Lecture6 PLMN
Lecture6 PLMN
Lecture6 PLMN
ECEG 5301,
Telecommunication
Networks
Introduction to PLMN
Cellular Concept
Architecture of Mobile Network
Random Access in Mobile Network
Multiplexing vs Multiple Access
Security Measures in Mobile Network
Mobile Network Identifiers
Cellular concept
3
Mobility concept
4
Architecture of a mobile network
CS core network
GSM
PSTN
BSS MSC GMSC
VLR
MS HLR
AuC
3G EIR
Internet
RAN
PS core network
5
The serving mobile switching center (MSC) is
the mobile counterpart to the local exchange in
the PSTN.
Serving MSC This is the MSC that is currently serving a
mobile user.
CS core network
GSM
PSTN
BSS MSC GMSC
VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
6
The visitor location register stores
temporary information on mobile users
roaming in a location area under the VLR
control of the MSC/VLR.
CS core network
GSM
PSTN
BSS MSC GMSC
VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
7
The gateway MSC (located in the home PLMN of a mobile
Gateway MSC user) is the first contact point in the mobile network when
there is an incoming call to the mobile user.
CS core network
GS
PSTN
M MSC GMSC
BSS VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
8
The home location register stores
information on mobile users belonging to
this mobile network (e.g. subscription data HLR
and present VLR under which the mobile
user is roaming).
CS core network
GSM
PSTN
BSS MSC GMSC
VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
9
The authentication center safely stores
authentication keys (Ki) of mobile
subscribers belonging to this mobile AuC
network.
CS core network
GS
PSTN
M MSC GMSC
BSS VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
10
The equipment identity register stores
information on stolen handsets (not stolen
EIR SIMs).
CS core network
GS
PSTN
M MSC GMSC
BSS VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
11
SIM
CS core network
GS
PSTN
M MSC GMSC
BSS VLR
SIM
HLR
AuC
3G EIR
Internet
RAN
PS core network
PSTN
BSS MSC GMSC
VLR
HLR
AuC
3G EIR
Internet
RAN
PS core network
13
Basic functions in a mobile network
14
Range of functions
CC
GS
M
BSS MM
or
3G SM
RAN PS core network
15
1 Random access in a mobile network
18
Security measures in a mobile network
19
Authentication in GSM
20
21
22
2 Where does the algorithm run?
RAND
23
2 Algorithm considerations
27
Mobile network identifiers (4)
28
4 Case study: Mobile terminated call (1)
2. HLR 3.
4. 4. VLR
1. 5. 6.
GMSC Serving MSC
29
4 Mobile terminated call (2)
2. HLR 3.
4. 4. VLR
1. 5. 6.
GMSC Serving MSC
30
4 Mobile terminated call (3)
31
4 Mobile terminated call (4)
32
4 Mobile terminated call (5)
33
4 Mobile terminated call (6)
4. 4. VLR
1. 5. 6.
GMSC Serving MSC
34