Wireless Intelligent Networking
Wireless Intelligent Networking
Wireless Intelligent Networking
NETWORKING
(WIN)
FATİH ERTÜRK
2010514027
• Today's wireless subscribers are much more sophisticated telecommunications users
than they were five years ago. No longer satisfied with just completing a clear call,
today's subscribers demand innovative ways to use the wireless phone. They want
multiple services that allow them to handle or select incoming calls in a variety of
ways.Wireless Intelligent network is developed to drive intelligent network
capabilities such as service independence, separation of basic switching functions
from service and application functions and independence of applications from lower-
level communication details into wireless networks. The primary weapon for
empowering providers to deliver distinctive services with enhanced flexibility is
Wireless Intelligent Networks (WINs).
• In the 1980s it was considered a rare to see someone walking down the street and
talking on a wireless phone. The connections were not great but consumers were
thrilled with the new capability. Today it is more unusual when someone does not
have a cellular phone.
INTRODUCTION TO WIN
• The main benefit of intelligent networks is the ability to improve existing services
and develop new sources of revenue. To meet these objectives, providers require the
ability to accomplish the following:
• WIN services are related to AIN services. AIN was first introduced for the wireline
industry in late 1980’s. The best known AIN application is the "800 service" which opened
the door to a host of new services offered on a platform other than the switch. WIN,
enhancing the AIN concept with the mobility management aspect of wireless
communication, will offer services consistent with what wireline AIN offers. Furthermore,
WIN still needs to address:
• Personal and terminal mobility,
• Internetwork handoff,
• Security,
• Fraud prevention and detection.
1. HANDS-FREE, VOICE-CONTROLLED
SERVICES
• Voice-controlled services employ voice-recognition technology to allow the wireless
user to control features and services using spoken commands, names, and numbers.
There are two main types of automatic speech recognition (ASR). Speaker-dependent
requires specific spoken phrases unique to an individual user. Each user is required
to train the ASR system by recording samples of each specific phrase. The other is
speaker-independent ASR, which requires the use of specific spoken phrases that are
independent of the speaker. The individual user need not train the system.
2. VOICE CONTROLLED DIALING (VCD)
• VCD allows a subscriber to originate calls by dialing digits using spoken commands
instead of the keypad. VCD may be used during call origination or during the call
itself.
3. VOICE-CONTROLLED FEATURE CONTROL
(VCFC)
• VCFC permits a calling party to call a special VCFC directory number, identify the
calling party as an authorized subscriber with a mobile directory number and
personal identification number (PIN), and specify feature operations via one or more
feature-control strings. This service is similar to remote feature control (RFC) except
that the subscriber is allowed to dial feature-control digits or commands using
spoken words and phrases instead of keypad digits.
4. VOICE-BASED USER IDENTIFICATION (VUI)
MSC: - The mobile switching center used for switching function portion of the network.
SCP: - Provides a centralized element in the network.
IP: - Gets information directly from the subscribes. PSTN:-Public Switching Telephone Network
STP: - packet switching in the signaling network. BSC:-Base Station controller
EXAMPLES OF WIRELESS INTELLIGENT
NETWORKING SERVICES
• Enhanced services are increasing in popularity. At this point, various carriers within
different servicing areas are implementing them using available IN protocols and
concepts. Some of them are:
MTP level 1 defines the physical electrical and functional characteristic of the
digital signal.
MTP level 2 implements flow control message sequence validation and error
checking.
MTP level 3 specifies a path between signaling point in the SS7 network. It
diverts the routes from the failed lengths when congestion occur.
ISDN USER PART(ISUP) AND TELEPHONE
USER PART(TUP)
• TUP and ISUP both performs the signaling required to set up and tear down
telephone calls.TUP support only plain old telephone service (pots) calls. SUP
supports both pots and ISDN calls.
SIGNALING CONNECTION CONTROL
PORT(SCCP)
• It is used to connect the radio related components in cellular network and for inter
ssp communication supporting class services. SCCP translates the global title
address into a destination point code and subsystem number.
*Global Title (GT) is an address used in the SCCP protocol for routing signaling
messages on telecommunications networks. In theory, a global title is a unique address
which refers to only one destination, though in practice destinations can change over
time.
* Point code :An SS7 point code is similar to an IP address in an IP network
TRANSACTION CAPABILITIES APPLICATION
PART(TCAP)
• Its primary purpose is to facilitate multiple concurrent dialogs between the same
sub-systems on the same machines, using Transaction IDs to differentiate these,
similar to the way TCP ports facilitate multiplexing connections between the same IP
addresses on the Internet.
ATTACKS IN WIRELESS INTELLIGENT
NETWORK
• BLACK HOLE ATTACK
• WORMHOLE ATTACK
BLACK HOLE ATTACK
• Black hole attack is also an important and suspicious attack in wireless intelligent
networks. It sends false routing information to the source node that it has fresh
routing path from source to destination. In this attack a malicious node gives illusion
for having shortest path to the node whose packet it wants to intercept.
WORMHOLE ATTACK
• Wormhole attack is a silent and severe type of attack since it simply copies the
packet at one location and replays them at different location or within the same
network.
• So, in wormhole attack, there are two neighbour nodes. They copy the packet at one
location and replay the same packets without any changes in the content at different
location or within the same network.
PREVENTION FOR THE ATTACKS
• Trust Model
• Wormhole Evasion
TRUST MODEL
• When the search is made for a route, firstly we check cache that any route is available
or not if it is available the Dijkstra's algorithm is used to find the shortest path among
available nodes, otherwise search algorithm is executed to find the routes with
maximum trust level. If search algorithm finds any wormhole nodes the cost of that
node is set to infinity. This ensures that wormholes nodes are avoided in all future
data connections.
SECURITIES USING WIRELESS
INTELLIGENT NETWORKS
• Wireless CCTV technology reduces cost and increases safety for towns and citizens
• Prevent unauthorized access to resources in schools and colleges using highly secure
WiMAX wireless networking solutions
• Use mobile cameras to increase security and reduce vandalism on public transport
• Deliver real-time images from any, even remote, locations
CONCLUSION
• Wireless Intelligent Networking allows the service provider to rapidly introduce new
services. Mobile Pre-Pay is a common application. There are two overall standards
employed today – CAMEL and WIN.
Maintaining and monitoring the Common Channel Signaling (CCS) network is critical to
its success. Understanding and troubleshooting the SS7 protocol is a key part of that
success.
This article covered the different technologies to increase the safety. SAFE WIMAX
techniques can be used to counter the risks of accessibility.
*CAMEL(Customised Applications for Mobile networks Enhanced Logic)
*WiMAX (Worldwide Interoperability for Microwave Access) is a family
of wireless communications standards initially designed to provide 30 to 40 megabit-per-
second data rates,
REFERENCES
• http://www.teletopix.org/gsm/advantages-of-intelligent-network-in/
• http://www.teletopix.org/category/news-telecom/
• http://bits.blogs.nytimes.com/2014/08/30/getting-a-clear-picture-of-a-computer-
networks-security/?_php=true&_type=blogs&_r=1
• https://tr.scribd.com/doc/98544205/WIN-Wireless-Intelligent-Network-Full-Report
• http://www.slideshare.net/ijimit/win-47398350
• https://en.wikipedia.org/wiki/Wireless_Intelligent_Network
• https://en.wikipedia.org/wiki/Global_Title
• https://en.wikipedia.org/wiki/Point_code