Kwangwoon Univ. Wireless and Mobile Network Architectures Intersystem Handoff and Authentication IS-41 오재준Nclab

Slides:



Advertisements
Similar presentations
1/10/20151 Mobile Computing COE 446 Network Operation Tarek Sheltami KFUPM CCSE COE Principles of Wireless.
Advertisements

ARSITEKTUR DASAR SISTEM SELULER
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
Mobile web E- Business Technology Prof. Dr. Eduard Heindl Shirin Faghihi.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
1 Channel Overview 3 Types 1.Broadcast Control Channel: Point to Multipoint, Downlink (BTS) to MS) (A)BCCH (Board cast Control Channel) It inform the Mobile.
Wireless, Mobile Networks – Mobility. Wireless, Mobile Networks6-2 Mobility: Vocabulary home network: permanent “home” of mobile (e.g., /24)
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
1G PERSONAL COMMUNICATION SYSTEMS: MOBILITY MANAGEMENT (PART II) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer.
GSM standard (continued)
Mobility Management in Mobile Wireless Systems Lecture 9.
1G PERSONAL COMMUNICATION SYSTEMS: AMPS (PART III) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering.
Location and Handoff Management Lecture 10. Location and Handoff Management The current point of attachment or location of a subscriber (mobile unit)
1 Wireless and Mobile Network Architecture Chapter 2: Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering.
 The missing parts in the picture are the interactions between the PCS network and the PSTN.  This section briefly describes how mobile roaming is managed.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
GUIDED BY:- MR. SURESH DHRUWEY SUBMITTED BY:- Ankita Jain Tulika Prasad Vandana Bind Hemant Kumari Aishwarya Jain.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
OPERATION OF CELLULAR SYSTEMS
CDMA Power Control, Smart Antenna. Power Control in CDMA All the mobiles communicate on the same frequency. Therefore, internal interference is developed.
GSM Network Structure Lance Westberg.
Network: Location Management Y. Richard Yang 3/21/2011.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
GSM Signaling Protocol Architecture. Protocols above the link layer of the GSM signaling protocol architecture provide specific functions: Radio Resource.
Cellular System Objectives Optimize Spectral efficiency Increase Affordability Increase Subscriber Capacity Provide Global Compatibility Provision Quality.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Polytechnic University  M. Veeraraghavan 1 Location management Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University
Cellular Mobile Communication Systems Lecture 8
Location Management. The trends in telecom are proceeding with a strong tendency towards increasing need of mobility in access links within the network.
Mobile Computing Cellular Concepts. Cellular Networks Wireless Transmission Cellular Concept Frequency Reuse Channel Allocation Call Setup Cell Handoffs.
Location Management in PCS Networks Report of Dissertation By Manikanta Velaga (Adm. No ) Sanjoy Mondal (Adm. No ) M.Tech (CA)
Presented by : Suparna Vadlamudi Vineela Solipuram Archana Paaka Presentation on IS-41.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
GSM TOWARDS LTE NETWORKS
GLOBAL SYSTEM FOR MOBILE (GSM)
PLMN Network Intelligence 2 © Manzur Ashraf. Switching.
GSM Network Architecture
 Set of procedures to:  track a mobile user  find the mobile user to deliver it calls  Current location of MS maintained by 2-level hierarchical strategy.
Overview of cellular system
Chap14. GSM Operations, Administration, and Maintenance 네트워크 컴퓨팅 연구실 서 돈 철
Communication Protocol Engineering Lab.
International Roaming for GSM Kwangwoon Univ. Network Computing lab 김형민
January 6, Mobile Computing COE 446 Network Operation Tarek Sheltami KFUPM CCSE COE Principles of.
Chap 5. IS-41 Network Signaling
On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems (by I R Chen, Baoshan Gu and S-T Cheng) Presented.
Accommodating mobility with direct routing
Computer Networks with Internet Technology William Stallings
Handover -The Process of Changing cells during a call is called handover -MS & BTS perform measurements -MS measures signal strength and quality on its.
Communication Protocol Engineering Lab. Taek-su Shin 1 GSM Mobility Management April, 15, 2003 Taek-su Shin Communication Protocol Engineering.
Mobility CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F Kurose and K.W. Ross,
Kwangwoon Univ. Wireless and Mobile Network Architectures Chapter 7 PACS Network Signaling.
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
BY KAMAL RAJ SINGH ID : 2009H124492P M.E. COMMUNICATION ENGG.
Wireless Network PMIT- By-
Cellular Networks Wireless Transmission Cellular Concept
CPE 401/601 Computer Network Systems
Global System for Mobile Communications
GSM location updating procedure
Name:Shivalila A H,Shima
Chapter 4 North American Intersystem Operations
Chapter 6 Mobility Management.
International Roaming for GSM
EEE 264-2:Capacity Increase Techniques and Calculations
GSM location updating procedure
MITP 413: Wireless Technologies Week 9
Dept. of Business Administration
Presentation transcript:

Kwangwoon Univ. Wireless and Mobile Network Architectures Intersystem Handoff and Authentication IS-41 오재준Nclab

Kwangwoon Univ. Wireless and Mobile Network Architectures 6.1 IS-41 Intersystem Handoff  Two BSs are connected to different MSCs  Four types of intersystem handoff  Handoff-forward  Handoff-backward  Handoff-to-third  Path minimization

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff Measurement Step1 - HandoffMeasurementRequest - set 7 second LMMRT Step2 - Performs signal measurement - HandoffMeasurementRequest LMMR (location measurement maximum response timer)

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff-Forward(1) InterSwitchCount parameter, MAXHANDOFF Step 1 - MSC A initiates the h/o-forward procedure - allocate the trunk - sends a query msg FacilitiesDirective (INVOKE) - set 12 second HOT (handoff order timer) - expired : release trunk FacilitiesReleases with “HandoffAbort not received” 4-15 CTT set -> FacilitiesReleases Step 2 - check if the voice channel is avaible Step 2.1 (no radio channel is available) - FacilitiesDirective (RETURN ERROR) with “Resource Shortage” - stop HOT - exchange FacilitiesReleases msg. - MSCs exit the task

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff-Forward (2) Step2 Step2.2 (radio channel is available) - FacilitiesDirective (RETURN RESULT) with selected channel number. - excute step3, step4 in parallel Step3 (MSC A) - MSC A stops HOT - set 7 second MHOT (mobile handoff timer) - Handoff execution msg. to the MS Step4 (MSC B) - set 7 second MAT (mobile arrival timer) Step4.1 - MAT expires, MSC B releases the radio channel -MHOT of MSC A expire, trunk is released Step4.2 - MS responds, MSC B stops timer MAT - MobileOnChannel msg. to MSC A - MHOT is stopped

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff-Backward(1) MS moves from MSC B back to MSC A Step1 - MSC B set HOT - HandoffBack msg. to MSC A Step2 - if receive msg. check the radio channel Step2.1 no channel is available - HandoffBack (RETURN ERROR) with ”ResoureShortage” - HOT timer stop and exit the task Step2.2 channel is available - HandoffBack (RETURN RESULT) msg. with the selected channel number - step3, step4 are executed in parallel Step3 - MSC B receives the HandoffBack response msg - stop HOT, set 7 second MHOT - ask MS to transfer to new radio channel

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff-Backward (2) Step4 - MSC A set 7 second MAT - expects to hear from the MS Step MAT expires, MSC A releases the radio channel - MHOT timer will expire Step MS responds - MS has handed over to the new voice path - MSC A stops MAT - sends a query msg. FacilitiesRelease to MSC B - MSC B stop MHOT - MSC B sends a response msg.FacilitiesRelease to MSC A - trunk between MSCs is released

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff-to-Third and Path Minimization MS moves again from MSC B to MSC C Step1 - MSC B sets 18 second HTTT (handoff-to-third timer) - HandoffToThird (INVOKE) to MSC A - if HTTT expired MSC B process Handoff-forward Step2 MSC C is known to MSC A  check Step no trunk connection - HandoffToThird (RETURN ERROR) - HTTT expired MSC B process Handoff- forward Step2.2 - interswitch trunk available - MSC A set HOT - FacilitiesDirective (INVOKE) - if HOT expired MSC B process Handoff- forward

Kwangwoon Univ. Wireless and Mobile Network Architectures Handoff-to-Third and Path Minimization Step3 - MSC C check radio channel available Step3.1 (no radio channel is available) - FacilitiesDirective (RETURN ERROR) to MSC A - MSC A stop HOT and send HandoffToThird (RETURN ERROR) to MSC B - MSC B stop HTTT - step 2.1 process repeat Step3.2 (radio chnnel is available) - FacilitiesDirective (RETURN RESULT) to MSC A Step4 - MSC B set HTTRT - send handoff execution to MS Step5 Step6

Kwangwoon Univ. Wireless and Mobile Network Architectures 6.2 IS-41 Authentication  Two authentication schemes  without-sharing (WS) scheme SSD (shared secret data) is shared only between AuC and MS For user high mobility rate  shared (S) scheme SSD is shared with the visited system authenticate the MS at call origination or delivery reducing message flow and call setup time require additional message exchanges during registrations For a user with high call frequency  switch between the two authentication schemes user’s call and move frequencies as the user’s behavior changes

Kwangwoon Univ. Wireless and Mobile Network Architectures Private and Authentication in TSB-51  MIN (mobile identification number)  ex)  ESN (electronic serial number)  32bit serial number highest order 8bits : manufacturer’s code the remaining bit : unique MS number  AuC (authentication center)  Database connected to the HLR  responsible for maintaining and updating the SSDs  LA (location area)  belonging to one or more PSPs  PSP (PCS service provider)  providing some combination of BSs

Kwangwoon Univ. Wireless and Mobile Network Architectures Without-Sharing (WS) Scheme (1) Registration (Location Update) Step1 - MS execute CAVE algorithm using SSD; its ESN, MIN, RAND - produce AUTHR Step2 - request registration with AUTHR, ESN, MIN, RANDC and COUNT Step3 - PSP forward authentication request to VLR serving the PSP LA Step4 - VLR forward the request to HLR Step5 - HLR forward the request to AuC *CAVE (Cellular Authentication and Voice Encryption)

Kwangwoon Univ. Wireless and Mobile Network Architectures Without-Sharing (WS) Scheme (2) Registration (Location Update) Step6 - AuC retrieve the SSD associated with the MIN from its database - execute CAVE algorithm with retrieved SSD and additional parameters Step7-9 - verifying that result matches the AUTHR value received from MS - check the COUNT value - AuthenticationRequest *RETURN RESULT (success) *RETURN ERROR (fail) Once the MS has been authenticated, the serving PSP system will start the location update procedure

Kwangwoon Univ. Wireless and Mobile Network Architectures Without-Sharing (WS) Scheme (3) Call Origination Step1 - MS execute CAVE algorithm with SSD ESN, MIN, RANDC - to produce AUTHR, VPMASK, SMEKEY Step2-4 - PSP forwards the message to AuC Step5 - AuC performs authetication Step6 - AuC generates VPMASK and SMEKEY and forward them to the serving PSP system

Kwangwoon Univ. Wireless and Mobile Network Architectures Sharing (S) Scheme (1) SSD shared with the visited PSP system Old VLR has the current value of COUNT Once the MS is registered, the new VLR instead of the AuC -> reduced message flow Step1-2 - execute CAVE algorithm using SSD,ESN, MIN and RAND - produces AUTHR Step3-6 - verifying the result - AuC should obtain the current COUNT value from the old VLR Step 7,8 - CountRequest Step9 - countRequest (RETURN RESULT) Registration (Location Update)

Kwangwoon Univ. Wireless and Mobile Network Architectures Sharing (S) Scheme (2) Call Origination Step1 - MS execute CAVE algorithm with SSD ESN, MIN, RANDC - produce AUTHR, VPMASK, SMEKEY - send RANDC, AUTHR, COUNT,ESN and MIN Step2 - AuthenticationRequest (INVOKE) Step3 - VLR execute CAVE algorithm - generate AUTHR, VPMASK, and SMEKEY Step4 - verifying AUTHR and COUNT - AuthenticationRequest (RETURN RESULT)

Kwangwoon Univ. Wireless and Mobile Network Architectures Adaptive Algorithm: AA1  The WS scheme  the number of registration operations.  The S scheme  in the opposite situation  adaptive algorithm (AA1)  automatically selects an appropriate authentication scheme for any given user in real time.  Cycle : the period between two consecutive registrations for a user  λ: the call arrival rate  ŋ : the mobility or the rate that a user changes LAs.  Then the expected number of call arrivals in a cycle p is: ρ= λ/ŋ

Kwangwoon Univ. Wireless and Mobile Network Architectures Adaptive Algorithm: AA1  In the WS scheme (  In the WS scheme ( C ws = 5 + 5ρ)  registration - five database accesses  a call origination or termination - five database accesses  In the S scheme  In the S scheme (C s = 9 + ρ)  registration - nine database accesses (see Figure 6.7)  a call origination or termination - one database access (see Figure 6.8)   C ws =C s if and on if ρ =1  the S scheme outperforms the WS scheme (i.e., C S 1

Kwangwoon Univ. Wireless and Mobile Network Architectures Adaptive Algorithm: AA1  The WS scheme : 0 <i < n - 1.  The S scheme : n < j < 2n - 1.  Let L  the number of call arrivals during the previous cycle.  If the steady state of the algorithm exists, then the transition probabilities for the finite automaton are:  ρ1 = Pr[L = 1], ρ2 = Pr[L = 0], and p3 = Pr[L > 1]  The AuC needs to maintain authentication scheme (AS) bits per user.  The VLR needs to maintain an AS bit per user

Kwangwoon Univ. Wireless and Mobile Network Architectures Adaptive Algorithm: AA1  When the AuC is accessed for a registration operati on, the AuC checks the following: Suppose that the algorithm is in state i.  If no call arrived during the previous cycle, the algorithm moves to state i - 1 for i > 0, and remains in the same state i for i = 0.  If exactly one call arrived during the previous cycle, the algorithm remains in the same state i.  If more than one call arrived during the previous cycle, the algorithm moves to state i + 1 for i < 2n - 1, and remains in the same state i for i=2n-1.  from state n -1 to state n  from WS to S  from state n to state n – 1  from S to WS

Kwangwoon Univ. Wireless and Mobile Network Architectures Adaptive Algorithm : AA2  requires only an AS bit in the AuC and VLRs to indicate whether the S scheme or the WS scheme is exercised.  At the beginning of a cycle, AA2 always exercises the WS scheme  AS bit is "WS"  After an originating or terminating call arrives, the AS bit is switched to "S," and the S scheme is exercised.  Step 1  When the first call arrives, the authentication message flow follows Figure 6.6  when the AuC receives AuthenticationRequest (INVOKE) AS bit "S" SSD is sent to the VLR in the AuthenticationRequest (RETURN RESULT) message.  When the VLR receives the SSD AS bit is set to "S”  At this moment, the S scheme is exercised.

Kwangwoon Univ. Wireless and Mobile Network Architectures Adaptive Algorithm : AA2  Step 2  For subsequent call arrivals in this cycle  the message flow in Figure 6.8 is followed.  Step 3  At the end of the cycle-when the MS moves to a new LA  the authentication/registration occurs, the AuthenticationRequest messages are sent to the AuC.  Step 3a.  If the AS bit at the AuC is "WS," it implies that no call origination/ termination occurs during the cycle  Step 3b.  If the AS bit at the AuC is "S" The AS bit at the AuC is set to "WS." When the VLR receives the AuthenticationRequest (RETURN RESULT) message,  AS bit is set to "WS."  At the end of step 3, the WS scheme is exercised.

Kwangwoon Univ. Wireless and Mobile Network Architectures