PLMN
PLMN
Intelligent Network
Basic IN concept & technology Some basic IN services
This provides the network operator with the means to develop and control services more efficiently. New capabilities can be rapidly introduced into the network. Once introduced, services are easily customized to meet individual customer's needs.
STP
MAP INAP CAP
SCP
Service Control Point (a network element containing the service logic, a database or register)
SSP
ISUP
Exchange
1.
2. SSP
Exchange
1. Call routing proceeds up to Exchange 2. Trigger activated in Basic Call State Model at SSP 3. SSP requests information from SCP (database) 4. SCP provides information 5. Call routing continues (routing to next exchange) based on information received from SCP
1.
2. SSP
Exchange
2. Trigger activated in Basic Call State Model at SSP Typical triggers: Called number (or part of number) Called user (destination) is busy Called user does not answer in predefined time
1.
2. SSP
Exchange
4. SCP provides information Example: Number translation in SCP SSP sends 800 number (0800 1234) SCP translates into real number which is used for routing the call (+358 9 1234567) translation may be based on several variables
SCP
Time or date
SSP Exchange
Destination 1
Destination 2
SCP decides the destination of the call depending on the calling time or date:
SCP
Destination 2
SCP decides the destination of the call depending on the location of calling user:
Calling user in southern Finland => Destination 1 Calling user in northern Finland => Destination 2
SCP
Network load
SSP Exchange
Destination 1
Destination 2
SCP decides the destination of the call depending on the traffic load in the network:
Traffic load situation 1 => Destination 1 Traffic load situation 2 => Destination 2
IP
Intelligent Peripheral (IP) can (a) send announcements to the user (usually: calling user) and (b) receive DTMF digits from the user. IP is not a database; connection to exchange not via SS7, instead via digital TDM channels.
IP
1. SSP 4.
SCP
2.
Exchange
Exchange
3.
1. 2. 3. 4.
IP
SCP orders IP to select and send announcement IP sends announcement to calling user User replies by giving DTMF number(s) to IP IP sends number information to SCP in a signalling message
1. SSP 4.
SCP
2.
Exchange
Exchange
3.
1. 2. 3. 4.
IP
SCP orders IP to select and send announcement IP sends announcement to calling user User gives authentication code (in DTMF form) to IP IP sends authentication code to SCP in a signalling message
1. SSP 3.
SCP
1.
Exchange IP
2.
When connected to the network via a digital subscriber line, the calling user can be notified with a digital message (please press your PIN code ...) instead of having to use the corresponding voice announcement.
IN services
A large number of IN services can be implemented by combining different building blocks: Called number translation (at SCP) Routing decision based on calling number, time, date, called user busy, called user alerting timeout, network load ... Announcements (from IP) or user notification (<= ISDN user signalling) DTMF number reception (at IP) and analysis (at SCP) Customised charging (at exchanges)
IN service examples
Traditional IN services: Freephone / customised charging schemes Virtual Privat Network (VPN) Number portability Televoting
IN in mobile networks: - Mobility management (HLR, VLR = databases) - Security management (Authentication ...) - Additional IN services in mobile networks => CAMEL (Customised Applications for Mobile networks Enhanced Logic)
1.
2. SSP Exchange
1.
2. SSP Exchange
Charging: Calling user (customer) pays the (usually rather expensive) bill. Both service subscriber and service provider or network operator make profit!
SCP
SSP Destination
Exchange
User authentication
IP
SCP
SSP Exchange
Local exchange of called user
Called user
Serving MSC
PLMN
Public Land Mobile Network (official name for mobile network)
Circuit-switched (CS) core network (radio access network is not part of this course) Basic concepts and network elements Mobility management in PLMN
Cellular concept
A cellular network contains a large number of cells with a base station (BS) at the center of each cell to which mobile stations (MS) are connected during a call. If a connected MS (MS in call phase) moves between two cells, the call is not dropped. Instead, the network performs a handover (USA: handoff).
BS
BS
MS
BS
BS
Mobility concept
A cellular network is divided into location areas (LA), each containing a certain number of cells. Location Area 1 Location Area 2 As long as an idle MS (idle = switched on) moves within a location area, it can be reached through paging.
Location Area 3
If an idle MS moves between two location areas, it cannot be reached before it performs location updating.
GSM BSS
MSC VLR
GMSC
MS
3G RAN
PS core network
Serving MSC
CS core network
PSTN
GSM BSS
MSC VLR
GMSC
The serving mobile switching AuC center (MSC) is the mobile counterpart to the local EIR 3G exchange in the PSTN. RAN PS core network This is the MSC that is currently serving a mobile user.
HLR
Internet
VLR
CS core network
PSTN
GSM BSS
MSC VLR
GMSC
The visitor location register AuC stores temporary information on mobile users roaming in a EIR 3G location area under the RAN control of the MSC/VLR. PS core network
HLR
Internet
Gateway MSC
CS core network
PSTN
GSM BSS
MSC
GMSC
VLR The gateway MSC (located in the home HLR PLMN of a mobile user) is the first contact point in the mobile network when AuC there is an incoming call to the mobile user. EIR 3G RAN PS core network
Internet
HLR
CS core network
PSTN
GSM BSS
MSC VLR
GMSC
The home location register AuC stores information on mobile users belonging to this mobile EIR 3G network (e.g. subscription data RAN and present VLR under which PS core network the mobile user is roaming).
HLR
Internet
AuC
CS core network
PSTN
GSM BSS
MSC VLR
GMSC
The authentication center safely AuC stores authentication keys (Ki) of mobile subscribers belonging EIR 3G to this mobile network. RAN PS core network
HLR
Internet
EIR
CS core network
PSTN
GSM BSS
MSC VLR
GMSC
The equipment identity register AuC stores information on stolen handsets (not stolen SIMs). EIR 3G RAN PS core network
HLR
Internet
SIM
CS core network
PSTN
GMSC
Important mobile user information is AuC stored in the subscriber identity module within the handset. EIR 3G RAN PS core network
Internet
CS core network
CS core network
PSTN
GSM BSS
3G RAN
MSC GMSC The CS core network architecture is basically theVLR same in 2G (GSM) and 3G mobile networks. HLR In North America, IS-MAP signalling is AuC used instead of GSM-MAP signalling. EIR Europe: GSM core network N. America: ANSI-41 core network PS core network
Internet
MOC, MTC
PDP Context
Later lecture
Range of functions
RRM CC GSM BSS or 3G RAN CS core network
MM SM
PS core network
Communication between MS and network is not possible before going through a procedure called random access. Random access must consequently be used in: Network-originated activity paging, e.g. for a mobile terminated call (MTC)
MS-originated activity IMSI attach, IMSI detatch GPRS attach, GPRS detach location updating mobile originated call (MOC) SMS (short message service) message transfer
1. MS sends a short access burst over the Random Access CHannel (RACH) in uplink using Slotted Aloha (in case of collision => retransmission after random time) 2. After detecting the access burst, the network returns an immediate assignment message which includes the following information: - allocated physical channel (frequency, time slot) in which the assigned signalling channel is located - timing advance (for correct time slot alignment) 3. The MS now sends a message on the dedicated signalling channel assigned by the network, indicating the reason for performing random access.
In downlink, multiplexing (e.g. TDM) Network decides channel In uplink, multiple access (e.g. TDMA)
Multiple access is always associated with random access. MS requests signalling channel, and network decides which channel (e.g. time slot) will be used.
Challenge
Algorithm
Authentication key Ki
Response SRESS
Algorithm
Authentication key SRESA Ki
Algorithm for calculating SRES runs within SIM (user side) and AuC (network side). The authentication key (Ki) is stored safely in SIM and AuC, and remains there during authentication. The two SRES values are compared in the VLR.
Air interface RAND
SIM
Ki
SRESS
VLR
SRESA
AuC
Ki
Algorithm considerations
Using output and one or more inputs, it is in practice not possible to calculate backwards other input(s), brute force approach, extensive search Key length in bits (N) is important (in case of brute force approach 2N calculation attempts may be needed) Strength of algorithm is that it is secret => bad idea! Security through obscurity
Better: open algorithm can be tested by engineering community (security through strong algorithm)
SIM
IMSI LAI 1 TMSI
MSC
HLR
IMSI LAI 1
VLR 2
Most recently allocated TMSI and last visited LAI (Location Area ID) are stored in SIM even after switch-off.
After switch-on, MS monitors LAI. If stored and monitored LAI values are the same, no location updating is needed.
SIM
IMSI LAI 1 TMSI
MSC
VLR 1
IMSI TMSI
MSC
HLR
IMSI LAI 1
VLR 2
MS has moved from a cell belonging to VLR 1 to another cell belonging to VLR 2. MS notices that the LAI values are different => location update is required!
MSC SIM
IMSI LAI 1 TMSI LAI 1, TMSI
VLR 1
IMSI TMSI
MSC
HLR
No TMSI - IMSI context! IMSI LAI 1
VLR 2
SIM sends old LAI (i.e., LAI 1) and TMSI to VLR 2. VLR 2 does not recognize TMSI since there is no TMSIIMSI context. Who is this user?
Address: LAI 1
MSC
VLR 1
SIM
IMSI LAI 1 TMSI IMSI
IMSI TMSI
MSC
HLR
IMSI LAI 1
VLR 2
IMSI TMSI
However, VLR 2 can contact VLR 1 (address: LAI 1) and request IMSI.
MSC SIM
IMSI LAI 1 TMSI
VLR 1 MSC
IMSI TMSI
IMSI TMSI
HLR
LAI 2
IMSI LAI 1 LAI 2
VLR 2
Important: HLR must be updated (new LAI). If this is not done, incoming calls can not be routed to new MSC/VLR. HLR also requests VLR 1 to remove old user data.
MSC SIM
IMSI LAI 1 TMSI LAI 2 TMSI
LAI 2 TMSI
VLR 2
VLR 2 generates new TMSI and sends this to user. User stores new LAI and TMSI safely in SIM. Location updating was successful!
Role of TMSI
MS Random access Uses TMSI Network
Authentication Start ciphering IMSI is not sent over air interface if not absolutely necessary! New TMSI allocated by network
CC or MM transaction
IMSI detach New TMSI stored in SIM
CC = Country Code (1-3 digits) NDC = National Destination Code (1-3 digits) SN = Subscriber Number
Mobile station ISDN (MSISDN) numbers are based on the ITU-T E.164 numbering plan and can therefore be used for routing a circuit-switched call. When the calling (PSTN or PLMN) user dials an MSISDN number, the call is routed to the gateway MSC (GMSC) located in the home network of the called (mobile) user.
CC = Country Code (1-3 digits) NDC = National Destination Code (1-3 digits) TN = Temporary Number
Mobile station roaming numbers (MSRN) are also based on the ITU-T E.164 numbering plan and can therefore be used for routing a circuit-switched call. The MSRN is selected by the MSC/VLR serving the called (mobile) user, sent to the GMSC, and used for routing the call from the GMSC to the serving MSC.
MCC = Mobile Country Code (3 digits) MNC = Mobile Network Code (2 digits) MSIN = Mobile Subscriber Identity Number (10 digits)
The international mobile station identity (IMSI) is based on the ITU-T E.212 numbering plan and cannot be used for routing a circuit-switched call (exchanges or switching centers do not understand such numbers). The IMSI is stored in the HLR and SIM of the mobile user.
MCC = Mobile Country Code (3 digits) MNC = Mobile Network Code (2 digits) LAC = Location Area Code (10 digits)
The location area identity (LAI) points to a location area belonging to a certain MSC/VLR. This identity must be stored in the HLR so that mobile terminated calls can be routed to the correct serving MSC/VLR.
IMEI
2. 1.
3. VLR 6.
Serving MSC
2. 1.
3. VLR 6.
Serving MSC
Serving MSC
MSRN IMSI
VLR
Serving MSC
6.
Serving MSC
2. 1.
3.
VLR
Serving MSC
6.