Basic Concepts of Cellular Networks and Mobile IP Aug 31, 2005.

Slides:



Advertisements
Similar presentations
Mobile IP. 2 N+I_2k © 2000, Peter Tomsu 02_mobile_ip Evolution of Data Services Mobile IP GSM GPRS CDMA Other Cellular Circuit Switched Data Today Packet.
Advertisements

Mobile Cellular Networks Evolution –1st generation, 1980s analogue voice –2nd generation 1990s digital Voice, fax data 95% coverage of UK by 1991 –3rd.
GSM Network Overview Um Abis A BSC BTS Mobile Station HLR VLR EIR AuC
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
Mario Čagalj University of Split 2013/2014. Security of Cellular Networks: Man-in-the Middle Attacks ‘Security in the GSM system’ by Jeremy Quirke, 2004.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM Global System for Mobile Communications
GSM—Global System for Mobile. 2 How does GSM handle multiple users The 1G cellular systems used FDMA. The first cellular standard adopting TDMA was GSM,
GSM standard (continued)
The Wireless Communication System Xihan Lu. Wireless Communication Cellular phone system Cordless telephone system Bluetooth Infrared communication Microwave.
1G PERSONAL COMMUNICATION SYSTEMS: AMPS (PART III) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering.
Cellular and Mobile Wireless Networks (part 2) Advanced Computer Networks.
GSM Security Overview (Part 1)
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
TEL 355: Communication and Information Systems in Organizations
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
GSM Continued.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
COMT 3911 Cellular and PCS Technical Issues COMT 391.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM,GPRS & CDMA Technology
GSM Network Structure Lance Westberg.
Network: Location Management Y. Richard Yang 3/21/2011.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Cellular System Objectives Optimize Spectral efficiency Increase Affordability Increase Subscriber Capacity Provide Global Compatibility Provision Quality.
Mobile Computing Cellular Concepts. Cellular Networks Wireless Transmission Cellular Concept Frequency Reuse Channel Allocation Call Setup Cell Handoffs.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
GSM TOWARDS LTE NETWORKS
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Introduction to the GSM– -Wireless communication system Definition -handoff -Call setup -Cell shape -GSM Applications.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Cellular Communication SNSCE - CS2402 Mobile Pervasive Computing.
GSM Network Architecture
MOBILITY Beyond Third Generation Cellular Feb
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
COMT 3911 Cellular/PCS, Wireless Data Technical Issues COMT 391 Wireless.
Presented by: Gurpreet Singh Assistant Professor Department of School of Computing and Engineering Galgotias University Cellular Communication.
Communication Protocol Engineering Lab. Hyoung Joo. Nam. 1 GSM System Overview Wireless and Mobile Network Architecture Nam Hyoung-Joo
Computer Networks with Internet Technology William Stallings
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Lecture 02 EEE 441: Wireless And Mobile Communications BRAC University.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Overview of the GSM for Cellular System
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Cellular Networks Wireless Transmission Cellular Concept
GSM SECURITY AND ENCRYPTION
GSM.
WIRELESS COMMUNICATION SYSTEMS
GSM location updating procedure
Global system for Mobile Communications
Dept. of Business Administration
Security in Wide Area Networks
Presentation transcript:

Basic Concepts of Cellular Networks and Mobile IP Aug 31, 2005

Evolution of Cellular Networks Architectures –AMPS –GSM Security Mechanisms in GSM Cellular Networks: Agenda

Origin of Wireless Communications Wireless communications gained popularity in 1930’s –Mainly used for public safety by police and other government organizations –Not connected to the PSTN (Public Switching Telephone Networks) First public mobile telephone service started in 1946 in United States –Using a single high power transmitter and large tower to cover an area of 50 km

Concept of Cellular Networks A single high power transmitter services one larger area  multiple low power transmitters service multiple smaller areas (Cells) Frequency can be reused by cells far away from each other  improve usage A set of cells that do not share frequency form a cluster The cluster is then replicated throughout the desired communication area

Evolution of Cellular Networks 1G 2G3G4G 2.5G AnalogDigital Circuit-switchingPacket-switching

1G Systems Goal: To develop a working system that could provide basic voice service Time frame: Technology: FDMA/FDD Example Systems: –Advanced Mobile Phone System (AMPS-USA) –Total Access Communication System (TACS-UK) –Nordic Mobile Telephone (NMT-Europe) Incompatible analog systems

2G Systems Goal: Digital voice service with improved quality and also provide better data services Time Frame: Technology: TDMA/TDD, CDMA Example Systems: –Global System for Mobile (GSM-Europe) –IS-136(TDMA) –IS-95 (CDMA)

Goal: To provide better data rates and wider range of data services and also act as a transition to 3G Time frame: Systems: –IS-95B –High Speed Circuit Switched Data (HSCSD) –General Packet Radio Service (GPRS) –Enhanced Data rates for GSM Evolution (EDGE) 2.5G Systems

Goal: High speed wireless data access and unified universal standard Time frame: Two competing standards –One based on GSM, IS-136 and PDC known as 3GPP –Other based on IS-95 named 3GPP2 Completely move from circuit switching to packet switching Enhanced data rates of 2-20Mbps 3G Systems

Future systems Goal: –High mobility, High data rate, IP based network –Hybrid network that can interoperate with other networks 4G Systems

AMPS 1G system developed by Bell Labs Analog system used FDMA/FDD 40Mhz of spectrum 842 channels rate: 10kbps

Public Switched Telephone Network MTSO (MSC) BTS MTSO: Mobile Telecommunication Switching Office Also known as MSC (Mobile Switching Center) BTS: Base Transceiver Station AMPS: Architecture

Public Switched Telephone Network MTSO (MSC) BTS Paging message Paging message Paging message Paging message AMPS: Conventional Telephone  Cell Phone

Call arrives at MSC via the PSTN MSC then sends out a paging message via all BTS on the FCC (Forward Control Channel). The paging message contains subscriber’s Mobile Identification Number (MIN) The mobile unit responds with an acknowledgement on the RCC (Reverse Control Channel) MSC directs BS to assign FVC (Forward Voice Channel) and RVC (Reverse Voice Channel) AMPS: Conventional Telephone  Cell Phone

Subscriber unit transmits an origination message on the RCC Origination message contains –MIN –Electronic Serial Number –Station Class Mark –Destination phone number If BTS receives it correctly then it is passed on to MSC MSC validates the information and connects the call AMPS: Cell phone initializes a call

GSM system consists of three interconnected sub- systems –Base station Subsystem Mobile station (MS) Base Transceiver Station (BTS) Base Station Controllers (BSC) –Network Switching Subsystem (NSS) Mobile Switching Center (MSC) Home Location Register (HLR) Visitor Location Register (VLR) Authentication center (AUC) –Operation Support Subsystem Operation Maintenance Centers GSM: Architecture

Base Station Subsystem BSC BTS BSCs connect the MS to the NSS The BTS provides last mile connection to the MS and communication is between the BTS and MS Handover between BTS within same BSC is handled by the BSC GSM

BSC BTS Base Station Subsystem MSC HLRVLRAUC Public Networks Network Switching Subsystem OSS Operation Support Subsystem GSM

Principles –Only authenticated users are allowed to access the network –No user data or voice communication is transmitted in “clear text” The subscriber identity module (SIM) card is a vital part of GSM security. It stores –International Mobile Subscriber Identity (IMSI) –Ciphering Key Generating Algorithm (A8) –Authentication Algorithm (A3) –Personal Identification Number –Individual Subscriber Authentication Key (K i ) Security in GSM

Mobile station contains –A5 algorithm and IMEI The network stores –A3, A5, A8 algorithms The Authentication Center stores –IMSI –Temporary Mobile Subscriber Identity (TMSI) –Individual Subscriber Authentication Key (K i ) Security in GSM

Channel Establishment Identity (TMSI or IMSI) Authentication Request (RAND) Run Authentication Algorithm (RAND) Response (SRES,Kc) Authentication Response (SRES) RAND is 128 bit random sequence SRES is signed response generated for authentication Security in GSM: Authentication Network Mobile Station SIM

At the Network end At the Mobile user end in the SIM A3 Algorithm RAND (challenge) K i (128 bit) Transmitted to mobile A3 Algorithm RAND (challenge) K i (128 bit) A8 Algorithm K c used for encryption of user data and signaling data Proper authentication completed if result is zero Transmitted back to base station Authentication based on RAND

K i is known only to the operator who programs the SIM card and is tied to IMSI IMSI should be transmitted as less as possible. Only TMSI is used for authentication TMSI is periodically updated Security in GSM: Authentication

GSM uses symmetric cryptography –Data is encrypted using an algorithm which is seeded by the ciphering key K c K c is known only to base station and mobile phone and is frequently changed The A5 algorithm is used for ciphering the data Along with K c the algorithm is ‘seeded’ by the value based on the TDMA frame Internal state of the algorithm is flushed after a burst Security in GSM: Data Encryption

A5 algorithm Kc (from A8 algorithm) Count (from TDMA frame) User Data Xor Encoded message Security in GSM: Authentication

Why Mobile IP? Basic Principle of Mobile IP Route Optimization Mobile IP: Agenda

Internet hosts/interfaces are identified by IP address –Domain name service (DNS) translates host name to IP address –IP address identifies host/interface and locates its network IP Addressing Gateway Host 1 MH ISU: *.* Internet Host 2 Gateway PSU: *.*

A host move to another network requires different network address –But this would change the host’s identity –How can others still reach the moving host? How can on- going connections to the moving host be not interrupted? Applications –GPRS (2.5G), 3G cellular networks –Mission-critical applications IP devices held by police, ambulance, coast guards are always connected when moving –Moving offices, … Problems

CH MH Home network MH CH MH = mobile hostCH = correspondent host Home network Foreign network How to direct packets to moving hosts transparently? Routing for Mobile Host

An analogy: what do you do when moving from one apartment to another? –Leave a forwarding address with your old post-office! –The old post-office forwards mails to your new post- office, which then forwards them to you Mobile IP: –Two other entities – home agent (old post-office), foreign agent (new post-office) –Mobile host registers with home agent the new location –Home agent captures packets meant for mobile host, and forwards it to the foreign agent, which then delivers it to the mobile host Mobile IP: Basic Idea

MH = mobile hostCH = correspondent host HA = home agentFA = foreign agent MH discovers a FA in the foreign network. MH seeks a care-off address from the FA MH registers/authenticates its care-off address to the HA in its home network. HA CH Home networkForeign network FAMH A MH Moves to a Foreign Network *.* *.*

HA receives packets for the MH. HA tunnels packets to FA FA decapsulates packets and delivers them to MH HA CH Home network Foreign network FAMH Packets towards MH MH = mobile hostCH = correspondent host HA = home agentFA = foreign agent

Source address = address of CH Destination address = home IP address of MH Payload Source address = address of HA Destination address = care-of address of MH Source address = address of CH Destination address = home IP address of MH Original payload Packet from CH to MH Home agent intercepts above packet and tunnels it Packet Addressing

HA CH Home network Foreign network #1 FA #1MH Foreign network #2 FA #2MH MH registers new address (FA #2) with HA & FA #1 HA tunnels packets to FA #2, which delivers them to MH Packets in flight can be forwarded from FA #1 to FA #2 If MH Moves Again

HA CH Home network Foreign network FAMH Mobile hosts also send packets Mobile host uses its home IP address as source address -Lower latency -Still transparent to correspondent host -No obvious need to encapsulate packet to CH -Triangle Routing Packets from MH

HA CH Home network Foreign network FAMH When HA receives a packet (from CH) to tunnel to FA: It sends a binding message to CH with the care-of address of the MH. CH caches the address, and forward later packets directly to the care-of address. Route Optimization

When a FA receives a tunneled message, but sees no visitor entry for the mobile host, it generates a binding warning message to the appropriate HA When a HA receives a warning, it issues an update message to the CH, which removes the care-of address from its cache. Route Optimization

Topic of next class: Wireless LAN and Mobile Ad Hoc Network Reminder: pick the papers you want to present (with preferred dates if you want) ASAP. Notice