GGSN TUTORIAL PDF

The Gateway GPRS Support Node (GGSN) is a main component of the GPRS network. The GGSN is responsible for the interworking between the GPRS. Single IP Cisco GGSN Usage Notes and Prerequisites Configuring Support for GGSN-Initiated Update PDP Context Requests Gprs tutorial. by packet paging to notify the GPRS 17 The GPRS access modes specify whether or not the GGSN requests user authentication.

Author: Mugrel Voodooshicage
Country: Jordan
Language: English (Spanish)
Genre: Software
Published (Last): 26 July 2004
Pages: 409
PDF File Size: 20.12 Mb
ePub File Size: 11.86 Mb
ISBN: 984-4-33067-702-2
Downloads: 13818
Price: Free* [*Free Regsitration Required]
Uploader: Melabar

Although this is certainly not the ggns common scenario for data VPN for corporate network access, it will play a significant tjtorial if access to application-specific VPNs is used to support consumer services.

We have decided to consider IPv4 only in this chapter for the sake of simplicity, since it will be mainstream for a few years to come in the provisioning of corporate network access services and advanced IP services. This scenario is also being repeated by 3G, gsgn in this case, greenfield operators that is, new companies starting up 3G businesses without having been a player in 2.

Also, by changing the domain component, some intelligent IP services platforms can be configured to return in the filter ID attribute or other RADIUS attributes the name of a service whose definition, in terms of network access policies, can be retrieved from an LDAP or equivalent service policies configuration data repository.

GPRS Network Architecture Tutorial

Accordingly the introduction of GPRS technology saw the addition of some new entities within the over network architecture. In this case, the Access Request user-name and password would be populated with some dummy values. For cases that rely strictly on the HLR subscription data for user authentication, integrity protection of GTP signaling from the visited SGSN to the home GGSN is required, so that the Selection Mode IE cannot be altered tutoriql therefore is expected to be valid, tuorial it is generated by a visited network that has a trust relationship with the home network.

  ALBERTO MORAVIA CONTEMPT PDF

The following 4 authorization policy options are available: Mobile Virtual Network Operator. Prepaid access-based subscription plans are also possible. Operators may define charging plans based on tariff times, traffic volume thresholds, location, or other parameters, such as application-level information derived by deep packet inspection. The greatest limitation of tutorila access mode is in its trust model, which implies the external network to fully rely on the wireless network to provide user authentication.

Packet Data Solutions

The host configuration is yet another area in which this solution is not as strong as the others. To work around this problem one might choose to enforce the usage of a specific DNS server by redirecting all DNS traffic via iptables: This data network overlaps a second-generation GSM network providing packet data transport at the rates from 9.

From this it can be seen that it is very similar to the more basic GSM network architecture, but with additional elements. The standards also define the support of prepaid services in GPRS. For example, RADIUS is used when the customer network requires collection of accounting data for trend analysis and usage profiling, and possibly of charging for network access itself in a manner independent of the billing performed by the wireless service provider.

In addition to the capex, there are the operational costs, opex. In the example acl-only is selected as authorization policy.

Increasing efficiency and reliability will reduce the opex costs. IP architecture with PCO-based access mode. Static IP addresses are also allowed, and in fact, the use of static IP addresses is necessary for network-initiated PDP context activation. The Future of Gysn Services. Tutogial PCU itself may be a separate physical entity, or more often these days it is incorporated into the base station controller, BSC, thereby saving additional hardware costs.

  KOLESARSKI VODNIK PDF

The few exceptions are: In the standards, transparent access is defined to be when the GGSN does not participate in user authentication. These mobile stations are backward compatible for making voice calls using GSM.

GPRS Network Architecture | GGSN SGSN PCU |

So it is important that both the service provider and the customer can perceive it as a useful tool for their interaction, service definition, and implementation. These network access services can be broadly classified into:.

The BTS can also require a software upgrade but typically does not require hardware enhancements. The ACL is also heeded. It can be as simple as a round robin, or “pick the first in the list and scan through the list instead of retrying the same Gvsn address when no response from the GGSN is heard back.

These new terminals will be backward compatible with GSM for voice calls. For the CSD case, roaming support is all but equivalent to the roaming support for voice services.

GGSN – Telecom ABC

Must match the ggsn 0 remote-ip entry in osmo-sgsn. Service Level Agreements Service level agreements SLAswhich a UMTS Mobile VPN service provider defines with a customer, include business arrangements and financial and legal clauses that are not relevant to technology and hence beyond the scope of this book.

Authentication, Authorization, and Accounting. After this we are saving current changes to configuration file using command write to make this policy persistent. In fact, for service availability purposes or simply for scalability and load sharing, it is desirable to allow an access point to be distributed over more than one GGSN.

Availability of the MVPN service when roaming and associated roaming fees.