Internship report.pdf

October 20, 2017 | Author: Deepak Sharma | Category: Mobile Phones, Wireless, Electronics, Networks, Mobile Telecommunications
Share Embed Donate


Short Description

Report on Equipment Identity Register...

Description

EQUIPMENT IDENTITY REGISTER

AN INDUSTRIAL INTERNSHIP REPORT Submitted by DEEPAK SHARMA (10BCE1030) In partial fulfillment for the award of the degree of

COMPUTER SCIENCE AND ENGINEERING

VIT UNIVERSITY (Estd. u/s 3 of UGC Act 1956)

Vellore - 632 014, Tamil Nadu, India

i

DECLARATION BY THE CANDIDATE

I hereby declare that the Training entitled “ EQUIPMENT REGISTER” submitted by me to the School of Computing University,

IDENTITY Sciences, VIT

Chennai in partial fulfillment of the requirements for the award of

the degree of

Bachelor

Engineering

is

of

a record

Technology in

Computer

Science and

of bonafide work carried out by me/us under the

supervision of Utpal Ranjan. I further declare that the work reported in this report has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

Chennai:

Signature of the Candidate

Date:

ii

VIT UNIVERSITY (Estd. u/s 3 of UGC Act 1956)

Vellore - 632 014, Tamil Nadu, India The report entitled “EQUIPMENT IDENTITY REGISTER” is prepared and submitted by DEEPAK SHARMA (Register No: 10BCE1030). It has been found satisfactory in terms of scope, quality and presentation as partial fulfillment of the requirements for the award of the degree of Bachelor of Technology in Computer Science and Engineering in VIT University, Chennai in partial fulfillment of the requirement for the award of the degree of B.Tech in CSE is a record of bonafide inplant training undertaken by him/her under my supervision. The training fulfills the requirements as per the regulations of this Institute and in my opinion meets the necessary standards for submission. The contents of this report have not been submitted and will not be submitted either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

Program Manager (B.Tech CSE)

SUPERVISOR

Date:

Date:

iii

ACKNOWLEDGEMENT It is always a pleasure to remind the fine people in the Engineering program for their sincere guidance I received to perform my practical as well as theoretical skills in engineering.

Firstly I would like to thank Dr. L. Jegannathan (Program manager for CSE, VIT University, Chennai) for meticulously planning academic curriculum in such a way that student are not only academically sound but also industry ready by including such industrial training pattern.

I would also like to acknowledge my heartfelt gratitude to UTPAL RANJAN (Site Incharge) for giving me this opportunity and trusting me enough to share

entire source

code to let me add the new features. I would like to thank him for continuously supporting me in every possible way during the course of this training.

Place : Chennai (Deepak Sharma)

Date :

iv

ABSTRACT Mobile phone theft has become a growing problem worldwide, with hundreds of thousands of phones reported stolen each year. In many countries, GSM handset theft has become a major factor in rising street crime, particularly among young people. A stolen GSM handset can be reused with a different subscriber's SIM card, possibly in a different mobile network. Upon subscribing to a network and obtaining a legitimate SIM card with subscriber information, the perpetrator will initially buy an inexpensive handset and later steal a better model from another subscriber. The SIM card is then switched and the network operator is unaware that a stolen handset is being used. The telecommunications industry is working hard to make this crime less attractive to thieves. Screening solutions, along with jointly shared databases of stolen handset numbers, can effectively render a stolen handset useless across all networks. Once the consumer reports the theft to the network operator, it can be cancelled much like a stolen credit card. The Equipment Identity Register is a database employed within mobile networks. The database holds records for 3 types of mobile; namely black, grey and white. Besides, there is also a 4th category i.e. "Unknown". EIR provides an additional level of security which is performed on the mobile equipment itself, as opposed to the mobile subscriber. When a mobile requests services from the network its IMEI (International Mobile Equipment Identity) may be checked against the EIR, to assess which category of mobile it falls under. It is a tool to deny services or track problem equipment.

v

LIST OF FIGURES FIGURE NO.

CAPTION

PAGE NO.

3.1

Subscriber Account Status State Machine

7

4.1

Restrict Account with Black Listed Device

8

Remove Account Restrictions with New Device

4.2

12

4.3

Deny Account with Black Listed Device

15

4.4

Re-authorize Restricted Account

17

4.5

Query Device Based on Record Age

20

4.6

Query Device with an Empty Record

22

Network Architecture 4.7

25

Software Architecture 4.8

25 Web Based Management GUI.

5.1 5.2

27 IMEI Upload.

vi

27

GUI Based Management 5.3

29

vii

Acronyms and Abbreviations

Acronym

Meaning

3GPP2

3rd Generation Partnership

CEIR

Central EIR

EIA

Electronics Industry Association

EIR

International Forum on ANSI-41 Standards Technology

ER

Equipment Registry

ESN

Electronic Serial Number

HW ID

Hardware Identifier

IMSI

International Mobile Subscriber Identity

MDN

Mobile Dialed Number

MEID

Mobile Equipment Identifier

MIN

Mobile Identification Number

MS

Mobile Station

NV

Non-volatile

RUIM

Removable User Identity Module

RUIMID

RUIM Identification

SMS

Short Message Service

viii

Acronym

Meaning

SMSC

Short Message Service Center

TIA

Telecommunication Industry Association

UIM ID

User Identity Module Identifier

TABLE OF CONTENTS

CHAPTER

TITLE

NO.

PAGE NO.

ABSTRACT

v

LIST OF FIGURES

vi

ACRONYMS AND ABBREVIATIONS

vii

1.

INTRODUCTION

1

2.

SYSTEM REQUIREMENTS

2

3.

OVERVIEW OF THE PROPOSED SYSTEM

5

3.1 Mobile Station

5

3.2 Equipment Registry

5

3.3 Provisioning System

7

DESIGN OF THE SYSTEM

7

4

Design Requirements 4.1 Call Flows

7 7

ix

4.1.1 Restrict Account with Black Listed Device 4.1.2 Remove Account Restrictions with New Device 4.1.3 Deny Account with Black Listed device 4.1.4 Remove Account Restrictions Via Customer Service Call 4.1.5 Query A Device: Based on Age of Record 4.1.6 Query A Device: Based on Empty Device

8

12

15

17

19

21

4.2 Database Requirements

23

4.3 Network Requirements

24

4.4 Network Architecture

24

4.5 Software Architecture

25

RESULTS AND DISCUSSIONS 26

5

5.1 Operators Benefits

6

26

5.2 Subscriber Benefits

26

5.3 EIR Features

26

5.4 Report Features

28

5.5 Additional Features

28

5.6 Sample Reports

29

5.7 Fault and Alarm Management

29

5.8 Alarm Management System

29

CONCLUSION

30

x

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF