SlideShare une entreprise Scribd logo
1  sur  104
Mobile Networks Overview
2G/3G/4G/5G with Focus on Core Network
Hamidreza Bolhasani
Ph.D., AI/Data Scientist
hamidreza@bolhasani.net
Dec 2020.
- Self Introduction
- Mobile Networks History
- GSM Overview and concepts
- 2G/3G Network Elements and Protocols
- Basic CS Scenarios Overview
- PS / GPRS / EDGE Introduction
- 4G/LTE Network Architecture and services
- PS / EPC Scenarios Review
- Introduction to 5G and its Services
- Conclusion - Q & A
Table of Contents
Self Introduction
Mobile Networks History
Mobile Networks History
Global System for Mobiles (GSM)
 Cellular Network or Mobile Network is a communication network where the last link is
wireless. The network is distributed over land areas called cells, each served by at least
one fixed-location transceiver, known as a cell or base station.
2G / 3G Overview
GSM /GPRS BSS
BTS
BSC
NodeB
RNC
PCU
UTRAN
SCP
SMS
SCE
PSTN
ISDN
Internet,
Intranet
MSC/VLR GMSC
HLR/AUC
SGSN
CG BG
GGSN
GPRS
Other PLMN
IPBB
2G Radio
 BTS (Base Station Transceiver)
BTS is a piece of equipment that facilitates wireless communication
between user equipment (UE) and a network. UEs are devices like
mobile phones (handsets), WLL phones, computers with wireless
Internet connectivity.
 BSC (Base Station Controller)
BSC is a critical mobile network component that controls one or
more base transceiver stations (BTS), also known as base stations or
cell sites. Key BSC functions include radio network management
(such as radio frequency control), BTS handover management and
call setup. It also carries transcoding of speech channels.
GSM Frequency Bands
ISM Bands
3G Radio
 NodeB
NodeB is a term used in UMTS equivalent to the BTS
(base transceiver station) description used in GSM.
 RNC (Radio Network Controller)
RNC is a governing element in the UMTS radio access
network (UTRAN) and is responsible for controlling the
NodeBs that are connected to it. The RNC carries out
radio resource management, some of the mobility
management functions and is the point where encryption
is done before user data is sent to and from the mobile.
Terminologies - IMSI
MCC MNC MSIN
3 digits 2/3 digits
Not more than 15 digits
IMSI (International Mobile Subscriber Identity)
NMSI
MCC:Mobile Country Code
MNC:Mobile Network Code
MSIN:Mobile Station Identification Number
NMSI:National Mobile Station Identity
IMSI
 IMSI: International Mobile Subscriber Identity
 IMSI is a unique identifier allocated to each mobile subscriber
 Its code type is E.212
 IMSI can be saved in SIM, HLR and VLR and can be transferred through MAP and Wireless interface.
 IMSI has almost 15 digits (0-9) such as 43211xxxxxxxxxx
TMSI
 TMSI: Temporary Mobile Subscriber Identity
 In order to ensure subscriber identity confidentiality, the VLR (Visiting Location Register) and SGSN
(Serving GPRS Support Node) may allocate TMSI to visiting mobile subscribers.
IMEI
TAC FAC spare
6 digits 2 digits
15 digits
IMEI (International Mobile Equipment Identity)
TAC:Type Approval Code
FAC:Final Assembly Code
SNR:Serial Number
spare:Standby bit
Example:490547403767335
SNR
6 digits 1 digits
MSISDN
CC NDC SN
National ( Significant ) Mobile Number
MSISDN:Mobile Station International ISDN number
CC: Country Code, China Country Code is 86
NDC:National Destination Code
SN: Subscriber Number
LAI / GCI / SAI
Location Area Identity
MCC MNC LAC
Cell Global Identity
MCC MNC LAC CI
Service Area Identity
MCC MNC LAC SAC
TAI / TAC
Tracking Area Identity
MCC MNC TAC
2G / 3G Core Network (CN)
 Core Network is split into CS domain and PS domain. CS domain is based
on original GSM network. PS domain is based on original GPRS network.
 CS domain: used to provide Circuit-switched service. Network mode can
support TDM, ATM and IP. Physical entities include switching equipment
(such as MSC/VLR, GMSCs, HSS), and inter-working equipment (IWF).
 PS domain: used to provide Packet-switched service. Network mode is IP.
Physical entities include SGSN, GGSN, CG , BG etc.
2G / 3G Core Network (CN)
 Function entity shared by CS domain and PS :
 MSC Server: Control layer, to realize MM
(Mobility Management), CM (Call Control),
MGC (Media Gateway Control).
 MGW: Bearer layer, to realize the exchange of
voice and media flow, and provide all kinds
sources, such as TC, EC, play announcement
and receive DTMF.
 SG: To realize signaling transfer from MTP (SS7
transmission layer) to SCTP/IP (SIGTRAN).
2G / 3G Core Network (CN)
 HLR/HSS: To realize mobile subscriber
management and location information
management.
 VLR: To deal with all kinds of data
information of current mobile
subscriber.
 AUC: To store authentication
information of mobile subscriber.
 EIR: To store IMEI data of mobile
subscriber.
 SMS: Short Message Center.
Scenario #1 Location Update
MS BSS MSC VLR HLR/AUC
Locating updating
request(IMSI)
Um BSSAP MAP MAP
A B D
Locating updating request
Update location area
(IMSI)
Send parameters(IMSI)
Authentication parameters
(RAND/SRES/Kc,IMSI)
Authenticate
Authentication request
Authentication response Authentication response Update location
Inserte subscriber data
Subscriber data insertion ack.
cancel location
cancel location
ack.
PVLR
Update location ack.
(HLR?)
Set cyphering mode
Forward new TMSI
Update location area ack.
CYPHER MODE COMMAND
CYPHER MODE COMPLETE
Location updating accepte
TMSI reallocation complete TMSI acknowledge
CLEAR COMMAND
CLEAR COMPLETE
imsi/tmsi,old lai,current
lai/gci
Scenario #1 Location Update / Authentication
AUC HLR MSC/VLR MS
Store the authentication
key Ki of all subscribers
in HLR
SIM Card
Store authentication key
Ki, algorithms A3 and A8
Generate
authentication triplet
according to A3 and
A8 algorithms
Temporarily store
authentication
triplet, and deliver
the authentication
triplet to VLR upon
VLR’s request
Store the
authentication
triplets of all
accessed
subscribers
Access request
RAND
Ki
Algorithm
A3
Algorithm
A8
SRESMS Kc
SRESMS
SRESAUC =?
Unequal:
authentication
fail
Equal:
authentication
succeeds
RAN/Kc/SRESAUC
Scenario #1 Location Update / Authentication
A3
RAND
Ki
128 bit 128 bit
SRES* 32 bit
A3
RAND Ki
128 bit 128 bit
SRES 32 bit
SRES* =? SRES SRES
RAND
SRES
32 bit
mobile network SIM
AC
MSC
SIM
Ki: individual subscriber authentication key SRES: signed response
Scenario #2 Call Flow (1/2)
Um A B D
A Um
MSa BSSa MSC VLR HLR
BSSb MSb
channel request
RACH
SDCCH CM service request
(CKSN,IMSI/TMSI)
CM service req.)
CM service req.) Send parameters
(IMSI/TMSI)
Authentication para.
(IMSI,RAND/SRES/Kc)
Authenticate
(RAND,CKSNn)
Authentication request(RAND,CKSNn)
Authentication response(SRES)
Authen. res.(SRES)
Set cyphering mode
Access req. accepted
(IMSI/MSISDN)
CM service accept
CIPHER MODE COMMAND(Kc)
CIPHER MODE COMPLETE
Setup ( MSISDN) Send info. for o/g call setup
Complete Call
Call proceeding
ASSIGNMENT REQUEST
ASSIGNMENT COMPLETE
Send routing info req. (MSISDN, supplyment service info )
Provide roaming number req(IMSI)
Provide roaming number Ind
Send Routing infomation acknowledge
send info.for i/c call setup
page MS(LAI)
PAGING(LAI,IMSI)
Page response
Page response(LAI,GCI)
Scenario #2 Call Flow (2/2)
Um A B D
A Um
MSa BSSa MSC VLR HLR
BSSb MSb
Process access req.
Send para.
(IMSI/TMSI)
Authen. para.
(IMSI,RAND/SRES/Kc)
Authenticate
(RAND,CKSNn)
Authentication request(RAND,CKSNn)
Authentication(SRES)
Authentication response(SRES)
Set cyphering mode
Access request accepted
Complete call
CIPHER MODE COMMAND(Kc)
CIPHER MODE COMPLETE
Setup (calling MSISDN)
Call confirmed
ASSIGNMENT REQUEST
ASSIGNMENT COMPLETE
Alerting
Connect
Connect acknowledge
Alerting
Connect
Connect acknowledge
Scenario #2 Call Flow / Real (1/5)
Scenario #2 Call Flow / Real (2/5)
Scenario #2 Call Flow / Real (3/5)
Scenario #2 Call Flow / Real (4/5)
Scenario #2 Call Flow / Real (5/5)
Scenario #3 SMS MO
GPRS Network Structure
 What is GPRS?
 General Packet Radio Service
 Why GPRS?
 In order to provide the data service out the scope of the fixed network
 GPRS network classification
 GSM GPRS
 UMTS GPRS
 GPRS network background
 GSM GPRS network reuse the existed GSM network
 UMTS GPRS network just change the RAN side
GPRS Network Structure
FR
EIR
HLR
SMS-GMSC
SMS-IWMSC
MSC/VLR
BSS
UTRAN
SGSN
SGSN
GGSN
BG
CG
TE
PDN
SS7
ATM
DDN
ISDN
Ethernet.etc
GPRS
Backbone
Gs Gd Gr Gf Gc
Gb
Iu
Um
Um
Gp
Gi
Gn
Gn
ATM Ga
SCP GMLC
Ge Lg
Ga
GPRS Network Structure
 Some Abbreviation
GPRS: General Packet Radio Service
BSS: Base Station Subsystem
UTRAN: UMTS Terrestrial Radio Access Network
SGSN: Service GPRS Support Node
GGSN: Gateway GPRS Support Node
CG: Charging Gateway
BG: Bordering Gateway
PDN: Packet Data Network
GPRS Network Structure
 Important Entity Function __ SGSN
 Mobility management
− The mobility management functions are used to keep track of the
current location of an MS within the PLMN or within another PLMN.
 Session management
− Session Management (SM) function manages the PDP context of
MS.
 Routing and transfer
− SGSN performs routing and forwarding of service data between
MS and GGSN.
 Charging
− SGSN can generate, store, convert and send CDRs.
 Lawful Interception
 NTP
GPRS Network Structure
 Important Entity Function __ GGSN
Session management
− Session Management (SM) function manages the PDP
context of MS.
Routing and transfer
− GGSN performs routing and forwarding of service data
between MS and internet.
Charging
− GGSN can generate, store, convert and send CDRs.
Dynamic IP allocation
Service management
− Manage APN
GPRS Network Structure
 Important Entity Function __ CG
Real-time collection of GPRS bills
Temporary storage and buffering of GPRS bills
Pre-processing of GPRS bills
Sending GPRS bills to the billing center
GPRS Network Structure
 Important Entity Function | DNS
SGSN GGSN(A)
MS
BSS
GPRS backbone
ISP A
ISP B
Internet/
Intranet
GGSN(B)
DNS
 Resolve the APN to a GGSN IP in the PDP active procedure
 Resolve the RAI to a SGSN IP in the inter-SGSN RAU procedure
 Resolve the RNCID to a SGSN IP in the relocation procedure (UMTS)
Attach Procedure
Reject Causes by GPRS Network
Cause in attach reject Actions in PS domain Actions in CS domain
Illegal MS The MS shall set the GPRS update status to
GU3 ROAMING NOT ALLOWED The
SIM/USIM shall be considered as invalid for
GPRS services until switching off or the
SIM/USIM is removed
If the MS is IMSI attached, the MS
shall in addition set the update
status to U3 ROAMING NOT
ALLOWED, shall delete any TMSI,
LAI and ciphering key sequence
number
Illegal ME
GPRS services not allowed The MS shall set the GPRS update status to
GU3 ROAMING NOT ALLOWED; The
SIM/USIM shall be considered as invalid for
GPRS services until switching off or the
SIM/USIM is removed.
no effect
GPRS services not allowed in this
PLMN
shall set the GPRS update status to GU3
ROAMING NOT ALLOWED
PLMN not allowed shall set the GPRS update status to GU3
ROAMING NOT ALLOWED), shall reset the
GPRS attach attempt counter and shall
change to state GMM-DEREGISTERED
The MS shall perform a PLMN
selection
Location area not allowed
Roaming not allowed in this location
area
No Suitable Cells In Location Area shall set the GPRS update status to GU3
ROAMING NOT ALLOWED
The MS shall search for a suitable
cell in another location area in the
same PLMN
Detach Procedure
2. Delete PDP Context Response
1. Detach Request
2. Delete PDP Context Request
3. Detach Accept
MS BSS/UTRAN GGSN
SGSN
4. PS Signalling Connection Release
Detach type
bit4 bit3 bit2 bit1
power off detach tye
4G/LTE
4G/LTE
4G/LTE Attach
4G/LTE Detach
History of IMS
2000/03 2001/03 2002/03 2005/12 2006/X
3GPP R99
-CN: TDM
 The IMS is introduced as part of 3GPP specifications at the R5
stage, act as a subsystem of the PS domain.
3GPP R4
- CN: MSC
server and
MGW
3GPP R6
- IMS QoS,
Billing, FMC,
etc
3GPP R7
- IMS
enhance
3GPP R5
- CN: IMS
introduced
TISPAN R1
-- NGN/FMC, etc
TISPAN R2
-- NASS/RACS,
etc
IMS Motivations
Legacy Core Network Arch.
Bearer
Control
Service
Charging
Database
Internet
Bearer
Control
Service
Charging
Database
Mobile
Network
Bearer
Control
Service
Charging
Database
Fixed
Network
 Vertical network, overlap in
hardware, service and database
 Separated user and service
 Difficult to decrease OPEX/CAPEX
Multiple Application
IP Bearer
IMS Core
(Unified session control)
Unified Database/Charging
Converged Multi-service Arch.
Multiple Access
 Horizontal network, converge fixed,
mobile and data service network
 Unified database and service
 Access independent
Convergent
Overlapping Cost
IMS Network Architecture
Gaming Conference
3rd Party
Applications
SCP
MGCF
I-CSCF
AGCF
P-CSCF
S-CSCF
HSS
Bearer Control Layer
AG
IAD
PSTN/PLMN
MGW
SIP H.248
xDSL/LAN access
WiFi access
AP
SGSN
2G/3G RAN
SIP Terminals
SIP
SIP
Bearer Core Network
GGSN AC
OMS
OSS
BGCF
IM-SSF OSA Presence PTT IM Group
MRFC
MRFP
Bearer
Control and
Access
Session
control
Service
capability
Application
A-RACF
CCF
SPDF
PCRF
H.248
NACF CLF
IMS Network Entities
Function NE Function NE
Call control
P-CSCF
Network
interworking
MGCF
I-CSCF IM-MGW
S-CSCF BGCF
User
management
HSS
Media
resource
MRFC
SLF MRFP
PLMN/PSTN
S-CSCF MGCF
BGCF
PLMN/PSTN
S-CSCF BGCF 2
BGCF1 MGCF
IMS Call Procedure (Simple Model)
S-CSCF I-CSCF
P-CSCF
P-CSCF
S-CSCF
Caller part
Callee part
signaling media
Media
HSS
DNS/ENUM
5G – Primitives
5G – Near Future
2G  5G Roadmap
Towards  5G
2G  5G Roadmap
5G Motivations
5G IMT-2020
5G – Primitives
5G – Network Architecture
NFV-Network Function Virtualization
5G-CRAN Cloud RAN
5G – Interoperable Network
5GC – Interoperable Network
5GNR – New Radio
5GNR – New Radio
5G Spectrum – mmWave
5G Spectrum – mmWave
5G Spectrum – mmWave
5G Network Slicing
5G Network Slicing
5G Network Slicing
5G Network Slicing
5G & AR / VR
5G & AR / VR
5G & Artificial Intelligence (AI)
5G & Artificial Intelligence (AI)
5G & V2X / Connected Cars
5G & Health
5G & Health
5G & Health
5G & Health
MVNOs role in 5G Market
MVNOs role in Telecom Market
MVNOs role in 5G Market
MVNOs role in 5G Market
Thanks!
Hamid Reza Bolhasani
Hamidreza@Bolhasani.net
Dec 2020

Contenu connexe

Tendances

Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Networkyusufd
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)Rashid Khan
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Hamidreza Bolhasani
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowEricsson Saudi
 
Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)
Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)
Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)Andy Juan Sarango Veliz
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G3G4G
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedurestharinduwije
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
 

Tendances (20)

Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
2 g data call flow
2 g data call flow2 g data call flow
2 g data call flow
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)
Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)
Capitulo 3 - Core de Paquetes y Acceso a una Red (3G)
 
Call flow
Call flowCall flow
Call flow
 
GPRS UMTS in the Core Network
GPRS UMTS in the Core NetworkGPRS UMTS in the Core Network
GPRS UMTS in the Core Network
 
Lte signaling
Lte signalingLte signaling
Lte signaling
 
5gc call flow
5gc call flow5gc call flow
5gc call flow
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
2G & 3G Overview
2G & 3G Overview2G & 3G Overview
2G & 3G Overview
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 

Similaire à 2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network

Similaire à 2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network (20)

Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Switching systems lecture7
Switching  systems lecture7Switching  systems lecture7
Switching systems lecture7
 
Gsm Overview
Gsm OverviewGsm Overview
Gsm Overview
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Basic of teleom gsm
Basic of teleom gsmBasic of teleom gsm
Basic of teleom gsm
 
EC8004 WIRELESS NETWORKS UNIT 3 CORE NETWORK
EC8004 WIRELESS NETWORKS UNIT 3 CORE NETWORKEC8004 WIRELESS NETWORKS UNIT 3 CORE NETWORK
EC8004 WIRELESS NETWORKS UNIT 3 CORE NETWORK
 
Lecture 8 9
Lecture 8 9Lecture 8 9
Lecture 8 9
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
GSM
GSMGSM
GSM
 
02 gsm hscsd_gprs
02 gsm hscsd_gprs02 gsm hscsd_gprs
02 gsm hscsd_gprs
 
Gsm (2)
Gsm (2)Gsm (2)
Gsm (2)
 
7_gsm.ppt
7_gsm.ppt7_gsm.ppt
7_gsm.ppt
 
GSM.ppt
GSM.pptGSM.ppt
GSM.ppt
 
Chapter 3 Telecom Sys.pptx
Chapter 3  Telecom Sys.pptxChapter 3  Telecom Sys.pptx
Chapter 3 Telecom Sys.pptx
 
Gsm presntation
Gsm presntationGsm presntation
Gsm presntation
 
Gsm presntation
Gsm presntationGsm presntation
Gsm presntation
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
bsnl presentation on gsm
bsnl presentation on  gsm bsnl presentation on  gsm
bsnl presentation on gsm
 
Full gsm overview (modified)
Full gsm overview  (modified)Full gsm overview  (modified)
Full gsm overview (modified)
 
Gsm
GsmGsm
Gsm
 

Plus de Hamidreza Bolhasani

Introduction to Research Methodology
Introduction to Research MethodologyIntroduction to Research Methodology
Introduction to Research MethodologyHamidreza Bolhasani
 
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Hamidreza Bolhasani
 
An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...
An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...
An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...Hamidreza Bolhasani
 
NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)Hamidreza Bolhasani
 
5G New Services - Opportunities and Challenges
5G New Services - Opportunities and Challenges5G New Services - Opportunities and Challenges
5G New Services - Opportunities and ChallengesHamidreza Bolhasani
 
5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical Sciences5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical SciencesHamidreza Bolhasani
 
Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)Hamidreza Bolhasani
 
Machine Learning in R - Part 1: Correlation and Regression (Basics)
Machine Learning in R - Part 1: Correlation and Regression (Basics)Machine Learning in R - Part 1: Correlation and Regression (Basics)
Machine Learning in R - Part 1: Correlation and Regression (Basics)Hamidreza Bolhasani
 
An Introduction to Quantum Computers Architecture
An Introduction to Quantum Computers ArchitectureAn Introduction to Quantum Computers Architecture
An Introduction to Quantum Computers ArchitectureHamidreza Bolhasani
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
High-Tech Telecommunication (4G/LTE) overview with focus on new services
High-Tech Telecommunication (4G/LTE) overview with focus on new servicesHigh-Tech Telecommunication (4G/LTE) overview with focus on new services
High-Tech Telecommunication (4G/LTE) overview with focus on new servicesHamidreza Bolhasani
 

Plus de Hamidreza Bolhasani (12)

Introduction to Research Methodology
Introduction to Research MethodologyIntroduction to Research Methodology
Introduction to Research Methodology
 
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
 
An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...
An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...
An Overview on the role of Artificial Intelligence (AI) and Deep Neural Netwo...
 
5G Network Overview
 5G Network Overview 5G Network Overview
5G Network Overview
 
NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)
 
5G New Services - Opportunities and Challenges
5G New Services - Opportunities and Challenges5G New Services - Opportunities and Challenges
5G New Services - Opportunities and Challenges
 
5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical Sciences5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical Sciences
 
Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)
 
Machine Learning in R - Part 1: Correlation and Regression (Basics)
Machine Learning in R - Part 1: Correlation and Regression (Basics)Machine Learning in R - Part 1: Correlation and Regression (Basics)
Machine Learning in R - Part 1: Correlation and Regression (Basics)
 
An Introduction to Quantum Computers Architecture
An Introduction to Quantum Computers ArchitectureAn Introduction to Quantum Computers Architecture
An Introduction to Quantum Computers Architecture
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
High-Tech Telecommunication (4G/LTE) overview with focus on new services
High-Tech Telecommunication (4G/LTE) overview with focus on new servicesHigh-Tech Telecommunication (4G/LTE) overview with focus on new services
High-Tech Telecommunication (4G/LTE) overview with focus on new services
 

Dernier

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network

  • 1. Mobile Networks Overview 2G/3G/4G/5G with Focus on Core Network Hamidreza Bolhasani Ph.D., AI/Data Scientist hamidreza@bolhasani.net Dec 2020.
  • 2. - Self Introduction - Mobile Networks History - GSM Overview and concepts - 2G/3G Network Elements and Protocols - Basic CS Scenarios Overview - PS / GPRS / EDGE Introduction - 4G/LTE Network Architecture and services - PS / EPC Scenarios Review - Introduction to 5G and its Services - Conclusion - Q & A Table of Contents
  • 6.
  • 7. Global System for Mobiles (GSM)  Cellular Network or Mobile Network is a communication network where the last link is wireless. The network is distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell or base station.
  • 8. 2G / 3G Overview GSM /GPRS BSS BTS BSC NodeB RNC PCU UTRAN SCP SMS SCE PSTN ISDN Internet, Intranet MSC/VLR GMSC HLR/AUC SGSN CG BG GGSN GPRS Other PLMN IPBB
  • 9. 2G Radio  BTS (Base Station Transceiver) BTS is a piece of equipment that facilitates wireless communication between user equipment (UE) and a network. UEs are devices like mobile phones (handsets), WLL phones, computers with wireless Internet connectivity.  BSC (Base Station Controller) BSC is a critical mobile network component that controls one or more base transceiver stations (BTS), also known as base stations or cell sites. Key BSC functions include radio network management (such as radio frequency control), BTS handover management and call setup. It also carries transcoding of speech channels.
  • 12. 3G Radio  NodeB NodeB is a term used in UMTS equivalent to the BTS (base transceiver station) description used in GSM.  RNC (Radio Network Controller) RNC is a governing element in the UMTS radio access network (UTRAN) and is responsible for controlling the NodeBs that are connected to it. The RNC carries out radio resource management, some of the mobility management functions and is the point where encryption is done before user data is sent to and from the mobile.
  • 13. Terminologies - IMSI MCC MNC MSIN 3 digits 2/3 digits Not more than 15 digits IMSI (International Mobile Subscriber Identity) NMSI MCC:Mobile Country Code MNC:Mobile Network Code MSIN:Mobile Station Identification Number NMSI:National Mobile Station Identity
  • 14. IMSI  IMSI: International Mobile Subscriber Identity  IMSI is a unique identifier allocated to each mobile subscriber  Its code type is E.212  IMSI can be saved in SIM, HLR and VLR and can be transferred through MAP and Wireless interface.  IMSI has almost 15 digits (0-9) such as 43211xxxxxxxxxx
  • 15. TMSI  TMSI: Temporary Mobile Subscriber Identity  In order to ensure subscriber identity confidentiality, the VLR (Visiting Location Register) and SGSN (Serving GPRS Support Node) may allocate TMSI to visiting mobile subscribers.
  • 16. IMEI TAC FAC spare 6 digits 2 digits 15 digits IMEI (International Mobile Equipment Identity) TAC:Type Approval Code FAC:Final Assembly Code SNR:Serial Number spare:Standby bit Example:490547403767335 SNR 6 digits 1 digits
  • 17. MSISDN CC NDC SN National ( Significant ) Mobile Number MSISDN:Mobile Station International ISDN number CC: Country Code, China Country Code is 86 NDC:National Destination Code SN: Subscriber Number
  • 18. LAI / GCI / SAI Location Area Identity MCC MNC LAC Cell Global Identity MCC MNC LAC CI Service Area Identity MCC MNC LAC SAC
  • 19. TAI / TAC Tracking Area Identity MCC MNC TAC
  • 20. 2G / 3G Core Network (CN)  Core Network is split into CS domain and PS domain. CS domain is based on original GSM network. PS domain is based on original GPRS network.  CS domain: used to provide Circuit-switched service. Network mode can support TDM, ATM and IP. Physical entities include switching equipment (such as MSC/VLR, GMSCs, HSS), and inter-working equipment (IWF).  PS domain: used to provide Packet-switched service. Network mode is IP. Physical entities include SGSN, GGSN, CG , BG etc.
  • 21. 2G / 3G Core Network (CN)  Function entity shared by CS domain and PS :  MSC Server: Control layer, to realize MM (Mobility Management), CM (Call Control), MGC (Media Gateway Control).  MGW: Bearer layer, to realize the exchange of voice and media flow, and provide all kinds sources, such as TC, EC, play announcement and receive DTMF.  SG: To realize signaling transfer from MTP (SS7 transmission layer) to SCTP/IP (SIGTRAN).
  • 22. 2G / 3G Core Network (CN)  HLR/HSS: To realize mobile subscriber management and location information management.  VLR: To deal with all kinds of data information of current mobile subscriber.  AUC: To store authentication information of mobile subscriber.  EIR: To store IMEI data of mobile subscriber.  SMS: Short Message Center.
  • 23. Scenario #1 Location Update MS BSS MSC VLR HLR/AUC Locating updating request(IMSI) Um BSSAP MAP MAP A B D Locating updating request Update location area (IMSI) Send parameters(IMSI) Authentication parameters (RAND/SRES/Kc,IMSI) Authenticate Authentication request Authentication response Authentication response Update location Inserte subscriber data Subscriber data insertion ack. cancel location cancel location ack. PVLR Update location ack. (HLR?) Set cyphering mode Forward new TMSI Update location area ack. CYPHER MODE COMMAND CYPHER MODE COMPLETE Location updating accepte TMSI reallocation complete TMSI acknowledge CLEAR COMMAND CLEAR COMPLETE imsi/tmsi,old lai,current lai/gci
  • 24. Scenario #1 Location Update / Authentication AUC HLR MSC/VLR MS Store the authentication key Ki of all subscribers in HLR SIM Card Store authentication key Ki, algorithms A3 and A8 Generate authentication triplet according to A3 and A8 algorithms Temporarily store authentication triplet, and deliver the authentication triplet to VLR upon VLR’s request Store the authentication triplets of all accessed subscribers Access request RAND Ki Algorithm A3 Algorithm A8 SRESMS Kc SRESMS SRESAUC =? Unequal: authentication fail Equal: authentication succeeds RAN/Kc/SRESAUC
  • 25. Scenario #1 Location Update / Authentication A3 RAND Ki 128 bit 128 bit SRES* 32 bit A3 RAND Ki 128 bit 128 bit SRES 32 bit SRES* =? SRES SRES RAND SRES 32 bit mobile network SIM AC MSC SIM Ki: individual subscriber authentication key SRES: signed response
  • 26. Scenario #2 Call Flow (1/2) Um A B D A Um MSa BSSa MSC VLR HLR BSSb MSb channel request RACH SDCCH CM service request (CKSN,IMSI/TMSI) CM service req.) CM service req.) Send parameters (IMSI/TMSI) Authentication para. (IMSI,RAND/SRES/Kc) Authenticate (RAND,CKSNn) Authentication request(RAND,CKSNn) Authentication response(SRES) Authen. res.(SRES) Set cyphering mode Access req. accepted (IMSI/MSISDN) CM service accept CIPHER MODE COMMAND(Kc) CIPHER MODE COMPLETE Setup ( MSISDN) Send info. for o/g call setup Complete Call Call proceeding ASSIGNMENT REQUEST ASSIGNMENT COMPLETE Send routing info req. (MSISDN, supplyment service info ) Provide roaming number req(IMSI) Provide roaming number Ind Send Routing infomation acknowledge send info.for i/c call setup page MS(LAI) PAGING(LAI,IMSI) Page response Page response(LAI,GCI)
  • 27. Scenario #2 Call Flow (2/2) Um A B D A Um MSa BSSa MSC VLR HLR BSSb MSb Process access req. Send para. (IMSI/TMSI) Authen. para. (IMSI,RAND/SRES/Kc) Authenticate (RAND,CKSNn) Authentication request(RAND,CKSNn) Authentication(SRES) Authentication response(SRES) Set cyphering mode Access request accepted Complete call CIPHER MODE COMMAND(Kc) CIPHER MODE COMPLETE Setup (calling MSISDN) Call confirmed ASSIGNMENT REQUEST ASSIGNMENT COMPLETE Alerting Connect Connect acknowledge Alerting Connect Connect acknowledge
  • 28. Scenario #2 Call Flow / Real (1/5)
  • 29. Scenario #2 Call Flow / Real (2/5)
  • 30. Scenario #2 Call Flow / Real (3/5)
  • 31. Scenario #2 Call Flow / Real (4/5)
  • 32. Scenario #2 Call Flow / Real (5/5)
  • 34. GPRS Network Structure  What is GPRS?  General Packet Radio Service  Why GPRS?  In order to provide the data service out the scope of the fixed network  GPRS network classification  GSM GPRS  UMTS GPRS  GPRS network background  GSM GPRS network reuse the existed GSM network  UMTS GPRS network just change the RAN side
  • 36. GPRS Network Structure  Some Abbreviation GPRS: General Packet Radio Service BSS: Base Station Subsystem UTRAN: UMTS Terrestrial Radio Access Network SGSN: Service GPRS Support Node GGSN: Gateway GPRS Support Node CG: Charging Gateway BG: Bordering Gateway PDN: Packet Data Network
  • 37. GPRS Network Structure  Important Entity Function __ SGSN  Mobility management − The mobility management functions are used to keep track of the current location of an MS within the PLMN or within another PLMN.  Session management − Session Management (SM) function manages the PDP context of MS.  Routing and transfer − SGSN performs routing and forwarding of service data between MS and GGSN.  Charging − SGSN can generate, store, convert and send CDRs.  Lawful Interception  NTP
  • 38. GPRS Network Structure  Important Entity Function __ GGSN Session management − Session Management (SM) function manages the PDP context of MS. Routing and transfer − GGSN performs routing and forwarding of service data between MS and internet. Charging − GGSN can generate, store, convert and send CDRs. Dynamic IP allocation Service management − Manage APN
  • 39. GPRS Network Structure  Important Entity Function __ CG Real-time collection of GPRS bills Temporary storage and buffering of GPRS bills Pre-processing of GPRS bills Sending GPRS bills to the billing center
  • 40. GPRS Network Structure  Important Entity Function | DNS SGSN GGSN(A) MS BSS GPRS backbone ISP A ISP B Internet/ Intranet GGSN(B) DNS  Resolve the APN to a GGSN IP in the PDP active procedure  Resolve the RAI to a SGSN IP in the inter-SGSN RAU procedure  Resolve the RNCID to a SGSN IP in the relocation procedure (UMTS)
  • 42. Reject Causes by GPRS Network Cause in attach reject Actions in PS domain Actions in CS domain Illegal MS The MS shall set the GPRS update status to GU3 ROAMING NOT ALLOWED The SIM/USIM shall be considered as invalid for GPRS services until switching off or the SIM/USIM is removed If the MS is IMSI attached, the MS shall in addition set the update status to U3 ROAMING NOT ALLOWED, shall delete any TMSI, LAI and ciphering key sequence number Illegal ME GPRS services not allowed The MS shall set the GPRS update status to GU3 ROAMING NOT ALLOWED; The SIM/USIM shall be considered as invalid for GPRS services until switching off or the SIM/USIM is removed. no effect GPRS services not allowed in this PLMN shall set the GPRS update status to GU3 ROAMING NOT ALLOWED PLMN not allowed shall set the GPRS update status to GU3 ROAMING NOT ALLOWED), shall reset the GPRS attach attempt counter and shall change to state GMM-DEREGISTERED The MS shall perform a PLMN selection Location area not allowed Roaming not allowed in this location area No Suitable Cells In Location Area shall set the GPRS update status to GU3 ROAMING NOT ALLOWED The MS shall search for a suitable cell in another location area in the same PLMN
  • 43. Detach Procedure 2. Delete PDP Context Response 1. Detach Request 2. Delete PDP Context Request 3. Detach Accept MS BSS/UTRAN GGSN SGSN 4. PS Signalling Connection Release Detach type bit4 bit3 bit2 bit1 power off detach tye
  • 48. History of IMS 2000/03 2001/03 2002/03 2005/12 2006/X 3GPP R99 -CN: TDM  The IMS is introduced as part of 3GPP specifications at the R5 stage, act as a subsystem of the PS domain. 3GPP R4 - CN: MSC server and MGW 3GPP R6 - IMS QoS, Billing, FMC, etc 3GPP R7 - IMS enhance 3GPP R5 - CN: IMS introduced TISPAN R1 -- NGN/FMC, etc TISPAN R2 -- NASS/RACS, etc
  • 49. IMS Motivations Legacy Core Network Arch. Bearer Control Service Charging Database Internet Bearer Control Service Charging Database Mobile Network Bearer Control Service Charging Database Fixed Network  Vertical network, overlap in hardware, service and database  Separated user and service  Difficult to decrease OPEX/CAPEX Multiple Application IP Bearer IMS Core (Unified session control) Unified Database/Charging Converged Multi-service Arch. Multiple Access  Horizontal network, converge fixed, mobile and data service network  Unified database and service  Access independent Convergent Overlapping Cost
  • 50. IMS Network Architecture Gaming Conference 3rd Party Applications SCP MGCF I-CSCF AGCF P-CSCF S-CSCF HSS Bearer Control Layer AG IAD PSTN/PLMN MGW SIP H.248 xDSL/LAN access WiFi access AP SGSN 2G/3G RAN SIP Terminals SIP SIP Bearer Core Network GGSN AC OMS OSS BGCF IM-SSF OSA Presence PTT IM Group MRFC MRFP Bearer Control and Access Session control Service capability Application A-RACF CCF SPDF PCRF H.248 NACF CLF
  • 51. IMS Network Entities Function NE Function NE Call control P-CSCF Network interworking MGCF I-CSCF IM-MGW S-CSCF BGCF User management HSS Media resource MRFC SLF MRFP PLMN/PSTN S-CSCF MGCF BGCF PLMN/PSTN S-CSCF BGCF 2 BGCF1 MGCF
  • 52. IMS Call Procedure (Simple Model) S-CSCF I-CSCF P-CSCF P-CSCF S-CSCF Caller part Callee part signaling media Media HSS DNS/ENUM
  • 53.
  • 54.
  • 55.
  • 57. 5G – Near Future
  • 58. 2G  5G Roadmap
  • 60. 2G  5G Roadmap
  • 64. 5G – Network Architecture
  • 69. 5GNR – New Radio
  • 70. 5GNR – New Radio
  • 71.
  • 72. 5G Spectrum – mmWave
  • 73. 5G Spectrum – mmWave
  • 74. 5G Spectrum – mmWave
  • 79.
  • 80. 5G & AR / VR
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86. 5G & AR / VR
  • 87.
  • 88.
  • 89.
  • 90. 5G & Artificial Intelligence (AI)
  • 91. 5G & Artificial Intelligence (AI)
  • 92.
  • 93.
  • 94. 5G & V2X / Connected Cars
  • 99.
  • 100. MVNOs role in 5G Market
  • 101. MVNOs role in Telecom Market
  • 102. MVNOs role in 5G Market
  • 103. MVNOs role in 5G Market