2. Communication Paradigms & Mobile Telecommunications Infrastructures Flashcards

1
Q

2 major paradigms for data transmission in communication

A

CIRCUIT-SWITCHED=communication line is used exclusively for communication parties (network resources used even if no data transferred; duration of connection used for billing)
— PACKET-ORIENTED=communication is divided into several packets, which get addressed & transferred using a shared transmission medium (network only used when data is transmitted; amount of transferred data used for billing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cellular Network

A

radio network consisting of several transmitters/base stations which cover a certain area (=cell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of CBC

A

++higher capacity (e.g. by multiplexing*): more users can use infrastructure
++reduced transmission power: reduced power consumption for mobile devices
++robustness: failure of one base station doesn’t affect complete infrastructure
++better coverage: better availability of infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disadvantages of CBC

A
  • -required infrastructure to link base stations is complex & costly
  • -handover needed when changing from one cell to another (complex)
  • -careful frequency planning to minimize interference (LTE 800 & LTE 700 = digital dividends)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multiplexing

A

describes how several users can share medium (e.g. mobile network) with minimum or no interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1st mobile radio network in Germany: “A-Network”/1G

A

Manual switching by an operator & for a call to a mobile; Operator needed to know the location area of the callee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2nd mobile radio network in Germany: “B-Network”/2G

A

Automatic dial switching by area code, but caller needed to know that code of callee –> GSM = mobile communication standard for fully digital mobile networks (made cross-border mobile communication possible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3rd mobile radio network in Germany: “C-Network”/3G

A

First cell based mobile radio system in Germany;
Change of cells happens automatically by distance measuring to the nearest base station;
Network can automatically detect place of the call partner by use of HLR; telephone number ≠ allocated to the terminal but to a magnetic stripe card & later a chip card

  • -> UMTS = Global Uniform Standard - Successor of GSM for mobile multimedia incl. video & audio transmissions
  • -> HSPA/HSPA+ = High Speed Packet Access/Evolved HSPA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LTE (Long Term Evolution)/4G

A

first all-IP mobile network technology -> higher data rates, capacity, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5G

A

fifth generation of cellular network technology – high bandwidth, low latency, high number of devices connected, …. –> use cases: autonomous driving, virtual reality
– View 1: hyper-connected vision – View 2: next-generation radio access technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition: GSM

A

(Global System for Mobile Communications) = mobile communication standard for fully digital mobile networks (worldwide roaming among different mobile network operators became possible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Services of GSM

A
  • Carrier services: Services to transfer signals over GSM network (focus on voice services)
  • Telecommunication services: Supports mobile communication among users
  • Supplementary services: Specific to network operators -> e.g. caller ID, call redirect, closed user groups, Teleconference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Architecture of GSM (3 main parts)

A

Network & Switching System (NSS), Operation Subsystem (OSS), Radio Subsystem (RSS) —> Process: PSTN - GMSC - HLR - VLR - MSC - BSC - BTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network & Switching System (NSS)

A

COMPONENTS:
Mobile Switching Center (MSC): Switching Center for initiation, termination & handover –
Home Location Register (HLR): Central Data Base with subscribers’ data (mobile number, location) –
Visitor Location Register (VLR): Data Base assigned to every MSC with data of active subscribers in MSC’s range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operation Subsystem (OSS)

A

COMPONENTS:
Operation & Maintenance Center (OMC): supervises each network component & creates status reports –
Authentication Center (AuC):protects identity of participants –
Equipment Identity Register (EIR): data list with identification list for devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Radio Subsystem (RSS)

A

COMPONENTS:
Mobile Station (MB): System of mobile terminal (device) & SIM –
Base Transceiver Station (BTS): Radio facility for signal transfer –
Base Station Controller (BSC): Administrates affiliated BTS & supervises e.g. frequency allocation & connection handover between cells

17
Q

GSM Security Services

A

ACCESS CONTROL & AUTHENTICATION: authentication of the subscriber to the SIM by input of a PIN & to the GSM network by challenge-response procedure (idea: nobody should make use of your phone or your SIM card without password) –
CONFIDENTIALITY: data & voice transferred between mobile station & BTS = encrypted, but no end-to-end encryption –
PARTIAL ANONYMITY: no transfer of data which can identify the subscriber via radio, instead temporary identification; temporary mobile subscriber ID, TMSI; only the operator, but none of your neighbors should identify your mobile phone due to the data sent

18
Q

Security in GSM (2G): SIM based Subscriber Authentication

A

Key K(i) & Algorithm A3 are stored on SIM and deposited in the AuC.

  1. AuC creates random number
  2. AuC ecyrypts rand and K(i) via A3 (SRes*)
  3. AuC transfers rand & SRes* to VLR
  4. VLR transfers exclusively rand to SIM
  5. SIM computers with “own” K(i) and A3 response SRes
  6. SRes computed by SIM is transmitted to VLR & compares with SRes*
  7. If SRes* = SRes the subscriber is authenticated successfully
19
Q

Security in GSM (2G): Encryption

A
  1. AuC creates random number
  2. AuC generates K(c) for encryption of transferred data via rand, K(i) & A8
  3. VLR transfers only rand to SIM
  4. SIM computed K(c) using A8, the rand received & local K(i)
  5. Mobile station & mobile radio network use generated K(c) and A5 for encryption & decryption of sent and received data
20
Q

GSM (2G) Security Model: Shortcomings

A

Network doesn’t authenticate itself (only authentication of terminal/subscriber): assumption that network is trustworthy per se

    • Subscriber localization is almost exclusively controlled by network: centralized movement tracking is possible
    • Model bases partly on secret encryption algorithms (A3 & A8 published without authentication)
    • No encryption from terminal to terminal but only over air interface (deactivation by network possible, without notification of users)
    • Encryption comparatively “weak” because of key length
21
Q

Definition: UMTS

A

(Universal Mobile Telecommunication System) = Problem with 2G: different standards in different continents which avoid worldwide roaming -> demand for 3G: globally uniform standard -> Common approach: worldwide reservation of frequencies in 2GHz range

22
Q

UMTS Architecture

A
  • UMTS Terrestrial Radio Access Network (UTRAN)
  • Radio Network Subsystem (RNS) (=RSS)
  • Radio Network Controller (RNC): controls the Node Bs (=MSC)
  • Node B: UMTS base stations (equivalent to BTS in GSM): not so different as in GSM
  • UMTS Core network: corresponds to Network- &Switching Subsystems (NSS) in GSM
23
Q

UMTS Security Model

A
  • UMTS complements the security mechanisms known by GSM:
  • -> enhanced participant authentication (EMSI)
  • -> network authentication
  • -> integrity protection of data traffic
  • -> transferred security keys are also encrypted in the fixed network (e.g. HLR-VLR)
  • -> increased key length
  • -> end-to-end encryption = possible
24
Q

LTE

A

Long Term Evolution -> LTE Advanced (4G) makes use of frequency spectrum more efficiently, resulting in higher data rates (towards 1Gbit/s) & lower latency

25
Q

5G

A

Two views of 5G: 1. Hyper-connected vision (everything will be connected) - 2. Next-generation radio access technology (download/upload faster)

Potential Use Cases: autonomous driving, wireless-cloudbased office, machine-2-machine connectivity, AR

26
Q

Roaming

A

Denotes a change of network access.
• Change of GSM network operator
• Change between different network systems (UMTS, GSM, WLAN, …)
• Cell change within GSM system (handover): GSM manages handover with a short connection interruption -> reason: update of VLR