Running a Basic Osmocom GSM Network
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Osmobsc VTY Reference I
OsmoBSC VTY Reference i OsmoBSC VTY Reference OsmoBSC VTY Reference ii Copyright © 2012-2019 This work is copyright by sysmocom - s.f.m.c. GmbH. All rights reserved. OsmoBSC VTY Reference iii COLLABORATORS TITLE : OsmoBSC VTY Reference ACTION NAME DATE SIGNATURE WRITTEN BY September 28, 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME v1 13th August 2012 Initial hf v2 5th March 2014 Update to match osmo-bsc version 0.13.0-305 hf v3 6th June 2019 Update to match osmo-bsc version 1.4.0.84-3f1f dw OsmoBSC VTY Reference iv Contents 1 VTY reference 1 1.1 Common Commands . .1 1.1.1 end . .2 1.1.2 exit . .2 1.1.3 help . .2 1.1.4 list [with-flags] . .2 1.1.5 show running-config . .3 1.1.6 show vty-attributes . .3 1.1.7 show vty-attributes (application|library|global) . .3 1.1.8 write . .4 1.1.9 write file [PATH] . .4 1.1.10 write memory . .4 1.1.11 write terminal . .4 1.2 view..........................................................5 1.2.1 enable [expert-mode] . .5 1.2.2 logging color (0|1) . .5 1.2.3 logging disable . .5 1.2.4 logging enable . .6 1.2.5 logging filter all (0|1) . .6 1.2.6 logging filter imsi IMSI . .6 1.2.7 logging level (rll|mm|rr|rsl|nm|pag|meas|msc|ho|hodec|ref|ctrl|filter|pcu|lcls|c... .7 1.2.8 logging level force-all (debug|info|notice|error|fatal) . 10 1.2.9 logging level set-all (debug|info|notice|error|fatal) . -
Patent No.: US 8358640 B1
US008358640B1 (12) United States Patent (10) Patent No.: US 8,358,640 B1 Breau et a]. (45) Date of Patent: Jan. 22, 2013 (54) FEMTOCELL BRIDGING IN MEDIA LOCAL OTHER PUBLICATIONS AREA NETWORKS Notice ofAllowance datedApr. 11, 2011,U.S.Appl.No. 12/689,081, ?led Jan. 18,2012. (75) Inventors: Jeremey R. Breau, Leawood, KS (US); Breau, Jeremy R., et al., Patent Application entitled “System and Jason R. Delker, Olathe, KS (U S) Method for Bridging Media Local Area Networks,” ?led Jan. 18, 2010, US. Appl. No. 12/689,081. Assignee: Sprint Communications Company “Address Resolution Protocol,” Wikipedia, http://en.wikipedia.org/ (73) w/indeX.php?titleIAddressiResolutioniProtocol&printable:yes, L.P., Overland Park, KS (U S) (last visited Aug. 25, 2009). Bahlmann, Bruce, “DLNA Basics, Bridging Services within a Con ( * ) Notice: Subject to any disclaimer, the term of this nected Home,” Communications Technology, http://www.cable360. patent is extended or adjusted under 35 net/print/ct/deployment/techtrends/23787.html, Jun. 1, 2007. U.S.C. 154(b) by 248 days. Bahlmann, Bruce, “Digital Living Network Alliance (DLNA) Essen tials,” Birds-Eye.Net, http://www.birds-eye.net/articleiarchive/ digitalilivinginetworkiallianceidlnaiessentials.htm, Apr. 1, (21) Appl. No.: 12/791,859 2007. “Network address translation,” Wikipedia, http://en.wikipedia.org/ (22) Filed: Jun. 1, 2010 w/indeX.php?title:Networkiaddressitranslation&printable:yes, Aug. 20, 2009. (51) Int. Cl. Pre-Interview Communication dated Jul. 31, 2012, US. Appl. No. H04L 12/56 (2006.01) 12/698,495, ?led Feb. 2, 2010. H04] [/16 (2006.01) Delker, Jason R., et al., Patent Application entitled “Centralized Program Guide,” ?led Feb. -
700 Mhz Base Station Test Results for the FCC
MOBILE --------.. BEFREE 0---.- 700 MHz Base Station Test Results for the FCC Flow Mobile 700 MHz Base Station Test Results 1.0 Document Goal This document provides the test results of a Base Station which provides mobile broadband connectivity using 700 MHz spectrum using the WiFi protocol. Flow Mobile had obtained a STA from the FCC to be able to test a Base Station in the 760-776 MHZ. The purpose of this test was to prove that WiFi protocol can be used at this spectrum and a mobile Base Station can be used to help deploy a large wide-area network. 2.0 Introduction A Base Transceiver Station (BTS) is a major component of any wireless access network to provide wireless service to users. A client terminal connects to a BTS to provide service to the user. Our demonstration is of a BTS operating in 760-776 MHz using WiFi protocol and the client used to test this BTS is based on an off-the-shelf module developed by Ubiquiti Networks. The client can be a handheld device, a computer card that is either connected using the PCMCIA slot or USB connector. The connection between the client and the BTS uses a particular protocol. The protocol could be any of CDMA, GSM, 3G standards or Wi-Fi standards or the future LTE standards. Hence a BTS has two components for the radio connection to be established between the BTS and the Client Terminal. The two components are frequency component which is purely a radio function and a protocol component which is a required for communication. -
Cellular Technology.Pdf
Cellular Technologies Mobile Device Investigations Program Technical Operations Division - DFB DHS - FLETC Basic Network Design Frequency Reuse and Planning 1. Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. 2. It uses radio frequencies (radio channels) over and over again throughout a market with minimal interference, to serve a large number of simultaneous conversations. 3. This concept is the central tenet to cellular design and is called frequency reuse. Basic Network Design Frequency Reuse and Planning 1. Repeatedly reusing radio frequencies over a geographical area. 2. Most frequency reuse plans are produced in groups of seven cells. Basic Network Design Note: Common frequencies are never contiguous 7 7 The U.S. Border Patrol uses a similar scheme with Mobile Radio Frequencies along the Southern border. By alternating frequencies between sectors, all USBP offices can communicate on just two frequencies Basic Network Design Frequency Reuse and Planning 1. There are numerous seven cell frequency reuse groups in each cellular carriers Metropolitan Statistical Area (MSA) or Rural Service Areas (RSA). 2. Higher traffic cells will receive more radio channels according to customer usage or subscriber density. Basic Network Design Frequency Reuse and Planning A frequency reuse plan is defined as how radio frequency (RF) engineers subdivide and assign the FCC allocated radio spectrum throughout the carriers market. Basic Network Design How Frequency Reuse Systems Work In concept frequency reuse maximizes coverage area and simultaneous conversation handling Cellular communication is made possible by the transmission of RF. This is achieved by the use of a powerful antenna broadcasting the signals. -
Components for 5G Base Stations and Antennas
Quick guide COMPONENTS FOR 5G BASE STATIONS AND ANTENNAS www.essentracomponents.com MAKING IT EASIER QUICK GUIDE 5G TECHNOLOGY MANUFACTURERS FACE A CHALLENGE. With the demand for 5G coverage accelerating, it’s a race to build and deploy base-station components and antenna mast systems. Upgrading 4G base stations by software to non-standalone (NSA) 5G will still require hardware changes. It will act as an interim, but it will still not satisfy the need for true 5G network architecture. The number of base stations needed increases with each generation of mobile technology to support higher levels of data traffic. Antenna systems will also need to evolve to handle increases in capacity, frequency ranges and the ability to minimise interference as signal density expands. Your 5G base-station design and 5G antenna components will need to address not only technical challenges, but also aesthetics, weather and security requirements. This guide is designed to help you chose the components you’ll need. To further help you, we’ve made free CADs of our solutions available for download. You can also request free samples for most of our products, so you can try before you buy. ESSENTRACOMPONENTS.COM 2 QUICK GUIDE BASE STATIONS A 5G network base-station connects other wireless devices to a central hub. A look at 5G base-station architecture includes various equipment, such as a 5G base station power amplifier, which converts signals from RF antennas to BUU cabinets (baseband unit in wireless stations). Whatever you’re designing, you’ll need to consider cost, ease of installation and assembly and, of course, flammability. -
3G UMTS Femtocell
3G UMTS Femtocell BRKAGG-2002 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Introduction to Femtocell Market Drivers Femtocell Architecture Key Femto Features Standards Update Femto Integration ummary BRKAGG-2002_c1 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Introduction to Femtocell BRKAGG-2002_c1 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 3 In-Home Picocell Microcell Macrocell Focus of this topic is Femtocell In-house coverage Compare and contrast with Macrocell, Microcell or Picocell Femto provides in fill for Macro, Micro and Pico BRKAGG-2002_c1 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 4 What Is a Femtocell? Tiny 3G Home Access Point Gives 3G signal inside the home Operator Very low RF power. Management & Licensed Services Spectrum Standalone or integrated into Node-B home gateway. Cellular Network Standard 3G Works with all standard Handset Wireless Core handsets. (MSC, SGSN) Connects to the Core Network Femto Home Uses home broadband Security Node-B Gateway Licensed Gateway connection for backhaul Spectrum (contrast: Dedicated backhaul Internet Femto Home Requires Wireless Security Broadband Node-B Residential GW Connection Gateway for protection (<5mW) (4 calls in 200kbps) Standard Connectivity to Core Femto Cellular Network Connectivity from Femto network to Core similar to Macro network BRKAGG-2002_c1 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Market Drivers BRKAGG-2002_c1 © 2009 Cisco Systems, Inc. -
Osmohnbgw User Manual I
OsmoHNBGW User Manual i sysmocom - s.f.m.c. GmbH OsmoHNBGW User Manual by Harald Welte Copyright © 2019 sysmocom - s.f.m.c.DRAFT GmbH Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with the Invariant Sections being just ’Foreword’, ’Acknowledgements’ and ’Preface’, with no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". The Asciidoc source code of this manual can be found at http://git.osmocom.org/osmo-hnbgw/ and of the common chapters at http://git.osmocom.org/osmo-gsm-manuals/ DRAFT 0.7.0-4-g1f6c, 2021-Feb-23 OsmoHNBGW User Manual ii HISTORY NUMBER DATE DESCRIPTION NAME 1 November 30th, Initial version HW 2019 Copyright © 2019 sysmocom - s.f.m.c. GmbH DRAFT 0.7.0-4-g1f6c, 2021-Feb-23 OsmoHNBGW User Manual iii Contents 1 Foreword 1 1.1 Acknowledgements..................................................1 1.2 Endorsements.....................................................2 2 Preface 2 2.1 FOSS lives by contribution!..............................................2 2.2 Osmocom and sysmocom...............................................2 2.3 Corrections......................................................3 2.4 Legal disclaimers...................................................3 2.4.1 Spectrum License...............................................3 2.4.2 Software License...............................................3 -
Exploiting Broadcast Information in Cellular Networks
Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks Nico Golde, Kévin Redon, and Jean-Pierre Seifert, Technische Universität Berlin and Deutsche Telekom Innovation Laboratories This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks Nico Golde, K´evin Redon, Jean-Pierre Seifert Technische Universitat¨ Berlin and Deutsche Telekom Innovation Laboratories {nico, kredon, jpseifert}@sec.t-labs.tu-berlin.de Abstract comBB [20, 25, 45]. These open source projects consti- tute the long sought and yet publicly available counter- Mobile telecommunication has become an important part parts of the previously closed radio stacks. Although all of our daily lives. Yet, industry standards such as GSM of them are still constrained to 2G network handling, re- often exclude scenarios with active attackers. Devices cent research provides open source software to tamper participating in communication are seen as trusted and with certain 3G base stations [24]. Needless to say that non-malicious. By implementing our own baseband those projects initiated a whole new class of so far uncon- firmware based on OsmocomBB, we violate this trust sidered and practical security investigations within the and are able to evaluate the impact of a rogue device with cellular communication research, [28, 30, 34]. regard to the usage of broadcast information. Through our analysis we show two new attacks based on the pag- Despite the recent roll-out of 4G networks, GSM re- ing procedure used in cellular networks. -
Analysis on Fixed and Mobile Wimax
THESIS REPORT Analysis on Fixed and Mobile WiMAX By Umar Tariq Umer Naeem Jilani Tauseef Ahmad Siddiqui MS in Electrical Engineering majors in Telecommunications Blekinge Institute of Technology Blekinge Institute of Technology 2007 THESIS REPORT Analysis on Fixed and Mobile WiMAX By Umar Tariq Umer Naeem Jilani Tauseef Ahmed Siddiqui MS in Electrical Engineering majors in Telecommunications Project Advisor: Tommy Hult Deliverable: Report: 1 Volume Blekinge Institute of Technology 2007 I Submission Performa Name University Number Email Umar Tariq 830321-P372 [email protected] Umer Naeem Jilani 830318-P138 [email protected] Tauseef Ahmad Siddiqui 810802-P356 [email protected] Title of Project: Analysis of Fixed and Mobile WiMAX Supervisor: Tommy Hult This report is submitted as required for the Project in accordance with the rules laid down by the Blekinge Institute of Technology as part of the requirements for the award of the degree of Masters of Engineering. I declare that the work presented in this report is my own except where due reference or acknowledgement is given to the work of others. Signature of students Date (1)…………………………….. ……………………. (2)……………………………. ……………………. (3)…………………………….. ……………………. Signature of Supervisor Date …………………………. ………………………. Analysis of Fixed WiMAX and Mobile WiMAX II Acknowledgements We first would like to thank our honorable Supervisor Tommy Hult for his devotion of time to our project and to provide the facility. Secondly we appreciate the valuable comments and suggestions from Miss Kim Ngan and who helped us in our project as well as sharing their expertise and their knowledge of the subject which allowed us to complete our project effectively and efficiently in time. -
Scaling Community Cellular Networks
Scaling Community Cellular Networks with CommunityCellularManager Shaddi Hasan, UC Berkeley; Mary Claire Barela, University of the Philippines, Diliman; Matthew Johnson, University of Washington; Eric Brewer, UC Berkeley; Kurtis Heimerl, University of Washington https://www.usenix.org/conference/nsdi19/presentation/hasan This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19). February 26–28, 2019 • Boston, MA, USA ISBN 978-1-931971-49-2 Open access to the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19) is sponsored by Scaling Community Cellular Networks with CommunityCellularManager Shaddi Hasan Mary Claire Barela Matthew Johnson UC Berkeley University of the Philippines, Diliman University of Washington Eric Brewer Kurtis Heimerl UC Berkeley University of Washington Hundreds of millions of people still live beyond the cov- tion infrastructure, to provide commercial mobile service. erage of basic mobile connectivity, primarily in rural ar- In spite of their size, incumbent mobile network operators eas with low population density. Mobile network opera- (MNOs) are capital constrained and struggle to justify in- tors (MNOs) traditionally struggle to justify expansion into vestment in rural areas with marginal business cases when these rural areas due to the high infrastructure costs neces- compared to more profitable and lower-risk urban markets. sary to provide service. Community cellular networks, net- Community cellular networking provides one alternative works built “by and for” the people they serve, represent approach for bringing mobile connectivity to these under- an alternative model that, to an extent, bypasses these busi- served populations [2, 28]. -
Putting LTE Security Functions to the Test: a Framework to Evaluate Implementation Correctness
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness David Rupprecht Kai Jansen Horst Gortz¨ Institute for IT-Security Horst Gortz¨ Institute for IT-Security Ruhr-University Bochum, Germany Ruhr-University Bochum, Germany [email protected] [email protected] Christina Popper¨ New York University Abu Dhabi [email protected] Abstract promise of users as well as service providers. Security- related changes need to be carefully evaluated in order to Long Term Evolution (LTE) is the most recent generation maintain strong protection, especially since LTE is con- of mobile communications promising increased transfer sidered as the communication technology for, e. g., criti- rates and enhanced security features. It is todays commu- cal infrastructures, emergency services, and law enforce- nication technology for mobile Internet as well as con- ment [12]. The increasing dependency on LTE makes it sidered for the use in critical infrastructure, making it an an attractive subject to a wide range of attacks and any attractive target to a wide range of attacks. We evalu- vulnerability could have serious impact on the underly- ate the implementation correctness of LTE security func- ing services. tions that should protect personal data from compromise. By addressing several security issues of the previ- In this paper, we focus on two security aspects: user ous mobile communication specifications, in particular data encryption and network authentication. We de- Global System for Mobile Communications (GSM) and velop a framework to analyze various LTE devices with Universal Mobile Telecommunications System (UMTS), respect to the implementations of their security-related LTE raises the bar in terms of security and applies, e. -
Data Encoding and Transmission
Data Communications & Networks Session 6 – Main Theme Wireless and Mobile Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from course textbook resources Computer Networking: A Top-Down Approach, 6/E Copyright 1996-2013 J.F. Kurose and K.W. Ross, All Rights Reserved 1 Agenda 1 Session Overview 2 Wireless and Mobile Networks 3 Summary and Conclusion 2 What is the class about? .Course description and syllabus: »http://www.nyu.edu/classes/jcf/csci-ga.2262-001/ »http://cs.nyu.edu/courses/Fall13/CSCI-GA.2262- 001/index.html .Textbooks: » Computer Networking: A Top-Down Approach (6th Edition) James F. Kurose, Keith W. Ross Addison Wesley ISBN-10: 0132856204, ISBN-13: 978-0132856201, 6th Edition (02/24/12) 3 Course Overview . Computer Networks and the Internet . Application Layer . Fundamental Data Structures: queues, ring buffers, finite state machines . Data Encoding and Transmission . Local Area Networks and Data Link Control . Wireless Communications . Packet Switching . OSI and Internet Protocol Architecture . Congestion Control and Flow Control Methods . Internet Protocols (IP, ARP, UDP, TCP) . Network (packet) Routing Algorithms (OSPF, Distance Vector) . IP Multicast . Sockets 4 Course Approach . Introduction to Basic Networking Concepts (Network Stack) . Origins of Naming, Addressing, and Routing (TCP, IP, DNS) . Physical Communication Layer . MAC Layer (Ethernet, Bridging) . Routing Protocols (Link State, Distance Vector) . Internet Routing (BGP, OSPF, Programmable Routers) . TCP Basics (Reliable/Unreliable) . Congestion Control . QoS, Fair Queuing, and Queuing Theory . Network Services – Multicast and Unicast . Extensions to Internet Architecture (NATs, IPv6, Proxies) . Network Hardware and Software (How to Build Networks, Routers) . Overlay Networks and Services (How to Implement Network Services) .