IS
EPS Introduction
NAS Protocols
S1AP
GTP
EPS Mobility
Diameter
PCC
Security
10
Interworking with
GERAN/UTRAN
11
12
13
14
Foldouts
15
AP
I
EPC Signalling
AP
IS
The use of a term in this document should not be interpreted in a manner that would affect the
validity or legal status of any proprietary rights that may be attached to that term.
This is a training document and as such simplifies what are often highly complex
technological issues. The system or systems described here should therefore be seen in that
light, i. E. as simplifications rather than generalizations.
Due to ongoing progress in methodology, design, its contents are furthermore subject to
revision without prior notice.
Apis Technical Training AB assumes no legal responsibility for any error or damage resulting
from the use of this document.
Copyright Apis Technical Training AB 2013. All rights are reserved.
This training material is the confidential and proprietary property of Apis Technical Training
AB. It is to be used solely for the purpose for which it was produced and is not to be copied or
otherwise reproduced without the prior written permission of Apis Technical Training AB.
To our best knowledge, the information in this document is accurate as per
the date of publication.
Other than by prior written agreement, Apis Technical Training AB will not update or
otherwise advise of errors in the document which may be brought to our attention.
All trademarks are trademarks of their respective owners.
Apis Technical Training AB. welcomes customer feedback as part of a process of ongoing
development of our documentation in order to better meet our customers' needs. Please
submit your comments to our Head Office in Stockholm.
AP
I
AP
IS
EPS Introduction
BACKGROUND .................................................................................. 1-2
1.1.1
1.1.2
1.2
1.2.1
1.2.2
1.2.3
1.3
1.3.1
1.3.2
1.4
1.4.1
1.4.2
1.4.3
1.5
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-1
AP
I
1.1
AP
IS
1.1
Background
1.1.1
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-2
AP
I
The EPC is a fully IP-based core network (all-IP) supporting access not only via
GERAN, UTRAN and E-UTRAN but also via WiFi, WiMAX and wired technologies
such as xDSL. The SAE project is also a part of 3GPP Release 8 with
additions/developments in later releases.
1.1.2
AP
IS
Evolved UTRA & E-UTRAN
1.2.1
Network Architecture
Uu
S 1 -M M E
X 2 -C
S6a
MME
eN B
X 2 -U
HSS
S11
PCRF
Gx
Uu
S 1 -U
eN B
E -U T R A
S5
SGW
E -U T R A N
Rx
SG i
PGW
IM S /In te rn e t/
EPC
At the onset of the LTE project a series of requirement targets relating to performance,
complexity and interworking were defined. Some of these are listed below:
Peak data rate: at least 100 Mb/s DL and 50 Mb/s UL (assuming 20 MHz
system bandwidth). Benchmarking targets for data rates is set to 3-4 times those
of HSPA as of R6 (5 MHz bandwidth).
Control Plane (CP) latency: transition time less than 100 ms from an idle state
to an active state, and less than 50 ms between a dormant state (such as R6
CELL_PCH) and an active state.
User Plane (UP) latency: less than 5 ms in unloaded condition (single user with
single data stream) for small IP packet.
CP capacity: at least 200 users per cell should be supported in the active state (5
MHz system bandwidth).
Mobility: E-UTRAN should be optimized for low mobile speed (0-15 km/h) and
higher speeds (15-120 km/h) should be supported with high performance.
Mobility shall be maintained between 120-350 km/h (up to 500 km/h depending
on the frequency band).
Coverage: the throughput and mobility targets above should be met for 5 km
cells with a slight degradation for 30 km cells. Cells range up to 100 km should
be possible.
Spectrum flexibility: E-UTRA shall operate in different spectrum allocations of
different sizes, including 1.4, 3, 5, 10, 15 and 20 MHz in both UL and DL.
Operation in paired (FDD) and unpaired (TDD) spectrum shall be supported.
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-3
Requirements on E-UTRA/E-UTRAN
AP
I
1.2.2
1.2
AP
IS
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-4
AP
I
The LTE physical layer specifications are written in such a way that it does not really
matter on what physical carrier frequency the system is deployed. The LTE frequency
bands in 3GPP Release 11 are listed in the table below.
1.2.3
AP
IS
E-UTRA band
Uplink (MHz)
Downlink (MHz)
Mode
1
2
3
4
5
61
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
...
23
24
25
...
33
34
35
36
37
38
39
40
41
42
43
1920 1980
1850 - 1910
1710 - 1785
1710 - 1755
824 - 849
830 - 840
2500 - 2570
880 - 915
1749.9 1784.9
1710 - 1770
1427.9 1447.9
699 - 716
777 - 787
788 - 798
Reserved
Reserved
704 -716
815 830
830 845
832 -862
1447.9 1462.9
2110 2170
1930 - 1990
1805 - 1880
2110 - 2155
869 - 894
875 -885
2620 - 2690
925 - 960
1844.9 1879.9
2110 - 2170
1475.9 - 1495.9
729 746
746 -756
758 -768
Reserved
Reserved
734 -746
860 -875
875 -890
791 -821
1495.9 -1510.9
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
FDD
2000 -2020
1626.5 1660.5
1850 -1915
2180 -2200
1525 1559
1930 -1995
FDD
FDD
FDD
1900 1920
2010 -2025
1850 -1910
1930 - 1990
1910 -1930
2570 -2620
1880 - 1920
2300 - 2400
2496 2690
3400 3600
3600 - 3800
1900 1920
2010 - 2025
1850 - 1910
1930 - 1990
1910 - 1930
2570 - 2620
1880 - 1920
2300 - 2400
2496 2690
3400 - 3600
3600 - 3800
TDD
TDD
TDD
TDD
TDD
TDD
TDD
TDD
TDD
TDD
TDD
No te 1 : Ban d 6 i s no t a pp li ca bl e
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-5
AP
I
(A common misunderstanding is that OFDM, by itself, makes very high bit rates possible.
This is not true. Rather, the very high bit rates mentioned for E-UTRA are made possible
first and foremost by a higher transmission bandwidth (up to 20MHz), higher order
modulation (64QAM) and the support for MIMO with up to four antennas).
AP
IS
The channel and protocol architecture for E-UTRAN layer 2 and layer 3 is quite similar to
the one used in UTRAN today. For example, the UE protocol stack is almost identical and
the channel hierarchy is still divided into logical, transport and physical channels.
1.3
1.3.1
Network Architecture
UTRAN
Iu -P S
SGSN
G b /Iu
GERAN
Gr
S3
HSS
S4
S12
SPR
S6a
OCS
S 1 -M M E
MME
S 1 -U
S10
Gy
O FCS
S11
Gz
X 2 -C
E -U T R A N
Sp
PCRF
Gx
Rx
SGi
S5
SGW
IM S / In te rn e t /
PGW
X 2 -U
S2b
T ru ste d
IP a cce ss
S6b
S2a
ePDG
SW m
HSS/
AAA
SW n
N o n -tru ste d
IP a cce ss
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-6
AP
I
Additional network nodes/functions, some shown in the figure above, may be present as
well. For example, an evolved Packet Data Gateway (ePDG) is needed for non-trusted IP
access and a Policy and Charging Rules Function (PCRF) is required for IMS controlled
The Home Subscriber Server (HSS) holds subscription profiles and security related
parameters. Additional subscription/security databases may also be present, such as the
Subscription Profile Repository (SPR) and the 'triple-A' server (AAA, short for
Authentication, Authorization and Accounting).
AP
IS
QoS and charging mechanisms. For the purpose of charging there is typically also the
Online Charging System (OCS) and/or Offline Charging System (OFCS).
1.3.2
1.4
1.4.1
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-7
AP
I
The PDN Connection Setup Procedure is coordinated with Network Attach. In this
procedure, the UE gets an IP-address from the PGW and the first EPS Bearer is setup to
allow the UE to send and receive IP-packets. In EPS, the Attach and PDN Connection
Setup procedure are always coordinated! This is in contrast to how things are dome in
GPRS/UMTS, where Attach and PDP Context Activation is defined as two separate,
independent procedures.
AP
IS
EPS Bearers
The connection or path or pipe that allows a UE to send and receive IP-packets is
called an EPS Bearer. The first EPS Bearer that is set up between a UE and a PDN is
called the Default EPS Bearer. The Default EPS Bearer has a QoS-profile which is part
of the subscriber data. However, the Default EPS Bearer never has a Guaranteed Bit Rate
(GBR), which from a bit rate point of view the Default Bearer is best-effort. The
Default Bearer is used for IP-Connectivity between the UE and the external PDN. The
Default Bearer remains until the UE de-registers from the network and the PDN
Connection is released.
For services that require a Guaranteed Bit Rate, or in some other way a different QoSprofile, additional bearers need to be setup. They are referred to as Dedicated EPS
Bearers. A Dedicated Bearer is set up for some specific purpose e.g. an IP-TV session or
VoIP-call. When the Dedicated Bearer is not needed anymore, it is released.
1.4.3
References
GPRS enhancements for Long Term Evolution (LTE)
3GPP SAE: Architecture enhancements for non-3GPP accesses
E-UTRA/E-UTRAN; overall description; Stage 2
Policy and Charging Control architecture
23.401
23.402
36.300
23.203
EPS Overview
Copyright Apis Technical Training AB 2013. All rights reserved.
1-8
AP
I
1.5
1.4.2
AP
IS
NAS Protocols
NAS INTRODUCTION ......................................................................... 2-2
2.1.1
2.1.2
2.2
2.2.1
2.2.2
2.2.3
2.4
2.3
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-1
AP
I
2.1
AP
IS
2.1
NAS Introduction
UE
MME
NAS
NAS
eNB
RRC
RRC
PDCP
PDCP
R LC
R LC
MAC
PHY
Uu
S1AP
S1AP
SCTP
SCTP
MAC
IP
IP
PHY
L 1 /L 2
L 1 /L 2
S 1 -M M E
2.1.1
NAS Functionality
The Non Access Stratum (NAS) protocols are used for signalling between the UE and the
Mobility Management Entity (MME) in the EPC. The term Non Access refers to the fact
that NAS signalling has nothing to do with radio access network specific matters, e.g.
radio resources. As can be seen in the figure above, all NAS signalling exchange takes
place transparently through the radio access network (i.e. the eNB will never read and
interpret these messages).
The NAS layer sits on top of the RRC layer in the UE and the S1AP layer in the MME.
All NAS messages are therefore carried inside, or sent concatenated with, RRC and S1AP
messages when transmitted over the radio interface and S1-MME interface respectively.
In EPS, there are only two NAS protocols defined: the EPS Mobility Management
protocol (EMM) and the EPS Session Management protocol (ESM). The EMM protocol
handles signalling related to UE mobility and various security procedures. The ESM
protocol handles signalling related to management of default and dedicated bearers for
transport of user data.
The functionality of both protocols is similar to the corresponding GSM/UMTS NAS
protocols. The EMM protocol is modelled on the GPRS Mobility Management protocol
(GMM) and the ESM protocol is modelled on the Session Management protocol (SM).
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-2
AP
I
The NAS layer makes use of so-called Tracking Areas (TA) for mobility management
purposes. The concept of a Tracking Area is in principle the same as the GSM/UMTS
concept of a Routing Area (or Location Area). Hence, the TA is an operator defined
group of cells that all belong to the area served by one MME. One or more TA may be
handled by each MME. The MME is aware of the location of an attached UE on TA-level
through the TA Update procedure. The TA is typically, but not necessarily, the area inside
which the UE is paged for incoming calls/data.
2.1.2
AP
IS
2.2
2.2.1
EMM Procedures
The EMM procedures are divided into three groups:
Common
Specific
Connection Management
The Common procedures relate to security functions and are listed below.
Authentication: user (USIM) authentication and NAS key agreement. The
procedure uses EPS Authentication Vectors (similar to UMTS quintets).
Security Mode Control (SMC): initiation of and control of the NAS
ciphering and integrity protection functions.
GUTI Re-allocation: provision of a new GUTI to the UE.
Identification: allows the MME to request either IMSI or IMEI from the
UE when needed.
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-3
AP
I
AP
IS
ESM Procedures
The ESM procedures are divided into two groups: Network Initated procedures and UE
Initiated procedures. The Network Initiated procedures are used for establishment,
modification or release of default or dedicated EPS bearers and are listed below.
Default EPS Bearer Context Activation: provides the UE with basic IPconnectivity (a default bearer) to a given external Packet Data Network
(PDN). The first default bearer is always established in conjunction with
the Attach procedure. Subsequent default bearers, to other PDNs, are
established when needed.
Dedicated EPS Bearer Context Activation: provides the UE with a bearer
associated with a certain specified QoS (Quality of Service) which is
typically higher than QoS for the default bearer.
EPS Bearer Context Modification: used by the network to modify a given
bearer.
EPS Bearer Context Deactivation: used by the network to release a given
dedicated or default bearer. To release a default bearer is the same as to
disconnect from the associated PDN. When the last default bearer is
released the UE enters the detached state.
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-4
AP
I
The UE Initiated procedures are used for establishment, modification or release of default
or dedicated EPS bearers.
2.2.2
AP
IS
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-5
AP
I
NAS states
2.2.3
AP
IS
The ESM states are quite straightforward: when at least one (default) bearer is established
the UE is in the ESM Active state, otherwise it is in the ESM Inactive state. The ESM
signalling needed to establish a bearer requires that the UE is properly registered in the
network. It therefore naturally follows that the UE must be in the EMM Registered state
whenever it is ESM Active.
It also follows that there must be a NAS Signalling Connection present during the ESM
signalling phase when a bearer is being established, i.e. the UE is then ECM Connected.
However, there is no requirement to keep the NAS Signalling Connection active for the
lifetime of an EPS bearer. Hence, the UE may very well be ECM Idle while being ESM
Active. This makes sense, since the UE may be continuously attached for days, weeks or
even months. All the time a default bearer will be active, but there may be long silent
periods with no NAS signalling and user data transfer.
The NAS states (MME related states) are aligned with the RRC states in E-UTRAN. A
UE in RRC Idle state is, from the MMEs point of view, in the NAS state ECM Idle.
Paging or a request from higher layers to transmit uplink data or signalling will cause a
transition from RRC Idle to RRC Connected, causing also a transition from ECM Idle to
ECM Connected. This is however not shown in figure above.
S e c u rity H e a d e r T y p e
E S M M essage
3
P ro to c o l D is c rim in a to r
E P S B e a re r Id
M essage Type
P ro to c o l D is c rim in a to r
P ro c e d u re T ra n s a c tio n Id
M essage Type
O th e r In fo rm a tio n E lem e n ts
(M a n d /O p t/C o n d )
O th e r In fo rm a tio n E lem e n ts
(M a n d /O p t/C o n d )
S ecurity H eader
8
S e c u rity H e a d e r T y p e
P ro to c o l D is c rim in a to r
M essage
A u th e n tic a tio n
C o d e (4 o ct)
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-6
AP
I
N A S Sequence N um ber
2.3
AP
IS
Protocol Discriminator (PD). The PD identifies the NAS protocol (EMM or ESM) to
which the message belongs. The PD is defined in TS 24.007 and shares the same value
space as the GSM/UMTS NAS protocols.
Security Header Type (SHT). The SHT indicates the presence or not of a security header,
i.e. whether the message is security protected or not.
Message Type (MT). The MT identifies a message (e.g. 'Attach Request').
EPS Bearer Id (EBI). The EBI field specifies the EPS bearer to which the message
pertains. Implicitly it also specifies the specific ESM protocol instance to which the
message is addressed (there is one ESM protocol entity active per EPS bearer).
Procedure Transaction Id (PTI). The PTI allows distinguishing between different
parallel bi-directional ESM message flows (or 'transactions'). The PTI also links a
'request' message with its 'response' message for a given transaction.
Message Authentication Code (MAC). The MAC field is the output from the NAS
integrity protection algorithm and is used in the receiver for checking the integrity of the
message.
NAS Sequence Number (SN). The SN field is used as input to the NAS ciphering and
integrity protection algorithms.
References
GPRS enhancements for E-UTRAN
Mobile radio interface layer 3; general aspects
Non-Access Stratum (NAS) protocol for EPS
3GPP System Architecture Evolution: security architecture
NAS Protocols
Copyright Apis Technical Training AB 2013. All rights reserved.
2-7
AP
I
23.401
24.007
24.301
33.401
2.4
AP
IS
S1AP S1 Application
Protocol
S1AP INTRODUCTION ....................................................................... 3-2
3.2
3.3
3.4
3.5
S1AP
Copyright Apis Technical Training AB 2013. All rights reserved.
3-1
AP
I
3.1
AP
IS
3.1
S1AP Introduction
The S1-interface connects E-UTRAN (eNBs) with the EPC. The S1-interface is an IPbased interface and can therefore be seen as a point to multi-point interface. The Control
Plane (CP) instance of the S1-interface (S1-MME) uses the S1 Application Protocol
(S1AP) for control signalling purposes between the eNB and the MME. The S1AP
protocol runs on top of the Stream Control Transmission Protocol (SCTP).
For more clarity, the figure below also shows the GPRS Tunnelling Protocol (GTP) The
User Plane (UP) instance of the S1-interface (S1-U) uses GTP User plane (GTP-U) for
user data tunnelling. The termination point on the EPC side for S1-U is the Serving
Gateway, SGW.
eNB
MME
SGW
S1A P
S1A P
G T P -C
G T P -C
SCTP
SCTP
UDP
UDP
IP
IP
IP
IP
L 1 /L 2
L 1 /L 2
L 1 /L 2
L 1 /L 2
S 1 -M M E
S11
eNB
SGW
G T P -U
G T P -U
UDP
UDP
IP
IP
L 1 /L 2
L 1 /L 2
S 1 -U
The S11-interface is, like the S1-interface, an IP-based point to multi-point interface. The
S11-interface is used for signalling between the MME and the SGW and does not have a
UP instance. The S11-interface uses GTP Control plane (GTP-C) for control signalling
purposes. For more about GTP refer to chapter 4.
S1AP
Copyright Apis Technical Training AB 2013. All rights reserved.
3-2
AP
I
The EPS is an all-IP network. This means not only that services are IP-based, but also that
all nodes have IP-addresses and are connected via IP transport. This means that (in
principle) everything is connected to everything else.
3.2
AP
IS
Between an eNB and an MME that are configured to work together there is a so called
S1-MME Connection. This can be viewed as a logical link that allow the eNB and
MME to exchange S1AP signalling. The S1-MME connection is configured, i.e. set up
manually or by the nodes themselves (in case of Self Organizing Networks, SON).
All UE associated signalling takes place over a logical S1 Connection. The UE-specific
S1 Connection is identified in each node with an S1AP UE Identifier. Thus, all S1AP
messages pertaining to a specific UE will carry two reference numbers: the S1AP UE Id
selected by the eNB and the S1AP UE Id selected by the MME. One such pair of
reference numbers uniquely identifies a UE context in a node.
S1AP Procedures
In the S1AP Specification (36.413) the S1 procedures are divided into the following
groups:
E-RAB management
Context management
Handover Signalling
Paging
NAS transport
Node management
CDMA 2000 tunneling
UE Capability information
Trace procedures
Location Reporting
Warning Message transmission
eNB direct information transfer
MME direct information transfer
eNB configuration transfer
MME configuration transfer
LPPa transport
The text below describes some selected fundamental procedures. For a full description,
refer to 36.413.
S1AP
Copyright Apis Technical Training AB 2013. All rights reserved.
3-3
AP
I
3.3
AP
IS
procedure may be initiated from the MME (e.g. due to completed NAS signalling
transaction) or from the eNB (due to handover, timer expiry or other radio related reason).
Handover Procedures
Handover preparation and execution signalling over the S1-interface is only needed
during inter-RAT handover or when there is no X2-interface present between the Source
eNB and the Target eNB.
For a normal X2-interface initiated inter-eNB handover a S1AP Handover Notification
message is sent from the Target eNB to the MME after the UE has been successfully
handed over to the new cell.
Paging
Enables the MME to page a UE in the radio network. The MME initiates the paging
procedure by sending a Paging message to each eNB with cells belonging to the Tracking
Area(s) in which the UE is registered. The paging response back to the MME is initiated
on the NAS layer and is forwarded to MME by the eNB as part of the NAS Signalling
Transport procedure.
S1AP
Copyright Apis Technical Training AB 2013. All rights reserved.
3-4
AP
I
SCTP makes use of so-called Stream Identifiers to identify a logical signalling connection
(stream) between two network nodes. A single SCTP association per S1-MME interface
instance is used, with different pairs of Stream Identifiers for S1-MME non-UE
associated and UE associated procedures.
3.4
AP
IS
An SCTP PDU consists of a header and one or more 'chunk' fields. The payload is either
higher layer information (an S1AP message in this case) or SCTP layer control
information. The chunk type 'DATA' is used for transport of higher layer information.
G eneral S C TP P D U Form at
0
0
1
1
2
1
S o u rce P o rt
D e stin a tio n P o rt
Set per
a sso cia tio n
a t In itia lisa tio n
C om m on H eader
V e rifica tio n T a g
(1 2 b yte s)
C h e cksu m
C hunk H eader
C h u n k T yp e
(4 b yte s)
C h u n k F la g s
C h u n k V a lu e s
C h u n k L e n g th
P a ylo a d o r C o n tro l
(v a ria b le )
The D A TA C hunk
0
0
1
1
T yp e = D A T A
2
1
R e se rv e d
U B E
C h u n k L e n g th
T ra n sp o rt S e q u e n ce N u m b er
S tre a m Id e n tifie r
S tre a m S e q u e n ce N u m b e r (o p t)
P a ylo a d P ro to co l Id
R e g iste re d
w ith IA N A
D A T A , p o ssib ly se g m e n te d
(e .g . X 2 A P o r S 1 A P m e ssa g e )
References
GPRS enhancements for E-UTRAN access
E-UTRA S1 Application Protocol (S1AP) specification
An introduction to SCTP
SCTP
S1AP
Copyright Apis Technical Training AB 2013. All rights reserved.
3-5
AP
I
23.401
36.413
RFC 3286
RFC 4960
3.5
AP
IS
4.2
4.2.1
General..................................................................................... 4-2
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.2.7
4.3.1
4.3.2
4.4
AP
I
4.3
AP
IS
4.1
Introduction
The GPRS Tunnelling Protocol (GTP) is used extensively on several interfaces in the
EPC e.g. on S11 between MME and SGW and S5/S8 between SGW and PGW. GTP is
also used on S1-U between eNB and SGW.
GTP can be seen as a combination of two protocols; GTP-C (as in Control Plane) and
GTP-U (us in User Plane). GTP-U is used for tunnelling of user data, while GTP-C is
used e.g. for setting up and releasing those tunnels.
4.2
4.2.1
General
The GTP protocol used in EPS is quite similar to the legacy GTP protocol in use already
since the introduction of GPRS in Release 97.
For EPC, GTP version 2 is specified for the control plane (GTPv2-C) in 3GPP TS 29.274.
The specification for GTP-U is 29.281.
The main task of the GTP-U protocol is encapsulation and tunnelling of user data packets
between network nodes. In E-UTRAN it is used on the S1-interface (and the X2-interface
between eNBs). In EPC it is used on e.g. S5/S8 (SGW-PGW) and on S4 between SGW
and SGSN.
Each user data IP-packet is encapsulated and a GTP header is added. The header contains,
among other things, a Tunnel Endpoint Identifier (TEID). The TEID is a locally allocated
reference number that uniquely identifies a GTP tunnel in the node that allocated it. Thus,
a GTP tunnel has two TEIDs associated with it (one in each end).
The GTP-C protocol is used several different EPC interfaces. The exact set of GTP-C
procedures in use is therefore interface-dependent.
The GTPv2-C specification does not divide GTP functions so much into 'procedures' as
into 'scenarios'. For example, the specific GTP-C message (and thus also procedure) to
use for releasing an EPS bearer in the SGW will be different depending on whether the
release was UE initiated or eNB/MME initiated. A consequence of this is that there are
several GTP-C messages/procedures that achieve, more or less, the same thing.
For ease of reading the following descriptions therefore do not include all scenarios that
will trigger a given GTP procedure. Instead, for more detailed information the reader is
encouraged to consult the specification 29.274.
4.2.2
AP
I
The S11-interface is, like the S1-interface, an IP-based point to multi-point interface. The
S11-interface is used for signalling between MME and SGW and does not have a UP
instance. The S11-interface uses GTP-C for control signalling purposes.
4.2.3
AP
IS
In the following section, selected GTP-C procedures relevant for the S11-interface are
described.
Create Session. This procedure is initiated from the MME towards the SGW when the
UE requests activation of a Default EPS Bearer due to initial Attach or when the SGW
changes due to the UE performing a TA Update.
Create Bearer. This procedure is initiated from the SGW towards the MME due to
network initiated establishment of a Dedicated EPS Bearer.
Allocate Bearer Resource. This procedure is initiated from the MME towards the SGW
due to UE initiated establishment of a Dedicated EPS Bearer.
Modify Bearer. This procedure is initiated from the MME towards the SGW when a
Dedicated EPS Bearer needs to be released due to network initiated S1 Release, or
modified due to the UE performing TA Update that does not trigger change of SGW.
Delete Session. This procedure is initiated from the MME towards the SGW due to UE
initiated release of a Default EPS Bearer.
Release TFT Filter. This procedure is initiated from the MME towards the SGW due to
UE initiated release of a Dedicated EPS bearer.
Update User Plane. This procedure is initiated from the MME towards the SGW when a
GTP tunnel needs to be modified (moved from one eNB to another) as a result of
handover.
Downlink Data Notification. This procedure is initiated from the SGW towards the MME
in order to trigger paging for an incoming call/session.
Echo. A GTP-C entity (within eNB, SGW, MME or other node) may send an Echo
Request to find out if the peer GTP entity is 'alive'. The peer entity shall respond with an
Echo Response message. This procedure is relevant for both GTP-C and GTP-U.
AP
I
Delete Bearer. This procedure is initiated from the PGW towards the SGW e.g. due to
PGW initiated release of a Dedicated EPS Bearer.
4.2.4
AP
IS
S10 (MME-MME), S3 (MME-SGSN)
GTP-C is used for some mobility related procedures on the S10 and S3 interfaces
between MMEs and SGSNs, e.g.
Forward Relocation. Initiated from the old (source) MME/SGSN in order to move UE
context to a new (target) MME/SGSN in a handover scenario.
Context Transfer. This procedure is initiated from a target MME/SGSN in order to
transfer UE context from a source MME/SGSN in an inter-RAT Routing Area or
Tracking Area Update scenario.
Identification. Initiated from a target MME/SGSN in order to to transfer the IMSI
identity of a UE from a source MME/SGSN (in case the UE has identified itself to the
target node with a GUTI identity.
4.2.6
S4 Interface: SGW-SGSN
The S4 Interface between SGW and SGSN makes use of both GTP-C and GTP-U.
The S4 Interface is generally used for mobility between E-UTRAN and UTRAN. The
procedures described above for the other GTP based interfaces are generally used also on
S4. It should be noted that for mobility between E-UTRAN and UTRAN, translation
from EPS concepts (such as bearers) to legacy concepts (such as PDP Contexts) are
required.
V e rsio n
FFS
FFS
M e ssa g e T yp e
M a n d a to ry H e a d e r
(G T P -C a n d G T P -U )
M e ssa g e L e n g th
e xc l m a n d a to ry h e a d e r (2 o c t)
T u n n e l E n d p o in t
Id e n tifie r, T E ID
A ll m e ssa g e s, e xce p t
E ch o R e q /R e sp a n d
V e rsio n N o t S u p p o rte d
(4 o c t)
S e q u e n ce N u m b e r
(2 o c t)
A ll G T P -C m e ssa g e s
S p a re O cte ts
(2 o c t)
CR
R 8 e xte n sio n : P D C P
se q u e n ce n u m b e r
S p a re
E x te n sio n H e a d e r T yp e
NEH
E x te n sio n H e a d e r L e n g th
E x te n sio n V a lu e (s)
P a d d in g if n e e d e d
(n x 4 o c t)
The length of a GTP version 2 header is always a multiple of 4 octets, containing at least
the mandatory part shown in the figure above. The usage of the different fields is
described below:
GTP GPRS Tunneling Protocol
Copyright Apis Technical Training AB 2013. All rights reserved.
4-4
AP
I
4.2.7
4.2.5
AP
IS
4.3
4.3.1
AP
I
There are different ways of establishing Dedicated Bearers: UE initiated, EPC initiated
and IMS/PCC initiated bearer establishment. These different mechanisms can all be
realised with a limited number of signalling procedures or, rather, blocks of procedures.
AP
IS
AP
I
There are more cases possible but the point here is that we can, with a limited number of
carefully defined procedures, allow a large number of scenarios to be realised.
Assume that the UE is the entity that initiates the SIP signalling ('MO case'). If the UE is
in idle mode it must start with a Service Request, so that we can send the first outgoing
SIP packet over a security-protected connection. The sequence then becomes B, C and E.
AP
IS
QoS Parameters
The EPS QoS architecture has, from a parameter point of view, been substantially
simplified as compared to GPRS/UMTS. As already mentioned, there are only two types
of bearers: Default Bearers and Dedicated Bearers. Furthermore, an EPS bearer either has
a guaranteed bit rate (GBR) or it has not.
A Default Bearer is always a non-GBR bearer. HSS contains the QoS profile for the
Default Bearers. Subscriber data in HSS also includes a maximum aggregate bit rate for
all non-GBR bearers for a UE (UE-AMBR) or for a UE per PDN (APN-AMBR). These
aggregate bit rates cannot be changed or overridden by the EPC.
A Dedicated Bearer can be a GBR or a non-GBR bearer. The EPC, or the PCC
framework, may also assign a (variable) Maximum Bit Rate (MBR) for each Dedicated
Bearer. The MBR may, or may not, be part of the subscription profile stored in the HSS.
Both Default and Dedicated Bearers are also associated with a QoS Class identifier
(QCI). The QCI is a number that, in turn, links to the acceptable/allowed packet delay
budget and packet loss rate. The (current) QCI table can be seen in the figure below.
Q o S C la s s Id e n tifie r
P a c k e t D e la y B u d g e t
P a c k e t L o s s R a te
E x a m p le S e rvic e s
1 (G B R )
< 50 m s
H ig h (e .g .1 0 -1 )
R e a ltim e G a m in g
2 (G B R )
50 m s
M e d iu m (e .g .1 0 -2 )
V o IP
3 (G B R )
90m s
M e d iu m (e .g . 1 0 -2 )
C o n v e rsa tio n a l P S V id e o
4 (G B R )
250 m s
L o w (e .g .1 0 -3 )
S tre a m in g
5 (n o n -G B R )
L o w (~ 5 0 m s)
e .g . 1 0 -6
IM S sig n a llin g
6 (n o n -G B R )
L o w (~ 5 0 m s)
e .g . 1 0 -3
In te ra ctiv e G a m in g
7 (n o n -G B R )
M e d iu m (~ 2 5 0 m s)
e .g . 1 0 -4
T C P in te ra ctiv e
8 (n o n -G B R )
M e d iu m (~ 2 5 0 m s)
e .g . 1 0 -6
P re fe rre d T C P b u lk d a ta
9 (n o n -G B R )
H ig h (~ 5 0 0 m s)
n .a .
B e st e ffo rt T C P b u lk d a ta
O p e ra to r d e fin e d
O p e ra to r d e fin e d
U p to 2 5 6
References
Policy and Charging Control architecture
GPRS enhancements for E-UTRAN access
Evolved GPRS Tunnelling Protocol for Control plane (GTPv2-C)
GPRS Tunnelling Protocol User Plane (GTPv1-U)
23.203
23.401
29.274
29.281
AP
I
4.4
4.3.2
AP
IS
EPS Mobility
INTRODUCTION ................................................................................. 5-2
5.2
5.3
5.4
5.5
EPS Mobility
Copyright Apis Technical Training AB 2013. All rights reserved.
5-1
AP
I
5.1
AP
IS
5.1
Introduction
User mobility in EPS is hardly surprising handled in similar ways as in legacy 2G and
3G systems.
UEs in idle state (no ongoing data transfer) will do cell re-selection to find better cells to
camp on. If the new cell belongs to a new Tracking Area, the UE will initiate a Tracking
Area Update procedure.
For UEs in connected state (ongoing data transfer) there will be handovers between cells.
However, there are new terms and also some new features and possibilities in order to
create more flexible and efficient solutions, e.g. for fixed and nomadic terminals (as
opposed to truly mobile devices).
Tracking Areas
The EPS uses so called Tracking Areas (TA) for mobility management purposes. The
concept of a Tracking Area is the same as the GSM/UMTS concept of a Routing Area (or
Location Area). Hence, the TA is an operator defined group of cells that all belong to
the area served by one (or more) MME. One or more TA may be defined for each MME.
The MME knows the TA for a registered UE. If the (idle) UE moves, it updates the MME
through the TA Update procedure. The TA is typically, but not necessarily, the area
within which the UE is paged for incoming calls.
A Tracking Area is identified by a Tracking Area Identity.
TAI = MCC + MNC + TAC, where
TAI = Tracking Area Identity
MCC = Mobile Country Code (3 digits)
MNC = Mobile Network Code (3 digits)
TAC = Tracking Area Code (16 bits)
As an operator option, there may also be MME Pool Areas defined. An MME Pool Area
is defined as an area within which a UE may be served without need to change MME. An
MME Pool Area is served by one or more MMEs ("pool of MMEs") in parallel. MME
Pool Areas are a collection of complete Tracking Areas. MME Pool Areas may overlap
each other, as seen in the figure below.
AP
I
EPS Mobility
Copyright Apis Technical Training AB 2013. All rights reserved.
5-2
5.2
AP
IS
Subscriber Identities
The EPC uses the IMSI number as the permanent user identifier (or rather, USIM
identifier). As in the legacy Core Network a temporary identifier is also used, for
subscriber identity confidentiality reasons, in place of the IMSI whenever possible. The
temporary identifier for a UE in the EPC is called the Globally Unique Temporary
Identity (GUTI).
The use of the GUTI is very similar to the use of the legacy TMSI (CS domain) and PTMSI (PS domain) numbers. There is a difference however: the GUTI explicitly links
with the MME Pool Area concept. The relationship can be seen in the figure above.
Please note that the length of MCC and MNC is in digits, while the other fields are given
in bits.
GUTI = MCC + MNC + MMEGI + MMEC + M-TMSI, where
MMEGI = MME Group Identifier (16 bits)
MMEC = MME Code (8)
M-TMSI = M- Temporary Mobile Subscriber Identity (32)
The MMEGI uniquely identifies a group ('pool') of MMEs within one network. The
MMEC uniquely identifies an MME within one such group and the M-TMSI uniquely
identifies one UE within one MME (the 'M' is just a label and is not an abbreviation for
anything).
The MMEGI together with the MMEC combines to the MME Identifier (MMEI). Thus,
the MMEI uniquely identifies an MME within one core network. The MMEI together
with MCC and MNC combines to the Globally Unique MME Identifier (GUMMEI).
Thus, the GUMMEI uniquely identifies an MME on planet Earth.
The GUTI is allocated when the UE performs initial registration (i.e. Attach) with an
MME. The GUTI is then typically changed whenever the UE performs some EMMprocedure, such as TA Update. The S-TMSI is a shortened version of the GUTI that
uniquely identifies the user within an MME Group (the 'S' is just a label and is not an
abbreviation for anything). The shorter S-TMSI, rather than the complete GUTI, is used
within most NAS messages.
Mobility Principles
Tracking Area Lists
When a UE is switched on, it will do Network Attach to register in an MME. In the Attach
Accept message, the MME may include a TA list, containing a list of Tracking Areas in
which the idle UE can roam, and do cell-reselection, without updating the MME.
A TA list can also be sent to the UE as part of a Tracking Area Update procedure.
The TA list is individual on UE-level. This allows the operator to know the location on
some UEs (e.g. fixed or nomadic) on single-TA level, and other (more mobile) UEs on
multi-TA level. Allowing a UE to move freely inside several TAs without updating the
MME will obviously decrease the amount of mobility related signalling in the network.
On the other hand, paging for incoming data for a UE needs to be done in all Tracking
Areas in the TA list for that subscriber.
3GPP specifications does not really give much information on how (based on what?) the
lists can be designed by the MME. The type of UE and mobility behaviour and paging
history could possibly be input, but no details are revealed in the specs.
All cells/TAs in a MME Pool Area are served by the same MME(s). Consequently, as
long as the UE stays inside the MME Pool Area, there should normally be no need to
EPS Mobility
Copyright Apis Technical Training AB 2013. All rights reserved.
5-3
AP
I
5.4
5.3
AP
IS
change MME. The selection of MME to be used, is made by the eNB. (The selection of
SGW is made by the MME).
However, if an idle UE moves into a TA which is served by a new MME (pool), the
MME for the UE has to be changed. For the UE, it means that a TA Update procedure
will be done (since the new TA is not on the TA list stored in the UE). For the core
network, it means that context for this UE is moved over the S10-interface from the old
(source) MME to the new (target) MME. Subject to operator policy, NAS security
procedures (e.g. authentication) may be done as a result of the MME change.
Also SGWs can (and are likely to) work in a pool solution, meaning that more than one
SGWs will serve an area of cells/TAs. When the MME selects a SGW for setting up
bearers, this will partly be based on reducing the possibility of SGW relocation during a
session. Still, if a UE moves into a new SGW area, bearers will be moved from the old to
the new SGW.
Handovers
Handovers of a connected UE should normally and preferably be done with as little
involvement as possible from the core network. At an intra-eNB handover, the old and the
new cell are both handled by the same eNB, and impact on the core network very limited
(if any).
Another case of handover is between two eNBs that have a direct interface (X2) in
between them. The handover can be prepared and executed almost entirely by the eNBs.
However, the core network needs to be informed about the change of eNB, as the S1-U
interface has to be moved from source eNB to target eNB. In order to do this, the target
eNB will inform the MME about the handover (using S1AP).
More unusual and complicated handovers require MME and SGW changes, with context
transferred between source and target nodes. In addition, making sure that all user data
reaches the UE involves temporary forwarding of user data. Depending on the
configuration of the network, such handover cases may be relatively complicated.
References
Non-Access Stratum (NAS) protocol for EPS
GPRS enhancements for E-UTRAN access
EPS Mobility
Copyright Apis Technical Training AB 2013. All rights reserved.
5-4
AP
I
24.301
23.401
5.5
AP
IS
6.2
6.3
6.4
AP
I
6.1
AP
IS
6.1
Introduction
The Domain Name System (DNS) is a hierarchical distributed naming system for
computers, services, or other resources connected to the Internet or a private network. It
associates various information (like IP-addresses) with domain names. A Domain Name
Service resolves queries for these names into IP addresses for the purpose of locating
computer services and devices worldwide. Needless to say, the Domain Name System is
an essential component of the functionality of the Internet.
3GPP TS 29.303 describes DNS Procedures for the Evolved Packet System. The
document covers the EPC gateway node selection using DNS (e.g. SGW and PGW
selection) excluding all User Equipment (UE) initiated DNS-based discovery and
selection procedures. 29.203 also covers DNS procedures in order to find/select other
core network nodes, e.g. MME, SGSN and MSC Server.
Compared to the typical Internet use case for DNS (i.e. resolving www.example.com into
an IP-address), the DNS procedures are somewhat different. The input to a DNS query
for PGW selection is e.g. based on an APN and the requested service (protocol used on
S5/8 (GTP or PMIP)). And the DNS response may contain a list of candidates, along with
other information.
Resource Records
Resource Records (RR) are stored in DNS Servers and contain information related to a
domain name.
A and AAAA
The A resource record is used to define IPv4 host address corresponding to fully qualified
name of the host as defined in IETF RFC 1035.
The AAAA resource record is used to define IPv6 host address corresponding to fully
qualified name of the host as defined in IETF RFC 3596
.
It should be noted that in DNS A or AAAA record names, in general, represent a host and
its "equivalent" interface. Host names, in general, cannot be used as node names. A node
may need to have more than one host name for the simple reason that it can have multiple
interfaces for different purposes.
NAPTR
The NAPTR resource record (RFC 3403) allows DNS to be used to lookup services for a
wide variety of resource names, which are not in domain name syntax. NAPTR can be
used by a client program to rewrite a string into a domain name. The rewrite process is
controlled by flags that provide information on how to communicate with the host at the
domain name that was the result of the rewrite. If DNS returns multiple NAPTR resource
records those can be prioritized using embedded order and preference values defined by
the DNS administrator.
The "Straightforward-NAPTR" (S-NAPTR) procedure (defined in RFC 3958) describes a
procedure on how to resolve a domain name, application service name, and application
protocol dynamically to target server and port by using both NAPTR and SRV (RFC
2782) resource records. The S-NAPTR also simplifies the use of NAPTR by e.g. limiting
the use of NAPTR flags.
SRV
AP
I
The SRV resource record (RFC 2782) allows DNS administrators to use pool of servers
for a single domain with static load balancing to each server, to move services from host
to host, and to designate some hosts as primary servers for a service from a pool of hosts.
A resolver can ask for a specific service/protocol combination for a specific domain name
and get back a Fully Qualified Domain Names (FQDN) of any available servers.
6.2
AP
IS
Example: Selecting SGW and PGW
When a UE requests a PDN Connection to be set up, it sends a PDN Connectivity
Request to the MME. The PDN Connectivity Request may contain an APN, or have an
empty APN field. If the APN field is empty, this means that the UE requests a PDN
Connection to the Default APN which is part of the subscriber data in HSS.
It is the MMEs responsibility to select SGW and PGW for the PDN Connection, e.g.
using DNS procedures. However, also non-DNS procedures (e.g. based on configuration)
can also be used
For DNS procedures, the MME may use the following information as input in a DNS
query:
IMSI
APN
TA-id
Subscriber data
SGW selection
In order to find a SGW with a GTP-based S5-interface, the MME uses the S-NAPTR
procedure with:
Service parameter: x-3gpp-sgw:x-s5-gtp"
Application Unique String:
tac<TAC>.tac.epc.mnc<MNC>.mcc<MCC>.3gppnetwork.org
In addition to the requested interface (S5) and protocol (GTP), the Tracking Area Code
(in the format of a TAI-FQDN) is included in the DNS query that is to a DNS Server.
The DNS Server returns NAPTR records containing a replacement field with node
names e.g.:
topoff.vip2.gw01.node.epc.mnc123.mcc321.3gppnetwork.org.
topoff.vip1.gw21.node.epc.mnc123.mcc321.3gppnetwork.org.
The response may also contain A or AAAA-records with IP-addresses to the nodes. The
MME can then select a suitable SGW.
PGW selection
To find a PGW with a GTP-based S5-interface, the MME uses the S-NAPTR procedure
with:
Service parameter: x-3gpp-pgw:x-s5-gtp"
Application Unique String:
services.operator.se.apn.epc.mnc01.mcc240.3GPPnetwork.org
This is sent in a DNS query to a DNS Server. The DNS Server returns NAPTR records
containing a replacement field and (optionally) also contain A or AAAA-records with
IP-addresses to the nodes. The MME can then select a suitable PGW.
References
Domain names - concepts and facilities
Domain names - implementation and specification
Domain Name System Procedures
RFC 1034
RFC 1035
TS 29.303
AP
I
6.4
6.3
AP
IS
Diameter
7.1
7.2
7.3
7.3.1
General..................................................................................... 7-2
7.3.2
7.3.3
7.3.4
Diameter
Copyright Apis Technical Training AB 2013. All rights reserved.
7-1
AP
I
7.4
AP
IS
7.1
Introduction
Diameter is a protocol that originates from the Internet world, and is thus specified by
IETF (Internet Engineering Task Force). The current baseline Diameter specification is
RFC 6733.
Note: The name Diameter is not an abbreviation, but a play with words. The protocol is
an improved alternative to the RADIUS (Remote Access Dial In User Service) protocol.
Diameter is often described as providing a framework for AAA (Authentication,
Authorization & Accounting).
7.2
7.3
7.3.1
General
Like some other IETF protocols, Diameter is extensible, meaning that new applications,
commands and AVPs can be added. 3GPP has used this opportunity and uses Diameter on
several interfaces in EPC. 3GPP Diameter applications are described in TS 29.230.
Diameter
Copyright Apis Technical Training AB 2013. All rights reserved.
7-2
AP
I
For details about the use of Diameter on S6a and S6d, refer to TS 29.272.
7.3.2
AP
IS
Diameter for PCC
Diameter is also a key protocol in the PCC architecture. Policy and charging information
is exchanged using DIAMETER commands, e.g. between PCRF (Policy and Charging
Rules Function) and PCEF (Policy and Charging Enforcement Function). For more
information about PCC, refer to chapter 8.
7.3.4
References
Diameter
Policy and Charging Control architecture
GPRS enhancements for E-UTRAN access
Diameter applications; 3GPP specific codes and identifiers
Mobility Management Entity (MME)
and Serving GPRS Support Node (SGSN) related interfaces based on
Diameter protocol
RFC 6733
TS 23.203
TS 23.401
TS 29.230
TS 29.272
Diameter
Copyright Apis Technical Training AB 2013. All rights reserved.
7-3
AP
I
7.4
7.3.3
AP
IS
8.2
8.3
8.3.1
8.3.2
AP
I
8.4
AP
IS
Introduction
The purpose of Policy and Charging Control (PCC) is to allow the network
to make relevant decisions about QoS (quality of service) and charging on
a detailed level. These decisions can mainly be based on:
subscriber information (stored in some network database),
the service requested by the UE,
current status in the network (e.g. available resources), and/or
general policies and rules in the network.
In the old circuit switched world, Policy and Charging control was less
complex. Quality basically meant provided using circuits (e.g. dedicated
timeslots). Charging was often quite intuitive; normally based on the
duration of a call and the geographical distance (although most operators
nowadays tend to have a multitude of different subscriptions with many
different tariffs and payment models).
When packet data was introduced with GPRS, operators found that - for
various reasons - charging subscribers for sessions, bytes or packets
was difficult. Thus, the dominating tariff model became some type of flat
monthly fee for data traffic, possibly with some maximum data volume per
month. As long as data was only a small portion of the total traffic in the
networks, this model was considered sufficient for most operators.
With the deployment of HSPA and LTE/EPS, mobile broadband offerings
and new services, data traffic volumes have sky-rocketed in many
networks, leading to a demand for improved charging models/mechanisms.
Also, QoS handling becomes more complex in a packet based, multiservice multi-access environment. Particularly, this is the case if we do not
want to use the best effort QoS approach.
One main novelty in PCC is that it allows policy control and charging on a
finer level (smaller granularity) that has been the case previously. Policy
and charging control can be done on Service Data Flow (SDF)1 level,
which basically allows operators to differentiate QoS and pricing on a
service by service level.
PCC can also be done on higher level than per SDF. One use case is that
an operator wants to restrict the bit rate for a subscriber after a certain
monthly quota has been reached. Or maybe raise the price after 10 GB has
been consumed per month. This means that PCC can also be done on a
subscriber level, or on so called IP-CAN Session or IP-CAN Bearer level.
Bearers
User plane resources for IP data traffic are generally referred to as
Bearers. As the term suggests, the bearer carries IP packets belonging to
one or several IP services (e.g. web browsing, e-mail, voice over IP).
AP
I
The concept of a Service Data Flow will be described later. Simplified, a SDF can be
viewed as all the IP-packets belonging to a certain service.
Policy and Charging Control
Copyright Apis Technical Training AB 2013. All rights reserved.
8-2
8.1
AP
IS
AP
I
The term GRPS/UMTS Bearer is also used in specifications. However, in daily life
most people tend to use the term PDP Context.
Policy and Charging Control
Copyright Apis Technical Training AB 2013. All rights reserved.
8-3
8.2
AP
IS
AF Application Function
PCC Rules are partly based on requirements from an Application Function
(AF). AF is a general name for a node/function that needs PCC rules to be
decided and implemented. The AF can e.g. be an IMS node (P-CSCF) or a
streaming server. The AF knows requirements on a service level e.g. bit
rate and delay requirements for a media over IP session.
PCEF Policy and Charging Enforcement Function
PCC Rules have to be enforced into nodes in the user plane so that bearers
can be set up and monitored according to service level requirements. The
Policy and Charging Enforcement Function (PCEF) resides in a user plane
node. In EPS this node is the PGW, in GPRS/UMTS it is GGSN. PCEF
also has interfaces to charging systems, in order to get charging
instructions or report events.
The basic idea is that an AF (Application Function) that is responsible for
the actual service communicates service level requirements e.g. regarding
bit rate and delay to PCRF. This allows user plane bearers to be tailor
made for services provided by an operator, e.g. IMS services like Voice
over IP. But do note that PCC Rules can also be generated for unknown
services e.g. an unidentifiable Internet service.
SPR Subscription Profile Repository
The SPR logical entity contains all subscriber/subscription related
information needed for subscription-based policies and IP-CAN bearer
level PCC rules by the PCRF. The SPR may be combined with or
distributed across other databases in the operator's network, but those
functional elements and their requirements for the SPR are out of scope of
this document.
Note that the SPR's relation to existing subscriber databases is not
specified as of 3GPP Release 11. From Release 11, 3GPP also introduces
the User Data Repository (UDR) as an alternative database for converged
storage of subscriber data.
AP
I
AP
IS
8.3
PCC Areas
Policy and Charging Control can be divided into two sub-areas; Policy
Control which is mainly related to QoS, and Charging control.
8.3.1
Policy Control
Policy Control aims at providing the PCEF with authorized QoS values
and parameters for each Service Data Flow (SDF) or Bearer or Session.
The QoS high-level parameters in a PCC Rule are;
Guaranteed Bit Rate (GBR)
Maximum Bit Rate (MBR)
Allocation and Retention Priority3 (ARP)
Quality of Service Class Identifier4 (QCI)
These QoS parameters (GBR/MBR, ARP, QCI) will eventually be
mapped down to bearer level parameters in different parts of the network,
e.g. radio network parameters for E-UTRAN. (How this mapping is done
is however implementation dependant.)
It is the PCRF that decides upon the PCC rules to be used. These decisions
are based on input from the AF, SPR, PCEF, TDF, OCS and the PCRF
itself. PCC rules may be static throughout a session, but can also change as
a result of events taking place (e.g. an inter-RAT handover).
8.3.2
Charging Control
Charging information can be generated by network nodes for a multitude
of reasons and on different levels.
Flow Based Charging (FBC) allows the operator to generate charging
information on Service Data Flow (SDF) level, based on data volumes,
session time, events or combinations of these.
As mentioned above, PCC comprised functionality for both offline and
online charging.
References
The ARP gives the SDFs priority in relation to other service data flows
The QCI is a reference to e.g. delay and packet loss sensitivity
Policy and Charging Control
Copyright Apis Technical Training AB 2013. All rights reserved.
8-5
AP
I
23.203
23.212
23.214
8.4
AP
IS
EPS Security
9.1
9.2
9.3
9.3.1
9.3.2
9.4.1
9.4.2
9.5
EPS Security
Copyright Apis Technical Training AB 2013. All rights reserved.
9-1
AP
I
9.4
AP
IS
9.1
General
Security in EPS provides security features such as:
User and network authentication
User confidentiality
Information confidentiality
Information integrity (to make sure info has not been changed)
Information origin authentication (to make sure that info comes from the right
source)
EPS security is based on / developed from legacy 3GPP procedures (e.g. UMTS AKA
(Authentication and Key Agreement) and standard IETF mechanisms, e.g. IP sec.
Security mechanisms have to be applied in different parts of the network and at different
levels,
Access Stratum (AS) security provides security between UE and network on the
radio interface (Uu)
Non Access Stratum (NAS) security provides security between UE and the core
network
Network Domain Security (NDS) provides security over interfaces between
network entities.
9.2
AS Security Functions
The Access Stratum security functions are outside the scope for this core network
oriented course. However, in short the AS Security provides;
Integrity check of signalling from UE to eNB (and vice versa)
Ciphering of signalling between UE and eNB
Ciphering of traffic between UE and eNB
Keys for integrity check and ciphering are derived from the EPS Authentication Vector.
9.3
9.3.1
EPS Security
Copyright Apis Technical Training AB 2013. All rights reserved.
9-2
AP
I
The AKA procedure must, according to the specifications, be performed at least during
initial attach. After that it is up to the MME to decide when to perform a new AKA
procedure. It may be performed whenever the UE wishes to execute some signalling
Authentication and Key Agreement (AKA) is the combined process of authenticating the
user (and network) and calculating keys for NAS ciphering and integrity protection. A socalled security context is established in the UE and in the MME after a successful AKA
run.
AP
IS
An EPS Authentication Vector (AV) is produced in the HSS and consists of four
parameters:
RAND is input to a set of algorithms; together with the secret authentication key
K, for calculation of RES, AUTN and KASME. The authentication key, K, is
uniquely linked to one, and only one, IMSI number in the HSS/AuC. The RAND
parameter from a selected AV is sent to the UE in an Authentication Request
message whenever the MME wishes to perform an AKA run. This parameter is
sometimes referred to as the authentication challenge or random challenge.
RES/XRES is the signed response used for authentication. This parameter is
sent in the Authentication Response message from the UE to the MME. The UE
is regarded as authenticated if the RES provided by the UE matches the one
stored in the selected AV in the MME. The term XRES is short for expected
RES and is just an indication that the RES (i.e. XRES) stored in the MME will
be compared to another version of itself (i.e. the RES sent back from the UE).
AUTN is the authentication token used by the UE to validate that the network is
authorised. The AUTN is sent to the UE along with the RAND in the
Authentication Request message. The AUTN is calculated in the HSS/AuC
based on the Anonymity Key (AK) and the Message Authentication Code
(MAC) in the same manner as in a GSM/UMTS HSS. Note: do not confuse this
'MAC' parameter with the 'MAC' present in a security protected NAS message,
they are not the same!
KASME is the Access Security Management Entity key, where 'ASME' is to be
understood as the MME in the EPS case. K ASME is derived from an HSS/AuC
produced Ciphering Key (CK) and integrity Key (IK), both 128 bits long. The
CK and IK keys are, in turn, calculated in the same manner as in a GSM/UMTS
HSS.
Key Hierarchy
The EPS system uses a security key hierarchy (see figure below) with multiple levels. The
base keys on the top level (CK and IK) are only visible to the UE and the home network
domain database (HSS). On the next level there is KASME, which is only visible to the UE
and the visited MME.
EPS Security
Copyright Apis Technical Training AB 2013. All rights reserved.
9-3
AP
I
KASME is, in turn, used for derivation of the ciphering and integrity keys needed to protect
NAS signaling messages (i.e. signaling between UE and MME). KASME is also used for
derivation of an eNodeB key, KeNB. Finally, KeNB is used for derivation of keys for
ciphering and integrity protection of RRC signaling messages and a key for the ciphering
of user data over the radio interface (i.e. between UE and eNodeB).
procedure (e.g. tracking area update) or when the UE requests some form of service (e.g.
establishment of dedicated bearers) or both.
AP
IS
N e ve r le a ve s H o m e D o m a in
C K , IK
O n ly u s e d in a c c e s s N W
N e ve r le a ve s E P C
(K A S M E is v P L M N s p e c ific )
C K N AS
K ASM E
(K e N B is c e ll s p e c ific )
K eN B
IK N A S
CKUP
CKCP
IK C P
N AS SN
O th e r in p u t
S ta n d a rd H e a d e r
O th e r IE s (o n e o r m o re m e s s a g e )
E n c ryp tio n
C K NAS
In te g rity
IK N A S
N AS SN
O th e r in p u t
S e c u rity
P ro to c o l
H e a d e r T yp e D is c rim in a to r
MAC
N AS SN
S e c u rity H e a d e r
EPS Security
Copyright Apis Technical Training AB 2013. All rights reserved.
9-4
AP
I
The encrypted message is then fed to the integrity algorithm together with the NAS
Integrity Key, the NAS SN and additional input parameters. The output is the
calculated MAC, which is placed in the security header appended to the message.
9.3.2
AP
IS
9.4
9.4.1
Control Plane
Control plane signalling between different security domains (e.g. different networks)
needs to be protected (confidentiality, integrity, authentication and non-replay). This
applies for interfaces between network entities in the core network (EPS) as well as
between EPC and E-UTRAN.
The security protocols to be used at the network layer are the IETF defined IPsec
security protocols as specified in RFC 4301 and 4309.
Note that there is no 3GPP requirement for NDS/IP security in the user plane.
S e cu rity D o m a in B
S e cu rity D o m a in A
N e tw o rk
E n tity
N e tw o rk
E n tity
Zb
Zb
Za
SEG
Zb
Zb
SEG
Zb
Zb
N e tw o rk
E n tity
N e tw o rk
E n tity
Za and Zb interfaces
Security Gateways (SEGs) are entities on the borders of the IP security domains. The
SEGs are defined to handle communication over the Za-interface, which is located
between SEGs from different IP security domains. All NDS/IP traffic shall pass through a
SEG before entering or leaving the security domain. The security may include filtering
policies and firewall functionality not required in this specification.
SEGs are responsible for security sensitive operations and shall be physically secured.
They shall offer capabilities for secure storage of long-term keys used for IKEv1 and
IKEv2 authentication. IPsec SA (Security Association) defines which security protocol to
be used, the mode and the endpoints of the SA.
EPS Security
Copyright Apis Technical Training AB 2013. All rights reserved.
9-5
AP
I
For NDS/IP-networks the IPsec security protocol shall always be ESP. For NDS/IPnetworks it is further mandated that integrity protection/message authentication together
with anti-replay protection shall always be used.
AP
IS
Security in the User Plane
S1-U (eNB to SGW)
The transport of user data over the S1-U interface (between eNB and SGW shall be
integrity, confidentiality and anti-replay protected from unauthorized parties.
This can be accomplished by using cryptographic means in which case IPsec ESP
shall be used. Alternatively, the operator may provide security by means of a
physically secured environment including eNB and SGW.
S8 (SGW to PGW)
NDS/IP has been designed to protect control plane protocols. However, 3GPP
recognizes that NDS/IP may also be used to protect user plane traffic (GTP-U). It is
observed that Border Gateways and SEG will both reside at the edge of an operators
network.
References
Non-Access Stratum (NAS) protocol for EPS; stage 3
Network Domain Security, IP network layer security
3GPP System Architecture Evolution: security architecture
Security Architecture for the Internet Protocol
Using Advanced Encryption Standard (AES) CCM Mode with IPsec
Encapsulating Security Payload (ESP)
24.301
33.210
33.401
RFC 4301
RFC 4309
EPS Security
Copyright Apis Technical Training AB 2013. All rights reserved.
9-6
AP
I
9.5
9.4.2
AP
IS
AP
I
10
AP
IS
10.1
Introduction
UTRAN
Iu -P S
SGSN
G b /Iu
GERAN
Gr
S3
HSS
S4
S12
SPR
S6a
OCS
S 1 -M M E
MME
S 1 -U
S10
Gy
O FCS
S11
Gz
X 2 -C
E -U T R A N
Sp
PCRF
Gx
Rx
SGi
S5
SGW
IM S / In te rn e t /
PGW
X 2 -U
S2b
T ru ste d
IP a cce ss
S6b
S2a
ePDG
SW m
HSS/
AAA
SW n
N o n -tru ste d
IP a cce ss
AP
I
Much has happened since then. Today there are multi-RAT terminals and network
operators that deploy multiple access technologies, all connected to the same core
network and/or service layer. The people taking part in the initial standardisation process
for E-UTRAN and EPC of course knew all this. Let's look at some of the basic
requirements that were agreed upon.
10.2
AP
IS
10.3
PS Interworking
10.3.1
10.4
CS Interworking
10.4.1
The CS "Problem"
AP
I
The potential problem of interworking with legacy Circuit Switched (CS) networks lies in
the fact that the EPS is an all-IP network and that there are no mandatory interfaces
defined between the MME and the MSC Server. A VoIP call (Voice or Video call over
IP) may very well be handed over to GERAN/UTRAN provided that the target system
AP
IS
supports PS Handover signalling and can handle the strict QoS requirements for real-time
services in the PS domain. But real-time media over IP is typically not supported in
GERAN. It may - or may not - be supported in UTRAN depending on the release and
HSPA capabilities. Consequently, there is a need for solutions for interworking between
the EPC and the CS domain.
A number of companies/representatives proposed various solutions to this conundrum at
EPS-related standardisation meetings. Two of these were agreed upon since they do not
require any major changes to the core EPS specifications and that they do not add
unreasonable complexity to the system. These solutions are 'CS Fallback' and 'Single
Radio Voice Call Continuity'.
CS Fallback
G b /Iu
GERAN/
UTRAN
SGSN
A /Iu
S3
M SC
S e rv e r
S4
SGs
MME
E -U T R A N
SGW
PGW
IM S / In te rn e t /
AP
I
The UE moves to the target system/cell and sends a 'Handover Complete' message (the
exact name of the message depends on the target system and its capabilities). Completion
of the handover means that the UE now has an 'RRC Connection' in the target system/cell.
This connection is used to send a Paging Response to the MSC Server. Normal call setup
signalling is then used to establish the call in the target system.
When the MSC Server receives an incoming call for the UE, it will initiate paging over
the SGs-interface. The MME sends an S1AP paging message, together with a CS
Fallback Indicator, to the eNB. The UE is then paged and an RRC Connection is
established in the normal manner. The eNB then immediately triggers a handover to the
target system. This step may be preceded by a short period during which the UE is
ordered to perform, and report, measurements on the target system.
10.4.2
AP
IS
The CS Fallback feature for mobile originating calls is very similar. In that case the UE
sends an EMM Service Request message with a CS Fallback Indicator to the MME. The
rest of the signalling is the same as above, with the exception that the UE sends a CM
Service Request message instead of a Paging Response to the MSC Server.
The SGs-interface is modelled on the legacy MSC
SGSN Gs-interface. The L3
protocol is called the SGs Application Protocol (SGsAP), which is based on the Gsinterface BSSAP+ protocol. The Combined EPS/IMSI Attach and TA/LA Update
procedures are based on the legacy combined GPRS/IMSI Attach and RA/LA Update
procedures.
GERAN/
UTRAN
SGSN
A/Iu
S3
MSC
Server
S4
SV
MME
E-UTRAN
SGW
PGW
IMS /IMS
Internet /
SV-interface: For SRVCC related signalling between MME and MSC Server
AP
I
Based on measurement reports, the eNB takes a handover decision. The eNB sends a
handover request to the MME, with an indication that this is a SRVCC handover. The
MME triggers the SRVCC procedure with the MSC Server via the Sv-interface. The MSC
Server then initiates the session transfer towards IMS and coordinates it with the CS
handover to the target cell. The MSC Server sends a response back to the MME when
radio resources have been prepared in the target cell. The response includes the radio
interface Handover Command message for the UE. The UE moves to the target cell and
transmits a Handover Complete message.
10.4.3
AP
IS
In parallel, there is signalling (e.g. using SIP) between the MSC Server and the IMS
nodes (CSCF and SCC AS) in order to transfer the session transfer to the CS domain.
When this has been completed, the downlink flow of VoIP packets is redirected towards
the CS access network.
References
Single Radio Voice Call Continuity (SRVCC)
IMS Service Continuity (ISC)
IMS Centralized Services (ICS)
CS Fallback in Evolved Packet System (EPS)
GPRS enhancements for E-UTRAN access
Architecture enhancements for non-3GPP accesses
E-UTRA/E-UTRAN; overall description
AP
I
23.216
23.237
23.292
23.272
23.401
23.402
36.300
10.5
AP
IS
AP
I
11
AP
IS
11.1
Introduction
EPS allows the UE to use non-3GPP access networks for connecting to the Evolved
Packet Core. Non-3GPP means that those networks use access technology whose
specification is outside the scope of 3GPP, e.g. WLAN/WiFi, CDMA2000 and WiMAX.
To handle idle and active mode mobility between the 3GPP- and non-3GPP access
networks, EPS supports a few different IETF-defined mobility management mechanisms
over the so called S2 reference points (S2a, S2b and S2c).
11.1.1
Architecture
AP
I
The architecture for EPS with non-3GPP IP accesses is described in TS 23.402. No less
than eight possible scenarios without optimisation are specified. Two of them deal with
non-roaming situations (roaming here means that a VPLMN is involved), four are for
roaming cases where the traffic is home routed and the last two handles roaming with
local breakout of the traffic. To these eight, the optimised scenario(s) can be added.
11.2
AP
IS
HSS
SW x
PCRF
S6a
G xc
Rx
G xb
Gx
O p e ra to rs IP
se rvice s,
e .g . IM S
SGi
3G PP
A cce ss
SGW
PGW
S5
S6b
S2b
SW m
S2a
3G PP AAA
S e rve r
ePD G
SW n
SW u
H PLM N
N on- 3G P P
N e tw o rk s
U n tru ste d
G xa
n o n -3 G P P
IP-a cce ss
T ru ste d
n o n -3 G P P
SW a
STa
UE
IP-a cce ss
HSS
SW x
PCRF
S6a
G xc
Rx
G xb
Gx
O p e ra to rs IP
SGi
3G PP
A cce ss
SGW
se rvice s,
e .g . IM S
PGW
S5
S6b
SW m
3G PP AAA
S e rve r
e PeDPGD G
SW n
H PLM N
N on- 3G P P
N e tw o rk s
U n tru ste d
G xa
n o n -3 G P P
IP-a cce ss
T ru ste d
n o n -3 G P P
SW a
STa
IP-a cce ss
S2c
UE
AP
I
AP
IS
Note: Throughout this chapter, the HSS and the 3GPP AAA server are referred to with a
single label HSS/AAA. In the architecture those two elements are connected via
reference point SWx. The SWx reference point (see TS 29.273) is based on Diameter.
11.2.1
Trust Relationship
The non-3GPP accesses are classified as trusted or un-trusted networks. Whether a non3GPP IP access network is trusted or un-trusted is not a characteristic of the access
network or the technology, but is more related to ownership-/ business relation issues. It
is thus the EPS operator that decides whether an IP access network that connects to its
EPC is a trusted or un-trusted IP access network.
A Trusted non-3GP access network contains functions/features that support interworking
with the EPC. Interaction between the UE and the EPC is considered to be secure since
communication between the access network and the EPC is transferred over preestablished secure links.
In contrast, for the un-trusted non-3GPP IP access network, the communication between
the UE and the EPC is not regarded to be secure and for that reason, an IPsec tunnel is
established between the UE and the EPC. The network element terminating this tunnel in
the EPC is the evolved Packet Data Gateway (ePDG). The ePDG is the EPS version of a
PDG introduced by 3GPP in the pre-R8 feature: I-WLAN (TS 23.234).
When performing initial attach in- or handover to a non-3GPP access network the UE
needs to discover the trust relationship of the non-3GPP access network in order to
understand which procedure to initiate (IPsec tunnel set-up or not, ).
The trust relationship of a non-3GPP access network is made known to the UE through:
Pre-configured policy in the UE.
The UE discovers the trust relationship when communicating with the
HSS/AAA for authentication.
11.2.2
AP
I
11.3
AP
IS
Mobile IP (MIP)
In brief, Mobile IP works as follows. The device is referred to as a mobile node (MN),
and is associated with two IP addresses:
a home address (HoA) provided by a Home Agent (HA) in the home network
and
a care of address (CoA), which is allocated from the network the mobile node
is currently visiting.
The home agent is a router in the mobile nodes home network. It stores information
about the MN in a so called binding cache. This information obviously includes the
HoA and CoA.
A node (correspondent node-CN) that would like to communicate with the mobile node
uses the home address (HoA) of the mobile node as the destination address for IP-packets.
Normal IP routing mechanisms forward these packets to the home network where they are
captured by the home agent. After checking its binding cache table, the original IP packet
is encapsulated in another IP-packet and the home agent tunnels packets to the CoA. The
original packets are de-capsulated at the end of the tunnel at the MN.
For outgoing IP-packets, the mobile node can simply send packets directly to the other
communicating node, using its home address as the source address for the IP packets.
This is known as triangular routing. Alternatively, reverse tunneling may be employed.
This means tunneling the mobile node's outgoing packets to the home agent, which in
turn forwards them to the communicating node. This is needed in networks whose
gateway routers have ingress filtering enabled and hence the source IP address of the
mobile host would need to belong to the subnet of the foreign network, else the packets
will be discarded by the router.
If the mobile node leaves the visited network (from which it has gotten the CoA) and
moves into a new (sub-) network, it will no longer receive the incoming packets. They
will be sent to the old network as long as the binding cache in the HA is not updated. In
order to correct this the MN has to:
detect that it has moved
perform a link layer attach
configure a new Care of Address and
execute an update of the binding cache in the home agent
This will cause the HA to re-direct the tunnel and incoming packets can once again be
received by the MN. In the response to the binding cache update request, the home agent
can confirm continous usage of the same HoA as before. This means that sessions
established over the old connection can continue to run over the new one and we have
session continuity.
MIPv4 may also work in Foreign Agent mode (MIPv4_FA). In this mode, the CoA is
not for the MN itself, but for a Foreign Agent in the visited network. A MN registers the
FA_CoA in the binding cache and the FA forward tunneled IP-packets to the MN.
In the trusted case when a function in the access network acts on behalf of- or assists
the UE in mobility signalling procedures, the reference point of interest is called S2a and
is based on MIPv4_FA or PMIPv6.
AP
I
11.3.2
11.3.1
AP
IS
For use of MIPv4_FA, the S2a is between a Foreign Agent in the trusted access network
and a Home Agent in the PGW.
When PMIPv6 is used, S2a spans from a Mobile Access Gateway (MAG) function,
located e.g. in a specialized router in the trusted access network to a Local Mobility
Anchor (LMA) function in the Gateway (PGW in most scenarios).
In the un-trusted case, the ePDG can act on behalf of the UE and take care of the
mobility signalling. Here the reference point is called S2b and is based on PMIPv6. The
MAG is located in the ePDG and the LMA in the Gateway (PGW in most scenarios).
Finally, the UE can host the mobility protocol and talk directly with the anchor point in
the EPC over any kind of access network, 3GPP-defined as well as non-3GPP trusted and
un-trusted networks. This logical interface between the UE and the Home Agent EPC
anchor is called S2c and here, DSMIPv6 is used.
11.3.3
Gateway selection
AP
I
Note: In some roaming scenarios with PMIPv6 based S2a/S2b and home routed traffic
over S8, the S2a/S2b interfaces terminates on an SGW in the VPLMN. Here the
HSS/AAA infrastructure, in addition to providing information for PGW selection also
gives information for the trusted non-3GPP access network/ ePDG to find the SGW.
11.4
AP
IS
HSS/AAA authentication and
authorization
During HSS/AAA authentication and authorization, in addition to UE-EPC mutual
authentication, other types of important information is exchanged for network access/
IPsec tunnel establishment.
In this procedure:
the UE can learn the trust relationship of interest for the current situation.
the UE and the access network can become aware of what IP mobility
mechanism to use.
vital information necessary for GW selection is delivered from HSS/AAA to
where it is needed.
Below, brief descriptions of these important procedures for authentication and
authorization are given together with references to more detailed documents.
As described in TS 33.402, the authentication for non-3GPP access and IPsec tunnelestablishment builds upon the 3GPP access EPS-AKA procedure and the usage of HSS
security vectors. However, for non-3GPP access, the keys and challenge/responseparameters of the vector are carried by other protocols compared to the 3GPP access case.
End to end between the UE and the 3GPP-AAA server, the Extensible Authentication
Protocol (EAP) carries the relevant AKA parameters. The details can be found in RFC
4187 EAP-AKA. How the EAP messages in turn are transported, depends on whether
the case is for a trusted or un-trusted scenario.
Note: The identity provided by the UE for authentication purposes is the Network Access
Identifier (NAI) as described in TS 24.302 and RFC 4282. The NAI used here is based on
the IMSI. In order to run the AKA procedure, a USIM must be present in the UE.
11.5.1
During idle and active mode mobility events the tunnel end nodes, i.e. the UE and the
ePDG, manage IPsec tunnel handling. If the UE connects to the same ePDG over the
target access system as the one used when in the source access system, MOBIKE (RFC
4555) is used to update the ePDG with the UEs new IP address. On the other hand, if the
UE connects to a new ePDG over the target system, a new IPsec-tunnel needs to be
established.
Interworking with non-3GPP IP-access
Copyright Apis Technical Training AB 2013. All rights reserved.
11-7
AP
I
11.5.2
11.5
AP
IS
AKA for UEs connecting via non-3GPP access over
S2c.
As an alternative for global mobility management, the HSS/AAA may instruct the UE not
to rely on functions in the access network but instead handle the mobility signalling by
itself. Here the UE talks directly with the anchor point (home agent function in the
PGW) over the S2c reference point using DSMIPv6.
After a local IP address has been configured in the UE when connecting via E-UTRAN or
trusted/untrusted non-3GPP IP access, the UE learns the address to the home agent
function in the PGW.
The Home Agent address can be discovered based on:
Protocol Configuration Options in the E-UTRAN case,
IKEv2 signalling for IPsec tunnel establishment in the untrusted non-3GPP IP
access case,
DHCP (+ DNS query) and
Stand alone DNS query.
Knowing the PGW/Home Agent address makes it possible for the UE to establish a
security association with the PGW. The goal with this association is to secure the
DSMIPv6 signalling. IKEv2 is used to set-up the association and IKEv2 carries EAP
messages between the UE and the PGW for authentication/authorisation purposes. The
PGW relays the EAP signalling to the HSS/AAA over Diameter on S6b.
Optimised handovers
In order to reduce delay and minimize data loss during handover, the standard suggests
handovers with optimisations between E-UTRAN and a few non-3GPP access
technologies, currently CDMA2000 HRPD and mobile WiMAX.
For the CDMA2000 HRPD case, the source and target access systems are closely
integrated via additional interfaces for signalling (S101) and user data (S103). Over S101
the UE can perform a pre-registration in the target system and create a so called dormant
session there, maybe well in advance of the actual handover execution. This will reduce
the amount of signalling that has to be exchanged during the handover phase and thus
have a positive impact on overall delay.
A packet that has arrived in the SGW but has not been delivered to the UE before the
PGW switches the tunnel between S5 and S2a can now be forwarded over S103 and
thereby data loss can be avoided.
SW x
HSS
AAA
S6b
S6a
X 2 -C
S 1 -U
SGi
S5
E -U T R A N
SGW
X 2 -U
S10
G xc
S 1 -M M E
MME
IM S / In te rn e t /
PGW
Gx
Rx
PCRF
S11
STa
G xa
S101
S103
S2a
H R P D A ccess
IO S
HSGW
HRPD
AN
AP
I
11.6
11.5.3
AP
IS
References
TS 23.003: Numbering, addressing and identification
TS 23.234: 3GPP System to WLAN Interworking; System Description
TS 23.401: GPRS Enhancements for E-UTRAN Access
TS 23.402: Architecture enhancements for non-3GPP access
TS 24.302: Access to the EPC via non-3GPP access networks
TS 29.273: 3GPP EPS AAA interfaces
TS 33.234: 3G security; WLAN interworking security
TS 33.402: Security aspects of non-3GPP accesses
TS 36.300: E-UTRA and E-UTRAN; Overall description
Revised
IPsec
AP
I
11.7
Гораздо больше, чем просто документы.
Откройте для себя все, что может предложить Scribd, включая книги и аудиокниги от крупных издательств.
Отменить можно в любой момент.