Activation of GPRS-PDP context (external protocol stack)
Source: Internet
Author: User
GPRS-PDP context activation process (external protocol stack) GPRS-PDP context activation process www.2cto. comGPRS wireless data transmission terminal using the network to achieve full duplex data communication with the host computer. The terminal must be attached with a GPRS network, and login to the Internet and any common PC machine connected to it should be created... GPRS-PDP context activation process (external protocol stack) GPRS-PDP context activation process www.2cto.com GPRS wireless data transmission terminal using the network to achieve full duplex data communication with the host computer. The terminal must be attached with a GPRS network. log on to the Internet and connect to any common pc to establish a data link and transmit data at any time. To complete this process, you must attach GPRS and activate the context of PDP (PacketDataProtoco1. You can manage the mobility of users by attaching the registered user information through GPRS. the activation process is used to activate the IP protocol to ensure that data can be transmitted in the form of IP reports, so that the mobile station and GGSN (gatewayuplssupportnode, gateway GPRS node) establishes a logical path for data transmission. It can be seen that the activation process is the key to system implementation, which is implemented by the central controller software. The activation of the grouped data protocol involves multiple network protocols, such as www.2cto.com, PPP, LCP (LinkControlProtocol), NCP (NetworkControlProtocol, Network Control Protocol), and PAP (PasswordAuthenticationProtocol, password Authentication Protocol) and IPCP (InternetProtocol, Internet Protocol Control Protocol. Packet Data protocol context activation process (1) a terminal device (such as a PC) activates an IP protocol to a mobile terminal (MS) AT command that contains the APN (AccessPointName, access Point Name ). (2) the terminal device sends a PPPPLC frame to the mobile terminal, indicating that PAP is an identity authentication protocol during PDP activation. (3) the terminal device starts to undergo PAP authentication. after the authentication is passed, the mobile terminal will respond to the terminal device, indicating that it recognizes its identity and stores the user ID and password. (4) the terminal device sends the NCP-IPCP configuration request information to the mobile terminal, the IP address inside the frame is empty, indicating that the request is dynamically allocated IP address. (5) the mobile terminal sends the request information for activating the PDP context to SGSN (servicinguplssupportnode, service GPRS node). The information includes the following information: APN, PDP type, and PDP address is blank, dynamically allocates IP addresses. (6) the SGSN requests the DNS (DomainNameSystem, domain name system) server to parse the APN and obtain the IP address of the GGSN corresponding to the APN. (7) SGSN sends a request message that establishes the PDP context to the selected GGSN. The message should include: APN and PDP type, and the PDP address is blank, the request dynamically allocates IP addresses, user-modified QOS, and other options. (8) the GGSN authenticates the user. after the authentication is passed, the RADIUS (RemoteAuthenticationDia-inUserService, remote authentication is used to dial in the user service) server, DHCP (DynamicHostConfigurationProtocol, Dynamic Host Configuration Protocol) the server or the GGSN directly assigns a dynamic IP address to the user. the GGSN returns the message that establishes the PDP context to the SGSN. (9) SGSN sends an activation PDP and context message to the mobile terminal. (10) the mobile terminal sends the NCP-IPCP configuration response frame to the terminal device, the response frame contains the dynamically assigned IP address. So far, the activation process of the PDP context is complete. the mobile terminal establishes a data path with the external data network, and the data transmission terminal can communicate with the monitoring center in the form of IP datagram.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.