HLR&AC Overview

download HLR&AC Overview

of 126

Transcript of HLR&AC Overview

  • 8/3/2019 HLR&AC Overview

    1/126

    Home Location Register/Authentication Center

    Overview

    STUDENT TEXT

    LZU 108 3827 REV R1A

  • 8/3/2019 HLR&AC Overview

    2/126

    LZU 108 3827 REV R1A

    All rights reserved. No part of this document may be reproduced

    in any form without written permission of the copyright holder.

    This book is a training document and contains simplifications. Itmust, therefore, not be considered as a specification of the

    system.

    The contents of this book are subject to revision without notice

    due to continued progress in design and manufacture.

    REVISION HISTORY

    1998

    REVISION DATE DESCRIPTION

    R1A November 1998 First release of course.

  • 8/3/2019 HLR&AC Overview

    3/126i

    HLR/AC Overview Course

    The purpose of the HLR/AC Overview course is to provide an overview of

    the Home Location Register and Authentication Center functionality

    according to how it is implemented on the Jambala platform.

    The course outlines the role of the HLR/AC in the mobile network and

    how it communicates with other entities. It describes the main

    functionality of the HLR/AC and explains the services that the HLR/AC

    provides. It analyzes the architecture of the HLR/AC and examines the

    hardware and software components. The HLR/AC Overview course

    summarizes how the Jambala platform supports the evolution of the world

    of telecommunications.

    The HLR/AC Overview is designed to be an Instructor Led Training (ILT)

    course. It is a one-day course that covers the theory and concepts of the

    HLR/AC and how it operates on the Jambala platform. There are six

    modules in the course, each of which is accompanied by a set of

    theoretical exercises. The learning objectives associated with each module

    are outlined in the table below.

    Course Objectives

    After completing this course you will achieve competence in the

    following areas:

    The role of the HLR/AC in the mobile network

    The functionality of the HLR/AC

    The services provided by the HLR/AC

    The hardware and software components of the HLR/AC.

    03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    4/126

    HLR/AC Overview

    ii 03802 LZU 108 3827 Rev. A

    Module Module Objectives

    1. The Wireless Network

    1/03802 LZU 108 3827

    Summarize the architecture and main principles of

    the cellular network

    Identify the entities in a cellular network Recognize the different areas defined within a

    cellular network

    Understand the terminology associated with cellular

    networks

    Outline the function of the HLR

    List the important data stored in the HLR

    2. HLR Traffic Functions

    2/03802 LZU 108 3827

    Explain the traffic functions of the HLR

    Understand the purpose of registration

    Describe subscriber activity handling in the HLR

    Outline the HLRs role in call delivery

    State how the HLR supports equal access

    pre-subscription

    Identify the HLRs role in SMS calls

    Understand how a subscriber service call operates

    3. Security and Authentication

    3/03802 LZU 108 3827

    Describe the purpose and content of the

    Authentication Center

    Explain how the main authentication proceduresoperate

    Understand the security and authentication functions

    in the HLR/AC

    4. OA&M in the HLR/AC

    4/03802 LZU 108 3827

    Understand the OA&M model in the HLR/AC

    Describe the main tasks related to Operation,

    Administration and Maintenance of the HLR/AC

    Differentiate between alarms and notifications

    Understand geographical redundancy.

  • 8/3/2019 HLR&AC Overview

    5/126

    HLR/AC Overview

    iii03802 LZU 108 3827 Rev. A

    5. HLR/AC Components

    5/03802 LZU 108 3827

    Describe the application platform

    Outline how the HLR/AC communicates according

    to CORBA-compliant interfaces

    Explain how TelORB, network signaling support

    and the OA&M implementation are combined in theHLR/AC

    List the hardware components of the HLR/AC

    Identify the application software of the HLR/AC

    6. HLR Subscriber Features

    6/03802 LZU 108 3827

    Identify the most common subscriber features

    supported by the HLR

    Module Module Objectives

  • 8/3/2019 HLR&AC Overview

    6/126

    HLR/AC Overview

    iv 03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    7/126v

    Table Of Contents

    Module 1. The Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

    1.2 Entities in a Cellular Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2

    1.2.1 Mobile Switching Center (MSC). . . . . . . . . . . . . . . . . . . . . . . . . . . .2

    1.2.2 Base Station (BS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

    1.2.3 The Authentication Center (AC) . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

    1.2.4 Home Location Register (HLR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

    1.2.5 Visitor Location Register (VLR) . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

    1.2.6 Mobile Station (MS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    1.2.7 Message Center (MC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    1.2.8 Service Control Point (SCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.2.9 Operation and Maintenance Center (OMC). . . . . . . . . . . . . . . . . . . 5

    1.3 Areas in a Cellular Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    1.3.1 Cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    1.3.2 Location Area (LA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    1.3.3 Service Area (SA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

    1.3.4 Numbering Plan Area (NPA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    1.3.5 Local Access and Transport Area (LATA) . . . . . . . . . . . . . . . . . . . .6

    1.4 Terminology in a Cellular Network . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

    1.4.1 Interexchange Carrier (IC). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

    1.4.2 Carrier Identification Code (CIC) . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    1.4.3 Co-operating Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

    1.4.4 Peripheral Equipment Gateway (PEG) . . . . . . . . . . . . . . . . . . . . . . 8

    1.4.5 Gateway MSC (MSC-G) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    1.4.6 Visited MSC (MSC-V) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    1.5 Numbers in a Cellular Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

    1.5.1 Directory Number (DN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

    1.5.2 Electronic Serial Number (ESN) . . . . . . . . . . . . . . . . . . . . . . . . . .10

    1.5.3 Mobile Identification Number (MIN) . . . . . . . . . . . . . . . . . . . . . . . .10

    1.5.4 Personal Identification Number (PIN) . . . . . . . . . . . . . . . . . . . . . . 11

    1.5.5 Temporary Local Directory Number (TLDN) . . . . . . . . . . . . . . . . . 11

    1.5.6 Forward-To Number (C-Number). . . . . . . . . . . . . . . . . . . . . . . . . . 111.6 Home Location Register. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

    1.6.1 Database Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

    1.6.2 Subscriber Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

    1.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

  • 8/3/2019 HLR&AC Overview

    8/126

    HLR/AC Overview

    vi 03802 LZU 108 3827 Rev.A

    Module 2. HLR Traffic Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

    2.2 Traffic Functions of the HLR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18

    2.3 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

    2.4 Subscriber Activity Handling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

    2.5 Call Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

    2.6 Equal Access Pre-Subscription . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242.7 IS-136 Alphanumeric Paging with Short Message Service . . . . . . . .26

    2.8 Subscriber Service Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

    2.9 Support of Subscriber Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

    2.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

    Module 3. Security and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

    3.2 Types of Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34

    3.2.1 Cloning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .343.2.2 Tumbling ESN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

    3.2.3 Hijacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

    3.2.4 Subscription Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

    3.2.5 Administrative Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

    3.3 Security and Authentication Functions. . . . . . . . . . . . . . . . . . . . . . . .35

    3.4 Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

    3.4.1 Introduction to Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

    3.4.2 Authentication Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

    3.4.3 Authentication Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

    3.4.4 Authentication Failure Reporting . . . . . . . . . . . . . . . . . . . . . . . . . .44

    3.4.5 Authentication Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

    3.5 Voice Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

    3.6 Fraudulent Activity Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46

    3.6.1 FAD Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

    3.6.2 Call Barring Upon Fraudulent Activity . . . . . . . . . . . . . . . . . . . . . .47

    3.7 Serial Number Screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48

    3.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

    Module 4. OA&M in the HLR/AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

    4.2 The OA&M Model Within the HLR/AC . . . . . . . . . . . . . . . . . . . . . . . .52

    4.2.1 Telecommunications Management Network (TMN). . . . . . . . . . . .52

    4.3 Typical OA&M Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

    4.3.1 Logical Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

    4.3.2 Group Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

    4.3.3 Subscriber Number Administration . . . . . . . . . . . . . . . . . . . . . . . .55

    4.3.4 Subscriber Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

    4.3.5 Peripheral Equipment Gateway Data . . . . . . . . . . . . . . . . . . . . . .56

    4.3.6 Subscriber Activity Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

  • 8/3/2019 HLR&AC Overview

    9/126

    Table of Contents

    vii03802 LZU 108 3827 Rev. A

    4.3.7 Administration of Co-operating Exchanges . . . . . . . . . . . . . . . . . .57

    4.3.8 Forward-To Number Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

    4.3.9 Tables in the HLR/AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

    4.3.10 Alarm Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

    4.4 Geographical HLR Redundancy. . . . . . . . . . . . . . . . . . . . . . . . . . . . .62

    4.4.1 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64

    4.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

    Module 5. HLR/AC Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

    5.2 HLR/AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68

    5.2.1 Application Platform. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

    5.2.2 Common Object Request Broker Architecture. . . . . . . . . . . . . . . .72

    5.2.3 TelORB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

    5.2.4 Network Signaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78

    5.2.5 OA&M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79

    5.3 HLR/AC Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .805.3.1 Application Platform Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . .81

    5.3.2 HLR/AC Application Software . . . . . . . . . . . . . . . . . . . . . . . . . . . .83

    5.3.3 Example of an Incoming Message . . . . . . . . . . . . . . . . . . . . . . . .88

    5.4 Dimensioning the HLR/AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90

    5.4.1 Dimension the HLR/AC Traffic Intensity . . . . . . . . . . . . . . . . . . . .90

    5.4.2 Dimension the HLR/AC Subscriber Database Size. . . . . . . . . . . .91

    5.5 HLR and Middleware Right-To-Use . . . . . . . . . . . . . . . . . . . . . . . . . .93

    5.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

    Module 6. HLR Subscriber Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

    6.2 Calling Number Identification (CNI) . . . . . . . . . . . . . . . . . . . . . . . . . .96

    6.3 Enquiry Call (ENQ). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

    6.4 Group 3 Fax (G3FAX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

    6.5 Malicious Call Tracing (MCT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

    6.6 Mobile Priority Subscriber (MPS) . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

    6.7 Asynchronous Data (ADS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

    6.8 Call Waiting (CAW). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

    6.9 Mobile Charging Area (MCA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .986.10 Short Message Service (SMS). . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

    6.11 Call Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99

    6.11.1 Call Forwarding Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99

    6.11.2 Busy Call Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

    6.11.3 Call Forwarding Variations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101

    6.11.4 Forward-to Number Provision . . . . . . . . . . . . . . . . . . . . . . . . . . .102

    6.12 Immediate Charging (ISE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

    6.13 Message Waiting Indication (MWI). . . . . . . . . . . . . . . . . . . . . . . . . .104

    6.14 Do Not Disturb (DDB). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104

  • 8/3/2019 HLR&AC Overview

    10/126

    HLR/AC Overview

    viii 03802 LZU 108 3827 Rev.A

    6.15 Absent Subscriber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

    6.16 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

    List of Abbreviations and Acronyms . . . . . . . . . . . . . . . . . . . . . . . 107

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

  • 8/3/2019 HLR&AC Overview

    11/1261

    Module 1. The Wireless Network

    1.1 Introduction

    This module introduces the range of components that exist in a wireless

    network. It describes the role of each component and their relationships to

    the other entities in the network. It outlines the various geographical

    regions defined within the cellular network and explains the meaning of

    some terminology specific to cellular networks. The module describes the

    main role of the HLR as a database and summarizes the data stored in theHLR.

    Module Objectives

    After completing this module you will be able to:

    Summarize the architecture and main components of the cellular

    network

    Identify the entities in a cellular network

    Recognize the different areas defined within a cellular network Understand the terminology associated with cellular networks

    Outline the function of the HLR

    List the important data stored in the HLR.

    1/03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    12/126

    HLR/AC Overview

    2 1/03802 LZU 108 3827 Rev. A

    1.2 Entities in a Cellular Network

    The Advanced Mobile Phone System (AMPS) is an analogue standard

    which was developed in North America and introduced in 1984. The

    Digital Advanced Mobile Phone System (D-AMPS) is an evolution of the

    analog AMPS standard and implements Time Division Multiple Access

    (TDMA). D-AMPS conforms to the IS-136 standard defined by the

    Cellular Telecommunications Industry Association (CTIA).

    The majority of cellular networks in North America, South America, New

    Zealand and Australia adhere to the Digital Advanced Mobile Phone

    System (D-AMPS) standard. There are various entities in a D-AMPS

    network, some of which are displayed in the figure below.

    Figure 1.1 Entities in a Cellular Network

    1.2.1 Mobile Switching Center (MSC)

    The Mobile Switching Center (MSC) is the heart of the cellular network. It

    is responsible for switching calls from the initial origin to the final point of

    destination. The MSC handles all connections and disconnections of

    mobile calls. It supports the call processing and switching functions in the

    wireless network. It handles traffic within a cellular network, interfacing

    with other MSCs in the same or other cellular networks.

    It also interfaces with the Public Switched Telephone Network (PSTN) at

    the local, transit, or international gateway levels.

  • 8/3/2019 HLR&AC Overview

    13/126

    Module 1 - The Wireless Network

    31/03802 LZU 108 3827 Rev. A

    1.2.2 Base Station (BS)

    The Base Station (BS) handles traffic to and from the mobile subscriber. It

    is connected to the MSC and includes the transceiver and control

    equipment located at one site. This control equipment handles and

    supervises the quality of the radio connection between the BS and mobile

    subscriber, and the communication link between the BS and MSC.

    An MSC controls one or more BSs.

    1.2.3 The Authentication Center (AC)

    The Authentication Center (AC) establishes that the individual attempting

    to make a call is a genuine subscriber and has a valid subscription to the

    mobile network. The AC holds authentication data specific to each

    subscriber which prevents fraud in the network. Using this data, the AC

    can detect when someone is trying to access the network with a counterfeit

    subscription. The AC is often colocated with the Home Location Register

    (HLR).

    1.2.4 Home Location Register (HLR)

    The Home Location Register (HLR) acts as a centralized network element

    for storing subscriber information. It administers the subscriber

    information and sends that information to other network elements. Each

    mobile subscriber has a record in a HLR. An HLR stores subscriber

    information (such as location information, subscriber activity status or

    subscriber features) in the subscribers record.

    An HLR may be located within an MSC or it may be a stand-alone

    network node. An HLR can serve more than one MSC. An operator may

    have more than one HLR installed in the network depending, on subscriber

    capacity. Each HLR can be duplicated for redundancy purposes.

    1.2.5 Visitor Location Register (VLR)

    The Visitor Location Register (VLR) is a database for storing information

    related to visiting subscribers. A visiting subscriber is a subscriber who is

    currently receiving service from an MSC. An MSC considers all mobile

    subscribers to be visiting subscribers. The visiting mobile subscriberidentities and associated subscriber data are stored in VLR records similar

    to the HLR records.

    The VLR is normally co-located with an MSC, (leading to the term

    MSC/VLR), but is separate from the HLR. When a subscriber registers

    with the network, subscriber information must be transferred from the

    HLR to the MSC where the subscriber is registered. The VLR acts as the

    interface between the HLR and the MSC for the transfer of subscriber-

    related information. The MSC retrieves information from the VLR for

    handling calls to or from visiting subscribers.

  • 8/3/2019 HLR&AC Overview

    14/126

    HLR/AC Overview

    4 1/03802 LZU 108 3827 Rev. A

    The signaling standard IS-41 can be used to transport messages between

    the MSC/VLR and the HLR.

    1.2.6 Mobile Station (MS)

    The Mobile Station (MS) is the physical handset that the subscriber uses to

    make a mobile call. It enables the user to access network services. The MS

    communicates with the mobile network; it is the interface equipment usedto terminate the radio path at the user side. Different manufacturers

    produce many different variations of mobile stations, offering a variety of

    designs and features tailored to meet the individual needs of subscribers.

    There are a range of standards for mobile stations that affect the

    capabilities of the mobile station. A mobile station, manufactured

    according to a particular standard, ensures that the mobile station can

    obtain service in a cellular system that adheres to the same standard.

    The following are examples of Interim Standards (ISs) which affect

    mobile stations:

    IS-54B

    IS-136

    IS-95

    IS-95A

    IS-88

    IS-94

    IS-91.

    Mobile Stations which adhere to a particular standard ensure that certain

    functionality is possible. For example a mobile station that supports

    IS-54B, IS-91 or IS-136 is capable of authentication.

    The MS communicates with the mobile network via the BS along a radio

    link. The communication path between the MS and BS is referred to as the

    air interface.

    1.2.7 Message Center (MC)

    A Message Center (MC) is a network node responsible for the receptionand delivery of short messages (alphanumeric messages sent to the display

    screen of a mobile station).

    The MC communicates with the MSC and the HLR using IS-41 signaling.

    1.2.8 Service Control Point (SCP)

    The Service Control Point (SCP) acts as a host for a variety of Wireless

    Intelligent Network (WIN) features in addition to those features offered by

    the MSC/VLR functionality. WIN features enhance the range, quality and

  • 8/3/2019 HLR&AC Overview

    15/126

    Module 1 - The Wireless Network

    51/03802 LZU 108 3827 Rev. A

    flexibility of services that can be offered to mobile subscribers as well as

    the speed with which new services can be developed and introduced. Toll

    Free Calling and Private Numbering Plan are examples of WIN services.

    The SCP contains the logic to control the handling of WIN calls and

    services. The SCP allows operators to quickly deploy customized features

    enabling them to offer service differentiation, which ultimately leads to an

    increase in subscriber loyalty and revenue.

    The SCP can communicate with the HLR/AC and the MSC using

    IS-41 signaling.

    1.2.9 Operation and Maintenance Center (OMC)

    An Operation and Maintenance Center (OMC) is a computerized

    monitoring center which is connected to network components such as

    MSCs. In the OMC, staff are presented with information about the status

    of the network and can monitor and control nodes within the cellular

    network. The staff can remotely contol these nodes and perform operationson them without having to be on-site. There may be one or several OMCs

    within a network depending on the network size.

    1.3 Areas in a Cellular Network

    A mobile network is divided up into a number of areas that enable

    operators to break up their cellular systems into manageable areas

    providing mobile coverage to subscribers. A mobile network can be

    referred to as a Public Land Mobile Network (PLMN).

    Figure 1.2 Areas in a Cellular Network

  • 8/3/2019 HLR&AC Overview

    16/126

    HLR/AC Overview

    6 1/03802 LZU 108 3827 Rev. A

    1.3.1 Cell

    A cell is the basic unit of a mobile network. A mobile network is

    comprised of many cells. Each cell provides coverage to a specific area in

    the mobile network. The size of a cell can vary; it can provide coverage to

    a large or small geographic area. A Base Station (BS) controls one or

    several cells.

    1.3.2 Location Area (LA)

    Operators can group a number of cells together to form a Location Area

    (LA). When a mobile station enters a new LA it must register its new

    location with the cellular system. The VLR keeps track of the LA that a

    mobile subscriber is currently receiving coverage in. When a call is being

    routed to a subscriber, this Location Area is used to page the subscriber.

    1.3.3 Service Area (SA)

    A number of Location Areas (LAs) can be grouped together to form a

    Service Area (SA). A Service Area is controlled by one MSC.

    The HLR stores the MSC identity of the Service Area in which the mobile

    subscriber was last registered.

    1.3.4 Numbering Plan Area (NPA)

    A Numbering Plan Area (NPA) identifies the area code for a PLMN or

    PSTN. For example, the NPA for Montreal is 514.

    1.3.5 Local Access and Transport Area (LATA)

    A Local Access and Transport Area (LATA) is a geographical region that

    defines the boundaries betweeen between local and long-distance service.

    A call that originates and terminates within the same LATA is a local call

    while a call that crosses the boundary of a LATA is a long-distance call.

    Mobile operators (local exchange carriers) provide service within a LATA

    while long distance carriers transport calls transiting between LATAs.

    The service area of a Mobile Switching Center (MSC) may include one or

    more Local Access and Transport Areas (LATAs). Subscribers can travelfrom one LATA to another and make calls from within their LATA to

    subscribers in other LATAs.

  • 8/3/2019 HLR&AC Overview

    17/126

    Module 1 - The Wireless Network

    71/03802 LZU 108 3827 Rev. A

    1.4 Terminology in a Cellular Network

    Figure 1.3 NPA, LATA and IC

    1.4.1 Interexchange Carrier (IC)

    An Interexchange Carrier (IC) is an operating company that transports

    mobile calls across LATA boundaries; it specialises in long distance calls.

    There are a number of different Interexchange Carriers (ICs), for exampleMCI, Sprint or AT&T. ICs offer diverse competitive packages to

    subscribers. The subscriber can choose (pre-subscribe) which IC to use for

    their calls outside their area code (inter-LATA calls) by dialing a specific

    code. The HLR stores this information in the subscriber data as the

    subscribers Preferred Interexchange Carrier (PIC). If the subscriber does

    not choose an IC, the default PIC is used.

    1.4.2 Carrier Identification Code (CIC)

    A Carrier Identification Code (CIC) is used to route and bill calls in thepublic switched telephone network. CICs are four-digit codes in the format

    XXXX.

    To obtain a CIC, an applicant must purchase access from an access

    provider, who will in turn apply to the North American Numbering Plan

    Administration (NANPA) for the assignment on behalf of the access

    purchaser.

  • 8/3/2019 HLR&AC Overview

    18/126

    HLR/AC Overview

    8 1/03802 LZU 108 3827 Rev. A

    1.4.3 Co-operating Exchange

    A co-operating exchange is any Mobile Switching Center (MSC) or

    Message Center (MC) in a cellular network that communicates with the

    HLR. All mobile telephony exchanges in the network that subscribers can

    roam to are defined as co-operating exchanges in the HLR. When an

    operator defines an MSC as a co-operating exchange, information such as

    the identity of the MSC, routing information and signaling information areentered into the database. This information is used for routing purposes so

    that other entities in the cellular network can communicate with the

    co-operating exchange.

    1.4.4 Peripheral Equipment Gateway (PEG)

    The Peripheral Equipment Gateway (PEG) is a node in the network which

    connects MSCs and HLRs to external equipment, specifically the Voice

    Mail System (VMS).

    When the HLR detects that a subscriber has diverted calls to the VMS,calls to the subscriber are routed via the PEG to the appropriate voice mail

    box.

    1.4.5 Gateway MSC (MSC-G)

    The Gateway MSC (MSC-G) is the exchange where calls to a given

    subscriber arrive initially in the PLMN. The MSC-G is the first exchange

    to receive calls from the mobile operators network and also calls from

    other networks, for example the PSTN.

    The MSC-G can also be referred to as the Interrogation Exchange because

    it interrogates the HLR asking for the subscribers location.

  • 8/3/2019 HLR&AC Overview

    19/126

    Module 1 - The Wireless Network

    91/03802 LZU 108 3827 Rev. A

    Figure 1.4 MSC-G and MSC-V

    1.4.6 Visited MSC (MSC-V)

    A Visited Mobile Switching Center (MSC-V) is any MSC where a mobile

    subscriber places or receives a call. It is the exchange that is currently

    providing service to the subscriber. The MSC-V is responsible for call set-

    up, supervision, and disconnection; locating, handoff, and related

    functions; and charging.

    The MSC-V is usually the MSC where the subscriber has registered and is

    pointed to by the subscriber location information in the HLR at call

    delivery.

    The MSC-V can also be referred to as the serving Exchange.

  • 8/3/2019 HLR&AC Overview

    20/126

    HLR/AC Overview

    10 1/03802 LZU 108 3827 Rev. A

    1.5 Numbers in a Cellular Network

    Figure 1.5 Numbers in a Cellular Network

    1.5.1 Directory Number (DN)

    A Directory Number (DN) is a number which uniquely identifies a mobile

    telephone subscription in the PSTN numbering system. The DN is used

    when dialing calls to mobile subscribers. The mobile telephone numberingplan can be separate or integrated into the PSTN numbering plan. The DN

    consists of a 10 digit number of the format NPA nxx xxxx where n can

    have the value 2-9 and x can have the value 0-9.

    1.5.2 Electronic Serial Number (ESN)

    The Electronic Serial Number (ESN) is a number which uniquely

    identifies a subscribers mobile station. There are eight digits in the ESN.

    It consists of three parts: a manufacturer's code, a reserved area, and a

    manufacturer-assigned serial number.

    The ESN is used for protection from unauthorized use. Each mobile

    station is assigned a unique, fixed ESN which is stored in protected

    memory of the mobile station during manufacture. If a mobile station is

    stolen, the operator can define the ESN to be fraudulent and prevent

    misuse.

    1.5.3 Mobile Identification Number (MIN)

    The Mobile Identification Number (MIN) is a number which uniquely

    identifies a mobile subscription on the radio path. It is used for signaling

  • 8/3/2019 HLR&AC Overview

    21/126

    Module 1 - The Wireless Network

    111/03802 LZU 108 3827 Rev. A

    within the cellular network. The MIN is stored in the mobile station. In

    North America, the MIN value is often the same as the DN.

    1.5.4 Personal Identification Number (PIN)

    A Personal Identification Number (PIN) is a number which is unique to

    each mobile subscriber. The network administration supplies the mobile

    subscriber with a PIN code.

    The subscriber can use their PIN to activate and deactivate certain

    subscriber features, for example call barring. In this manner, the PIN code

    protects against unauthorized access to subscriber contolled features.

    1.5.5 Temporary Local Directory Number (TLDN)

    The Temporary Local Directory Number (TLDN) is used for delivering

    calls to roaming subscribers. Each MSC has its own pool of TLDNs.

    During a call to a subscriber, the HLR asks the exchange where the

    subscriber is located (MSC-V) for a TLDN which is used to route the call

    to the MSC-V. The TLDN is a network address which is temporarily

    assigned for call set-up; once the call is routed to the subscriber, the TLDN

    is released back into the pool and can be used for other call set-ups.

    1.5.6 Forward-To Number (C-Number)

    A Forward To Number (C-Number) is the number of another phone to

    which a call is diverted during call forwarding. The operator can define

    this number (e.g. for forwarding Voice Mail) or the subscriber can define

    the number by means of procedure calls. A subscriber can have certainsubscriber classes indicating that calls should be diverted.

  • 8/3/2019 HLR&AC Overview

    22/126

    HLR/AC Overview

    12 1/03802 LZU 108 3827 Rev. A

    1.6 Home Location Register

    1.6.1 Database Function

    The Home Location Register (HLR) acts as a central network element for

    storing mobile subscriber information. It administers the subscriber

    information and distributes that information to other network elements.The HLR subscriber is always considered a roamer by the network and

    whenever the subscriber registers in a new service area the HLR copies

    most of the subscriber information from its database to the VLR. The

    serving MSC/VLR location of the subscriber is then stored in the HLR,

    which the HLR uses to deliver calls to the roaming subscriber.

    The HLR stores subscription, location and activity data and provides

    administration procedures to allow this data to be added and maintained.

    1.6.2 Subscriber DataThe HLR holds both static and dynamic data. Static data is mainly related

    to the mobile subscription and is generally added and updated manually.

    Figure 1.6 The HLR as a Database

  • 8/3/2019 HLR&AC Overview

    23/126

    Module 1 - The Wireless Network

    131/03802 LZU 108 3827 Rev. A

    The main data items are listed below:

    Mobile Identification Number (MIN)

    Directory Number (DN)

    Electronic Serial Number (ESN)

    Personal Identification Number (PIN)

    Terminal TypeThe standard that corresponds to the subscribers mobile station, for

    example IS-54 B, IS-136 etc.

    Subscriber Features

    Note that for certain features additional information will be stored,

    for example, for call forwarding a forward-to number and service

    activity state will also be stored. In some cases subscribers can reset

    these values by using service calls. Some features are assigned to all

    subscribers (for example traffic class, control channel capability)

    and some will be optional (for example call forwarding busy,

    preferred long distance carrier etc.).Dynamic data is updated automatically as the mobile roams and becomes

    active or inactive. This includes:

    Serving MSC Identification (MSCID)

    The serving MSCID is updated when the mobile registers in an

    exchange service area.

    Temporary Location (TLOC)

    When subscriber makes a call in an exchange where the subscriber is

    not previously registered the MSC may send a registration messagewith a Temporary Location (TLOC). The TLOC may be used to

    route calls to the subscriber instead of the stored location. The

    TLOC is only set for a call on an analog voice channel and is cleared

    when the call finishes. This feature is used in Ericsson MSCs.

    Location Area Identification (LOCID)

    The LOCID is received when the mobile registers and can be sent to

    the MSC during call delivery in case the serving MSC does not have

    a valid location area for the subscriber.

    Activity statusThe activity status indicates whether the mobile station is currently

    registered. The activity status is updated to active when a mobile

    station powers on and becomes inactive when the mobile powers off

    or misses a periodic registration.

    Control Channel Mode (CCM)

    This is stored and maintained for subscribers in order to check for

    fraudulent accesses. That is if the mode is not compatible with the

    Control Channel Capabilities (CCCs) of the phone. CCM is also

  • 8/3/2019 HLR&AC Overview

    24/126

    HLR/AC Overview

    14 1/03802 LZU 108 3827 Rev. A

    used to check before delivering short messages that the mobile is on

    a digital CC. To support this a registration message must be sent

    from the serving MSC whenever the MS changes CC type.

  • 8/3/2019 HLR&AC Overview

    25/126

    Module 1 - The Wireless Network

    151/03802 LZU 108 3827 Rev. A

    1.7 Summary

    A number of entities exist in the cellular network. They co-operate and

    communicate together in order to provide mobile communication to the

    subscriber. They each have a specific role to fulfill and perform different

    tasks.

    Some of the entities in a cellular network are:

    Mobile Switching Center (MSC)

    Base Station (BS)

    Authentication Center (AC)

    Home Location Register (HLR)

    Visitor Location Register (VLR)

    Mobile Station (MS)

    Message Center (MC)

    Service Control Point (SCP)

    Operation and Maintenance Center (OMC).

    A cellular network is divided into a number of geographical areas:

    A cell is the smallest and most basic area in the mobile network

    A number of cells can be grouped together to form a Location Area

    (LA)

    A number of Location Areas can be grouped together to form a

    Service Area (SA).

    A Numbering Plan Area (NPA) corresponds to an area code in a PLMN.

    A Local Access Transport Area (LATA) is a geographical region that

    distinguishes between local and long-distance service.

    An Interexchange Carrier (IC) provides a service for transporting calls that

    traverse LATAs, that is long distance calls. A Carrier Identification Code

    (CIC) identifies an IC.

    Some of the numbers associated with the cellular network are:

    The Directory Number (DN) which is the number which you dial inorder to reach a mobile subscriber

    The Electronic Serial Number (ESN) which is inscribed on every

    mobile station during manufacture

    The Mobile Identification Number (MIN) is the mobile networks

    translation of the Directory Number

    The Temporary Local Directory Number (TLDN) is requested from

    the exchange where the subscriber is located and is used as a

    dynamic address to route the call to the subscriber

    The Forward To Number (C-Number) specifies a destination number

  • 8/3/2019 HLR&AC Overview

    26/126

    HLR/AC Overview

    16 1/03802 LZU 108 3827 Rev. A

    that the call should be diverted to.

    The HLR stores subscriber data, for example ESN, DN and PIN. It also

    stores dynamic data which is updated automatically, for example MSCID

    and activity status.

  • 8/3/2019 HLR&AC Overview

    27/12617

    Module 2. HLR Traffic Functions

    2.1 Introduction

    Although it is not a switch, the Home Location Register is involved in

    handling many types of traffic cases. In particular, the HLR is involved in

    subscriber activity management and in the set-up phase of calls to mobile

    stations. This module outlines the role of the Home Location Register for

    various traffic cases.

    Module Objectives

    After completing this module you will be able to understand:

    Explain the traffic functions of the HLR

    Understand the purpose of registration

    Describe subscriber activity handling in the HLR

    Outline the HLRs role in call delivery State how the HLR supports equal access pre-subscription

    Identify the HLRs role in SMS calls

    Understand how a subscriber service call operates.

    2/03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    28/126

    HLR/AC Overview

    18 2/03802 LZU 108 3827 Rev. A

    2.2 Traffic Functions of the HLR

    The HLR is involved in the following traffic functions:

    Registration

    Subscriber activity handling

    Call delivery

    Equal access pre-subscription

    IS-136 alphanumeric paging with Short Message Service (SMS)

    Subscriber service calls

    Supporting subscriber feature calls.

    The HLR is also involved in authentication and checking for fraudulent

    events during traffic processes, the details of which are not shown here but

    are covered later in the Security and Authentication module.

  • 8/3/2019 HLR&AC Overview

    29/126

    Module 2 - HLR Traffic Functions

    192/03802 LZU 108 3827 Rev. A

    2.3 Registration

    The purpose of registration is to update a subscribers mobile station

    location, which is used when a call needs to be delivered to that mobile

    station.

    The HLR may be involved with several types of registrations, for example,

    new system area, power on, power down (activity/inactivity messages)and control channel changes.

    The example here shows how the HLR deals with a mobile subscriber who

    registers in an MSC where they were not previously registered.

    Figure 2.1 Registration in a new Serving Exchange

    1. The MS sends a Registration Access message to the serving MSC.

    2. The serving MSC does not find the subscriber record in the VLR and

    sends a Registration Notification message to the subscribers HLR.

    3. The HLR checks the subscriber record, and finds the last location

    area where the subscriber was registered (if any).

    4. The HLR sends a Registration Cancellation message to the MSC

    where the MS was last registered, because a mobile subscriber

    should only be registered in one VLR at a time. The last serving

    MSC then removes the subscriber data from the VLR and sends back

    confirmation that the subscriber has been removed.

    5. In the HLR, the subscriber state is set to active and the location data

    is set to the new serving MSCID.

    6. The subscriber data is sent to the serving MSC in the Registration

    Notification Return Result message and stored in the VLR.

  • 8/3/2019 HLR&AC Overview

    30/126

    HLR/AC Overview

    20 2/03802 LZU 108 3827 Rev. A

    The HLR can receive multiple registrations from the same subscriber. This

    can occur if the MS registers in an area bordering another MSC and if its

    registration access message is picked up by a Base Station in another

    MSC. If this happens, and the function Multiple Access Handling is

    present (normally available), the stored location is not immediately

    updated. The Multiple Access Time Supervision (MATS) feature delays a

    Registration, for a short time interval, until the probability of receiving

    other Registration Notification messages from the same subscriber isdiminished. During this time interval, the Registration Notification

    message reporting the best signal strength is considered to be the true

    access.

    When the time interval for Multiple Access Handling has expired, a

    Registration Cancellation message is forwarded to the exchange indicated

    by the stored location. If the exchange accepts to cancel its subscribers

    record, the interim location is stored as the new stored location.

    Figure 2.2 Registration

    When a mobile station initiates a call in an area that it is not registered in,

    the mobile stations temporary location gets updated in the HLR. Thistemporary location lasts for the duration of the call, but is cleared when the

    call is terminated. This only applies to analog calls in an Ericsson MSC.

  • 8/3/2019 HLR&AC Overview

    31/126

    Module 2 - HLR Traffic Functions

    212/03802 LZU 108 3827 Rev. A

    2.4 Subscriber Activity Handling

    This function handles the activity and inactivity messages received by the

    HLR from the Visiting Mobile Switching Center (MSC-V) where the

    subscriber is roaming. A mobile station becomes Inactive when it misses a

    periodic registration or when the mobile station powers off. This activity

    information is used to avoid call routing and delivery to an inactive

    subscriber.

    Figure 2.3 Subscriber Activity Handling

    1. The subscriber powers down their mobile station and an indication is

    sent to the MSC-V.

    2. The MSC-V sends an MSInactive message to the HLR.

    3. The HLR marks the subscribers activity status as Inactive.

    4. The HLR sends the MSInactive Return Result message to the

    MSC-V to indicate acknowledgement.

    When an inactive subscriber becomes active in an MSC-V, a Registration

    Notification message is sent to the HLR. The HLR marks the subscribersactivity status as active.

    If the stored subscriber location is different from the location where the

    activity information is received, the HLR sends a Location Cancellation

    Request message to the stored location. The stored location is reset to

    reflect the current location.

  • 8/3/2019 HLR&AC Overview

    32/126

    HLR/AC Overview

    22 2/03802 LZU 108 3827 Rev. A

    2.5 Call Delivery

    This section describes how a call is delivered to a mobile subscriber. It is

    assumed that the subscriber is active, that the call is successfully delivered

    to the MS and that the subscriber will answer the call.

    For a call to reach a mobile station it must enter the mobile system via an

    MSC with gateway functionality (that is, MSC-G). A call to a mobilestation can be delivered to a MSC-G via a Public Switched Telephony

    Network (PSTN) or another MSC, or initiated within the

    MSC-G by another mobile station.

    Figure 2.4 Call Delivery

    1. The MSC-G receives a call setup message containing the DN.

    2. The MSC-G sends a Location Request message, with the DN and

    some other data, to the subscribers HLR with the DN and some other

    data. The HLR returns a number, so that the call can be delivered to

    the subscriber. This number is called a Temporary Local Directory

    Number (TLDN).

    3. The HLR uses the DN to read the subscriber record. It then checks

    the subscriber state and relevant features, and converts the DN to the

    MIN.

    4. If the subscriber state and features are acceptable, the HLR sends a

    Routing Request message, containing the MIN, to the serving MSC,

    (the MSC from which the subscriber last sent a registration

    message).

  • 8/3/2019 HLR&AC Overview

    33/126

    Module 2 - HLR Traffic Functions

    232/03802 LZU 108 3827 Rev. A

    5. The MSC-V selects a TLDN and ties this to the subscribers MIN

    and other data. This TLDN uniquely represents this subscriber for

    the duration of call setup. Note that the MSC-V may try to page the

    MS and give it a voice channel before returning the TLDN.

    6. The TLDN is returned to the HLR in the Routing Request Return

    Result message.

    7. The HLR returns the TLDN to the MSC-G in the Location RequestReturn Result message.

    8. The MSC-G uses the TLDN to route the call to the MSC-V. It is also

    possible that the MSC-G and MSC-V are one and the same, in which

    case, the TLDN is used to deliver the call internally in the MSC-G.

    9. When the call enters the MSC-V, the TLDN is used to identify the

    mobile station. When identified, the mobile station is paged,

    designated to a voice channel (if not done at the time TLDN was

    requested) and alerted of an incoming call. When the mobile

    subscriber answers, the call delivery to the mobile station is

    complete.In some circumstances, a call may not be delivered, depending on the

    information returned in the Routing Request Return Result message from

    the MSC-V to the HLR.

    When the MSC-V receives the Routing Request message, it checks the

    status of the mobile station. If the MS status is inactive, then only the MS

    status is sent to the HLR in the Routing Request Return Result message.

    If the mobile station is busy or inactive, the HLR checks if the subscriber

    has call forwarding. If so, a call forward-to number is sent in the Location

    Request Return Result message to the MSC-G, otherwise a busy indicatoris sent.

    Calls may not be delivered due to congestion, or a subscriber feature

    setting, for example, call barring.

  • 8/3/2019 HLR&AC Overview

    34/126

    HLR/AC Overview

    24 2/03802 LZU 108 3827 Rev. A

    2.6 Equal Access Pre-Subscription

    Equal access pre-subscription allows the subscriber a choice of carriers to

    service calls between Local Access and Transport Area (LATA)

    boundaries. These calls are referred to as "inter-LATA calls." The

    subscriber has the option to choose an Interexchange Carrier (IC) for each

    call on a per-call basis, by specifying the Interexchange Carrier code from

    the MS before calls, or to use a mobile pre-subscribed PreferredInterexchange Carrier (PIC) by setting up a default IC for all calls.

    Figure 2.5 Equal Access Pre-subscription

    The equal access pre-subscription feature operates as follows:

    1. The subscriber dials an interexchange B-subscriber number from the

    Public Switched Telephone Network (PSTN).

    2. The number is received in the MSC-G. A Location Request message

    is sent to the HLR to determine the B-subscribers location.

    3. The HLR detects from the number dialed, that it is an interexchange

    call. The HLR checks the roaming B-subscribers profile for theirdefault PIC (Note that the B-subscriber typically pays for the

    roaming part of the call, so their PIC should be used).

    4. The B-subscribers Preferred Interexchange Carrier is translated into

    the Carrier Identification Code (CIC) in a PIC-CIC translation table.

    This table facilitates ease of change, for example, when an

    Interexchange Carrier changes, the operator does not need to update

    all subscriber records, but only update one PIC-CIC translation in

    the PIC-CIC translation table.

  • 8/3/2019 HLR&AC Overview

    35/126

    Module 2 - HLR Traffic Functions

    252/03802 LZU 108 3827 Rev. A

    5. The Routing Request message is sent to the serving MSC to get the

    status of the called MS or their TLDN.

    6. The serving MSC returns the Routing Request Return Result

    message to the HLR containing the TLDN or the state of the MS.

    7. If the MS can receive the call, the HLR sends the Location Request

    Return Result message to the MSC-G with the TLDN and the

    subscribers CIC.8. This CIC routes the call through its associated interexchange carrier,

    to the other LATA and its MSC-V.

    9. The MSC-V uses the TLDN to identify the mobile station, page it

    and designate a voice channel to it.

    Equal Access is also used when a mobile A-subscriber makes a long

    distance call. Their preferred carrier (which was copied down to the VLR

    at registration) is used.

  • 8/3/2019 HLR&AC Overview

    36/126

    HLR/AC Overview

    26 2/03802 LZU 108 3827 Rev. A

    2.7 IS-136 Alphanumeric Paging with ShortMessage Service

    This feature allows users with IS-136 compatible mobile stations to send

    and receive short text messages. The messages can be up to 239 characters

    long (operator defined) and are sent or received only on a Digital Control

    Channel (DCCH). Messages are sent to the Message Center (MC) whichstores and forwards the messages to the serving MSC (MSC-V) for

    delivery to active idle mobile stations.

    For example, the MC requests the serving MSC address from the HLR.

    This address is used to route the message to the serving MSC. The MSC

    pages the mobile station and the message is delivered. If the mobile station

    cannot be contacted, then the message is stored in the MC and the

    subscriber is flag marked in the HLR. When the subscriber becomes

    available, the HLR informs the MC so that the message can be delivered.

    The HLR is only involved in terminating SMS calls.

    The following example shows a message being sent to the MS.

    Figure 2.6 Terminated SMS Delivery

    1. The message is stored in the MC for subscriber 514 5550100. This

    could be manually entered by an operator or could originate from

    another MS.

    2. The MC sends a SMS request message (SMSREQ) containing the

    MIN of the subscriber to the HLR.

    3. The HLR checks the MIN, the ESN, if the subscriber has the SMS

    feature and if the MS is active.

  • 8/3/2019 HLR&AC Overview

    37/126

    Module 2 - HLR Traffic Functions

    272/03802 LZU 108 3827 Rev. A

    4. If all checks have a positive result, the HLR sends the SMS address

    (S7/C7 destination address of the visiting exchange, for example, the

    point code 226-2-38) in the SMSREQ Return Result message.

    5. The MC sends the SMS Delivery Point to Point message (SMDPP),

    containing the text message, to the MSC-V.

    6. The MS is paged and the text message is delivered over the DCCH.

    7. The SMDPP Return Result message is sent back to the MC toindicate successful delivery or not.

    If the MS is not active, then the HLR flag marks the subscriber so that the

    MC is informed by the SMS Notification message (SMSNOT) when the

    MS becomes active (registered in the HLR).

    If the subscriber is not connected, or does not have the SMS feature, then a

    Return Error message is sent back to the MSC, and the short message

    delivery fails.

  • 8/3/2019 HLR&AC Overview

    38/126

    HLR/AC Overview

    28 2/03802 LZU 108 3827 Rev. A

    2.8 Subscriber Service Call

    The HLR subscriber service call provides the Home Location Register

    subscribers with the capability to administer subscriber-controlled features

    via a dialed code called a feature code. Operators can define and modify

    these feature codes for subscriber service calls to the HLR. The operator

    can also group the features and assign feature codes for setting the grouped

    features.

    After completing the service call, the subscriber receives a unique

    recorded message for each code-controlled service. This message indicates

    whether that particular feature was successfully activated or deactivated.

    The following example shows a subscriber defining and activating a call

    forward-to number for the call forward no reply feature.

    Figure 2.7 Subscriber Service Call

    1. The subscriber dials the digits for the procedure call, for example,*74 5550000. The number 74 is the procedure code to set the call

    forward-to number for the call forward no reply feature. The call

    forward-to number is 5550000.

    2. The Feature Request message is received by the HLR from the

    MSC.

    3. The HLR verifies the procedure digits, that is, 74, in the Procedure

    Code Analysis Table. This table contains a list of all valid procedure

    codes. Note that the call forward-to number is checked in the Call

    Forward-to Number Analysis Table to ensure that the number is not

    a restricted number, for example, the emergency number 911. TheHLR compares the personal passcode, if specified by the subscriber,

    to the one that is stored in the subscribers data.

    4. When the verification is complete, the appropriate action code is

    selected (that is, activation, deactivation, interrogation). In this

    example, the HLR activates the feature with the call forward-to

    number and updates the subscriber data. When the action code is

    executed, the result of the action code is sent back in the Feature

    Request Return Result message to the HLR.

  • 8/3/2019 HLR&AC Overview

    39/126

    Module 2 - HLR Traffic Functions

    292/03802 LZU 108 3827 Rev. A

    5. The Feature Request Return Result message is sent to the serving

    MSC. This message contains an indication that the service call was

    successful and optionally, an announcement list which can generate

    a unique recorded message to confirm the feature activation to the

    subscriber. The particular announcement for the procedure call is

    found by looking up the announcement code table.

    In step 5 above, the serving MSC must be transaction compatible, that is, itmust support the announcement list so that it can receive the

    announcement code of the service. If the MSC is not capable of handling

    the HLR announcement list, a tone is sent to the subscriber. These

    announcement codes are retrieved from the announcement code table in

    the HLR, which stores all the announcements.

    Each service has a unique announcement code associated with the

    following status:

    Activation

    Announcement code for the activation of a service

    Deactivation

    Announcement code for the deactivation of a service

    Failure

    Announcement code for a service that fails to be

    updated/interrogated.

    The MSC generates the announcement towards the mobile station.

  • 8/3/2019 HLR&AC Overview

    40/126

    HLR/AC Overview

    30 2/03802 LZU 108 3827 Rev. A

    2.9 Support of Subscriber Features

    Although the HLR is not a switching node, some subscriber feature

    information in the HLR may determine how a call is to be handled. The

    following features are those which result in the HLR having an active role

    in call handling:

    Call Forwarding Immediate Call Itemization

    Voicemail

    Message Waiting Indicator

    Do Not Disturb

    Absent Subscriber

    Terminating Call Barring.

    Note: the involvement of the HLR in feature-related calls is described later

    in this book.

  • 8/3/2019 HLR&AC Overview

    41/126

    Module 2 - HLR Traffic Functions

    312/03802 LZU 108 3827 Rev. A

    2.10 Summary

    The main traffic functions of the HLR are:

    Registration

    This function updates a subscribers mobile station location which is

    used when a call needs to be delivered to that mobile station.

    Subscriber Activity Handling

    This function handles the activity and inactivity messages received

    by the HLR from the MSC-V, where the subscriber is roaming.

    Call Delivery

    This function handles the delivery of a call to a mobile station.

    Equal Access Pre-subscription

    This feature allows the subscriber a choice of carriers to service calls

    across LATA boundaries.

    IS-136 Alphanumeric Paging with Short Message Service

    This feature allows users with IS-136 compatible mobile stations to

    send and receive short messages.

    Subscriber Service Calls

    This feature provides HLR subscribers with the capability to

    administer subscriber controlled services via a dialed code called a

    feature code.

    Support of Subscriber FeaturesThe HLR may be involved in handling calls related to subscriber

    features (for example, call forwarding, immediate call itemization).

  • 8/3/2019 HLR&AC Overview

    42/126

    HLR/AC Overview

    32 2/03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    43/12633

    Module 3. Security and Authentication

    3.1 Introduction

    This module distinguishes between the different fraudulent activities that

    can occur in mobile networks today. The module outlines the purpose and

    contents of the AC. It describes the sequence of events involved in the

    main authentication procedures such as SSD update, base station

    challenge, unique challenge and global challenge. It also explains the

    security and authentication functionality which is implemented in the AC.

    Module Objectives

    After completing this module you will be able to:

    Describe the purpose and contents of the Authentication Center

    Explain how the main authentication procedures operate

    Understand the security and authentication functions in the

    Authentication Center.

    3/03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    44/126

    HLR/AC Overview

    34 3/03802 LZU 108 3827 Rev. A

    3.2 Types of Fraud

    Fraud is a major problem for mobile network operators all over the world.

    The losses due to fraud amount to billions of dollars every year.

    Figure 3.1 Different Types of Fraud

    Several basic types of cellular fraud are attempted in cellular networks,

    each of which is described below.

    3.2.1 Cloning

    The MIN and ESN of a legitimate subscriber's mobile unit are

    programmed into another mobile unit. This can be done in different ways:

    The MIN and ESN are scanned when being transmitted over the air

    interface

    A fraudster steals a mobile station and retrieves the MIN and ESN

    from its memory

    A cellular operator employee "steals" the MIN and ESN from thesystem.

    Cloning is the most common type of fraud. The majority of fraud in a

    cellular system is usually of this type.

  • 8/3/2019 HLR&AC Overview

    45/126

    Module 3 - Security and Authentication

    353/03802 LZU 108 3827 Rev. A

    3.2.2 Tumbling ESN

    Tumbling ESN involves running an algorithm with a computer device

    connected to a mobile unit which generates random ESN and MIN codes.

    These are sent to the cellular network and when they match the ESN and

    MIN stored in the HLR/AC, the system accepts the mobile unit and a

    connection with the switch is established.

    3.2.3 Hijacking

    Hijacking involves increasing the output power of a mobile unit in order to

    take over a legitimate subscriber's voice channel. Once contact with the

    system is established, the second number feature can be used. This enables

    a user to dial a second number while connected to one already. Once the

    second number connection is established the first number is disconnected.

    The result is that the legitimate subscriber is charged for a call they did not

    make.

    3.2.4 Subscription Fraud

    The general idea of subscription fraud is to fool the administrative system

    of the operator. Typical examples of subscription fraud are subscriptions

    opened with erroneous personal data or customers that make a lot of calls

    the first month and then disappear without paying the bill.

    3.2.5 Administrative Fraud

    Administrative fraud occurs when exchange and subscriber data is

    accessed and changed without authorization. This can be done either bythe operators own personnel (internal fraud) or by someone connecting to

    the lines going into the HLR/AC and MSC.

    3.3 Security and Authentication Functions

    The following measures are used within the mobile network to counteract

    fraud:

    Authentication

    Voice Privacy

    Fraudulent Activity Detection

    Serial Number Screening.

    Each of these is described in more detail below.

  • 8/3/2019 HLR&AC Overview

    46/126

    HLR/AC Overview

    36 3/03802 LZU 108 3827 Rev. A

    3.4 Authentication

    3.4.1 Introduction to Authentication

    Authentication is used in cellular networks to verify that individuals

    accessing the network are genuine subscribers using authorised

    equipment. Authentication is a set of procedures that allows the network tovalidate the identity of each authentication capable Mobile Station (MS).

    Authentication is seen as one of the major steps to prevent fraud in cellular

    systems. The Telecommunication Industry Association (TIA) established a

    committee to address fraud detection and prevention. This committee

    specified enhancements to the IS-41 standard to support new

    authentication procedures. IS-41 standards specify protocols and

    operations to support the various authentication procedures.

    An Authentication Center (AC) must exist to implement authentication

    procedures and to manage authentication information related to

    subscribers. The Ericsson AC is co-located with the HLR, thus sharing

    subscriber information with the HLR.

    The AC establishes that the individual attempting to make a call is a

    genuine subscriber and has a valid subscription to the mobile network. The

    AC holds authentication data specific to each subscriber. Using this data,

    the AC can detect when someone is trying to access the network with a

    counterfeit subscription and report a suspected fraudulent event to the

    MSC. The MSC in turn reports this to the operator and appropriate action

    can be taken.

    Figure 3.2 The Authentication Center in the Network

  • 8/3/2019 HLR&AC Overview

    47/126

    Module 3 - Security and Authentication

    373/03802 LZU 108 3827 Rev. A

    The authentication function is based on secret keys that are never sent or

    shown openly. The secret keys, together with other parameters, are used as

    input to an authentication algorithm, called the Cellular Authentication

    and Voice Encryption (CAVE) algorithm, in order to calculate an

    authentication value. Both the network and the MS run the algorithm and

    calculate the result and thereafter the network checks that the result is the

    same. In the event of a mismatch the operator is alerted by a printout and

    the appropriate action can be taken.

    The operator sets the authentication feature on or off in the AC for each

    subscriber. The subscriber must have an authentication capable phone (that

    is, one that conforms to the IS-54B standard, or higher, for example, IS-91

    or IS-136).

    Connection of an authentication subscriber in the AC requires first setting

    the authentication feature service level in the HLR, then definition of

    subscriber data in the AC and finally, activating the feature in the HLR.

    Conversely, disconnection of the subscriber requires passivating the

    authentication feature in the HLR, deletion of the subscriber in the AC and

    resetting of the service level in the HLR.

    Note that the ESN cannot be removed or changed for an authentication

    subscriber and an authentication subscriber cannot be disconnected from

    the HLR if the feature is active.

    3.4.2 Authentication Data

    The AC contains the following data per subscriber:

    Authentication Key (A-Key)

    Shared Secret Data (SSD).

    In addition, the The AC uses the subscribers MIN and ESN from the HLR

    for authentication purposes. The MS also stores the A-Key and the SSD.

    Authentication Key (A-Key)

    When a subscriber takes out a subscription with an authentication capable

    phone she/he is assigned an A-key. The A-Key is a 6 to 26 digit number

    generated in the AC (the operator defines the length). This number is never

    transmitted over the air or between network nodes. It is never displayedopenly and is stored in encrypted format in the AC and MS only.

    The A-key can be transferred to the MS by the service representative. The

    A-key can be:

    Operator defined

    AC generated

    Defaulted (a common A-key pre-programmed into the MS and AC).

  • 8/3/2019 HLR&AC Overview

    48/126

    HLR/AC Overview

    38 3/03802 LZU 108 3827 Rev. A

    Figure 3.3 A-Key, CAVE and SSD

    Cellular Authentication and Voice Encryption (CAVE)

    The Cellular Authentication and Voice Encryption (CAVE) algorithm is

    implemented in the AC, the MS and may also be implemented in the MSC.

    CAVE generates the SSD using the A-Key, ESN and a generated random

    number. CAVE also generates authentication results from the SSD, MIN,

    ESN and a random number.

    Shared Secret Data (SSD)

    The A-key is never transmitted between nodes (MSC and AC). Instead a

    value called Shared Secret Data (SSD) is calculated by the AC and MS

    and is used in the authentication process. This number is calculated by

    inputing the A-key, ESN and a random number into the CAVE algorithm.

    SSD can be considered as an A-Key which can be passed between nodes,

    rather than an authentication result to be used to confirm an access.

    The SSD can be sharedwith the MSC/VLR so that certain authentication

    functions can be done in the MSC/VLR. This can reduce the amount of

    signaling required in the network for authentication. To share the SSD, theMSC/VLR must have the CAVE algorithm. If the SSD is not shared the

    MSC-V sends an authentication request message to the AC every time the

    MS requires authentication.

  • 8/3/2019 HLR&AC Overview

    49/126

    Module 3 - Security and Authentication

    393/03802 LZU 108 3827 Rev. A

    3.4.3 Authentication Procedures

    In order to authenticate a mobile subscriber, four different procedures are

    used, each in a different situation.

    Figure 3.4 Authentication Procedures

    Several actions may be taken if an MS fails one of the authentication

    procedures. The MSC or HLR determines the action to take. It could deny

    access to the mobile (unless the call was an emergency call) or initiate

    another authentication procedure. The MSC will be informed of failed

    authentication procedures which it will report to the operator.

    Authentication

    ProcedureUsage

    SSD Update Performed when a new SSD is required (operator

    defined)

    Base Station

    Challenge

    Performed when a new SSD is required (operator

    defined)

    Global Challenge Registration and other control channel accesses

    Unique Challenge Originating call, originating SMS call,

    terminating call, flash request

  • 8/3/2019 HLR&AC Overview

    50/126

    HLR/AC Overview

    40 3/03802 LZU 108 3827 Rev. A

    SSD Update

    The AC decides when a new SSD is to be calculated. For example, a new

    subscriber will require a new SSD, or a new SSD could be periodically or

    manually calculated if fraud is suspected.

    Figure 3.5 SSD Update (SSD not shared)

    1. The AC generates a new SSD using CAVE and a random number.

    2. The AC forwards the random number (RANDSSD) to the MS.

    3. The MS uses CAVE to generate its SSD.

  • 8/3/2019 HLR&AC Overview

    51/126

    Module 3 - Security and Authentication

    413/03802 LZU 108 3827 Rev. A

    Base Station Challenge

    This enables an MS to validate a base station. This protects MSs from

    attacks by false base stations which could force MSs to send their ESN,

    MIN and other secret information. A Base Station Challenge is initiated by

    an MS with each SSD Update and is a continuation of the steps above:

    4. MS generates a random number (RANDBS) and sends it to the AC.

    5. The MS and AC calculate a result word (AUTHBS).

    6. The AC forwards the result of its calculation to the mobile station.

    7. The MS compares the AC result its own result.

    8. The MS informs the AC of the validity or invalidity of the new SSD.

    Figure 3.6 Base Station Challenge (SSD not shared)

  • 8/3/2019 HLR&AC Overview

    52/126

    HLR/AC Overview

    42 3/03802 LZU 108 3827 Rev. A

    Global Challenge

    The Global Challenge procedure authenticates a MS at system access on

    the analog or digital Control Channel (CC), including at:

    Registration

    Call origination on the control channel

    Call termination on the control channel

    Mobile originated Short Message Service (SMS) accesses.

    The procedure is global because the information used for the challenge is

    broadcast on the control channel and so can be read by all subscribers.

    Figure 3.7 Global Challenge (SSD not shared)

    1. The serving MSC (MSC-V) generates a random number which iscontinually broadcast on the CC.

    2. The MS calculates an authentication result and sends this to the

    MSC-V along with the rest of the system access data.

    3. The authentication result and random number are sent to the AC.

    4. The AC calculates its own authentication result using the MIN, ESN,

    SSD and the random number received from the MSC-V. CAVE

    calculates the result and compares it to the result received from the

    MS. If the result matches, then the MS is considered to be authentic.

    5. The comparison result is sent to the MSC-V for handling.

    If the SSD is shared, then the serving MSC calculates the authentication

    response and will report any mismatches to the AC.

  • 8/3/2019 HLR&AC Overview

    53/126

    Module 3 - Security and Authentication

    433/03802 LZU 108 3827 Rev. A

    Unique Challenge

    The Unique Challenge procedure authenticates a MS at:

    Voice channel seizure

    When ordered by the AC as an extra fraud check (that is, after SSD

    update, after global challenge)

    During a call.

    The challenge is unique because the random number used for the

    challenge is generated at each access for a particular MS.

    Figure 3.8 Unique Challenge (SSD not shared)

    1. The AC generates a random number which it uses to calculate an

    authentication result. This result is sent to the MSC-V.

    2. The random number is sent to the MS, which it uses to calculate its

    authentication result.

    3. The MS sends the result to the MSC-V which it compares to the AC

    calculated result.

    4. The AC is informed of the comparison result and the appropriate

    action is taken (if any).

  • 8/3/2019 HLR&AC Overview

    54/126

    HLR/AC Overview

    44 3/03802 LZU 108 3827 Rev. A

    3.4.4 Authentication Failure Reporting

    Each of the global challenge, unique challenge and SSD update processes

    have associated outcomes indicating success or failure. While these

    outcomes are normally recorded, not all are reported; that is not every

    authentication process outcome is conveyed from the serving MSC to the

    AC. The factors that can trigger a report are:

    The nature of the authentication function, that is global challenge,

    unique challenge or SSD Update

    The authentication process result, either success or failure

    The authentication initiator, either the AC or serving MSC

    The status of the SSD sharing, either shared or not shared.

    Figure 3.9 Authentication Failure Reporting

    3.4.5 Authentication Statistics

    Authentication statistics provide the network administration with

    information on the operation of authentication procedures. Statistics aremaintained for the number of successful and unsuccessful responses to

    authentication procedures on a per subscriber basis.

    It is possible to print the authentication failure statistics per subscriber. All

    the statistics associated with the subscriber are reset when the mobile

    responds correctly to the SSD Update order.

    It is also possible to print only those subscribers who have failed

    authentication procedures a pre-defined number of times.

  • 8/3/2019 HLR&AC Overview

    55/126

    Module 3 - Security and Authentication

    453/03802 LZU 108 3827 Rev. A

    3.5 Voice Privacy

    Voice Privacy provides subscribers with security when using their mobile

    phones for business and personal conversations by preventing

    eavesdropping on a Digital Traffic Channel (DTC). It does this by

    encrypting the user information (that is, voice or data) that is transmitted

    over the DTC. This occurs in the MS-BS segment of the connection when

    requested by the MSC-V.

    Voice Privacy is authorized for use on a per-subscriber basis, and can be

    activated on a per-call basis by the subscriber on digital systems

    supporting authentication. The AC supports voice privacy by supplying

    encryption data.

    The mobile station may request activation/deactivation of Voice Privacy

    using a procedure code during call set-up or in conversation state. If an MS

    is assigned to an analog voice channel and it requests Voice Privacy, it is

    subsequently handed-off to a DTC in order to support it. If Voice Privacy

    cannot be supported for the call, the subscriber can be informed by a tone.

    Figure 3.10 Voice Privacy

    The information used to encrypt the voice/data is referred to as a mask

    (VPMASK). This is generated within the Global Challenge procedure and

    is derived using a random number, SSD and other inputs.

    If the mobile station is successfully authenticated by the Global Challenge

    on the control channel, and the subscriber is authorized to use Voice

    Privacy and has requested it for that call, the VPMASK is applied to the

    user's voice transmission.

  • 8/3/2019 HLR&AC Overview

    56/126

    HLR/AC Overview

    46 3/03802 LZU 108 3827 Rev. A

    3.6 Fraudulent Activity Detection

    The Fraudulent Activity Detection (FAD) function is an on-line

    surveillance characteristic that reports suspected fraudulent events related

    to both calls and subscription activities. This function enables operators to

    minimise the fraudulent use of the cellular system.

    Fraudulent Activity Detection is applicable to all mobile stations and isindependent of the authentication capability of the handset. It monitors the

    activity of subscribers in both the VLR and the HLR for events that may

    indicate fraud.

    The FAD function performs the detection of a fraudulent event in the HLR

    while the MS is in the middle of a call. The network suspects the

    fraudulent use of an MS when a call access is made while another mobile

    user with the same MIN is currently in use. This is called a simultaneous

    call access. Other suspicious events include an MS being on a control

    channel which does not match the phones capability or where a phone

    registers before its due time.

    A simultaneous call access could be caused by:

    Cloning

    Tumbling ESN/MIN

    Hijacking.

    A simultaneous call access is investigated in the subscribers HLR and if

    fraud is identified, the operator is informed.

  • 8/3/2019 HLR&AC Overview

    57/126

    Module 3 - Security and Authentication

    473/03802 LZU 108 3827 Rev. A

    3.6.1 FAD Procedure

    Figure 3.11 Fraudulent Activity Detection

    1. Registration

    A mobile subscriber in MSC-B service area registers with the HLR.

    2. Fraud suspected

    The HLR detects that the MSs MIN is currently in use.

    3. Fraud verified

    MSC-A is checked to see if the MS is still on a voice channel.

    4. Fraud concluded

    The MS is marked as busy in the MSC-A, concluding that it is a

    fraudulent activity as the MS cannot be on a call in two different

    exchanges at the same time.

    5. Fraud reported and logged

    When a fraudulent event is detected, the elements which could

    possibly be interpreted as fraud are recorded. The events (ESN,

    exchange ID, time and activity type) can be sent to an I/O device

    where a reporting function generates a printout containing the MS

    identity and a reason code for each event.

    3.6.2 Call Barring Upon Fraudulent Activity

    An alternative to sending a report to an I/O device is that the HLR can

    activate the Call Barring Upon Fraudulent Activity Detection feature. This

    is a fraud prevention tool that allows the automatic barring of originating

    calls when fraud is detected. Once a phone is barred due to a detected

    fraud, it can only originate certain types of calls pre-defined in its

    subscriber type. The operator can determine the FAD events which will be

  • 8/3/2019 HLR&AC Overview

    58/126

    HLR/AC Overview

    48 3/03802 LZU 108 3827 Rev. A

    used as triggers for Call Barring Upon FAD and also select the type of

    subscriber for which Call Barring upon FAD will be activated.

    3.7 Serial Number Screening

    Because each mobile station's ESN is unique, a screening process can be

    used to determine if the mobile station can be allowed to access the

    services provided by the cellular system.

    This Serial Number Screening feature reduces the number of fraudulent

    calls, as well as the number of unnecessary location registrations and

    validation requests processed by a subscriber's home system (that is HLR).

    The ESN and the MIN are verified before the call is set-up. Both numbers

    are screened based on their range of possible values.

    Figure 3.12 Serial Number Screening

    The feature operates as follows in the network nodes:

    Serving MSC (ESN Validation)

    At first system access in a visited exchange, the MSC-V checks theformat and range of a received ESN and MIN. During subsequent

    accesses, the ESN and MIN are checked against those stored in the

    mobile subscriber's record in the HLR. The MSC-V denies access to

    a subscriber who attempts an access with a ESN that differs to that

    stored in the subscriber record.

    Home Location Register (Missing ESN)

    The HLR will bar a subscriber when there is no ESN previously

    stored in an HLR by the system operator. This particular function

    requires the operator to manually enter all valid ESNs into the HLR

    data. This eliminates fraudulent calls made to or from mobiles.

  • 8/3/2019 HLR&AC Overview

    59/126

    Module 3 - Security and Authentication

    493/03802 LZU 108 3827 Rev. A

    3.8 Summary

    Authentication counteracts fraudulent methods, such as:

    Cloning

    Duplicating a legitimate MS, including the MIN and ESN.

    Hijacking

    Stealing a voice channel from a legitimate subscriber.

    Tumbling ESN

    Stepping ESN and MIN ranges until access is gained to the system.

    The main security and authentication functions are:

    Authentication

    When performing any access to the system, the MS will send its

    authentication data. This data, which is independently calculated by

    the mobile station and the system, will be compared to confirm the

    MS identity.

    Voice Privacy

    The Voice Privacy feature provides a degree of cryptographic

    protection against eavesdropping on the digital air interface.

    Call Barring Upon Fraudulent Activity Detection

    Serial Number Screening.

    As part of authentication:

    The AC holds secret subscriber data (A-Key and SSD) and is

    involved in the authentication procedures.

    The CAVE algorithm uses the A-Key, the ESN and a randomnumber to generate the SSD.

    When passing authentication information between the AC and

    MSCs, the SSD is transmitted instead of the A-Key.

    Authentication procedures are performed for different system

    accesses. Authentication procedures include:

    SSD update

    Base station challenge

    Unique challenge

    Global challenge.

  • 8/3/2019 HLR&AC Overview

    60/126

    HLR/AC Overview

    50 3/03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    61/12651

    Module 4. OA&M in the HLR/AC

    4.1 Introduction

    This module outlines the Operation, Administration and Maintenance

    (OA&M) architecture in the HLR/AC. It explains the standard OA&M

    modelling concepts and applies them to the HLR/AC implementation.

    It summarizes some of the typical OA&M activities performed by the

    operator. It differentiates between alarms and notifications and illustrates

    some typical alarms in the HLR/AC.

    A high level description of geographical redundancy is also given and themain actions performed during node recovery.

    Module Objectives

    After completing this module you will be able to:

    Understand the OA&M model in the HLR/AC

    Describe the main tasks related to Operation, Administration and

    Maintenance of the HLR/AC

    Differentiate between alarms and notifications Understand geographical HLR redundancy.

    4/03802 LZU 108 3827 Rev. A

  • 8/3/2019 HLR&AC Overview

    62/126

    HLR/AC Overview

    52 4/03802 LZU 108 3827 Rev. A

    4.2 The OA&M Model Within the HLR/AC

    The management of increasingly complex telecommunications networks

    is heading in the direction of open standards. The HLR/AC offers an

    OA&M solution using a Telecommunications Management Network

    (TMN) model and a manager-agent system.

    4.2.1 Telecommunications Management Network (TMN)

    As networks increase in complexity, so the demands on network

    management become greater. For many years networks were managed

    through proprietary protocols. This introduced problems when

    interconnecting networks. It also meant that different information was

    required to interrogate equipment on the network; the network operator