Internship report.pdf
Short Description
Report on Equipment Identity Register...
Description
EQUIPMENT IDENTITY REGISTER
AN INDUSTRIAL INTERNSHIP REPORT Submitted by DEEPAK SHARMA (10BCE1030) In partial fulfillment for the award of the degree of
COMPUTER SCIENCE AND ENGINEERING
VIT UNIVERSITY (Estd. u/s 3 of UGC Act 1956)
Vellore - 632 014, Tamil Nadu, India
i
DECLARATION BY THE CANDIDATE
I hereby declare that the Training entitled “ EQUIPMENT REGISTER” submitted by me to the School of Computing University,
IDENTITY Sciences, VIT
Chennai in partial fulfillment of the requirements for the award of
the degree of
Bachelor
Engineering
is
of
a record
Technology in
Computer
Science and
of bonafide work carried out by me/us under the
supervision of Utpal Ranjan. I further declare that the work reported in this report has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.
Chennai:
Signature of the Candidate
Date:
ii
VIT UNIVERSITY (Estd. u/s 3 of UGC Act 1956)
Vellore - 632 014, Tamil Nadu, India The report entitled “EQUIPMENT IDENTITY REGISTER” is prepared and submitted by DEEPAK SHARMA (Register No: 10BCE1030). It has been found satisfactory in terms of scope, quality and presentation as partial fulfillment of the requirements for the award of the degree of Bachelor of Technology in Computer Science and Engineering in VIT University, Chennai in partial fulfillment of the requirement for the award of the degree of B.Tech in CSE is a record of bonafide inplant training undertaken by him/her under my supervision. The training fulfills the requirements as per the regulations of this Institute and in my opinion meets the necessary standards for submission. The contents of this report have not been submitted and will not be submitted either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.
Program Manager (B.Tech CSE)
SUPERVISOR
Date:
Date:
iii
ACKNOWLEDGEMENT It is always a pleasure to remind the fine people in the Engineering program for their sincere guidance I received to perform my practical as well as theoretical skills in engineering.
Firstly I would like to thank Dr. L. Jegannathan (Program manager for CSE, VIT University, Chennai) for meticulously planning academic curriculum in such a way that student are not only academically sound but also industry ready by including such industrial training pattern.
I would also like to acknowledge my heartfelt gratitude to UTPAL RANJAN (Site Incharge) for giving me this opportunity and trusting me enough to share
entire source
code to let me add the new features. I would like to thank him for continuously supporting me in every possible way during the course of this training.
Place : Chennai (Deepak Sharma)
Date :
iv
ABSTRACT Mobile phone theft has become a growing problem worldwide, with hundreds of thousands of phones reported stolen each year. In many countries, GSM handset theft has become a major factor in rising street crime, particularly among young people. A stolen GSM handset can be reused with a different subscriber's SIM card, possibly in a different mobile network. Upon subscribing to a network and obtaining a legitimate SIM card with subscriber information, the perpetrator will initially buy an inexpensive handset and later steal a better model from another subscriber. The SIM card is then switched and the network operator is unaware that a stolen handset is being used. The telecommunications industry is working hard to make this crime less attractive to thieves. Screening solutions, along with jointly shared databases of stolen handset numbers, can effectively render a stolen handset useless across all networks. Once the consumer reports the theft to the network operator, it can be cancelled much like a stolen credit card. The Equipment Identity Register is a database employed within mobile networks. The database holds records for 3 types of mobile; namely black, grey and white. Besides, there is also a 4th category i.e. "Unknown". EIR provides an additional level of security which is performed on the mobile equipment itself, as opposed to the mobile subscriber. When a mobile requests services from the network its IMEI (International Mobile Equipment Identity) may be checked against the EIR, to assess which category of mobile it falls under. It is a tool to deny services or track problem equipment.
v
LIST OF FIGURES FIGURE NO.
CAPTION
PAGE NO.
3.1
Subscriber Account Status State Machine
7
4.1
Restrict Account with Black Listed Device
8
Remove Account Restrictions with New Device
4.2
12
4.3
Deny Account with Black Listed Device
15
4.4
Re-authorize Restricted Account
17
4.5
Query Device Based on Record Age
20
4.6
Query Device with an Empty Record
22
Network Architecture 4.7
25
Software Architecture 4.8
25 Web Based Management GUI.
5.1 5.2
27 IMEI Upload.
vi
27
GUI Based Management 5.3
29
vii
Acronyms and Abbreviations
Acronym
Meaning
3GPP2
3rd Generation Partnership
CEIR
Central EIR
EIA
Electronics Industry Association
EIR
International Forum on ANSI-41 Standards Technology
ER
Equipment Registry
ESN
Electronic Serial Number
HW ID
Hardware Identifier
IMSI
International Mobile Subscriber Identity
MDN
Mobile Dialed Number
MEID
Mobile Equipment Identifier
MIN
Mobile Identification Number
MS
Mobile Station
NV
Non-volatile
RUIM
Removable User Identity Module
RUIMID
RUIM Identification
SMS
Short Message Service
viii
Acronym
Meaning
SMSC
Short Message Service Center
TIA
Telecommunication Industry Association
UIM ID
User Identity Module Identifier
TABLE OF CONTENTS
CHAPTER
TITLE
NO.
PAGE NO.
ABSTRACT
v
LIST OF FIGURES
vi
ACRONYMS AND ABBREVIATIONS
vii
1.
INTRODUCTION
1
2.
SYSTEM REQUIREMENTS
2
3.
OVERVIEW OF THE PROPOSED SYSTEM
5
3.1 Mobile Station
5
3.2 Equipment Registry
5
3.3 Provisioning System
7
DESIGN OF THE SYSTEM
7
4
Design Requirements 4.1 Call Flows
7 7
ix
4.1.1 Restrict Account with Black Listed Device 4.1.2 Remove Account Restrictions with New Device 4.1.3 Deny Account with Black Listed device 4.1.4 Remove Account Restrictions Via Customer Service Call 4.1.5 Query A Device: Based on Age of Record 4.1.6 Query A Device: Based on Empty Device
8
12
15
17
19
21
4.2 Database Requirements
23
4.3 Network Requirements
24
4.4 Network Architecture
24
4.5 Software Architecture
25
RESULTS AND DISCUSSIONS 26
5
5.1 Operators Benefits
6
26
5.2 Subscriber Benefits
26
5.3 EIR Features
26
5.4 Report Features
28
5.5 Additional Features
28
5.6 Sample Reports
29
5.7 Fault and Alarm Management
29
5.8 Alarm Management System
29
CONCLUSION
30
x
View more...
Comments