flow between your SIM application and the outside world. • Only difference is who initiates the conversation. • If SIM initiates the conversation, flow is called a “proactive command”; your application is asking the handset to do something. • If handset initiates the conversation, flow is called an “event download”; the handset is the application that made something happen
  • 29. SMS & SIM • As of late 2001, there are 31 proactive commands on the SAT API. • These include: DISPLAY TEXT, GET INKEY, GET INPUT, MORE TIME, PLAY TONE, POLL INTERVAL, REFRESH, SET UP MENU, RECEIVE DATA, SEND DATA, SEND USSD, SET UP CALL, RUN AT COMMAND
  • 30. SMS & SIM • As more SIMs capable of running virtual machines such as Java come to market, you can also develop applications that can be downloaded over the air — as long as the application is acceptable to the wireless carrier.
  • 31. SMS & SIM • SMS = Short Message Service • According to the GSM Association, “Each short message is: – up to 160 characters in length when Latin alphabets are used, – and 70 characters in length when non-Latin alphabets such as Arabic and Chinese are used.
  • 32. SMS & SIM • Short messages can be encoded using a variety of alphabets: – the default GSM 7-bit alphabet – the 8-bit data alphabet – 16-bit UTF-16 alphabet •
  • 33. SMS & SIM • Characters in languages such as Arabic, Chinese, Korean, Japanese or Cyrillic alphabet languages must be encoded using the 16-bit UTF-16 character encoding
  • 34. SMS & SIM • Depending on which alphabet the subscriber has configured in the handset, this leads to the maximum individual Short Message sizes of: – 160 7-bit characters, – 140 8-bit characters, – or 70 16-bit characters (including spaces).
  • 35. SMS & SIM • An SMS message nearly always gets through. • If mobile phone isn’t on when you send a message, the system holds it until the phone is turned on and then delivers it. • The system also can generate a return receipt that tells you that the message has been delivered.
  • 36. SMS & SIM • SMS messages are encrypted, so there is no fear that your message will be snatched out of the air and read. • You can also add your own encryption to an SMS message so that not even the phone company can read what you are sending.
  • 37. SMS & SIM Figure: Message flow from server to screen.
  • 38. SMS & SIM Figure: Message flow from desktop PC to mobile handset.
  • 39. SMS & SIM • The SMS protocol stack is composed of four layers: – the application layer, – the transfer layer, – the relay layer – the link layer.
  • 40. SMS & SIM • SMS-based applications are directly based on the transfer layer. • If you are willing to develop applications, for which SMS is a building block, needs to master the transfer layer.
  • 41. SMS & SIM Figure: SMS message headers.
  • 42. SMS & SIM • There are six kinds of messages that flow in the SMS network at the transfer layer 1. SMS-SUBMIT “submits” a message to the SMSC, generally for forward transmission to another mobile device 2. SMS-COMMAND goes to the SMSC and tells it to do something
  • 43. SMS & SIM • Four of the six messages go from the network to the mobile device. • Of these, only one carries a message from another mobile device: • SMS-DELIVER delivers a message from another mobile
  • 44. SMS & SIM • The other three messages are generated by the network itself and tell the mobile what is going on. – SMS-SUBMIT-REPORT reports on the results of an SMS-SUBMIT or an SMS-COMMAND – SMS-DELIVER-REPORT reports on the success or failure of the delivery of an SMS-DELIVER or SMS- STATUS-REPORT message – SMS-STATUS-REPORT reports on the results of an SMS-COMMAND message
  • 45. SMS & SIM Figure: The six message types in SMS message traffic.
  • 46. SMS & SIM Figure: Message transfer between two SMEs
  • 47. SMS & SIM Figure: Message transfer
  • 48. SMS & SIM • The sounds and pictures that accompany SMS messages should not be confused with ringtones, operator logos, wake-up logos, group graphics and other such features that personalize the handset.
  • 49. SMS & SIM • These features usually are delivered to and installed on your phone using SMS • But they are embedded in special SMS messages that are handled by the handset • These handset personalization sound and graphic features also tend to be proprietary to particular handsets and particular network operators
  • 50. SMS & SIM • Many GSM operators offer direct connections to the short message centers. These can be dial-up, X.25, or Internet connections. • Many different protocols are used on these connections, and the majority of these are proprietary to the company that sold the SMSC to the operator.
  • 51. SMS & SIM • Examples of these protocols are: – SMSC Vendor SMSC Connection Protocol – ADC NewNet SMCI (Short Message Client Interface) – CMG UCP (Universal Computer Protocol) – CMG EMI (External Machine Interface) – Comverse ISMSC (Intelligent Short Message Service Center) – Ericsson CAP II (Computer Access Protocol #2) – Logica SMPP (Short Message Peer to Peer) – Motorola CDMP (Cellular Digital Messaging Protocol) – Nokia CIMD (Computer Interface to Message Distribution) – SEMA OIS (Open Interface Specification) – SEMA SMS2000
  • 52. SMS & SIM • Quite unlike SMS, which was not initially envisioned to be a major source of income, the SIM was developed explicitly to enable network operators to create new revenue streams. • However, unlike SMS, it has taken a long time to generate widespread availability of SIM based applications. • Nonetheless, all of the necessary building blocks are in place.
  • 53. SMS & SIM Consumer Applications based on SMS: – Person-to-person Messaging – Information Services – Voice Message and Fax Notifications – Internet Email Alerts – Download Services – Chat Applications – Smart Messaging
  • 54. SMS & SIM Corporate Applications based on SMS: – Vehicle Positioning – Remote Monitoring
  • 55. SMS & SIM Operator Applications Based on SMS – SIM Lock – SIM Updates – Message Waiting Indicator – WAP Push
  • 56. MMS • MMS allows the exchange of multimedia messages in the context of person-to person and machine-to-person scenarios. • This includes the possibility of composing multimedia messages as ‘slideshow’ presentations (i.e. combination of text, audio and pictures, all choreographed over time).
  • 57. MMS • With MMS, a subscriber is able to compose a message and send it to Internet mail recipients. • In addition, the MMS subscriber can retrieve message originating from Internet users.
  • 58. MMS • The setting of the Multimedia Messaging Service is more complex than SMS and the definition of MMS • Has required a tremendous workload from several standardization development organizations.
  • 59. MMS
  • 60. MMS • In an MMS environment, network elements communicate via a set of interfaces. • Each interface supports a number of operations such as message submission, message retrieval, message forwarding. • Several interfaces have been standardized in order to ensure interoperability between devices produced by various manufacturers. • Other interfaces have not been standardized and are therefore the subject of proprietary implementations.
  • 61. MMS In comparison with SMS and EMS, MMS has the following advantages: • Multimedia messages can contain a wide range of content formats such as colour images/animations, video, etc. Additionally, messages can be organized as compact multimedia slideshows. • Interoperability between MMS and the Email service has been significantly improved. • MMS is well integrated with innovative devices/services such as camera accessories, remote photo albums. • MMS is a future-proof technology and will be the subject of many evolutions in the near future.
  • 62. MMS It has the following drawbacks: • MMS is a very recent service and MMS-capable devices (handsets and MMSCs) are not yet widely available. This prevents global introduction of MMS for all market segments. • Unlike EMS, MMS requires several network infrastructure extensions in order to operate properly (e.g. MMSC, additional WAP gateway).