6781097237

6781097237



International Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 2015 2.2.1 GPRS Architecture

Unlike GSM, GPRS is able to provide packet based IP connectivity to a MN and also proposes a higher throughput by allocating radio resources as a volume of information to be transmitted. The GPRS has foliowi ng two entities.

a)    Serving GPRS Support Node (SGSN): It manages the attachments of MN in the service zonę and acts as an interface for packets on the way to GGSN. The link between these two entities are based on IP, but user traffic is protected by encapsulating in a proprietary protocol called as GTP (GPRS tunnelling protocol). SGGN is the in charge of security providing integrity, authentication, and authorization as BSC in a 2G.

b)    Gateway GPRS Support Node (GGSN): It provides the connectivity between operator’s packet oriented network and IP network. It collects traffic statistics and manages billing, session and routing information. It also provides IP address to a MN and sustains for entire duration of attachment.

Fig 4 illustrates various elements of a GPRS network and their inter connections.

There are mainly three interfaces in GPRS network. They are:

1.    Gp: Interface between internal SGSN and external GGSN.

2.    Gi: Interface between mobile operator and network.

3.    Gn: Interface between GGSN and SGSNs of the same operator.

Fig 4: GPRS network and inter connections

2.2.2 GPRS Subscriber authentication and GPRS data encryption

This process is similar to the authentication of GSM. The authentication is performed by SGSN and uses an independent random number GPRS-RAND. The GPRS network provides a distinct challenge reply (GPRS-SRES) and GPRS encryption key (GPRS-Kc) from the GSM network.

GPRS data encryption is performed using GPRS encryption algorithm (GEA). It differs from GSM in such a way that, here encryption is performed up to SGSN and not between MN and BTS.GPRS- Kc key is separately stored from GSM Kc key.

34



Wyszukiwarka

Podobne podstrony:
International Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 2015 sev
International Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 2015 Fig
International Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 20157.
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 Th
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 co
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 Th
International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 4.
International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 4.
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 1.
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 Fo
International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 2.
International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 GS
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015?
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, Apnl 2015Secu
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010
12 IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 www.IJCSI
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010
14 IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 www.IJCSI

więcej podobnych podstron