This Course is available in the following format:
GSM MAP Training Course In Depth by ENO
Global System for Mobile Communication (GSM) is the world’s leading wireless communication standard. This GSM MAP Training course defines the protocol structure and content of the messages which support the GSM mobile applications and services. You will gain a thorough knowledge of how messages are constructed and how mobile communications between elements is accomplished.
● If you are familiar with some aspects of this GSM MAP Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the GSM MAP Training course in manner understandable to lay audiences.
What You Will Learn:
Upon completing this GSM MAP Training course, learners will be able to meet these objectives:
In this GSM MAP Training course you will learn about GSM components, subscriber identities along with network identities. We will briefly look at the lower layers of the SS7 protocol which is used for message routing and transport. Emphasis is placed on the TCAP ITU-T standard, the Mobile Application Part (MAP) application and signaling across the A-interface. Call-flow scenarios show how the various elements signal and communicate.
GSM MAP Training – Course Syllabus:
◾GSM elements and subsystems
◾Interfaces and numbering
◾Signaling across the various interfaces
Common Channel Signaling and Standards
◾Switches, STPs and databases
◾Links – low-speed & high-speed
◾SS7 protocol and GSM
◾Signaling on the A-interface
◾BSSMAP and DTAP
◾Call flows across the A-interface
◾ITU-T TCAP structure
◾GSM MAP operations
◾GSM MAP parameters
◾GSM MAP standards documents
◾ISDN-UP in handovers
GSM Call Flow Scenarios
◾Authentication and Ciphering
◾Mobile Originated Calls
◾Mobile Terminated Calls
◾Short Message Service