Learning Huawei’s flavour of MML – Man Machine Language for the BTS 3900 series Macro Base Stations.
How I ended up with a Macro LTE eNodeB (Huawei BBU3900) and getting it running.
SS7 Basics and Osmo-STP as a Signaling Transfer Point
Setting up ipaccess NanoBTS on Osmocom’s OsmoBSC
How call routing in GSM works and it’s application in the Osmocom suite
So now we’ve covered the basics of what’s involved let’s get some traffic on our network. For starters we’ll need to start each of our network elements and bring up whichever BTS hardware we’re using. In order for our calls to have audio, we’ll need to set a parameter on the Media Gateway. We’ll cover […]
Setting up the Mobile Switching Centre for a GSM network using OsmoMSC.
What the Home Location Register (HLR) does in GSM, how to set it up and configure subscribers.
Connecting our LimeSDR based GSM BTS with OsmoBSC.
Using a LimeSDR as a GSM BTS with Osmocom.
Configuring a GSM Base Station Controller with Osmocom stack.
Setting up a virtual BTS in our BSC with Osmocom.
What’s a BTS and where do they fit into the GSM Network architecture?
Intro to our post series on GSM using the Osmocom stack,
Adventures in getting USIMs to use on private LTE networks.
We’ve already touched on how subscribers are authenticated to the network, how the network is authenticated to subscribers and how the key hierarchy works for encryption of user data and control plane data. If the IMSI was broadcast in the clear over the air, anyone listening would have the unique identifier of the subscriber nearby […]
We’ve talked a bit in the past few posts about keys, K and all it’s derivatives, such as Kenc, Kint, etc. Each of these is derived from our single secret key K, known only to the HSS and the USIM. To minimise the load on the HSS, the HSS transfers some of the key management […]
We’ve already touched on how subscribers are authenticated to the network, how the network is authenticated to subscribers. Those functions are done “in the clear” meaning anyone listening can get a copy of the data transmitted, and responses could be spoofed or faked. To prevent this, we want to ensure the data is ciphered (encrypted) […]
How LTE Subscriber authenticate the network
LTE/4G’s use of RAND and K to verify subscribers identity.