SlideShare a Scribd company logo
1 of 39
Basic Concepts of Cellular
Networks and Mobile IP
Aug 31, 2005
Mayur.M.Parmar
• Evolution of Cellular Networks
• Architectures
– AMPS
– GSM
• Security Mechanisms in GSM
Cellular Networks: Agenda
Origin of Wireless Communications
• Wireless communications gained popularity in
1930’s
– Mainly used for public safety by police and other
government organizations
– Not connected to the PSTN (Public Switching
Telephone Networks)
• First public mobile telephone service started in
1946 in United States
– Using a single high power transmitter and large tower
to cover an area of 50 km
Concept of Cellular Networks
• A single high power
transmitter services one
larger area  multiple low
power transmitters service
multiple smaller areas
(Cells)
• Frequency can be reused
by cells far away from each
other  improve usage
• A set of cells that do not
share frequency form a
cluster
• The cluster is then
replicated throughout the
desired communication
area
Evolution of Cellular Networks
1G 2G 3G 4G2.5G
Analog Digital
Circuit-switching Packet-switching
1G Systems
• Goal: To develop a working system that could
provide basic voice service
• Time frame: 1970-1990
• Technology: FDMA/FDD
• Example Systems:
– Advanced Mobile Phone System (AMPS-USA)
– Total Access Communication System (TACS-UK)
– Nordic Mobile Telephone (NMT-Europe)
• Incompatible analog systems
2G Systems
• Goal: Digital voice service with improved quality
and also provide better data services
• Time Frame: 1990- 2000
• Technology: TDMA/TDD, CDMA
• Example Systems:
– Global System for Mobile (GSM-Europe)
– IS-136(TDMA)
– IS-95 (CDMA)
• Goal: To provide better data rates and wider
range of data services and also act as a
transition to 3G
• Time frame: 2000-2002
• Systems:
– IS-95B
– High Speed Circuit Switched Data (HSCSD)
– General Packet Radio Service (GPRS)
– Enhanced Data rates for GSM Evolution (EDGE)
2.5G Systems
• Goal: High speed wireless data access and
unified universal standard
• Time frame: 2002-
• Two competing standards
– One based on GSM, IS-136 and PDC known as
3GPP
– Other based on IS-95 named 3GPP2
• Completely move from circuit switching to
packet switching
• Enhanced data rates of 2-20Mbps
3G Systems
• Future systems
• Goal:
– High mobility, High data rate, IP based
network
– Hybrid network that can interoperate with
other networks
4G Systems
AMPS
• 1G system developed by Bell Labs
• Analog system used FDMA/FDD
• 40Mhz of spectrum
• 842 channels
• rate: 10kbps
Public
Switched
Telephone
Network
MTSO
(MSC)
BTS
BTS
BTS
BTS
MTSO: Mobile Telecommunication Switching Office
Also known as MSC (Mobile Switching Center)
BTS: Base Transceiver Station
AMPS: Architecture
Public
Switched
Telephone
Network
MTSO
(MSC)
BTS
BTS
BTS
BTS
Paging
message
Paging
message
Paging
message
Paging
message
AMPS: Conventional Telephone  Cell Phone
• Call arrives at MSC via the PSTN
• MSC then sends out a paging message via all
BTS on the FCC (Forward Control Channel).
• The paging message contains subscriber’s
Mobile Identification Number (MIN)
• The mobile unit responds with an
acknowledgement on the RCC (Reverse
Control Channel)
• MSC directs BS to assign FVC (Forward Voice
Channel) and RVC (Reverse Voice Channel)
AMPS: Conventional Telephone  Cell Phone
• Subscriber unit transmits an origination
message on the RCC
• Origination message contains
– MIN
– Electronic Serial Number
– Station Class Mark
– Destination phone number
• If BTS receives it correctly then it is passed on to
MSC
• MSC validates the information and connects the
call
AMPS: Cell phone initializes a call
• GSM system consists of three interconnected sub-
systems
– Base station Subsystem
• Mobile station (MS)
• Base Transceiver Station (BTS)
• Base Station Controllers (BSC)
– Network Switching Subsystem (NSS)
• Mobile Switching Center (MSC)
• Home Location Register (HLR)
• Visitor Location Register (VLR)
• Authentication center (AUC)
– Operation Support Subsystem
• Operation Maintenance Centers
GSM: Architecture
Base Station Subsystem
BSC
BSC
BTS
BTS
BTS
BTS
BTS
BTS
BTS
BTS
•BSCs connect the MS to the NSS
•The BTS provides last mile connection to the MS
and communication is between the BTS and MS
•Handover between BTS within same BSC is handled by the BSC
GSM
BSC
BSC
BTS
BTS
BTS
BTS
BTS
BTS
BTS
BTS
Base Station Subsystem
MSC
HLR VLR AUC
Public Networks
Network Switching Subsystem
OSS
Operation Support Subsystem
GSM
• Principles
– Only authenticated users are allowed to access the
network
– No user data or voice communication is transmitted in
“clear text”
• The subscriber identity module (SIM) card is a
vital part of GSM security. It stores
– International Mobile Subscriber Identity (IMSI)
– Ciphering Key Generating Algorithm (A8)
– Authentication Algorithm (A3)
– Personal Identification Number
– Individual Subscriber Authentication Key (Ki)
Security in GSM
• Mobile station contains
– A5 algorithm and IMEI
• The network stores
– A3, A5, A8 algorithms
• The Authentication Center stores
– IMSI
– Temporary Mobile Subscriber Identity (TMSI)
– Individual Subscriber Authentication Key (Ki)
Security in GSM
Channel Establishment
Identity (TMSI or IMSI)
Authentication Request (RAND) Run Authentication
Algorithm (RAND)
Response
(SRES,Kc)
Authentication Response (SRES)
•RAND is 128 bit random
sequence
•SRES is signed response
generated for
authentication
Security in GSM: Authentication
Network
Mobile
Station
SIM
At the Network end
At the Mobile user end in the SIM
A3 Algorithm
RAND (challenge)
Ki (128 bit)
Transmitted to mobile
A3 Algorithm
RAND (challenge)
Ki (128 bit)
A8 Algorithm
Kc used for encryption
of user data and
signaling data
Proper authentication
completed if result is zero
Transmitted
back to base
station
Authentication based on RAND
• Ki is known only to the operator who programs
the SIM card and is tied to IMSI
• IMSI should be transmitted as less as possible.
• Only TMSI is used for authentication
• TMSI is periodically updated
Security in GSM: Authentication
• GSM uses symmetric cryptography
– Data is encrypted using an algorithm which is seeded
by the ciphering key Kc
• Kc is known only to base station and mobile
phone and is frequently changed
• The A5 algorithm is used for ciphering the data
• Along with Kc the algorithm is ‘seeded’ by the
value based on the TDMA frame
• Internal state of the algorithm is flushed after a
burst
Security in GSM: Data Encryption
A5 algorithm
Kc (from A8 algorithm)
Count
(from TDMA frame)
User Data
Xor
Encoded
message
Security in GSM: Authentication
• Why Mobile IP?
• Basic Principle of Mobile IP
• Route Optimization
Mobile IP: Agenda
• Internet hosts/interfaces are identified by IP address
– Domain name service (DNS) translates host name to IP
address
– IP address identifies host/interface and locates its network
IP Addressing
Gateway
Host 1 MH
129.168.105.126 129.168.105.124
ISU: 129.168.*.*
Internet
Host 2
Gateway
130.203.4.112
PSU:
130.203.*.*
• A host move to another network requires different
network address
– But this would change the host’s identity
– How can others still reach the moving host? How can on-
going connections to the moving host be not interrupted?
• Applications
– GPRS (2.5G), 3G cellular networks
– Mission-critical applications
• IP devices held by police, ambulance, coast guards are always
connected when moving
– Moving offices, …
Problems
CH
MH
Home network
MH
CHMH = mobile host CH = correspondent host
Home network Foreign network
Foreign network
How to direct packets to moving hosts transparently?
Routing for Mobile Host
• An analogy: what do you do when moving from one
apartment to another?
– Leave a forwarding address with your old post-office!
– The old post-office forwards mails to your new post-
office, which then forwards them to you
• Mobile IP:
– Two other entities – home agent (old post-office), foreign
agent (new post-office)
– Mobile host registers with home agent the new location
– Home agent captures packets meant for mobile host, and
forwards it to the foreign agent, which then delivers it to
the mobile host
Mobile IP: Basic Idea
MH = mobile host CH = correspondent host
HA = home agent FA = foreign agent
•MH discovers a FA in the foreign network.
•MH seeks a care-off address from the FA
•MH registers/authenticates its care-off address to the HA in its home
network.
HA
CH
Home network Foreign network
FAMH
A MH Moves to a Foreign Network
129.186.*.* 130.203.*.*
129.186.105.216
130.203.4.112
•HA receives packets for the MH.
•HA tunnels packets to FA
•FA decapsulates packets and delivers them to MH
HA
CH
Home network Foreign network
FA MH
Packets towards MH
MH = mobile host CH = correspondent host
HA = home agent FA = foreign agent
Source address = address of CH
Destination address = home IP address of MH
Payload
Source address = address of HA
Destination address = care-of address of MH
Source address = address of CH
Destination address = home IP address of MH
Original payload
Packet from CH to MH
Home agent intercepts above packet and tunnels it
Packet Addressing
HA
CH
Home network Foreign network #1
FA #1 MH
Foreign network #2
FA #2 MH
•MH registers new address (FA #2) with HA & FA #1
•HA tunnels packets to FA #2, which delivers them to MH
•Packets in flight can be forwarded from FA #1 to FA #2
If MH Moves Again
HA
CH
Home network Foreign network
FA MH
Mobile hosts also send packets
•Mobile host uses its home IP address as source address
-Lower latency
-Still transparent to correspondent host
-No obvious need to encapsulate packet to CH
-Triangle Routing
Packets from MH
HA
CH
Home network Foreign network
FA MH
•When HA receives a packet (from CH) to tunnel to FA:
•It sends a binding message to CH with the care-of address
of the MH.
•CH caches the address, and forward later packets directly
to the care-of address.
Route Optimization
• When a FA receives a tunneled message,
but sees no visitor entry for the mobile
host, it generates a binding warning
message to the appropriate HA
• When a HA receives a warning, it issues
an update message to the CH, which
removes the care-of address from its
cache.
Route Optimization
• Topic of next class: Wireless LAN and
Mobile Ad Hoc Network
• Reminder: pick the papers you want to
present (with preferred dates if you want)
ASAP.
Notice

More Related Content

What's hot

Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principles
Supper Mario
 
03 Wireless Concept
03 Wireless Concept03 Wireless Concept
03 Wireless Concept
Tempus Telcosys
 

What's hot (20)

Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Gsm and Gprs Ppt
Gsm and Gprs PptGsm and Gprs Ppt
Gsm and Gprs Ppt
 
BASIC GSM
BASIC GSMBASIC GSM
BASIC GSM
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principles
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Gsm network
Gsm networkGsm network
Gsm network
 
Gsm, gprs, edge presentation
Gsm, gprs, edge presentationGsm, gprs, edge presentation
Gsm, gprs, edge presentation
 
Gprs ppt
Gprs pptGprs ppt
Gprs ppt
 
03 Wireless Concept
03 Wireless Concept03 Wireless Concept
03 Wireless Concept
 
gprs
gprsgprs
gprs
 
Gsm (1)
Gsm (1)Gsm (1)
Gsm (1)
 
GSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency ReuseGSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency Reuse
 
GPRS seminar ppt
GPRS seminar pptGPRS seminar ppt
GPRS seminar ppt
 
3g
3g3g
3g
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
Gsm (2)
Gsm (2)Gsm (2)
Gsm (2)
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
GSM Radio interface
GSM Radio interfaceGSM Radio interface
GSM Radio interface
 
WCDMA
WCDMAWCDMA
WCDMA
 

Viewers also liked (8)

H ip qo s for 3g
H ip qo s for 3gH ip qo s for 3g
H ip qo s for 3g
 
2003 salih 3_gdata1
2003 salih 3_gdata12003 salih 3_gdata1
2003 salih 3_gdata1
 
Ip and 3 g
Ip and 3 gIp and 3 g
Ip and 3 g
 
12. mobile ip
12. mobile ip12. mobile ip
12. mobile ip
 
Mobile ip np
Mobile ip npMobile ip np
Mobile ip np
 
Wcdma Core Network Introduction
Wcdma Core Network IntroductionWcdma Core Network Introduction
Wcdma Core Network Introduction
 
3G IP Architecture
3G IP Architecture3G IP Architecture
3G IP Architecture
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 

Similar to MK by Mobile Communication

694 cellular network
694 cellular network694 cellular network
694 cellular network
Anubha Rai
 
GSM Network 3G Technologies
GSM Network 3G TechnologiesGSM Network 3G Technologies
GSM Network 3G Technologies
Sajid Marwat
 

Similar to MK by Mobile Communication (20)

1cellulñar network
1cellulñar network1cellulñar network
1cellulñar network
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
 
cellular networks
 cellular networks cellular networks
cellular networks
 
2 g 3g_4g_tutorial
2 g 3g_4g_tutorial2 g 3g_4g_tutorial
2 g 3g_4g_tutorial
 
Telecom journey tutorial
Telecom journey tutorialTelecom journey tutorial
Telecom journey tutorial
 
694_CELLULAR_NETWORK.ppt
694_CELLULAR_NETWORK.ppt694_CELLULAR_NETWORK.ppt
694_CELLULAR_NETWORK.ppt
 
Mobile Handset Cellular Network
Mobile Handset Cellular NetworkMobile Handset Cellular Network
Mobile Handset Cellular Network
 
5432_CELLULAR_NETWORK.ppt
5432_CELLULAR_NETWORK.ppt5432_CELLULAR_NETWORK.ppt
5432_CELLULAR_NETWORK.ppt
 
Cellular network
Cellular networkCellular network
Cellular network
 
2G_3G_4G_Tutorial.ppt
2G_3G_4G_Tutorial.ppt2G_3G_4G_Tutorial.ppt
2G_3G_4G_Tutorial.ppt
 
128-ch2.pptx
128-ch2.pptx128-ch2.pptx
128-ch2.pptx
 
Cellular network
Cellular networkCellular network
Cellular network
 
694 cellular network
694 cellular network694 cellular network
694 cellular network
 
2 g 3g_4g - brief
2 g 3g_4g - brief2 g 3g_4g - brief
2 g 3g_4g - brief
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
 
Lectures on 2 g,3g,3.5g,4g
Lectures on 2 g,3g,3.5g,4gLectures on 2 g,3g,3.5g,4g
Lectures on 2 g,3g,3.5g,4g
 
Lectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas Khan
Lectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas KhanLectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas Khan
Lectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas Khan
 
GSM Network 3G Technologies
GSM Network 3G TechnologiesGSM Network 3G Technologies
GSM Network 3G Technologies
 
Global system for mobile communcation by Maroof and Ummer
Global system for mobile communcation by Maroof and Ummer Global system for mobile communcation by Maroof and Ummer
Global system for mobile communcation by Maroof and Ummer
 

Recently uploaded

一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
aqpto5bt
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Valters Lauzums
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
dq9vz1isj
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
zifhagzkk
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
23050636
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
great91
 

Recently uploaded (20)

一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data Analytics
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 

MK by Mobile Communication

  • 1. Basic Concepts of Cellular Networks and Mobile IP Aug 31, 2005 Mayur.M.Parmar
  • 2. • Evolution of Cellular Networks • Architectures – AMPS – GSM • Security Mechanisms in GSM Cellular Networks: Agenda
  • 3. Origin of Wireless Communications • Wireless communications gained popularity in 1930’s – Mainly used for public safety by police and other government organizations – Not connected to the PSTN (Public Switching Telephone Networks) • First public mobile telephone service started in 1946 in United States – Using a single high power transmitter and large tower to cover an area of 50 km
  • 4. Concept of Cellular Networks • A single high power transmitter services one larger area  multiple low power transmitters service multiple smaller areas (Cells) • Frequency can be reused by cells far away from each other  improve usage • A set of cells that do not share frequency form a cluster • The cluster is then replicated throughout the desired communication area
  • 5. Evolution of Cellular Networks 1G 2G 3G 4G2.5G Analog Digital Circuit-switching Packet-switching
  • 6. 1G Systems • Goal: To develop a working system that could provide basic voice service • Time frame: 1970-1990 • Technology: FDMA/FDD • Example Systems: – Advanced Mobile Phone System (AMPS-USA) – Total Access Communication System (TACS-UK) – Nordic Mobile Telephone (NMT-Europe) • Incompatible analog systems
  • 7. 2G Systems • Goal: Digital voice service with improved quality and also provide better data services • Time Frame: 1990- 2000 • Technology: TDMA/TDD, CDMA • Example Systems: – Global System for Mobile (GSM-Europe) – IS-136(TDMA) – IS-95 (CDMA)
  • 8. • Goal: To provide better data rates and wider range of data services and also act as a transition to 3G • Time frame: 2000-2002 • Systems: – IS-95B – High Speed Circuit Switched Data (HSCSD) – General Packet Radio Service (GPRS) – Enhanced Data rates for GSM Evolution (EDGE) 2.5G Systems
  • 9. • Goal: High speed wireless data access and unified universal standard • Time frame: 2002- • Two competing standards – One based on GSM, IS-136 and PDC known as 3GPP – Other based on IS-95 named 3GPP2 • Completely move from circuit switching to packet switching • Enhanced data rates of 2-20Mbps 3G Systems
  • 10.
  • 11. • Future systems • Goal: – High mobility, High data rate, IP based network – Hybrid network that can interoperate with other networks 4G Systems
  • 12. AMPS • 1G system developed by Bell Labs • Analog system used FDMA/FDD • 40Mhz of spectrum • 842 channels • rate: 10kbps
  • 13. Public Switched Telephone Network MTSO (MSC) BTS BTS BTS BTS MTSO: Mobile Telecommunication Switching Office Also known as MSC (Mobile Switching Center) BTS: Base Transceiver Station AMPS: Architecture
  • 15. • Call arrives at MSC via the PSTN • MSC then sends out a paging message via all BTS on the FCC (Forward Control Channel). • The paging message contains subscriber’s Mobile Identification Number (MIN) • The mobile unit responds with an acknowledgement on the RCC (Reverse Control Channel) • MSC directs BS to assign FVC (Forward Voice Channel) and RVC (Reverse Voice Channel) AMPS: Conventional Telephone  Cell Phone
  • 16. • Subscriber unit transmits an origination message on the RCC • Origination message contains – MIN – Electronic Serial Number – Station Class Mark – Destination phone number • If BTS receives it correctly then it is passed on to MSC • MSC validates the information and connects the call AMPS: Cell phone initializes a call
  • 17. • GSM system consists of three interconnected sub- systems – Base station Subsystem • Mobile station (MS) • Base Transceiver Station (BTS) • Base Station Controllers (BSC) – Network Switching Subsystem (NSS) • Mobile Switching Center (MSC) • Home Location Register (HLR) • Visitor Location Register (VLR) • Authentication center (AUC) – Operation Support Subsystem • Operation Maintenance Centers GSM: Architecture
  • 18. Base Station Subsystem BSC BSC BTS BTS BTS BTS BTS BTS BTS BTS •BSCs connect the MS to the NSS •The BTS provides last mile connection to the MS and communication is between the BTS and MS •Handover between BTS within same BSC is handled by the BSC GSM
  • 19. BSC BSC BTS BTS BTS BTS BTS BTS BTS BTS Base Station Subsystem MSC HLR VLR AUC Public Networks Network Switching Subsystem OSS Operation Support Subsystem GSM
  • 20. • Principles – Only authenticated users are allowed to access the network – No user data or voice communication is transmitted in “clear text” • The subscriber identity module (SIM) card is a vital part of GSM security. It stores – International Mobile Subscriber Identity (IMSI) – Ciphering Key Generating Algorithm (A8) – Authentication Algorithm (A3) – Personal Identification Number – Individual Subscriber Authentication Key (Ki) Security in GSM
  • 21. • Mobile station contains – A5 algorithm and IMEI • The network stores – A3, A5, A8 algorithms • The Authentication Center stores – IMSI – Temporary Mobile Subscriber Identity (TMSI) – Individual Subscriber Authentication Key (Ki) Security in GSM
  • 22. Channel Establishment Identity (TMSI or IMSI) Authentication Request (RAND) Run Authentication Algorithm (RAND) Response (SRES,Kc) Authentication Response (SRES) •RAND is 128 bit random sequence •SRES is signed response generated for authentication Security in GSM: Authentication Network Mobile Station SIM
  • 23. At the Network end At the Mobile user end in the SIM A3 Algorithm RAND (challenge) Ki (128 bit) Transmitted to mobile A3 Algorithm RAND (challenge) Ki (128 bit) A8 Algorithm Kc used for encryption of user data and signaling data Proper authentication completed if result is zero Transmitted back to base station Authentication based on RAND
  • 24. • Ki is known only to the operator who programs the SIM card and is tied to IMSI • IMSI should be transmitted as less as possible. • Only TMSI is used for authentication • TMSI is periodically updated Security in GSM: Authentication
  • 25. • GSM uses symmetric cryptography – Data is encrypted using an algorithm which is seeded by the ciphering key Kc • Kc is known only to base station and mobile phone and is frequently changed • The A5 algorithm is used for ciphering the data • Along with Kc the algorithm is ‘seeded’ by the value based on the TDMA frame • Internal state of the algorithm is flushed after a burst Security in GSM: Data Encryption
  • 26. A5 algorithm Kc (from A8 algorithm) Count (from TDMA frame) User Data Xor Encoded message Security in GSM: Authentication
  • 27. • Why Mobile IP? • Basic Principle of Mobile IP • Route Optimization Mobile IP: Agenda
  • 28. • Internet hosts/interfaces are identified by IP address – Domain name service (DNS) translates host name to IP address – IP address identifies host/interface and locates its network IP Addressing Gateway Host 1 MH 129.168.105.126 129.168.105.124 ISU: 129.168.*.* Internet Host 2 Gateway 130.203.4.112 PSU: 130.203.*.*
  • 29. • A host move to another network requires different network address – But this would change the host’s identity – How can others still reach the moving host? How can on- going connections to the moving host be not interrupted? • Applications – GPRS (2.5G), 3G cellular networks – Mission-critical applications • IP devices held by police, ambulance, coast guards are always connected when moving – Moving offices, … Problems
  • 30. CH MH Home network MH CHMH = mobile host CH = correspondent host Home network Foreign network Foreign network How to direct packets to moving hosts transparently? Routing for Mobile Host
  • 31. • An analogy: what do you do when moving from one apartment to another? – Leave a forwarding address with your old post-office! – The old post-office forwards mails to your new post- office, which then forwards them to you • Mobile IP: – Two other entities – home agent (old post-office), foreign agent (new post-office) – Mobile host registers with home agent the new location – Home agent captures packets meant for mobile host, and forwards it to the foreign agent, which then delivers it to the mobile host Mobile IP: Basic Idea
  • 32. MH = mobile host CH = correspondent host HA = home agent FA = foreign agent •MH discovers a FA in the foreign network. •MH seeks a care-off address from the FA •MH registers/authenticates its care-off address to the HA in its home network. HA CH Home network Foreign network FAMH A MH Moves to a Foreign Network 129.186.*.* 130.203.*.* 129.186.105.216 130.203.4.112
  • 33. •HA receives packets for the MH. •HA tunnels packets to FA •FA decapsulates packets and delivers them to MH HA CH Home network Foreign network FA MH Packets towards MH MH = mobile host CH = correspondent host HA = home agent FA = foreign agent
  • 34. Source address = address of CH Destination address = home IP address of MH Payload Source address = address of HA Destination address = care-of address of MH Source address = address of CH Destination address = home IP address of MH Original payload Packet from CH to MH Home agent intercepts above packet and tunnels it Packet Addressing
  • 35. HA CH Home network Foreign network #1 FA #1 MH Foreign network #2 FA #2 MH •MH registers new address (FA #2) with HA & FA #1 •HA tunnels packets to FA #2, which delivers them to MH •Packets in flight can be forwarded from FA #1 to FA #2 If MH Moves Again
  • 36. HA CH Home network Foreign network FA MH Mobile hosts also send packets •Mobile host uses its home IP address as source address -Lower latency -Still transparent to correspondent host -No obvious need to encapsulate packet to CH -Triangle Routing Packets from MH
  • 37. HA CH Home network Foreign network FA MH •When HA receives a packet (from CH) to tunnel to FA: •It sends a binding message to CH with the care-of address of the MH. •CH caches the address, and forward later packets directly to the care-of address. Route Optimization
  • 38. • When a FA receives a tunneled message, but sees no visitor entry for the mobile host, it generates a binding warning message to the appropriate HA • When a HA receives a warning, it issues an update message to the CH, which removes the care-of address from its cache. Route Optimization
  • 39. • Topic of next class: Wireless LAN and Mobile Ad Hoc Network • Reminder: pick the papers you want to present (with preferred dates if you want) ASAP. Notice