SlideShare una empresa de Scribd logo
1 de 26
5 Core Network
117
ChapterChapterChapterChapter 5555
Core NetworkCore NetworkCore NetworkCore Network
TopicTopicTopicTopic PagePagePagePage
MME in Pool.................................................................................................. 119
Signalling Transport (SIGTRAN).................................................................. 124
User data transfer ........................................................................................... 131
Diameter......................................................................................................... 135
Quality of Service .......................................................................................... 137
LTE/EPS Technology
118
This page is intentionally left blank
5 Core Network
119
MME in PoolMME in PoolMME in PoolMME in Pool
The Intra Domain Connection of RAN Nodes to Multiple CN Nodes,
introduced in UMTS R5, overcomes the strict hierarchy, which restricts the
connection of a RAN node to just one CN node. This restriction in
GSM/UMTS results from routing mechanisms in the RAN nodes which
differentiate only between information to be sent to the PS or to the CS
domain CN nodes and which do not differentiate between multiple CN nodes
in each domain. The Intra Domain Connection of RAN Nodes to Multiple CN
Nodes introduces a routing mechanism (and other related functionality),
which enables the RAN nodes to route information to different CN nodes
within the CS or PS domain, respectively.
RNC RNC RNCRNC
SGSN SGSN
GGSN
RNCRNC
SGSN
GGSN
Figure 5-1 Network hierarchy GSM/UMTS R4-
The Intra Domain Connection of RAN Nodes to Multiple CN Nodes
introduces further the concept of ‘pool-areas’ which is enabled by the routing
mechanism in the RAN nodes. A pool-area is comparable to an MSC or
SGSN service area as a collection of one or more RAN node service areas. In
difference to an MSC or SGSN service area a pool-area is served by multiple
CN nodes (MSCs or SGSNs) in parallel which share the traffic of this area
between each other. Furthermore, pool-areas may overlap which is not
possible for MSC or SGSN service areas. From a RAN perspective a
pool-area comprises all LA(s)/RA(s) of one or more RNC/BSC that are served
by a certain group of CN nodes in parallel. One or more of the CN nodes in
this group may in addition serve LAs/RAs outside this pool-area or may also
serve other pool-areas. This group of CN nodes is also referred to as MSC
pool or SGSN pool respectively.
LTE/EPS Technology
120
GGSN GGSN
SGSN SGSN SGSN
RNC RNC RNCRNC RNCRNC
Pool area 1
Pool area 2
Figure 5-2 Network hierarchy GSM/UMTS R5+
The Intra Domain Connection of RAN Nodes to Multiple CN Nodes enables a
few different application scenarios with certain characteristics. The service
provision by multiple CN nodes within a pool-area enlarges the served area
compared to the service area of one CN node. This results in reduced inter CN
node updates, handovers and relocations and it reduces the HSS update traffic.
The configuration of overlapping pool-areas allows to separate the overall
traffic into different MS moving pattern, e.g. pool-areas where each covers a
separate residential area and all the same city centre. Other advantages of
multiple CN nodes in a pool-area are the possibility of capacity upgrades by
additional CN nodes in the pool-area or the increased service availability as
other CN nodes may provide services in case one CN node in the pool-area
fails.
A user terminal is served by one dedicated CN node of a pool-area as long as
it is in radio coverage of the pool-area.
The fact that the BSC can co-operate with the several SGSN does not implies
that the separate physical interfaces are required since the IP network can be
used between BSCs and SGSNs to switch the traffic delivered on the same
physical interfaces to different recipients connected to that network.
IP network
SGSN2SGSN1 SGSN3
BSC6BSC5BSC4BSC3BSC2BSC1
Figure 5-3 SGSNs in Pool (physical view with Gb/IP)
5 Core Network
121
Similarly to GSM/UMTS, where the MSC/SGSN in Pool is already quite
popular solution, the EPS network may utilise the solution called MME in
Pool. However, some aspects of the CN nodes pool solution for GSM/UMTS
and EPS networks are different:
• There is only one CN domain in EPS, that is PS domain, so there is
only necessity for the MME nodes to be pooled,
• The MME in Pool concept is introduced in the first release of the
standard for the EPS network, so right from the beginning all
MMEs/eNBs can support MME in Pool specific procedures. (In
GSM/UMTS there was a necessity to solve backward compatibility
problems between MSCs/SGSNs capable and non-capable of
supporting pool area concept.)
• The temporary UE identity GUTI that holds the binding between the
UE and it’s serving MME in EPS has a structure that directly supports
the concept of the MME in Pool, in contradiction to GSM/UMTS
where TMSI/P-TMSI structure was modified for that purpose. Since
new R5 TMSI/P-TMSI structure has to be backward compatible with
R4, the solution is slightly less efficient, introduces some extra
signalling load and in some cases may result in the situation where
subscriber are not subjected to inter MSC/SGSN load distribution.
MME in Pool
only PS domain in EPS
no problems with backward compatibility
GUTI structure supports the MME in Pool concept
MME in Pool
only PS domain in EPS
no problems with backward compatibility
GUTI structure supports the MME in Pool concept
Figure 5-4 MME in Pool
Pool areaPool areaPool areaPool area
A pool-area is an area within which a UE may roam without a need to change
the serving MME node. A pool-area is served by one or more MMEs nodes in
parallel. The complete service area of a eNB (i.e. all the cells being served by
one eNB) belongs to the same one or more pool-area(s). A eNB service area
may belong to multiple pool-areas, which is the case when multiple
overlapping pool-areas include this eNB node service area. If TA spans over
multiple eNB service areas then all these eNB service areas have to belong to
the same MME pool-area. Additionally, when the TA list, the UE is registered
to, spans over multiple eNB service areas then also all these eNB service
areas have to belong to the same MME pool area.
LTE/EPS Technology
122
An MME pool-area is an area within which an MS roams
without a need to change the serving MME.
MME
MME
MME
eNB
eNB
eNB
eNB eNB
Figure 5-5 MME pool area
MME selection and aMME selection and aMME selection and aMME selection and addressingddressingddressingddressing
Each time the UE leaves the current MME pool area, the eNB runs MME
selection function. The MME selection function selects an available MME for
serving a UE. The selection is based on network topology, i.e. the selected
MME serves the UE’s location and in case of overlapping MME service
areas, the selection may prefer MMEs with service areas that reduce the
probability of changing the MME.
The selected MME allocates a Globally Unique Temporary Identity (GUTI)
to the UE. The GUTI has two main components:
• Globally Unique MME Identifier (GUMMEI) uniquely identifying the
MME which allocated the GUTI,
• M-TMSI uniquely identifying the UE within the MME that allocated
the GUTI.
GUMMEI
MCC MNC MMEGI MMEC M-TMSI
MMEI
S-TMSI
GUMMEI Globally Unique MME Identifier
MMEI MME Identifier
MMEGI MME Group ID
MMEC MME Code
Figure 5-6 GUTI structure
5 Core Network
123
The GUTI structure directly supports the concept of the MME pool area.
Since during each identification the UE, not only identifies itself but also the
MME that has allocated its temporary identity. Therefore, even in case of
intra MME pool area mobility, each eNB easily can route the data from the
UE to the MME which holds the user subscription and session information.
eNB
eNB
GUTI (GUMMEI #2)
(GUMMEI #1)
MME selection
GUTI/GUMMEI allocation
GUMMEI routing
MME
MME
(GUMMEI #2)
MME
(GUMMEI #3)
GUTI (GUMMEI #2)
Figure 5-7MME in Pool and GUTI
In case of inter MME pool area mobility the new eNB, can easily discover
that the UE is coming from another pool area, the eNB is not a part of. In that
case the eNB runs the MME selection process that will choose the new MME
for the UE, which in turn allocates the new GUTI. The new GUTI (that
includes the new MME’s identity) is used from that moment to route
signalling messages from the UE to the selected MME, until the MME pool
area is changed.
Load BalancingLoad BalancingLoad BalancingLoad Balancing
The MME Load Balancing functionality permits UEs that are entering into an
MME Pool Area to be directed to an appropriate MME in a manner that
achieves load balancing between MMEs. This is achieved by setting an MME
weight factor (called MME Relative Capacity) for each MME, such that the
probability of the eNB selecting an MME is proportional to its capacity. The
MME Relative Capacity parameter is typically set according to the capacity of
an MME node relative to other MME nodes.
LTE/EPS Technology
124
MME
MME
MME
eNB
10
10
20
MME relative capacity
Figure 5-8 Load balancing
The MME Load Re-balancing functionality permits UEs that are registered on
an MME (within an MME Pool Area) to be moved to another MME.
An example use for the MME Load Re-balancing function is for the O&M
related removal of one MME from an MME Pool Area.
MME
MME
MME
Figure 5-9 Load re-balancing
SignallSignallSignallSignalling Transing Transing Transing Transport (SIGTRAN)port (SIGTRAN)port (SIGTRAN)port (SIGTRAN)
Signalling Transport (SIGTRAN) is a new set of standards defined by the
International Engineering Task Force (IETF). This set of protocols has been
defined in order to provide the architectural model of signalling transport over
IP networks.
5 Core Network
125
SCTPSCTPSCTPSCTP
To reliably transport signalling messages over IP networks, the IETF
SIGTRAN working group devised the Stream Control Transmission Protocol
(SCTP). SCTP allows the reliable transfer of signalling messages between
signalling endpoints in an IP network.
MultihomingMultihomingMultihomingMultihoming
Opposed to TCP connection, an SCTP association can take advantage of a
multihomed host using all the IP addresses the host owns. This feature is one
of the most important ones in SCTP as it gives some network redundancy that
is really valuable when dealing with signalling. In the older signalling
systems, like SS7, every network component is duplicated, and the idea of
loosing a TCP connection due to the failure of one of the network cards was
one of the major problems that made SCTP necessary.
IP
TCP
TCPuser
IP
TCP
TCPuser
IP
TCP
TCPuser
connection
endpoint/socket = IP address + TCP port number
IP path
Figure 5-10 Singlehomed protocol (TCP)
SCTPuser
IP
SCTP
IP
SCTPuser
IP
SCTP
IP
SCTPuser
IP
SCTP
IP
SCTPuser
IP
SCTP
IP
endpoint/socket = IP addresses + SCTP port number
IP paths
association
Figure 5-11 Multihomed protocol (SCTP)
LTE/EPS Technology
126
StreamsStreamsStreamsStreams
IP signalling traffic is usually composed of many independent message
sequences between many different signalling endpoints. SCTP allows
signalling messages to be independently ordered within multiple streams
(unidirectional logical channels established from one SCTP endpoint to
another) to ensure in-sequence delivery between associated endpoints. By
transferring independent message sequences in separate SCTP streams, it is
less likely that the retransmission of a lost message will affect the timely
delivery of other messages in unrelated sequences (problem called
head-of-line blocking). Because TCP/IP does enforce head-of-line blocking,
the SCTP is better suited, rather than TCP/IP, for the transmission of
signalling messages over IP networks.
TCP connection
2 1
buffered
345
2
3
4
5
1Re-Tx
application
Figure 5-12 Head-Of-Line (HOL) blocking – single TCP connection
Stream
2
Stream
1
45
46
buffered
5
62
delivered delivered
12
56
4546
SCTP
association
Stream 0
Stream 1
Stream 2
SCTP user
Stream
0
Figure 5-13 SCTP association with several streams
Message oriented protocolMessage oriented protocolMessage oriented protocolMessage oriented protocol
TCP is stream oriented, and this can be also an inconvenience for some
applications, since usually they have to include their own marks inside the
stream so the beginning and end of their messages can be identified. In
addition, they should explicitly make use of the push facility to ensure that the
complete message has been transferred in a reasonable time.
5 Core Network
127
TCP
user
TCP TCP
TCP
user
Figure 5-14 Stream oriented protocol (TCP)
Opposed to TCP, an SCTP is message oriented. This means that the SCTP is
aware of the upper layer protocol data structures, thus always a complete
messages, well separated from each other are deliver to the SCTP user on the
receiving side.
SCTP
user
SCTP SCTP
SCTP
user
Figure 5-15 Message oriented protocol (SCTP)
SecuritySecuritySecuritySecurity
SCTP is using and new method for association establishment. It completely
removed the problem of the so-called SYN attack in TCP. This attack is very
simple and can affect any system connected to the Internet providing
TCP-based network services (such as an HTTP, FTP or mail server).
Let us see in short how this basic attack is performed. In TCP, the
establishment phase consists of a three-way handshake. These three packets
are usually called SYN (from Synchronisation, as it has the SYN flag set,
used only during the establishment), SYN-ACK (it has both the SYN and
ACK flags set) and ACK (this is a simple acknowledgement message with the
ACK flag set).
The problem is that the receiver of the SYN not only sends back the
SYN-ACK but also keeps some information about the packet received while
waiting for the ACK message (a server in this state is said to have a half-open
connection).
LTE/EPS Technology
128
SYN Ack No. = 0, Seq. No. = Tag A
SYN ACK Ack No. = Tag A, Seq. No. =Tag B
ACK Ack No. = Tag B, ...
Client Server
TCB
Figure 5-16 Establishment procedure (TCP)
The memory space used to keep the information of all pending connections is
of finite size and it can be exhausted by intentionally creating too many
half-open connections. This makes the attacked system unable to accept any
new incoming connections and thus provokes a denial of service to other
users wanting to connect to the server. There is a timer that removes the
half-open connections from memory when they have been in this state for so
long, and that will eventually make the system to recover, but nothing will
change if the attacker continues sending SYN messages.
SYN Fake IP address A
SYN Fake IP address B
SYN Fake IP address C
SYN Fake IP address ...
SYN ACK
SYN ACK
SYN ACK
SYN
ACK
RST RST
R
ST
Figure 5-17 SYN attack in TCP
As we see, the attacker uses IP spoofing, making it unable to receive the
SYN-ACK segments produced, which is not a problem since it will never
answer them. All those SYN-ACK segments will be lost unless there is any
host with TCP service listening to the port and addresses used as the source of
the SYN segment. In that case that host will answer with a segment carrying
the RST (from Reset) flag set and the attacked system will delete the
information for that specific half-open connection.
SCTP gives no chance of success to this kind of attacks with its cookie
mechanism. When the designers of SCTP started to think about how to deal
5 Core Network
129
with SYN flooding, they quickly saw that two things were necessary in order
not to make a new transport protocol with the same weakness:
• The server (the initiate of a new association) should not use even a
byte of memory until the association is completely established.
• There must be a way to recognise that the client (the initiator of the
association) is using its real IP address.
Usually, to meet the second requirement, the server sends some kind of key
number to the client who will only receive that information if the source
address used in its IP datagram is the real one. Once the client has that
information, it can then send a confirmation to the server using that key
number thus proving that it was telling the truth. This means that the server
needs to save somewhere that key number as well so there is a way it can
verify that the key number was the right one. But then comes the problem of
being forced to store that value somewhere and using some memory resources
while waiting for the answer that might never come.
Therefore, the idea was: why not instead of storing that information in our
system we make it to stay all the time in the network or in the client's
memory? Of course, one immediately thinks that if a datagram coming from
the client is the one that is going to provide us the information to check
against the client's answer, we have not done anything but making worse the
situation. The client will tell us whatever it wants and then it could just
completely open an association sending us a simple message.
But this is not necessarily true if we manage to convert the two problems into
another one: the server has to sign with a secret key the information sent to
the client. So, when it receives that information back from the client, it can
recognise due to the signature and using the secret key, that it did send exactly
that information, which is unmodified, and so we can be as confident on it as
if it had never left the server's buffers.
INIT
INIT ACK (COOKIE)
COOKIE ECHO (COOKIE)
Client Server
COOKIE ACK
TCB
COOKIE
TCB
Figure 5-18 Cookie (SCTP association establishment)
LTE/EPS Technology
130
SIGTRAN in GSM/UMTSSIGTRAN in GSM/UMTSSIGTRAN in GSM/UMTSSIGTRAN in GSM/UMTS
Traditionally, on all the interfaces in GSM/UMTS CN, as well as, on
interfaces connecting CN with the RAN, the SS7 is used. However the
traditional SS7 protocols stack is not a good solution for the networks with IP
transport since it still requires traditional TDM based interfaces to carry SS7
signalling links. That is way, majority of the GSM/UMTS operators are
replacing traditional SS7 protocol stack with SIGTRAN. However, since it is
just the modification of the traditionally SS7 protocol stack, only the MTP
and sometimes additionally SCCP protocols are replaced by SIGTRAN,
whereas the upper layers remains unchanged. This requires an extra set of
protocols called the SIGTRAN User Adaptation Layers (UALs) introducing
some extra cost, consuming processing power of the signalling nodes and
adding also some complexity to the system. In fact, SIGTRAN in the today
networks is only emulating the behaviour of the transport layers of the SS7.
IP
SCTP
MTP3
M2UAM2PA IUA V5UA
SCCP
TCAP
ISUP BSSAP MAP CAP Q.931 V5.2
SIGTRAN protocols
SS7 protocols
SIGTRAN protocols
SS7 protocols
M3UA SUA
Figure 5-19 SIGTRAN protocol suite
The User Adaptation Layers are named according to the service they replace,
rather than the user of that service. For example, M3UA adapts SCTP to
provide the services of MTP3, rather then providing a service to MTP3.
SIGTRSIGTRSIGTRSIGTRAN in EPSAN in EPSAN in EPSAN in EPS
Since EPS is introducing a completely new set of the signalling protocols,
these protocols were designed to operate directly on top of SCTP, without
need for any User Adaptation Layers. Hence, the protocol stack is not only
more elegant, but also it is much more efficient. Instead of emulating the
5 Core Network
131
behaviour of the traditional SS7 the, the SCTP can provide its services
directly to the top most protocols, so they are now ready to fully utilise
capabilities of the SCTP. Thanks to the fact, that there is less protocols in the
stack the new system behaves better in terms of both, transmission bandwidth
utilisation, as well as processing power consumption in the end devices.
IP
SCTP
S1AP X2AP SGsAP Diameter
Figure 5-20 SIGTRAN in EPS
User data transferUser data transferUser data transferUser data transfer
The EPS nodes are interconnected via a private IP network of the operator,
thus when communicating between each other they are using IP addresses
from that private IP network.
The IP address allocated to the user is in fact belonging to the external PDN
addressing space, as it is used between the UE and the servers in the external
network.
eNB S-GW P-GW
IP private
IP IP IP IPIP IP
IP address allocation
IP private or
public
Figure 5-21 Tunnelling
This means that on the interface which carries user data, user IP packets going
to and from PDN have to be send inside other IP packets going between EPS
nodes.
LTE/EPS Technology
132
S-GW P-GW
IP IPIPIP IP
Figure 5-22 User IP packet encapsulation
GTPGTPGTPGTP
GPRS Tunnelling Protocol (GTP) is a group of IP-based communications
protocols used to carry user IP packets within GSM, UMTS and EPS
networks. GTP can be decomposed into two separate protocols: GTP-C and
GTP-U.
GTPv2-C is used within the EPC for signalling between S-GW, P-GW, SGSN
and SRVCC enhanced MSC server. This allows the EPC to activate a session
on a user's behalf (EPS bearer), to deactivate the same session, to adjust QoS
parameters, or to update a session for a subscriber changing S-GW or SGSN.
Additionally, GTPv2-C is used to perform PS to CS handover between MME
and SRVCC enhanced MSC (see Chapter 10 for more details).
GTPv1-U is used for carrying user data within the EPC, between eNBs and
S-GWs (S1 interface) and between neighbouring eNBs (X2 interface).
UE is connected to an eNB without being aware of GTP.
TunnelsTunnelsTunnelsTunnels
GTP tunnels are used between two nodes communicating over a GTP based
interface, to separate traffic into different communication flows.
L1
L2
IP
UDP
GTP
L1
L2
IP
UDP
GTP
L1
L2
IP
UDP
GTP
L1
L2
IP
UDP
GTP
S1/S3/S4/S5/S8/
S10/S11/S12/Sv/X2
Figure 5-23 GTP protocol stack
5 Core Network
133
A GTP tunnel is identified in each node with a Tunnel Endpoint Identifier
(TEID), an IP address and a UDP port number. The receiving end side of a
GTP tunnel locally assigns the TEID value the transmitting side has to use.
The TEID values are exchanged between tunnel endpoints using GTP-C,
S1-MME or X2-eNB messages.
eNB S-GW P-GW
SGSNRNC
GTP-U
MME
GTP-U
GTP-U
S1AP
RANAP
GTP-C
GTP-CGTP-C
eNB
GTP-U
GTP-U
X2AP
Figure 5-24 Tunnel control protocols
TunnelTunnelTunnelTunnel establishmentestablishmentestablishmentestablishment
The generic GTP-C/GTP-U tunnel establishment procedure is shown in
Fig.-5-25.
Node 1
Data
Node 2
Create Tunnel Request ( )
Control
Create Tunnel Response ( )
TEID & IP @ Node 1 for data
TEID & IP @ Node 1 for signalling
TEID & IP @ Node 2 for data
TEID & IP @ Node 2 for signalling
Figure 5-25 Generic tunnel establishment procedure
LTE/EPS Technology
134
The node that is initiating the tunnel establishment sends to the terminating
node the Create Tunnel Request message; the message among many other
procedure specific parameters includes:
• Tunnel Endpoint Identifier (TEID) for User Plane that specifies
a TEID for GTP-U, chosen by the originating node. The terminating
node includes this TEID in the GTP-U header of all subsequent
GTP-U packets, send in the backward direction.
• Tunnel Endpoint Identifier (TEID) for Control Plane that specifies
a TEID for control plane message, chosen by the originating node. The
terminating node includes this TEID in the GTP-C header of all
subsequent GTP-C packets, send in the backward direction. Those
packets can carry messages used to complete the tunnel establishment,
modify the already existing tunnel or to release the existing tunnel,
• Originating node’s IP address for User Plane,
• Originating node’s IP address for Control Plane.
The terminating node answers with the Create Tunnel Response message
which contains:
• Tunnel Endpoint Identifier (TEID) for User Plane that specifies
a TEID for GTP-U, chosen by the terminating node. The originating
node includes this TEID in the GTP-U header of all subsequent
GTP-U packets, send in the forward direction.
• Tunnel Endpoint Identifier (TEID) for Control Plane that specifies
a TEID for control plane messages, chosen by the terminating node.
The originating node includes this TEID in the GTP-C header of all
subsequent GTP-C packets, sent in the forward direction.
• Terminating node’s IP address for User Plane,
• Terminating node’s IP address for Control Plane.
From that moment the user communication context on one side of the tunnel
is associated with the corresponding context on the other side of the tunnel.
This association is kept thanks to allocation of flow specific pairs of IP
addresses and TEIDs for both user data and control messages.
5 Core Network
135
DiameterDiameterDiameterDiameter
Diameter is an AAA (Authentication, Authorisation and Accounting) protocol for
applications such as network access or IP mobility. The basic concept is to
provide a base protocol that can be extended in order to provide AAA services to
new access technologies. Diameter is intended to work in both local and roaming
AAA situations.
Diameter sessions consist of exchange of commands and Attribute Value
Pairs (AVPs) between authorised Diameter Clients and Servers. Some of the
command values are used by the Diameter protocol itself, while others deliver
data associated with particular applications that employ Diameter.
The base protocol provides basic mechanisms for reliable transport, message
delivery and error handling. It must be used along with a Diameter
application. A Diameter application uses the services of base protocol in order
to support a specific type of service. The Diameter Base Protocol defines
basic and standard behaviour of Diameter nodes as well-defined state
machines and also provides an extensible messaging mechanism that allows
information exchange among Diameter Nodes. Diameter Applications
augment the Base Protocol state machines with application-specific behaviour
to provide new AAA capabilities.
Diameter applicationsDiameter applicationsDiameter applicationsDiameter applications
There are two kinds of applications: IETF standards track applications and
vendor specific applications. The 3GPP Diameter application, relevant to
EPS, are listed in Fig. 5-26.
vPCRF ↔ hPCRFS916777267
MME/SGSN ↔ EIRS13/S13’16777252
MME ↔ HSSS6a16777251
PCRF ↔ PCEF (P-GW)Gx16777238
PCRF ↔ AFRx16777236
Nodes
Application
(interface)
Application
Identifier
vPCRF ↔ hPCRFS916777267
MME/SGSN ↔ EIRS13/S13’16777252
MME ↔ HSSS6a16777251
PCRF ↔ PCEF (P-GW)Gx16777238
PCRF ↔ AFRx16777236
Nodes
Application
(interface)
Application
Identifier
Figure 5-26 3GPP Diameter applications
The Diameter peers are communicating with each other over transport
connection provided by SCTP (SCTP association).
LTE/EPS Technology
136
L1
L2
IP
SCTP
Diameter
L1
L2
IP
SCTP
Diameter
L1
L2
IP
SCTP
Diameter
L1
L2
IP
SCTP
Diameter
S6a/S13/S9/Rx/Gx
Figure 5-27 Diameter protocol stack
Proxy/Relay agentProxy/Relay agentProxy/Relay agentProxy/Relay agent
The Diameter base protocol defines two types of Diameter agent, namely
Diameter Relay agent and Diameter Proxy agent.
Diameter Relay is a function specialised in message forwarding, i.e.:
• A Relay agent does not inspect the actual contents of the message.
• When a Relay agent receives a request, it will route messages to next-
hop Diameter peer based on information found in the message e.g.
application ID and destination address.
Diameter Proxy includes the functions of Diameter Relay and additionally it
can inspects the actual contents of the message to perform admission control,
policy control, add special information elements handling.
The use of Proxy and Relay agent is especially important in case of roaming
scenarios to support scalability, resilience and maintainability and to reduce
the export of network topologies.
PCRF
Proxy/
Relay
Proxy/
Relay
PCRF
IMSI
Update Location Request,
Destination Realm: epc.mnc<MNC>.mcc<MCC>.3gppnetwork.org.
User Name: IMSI
GRX/IPX
vPLMN
hPLMN
HSS
MME
MME MME
HSS
HSS
Figure 5-28 Diameter Proxy/Relay agent
Please, note that without usage of Diameter Proxy/Relay agents it would be
necessary to provide a separate Diameter connection (SCTP association)
between each MME of the VPLMN and each HSS of every possible HPLMN.
5 Core Network
137
QQQQualityualityualityuality ooooffff SSSServiceerviceerviceervice
The EPS provides IP connectivity between a UE and a PLMN external packet
data network. This is referred to as PDN Connectivity Service. The PDN
Connectivity Service supports the transport of one or more Service Data
Flows (SDFs).
EPS bearerEPS bearerEPS bearerEPS bearer
For E-UTRAN access to the EPC the PDN connectivity service is provided by
an EPS bearer.
An EPS bearer uniquely identifies an SDF aggregate between a UE and a
P-GW.
An EPS bearer is the level of granularity for bearer level QoS control in the
EPC/E-UTRAN. That is, SDFs mapped to the same EPS bearer receive the
same bearer level packet forwarding treatment (e.g. scheduling policy, queue
management policy, rate shaping policy, RLC configuration, etc.). Providing
different bearer level QoS to two SDFs thus requires that a separate EPS
bearer is established for each SDF.
eNB S-GW P-GW
PDN
EPS Bearer #1 (bearer QoS1)
EPS Bearer #2 (bearer QoS2)
Service Data Flow (PCC parameters)
Figure 5-29 EPS bearer
One EPS bearer is established when the UE connects to a PDN, and that
remains established throughout the lifetime of the PDN connection to provide
the UE with always-on IP connectivity to that PDN. That bearer is referred to
as the default bearer. Any additional EPS bearer that is established to the
same PDN is referred to as a dedicated bearer.
LTE/EPS Technology
138
eNB S-GW P-GW
PDN
Dedicated Bearer (additional bearer, GBR or non-GBR)
Default Bearer (created as a part of Attach proc., non-GBR)
Figure 5-30 Default & dedicated bearer
An UpLink/DownLink Traffic Flow Template (UL/DL TFT) is a set of
UL/DL packet filters. Every EPS bearer is associated with an UL TFT in the
UE and a DL TFT in the P-GW (i.e. PCEF).
UE eNB S-GW P-GW
PDN
EPS Bearer #1
EPS Bearer #2
FiltersFilters
Figure 5-31 Traffic Flow Template (TFT)
The initial bearer level QoS parameter values of the default bearer are
assigned by the network, based on subscription data (in case of E-UTRAN the
MME sets those initial values based on subscription data retrieved from HSS).
The PCEF may change those values based in interaction with the PCRF or
based on local configuration.
The decision to establish or modify a dedicated bearer can only be taken by
the EPC, and the bearer level QoS parameter values are always assigned by
the EPC. Therefore, the MME does not modify the bearer level QoS
parameter values received on the S11 reference point during establishment or
modification of a dedicated bearer. Instead, the MME only transparently
forwards those values to the E-UTRAN. Consequently, ‘QoS negotiation’
between the E-UTRAN and the EPC during dedicated bearer establishment /
modification is not supported. The MME may, however, reject the
establishment or modification of a dedicated bearer (e.g. in case the bearer
level QoS parameter values sent by the PCEF over an S8 roaming interface do
not comply with a roaming agreement).
5 Core Network
139
eNB S-GW P-GW
Bearer establishment direction
no QoS negotiation
PCRF
AF
‘Bearer establishment trigger’
Figure 5-32 Bearer establishment direction
An EPS bearer is referred to as a GBR bearer if dedicated network resources
related to a Guaranteed Bit Rate (GBR) value that is associated with the EPS
bearer are permanently allocated (e.g. by an admission control function in the
eNB) at bearer establishment/modification. Otherwise, an EPS bearer is
referred to as a Non-GBR bearer.
A dedicated bearer can either be a GBR or a Non-GBR bearer. A default
bearer is a Non-GBR bearer.
An EPS bearer is realised by the following elements:
• An UL TFT in the UE maps an SDF to an EPS bearer in the UL
direction. Multiple SDFs can be multiplexed onto the same EPS bearer
by including multiple UL packet filters in the UL TFT;
• A DL TFT in the P-GW maps an SDF to an EPS bearer in the DL
direction. Multiple SDFs can be multiplexed onto the same EPS bearer
by including multiple DL packet filters in the DL TFT;
• A radio bearer transports the packets of an EPS bearer between a UE
and an eNB. There is a one-to-one mapping between an EPS bearer
and a radio bearer;
• An S1 bearer transports the packets of an EPS bearer between an eNB
and a S-GW;
• An S5/S8 bearer transports the packets of an EPS bearer between a
S-GW and a P-GW;
• A UE stores a mapping between an UL packet filter and a radio bearer
to create the mapping between an SDF and a radio bearer in the UL;
• A P-GW stores a mapping between a DL packet filter and an S5/S8
bearer to create the mapping between an SDF and an S5/S8 bearer in
the DL;
LTE/EPS Technology
140
• An eNB stores a one-to-one mapping between a radio bearer and an
S1 to create the mapping between a radio bearer and an S1 bearer in
both the UL and DL;
• A S-GW stores a one-to-one mapping between an S1 bearer and an
S5/S8 bearer to create the mapping between an S1 bearer and an S5/S8
bearer in both the UL and DL.
QoS parametersQoS parametersQoS parametersQoS parameters
The bearer level (i.e. per bearer or per bearer aggregate) QoS parameters are
QCI, ARP, GBR, MBR, and AMBR described in this section.
Each EPS bearer (GBR and Non-GBR) is associated with the following bearer
level QoS parameters:
• QoS Class Identifier (QCI);
• Allocation and Retention Priority (ARP).
A QCI is a scalar that is used as a reference to access node-specific
parameters that control bearer level packet forwarding treatment (e.g.
scheduling weights, admission thresholds, queue management thresholds, link
layer protocol configuration, etc.), and that have been pre-configured by the
operator owning the access node (e.g. eNB).
The primary purpose of ARP is to decide whether a bearer establishment /
modification request can be accepted or needs to be rejected in case of
resource limitations (typically available radio capacity in case of GBR
bearers). In addition, the ARP can be used (e.g. by the eNB) to decide which
bearer(s) to drop during exceptional resource limitations (e.g. at handover).
Once successfully established, a bearer's ARP has no any impact on the bearer
level packet forwarding treatment (e.g. scheduling and rate control). Such
packet forwarding treatment should be solely determined by the other bearer
level QoS parameters: QCI, GBR, MBR, and AMBR.
Video telephony is one use case where it may be beneficial to use EPS bearers
with different ARP values for the same UE. In this use case an operator could
map voice to one bearer with a higher ARP, and video to another bearer with
a lower ARP. In a congestion situation (e.g. cell edge) the eNB can then drop
the ‘video bearer’ without affecting the ’voice bearer’. This would improve
service continuity.
5 Core Network
141
Each GBR bearer is additionally associated with the following bearer level
QoS parameters:
• Guaranteed Bit Rate (GBR);
• Maximum Bit Rate (MBR).
The GBR denotes the bit rate that can be expected to be provided by a GBR
bearer. The MBR limits the bit rate that can be expected to be provided by a
GBR bearer (e.g. excess traffic may get discarded by a rate shaping function).
Each APN is associated with the ‘per APN Aggregate Maximum Bit Rate
(APN-AMBR)’ IP-CAN session level QoS parameter. The APN-AMBR is a
subscription parameter stored per APN in the HSS. It limits the aggregate bit
rate that can be expected to be provided across all Non-GBR bearers and
across all PDN connections of the same APN (e.g. excess traffic may get
discarded by a rate shaping function). Each of those Non-GBR bearers could
potentially utilise the entire APN-AMBR, e.g. when the other Non-GBR
bearers do not carry any traffic. GBR bearers are outside the scope of
APN-AMBR. The P-GW enforces the APN-AMBR in downlink.
Enforcement of APN-AMBR in uplink is done in the UE and additionally in
the P-GW.
Each UE is associated with the ‘per UE Aggregate Maximum Bit Rate
(UE-AMBR)’ bearer level QoS parameter. The UE-AMBR is limited by a
subscription parameter stored in the HSS. The MME sets the used UE-AMBR
to the sum of the APN-AMBR of all active APNs up to the value of the
subscribed UE-AMBR. The UE-AMBR limits the aggregate bit rate that can
be expected to be provided across all Non-GBR bearers of a UE (e.g. excess
traffic may get discarded by a rate shaping function). Each of those Non-GBR
bearers could potentially utilise the entire UE-AMBR, e.g. when the other
Non-GBR bearers do not carry any traffic. GBR bearers are outside the scope
of UE-AMBR. The E-UTRAN enforces the UE-AMBR in uplink and
downlink.
The GBR and MBR denote bit rates of traffic per bearer while UE-AMBR/
APN-AMBR denote bit rates of traffic per group of bearers. Each of those
QoS parameters has an uplink and a downlink component. On S1_MME the
values of the GBR, MBR, and AMBR refer to the bit stream excluding the
GTP-U/IP header overhead of the tunnel on S1_U.
One 'EPS subscribed QoS profile' is defined for each APN permitted for the
subscriber. It contains the bearer level QoS parameter values for that APN's
default bearer (QCI and ARP) and the APN-AMBR.
LTE/EPS Technology
142
EPS bearer
GBR bearer non-GBR bearer
QCI
ARP
GBR
MBR
UE-AMBR APN-AMBR
Figure 5-33 EPS bearer related QoS parameters
Mapping betweenMapping betweenMapping betweenMapping between QQQQCCCCI and UMTS QoS parametersI and UMTS QoS parametersI and UMTS QoS parametersI and UMTS QoS parameters
A recommended mapping for QoS Class Identifier to/from UMTS QoS
parameters is shown in Fig. 5-34.
---background9
-no3interactive8
-no2interactive7
-no1interactive6
-yes1interactive5
unknown--streaming4
speech--streaming3
unknown--conversational2
speech--conversational1
source statistics
descriptor
signalling
indication
THPtraffic class
UMTS QoS parameters
QCI
---background9
-no3interactive8
-no2interactive7
-no1interactive6
-yes1interactive5
unknown--streaming4
speech--streaming3
unknown--conversational2
speech--conversational1
source statistics
descriptor
signalling
indication
THPtraffic class
UMTS QoS parameters
QCI
Figure 5-34 QCI to UMTS QoS parameters mapping

Más contenido relacionado

La actualidad más candente

Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
IOSR Journals
 
Building impedance matching network based on s parameter from manufacturer
Building impedance matching network based on s parameter from manufacturerBuilding impedance matching network based on s parameter from manufacturer
Building impedance matching network based on s parameter from manufacturer
Journal Papers
 
Efficient load aware routing scheme
Efficient load aware routing schemeEfficient load aware routing scheme
Efficient load aware routing scheme
ambitlick
 
Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...
Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...
Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...
fbinard
 

La actualidad más candente (20)

Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 
Building impedance matching network based on s parameter from manufacturer
Building impedance matching network based on s parameter from manufacturerBuilding impedance matching network based on s parameter from manufacturer
Building impedance matching network based on s parameter from manufacturer
 
Efficient load aware routing scheme
Efficient load aware routing schemeEfficient load aware routing scheme
Efficient load aware routing scheme
 
The efficient interleaving of digital-video-broadcasting-satellite 2nd genera...
The efficient interleaving of digital-video-broadcasting-satellite 2nd genera...The efficient interleaving of digital-video-broadcasting-satellite 2nd genera...
The efficient interleaving of digital-video-broadcasting-satellite 2nd genera...
 
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...
 
08 Switching
08 Switching08 Switching
08 Switching
 
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...
 
11 appendix M.TECH ( PDF FILE )
11 appendix M.TECH ( PDF FILE )11 appendix M.TECH ( PDF FILE )
11 appendix M.TECH ( PDF FILE )
 
11 appendix M.TECH ( M S WORD FILE )
11 appendix M.TECH ( M S WORD FILE )11 appendix M.TECH ( M S WORD FILE )
11 appendix M.TECH ( M S WORD FILE )
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
 
Dvb s2-vcm
Dvb s2-vcmDvb s2-vcm
Dvb s2-vcm
 
Dvb s2-vcm
Dvb s2-vcmDvb s2-vcm
Dvb s2-vcm
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)
 
IP Multicasting over DVB-T/H and e-MBMS
IP Multicasting over DVB-T/H and e-MBMSIP Multicasting over DVB-T/H and e-MBMS
IP Multicasting over DVB-T/H and e-MBMS
 
Ltu ex-05238-se
Ltu ex-05238-seLtu ex-05238-se
Ltu ex-05238-se
 
Ed24825831
Ed24825831Ed24825831
Ed24825831
 
High Speed Low Power CMOS Domino or Gate Design in 16nm Technology
High Speed Low Power CMOS Domino or Gate Design in 16nm TechnologyHigh Speed Low Power CMOS Domino or Gate Design in 16nm Technology
High Speed Low Power CMOS Domino or Gate Design in 16nm Technology
 
Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...
Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...
Deadlock Preventive Adaptive Wormhole Routing on k-ary n-cube Interconnection...
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh Networks
 

Similar a LTE/EPS Technology

Circuit switched fall back theory good
Circuit switched fall back theory goodCircuit switched fall back theory good
Circuit switched fall back theory good
PeterParker Spidy
 
Interference mitigation by dynamic self power control in femtocell
Interference mitigation by dynamic self power control in femtocellInterference mitigation by dynamic self power control in femtocell
Interference mitigation by dynamic self power control in femtocell
Yara Ali
 
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
IJMER
 
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
Harvey Chang
 
My F1 journal publication 2013-Copy
My F1 journal publication 2013-CopyMy F1 journal publication 2013-Copy
My F1 journal publication 2013-Copy
Elmabruk Elgembari
 
My F1 journal publication 2013-Copy
My F1 journal publication 2013-CopyMy F1 journal publication 2013-Copy
My F1 journal publication 2013-Copy
Elmabruk Elgembari
 

Similar a LTE/EPS Technology (20)

Lte principle
Lte principleLte principle
Lte principle
 
Signalling in EPC/LTE
Signalling in EPC/LTESignalling in EPC/LTE
Signalling in EPC/LTE
 
Circuit switched fall back theory good
Circuit switched fall back theory goodCircuit switched fall back theory good
Circuit switched fall back theory good
 
Switching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksSwitching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networks
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
Interference mitigation by dynamic self power control in femtocell
Interference mitigation by dynamic self power control in femtocellInterference mitigation by dynamic self power control in femtocell
Interference mitigation by dynamic self power control in femtocell
 
B 20 mme_admin_chapter_0100111
B 20 mme_admin_chapter_0100111B 20 mme_admin_chapter_0100111
B 20 mme_admin_chapter_0100111
 
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEPERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
 
Motorola BSC Overview
Motorola BSC OverviewMotorola BSC Overview
Motorola BSC Overview
 
Paper lte-srvcc
Paper lte-srvccPaper lte-srvcc
Paper lte-srvcc
 
20786641 lte-whitepaper
20786641 lte-whitepaper20786641 lte-whitepaper
20786641 lte-whitepaper
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
NetSim Technology Library- Lte and-lte-a
NetSim Technology Library- Lte and-lte-aNetSim Technology Library- Lte and-lte-a
NetSim Technology Library- Lte and-lte-a
 
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
 
Comparison of scm, scme, and winner
Comparison of scm, scme, and winnerComparison of scm, scme, and winner
Comparison of scm, scme, and winner
 
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
 
My F1 journal publication 2013-Copy
My F1 journal publication 2013-CopyMy F1 journal publication 2013-Copy
My F1 journal publication 2013-Copy
 
My F1 journal publication 2013-Copy
My F1 journal publication 2013-CopyMy F1 journal publication 2013-Copy
My F1 journal publication 2013-Copy
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

LTE/EPS Technology

  • 1. 5 Core Network 117 ChapterChapterChapterChapter 5555 Core NetworkCore NetworkCore NetworkCore Network TopicTopicTopicTopic PagePagePagePage MME in Pool.................................................................................................. 119 Signalling Transport (SIGTRAN).................................................................. 124 User data transfer ........................................................................................... 131 Diameter......................................................................................................... 135 Quality of Service .......................................................................................... 137
  • 2. LTE/EPS Technology 118 This page is intentionally left blank
  • 3. 5 Core Network 119 MME in PoolMME in PoolMME in PoolMME in Pool The Intra Domain Connection of RAN Nodes to Multiple CN Nodes, introduced in UMTS R5, overcomes the strict hierarchy, which restricts the connection of a RAN node to just one CN node. This restriction in GSM/UMTS results from routing mechanisms in the RAN nodes which differentiate only between information to be sent to the PS or to the CS domain CN nodes and which do not differentiate between multiple CN nodes in each domain. The Intra Domain Connection of RAN Nodes to Multiple CN Nodes introduces a routing mechanism (and other related functionality), which enables the RAN nodes to route information to different CN nodes within the CS or PS domain, respectively. RNC RNC RNCRNC SGSN SGSN GGSN RNCRNC SGSN GGSN Figure 5-1 Network hierarchy GSM/UMTS R4- The Intra Domain Connection of RAN Nodes to Multiple CN Nodes introduces further the concept of ‘pool-areas’ which is enabled by the routing mechanism in the RAN nodes. A pool-area is comparable to an MSC or SGSN service area as a collection of one or more RAN node service areas. In difference to an MSC or SGSN service area a pool-area is served by multiple CN nodes (MSCs or SGSNs) in parallel which share the traffic of this area between each other. Furthermore, pool-areas may overlap which is not possible for MSC or SGSN service areas. From a RAN perspective a pool-area comprises all LA(s)/RA(s) of one or more RNC/BSC that are served by a certain group of CN nodes in parallel. One or more of the CN nodes in this group may in addition serve LAs/RAs outside this pool-area or may also serve other pool-areas. This group of CN nodes is also referred to as MSC pool or SGSN pool respectively.
  • 4. LTE/EPS Technology 120 GGSN GGSN SGSN SGSN SGSN RNC RNC RNCRNC RNCRNC Pool area 1 Pool area 2 Figure 5-2 Network hierarchy GSM/UMTS R5+ The Intra Domain Connection of RAN Nodes to Multiple CN Nodes enables a few different application scenarios with certain characteristics. The service provision by multiple CN nodes within a pool-area enlarges the served area compared to the service area of one CN node. This results in reduced inter CN node updates, handovers and relocations and it reduces the HSS update traffic. The configuration of overlapping pool-areas allows to separate the overall traffic into different MS moving pattern, e.g. pool-areas where each covers a separate residential area and all the same city centre. Other advantages of multiple CN nodes in a pool-area are the possibility of capacity upgrades by additional CN nodes in the pool-area or the increased service availability as other CN nodes may provide services in case one CN node in the pool-area fails. A user terminal is served by one dedicated CN node of a pool-area as long as it is in radio coverage of the pool-area. The fact that the BSC can co-operate with the several SGSN does not implies that the separate physical interfaces are required since the IP network can be used between BSCs and SGSNs to switch the traffic delivered on the same physical interfaces to different recipients connected to that network. IP network SGSN2SGSN1 SGSN3 BSC6BSC5BSC4BSC3BSC2BSC1 Figure 5-3 SGSNs in Pool (physical view with Gb/IP)
  • 5. 5 Core Network 121 Similarly to GSM/UMTS, where the MSC/SGSN in Pool is already quite popular solution, the EPS network may utilise the solution called MME in Pool. However, some aspects of the CN nodes pool solution for GSM/UMTS and EPS networks are different: • There is only one CN domain in EPS, that is PS domain, so there is only necessity for the MME nodes to be pooled, • The MME in Pool concept is introduced in the first release of the standard for the EPS network, so right from the beginning all MMEs/eNBs can support MME in Pool specific procedures. (In GSM/UMTS there was a necessity to solve backward compatibility problems between MSCs/SGSNs capable and non-capable of supporting pool area concept.) • The temporary UE identity GUTI that holds the binding between the UE and it’s serving MME in EPS has a structure that directly supports the concept of the MME in Pool, in contradiction to GSM/UMTS where TMSI/P-TMSI structure was modified for that purpose. Since new R5 TMSI/P-TMSI structure has to be backward compatible with R4, the solution is slightly less efficient, introduces some extra signalling load and in some cases may result in the situation where subscriber are not subjected to inter MSC/SGSN load distribution. MME in Pool only PS domain in EPS no problems with backward compatibility GUTI structure supports the MME in Pool concept MME in Pool only PS domain in EPS no problems with backward compatibility GUTI structure supports the MME in Pool concept Figure 5-4 MME in Pool Pool areaPool areaPool areaPool area A pool-area is an area within which a UE may roam without a need to change the serving MME node. A pool-area is served by one or more MMEs nodes in parallel. The complete service area of a eNB (i.e. all the cells being served by one eNB) belongs to the same one or more pool-area(s). A eNB service area may belong to multiple pool-areas, which is the case when multiple overlapping pool-areas include this eNB node service area. If TA spans over multiple eNB service areas then all these eNB service areas have to belong to the same MME pool-area. Additionally, when the TA list, the UE is registered to, spans over multiple eNB service areas then also all these eNB service areas have to belong to the same MME pool area.
  • 6. LTE/EPS Technology 122 An MME pool-area is an area within which an MS roams without a need to change the serving MME. MME MME MME eNB eNB eNB eNB eNB Figure 5-5 MME pool area MME selection and aMME selection and aMME selection and aMME selection and addressingddressingddressingddressing Each time the UE leaves the current MME pool area, the eNB runs MME selection function. The MME selection function selects an available MME for serving a UE. The selection is based on network topology, i.e. the selected MME serves the UE’s location and in case of overlapping MME service areas, the selection may prefer MMEs with service areas that reduce the probability of changing the MME. The selected MME allocates a Globally Unique Temporary Identity (GUTI) to the UE. The GUTI has two main components: • Globally Unique MME Identifier (GUMMEI) uniquely identifying the MME which allocated the GUTI, • M-TMSI uniquely identifying the UE within the MME that allocated the GUTI. GUMMEI MCC MNC MMEGI MMEC M-TMSI MMEI S-TMSI GUMMEI Globally Unique MME Identifier MMEI MME Identifier MMEGI MME Group ID MMEC MME Code Figure 5-6 GUTI structure
  • 7. 5 Core Network 123 The GUTI structure directly supports the concept of the MME pool area. Since during each identification the UE, not only identifies itself but also the MME that has allocated its temporary identity. Therefore, even in case of intra MME pool area mobility, each eNB easily can route the data from the UE to the MME which holds the user subscription and session information. eNB eNB GUTI (GUMMEI #2) (GUMMEI #1) MME selection GUTI/GUMMEI allocation GUMMEI routing MME MME (GUMMEI #2) MME (GUMMEI #3) GUTI (GUMMEI #2) Figure 5-7MME in Pool and GUTI In case of inter MME pool area mobility the new eNB, can easily discover that the UE is coming from another pool area, the eNB is not a part of. In that case the eNB runs the MME selection process that will choose the new MME for the UE, which in turn allocates the new GUTI. The new GUTI (that includes the new MME’s identity) is used from that moment to route signalling messages from the UE to the selected MME, until the MME pool area is changed. Load BalancingLoad BalancingLoad BalancingLoad Balancing The MME Load Balancing functionality permits UEs that are entering into an MME Pool Area to be directed to an appropriate MME in a manner that achieves load balancing between MMEs. This is achieved by setting an MME weight factor (called MME Relative Capacity) for each MME, such that the probability of the eNB selecting an MME is proportional to its capacity. The MME Relative Capacity parameter is typically set according to the capacity of an MME node relative to other MME nodes.
  • 8. LTE/EPS Technology 124 MME MME MME eNB 10 10 20 MME relative capacity Figure 5-8 Load balancing The MME Load Re-balancing functionality permits UEs that are registered on an MME (within an MME Pool Area) to be moved to another MME. An example use for the MME Load Re-balancing function is for the O&M related removal of one MME from an MME Pool Area. MME MME MME Figure 5-9 Load re-balancing SignallSignallSignallSignalling Transing Transing Transing Transport (SIGTRAN)port (SIGTRAN)port (SIGTRAN)port (SIGTRAN) Signalling Transport (SIGTRAN) is a new set of standards defined by the International Engineering Task Force (IETF). This set of protocols has been defined in order to provide the architectural model of signalling transport over IP networks.
  • 9. 5 Core Network 125 SCTPSCTPSCTPSCTP To reliably transport signalling messages over IP networks, the IETF SIGTRAN working group devised the Stream Control Transmission Protocol (SCTP). SCTP allows the reliable transfer of signalling messages between signalling endpoints in an IP network. MultihomingMultihomingMultihomingMultihoming Opposed to TCP connection, an SCTP association can take advantage of a multihomed host using all the IP addresses the host owns. This feature is one of the most important ones in SCTP as it gives some network redundancy that is really valuable when dealing with signalling. In the older signalling systems, like SS7, every network component is duplicated, and the idea of loosing a TCP connection due to the failure of one of the network cards was one of the major problems that made SCTP necessary. IP TCP TCPuser IP TCP TCPuser IP TCP TCPuser connection endpoint/socket = IP address + TCP port number IP path Figure 5-10 Singlehomed protocol (TCP) SCTPuser IP SCTP IP SCTPuser IP SCTP IP SCTPuser IP SCTP IP SCTPuser IP SCTP IP endpoint/socket = IP addresses + SCTP port number IP paths association Figure 5-11 Multihomed protocol (SCTP)
  • 10. LTE/EPS Technology 126 StreamsStreamsStreamsStreams IP signalling traffic is usually composed of many independent message sequences between many different signalling endpoints. SCTP allows signalling messages to be independently ordered within multiple streams (unidirectional logical channels established from one SCTP endpoint to another) to ensure in-sequence delivery between associated endpoints. By transferring independent message sequences in separate SCTP streams, it is less likely that the retransmission of a lost message will affect the timely delivery of other messages in unrelated sequences (problem called head-of-line blocking). Because TCP/IP does enforce head-of-line blocking, the SCTP is better suited, rather than TCP/IP, for the transmission of signalling messages over IP networks. TCP connection 2 1 buffered 345 2 3 4 5 1Re-Tx application Figure 5-12 Head-Of-Line (HOL) blocking – single TCP connection Stream 2 Stream 1 45 46 buffered 5 62 delivered delivered 12 56 4546 SCTP association Stream 0 Stream 1 Stream 2 SCTP user Stream 0 Figure 5-13 SCTP association with several streams Message oriented protocolMessage oriented protocolMessage oriented protocolMessage oriented protocol TCP is stream oriented, and this can be also an inconvenience for some applications, since usually they have to include their own marks inside the stream so the beginning and end of their messages can be identified. In addition, they should explicitly make use of the push facility to ensure that the complete message has been transferred in a reasonable time.
  • 11. 5 Core Network 127 TCP user TCP TCP TCP user Figure 5-14 Stream oriented protocol (TCP) Opposed to TCP, an SCTP is message oriented. This means that the SCTP is aware of the upper layer protocol data structures, thus always a complete messages, well separated from each other are deliver to the SCTP user on the receiving side. SCTP user SCTP SCTP SCTP user Figure 5-15 Message oriented protocol (SCTP) SecuritySecuritySecuritySecurity SCTP is using and new method for association establishment. It completely removed the problem of the so-called SYN attack in TCP. This attack is very simple and can affect any system connected to the Internet providing TCP-based network services (such as an HTTP, FTP or mail server). Let us see in short how this basic attack is performed. In TCP, the establishment phase consists of a three-way handshake. These three packets are usually called SYN (from Synchronisation, as it has the SYN flag set, used only during the establishment), SYN-ACK (it has both the SYN and ACK flags set) and ACK (this is a simple acknowledgement message with the ACK flag set). The problem is that the receiver of the SYN not only sends back the SYN-ACK but also keeps some information about the packet received while waiting for the ACK message (a server in this state is said to have a half-open connection).
  • 12. LTE/EPS Technology 128 SYN Ack No. = 0, Seq. No. = Tag A SYN ACK Ack No. = Tag A, Seq. No. =Tag B ACK Ack No. = Tag B, ... Client Server TCB Figure 5-16 Establishment procedure (TCP) The memory space used to keep the information of all pending connections is of finite size and it can be exhausted by intentionally creating too many half-open connections. This makes the attacked system unable to accept any new incoming connections and thus provokes a denial of service to other users wanting to connect to the server. There is a timer that removes the half-open connections from memory when they have been in this state for so long, and that will eventually make the system to recover, but nothing will change if the attacker continues sending SYN messages. SYN Fake IP address A SYN Fake IP address B SYN Fake IP address C SYN Fake IP address ... SYN ACK SYN ACK SYN ACK SYN ACK RST RST R ST Figure 5-17 SYN attack in TCP As we see, the attacker uses IP spoofing, making it unable to receive the SYN-ACK segments produced, which is not a problem since it will never answer them. All those SYN-ACK segments will be lost unless there is any host with TCP service listening to the port and addresses used as the source of the SYN segment. In that case that host will answer with a segment carrying the RST (from Reset) flag set and the attacked system will delete the information for that specific half-open connection. SCTP gives no chance of success to this kind of attacks with its cookie mechanism. When the designers of SCTP started to think about how to deal
  • 13. 5 Core Network 129 with SYN flooding, they quickly saw that two things were necessary in order not to make a new transport protocol with the same weakness: • The server (the initiate of a new association) should not use even a byte of memory until the association is completely established. • There must be a way to recognise that the client (the initiator of the association) is using its real IP address. Usually, to meet the second requirement, the server sends some kind of key number to the client who will only receive that information if the source address used in its IP datagram is the real one. Once the client has that information, it can then send a confirmation to the server using that key number thus proving that it was telling the truth. This means that the server needs to save somewhere that key number as well so there is a way it can verify that the key number was the right one. But then comes the problem of being forced to store that value somewhere and using some memory resources while waiting for the answer that might never come. Therefore, the idea was: why not instead of storing that information in our system we make it to stay all the time in the network or in the client's memory? Of course, one immediately thinks that if a datagram coming from the client is the one that is going to provide us the information to check against the client's answer, we have not done anything but making worse the situation. The client will tell us whatever it wants and then it could just completely open an association sending us a simple message. But this is not necessarily true if we manage to convert the two problems into another one: the server has to sign with a secret key the information sent to the client. So, when it receives that information back from the client, it can recognise due to the signature and using the secret key, that it did send exactly that information, which is unmodified, and so we can be as confident on it as if it had never left the server's buffers. INIT INIT ACK (COOKIE) COOKIE ECHO (COOKIE) Client Server COOKIE ACK TCB COOKIE TCB Figure 5-18 Cookie (SCTP association establishment)
  • 14. LTE/EPS Technology 130 SIGTRAN in GSM/UMTSSIGTRAN in GSM/UMTSSIGTRAN in GSM/UMTSSIGTRAN in GSM/UMTS Traditionally, on all the interfaces in GSM/UMTS CN, as well as, on interfaces connecting CN with the RAN, the SS7 is used. However the traditional SS7 protocols stack is not a good solution for the networks with IP transport since it still requires traditional TDM based interfaces to carry SS7 signalling links. That is way, majority of the GSM/UMTS operators are replacing traditional SS7 protocol stack with SIGTRAN. However, since it is just the modification of the traditionally SS7 protocol stack, only the MTP and sometimes additionally SCCP protocols are replaced by SIGTRAN, whereas the upper layers remains unchanged. This requires an extra set of protocols called the SIGTRAN User Adaptation Layers (UALs) introducing some extra cost, consuming processing power of the signalling nodes and adding also some complexity to the system. In fact, SIGTRAN in the today networks is only emulating the behaviour of the transport layers of the SS7. IP SCTP MTP3 M2UAM2PA IUA V5UA SCCP TCAP ISUP BSSAP MAP CAP Q.931 V5.2 SIGTRAN protocols SS7 protocols SIGTRAN protocols SS7 protocols M3UA SUA Figure 5-19 SIGTRAN protocol suite The User Adaptation Layers are named according to the service they replace, rather than the user of that service. For example, M3UA adapts SCTP to provide the services of MTP3, rather then providing a service to MTP3. SIGTRSIGTRSIGTRSIGTRAN in EPSAN in EPSAN in EPSAN in EPS Since EPS is introducing a completely new set of the signalling protocols, these protocols were designed to operate directly on top of SCTP, without need for any User Adaptation Layers. Hence, the protocol stack is not only more elegant, but also it is much more efficient. Instead of emulating the
  • 15. 5 Core Network 131 behaviour of the traditional SS7 the, the SCTP can provide its services directly to the top most protocols, so they are now ready to fully utilise capabilities of the SCTP. Thanks to the fact, that there is less protocols in the stack the new system behaves better in terms of both, transmission bandwidth utilisation, as well as processing power consumption in the end devices. IP SCTP S1AP X2AP SGsAP Diameter Figure 5-20 SIGTRAN in EPS User data transferUser data transferUser data transferUser data transfer The EPS nodes are interconnected via a private IP network of the operator, thus when communicating between each other they are using IP addresses from that private IP network. The IP address allocated to the user is in fact belonging to the external PDN addressing space, as it is used between the UE and the servers in the external network. eNB S-GW P-GW IP private IP IP IP IPIP IP IP address allocation IP private or public Figure 5-21 Tunnelling This means that on the interface which carries user data, user IP packets going to and from PDN have to be send inside other IP packets going between EPS nodes.
  • 16. LTE/EPS Technology 132 S-GW P-GW IP IPIPIP IP Figure 5-22 User IP packet encapsulation GTPGTPGTPGTP GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry user IP packets within GSM, UMTS and EPS networks. GTP can be decomposed into two separate protocols: GTP-C and GTP-U. GTPv2-C is used within the EPC for signalling between S-GW, P-GW, SGSN and SRVCC enhanced MSC server. This allows the EPC to activate a session on a user's behalf (EPS bearer), to deactivate the same session, to adjust QoS parameters, or to update a session for a subscriber changing S-GW or SGSN. Additionally, GTPv2-C is used to perform PS to CS handover between MME and SRVCC enhanced MSC (see Chapter 10 for more details). GTPv1-U is used for carrying user data within the EPC, between eNBs and S-GWs (S1 interface) and between neighbouring eNBs (X2 interface). UE is connected to an eNB without being aware of GTP. TunnelsTunnelsTunnelsTunnels GTP tunnels are used between two nodes communicating over a GTP based interface, to separate traffic into different communication flows. L1 L2 IP UDP GTP L1 L2 IP UDP GTP L1 L2 IP UDP GTP L1 L2 IP UDP GTP S1/S3/S4/S5/S8/ S10/S11/S12/Sv/X2 Figure 5-23 GTP protocol stack
  • 17. 5 Core Network 133 A GTP tunnel is identified in each node with a Tunnel Endpoint Identifier (TEID), an IP address and a UDP port number. The receiving end side of a GTP tunnel locally assigns the TEID value the transmitting side has to use. The TEID values are exchanged between tunnel endpoints using GTP-C, S1-MME or X2-eNB messages. eNB S-GW P-GW SGSNRNC GTP-U MME GTP-U GTP-U S1AP RANAP GTP-C GTP-CGTP-C eNB GTP-U GTP-U X2AP Figure 5-24 Tunnel control protocols TunnelTunnelTunnelTunnel establishmentestablishmentestablishmentestablishment The generic GTP-C/GTP-U tunnel establishment procedure is shown in Fig.-5-25. Node 1 Data Node 2 Create Tunnel Request ( ) Control Create Tunnel Response ( ) TEID & IP @ Node 1 for data TEID & IP @ Node 1 for signalling TEID & IP @ Node 2 for data TEID & IP @ Node 2 for signalling Figure 5-25 Generic tunnel establishment procedure
  • 18. LTE/EPS Technology 134 The node that is initiating the tunnel establishment sends to the terminating node the Create Tunnel Request message; the message among many other procedure specific parameters includes: • Tunnel Endpoint Identifier (TEID) for User Plane that specifies a TEID for GTP-U, chosen by the originating node. The terminating node includes this TEID in the GTP-U header of all subsequent GTP-U packets, send in the backward direction. • Tunnel Endpoint Identifier (TEID) for Control Plane that specifies a TEID for control plane message, chosen by the originating node. The terminating node includes this TEID in the GTP-C header of all subsequent GTP-C packets, send in the backward direction. Those packets can carry messages used to complete the tunnel establishment, modify the already existing tunnel or to release the existing tunnel, • Originating node’s IP address for User Plane, • Originating node’s IP address for Control Plane. The terminating node answers with the Create Tunnel Response message which contains: • Tunnel Endpoint Identifier (TEID) for User Plane that specifies a TEID for GTP-U, chosen by the terminating node. The originating node includes this TEID in the GTP-U header of all subsequent GTP-U packets, send in the forward direction. • Tunnel Endpoint Identifier (TEID) for Control Plane that specifies a TEID for control plane messages, chosen by the terminating node. The originating node includes this TEID in the GTP-C header of all subsequent GTP-C packets, sent in the forward direction. • Terminating node’s IP address for User Plane, • Terminating node’s IP address for Control Plane. From that moment the user communication context on one side of the tunnel is associated with the corresponding context on the other side of the tunnel. This association is kept thanks to allocation of flow specific pairs of IP addresses and TEIDs for both user data and control messages.
  • 19. 5 Core Network 135 DiameterDiameterDiameterDiameter Diameter is an AAA (Authentication, Authorisation and Accounting) protocol for applications such as network access or IP mobility. The basic concept is to provide a base protocol that can be extended in order to provide AAA services to new access technologies. Diameter is intended to work in both local and roaming AAA situations. Diameter sessions consist of exchange of commands and Attribute Value Pairs (AVPs) between authorised Diameter Clients and Servers. Some of the command values are used by the Diameter protocol itself, while others deliver data associated with particular applications that employ Diameter. The base protocol provides basic mechanisms for reliable transport, message delivery and error handling. It must be used along with a Diameter application. A Diameter application uses the services of base protocol in order to support a specific type of service. The Diameter Base Protocol defines basic and standard behaviour of Diameter nodes as well-defined state machines and also provides an extensible messaging mechanism that allows information exchange among Diameter Nodes. Diameter Applications augment the Base Protocol state machines with application-specific behaviour to provide new AAA capabilities. Diameter applicationsDiameter applicationsDiameter applicationsDiameter applications There are two kinds of applications: IETF standards track applications and vendor specific applications. The 3GPP Diameter application, relevant to EPS, are listed in Fig. 5-26. vPCRF ↔ hPCRFS916777267 MME/SGSN ↔ EIRS13/S13’16777252 MME ↔ HSSS6a16777251 PCRF ↔ PCEF (P-GW)Gx16777238 PCRF ↔ AFRx16777236 Nodes Application (interface) Application Identifier vPCRF ↔ hPCRFS916777267 MME/SGSN ↔ EIRS13/S13’16777252 MME ↔ HSSS6a16777251 PCRF ↔ PCEF (P-GW)Gx16777238 PCRF ↔ AFRx16777236 Nodes Application (interface) Application Identifier Figure 5-26 3GPP Diameter applications The Diameter peers are communicating with each other over transport connection provided by SCTP (SCTP association).
  • 20. LTE/EPS Technology 136 L1 L2 IP SCTP Diameter L1 L2 IP SCTP Diameter L1 L2 IP SCTP Diameter L1 L2 IP SCTP Diameter S6a/S13/S9/Rx/Gx Figure 5-27 Diameter protocol stack Proxy/Relay agentProxy/Relay agentProxy/Relay agentProxy/Relay agent The Diameter base protocol defines two types of Diameter agent, namely Diameter Relay agent and Diameter Proxy agent. Diameter Relay is a function specialised in message forwarding, i.e.: • A Relay agent does not inspect the actual contents of the message. • When a Relay agent receives a request, it will route messages to next- hop Diameter peer based on information found in the message e.g. application ID and destination address. Diameter Proxy includes the functions of Diameter Relay and additionally it can inspects the actual contents of the message to perform admission control, policy control, add special information elements handling. The use of Proxy and Relay agent is especially important in case of roaming scenarios to support scalability, resilience and maintainability and to reduce the export of network topologies. PCRF Proxy/ Relay Proxy/ Relay PCRF IMSI Update Location Request, Destination Realm: epc.mnc<MNC>.mcc<MCC>.3gppnetwork.org. User Name: IMSI GRX/IPX vPLMN hPLMN HSS MME MME MME HSS HSS Figure 5-28 Diameter Proxy/Relay agent Please, note that without usage of Diameter Proxy/Relay agents it would be necessary to provide a separate Diameter connection (SCTP association) between each MME of the VPLMN and each HSS of every possible HPLMN.
  • 21. 5 Core Network 137 QQQQualityualityualityuality ooooffff SSSServiceerviceerviceervice The EPS provides IP connectivity between a UE and a PLMN external packet data network. This is referred to as PDN Connectivity Service. The PDN Connectivity Service supports the transport of one or more Service Data Flows (SDFs). EPS bearerEPS bearerEPS bearerEPS bearer For E-UTRAN access to the EPC the PDN connectivity service is provided by an EPS bearer. An EPS bearer uniquely identifies an SDF aggregate between a UE and a P-GW. An EPS bearer is the level of granularity for bearer level QoS control in the EPC/E-UTRAN. That is, SDFs mapped to the same EPS bearer receive the same bearer level packet forwarding treatment (e.g. scheduling policy, queue management policy, rate shaping policy, RLC configuration, etc.). Providing different bearer level QoS to two SDFs thus requires that a separate EPS bearer is established for each SDF. eNB S-GW P-GW PDN EPS Bearer #1 (bearer QoS1) EPS Bearer #2 (bearer QoS2) Service Data Flow (PCC parameters) Figure 5-29 EPS bearer One EPS bearer is established when the UE connects to a PDN, and that remains established throughout the lifetime of the PDN connection to provide the UE with always-on IP connectivity to that PDN. That bearer is referred to as the default bearer. Any additional EPS bearer that is established to the same PDN is referred to as a dedicated bearer.
  • 22. LTE/EPS Technology 138 eNB S-GW P-GW PDN Dedicated Bearer (additional bearer, GBR or non-GBR) Default Bearer (created as a part of Attach proc., non-GBR) Figure 5-30 Default & dedicated bearer An UpLink/DownLink Traffic Flow Template (UL/DL TFT) is a set of UL/DL packet filters. Every EPS bearer is associated with an UL TFT in the UE and a DL TFT in the P-GW (i.e. PCEF). UE eNB S-GW P-GW PDN EPS Bearer #1 EPS Bearer #2 FiltersFilters Figure 5-31 Traffic Flow Template (TFT) The initial bearer level QoS parameter values of the default bearer are assigned by the network, based on subscription data (in case of E-UTRAN the MME sets those initial values based on subscription data retrieved from HSS). The PCEF may change those values based in interaction with the PCRF or based on local configuration. The decision to establish or modify a dedicated bearer can only be taken by the EPC, and the bearer level QoS parameter values are always assigned by the EPC. Therefore, the MME does not modify the bearer level QoS parameter values received on the S11 reference point during establishment or modification of a dedicated bearer. Instead, the MME only transparently forwards those values to the E-UTRAN. Consequently, ‘QoS negotiation’ between the E-UTRAN and the EPC during dedicated bearer establishment / modification is not supported. The MME may, however, reject the establishment or modification of a dedicated bearer (e.g. in case the bearer level QoS parameter values sent by the PCEF over an S8 roaming interface do not comply with a roaming agreement).
  • 23. 5 Core Network 139 eNB S-GW P-GW Bearer establishment direction no QoS negotiation PCRF AF ‘Bearer establishment trigger’ Figure 5-32 Bearer establishment direction An EPS bearer is referred to as a GBR bearer if dedicated network resources related to a Guaranteed Bit Rate (GBR) value that is associated with the EPS bearer are permanently allocated (e.g. by an admission control function in the eNB) at bearer establishment/modification. Otherwise, an EPS bearer is referred to as a Non-GBR bearer. A dedicated bearer can either be a GBR or a Non-GBR bearer. A default bearer is a Non-GBR bearer. An EPS bearer is realised by the following elements: • An UL TFT in the UE maps an SDF to an EPS bearer in the UL direction. Multiple SDFs can be multiplexed onto the same EPS bearer by including multiple UL packet filters in the UL TFT; • A DL TFT in the P-GW maps an SDF to an EPS bearer in the DL direction. Multiple SDFs can be multiplexed onto the same EPS bearer by including multiple DL packet filters in the DL TFT; • A radio bearer transports the packets of an EPS bearer between a UE and an eNB. There is a one-to-one mapping between an EPS bearer and a radio bearer; • An S1 bearer transports the packets of an EPS bearer between an eNB and a S-GW; • An S5/S8 bearer transports the packets of an EPS bearer between a S-GW and a P-GW; • A UE stores a mapping between an UL packet filter and a radio bearer to create the mapping between an SDF and a radio bearer in the UL; • A P-GW stores a mapping between a DL packet filter and an S5/S8 bearer to create the mapping between an SDF and an S5/S8 bearer in the DL;
  • 24. LTE/EPS Technology 140 • An eNB stores a one-to-one mapping between a radio bearer and an S1 to create the mapping between a radio bearer and an S1 bearer in both the UL and DL; • A S-GW stores a one-to-one mapping between an S1 bearer and an S5/S8 bearer to create the mapping between an S1 bearer and an S5/S8 bearer in both the UL and DL. QoS parametersQoS parametersQoS parametersQoS parameters The bearer level (i.e. per bearer or per bearer aggregate) QoS parameters are QCI, ARP, GBR, MBR, and AMBR described in this section. Each EPS bearer (GBR and Non-GBR) is associated with the following bearer level QoS parameters: • QoS Class Identifier (QCI); • Allocation and Retention Priority (ARP). A QCI is a scalar that is used as a reference to access node-specific parameters that control bearer level packet forwarding treatment (e.g. scheduling weights, admission thresholds, queue management thresholds, link layer protocol configuration, etc.), and that have been pre-configured by the operator owning the access node (e.g. eNB). The primary purpose of ARP is to decide whether a bearer establishment / modification request can be accepted or needs to be rejected in case of resource limitations (typically available radio capacity in case of GBR bearers). In addition, the ARP can be used (e.g. by the eNB) to decide which bearer(s) to drop during exceptional resource limitations (e.g. at handover). Once successfully established, a bearer's ARP has no any impact on the bearer level packet forwarding treatment (e.g. scheduling and rate control). Such packet forwarding treatment should be solely determined by the other bearer level QoS parameters: QCI, GBR, MBR, and AMBR. Video telephony is one use case where it may be beneficial to use EPS bearers with different ARP values for the same UE. In this use case an operator could map voice to one bearer with a higher ARP, and video to another bearer with a lower ARP. In a congestion situation (e.g. cell edge) the eNB can then drop the ‘video bearer’ without affecting the ’voice bearer’. This would improve service continuity.
  • 25. 5 Core Network 141 Each GBR bearer is additionally associated with the following bearer level QoS parameters: • Guaranteed Bit Rate (GBR); • Maximum Bit Rate (MBR). The GBR denotes the bit rate that can be expected to be provided by a GBR bearer. The MBR limits the bit rate that can be expected to be provided by a GBR bearer (e.g. excess traffic may get discarded by a rate shaping function). Each APN is associated with the ‘per APN Aggregate Maximum Bit Rate (APN-AMBR)’ IP-CAN session level QoS parameter. The APN-AMBR is a subscription parameter stored per APN in the HSS. It limits the aggregate bit rate that can be expected to be provided across all Non-GBR bearers and across all PDN connections of the same APN (e.g. excess traffic may get discarded by a rate shaping function). Each of those Non-GBR bearers could potentially utilise the entire APN-AMBR, e.g. when the other Non-GBR bearers do not carry any traffic. GBR bearers are outside the scope of APN-AMBR. The P-GW enforces the APN-AMBR in downlink. Enforcement of APN-AMBR in uplink is done in the UE and additionally in the P-GW. Each UE is associated with the ‘per UE Aggregate Maximum Bit Rate (UE-AMBR)’ bearer level QoS parameter. The UE-AMBR is limited by a subscription parameter stored in the HSS. The MME sets the used UE-AMBR to the sum of the APN-AMBR of all active APNs up to the value of the subscribed UE-AMBR. The UE-AMBR limits the aggregate bit rate that can be expected to be provided across all Non-GBR bearers of a UE (e.g. excess traffic may get discarded by a rate shaping function). Each of those Non-GBR bearers could potentially utilise the entire UE-AMBR, e.g. when the other Non-GBR bearers do not carry any traffic. GBR bearers are outside the scope of UE-AMBR. The E-UTRAN enforces the UE-AMBR in uplink and downlink. The GBR and MBR denote bit rates of traffic per bearer while UE-AMBR/ APN-AMBR denote bit rates of traffic per group of bearers. Each of those QoS parameters has an uplink and a downlink component. On S1_MME the values of the GBR, MBR, and AMBR refer to the bit stream excluding the GTP-U/IP header overhead of the tunnel on S1_U. One 'EPS subscribed QoS profile' is defined for each APN permitted for the subscriber. It contains the bearer level QoS parameter values for that APN's default bearer (QCI and ARP) and the APN-AMBR.
  • 26. LTE/EPS Technology 142 EPS bearer GBR bearer non-GBR bearer QCI ARP GBR MBR UE-AMBR APN-AMBR Figure 5-33 EPS bearer related QoS parameters Mapping betweenMapping betweenMapping betweenMapping between QQQQCCCCI and UMTS QoS parametersI and UMTS QoS parametersI and UMTS QoS parametersI and UMTS QoS parameters A recommended mapping for QoS Class Identifier to/from UMTS QoS parameters is shown in Fig. 5-34. ---background9 -no3interactive8 -no2interactive7 -no1interactive6 -yes1interactive5 unknown--streaming4 speech--streaming3 unknown--conversational2 speech--conversational1 source statistics descriptor signalling indication THPtraffic class UMTS QoS parameters QCI ---background9 -no3interactive8 -no2interactive7 -no1interactive6 -yes1interactive5 unknown--streaming4 speech--streaming3 unknown--conversational2 speech--conversational1 source statistics descriptor signalling indication THPtraffic class UMTS QoS parameters QCI Figure 5-34 QCI to UMTS QoS parameters mapping