Wireless And Mobile - GBV

2y ago
13 Views
3 Downloads
2.68 MB
8 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Angela Sonnier
Transcription

Wireless and MobileAll-IP NetworksYi-Bing Lin and Ai-Chun Pang WILEYWiley Publishing, Inc.

ContentsAcknowledgmentsIntroductionShort Message Service and IP Network Integrationxvxvii11.1 SMS-IP Integration with SM-SC1.1.1 NCTU Short Message System1.1.2 Statistics for SMS Delivery1.2 iSMS System Architecture1.3 iSMS Communication Protocols1.3.1 SMS AT Command Set1.3.2 iSMS Communication API1.3.3 Implementation of an Echo Server1.4 Examples of Services1.4.1 Accessing the Web from GSM MSs1.4.2 Handset Music Service1.4.3 Train Schedule System1.4.4 Other iSMS Services1.5 Caching for iSMS-Based WirelessData Access1.6 Concluding Remarks1.7 Questions34710141517182020232526Mobility Management for GPRS and UMTS392.1 Network Architectures2.2 Concepts of Mobility Management2.3 Mobility Management States293436394548vii

2.4 MM and PDP Contexts2.4.1 Contexts in SGSN2.4.2 Contexts in the MS2.4.3 Relationship between the MM States and theContexts5151542.5 Attach and Detach562.6 Location Update592.7 Serving RNC Relocation642.8 UMTS-GPRS Intersystem Change2.8.1 SGSN Change from UMTS to GPRS2.8.2 SGSN Change from GPRS to UMTS7070722.9 Concluding Remarks73552.10 Questions74Session Management for Serving GPRS Support Node773.1 Session Management Functions3.1.1 PDPContextActivation3.1.2 PDP Context Deactivation3.1.3 PDP Context Modification808083853.2 SM Software Architecture3.2.1 SM REGistration3.2.2 SNDCPSM3.2.3 RelayUnit3.2.4 QoS Manager3.2.5 GMMSM3.2.6 Maintenance Unit and Operating Service3.2.7 Network Manager3.2.8 SM for UMTS8686888989899090903.3 SM Software Initiation and Configuration3.3.1 Initiation3.3.2 Configuration9191933.4 SM Procedures in the SGSN3.4.1 PDPContextActivation3.4.2 PDP Context Deactivation3.4.3 PDP Context Modification9393971013.5 Concluding Remarks1033.6 Questions103Session Management for Gateway GPRS Support Node1054.1 APN Allocation1084.2 IP Address Allocation1104.3 PDP Context Activation112

Contents4.44.54.64.7Tunneling between UMTS and External PDNQuality of ServiceConcluding RemarksQuestions115118123124Serving Radio Network Controller Relocation for UMTS1255.15.25.35.45.55.6127130132135137137SRNC DuplicationCore Network Bi-castingFast SRNC RelocationComparison of the Relocation MechanismsConcluding RemarksQuestionsUMTS and cdma2000 MobileCore Networks1436.1 UMTS and cdma2000 Protocol Stacks6.1.1 Point-to-Point Protocol6.1.2 Tunneling Protocols6.2 Mobility and Session Management Mechanisms6.2.1 Mobility Management6.2.2 Session Management6.2.3 Remarks on Mobility and Session Management6.3 IP Mobility6.4 UMTS and cdma2000 Interworking6.5 Concluding Remarks6.6 Questions146149150151152154157157164167168UMTS Charging Protocol1717.17.27.37.47.57.6173176177178180182The GTP' ProtocolConnection Setup ProcedureGTP' CDR Transfer ProcedureGTP' Failure DetectionConcluding RemarksQuestionsMobile All-IP Network Signaling1858.1 Signaling System Number 78.2 Stream Control Transmission Protocol (SCTP)8.3 UMTS Network Signaling186190193

8.4 UMTS MAP Software Architecture8.4.1 The MAP Layer Architecture8.4.2 An MTP-based SS7 Implementation8.4.3 An SCTP-based SS7 Implementation8.5 TCAP and SCCP Based on M3UA8.5.1 SCCP Stack Entity8.5.2 TCAP Stack Entity1961961971992012022038.6 MAP Message Delivery2078.7 SCTP and MTP Approaches8.7.1 Message Format8.7.2 Connection Setup8.7.3 Data Transmission2102102132178.8 Concluding Remarks2238.9 Questions223UMTS Security and Availability Issues2259.1 Authentication Signaling for UMTS9.1.1 UMTS Authentication Procedura9.1.2 Network Traffic Due to UMTS Authentication2252272299.2 Fraudulent Usage in UMTS9.2.1 Circuit-Switched Registration and Call Termination9.2.2 Fraudulent Registration and Call Setup2302312359.3 Eavesdropping a Mobile User2399.4 HLR Failure Restoration2429.5 Concluding Remarks2459.6 Questions246VolP for the Non-All-IP Mobile Networks25510.1 GSM-IP: VolP Service for GSM10.1.1 MGCP Connection Model and the GSM-IPArchitecture10.1.2 GSM-IP Message Flows25625926110.2 vGPRS: VolP Service for GPRS10.2.1 Registration10.2.2 MS Call Origination10.2.3 MS Call Termination10.2.4 Intersystem Handoff10.2.5 Comparing vGPRS and3GPP TR 21.97827427727928128310.3 Concluding Remarks28810.4 Questions289285

Contents1112Multicast for Mobile Multimedia Messaging Service29111.1 Existing Multicast Mechanisms for MobileNetworks29411.2 The SMS Multicast Approach III11.2.1 Location Tracking of the Multicast Members11.2.2 Mobile Multicast Message Delivery29629729811.3 The MMS Multicast Approach IV11.3.1 Location Tracking of the Multicast Members11.3.2 Mobile Multicast Message Delivery30030130511.4 Concluding Remarks30611.5 Questions307Session Initiation Protocol30912.1 An Overview of SIP30912.2 SIP-based GPRS Push Mechanism31612.3 SIP-based VoIP Prepaid Mechanism12.3.1 Prepaid Call Setup31932312.3.2 Forced Termination of a Prepaid Call131432512.4 Concluding Remarks32612.5 Questions326Mobile Number Portability32913.1 Number Portability for Mobile TelecommunicationsNetworks33213.2 Call Routing Mechanisms with Number Portability13.2.1 The SRF-based Solution for Call-Related Signaling13.2.2 The SRF-based Solution for Noncall-RelatedSignaling13.2.3 The IN-based Solution for Call-Related Signaling33333513.3 Number Porting and Cost Recovery13.3.1 Number Porting Administration13.3.2 Costsof Number Portability34334334613.4 Concluding Remarks34813.5 Questions349Integration of WLAN and Cellular Networks35114.1 The WGSN Approach14.1.1 WGSN Network Architecture14.1.2 WGSN Features35335335414.2 Implementation of WGSN35614.3 Attach and Detach362339341

xiiContents15161714.4 WGSN Push Mechanism36614.5 IEEE14.5.114.5.214.5.3368370373376802.lX-based AuthenticationRelated Protocols for IEEE 802.IX AuthenticationSIM-based IEEE 802.IX AuthenticationEAPOL Timers14.6 Concluding Remarks37814.7 Questions379UMTS All-IP Network38115.1 All-IP Architecture15.1.1 Option 1 for All-IP Architecture15.1.2 Option 2 for All-IP Architecture15.1.3 Partitioning of All-IP Architecture in HorizontalLayers38238238515.2 All-IP Core Network Nodes15.2.1 Call Session Control Function15.2.2 Home Subscriber Server15.2.3 Other Network Nodes38738838939015.3 Registration and Call Control15.3.1 Application-Level Registration15.3.2 CS Mobile Call Origination15.3.3 PS Mobile Call Origination15.3.4 PS Mobile Call Termination39139239539640015.4 Open Service Access40315.5 EfficiencyoflP Packet Delivery40715.6 Concluding Remarks40915.7 Questions410Issues for the IP Multimedia Core Network Subsystem41316.1 Caching in I-CSCF16.1.1 Standard IMS Registration and Call Setup16.1.2 IMS Registration and Call Setup with Cache41441441616.2 Integrated Authenticationfor GPRS and IMS16.2.1 3GPP Two-Pass Authentication16.2.2 One-Pass Authentication Procedure16.2.3 Correctness of the One-Pass Procedure42142242542916.3 Concluding Remarks43216.4 Questions432A Proxy-based Mobile Service Platform43917.1 iProxy Middleware442386

Contents17.1.1 iProxy System Architecture17.1.2 Personal Services44244717.2 iMobile Service Platform17.2.1 Dev-Let17.2.2 Info-Let17.2.3 App-Let45045145345817.3 User and Device Management17.3.1 Device Profile and Device-to-User Mapping17.3.2 User Profile45945946117.4 iMobile-based Peer-to-Peer Mobile Computing17.4.1 iMobile ME Services17.4.2 Queue Synchronization46246546517.5 Concluding Remarks46817.6 Questions468BibliographyIndex471487xiii

9.1 Authentication Signaling for UMTS 225 9.1.1 UMTS Authentication Procedura 227 9.1.2 Network Traffic Due to UMTS Authentication 229 9.2 Fraudulent Usage in UMTS 230 9.2.1 Circuit-Switched Registration and Call Termination 231 9.2.2 Fraudulent Registration and Call Setup 235 9.3 Eavesdropping a Mobile

Related Documents:

GBV. Increase public awareness of GBV by moving away from the mere 16 days of activism to a robust 365 days campaign against GBV and encourage every citizen to take specific steps to prevent GBV in both the private and public arena. In light of the recommendations made the Government UN GBV JP facilitated a one day workshop

managing a GBV program with an NGO or coordinating a GBV working group. GBV coordinators can and are recruited without GBV program management experience and sometimes move from coordination into program management positions. Many GBV Program Managers do not move

The Gender Based Violence (GBV) conference will bring together partners working in the GBV Sector; Government Department stakeholders; representatives from donors in the Development Sector, SANAC and the Global Fund. The conference will focus on: The State's Response in dealing with GBV Exploring the link between GBV & HIV

Mobile 3G/4G, pushing wireless boundaries to enable the best mobile experiences 2 Mobile connectivity is an amazing technical achievement, 4 critical to the mobile experience Wireless fundamentals are the foundation to mobile powered by Mobile 3G/4G technologies Appreciating the magic of mobile requires un

gender-based violence (GBV) across all sectors of humanitarian response. . promotes resilience and supports lasting solutions to the problem of GBV. Two overarching strategic priorities – inclusivity and adopting a supportive communications . Humanitarian actors are aware of and support the GBV Guidelines, and management and leadership .

Report Title: Disability Considerations in GBV Programming during . risk mitigation and response efforts during the COVID-19 pandemic. This document complements other resources relating to GBV and COVID-19 and assumes that the user is already familiar with common GBV prevention, risk mitigation and response . There is currently no research .

What is a Gender-based Violence Specialist? . Able to conduct strategic planning for GBV prevention and response (B) . can and are recruited without GBV program management experience and sometimes move from coordination into program management positions. Many GBV Program Managers do not move into

availability of gender based violence (GBV) prevention and response services and deterred . The Provincial Programme Analyst, GBV will contribute to the effective management of UNFPA supported GBV activities, ensuring multi-sectoral approach to prevention, mitigation . Strategic Engagement and Technical Coordination