SlideShare une entreprise Scribd logo
1  sur  21
GSM AUTHINTICATION,LOCALIZATION
AND HANDOVER
GSM: SYSTEM ARCHITECTURE

3.2

Prof.
Anir
udha
Sah
oo
AUTHENTICATION:
Confirm the true identity of the user(or device).
Ensures that the subscriber is authorized access to
the network.

GOALS:
Protection of the network against unauthorized use.
Protect the operator against the billing fraud.
AUTHENTICATION:
Authenticates the identity of the subscriber through the use of a
challenge-response mechanism.

MS requests access to the network.
Forward the IMSI and authentication request to the request authentication
The MSC will forward the IMSI to the HLR and Authentication Center
(AuC).
Triplets.
IMSI
HLR

MS

IMSI

Request authentication Triplets

request Triplets

MSC

BS
AuC
TMSI-Temporary Mobile Subscriber Identity
HLR-Home Location Register
MSC-Mobile Switching Center
IMSI-International Mobile Subscriber Identity

V
f
v
d

e r i
y
a l i
i t y
AUTHENTICATION:
The AuC will use the IMSI to look up the Ki associated with
that IMSI.
The Auc will also generate a 128-bit random number called
the RAND.
Ki-Individual subscriber authentication key.
It is a 128-bit number that is paired with an IMSI when the SIM
IMSI
card is created.

Authentication Center

RAND

Ki
AUTHENTICATION:
The RAND and the Ki are inputted into the A3 encryption
algorithm as well as A8 encryption algorithm.
The output is the Signed Response (SRES) and Ciphering
key(Kc) correspondingly.
The RAND, SRES, and Kc are collectively known as the
Triplets.
RAND

RAND

Ki

A8

A3
32-bit
SRES

Ki

64-bit
Kc
AUTHENTICATION:
Once the AuC has generated the triplets, it forwards them to
theThe HLR subsequently sends them to the requesting
HLR.
MSC. MSC stores the Kc and the SRES but forwards the RAND to the MS
The
and orders it to authenticate.
Triplets
MSC
SRES
HLR

Request triplets

Kc

IMSI

Triplets

IMSI
Request authentication Triplets

MS

AuC

BS
AUTHENTICATION:
The MS has the Ki stored on the SIM card.
The A3 and A8 algorithms also reside on the SIM card.
The RAND and Ki are inputted into the A3 and A8 algorithm.
Generate the SRES and the Kc respectively.

RAND

MS

Ki

Ki

RAND

SIM

A3
SRES

A8
Kc
AUTHENTICATION:
The MS stores the Kc on the SIM card and sends the generated SRES back to the
network.

Triplets

RAND
MSC
SRES
Kc

IMSI
Request authentication Triplets
IMSI

IF

SRES

=

SRES

AUTHENTICATION SUCCESSFUL

Triplets

Request
TMSI or IMSI
access

Request triplets

MS

HLR

AuC
GSM LOCALIZATION:

Kind of cell phone tracking mechanism that's possible
in GSM phones.
The GSM system always knows where a user is
currently located.
Same phone number is valid worldwide.
GSM system performs periodic location updates, even
if the user does not use the MS.
-provided that the MS is still logged on to the GSM
network and is not completely switched off.
GSM ARCHITECTURE:
GSM LOCALIZATION:

HOW?

The HLR contains information about the current
location.
The VLR that is currently responsible for the MS
informs the HLR about the location of the MS when
it changes.

Localization can be done in following four ways..
-Network based
-Handset based
-SIM based
-Hybrid
GSM LOCALIZATION :
HYBRID BASED LOCALIZATION:
Uses a combination of Network based, Handset based
& SIM based technologies.
-makes the location more accurate.
Example : Global Positioning System (GPS)

space based satellite navigation system.

allows small electronic
receivers to determine their location
GSM LOCALIZATION:
To locate an MS and to address the MS following
numbers are required..
 Mobile Station International ISDN Number
(MSISDN) :

 Important for GSM user.
 Associated with SIM.
 Consists of –




Country Code (CC)
National Destination Code(NDC)
Subscriber Number (SN)
GSM LOCALIZATION:
International Mobile Subscriber Identity(IMSI) :
 GSM uses the IMSI for internal unique identification
of a subscriber.
 Consists of –
Mobile Country Code (MCC)
Mobile Network Code(MNC)
Mobile Subscriber Identification Number(MSIN)
GSM LOCALIZATION:
Temporary Mobile Subscriber Identity(TMSI):
 Give the exact identity of the user signaling over the
air interface.
 GSM uses the 4 byte TMSI.
 TMSI is selected by the current VLR.
 Only valid temporarily and within the location area of
VLR.
GSM LOCALIZATION:
Mobile Station Roaming Number(MSRN) :
 Temporary address.
 Hides the location of a subscriber.
 Consists of –
Visitor Country Code(VCC)
Visitor National Destination Code (VNDC)
GSM HANDOVER:
Handover is the process of switching a radio connection from
one BS to another in order to maintain seamless radio
connection during mobile station movement.
HANDOVER

BTS

BTS
1 Handover request

GSM HANDOVER:
1
3
5
6
4
2

2 Forward

MSC new BSCa handover request from the old BSC. a handover
The receives handoverthe handover by transmitting
initiates complete
MS sendsthe old radio channels inmessage to the old BSC via new
Releasestothe the request to the new BSC. sends handover bursts to the
the old
MSC forwardsthe MS the connection the MS
In order to
command establish via old BSC.
BSC.
BSC. BSC
new
MSC
3 Handover
2
1
command
4 Handover burst
3
5 Handover
BSC
BSC
5
complete
6 Release

4

5

3

6
HANDOVER SUCCESSFUL

4
BTS
BTS
NEW

OLD
Questions ?
THANK YOU

Contenu connexe

Tendances

Timing advances
Timing advancesTiming advances
Timing advances
Anil Singh
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
Maulik Patel
 

Tendances (20)

Cellular concepts
Cellular conceptsCellular concepts
Cellular concepts
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
WCDMA
WCDMAWCDMA
WCDMA
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Security in GSM
Security in GSMSecurity in GSM
Security in GSM
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Amps
AmpsAmps
Amps
 
Timing advances
Timing advancesTiming advances
Timing advances
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
TinyOS
TinyOSTinyOS
TinyOS
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
 
Wireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semWireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th sem
 
Handoff and its type
Handoff and its typeHandoff and its type
Handoff and its type
 
PSTN
PSTNPSTN
PSTN
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
Telecom Roaming Overview
Telecom Roaming OverviewTelecom Roaming Overview
Telecom Roaming Overview
 
Cellular Networks Presentation in distributed systems, Mobile Networks
Cellular Networks Presentation in distributed systems, Mobile NetworksCellular Networks Presentation in distributed systems, Mobile Networks
Cellular Networks Presentation in distributed systems, Mobile Networks
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 

En vedette

Authentication and Ciphering
Authentication and CipheringAuthentication and Ciphering
Authentication and Ciphering
Sokunth Che
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
వం శీ
 
Speech Compression using LPC
Speech Compression using LPCSpeech Compression using LPC
Speech Compression using LPC
Disha Modi
 
01 09 tmsi reallocation
01 09 tmsi reallocation01 09 tmsi reallocation
01 09 tmsi reallocation
Ericsson Saudi
 

En vedette (20)

Authentication and Ciphering
Authentication and CipheringAuthentication and Ciphering
Authentication and Ciphering
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Uk pakistan imsi (1)
Uk pakistan imsi (1)Uk pakistan imsi (1)
Uk pakistan imsi (1)
 
Using gsm sim authentication in vp ns
Using gsm sim authentication in vp nsUsing gsm sim authentication in vp ns
Using gsm sim authentication in vp ns
 
Speech Compression using LPC
Speech Compression using LPCSpeech Compression using LPC
Speech Compression using LPC
 
Speech compression-using-gsm
Speech compression-using-gsmSpeech compression-using-gsm
Speech compression-using-gsm
 
Tems parameters
Tems parametersTems parameters
Tems parameters
 
Basic GSM CallFlow
Basic GSM CallFlowBasic GSM CallFlow
Basic GSM CallFlow
 
01 09 tmsi reallocation
01 09 tmsi reallocation01 09 tmsi reallocation
01 09 tmsi reallocation
 
Gsm network
Gsm networkGsm network
Gsm network
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
 
Thong tin_di_dong
 Thong tin_di_dong Thong tin_di_dong
Thong tin_di_dong
 
Handover in Telecom
Handover in TelecomHandover in Telecom
Handover in Telecom
 
Thiet ke toi uu vo tuyen
Thiet ke toi uu vo tuyenThiet ke toi uu vo tuyen
Thiet ke toi uu vo tuyen
 
Wcdma callflow
Wcdma callflowWcdma callflow
Wcdma callflow
 
NEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGY
NEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGYNEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGY
NEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGY
 
Bluetooth, Infrared
Bluetooth, InfraredBluetooth, Infrared
Bluetooth, Infrared
 
5 g
5 g5 g
5 g
 
RIL and Android Telephony
RIL and Android TelephonyRIL and Android Telephony
RIL and Android Telephony
 

Similaire à Gsm

Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
Tempus Telcosys
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
HazemElabed2
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
sumit singh
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
Engr.MEESHU SHARKER
 

Similaire à Gsm (20)

Final gsm1
Final gsm1Final gsm1
Final gsm1
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
Security aspect in GSM
Security aspect in GSMSecurity aspect in GSM
Security aspect in GSM
 
gsm operation
gsm operationgsm operation
gsm operation
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network Architecture
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
report
reportreport
report
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
 
GSM - Addresses and Identifiers
GSM - Addresses and IdentifiersGSM - Addresses and Identifiers
GSM - Addresses and Identifiers
 
Gsm1
Gsm1Gsm1
Gsm1
 
Gsm
GsmGsm
Gsm
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
GSM Fundamentals
GSM FundamentalsGSM Fundamentals
GSM Fundamentals
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 

Plus de Nur Islam

Overview of iso 9001
Overview of iso 9001Overview of iso 9001
Overview of iso 9001
Nur Islam
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
Nur Islam
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
Nur Islam
 
Halsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueHalsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical technique
Nur Islam
 
Cellular automata
Cellular automataCellular automata
Cellular automata
Nur Islam
 
Designing of media player
Designing of media playerDesigning of media player
Designing of media player
Nur Islam
 

Plus de Nur Islam (8)

Lan wan
Lan wanLan wan
Lan wan
 
Overview of iso 9001
Overview of iso 9001Overview of iso 9001
Overview of iso 9001
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
 
Organization and team structures
Organization and team structuresOrganization and team structures
Organization and team structures
 
Halsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueHalsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical technique
 
Cellular automata
Cellular automataCellular automata
Cellular automata
 
Designing of media player
Designing of media playerDesigning of media player
Designing of media player
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Gsm

  • 3. AUTHENTICATION: Confirm the true identity of the user(or device). Ensures that the subscriber is authorized access to the network. GOALS: Protection of the network against unauthorized use. Protect the operator against the billing fraud.
  • 4. AUTHENTICATION: Authenticates the identity of the subscriber through the use of a challenge-response mechanism. MS requests access to the network. Forward the IMSI and authentication request to the request authentication The MSC will forward the IMSI to the HLR and Authentication Center (AuC). Triplets. IMSI HLR MS IMSI Request authentication Triplets request Triplets MSC BS AuC TMSI-Temporary Mobile Subscriber Identity HLR-Home Location Register MSC-Mobile Switching Center IMSI-International Mobile Subscriber Identity V f v d e r i y a l i i t y
  • 5. AUTHENTICATION: The AuC will use the IMSI to look up the Ki associated with that IMSI. The Auc will also generate a 128-bit random number called the RAND. Ki-Individual subscriber authentication key. It is a 128-bit number that is paired with an IMSI when the SIM IMSI card is created. Authentication Center RAND Ki
  • 6. AUTHENTICATION: The RAND and the Ki are inputted into the A3 encryption algorithm as well as A8 encryption algorithm. The output is the Signed Response (SRES) and Ciphering key(Kc) correspondingly. The RAND, SRES, and Kc are collectively known as the Triplets. RAND RAND Ki A8 A3 32-bit SRES Ki 64-bit Kc
  • 7. AUTHENTICATION: Once the AuC has generated the triplets, it forwards them to theThe HLR subsequently sends them to the requesting HLR. MSC. MSC stores the Kc and the SRES but forwards the RAND to the MS The and orders it to authenticate. Triplets MSC SRES HLR Request triplets Kc IMSI Triplets IMSI Request authentication Triplets MS AuC BS
  • 8. AUTHENTICATION: The MS has the Ki stored on the SIM card. The A3 and A8 algorithms also reside on the SIM card. The RAND and Ki are inputted into the A3 and A8 algorithm. Generate the SRES and the Kc respectively. RAND MS Ki Ki RAND SIM A3 SRES A8 Kc
  • 9. AUTHENTICATION: The MS stores the Kc on the SIM card and sends the generated SRES back to the network. Triplets RAND MSC SRES Kc IMSI Request authentication Triplets IMSI IF SRES = SRES AUTHENTICATION SUCCESSFUL Triplets Request TMSI or IMSI access Request triplets MS HLR AuC
  • 10. GSM LOCALIZATION: Kind of cell phone tracking mechanism that's possible in GSM phones. The GSM system always knows where a user is currently located. Same phone number is valid worldwide. GSM system performs periodic location updates, even if the user does not use the MS. -provided that the MS is still logged on to the GSM network and is not completely switched off.
  • 12. GSM LOCALIZATION: HOW? The HLR contains information about the current location. The VLR that is currently responsible for the MS informs the HLR about the location of the MS when it changes. Localization can be done in following four ways.. -Network based -Handset based -SIM based -Hybrid
  • 13. GSM LOCALIZATION : HYBRID BASED LOCALIZATION: Uses a combination of Network based, Handset based & SIM based technologies. -makes the location more accurate. Example : Global Positioning System (GPS) space based satellite navigation system. allows small electronic receivers to determine their location
  • 14. GSM LOCALIZATION: To locate an MS and to address the MS following numbers are required..  Mobile Station International ISDN Number (MSISDN) :  Important for GSM user.  Associated with SIM.  Consists of –    Country Code (CC) National Destination Code(NDC) Subscriber Number (SN)
  • 15. GSM LOCALIZATION: International Mobile Subscriber Identity(IMSI) :  GSM uses the IMSI for internal unique identification of a subscriber.  Consists of – Mobile Country Code (MCC) Mobile Network Code(MNC) Mobile Subscriber Identification Number(MSIN)
  • 16. GSM LOCALIZATION: Temporary Mobile Subscriber Identity(TMSI):  Give the exact identity of the user signaling over the air interface.  GSM uses the 4 byte TMSI.  TMSI is selected by the current VLR.  Only valid temporarily and within the location area of VLR.
  • 17. GSM LOCALIZATION: Mobile Station Roaming Number(MSRN) :  Temporary address.  Hides the location of a subscriber.  Consists of – Visitor Country Code(VCC) Visitor National Destination Code (VNDC)
  • 18. GSM HANDOVER: Handover is the process of switching a radio connection from one BS to another in order to maintain seamless radio connection during mobile station movement. HANDOVER BTS BTS
  • 19. 1 Handover request GSM HANDOVER: 1 3 5 6 4 2 2 Forward MSC new BSCa handover request from the old BSC. a handover The receives handoverthe handover by transmitting initiates complete MS sendsthe old radio channels inmessage to the old BSC via new Releasestothe the request to the new BSC. sends handover bursts to the the old MSC forwardsthe MS the connection the MS In order to command establish via old BSC. BSC. BSC. BSC new MSC 3 Handover 2 1 command 4 Handover burst 3 5 Handover BSC BSC 5 complete 6 Release 4 5 3 6 HANDOVER SUCCESSFUL 4 BTS BTS NEW OLD