Which of the following entity holds the user information in GSM while roaming?

Abstract

The throughput of a Mobile Switching Centre (MSC) in a Global System for Mobile communications (GSM) network is to be improved for meeting effectively and efficiently the service requirements of ever increasing mobile subscriber’s base. The period of temporary storage of subscribers’ profiles in visitor location register (VLR) at a mobile switching Centre (MSC) affects the throughput of GSM network. This book presents a sliding window of size seven days algorithm for determining the storage period of profiles in VLR that improves the throughput of MSC in GSM network. This book also presents a model integrating sliding window of size of seven days algorithm with a single/multiple channel finite queuing models for measuring the effect of waiting time of call setup requests in queue. At the end, it presents an aspiration model for determining optimal number of channels for a MSC.

Author information

Authors and Affiliations

  1. Department of Master of Computer Applications, Annamacharya Institute of Technology and Sciences (Autonomous), Rajampet, Andhra Pradesh, India

    Nuka Mallikharjuna Rao

  2. School of Computing, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology (Deemed to be University Estd. u/s 3 of UGC Act, 1956), Chennai, Tamil Nadu, India

    Mannava Muniratnam Naidu

Authors

  1. Nuka Mallikharjuna Rao

    You can also search for this author in PubMed Google Scholar

  2. Mannava Muniratnam Naidu

    You can also search for this author in PubMed Google Scholar

Corresponding author

Correspondence to Nuka Mallikharjuna Rao .

Rights and permissions

© 2017 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Mallikharjuna Rao, N., Muniratnam Naidu, M. (2017). Introduction. In: Sliding Window Algorithm for Mobile Communication Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-8473-7_1

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-981-10-8473-7_1

  • Published: 13 March 2018

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8472-0

  • Online ISBN: 978-981-10-8473-7

  • eBook Packages: Computer ScienceComputer Science (R0)

What is HLR?

Home Location Register (HLR) is the centralized subscriber database for the mobile carriers, which include details of subscribers authorized to use the global mobile communication system (GSM) within the mobile operators realm. This database contains phone number information, authentication information, and data such as phone settings and the subscriber's current location. It is based on SS7 MAP protocol.

What is HSS?

Home Subscriber Server (HSS) is the evolution of the HLR for the 4G networks. Similar to the HLR, the main function of the HSS is to communicate with the network and provide subscriber profile and authentication information. The HSS stores information about subscribers to assist in authorization, device details, as well as user location and service information. It is based on Diameter protocol.

What is VLR?

The Visitor Location Register (VLR) has information about roaming mobile stations in one or more MSC areas. A VLR contains information on all active subscribers in that area, including your home network. Generally, most of the registry entries are not visitors, but users on your own home network.

What is Private LTE Networks?

A private LTE networks could be a local cellular network that has cell sites and core network servers dedicated to supporting the connectivity of a particular organization’s requirements, independent of the cellular networks of service providers. Private LTE networks are important for organizations that use multiple devices and applications. Combined with 4G and 5G technology, they supply a stability of service that outstrips wireless connectivity. Dedicated to and managed by the organization itself, they're designed for high-speed mobility and secure mobile roaming within an organization’s business premises and land.

What is VoLTE?

Voice Over Long Term Evolution (VolTE). This technology helps users to simultaneously send voice and data over the network without losing voice quality. The voice quality is high and the user can keep the data connection on while making a voice call. Other advantage is it allows connecting calls faster.

What is Roaming controls?

Roaming allows a subscriber on one mobile network to access services in another region from a different service provider or operator. The most common example is accessing the services of a provider in another country outside the subscriber's home country.

What is MNO?

A mobile network operator (MNO) is a provider of wireless communications services that has or manages the infrastructure necessary to be able to sell and provide services to end users (subscribers), including the allocation of radio spectrum, the infrastructure of the wireless network. , transportation infrastructure, billing, customer service and provisioning of computer systems, repairs, etc.

What is MVNO?

A mobile virtual network operator (MVNO) is a provider of wireless communications services that does not have the wireless network infrastructure through which it provides services to its customers. An MVNO needs a mobile network operator to gain massive access to network services at wholesale prices, then they can independently set retail prices as well as use their own customer service, billing support systems, marketing and sales staff, or you could use the services of a mobile virtual network enabler (MVNE).

What is MVNE?

A mobile virtual network enabler (MVNE) is a company that supplies the necessary network infrastructure, as well as services, business support, administration, operations support to a mobile virtual network operator (MVNO). MVNE allows MVNO's to offer services to their own clients with their own brands. MVNE does not manage a relationship with consumers, it is a provider of network enablement platforms and services. The MVNE's carry out the planning, implementation and management of mobile services. For example, SIM provisioning and configuration, customer billing, customer relationship management, and value-added service platforms.

What is MVNA?

Mobile Virtual Network Aggregator (MVNA): An MVNA can incorporate many small MVNO's and using the collective power, it can connect to the operator as a single MVNO. The MVNA usually do not have direct subscribers, but if other smaller MVNO that connect to it. In general, you would need to have your own OSS / BSS in order to provide accurate billing information to OMV's.

What is VoWIFI?

Voice over Wifi (VoWifi): Along with IMS technology, it provides a voice packet service over IP in a WiFi network. So it is not necessary to have a mobile signal to make and receive calls. Another advantage is that it enables existing SIM-based security and authentication for VoLTE.

What is VoIP?

Voice over Internet Protocol (VoIP): It is defined as a set of standards for the transmission of multimedia data and voice content using the Internet Protocol (IP). In other words, the voice signal is sent in the form of digital data packets and not in analog form. The use of (VoIP) allows to have low costs, greater functionality, integration with other applications, but it will depend on the bandwidth available on the network.

What is iSIM/eSIM?

The Integrated SIM or iSIM is the next step in the evolution of the SIM card. An iSIM is embedded within a Tamper-resistant element (TRE) on the device’s system-on-a-chip (SoC) and It is the most advanced, efficient, and flexible device-side network equipment. It also eliminates the need to depend on discrete SIM hardware and can be activated wirelessly using an industry-wide secure protocol. The security of the iSIM can be customised as per the requirements of each device.

An iSIM can be useful in providing cellular connectivity to devices with size constraints, such as smartwatches. In addition, the freedom from a physical SIM means an iSIM can be used in a myriad of battery-operated IoT devices, instead of limiting them to Wi-Fi, alleviating any major constraints on the form or shape of the smart device. This is especially beneficial in the era of 5G as more device manufacturers are looking to use low power wide area (LPWA) networks to connect multiple devices in larger and larger inter-communicating networks.

The Embedded SIM card or eSIM is an unremovable embedded sim built into the phone's board. It's rewritable and compatible with all leading carriers. eSIM specifications (data format and security mechanisms in particular) are standardised to allow interoperability and enable remote SIM provisioning of any mobile device. eSIM lets you switch providers with the touch of a button.

eSIMs are found in a wide range of consumer products such as smartphones, wearables, and computers. They are also included in medical IoT devices, home automation, security systems, connected cars, IoT asset tracking devices, handheld POS (Point of Sales) systems, etc.

eSIM brings new advantages to all stakeholders:

  • For the end-user, the onboarding experience is straightforward. The eSIM allows an electronic device to be used as soon as it is switched on.
  • For service providers, logistics and support are simplified: no more SIM cards to manage at the customer's level.
  • For eSIM carriers, eSIM is extending mobile connectivity to many new consumer-connected devices, creating new business opportunities.

What is EIR?

The Equipment Identity Register (EIR) is a network entity used in GSM networks that stores lists of International Mobile Equipment Identity (IMEI) numbers, which correspond to physical handsets (not subscribers). The IMEI is used to identify the actual handset and is not dependent upon the International Mobile Subscriber Identity (IMSI), Mobile Station ISDN Number (MSISDN), or the Subscriber Identity Module (SIM). The IMSI, MSISDN, and SIM are all subscriber-specific and move with the subscriber when purchasing a new handset. The IMEI is handset-specific.

The EIR feature can be used to reduce the number of GSM handset thefts by providing a mechanism that allows network operators to prevent stolen or disallowed handsets from accessing the network. This control is accomplished by comparing the IMEI that is provided during handset registration to the following set of lists provided by the network operator:

  • Black - Mobile Stations (MS) on the Blacklist are denied access to the network.
  • Gray - MSs on the Graylist are allowed on the network, but may be tracked.
  • White - MSs on the Whitelist are allowed access to the network.

What is AAA?

The Authentication, Authorization and Accounting (AAA) is an important service and policy control framework, enabling CSPs to control how their subscribers access and consume data services over WiFi, FTTx, 5G, and other IP-based broadband networks. It touches a number of areas within the core network and back office, from security and provisioning to billing and, most significantly, customer experience.

The AAA server manages user profiles, holds access credentials, device identifiers, access policies, and so on. This helps enable various access control mechanisms such as barring access for blacklisted devices, allowing limited or walled-garden access. AAA helps implement corporate access control, allowing specific devices to offer connectivity to corporate network resources.

What is PCRF?

The Policy and Charging Rules Function (PCRF) It is a dedicated policy equipment standardised in 3GPP. PCRF provides operators to define diverse policies to accurately charge subscribers for accessing different network services.

As a policy tool, PCRF plays a central role in making policy and charging rules based on subscriber’s usage, location, status roaming and other factors. It implements flexible policy control for mobile, fixed-line, and IP multimedia subsystem (IMS) services. Being an important part of IMS architecture, PCRF integrates an avalanche of information to and from various multimedia networks like portals, operational support system, and charge rules while automatically creating policy decisions for each active network subscriber.

PCRF is a significant part of the IMS architectures; however, it isn’t exclusive to the 3GPP network in which it’s certified. It arrives pre-integrated in an IT server and works across wireless networks.

The PCRF architecture

PCRF comprises of three main components:

  • Policy Servers- to provide the policy and charging management function.
  • Subscriber Profile Repositories (SPR).
  • Configuration Central Management System (CMS)– to centralise the provisioning and management of policy servers.

Benefits of PCRF

  • High performance and reliability.
  • Reduced time-to-market.
  • Flexible policy control.
  • Pre-integrated solution with Billing, Charging system.

End Results

  • Provide flexibility to bring innovations in the next generation data services.
  • Highes.

PCRF enables service providers and operators with the highest level of flexibility required to innovate in the era of next generation data services. It supports policy enforcement, service data flow detection and flow-based charging. Offering a comprehensive solution in order to allow a new generation service operator to extend multiple use cases, PCRF allows telecom companies to better control their services and align their revenue with their resources.

As the service providers shift to LTE, PCRF policy will play a critical role in networking, becoming a strategic component in the race to manage and monetize LTE networks. Thus, to stay ahead in the competition, operators are making PCRF as part of their functioning.

What is SDM?

Subscriber data management (SDM) solutions lie at the heart of modern telecommunication networks, consolidating profile data across mobile and fixed networks in a single virtual data store.

Which register stores the Visitors information in GSM?

A visitor location register (VLR) is a server in a cellular network that supports roaming functions for users outside the coverage area of their own HLR.

What is the role of VLR entity in a GSM network?

The primary functions of the VLR are: To inform the HLR that a subscriber has arrived in the particular area covered by the VLR. To track where the subscriber is within the VLR area (location area) when no call is ongoing. To allow or disallow which services the subscriber may use.

What is HLR and VLR?

There are two types of location register: home location register (HLR) and visitor location register (VLR). An HLR is a database for mobile subscriber management. Stored therein are the subscription information and some location information enabling charging and routing.

What is HLR VLR and AUC?

Role of HLR VLR and AUC: It gives the information of the subscriber to the msc. When a user want to connect call then BSC transfer the call to the msc, MSC wants information whether the subscriber is from the same msc or from other for this MSC call to the HLR and VLR.