OsmoNITB » History » Version 3
laforge, 02/19/2016 10:48 PM
1 | 1 | zecke | = BSC Hack = |
---|---|---|---|
2 | |||
3 | 3 | laforge | ''bsc_hack'' is the program executable name of [wiki:OpenBSC]. We call it that way, since it is still pretty much a big hack, despite having |
4 | gone a long way in quite a short amount of time. |
||
5 | |||
6 | == Configuration == |
||
7 | |||
8 | Currently, there is no configuration file. A lot of the configuration is thus compiled-in. Almost all of the values that you might want to |
||
9 | tweak are inside the bsc_hack.c file itself, where you can find things like the BCCH filling (SYSTEM INFORMATION) messages and the like. |
||
10 | |||
11 | == Reference == |
||
12 | |||
13 | === BS-11 === |
||
14 | |||
15 | Basically, there are currently just two modes of operation supported |
||
16 | {{{ |
||
17 | $ ./bsc_hack -t bs11 |
||
18 | }}} |
||
19 | will assume you have a [wiki:BS11 BS-11] connected to the first mISDN E1 card and have configured |
||
20 | * OML signalling on the full 64kbps E1 timeslot 1 |
||
21 | * verify this by [wiki:bs11_config] ''query'' |
||
22 | * make sure you pass '''dslot=1''' when loading hfcmulti.ko |
||
23 | * OML TEI 25 |
||
24 | * verify this by [wiki:bs11_config] ''query'' |
||
25 | |||
26 | you will see something like |
||
27 | {{{ |
||
28 | DB: Database initialized. |
||
29 | DB: Database prepared. |
||
30 | 1 device found |
||
31 | id: 0 |
||
32 | Dprotocols: 00000018 |
||
33 | Bprotocols: 0000000e |
||
34 | protocol: 4 |
||
35 | nrbchan: 30 |
||
36 | name: hfc-e1.1 |
||
37 | activate bchan |
||
38 | bootstrapping OML |
||
39 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=0) |
||
40 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=1) |
||
41 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,1) E1=(0,2,1) |
||
42 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=2) |
||
43 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,2) E1=(0,2,2) |
||
44 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=3) |
||
45 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,3) E1=(0,2,3) |
||
46 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=4) |
||
47 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,4) E1=(0,3,0) |
||
48 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=5) |
||
49 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,5) E1=(0,3,1) |
||
50 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=6) |
||
51 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,6) E1=(0,3,2) |
||
52 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1376 Set Chan Attr (bts=0,trx=0,ts=7) |
||
53 | Thu Feb 19 04:22:48 2009 <0020> abis_nm.c:1315 CONNECT TERR TRAF Um=(0,0,7) E1=(0,3,3) |
||
54 | bootstrapping RSL MCC=1 MNC=1 |
||
55 | }}} |
||
56 | |||
57 | === ip.access nanoBTS === |
||
58 | {{{ |
||
59 | $ ./bsc_hack -t nanogsm900 |
||
60 | }}} |
||
61 | will assume you have a [wiki:nanoBTS] configured with its primary OML link to the IP address of your Linux PC. |
||
62 | |||
63 | After starting bsc_hack will just wait for your nanoBTS to connect, which can take quite a while. |
||
64 | |||
65 | NOTE: Due to some problems with OML initialization after the first boot of a nanoBTS, you may have to re-start bsc_hack a number of times |
||
66 | until you get it working. |
||
67 | |||
68 | 1 | zecke | == Dealing with the HLR == |
69 | We do have a sqlite3 database for the HLR. We do have a table for Subscribers and to authorize your mobile station you will need to execute. This means LOCATION UPDATING REQUEST will be accepted. |
||
70 | |||
71 | 2 | zecke | {{{ |
72 | sqlite3 hlr.sqlite |
||
73 | update Subscriber set authorized=1 where imsi=YOUR_IMSI; |
||
74 | }}} |
||
75 | 3 | laforge | |
76 | === Using the telnet interface == |
||
77 | |||
78 | You can telnet to port 4242 of the machine that runs bsc_hack and try some of the commands. |
||
79 | |||
80 | We are planning a lot of work in this area, so documenting the old commands will not be very productive. |