4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Morning, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
How do I monitor SS7 Traffic in spectra2?
what is the difference between E1 signal & Ethernet signal ?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Can you tell me about PBGT?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is demarc point?
What is BSC?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
Explain SLTA and SLTM messages in MTP3?
why cellphone towers are painted in red and white?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

Plz,Explain SSD update procedure?
sagitraz 31-May-2008 01:35:46 AM

Comments


At the end of the SSD update procedure, both mobile station and base .... of the radio network 100 is explained with respect to a cdma2000 architecture.
Posted by waqasahmad


In case a MS fails to authenticate itself in response to Unique Challenge Msg, SSD update request is sent by BS to MS.
BT initiates SSD update request with RANDSSD value in it.
MS uses this RANDSSD value along with the ESN and A Key of the MS to generate new SSD_A_New and SSD_B_New values.At the same time these values are calculated at the BS also. (SSD_A is used for authentication and SSD_B is used for voice encryption).
MS replies with BS Challenge order with a random value called RANDBS(32 bits) on the reverse link. The same RANDBS along with the SSD_A_New is fed to the Auth Signature algo at the MS to generate AUTHBS value of 18 bits.
Auth signature algo is run at the BS as well to get the AUTHBS value.
As soon as the BS receives BS Challenge order, BS compares the AUTHBS value generated at the BS with that received from a MS.
If both the valus matches, BS replies with SSD update confirmation msg or else rejection msg.
After confirmation order, a BS sets new SSD values in the for an authenticated MS
Posted by jahangir1983


In case a MS fails to authenticate itself in response to Unique Challenge Msg, SSD update request is sent by BS to MS.
BT initiates SSD update request with RANDSSD value in it.
MS uses this RANDSSD value along with the ESN and A Key of the MS to generate new SSD_A_New and SSD_B_New values.At the same time these values are calculated at the BS also. (SSD_A is used for authentication and SSD_B is used for voice encryption).
MS replies with BS Challenge order with a random value called RANDBS(32 bits) on the reverse link. The same RANDBS along with the SSD_A_New is fed to the Auth Signature algo at the MS to generate AUTHBS value of 18 bits.
Auth signature algo is run at the BS as well to get the AUTHBS value.
As soon as the BS receives BS Challenge order, BS compares the AUTHBS value generated at the BS with that received from a MS.
If both the valus matches, BS replies with SSD update confirmation msg or else rejection msg.
After confirmation order, a BS sets new SSD values in the for an authenticated MS
Posted by jahangir1983


In case a MS fails to authenticate itself in response to Unique Challenge Msg, SSD update request is sent by BS to MS.
BT initiates SSD update request with RANDSSD value in it.
MS uses this RANDSSD value along with the ESN and A Key of the MS to generate new SSD_A_New and SSD_B_New values.At the same time these values are calculated at the BS also. (SSD_A is used for authentication and SSD_B is used for voice encryption).
MS replies with BS Challenge order with a random value called RANDBS(32 bits) on the reverse link. The same RANDBS along with the SSD_A_New is fed to the Auth Signature algo at the MS to generate AUTHBS value of 18 bits.
Auth signature algo is run at the BS as well to get the AUTHBS value.
As soon as the BS receives BS Challenge order, BS compares the AUTHBS value generated at the BS with that received from a MS.
If both the valus matches, BS replies with SSD update confirmation msg or else rejection msg.
After confirmation order, a BS sets new SSD values in the for an authenticated MS
Posted by jahangir1983


In case a MS fails to authenticate itself in response to Unique Challenge Msg, SSD update request is sent by BS to MS.
BT initiates SSD update request with RANDSSD value in it.
MS uses this RANDSSD value along with the ESN and A Key of the MS to generate new SSD_A_New and SSD_B_New values.At the same time these values are calculated at the BS also. (SSD_A is used for authentication and SSD_B is used for voice encryption).
MS replies with BS Challenge order with a random value called RANDBS(32 bits) on the reverse link. The same RANDBS along with the SSD_A_New is fed to the Auth Signature algo at the MS to generate AUTHBS value of 18 bits.
Auth signature algo is run at the BS as well to get the AUTHBS value.
As soon as the BS receives BS Challenge order, BS compares the AUTHBS value generated at the BS with that received from a MS.
If both the valus matches, BS replies with SSD update confirmation msg or else rejection msg.
After confirmation order, a BS sets new SSD values in the for an authenticated MS.
Posted by kparikh

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Why should I care about the OSI Reference Model? What is the main purpose for creating this osi model? Why it is a layered model?
 
What is meant by NAS?
Which codecs are supported in Asterisk?


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved