- This topic has 8 replies, 1 voice, and was last updated 15 years, 6 months ago by paraHO.
-
AuthorPosts
-
20th May 2009 at 11:26 #57079RizwanGuest
Hi,
Do we require Authentication every time call is originated from Mobile and if it is not required in which cases does Authentication is to be done?
Also if we do selective Authentication,how does it will impact call set-up time & is it a considerable one?
20th May 2009 at 17:57 #57080PixGuestAuthentication is quite fast, I’m not sure it is something that will greatly improve your call setup duration.
You should be able to measure the duration thx to a drive test.
About the other questions, I leave it to NSS gurus 🙂
20th May 2009 at 20:07 #57081paraHOGuestVery mature networks not run Authentication per every call but for speed rely on previous TMSI so long mobile remains in LAC same.
21st May 2009 at 05:09 #57082pixGuesthello paraho,
so … for those networks, authentication is done during the location update only, but not during call setup ?
is it really to gain few ms in the setup duration, or rather, unload the AuC / HLR ?
21st May 2009 at 10:19 #57083paraHOGuesthello pix
authentication is not just at location update and during call setup call but also in cases of errors….etc
Using TMSI help with internal processing. Some networks using TMSI for 24-hours where MS not move outside LAC area.
It can be used where there is high load/processing issues.
21st May 2009 at 12:40 #57084RizwanGuestTnx Pix n ParaHO
As per my knowledge, Auth is done for just for securing user info..ciphering etc
If Auth is not done even when MS moves to other LAC. Does it impact? n if it will, how?
23rd May 2009 at 05:14 #57085RizwanGuestKindly help ……
Tnx Pix n ParaHO
As per my knowledge, Auth is done for just for securing user info..ciphering etc
If Auth is not done even when MS moves to other LAC. Does it impact? n if it will, how?
23rd May 2009 at 06:59 #57086PixGuestHi,
it’s up to the network to require authentication. If the MSC doesn’t ask the authentication request, then the MS won’t get authentified.
In this case (that’s a strategy chosen by operator), the procedure will continue as if the MS was succesfully authentified.
The ciphering is done few messages after : ciphering mode command, ciphering mode confirm, where the MS and the NSS exchange cipher key.
Regards
pix26th May 2009 at 17:49 #57087paraHOGuestPix you said
– it’s up to the network to require authentication. If the MSC doesn’t ask the authentication request, then the MS won’t get authentified.
– The ciphering is done few messages after : ciphering mode command, ciphering mode confirm, where the MS and the NSS exchange cipher key.
That is fine provided network operator uses ciphering. What about countries where ciphering not implemented… Would auth be required each time or if not are you saying operator solely rely on IMSI request per call?
-
AuthorPosts
- The forum ‘Telecom Design’ is closed to new topics and replies.