4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Morning, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is GGSN?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

Friends, how to generate an Encryption Mask (VP Mask)?
drolet_55 13-May-2008 12:01:20 AM

Comments


www.multichannel.com/.../191126-Cable_Show_2009_Technologists_Outline_Next_Generation_Services.php
Posted by crouse


www.sharewareconnection.com/titles/mask.htm
Posted by crouse


AC uses SSD_B and the CAVE algorithm.
Posted by waqqas1


AC (or VLR if SSD is shared) uses SSD_B and the CAVE algorithm.
Posted by jzhang


Encryption keys (masks) are needed to encrypt the traffic channels, and the encryption keys are generated on a per-call basis. The mobile station generates the keys at the same time that the network generates the keys during the call setup process.

Voice Privacy (VP). VP, as its name implies, encrypts the voice signal that goes over the traffic channel between the mobile station and the serving base station.

The network generates the keys in the Home Location Register/Authentication Center (HLR/AC) and then provides them to the anchor MSC and the serving base station.

The same keys are used for the duration of the call, even if the mobile station is handed off to another MSC. Therefore, if the keys have already been provided to the anchor MSC, and the mobile station moves into the service area of another MSC, the keys must be passed in an inter-exchange handoff in order to enable the new serving MSC to encrypt the voice and/or control signals.
Posted by sagitraz

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Can some explain why Code sequence are very important in a wireless network that uses CDMA technology?
can anybody tell ,what in Windows 98 to enter Safe Mode With Networking ?
 
Hello friends, what are the 2 steps used to configure and access list?
 


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved