6781097070

6781097070



Introduction 7

1.2.2.9 Equipment Identity Register


The theft of GSM mobile telephones seems attractive, sińce the iden-tities of subscribers and their mobile equipment are separate. Stolen eąuipment can be reused simply by using any valid SIM. Barring of a subscriber by the operator does not bar the mobile eąuipment. To prevent that kind of misuse, every GSM terminal eąuipment contains a uniąue identifier, the international mobile eąuipment identity (IMEI). It lies within the realm of responsibilities of a network operator to eąuip the PLNM with an additional database, the EIR, in which stolen eąuipment is registered and so can be used to bar fraudulent calls and even, theoretically, to track down a thief (by analyzing the related SIM data).

1.3 The Focus of This Book

This book describes briefly the GSM subsystems, their structure, and their tasks. However, the focus of this book lies not on the GSM network elements themselves but on the interfaces between them.

Among others, the following issues will be addressed:

•    What signaling standards and what protocols are used to serve connec-tion reąuests by mobile subscribers?

•    How are the various interfaces utilized?

•    What happens in case of errors?

•    Although GSM uses available signaling standards, where are the GSM specific adaptations?

One has to remember that most of the signaling is necessary to support the mobility of a subscriber. Ali messages of the area mobility management (MM) and radio resource management (RR), in particular, serve only that purpose. Only a fraction of the exchanged messages are used for the connec-tion setup as such, and those are all the messages that are related to cali control (CC).

A presentation of the Open System Interconnection (OSI) Reference Model is mandatory in a book in which the focus is on signaling.

Another focus of the text is on the application of the various protocols for error analysis. Which error indication is sent by the system and when? How is such an indication interpreted? What are the potential sources of errors?



Wyszukiwarka

Podobne podstrony:
•    International Mobile Equipment Identity (IMEI) The IMEI is used for eąuipment
Sandland?4 p212 rM ALSO RESPON-SIBLE FOR THE THEFT OF TNF WATER. YOU
Introduction 3 The following factors were major contributors to the success of GSM: •   &n
Introduction 5 Figurę 1.2 The architecture of a PLMN.1.2.2.1 Mobile Station GSM-PLMN contains as man
18 Łukasz Sułkowski Culture is interpreted as an indigenous metaphor and so identified with the proc
QM250 Introduction to Statistics Guidelines for the Preparation of Semester Project Paper Ali s
76175 Sandland?4 p212 rM ALSO RESPON-SIBLE FOR THE THEFT OF TNF WATER. YOU
le cnamInvolved Databases >HLR, Home Location Register: the database of the subscribers linked to
Normy ISO ISO/CD 11200 Acoustics-Noise emitted by machinery and equipment-Guidelines for the use of
another can be identified at the zonę of maximal plastic deformations. It is exactly in this zonę wh
the rccording of data, and we in Australia, sińce we were in a fairly formativc stage in our work, h
Abstract Comparison of security in GSM and UMTS systems The scope of my work encompasses the analysi
00214 5151d685820d3809856989a212338cd 216 Baxley Introduction The usual assumption underlying stati
Section 2: Identify and describe the purpose of the components in a smali wireless network. (Includi
The goals of Design Survey are to (1) provide an introductory knowledge of design in order to assist
i. Introduction CCT diagrams are used for detennination of the phase structure and hardness of steel

więcej podobnych podstron