Framework for IP Multimedia Subsystem (IMS)

Total Page:16

File Type:pdf, Size:1020Kb

Framework for IP Multimedia Subsystem (IMS) Secure Service Provisioning (SSP) Framework for IP Multimedia Subsystem (IMS) M.Sc. Muhammad Sher von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften – Dr.-Ing. – genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof Dr.-Ing. Thomas Sikora Gutachter: Prof Dr.-Ing. Thomas Magedanz Gutachter: Prof Dr.-Ing. Klaus David Tag der wissenschaftlichen Aussprache: 14.12.2007 Berlin 2007 D 83 SSP Framework for IMS Management Summary Zusammenfassung Mit dem Erscheinen mobiler Multimediadienste, wie z. B. Unified Messaging, Click-to-Dial- Applikationen, netzwerkübergeifende Multimedia-Konferenzen und nahtlose Multimedia-Streming- Dienste, begann die Konvergenz von mobilen Kommunikationsetzen und Festnetzen, begleitet von der Integration von Sprach- und Datenkommunikations-Übertragungstechnik Diese Entwicklungen bilden die Voraussetzung für die Verschmelzung des modernen Internet auf der einen Seite mit der Telekommunikation im klassischen Sinne auf der anderen. Das IP Multimedia-Subsystem (IMS) darf hierbei als die entscheidende Next-Generation-Service-Delivery-Plattform in einer vereinheitlichten Kommunikationswelt angesehen werden. Seine Architektur basiert auf einem modularen Design mit offenen Schnittstellen und bietet dedizierte Voraussetzungen zur Unterstützung von Multimedia- Diensten auf der Grundlage der Internet-Protokolle. Einhergehend mit dieser aufkommenden offenen Technologie stellen sich neue Sicherheits-Herausforderungen in einer vielschichtigen Kommunikationsinfrastruktur, im Wesentlichen bestehend aus dem Internet Protokoll (IP), dem SIP- Protokoll (Session Initiation Protocol) und dem Real-time Transport Protokoll (RTP). Die Zielsetzung des Secure Service Provisioning -Systems (SSP) ist, mögliche Angriffsszenarien und Sicherheitslücken in Verbindung mit dem IP Multimedia Subsystem zu erforschen und Sicherheitslösungen, wie sie von IETF, 3GPP und TISPAN vorgeschlagen werden, zu evaluieren. Im Rahmen dieser Forschungsarbeit werden die Lösungen als Teil des SSP-Systems berücksichtigt, mit dem Ziel, dem IMS und der Next-Generation-SDP einen hinreichenden Schutz zu garantieren. Dieser Teil, der als Sicherheitsschutzstufe 1 bezeichnet wird, beinhaltet unter anderem Maßnahmen zur Nutzer- und Netzwerk-Authentifizierung, die Autorisierung der Nutzung von Multimediadiensten und Vorkehrungen zur Gewährleistung der Geheimhaltung und Integrität von Daten im Zusammenhang mit dem Schutz vor Lauschangriffen, Session-Hijacking- und Man-in-the-Middle-Angriffen. Im nächsten Schritt werden die Beschränkungen untersucht, die für die Sicherheitsschutzstufe 1 charakteristisch sind und Maßnahmen zu Verbesserung des Sicherheitsschutzes entwickelt. Die entsprechenden Erweiterungen der Sicherheitsschutzstufe 1 führen zu einem Intrusion Detection and Prevention - System (IDP), das Schutz vor Denial-of-Service- (DoS) / Distributed-Denial-of-Service (DDoS)- Angriffen, missbräuchlicher Nutzung und Täuschungsversuchen in IMS-basierten Netzwerken bietet. Weder 3GPP noch TISPAN haben bisher Lösungen für diesen Bereich spezifiziert. In diesem Zusammenhang können die beschriebenen Forschungs- und Entwicklungsarbeiten einen Beitrag zur Standardisierung von Lösungen zum Schutz vor DoS- und DDoS-Angriffen in IMS-Netzwerken leisten. Der hier beschriebene Ansatz basiert auf der Entwicklung eines (stateful / stateless) Systems zur Erkennung und Verhinderung von Einbruchsversuchen (Intrusion Detection and Prevention System). Aus Entwicklungssicht wurde das IDP in zwei Module aufgeteilt: Das erste Modul beinhaltet die Basisfunktionen des IDP, die sich auf Flooding-Angriffe auf das IMS und ihre Kompensation richten. Ihr Ziel ist es, das IMS-Core-Netzwerk und die IMS-Ressourcen vor DoS- und DDoS-Angriffen zu schützen. Das entsprechende Modul basiert auf einer Online Stateless-Detection-Methodologie und wird aktiv, sobald die CPU-Auslastung der P-CSCF (Proxy-Call State Control Function) einen vordefinierten Grenzwert erreicht oder überschreitet. Das zweite Modul (IDP-AS) hat die Aufgabe, Angriffe, die sich gegen IMS Application Server (AS) richten abzufangen. Hierbei konzentrieren sich die Maßnahmen auf den Schutz des ISC-Interfaces zwischen IMS Core und Application Servern. Das betreffende Modul realisiert eine Stateful Detection Methodologie zur Erkennung missbräuchlicher Nutzungsaktivitäten. Während der Nutzer mit dem Application Server kommuniziert, werden dabei nutzerspezifische Zustandsdaten aufgezeichnet, die zur Prüfung der Legitimität herangezogen werden. Das IDP-AS prüft alle eingehenden Requests und alle abgehenden Responses, die von IMS Application Servern stammen oder die an IMS Application Server gerichtet sind, auf ihre Zulässigkeit im Hinblick auf die definierten Attack Rules. Mit Hilfe der Kriterien Fehlerfreiheit und Processing Delay bei der Identifikation potenzieller Angriffe wird die Leistungsfähigkeit der IDP-Module bewertet. Für die entsprechenden Referenzwerte werden hierbei die Zustände Nomallast und Überlast verglichen. Falls die Leistungsfähigkeit des IDP nicht unter den Erwartungen zurückbleibt, wird ein IDP-Prototyp zur Evaluation im Open IMS Playground des Fokus Fraunhofer 3Gb-Testbeds eingesetzt, um unter realen Einsatzbedingungen z. B. in VoIP-, Videokonferenz- , IPTV-, Presence- und Push-to-Talk-Szenarien getestet werden zu können. iii SSP Framework for IMS Abstract Abstract With the emergence of mobile multimedia services, such as unified messaging, click to dial, cross network multiparty conferencing and seamless multimedia streaming services, the fixed–mobile convergence and voice–data integration has started, leading to an overall Internet–Telecommunications merger. The IP Multimedia Subsystem (IMS) is considered as the next generation service delivery platform in the converged communication world. It consists of modular design with open interfaces and enables the flexibility for providing multimedia services over IP technology. In parallel this open based emerging technology has security challenges from multiple communication platforms and protocols like IP, Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP). The objective of Secure Service Provisioning (SSP) Framework is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and to explore security solutions developed by IETF, 3GPP and TISPAN. This research work incorporates these solutions into SSP Framework to secure IMS and next generation Service Delivery Platform (SDP). We define this part as level 1 security protection which includes user and network authentication, authorization to access multimedia services, providing confidentiality and integrity protection etc. against eavesdropping, session hijacking and man-in-the middle attacks etc. In the next step, we have investigated the limitations and improvements to level 1 security and proposed the enhancement and extension as level 2 security by developing Intrusion Detection and Prevention (IDP) system against Denial-of-Service (DoS)/Distributed DoS (DDoS) flooding attacks, misuses and frauds in IMS-based networks. These security threats recently have been identified by 3GPP and TISPAN but no solution is recommended and developed. Therefore our solution may be considered as recommendation in future. Our approach based on developing both stateless and stateful intrusion detection and prevention system. From development point of view, we have divided the work into two modules: the first module is IDP-Core; addressing and mitigating the flooding attacks in IMS core. Its objective is to protect the IMS resources and IMS-core entities from DoS/DDoS flooding attacks. This module based on online stateless detection methodology and activates when CPU processing load of P-CSCF (Proxy-Call State Control Function) reaches or crosses the defined threshold limit. The second module is IDP-AS; addressing and mitigating the misuse attacks facing to IMS Application Servers (AS). Its focus is to secure the ISC interface between IMS Core and Application Servers. This module is based on stateful misuse detection methodology by creating and comparing user state (partner) when he/she is communicating with application server to check whether user is performing legitimate or illegitimate action with attacks rules. The IDP-AS also compared the incoming request and outgoing response to and from IMS Application Servers with the defined attacks rules. In the performance analysis, the processing delay and attacks detection accuracy of both Intrusion Detection and Prevention (IDP) modules have been measured at Fraunhofer FOKUS IMS Testbed which is developed for research purpose. The performance evaluation based on normal and overload conditions scenarios. The results showed that the processing delay introduced by both IDP modules satisfied the standard requirements and did not cause retransmission of SIP REGISTER and INVITE requests. The developed prototype is under testing phase at Fraunhofer FOKUS 3Gb Testbed for evaluation in real world communication scenarios like VoIP, video conferencing, IPTV, presence, push-to-talk etc. Key Words: IP Multimedia Subsystem (IMS), Security Threats, Flooding Attacks, Denial-of- Service (DoS)/Distributed Denial-of-Service (DDoS), Fraud and Misuses of NGN Service, Authentication and Key Agreement (AKA), Confidentiality and Integrity, Inter-Domains Security, Intrusion Detection and Prevention (IDP) System. v SSP Framework for IMS Acknowledgement
Recommended publications
  • Implementing Intelligent Network Services with the Session Initiation Protocol
    Tech-Report Number CUCS-002-99 Implementing Intelligent Network Services with the Session Initiation Protocol Jonathan Lennox Henning Schulzrinne Thomas F. La Porta Department of Computer Science Department of Computer Science Bell Laboratories Columbia University Columbia University Lucent Technologies [email protected] [email protected] [email protected] Phone: (212) 939 7018 Phone: (212) 939 7042 Phone: (732) 949-2281 Abstract Internet telephony is receiving increasing interest as an alternative to traditional telephone networks. This article shows how the IETF’s Session Initiation Protocol (SIP) can be used to perform the services of traditional Intelligent Network protocols, as well as additional services. 0 Contents 1 Introduction 3 2Overview 3 2.1 Billing . ................................................. 4 3 Architecture of IPtel signaling 4 4 Capability Set 1: Service Features 4 4.1AbbreviatedDialing(ABD)........................................ 5 4.2 Attendant (ATT) . .......................................... 5 4.3Authentication(AUTC).......................................... 5 4.4Authorizationcode(AUTZ)....................................... 5 4.5Automaticcallback(ACB)........................................ 7 4.6Calldistribution(CD)........................................... 7 4.7Callforwarding(CF)........................................... 7 4.8 Call forwarding on busy/don’t answer (CFC) . ........................... 7 4.9Callgapping(GAP)............................................ 7 4.10 Call hold with announcement
    [Show full text]
  • The Evolution of Intelligent Networks to Mobile and Broadband
    WJ~ HEWLETT a:~ PACKARD The Evolution ofIntelligent Networks to Mobile and Broadband-Computers in the Network, Now and Tomorrow Ray Crispin, Martin Sadler HP Laboratories Bristol HPL-95-68 June, 1995 Current Intelligent Network solutions will undergo considerable evolution to support the mobile and broadband networks of tomorrow. The present generation of Service Control Points, Home Location Registers and Intelligent Peripherals will give way to generic IN computing platforms which are capable of supporting a wide range of services. Requirements will develop over time, suggesting the need for highly adaptable computing solutions. Three key properties are needed to enable this adaptability: scalability, programmability, and modularity. This paper outlines the argument that a distributed, component oriented, approach will emerge to meet the needs of the future. Internal Accession Date Only © Copyright Hewlett-Packard Company 1995 The Eyolution of Intelligent Networks to Mobile and Broadband - Computers in the Network. Now and Tomorrow I,CURRENT SITUATION 1.1 Digital Switching Computer control of the telecommunications network started with the introduction of stored program digital switches in the seventies. Creating these systems has been, and continues to be, a very substantial engineering undertaking, with typical switches having 10-30M lines of code. Needless to say this poses huge software engineering problems, particularly with configuration management and regression testing. It is interesting to note that much of the complexity arises from the need to manage the operation ofthe switches. Typical, 80-90% ofthe code is for management and only 10-20% to control the switching. Also, because of diverse world market conditions, there is the need to accommodate variations giving rise to the need for configuration.
    [Show full text]
  • Design and Implementation of an IP Multimedia Subsystem (IMS) Emulator Using Virtualization Techniques
    Design and Implementation of an IP Multimedia Subsystem (IMS) Emulator Using Virtualization Techniques F. Ga lán 1,2, E. García2, C. Chávarri2, M. Gómez3, D. Fernández2 1: Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) Av. Canal Olimpic, s/n - Castelldefels, Spain [email protected] 2: Departamento de Ingeniería de Sistemas Telemáticos (DIT) Universidad Politécnica de Madrid (UPM) Av. Complutense, s/n - Madrid, Spain {galan,egarcia,chavarri,david}@dit.upm.es 3: Agora Systems, S. A. Velázquez, 46 - Madrid, Spain [email protected] Abstract Multimedia service provisioning in Packet-Switched networks is one of the most active research and standardization efforts nowadays, and constitutes the most likely evolution of current telecommunication networks. In this environment, the 3GPP IP Multimedia Subsystem (IMS) represents the service provisioning platform of choice for SIP-based content delivery in mobile and fixed environments. However, in spite of the advanced status of research and specification in this field, few IMS-based services have been defined or deployed, mainly due to the fact that production or experimental IMS platforms are scarcely available for service validation and testing. This paper addresses the design and implementation through virtualization techniques of an IMS testbed intended for the functional validation of services, presenting the involved technologies, the undertaken implementation strategy, and the experiences and tests carried out in the first stages of its development. Keywords IP Multimedia Subsystem, virtualization, VNUML, IMS, 3GPP 1. Introduction Given the current trend in telecommunications industry towards data packet switching (the so called all-IP approach), the IP Multimedia Subsystem (IMS) plays a key role as service provisioning platform in Next Generation Networks.
    [Show full text]
  • Nokia's in Solution for Fixed and Cellular Networks
    4 Nokia's IN solution for fixed and cellular networks Pekka Lehtinen Markus Warsta Nokia Telecommunications P.O. Box33 02601 Espoo, Finland 1. INTRODUCTION The development of Intelligent Networks (IN) was started by Bellcore in USA more than ten years ago in order to support the Regional Bell Operating Companies in the new deregulated telecommunications environment. The original goal was to enable the network operators to effectively introduce and manage new services by means of a centralized database in a Service Control Point (SCP). In the past years, several IN specifications have been developed, including IN 1, AIN Rel.O and AIN Rel.1. The Advanced Intelligent Network Release ·1 (AIN Rel.1) of Bellcore contains a service-independent standard interface for the queries sent from the Service Switching Points (SSPs) to the SCP. The International Telecommunications Union (ITU) has worked out its Intelligent Network Application Part (INAP) specifications for the SSP-SCP interface, the so-called Capability Set 1 (CS.1). The European Telecommunications Standards Institute (ETSI) has completed its corresponding ETSI CS.l Core specifications in 1993. It is expected that the CS.l recommendations will be adopted world-wide. This would offer open interfaces between the SSP and SCP resulting in vendor independence. Signalling System No.7 (SS7), fault-tolerant computing, on-line transaction processing, and today's database technology have enabled the development of efficient IN elements. This paper presents Nokia's IN solution. J. Harju et al. (eds.), Intelligent Networks © Springer Science+Business Media Dordrecht 1995 62 Intelligent Networks 2. FUNCTIONAL ARCHITECTURE OF INTELLIGENT NETWORKS The main e.lements of the IN architecture of the ITU and ETSI are: • Service Switching Point (SSP), • Service Control Point (SCP), • Service Management System (SMS), • Service Creation Environment (SCE), and • Intelligent Peripheral (IP).
    [Show full text]
  • EN 301 931-1 V1.1.2 (2001-09) European Standard (Telecommunications Series)
    ETSI EN 301 931-1 V1.1.2 (2001-09) European Standard (Telecommunications series) Intelligent Network (IN); Intelligent Network Capability Set 3 (CS3); Intelligent Network Application Protocol (INAP); Protocol specification; Part 1: Common aspects 2 ETSI EN 301 931-1 V1.1.2 (2001-09) Reference DEN/SPAN-03063/1-1 Keywords CS3, CTM, IN, INAP, protocol, UPT ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2001.
    [Show full text]
  • (TISPAN); IP Multimedia Subsystem (IMS); Functional Architecture
    Final draft ETSI ES 282 007 V1.1.1 (2006-03) ETSI Standard Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); IP Multimedia Subsystem (IMS); Functional architecture 2 Final draft ETSI ES 282 007 V1.1.1 (2006-03) Reference DES/TISPAN-02029-NGN-R1 Keywords architecture, functional, multimedia, system ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Introduction to Intelligent Networks
    1 Introduction to intelligent networks J. Harju, T. Karttunen and 0. Martikainen Lappeenranta University of Technology, Datacommunications Laboratory, P.O.Box20, FIN-53851 Lappeenranta, Finland Tel. +358 53 574 3613, Fax. +358 53 574 3650 Abstract The development of telecommunications techniques and the need for more advanced services has created projects on standardization of international Intelligent Networks (IN). The standards of Intelligent Networks defme IN in an abstract point of view, so it leaves the service providers the decisions on their own implementations. The first standard sets of IN are Bellcore's AIN release 1 and the CCITI's Capability Set 1 (CSJ). They defme the basic services of IN, additional features such as rapid service introduction and a flexible architecture that provides future expansion to further IN Capability Sets. The standardization organisations, such as CCITI and ETSI, work hard to help the service providers to implement their IN architecture in order to be able to provide international IN services. This kind of architecture is better known as global Intelligent Network architecture and it should be taken into consideration already in the early implementations of IN. This paper presents some history of telecommunications technology, an overview of IN and its services. J. Harju et al. (eds.), Intelligent Networks © Springer Science+Business Media Dordrecht 1995 2 Intelligent Networks 1. TURNING-POINTS IN TELECOMMUNICATIONS Several turning-points can be found in the history of telecommunications technology (marked as circles in the figure) (Figure 1). JI.ISDN ll!oollud IN Batch 'Real' JIOII!SIIIS mputm 1950 1960 1970 1980 19911 2llXI Time Figure 1.
    [Show full text]
  • International Roaming Explained
    International roaming explained Latin America Contents 1. Mobile roaming explained................. 1 2. Mobile roaming in Latin America..... 5 3. Price trends........................................ 11 4. Impact of regulation......................... 13 5. Best practice...................................... 15 3 1. Mobile roaming explained International mobile roaming The most common international roaming is a service that allows mobile services are: users to continue to use their Voice: Making and receiving calls to mobile phone or other mobile or from home country, visited country device to make and receive or a third country, while abroad voice calls and text messages, SMS: Sending and receiving text browse the internet, and send messages to or from home country, and receive emails, while visiting visited country or a third country, another country. while abroad Roaming extends the coverage of the Email: Reading and replying to home operator’s retail voice and SMS emails while abroad services, allowing the mobile user to Mobile broadband: Using mobile continue using their home operator devices or dongles to access the phone number and data services within internet, including downloading another country. The seamless extension images, MP3s, films and software, of coverage is enabled by a wholesale while abroad roaming agreement between a mobile user’s home operator and the visited Applications: Using mobile mobile operator network. The roaming applications while abroad that require agreement addresses the technical and mobile data, such as location-based commercial components required to services and language translators. enable the service. International mobile roaming is one of a wider range of communications services offered to mobile users while travelling abroad, which also include hotel services, Wi-Fi, national “travel” SIMs, and visited operator SIMs.
    [Show full text]
  • Intelligent Network (IN)
    Intelligent Network (IN) Definition An intelligent network (IN) is a service-independent telecommunications network. That is, intelligence is taken out of the switch and placed in computer nodes that are distributed throughout the network. This provides the network operator with the means to develop and control services more efficiently. New capabilities can be rapidly introduced into the network. Once introduced, services are easily customized to meet individual customer's needs. Overview This tutorial discusses how the network has evolved from one in which switchbased service logic provided services to one in which service-independent advanced intelligent network (AIN) capabilities allow for service creation and deployment. As the IN evolves, service providers will be faced with many opportunities and challenges. While the IN provides a network capability to meet the ever-changing needs of customers, network intelligence is becoming increasingly distributed and complicated. For example, third-party service providers will be interconnecting with traditional operating company networks. Local number portability (LNP) presents many issues that can only be resolved in an IN environment to meet government mandates. Also, as competition grows with companies offering telephone services previously denied to them, the IN provides a solution to meet the challenge. Topics 1. Network Evolution 2. The Introduction of IN 3. Benefits of IN 4. AIN Releases 5. AIN Release 1 Architecture 6. The Call Model 7. AIN Release 0 8. AIN 0.1 9. AIN 0.2 10. AIN Service Creation Examples 11. Other AIN Services Self-Test Correct Answers Glossary 1. Network Evolution Plain Old Telephone Service (POTS) Prior to the mid-1960s, the service logic, as shown in Figure 1, was hardwired in switching systems.
    [Show full text]
  • EN 301 668-1 V1.1.2 (2000-05) European Standard (Telecommunications Series)
    Final draft ETSI EN 301 668-1 V1.1.2 (2000-05) European Standard (Telecommunications series) Intelligent Network (IN); Intelligent Network Capability Set 1 (CS1) extension; Intelligent Network Application Protocol (INAP); Part 1: Protocol specification for Camel Phase 2 2 Final draft ETSI EN 301 668-1 V1.1.2 (2000-05) Reference DEN/SPS-03053-1 Keywords IN, INAP, ISDN, mobile, protocol ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
    [Show full text]
  • GSM Mobility Management Using an Intelligent Network Platform Sivagnanasundaram, Suthaharan
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Queen Mary Research Online GSM mobility management using an intelligent network platform Sivagnanasundaram, Suthaharan For additional information about this publication click this link. http://qmro.qmul.ac.uk/jspui/handle/123456789/3820 Information about this research object was correct at the time of download; we occasionally make corrections to records, please therefore check the published record when citing. For more information contact [email protected] GSM MOBILITY MANAGEMENT USING AN INTELLIGENT NETWORK PLATFORM. by Suthaharan Sivagnanasundaram SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Department of Electronic Engineering Queen Mary and Westfield College, University of London December 1997. Page 1 to My Parents, Sinthuja, Shaki and Rajani Page 2 ABSTRACT The principle behind Intelligent Networks (IN) is the separation of call and bearer control from service control. This enables the rapid introduction of new services, features and the ability to offer integrated service packages thereby reducing the reliance on switch manufacturers for the provision of new services. Global System for Mobile communications (GSM) is the accepted standard for mobile communications not only in Europe, but world wide. GSM is also one of the first networks with a standardised modularised approach to its architecture. This thesis presents an architecture to integrate GSM and IN networks enabling the provision of GSM mobility services from an IN platform. The approach is to move mobility provision and management functions within a GSM network to an IN platform, so providing mobility as an IN service rather than a GSM specific service.
    [Show full text]
  • TS 123 517 V8.0.0 (2007-12) Technical Specification
    ETSI TS 123 517 V8.0.0 (2007-12) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); IP Multimedia Subsystem (IMS); Functional architecture (3GPP TS 23.517 version 8.0.0 Release 8) R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS 3GPP TS 23.517 version 8.0.0 Release 8 1 ETSI TS 123 517 V8.0.0 (2007-12) Reference DTS/TSGS-0223517v800 Keywords GSM, UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]