The document discusses GSM authentication, localization, and handover.
For authentication, the document describes how the GSM network authenticates subscribers through a challenge-response mechanism using triplets generated by the AuC containing a random number (RAND), signed response (SRES), and ciphering key (Kc). The MS uses the RAND and its stored Ki to generate the SRES which is sent back to the network for verification.
For localization, the document explains that the GSM network always knows a user's location through the HLR and VLR updating location as the MS moves between MSCs. Localization can occur through network-based, handset-based, SIM-based, or hybrid methods