SCCP Signalling Aspects for Roaming Version 3.2.1 10 October 2005
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
SGSN in a 2.5G GPRS Network
SGSN in a 2.5G GPRS Network • SGSN in a 2.5G GPRS Network, on page 1 • 2.5G SGSN Configuration Components, on page 2 • How the 2.5G SGSN Works , on page 4 • Information Required for the 2.5G SGSN, on page 6 SGSN in a 2.5G GPRS Network This chapter outlines the basic configuration and operation of the Serving GPRS Support Node (SGSN) in 2.5G GPRS wireless data networks. The simplest configuration that can be implemented on the system to support SGSN functionality in a 2.5G network requires one context but we recommend a minimum of two: one for the SGSN service (required) and another for the charging context. The service context organizes the following: • GPRS service configuration • MAP (Mobile Application Part) configuration • DNS (Domain Naming System) configuration for resolution of APN (Access Point Name) domain names • SGTP (SGSN GPRS Tunneling Protocol) configuration The charging context facilitates the following: • Configuration of connectivity to the CGF (Charging Gateway Function) The following functionality is configured at the global or system level in the local management context: • NSEI (Network Service Entity Identity) configuration • SCCP (Signalling Connection Control Part) network configuration • SS7 (Signaling System 7) connectivity configuration • GTT (Global Title Translation) configuration To simplify configuration management, more contexts can be created to categorize the service configuration. Each context can be named as needed. The contexts listed above can be configured as illustrated in the figure on the next page. SGSN in a 2.5G GPRS Network 1 SGSN in a 2.5G GPRS Network 2.5G SGSN Configuration Components 2.5G SGSN Configuration Components In order to support 2.5G SGSN functionality, the system must be configured with at least one context for the GPRS service (2.5G SGSN service). -
N-Squared Software N2SRP INAP Protocol Conformance Statement
N-Squared Software N2SRP INAP Protocol Conformance Statement Version 2020-02 N2SRP INAP Protocol Conformance Statement Version 2020-02 1 Document Information 1.1 Scope and Purpose This document describes the implementation of the INAP (including CAMEL variants) protocols for real-time SRP flows for voice interaction control using the N-Squared (N2) SIP Specialized Resource Platform (SRP) when used in conjunction with an INAP Service Control Platform (SCP). It should be read in conjunction with the N2SRP Technical Guide [R-1]. This document assumes a working knowledge of the relevant INAP and other telephony concepts, including the standard INAP interactions between an SCP, an SSP, and an SRP (or Intelligent Peripheral). 1.2 Definitions, Acronyms, and Abbreviations Term Meaning AC Application Context (in TCAP) ARI Assist Request Instructions AS Application Server ASP Application Server Process ASPAC ASP Active ASPTM ASP Traffic Maintenance ASN.1 Abstract Syntax Notation One CAMEL Customized Applications for Mobile Network Enhanced Logic CAP CAMEL Application Part DTMF Dual Tone Multi-Frequency ETSI European Telecommunications Standards Institute GT Global Title GTI Global Title Indicator IETF Internet Engineering Task Force INAP Intelligent Networking Application Part IP Internet Protocol ITU-T International Telecommunication Union Telecommunication Standardization Sector M3UA MTP3 User Adaption Layer MTP3 Message Transfer Part Level 3 N2 N-Squared OCNCC Oracle Communications Network Charging & Control PA Play Announcement PACUI Prompt -
A-Port User's Guide, Release 46.2 Copyright © 1993, 2015, Oracle And/Or Its Affiliates
Oracle® Communications EAGLE A-Port User©s Guide Release 46.2 E63583 Revision 1 July 2015 Oracle® Communications EAGLE A-Port User's Guide, Release 46.2 Copyright © 1993, 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. -
Technical Architecture Alternatives for Open Connectivity Roaming Hubbing Model
GSM Association Non-confidential Official Document IR.80 - Technical Architecture Alternatives for Open Connectivity Roaming Hubbing Model Technical Architecture Alternatives for Open Connectivity Roaming Hubbing Model Version 2.0 26 February 2015 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2015 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V2.0 Page 1 of 95 GSM Association Non-confidential Official Document IR.80 - Technical Architecture Alternatives for -
Location Update Procedure
Location Update Procedure In order to make a mobile terminated call, The GSM network should know the location of the MS (Mobile Station), despite of its movement. For this purpose the MS periodically reports its location to the network using the Location Update procedure. Location Area (LA) A GSM network is divided into cells. A group of cells is considered a location area. A mobile phone in motion keeps the network informed about changes in the location area. If the mobile moves from a cell in one location area to a cell in another location area, the mobile phone should perform a location area update to inform the network about the exact location of the mobile phone. The Location Update procedure is performed: When the MS has been switched off and wants to become active, or When it is active but not involved in a call, and it moves from one location area to another, or After a regular time interval. Location registration takes place when a mobile station is turned on. This is also known as IMSI Attach because as soon as the mobile station is switched on it informs the Visitor Location Register (VLR) that it is now back in service and is able to receive calls. As a result of a successful registration, the network sends the mobile station two numbers that are stored in the SIM (Subscriber Identity Module) card of the mobile station. These two numbers are:- 1. Location Area Identity (LAI) 2. Temporary Mobile Subscriber Identity (TMSI). The network, via the control channels of the air interface, sends the LAI. -
Security for the Core Network of Third Generation Mobile Systems
Security for the core network of third generation mobile systems GUNTER HORN, DIRK KROSELBERG Siemens AG, Corporate Technology, D-81730 Muenchen, Germany STEFANPUTZ T-Mobil, P.O. Box 300463, D-53184 Bonn, Germany ROLAND SCHMITZ T-Nova Technology Centre, D-64307 Darmstadt, Germany Keywords: UMTS, MAP Security, Multimedia domain, SIP, IPSec, IKE, Key Management Abstract: This contribution gives a survey of the present standardisation activities by 3GPP (3'd Generation Partnership Project1) in the area of security for signalling in the core network of third generation mobile systems. We give an overview of the protocols that need to be secured, present the basic principles behind the overall security architecture and describe the key management and format of secured messages, as far as they have already been finalised. In particular, we address core network security aspects of the 3GPP multimedia domain. 1 3GPP was formed by regional standards organisations from Europe, Asia and North America to produce specifications for a third generation mobile system named UMTS which is designed to evolve from GSM core network. There is a competing effort known as 3GPP2 with partners from North America and Asia. The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35413-2_36 R. Steinmetz et al. (eds.), Communications and Multimedia Security Issues of the New Century © IFIP International Federation for Information Processing 2001 298 1. THREATS TO CORE NETWORK SECURITY FOR MOBILE RADIO NETWORKS The core network of mobile radio systems is the part of the network which is independent of the radio interface technology of the mobile terminal. -
Database Administration Manual - Global Title Translation 910-6277-001 Revision a January 2012
Tekelec EAGLE® 5 Release 44.0 Database Administration Manual - Global Title Translation 910-6277-001 Revision A January 2012 Copyright 2012 Tekelec. All Rights Reserved. Printed in USA. Legal Information can be accessed from the Main Menu of the optical disc or on the Tekelec Customer Support web site in the Legal Information folder of the Product Support tab. Table of Contents Chapter 1: Introduction.....................................................................13 Overview..................................................................................................................................14 Scope and Audience...............................................................................................................15 Manual Organization..............................................................................................................15 Documentation Admonishments..........................................................................................15 Customer Care Center............................................................................................................16 Emergency Response..............................................................................................................18 Related Publications...............................................................................................................19 Documentation Availability, Packaging, and Updates.....................................................19 Locate Product Documentation on the Customer Support Site.......................................19 -
Cellular Technology.Pdf
Cellular Technologies Mobile Device Investigations Program Technical Operations Division - DFB DHS - FLETC Basic Network Design Frequency Reuse and Planning 1. Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. 2. It uses radio frequencies (radio channels) over and over again throughout a market with minimal interference, to serve a large number of simultaneous conversations. 3. This concept is the central tenet to cellular design and is called frequency reuse. Basic Network Design Frequency Reuse and Planning 1. Repeatedly reusing radio frequencies over a geographical area. 2. Most frequency reuse plans are produced in groups of seven cells. Basic Network Design Note: Common frequencies are never contiguous 7 7 The U.S. Border Patrol uses a similar scheme with Mobile Radio Frequencies along the Southern border. By alternating frequencies between sectors, all USBP offices can communicate on just two frequencies Basic Network Design Frequency Reuse and Planning 1. There are numerous seven cell frequency reuse groups in each cellular carriers Metropolitan Statistical Area (MSA) or Rural Service Areas (RSA). 2. Higher traffic cells will receive more radio channels according to customer usage or subscriber density. Basic Network Design Frequency Reuse and Planning A frequency reuse plan is defined as how radio frequency (RF) engineers subdivide and assign the FCC allocated radio spectrum throughout the carriers market. Basic Network Design How Frequency Reuse Systems Work In concept frequency reuse maximizes coverage area and simultaneous conversation handling Cellular communication is made possible by the transmission of RF. This is achieved by the use of a powerful antenna broadcasting the signals. -
Location Update and Paging in Wireless Networks — Location Management Plays the Central Role in Providing Ubiquitous Communica
Location Update and Paging in Wireless Networks Paging • Paging is the one-to-one communication between the mobile and the base station • Paging is a procedure the network uses to find out a subscriber's location before actual call establishment. • Paging is used to alert the mobile station of an incoming call — Location management plays the central role in providing ubiquitous communications services in the future wireless mobile networks. Location update and paging are commonly used in tracking mobile users on the move, location update is to update a mobile user’s current location while the paging is used to locate a mobile user, both will incur signaling traffic in the wireless networks. The more frequent the location updates, the less paging in locating a mobile user, thus there is a tradeoff in terms of signaling cost There are two basic operations for tracking a mobile user: location update and terminal paging. Location update is the process for the mobile terminals to report their locations to the network, thus all mobiles are actively sending location update messages to keep the network informed. Terminal paging is the process for the network to search the called terminal by sending polling signals to cells close to the last reported location of the called terminal. When an incoming calls to a mobile user (we will use mobile user and mobile terminal interchangeably) arrives, the wireless network simply routes the call to the last reported location of the mobile terminal. Intuitively, the location accuracy depends on the location update frequency, the more often the location updates, the more accurate the location information. -
Mobile Broadband Explosion, Rysavy Research/4G Americas, August 2013 Page 2 Advanced Receivers
Table of Contents INTRODUCTION........................................................................................................ 4 DATA EXPLOSION ..................................................................................................... 7 Data Consumption ................................................................................................... 7 Cloud Computing ................................................................................................... 10 Technology Drives Demand ..................................................................................... 11 Wireless Vs. Wireline .............................................................................................. 11 Bandwidth Management ......................................................................................... 14 Market and Deployment .......................................................................................... 16 SPECTRUM DEVELOPMENTS .................................................................................... 18 Incentive Auctions ................................................................................................. 20 NTIA-Managed Spectrum ........................................................................................ 20 3550 to 3650 MHz “Small-Cell” Band ........................................................................ 20 Harmonization ....................................................................................................... 21 Unlicensed Spectrum ............................................................................................. -
Virtual Signaling Transfer Point User©S Guide Release 8.1 E86290 Revision 01
Oracle® Communications Diameter Signaling Router Virtual Signaling Transfer Point User©s Guide Release 8.1 E86290 Revision 01 July 2017 Oracle Communications Diameter Signaling Router Virtual Signaling Transfer Point User's Guide, Release 8.1 Copyright © 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. -
Network Architecture
Chapter 1 Network Architecture This section gives an overview of the most important entities in a GSM network and the different protocols that are used between these entities. A single GSM network is often referred to as a Public Land Mobile Network (PLMN). This is the network operated by a single provider in a single region. In most countries each provider maintains a single PLMN, but in certain large countries, like the USA, several PLMNs can be maintained by a single provider. A PLMN manages all traffic between mobile phones and all traffic between mobile phones and the other land networks. These land networks can either be the Public Switched Telephone Network (PSTN), an ISDN network, or the Internet. Figure 1.1 shows an overview of all the entities in a GSM network. These entities are often subdivided between three “domains”; the Mobile Station (MS) – i.e. mobile phones – , the Base Station Subsytem (BSS) and the Network Switching Subsystem (NSS). We will now look at each of these in more detail. 1.1 Mobile Station (MS) The Mobile Station (MS) is the subscribers module most people are familiar with. It consists of both some Mobile Equipment (ME) and a Subscriber Identity Module (SIM). Both are needed for the Mobile Station (MS) to function in the GSM network. Hence MS = ME+SIM. 1.1.1 Mobile Equipment (ME) The Mobile Equipment (ME) is simply the GSM phone people use to make and receive calls in a cellular network. It is basically a transmitter-receiver unit that is independent from network providers1.