Académique Documents
Professionnel Documents
Culture Documents
Ater
ms
bts bsc
This manages the interface between the network and the mobile station
. it performs the important function of acting as a hub for the whole of the network infrastructure.
This controls the radio subsystem, especially the base stations. The major functions of the
base station controller include management of the radio resources and handover. It is also
responsible for control of the power transmitted, and it manages the O&M and its signalling,
security configurations and alarms .
The MSC (or switch as it is generally called) is the single most important element of the
NSS as it is responsible for the switching functions that are necessary for interconnections
between mobile users and other mobile and fixed network users. For this purpose, MSC
makes use of the three major components of the NSS, i.e. HLR, VLR and AUC.
The VLR comes into action once the subscriber enters the coverage region. Unlike the
HLR, the VLR is dynamic in nature and interacts with the HLR when recoding the data of
a particular mobile subscriber. When the subscriber moves to another region, the database
of the subscriber is also shifted to the VLR of the new region.
Authentication Centre (AUC)
The AUC (or AC) is responsible for policing actions in the network. This has all the
data required to protect the network against false subscribers and to protect the calls of
regular subscribers. There are two major keys in the GSM standards: the encryption of
communications between mobile users, and the authentication of the users. The encryption
keys are held both in the mobile equipment and the AUC and the information is protected
against unauthorised access .
Each item of mobile equipment has its own personal identification, which is denoted by
a number - the International Mobile Equipment Identity (IMEI). The number is installed
during the manufacture of the equipment and states its conformation to the GSM standards.
Whenever a call is made, the network checks the identity number; if this number is not
found on the approved list of authorised equipment, access is denied. The EIR contains this
list of authorised numbers and allows the IMEI to be verified.