T325 Summary T305 T325 B BLOCK 2 4 PART III T325. Session 1 Block III Part 2 Section 2 - Continous Network Architecture. Dr. Saatchi, Seyed Mohsen

Size: px
Start display at page:

Download "T325 Summary T305 T325 B BLOCK 2 4 PART III T325. Session 1 Block III Part 2 Section 2 - Continous Network Architecture. Dr. Saatchi, Seyed Mohsen"

Transcription

1 T305 T325 B BLOCK 2 4 PART III T325 Summary Session 1 Block III Part 2 Section 2 - Continous Network Architecture [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your address] Prepared by: Dr. Saatchi, Seyed Mohsen T325

2 Block III Network Architecture Q1: Different protocols are used for 2G, 2.5G and 3G Q2: 2G and 2.5G : different protocol stacks are used for the control plane and the user plane Q3: 3G : same protocols are used for the control place and the user plane Q4: What is the different between 2G, 2.5G and 3G in using the protocols. 2G and 2.5G : different protocol stacks are used for the control plane and the user plane 3G : same protocols are used for the control place and the user plane Q5: Mention the protocols used in empty places for the layered protocols in 3G packet domain. Prepared by: Dr. Saatchi, Seyed Mohsen 2

3 Q6: Each service provides data in blocks called data units Q7: The set of blocks at each node is often known as the protocol stack Q8: The set of blocks at each node is often known as the protocol stack, give an example: PHY protocol: UE and Node B GPRS mobility management (GMM): UE and the SGSN Q9: in previous figure The UE and SGSN are not adjacent on the diagram, which means the GMM messages are carried over the intermediate nodes (Node B and RNC) by lower level protocols; in this case the radio resource control (RRC) and radio access network application protocol (RANAP). Q10: In previous figure these transport the GMM messages but do not alter them in any way, so the intermediate nodes are invisible to the GMM protocol. Prepared by: Dr. Saatchi, Seyed Mohsen 3

4 Q11: Each block can be thought of as communicating with the block of the same name at the other end point using the services of the layers below. Q12: Radio Link control (RLC) block in the RNC communicates with the RLC block in the UE, using the services of the medium access control (MAC) and PHY layers. Q13: Blocks communicating in this way are said to be communicating on a peer-topeer basis and the two blocks are often referred to as peer entities. Q14: Protocol interworking: A node converts from one protocol to another in each direction. Example: At the lowest level, the Node B has blocks labeled PHY and ATM Prepared by: Dr. Saatchi, Seyed Mohsen 4

5 Q15: Protocol interworking: A node converts from one protocol to another in each direction. Q16: The blocks labeled PHY refer to the physical layer of the radio interface, which comprises a number of different physical channels Q17: In 3G, the primary means of sharing the allocated radio bandwidth between these channels is W-CDMA Q18: What does the physical channels are used for: User traffic Transport of Signaling messages Management of the radio link itself. Q19: PHY interworks at the Node B with the ATM protocol Q10: ATM protocol is used to transport user traffic and Signaling messages across the fixed part of the network from the Node B to the SGSN (and the MSC for circuitswitched traffic) via the RNC Q11: The RRC, RLC and Mac protocols to consider are those which are used to manage the flow of data between the UE and the radio access network and to control the allocation of radio channels. Note: The end points for all of these protocols are the UE and the RNC (except for one specific case which need not concern us here). Prepared by: Dr. Saatchi, Seyed Mohsen 5

6 Q12: This means that in virtually all cases the; Node B does not participate in these protocols it simply forwards the data to the UE Q13: List some MAC Layer : Principal functions Prioritization between: data flows addressed to a single piece of UE data flows addressed to different pieces of UE. Multiplexing data units arriving from the upper layers onto the data units delivered to the physical layer and demultiplexing flows in the opposite direction. Encryption (if this has not been carried out by the RLC layer) Traffic volume measurement. Q14: List some responsibility of RLC layer: Segmentation of data units received from the next layer up (the RRC layer) into smaller data units to be forwarded to the MAC layer. Reassembling data units received from the MAC layer into larger data units for forwarding to the RRC layer. If instructed to do so, the RLC layer will also routinely acknowledge packets and retransmit those which are reported by the receiver to contain errors. Q15: List three types of communication channels (3G standards): Logical channels: data flows between the RLC blocks Transport channels: the data flows between the MAC blocks Physical channels: the data flows transmitted across the radio interface by the physical layer Q16: The top layer of the three is the RRC protocol, which handles most of the major functions in the radio network, List those functions: Setting up of physical radio channels Reporting of radio measurements Transport of Signaling messages between the mobile and the core network It also instructs the RLC layer whether or not to acknowledge packets. Q17: The three protocols (MAC/RLC/RRC) and the physical layer protocol PHY are classified together in the standards as the access stratum Note: The level which provides the UE with access to the core network Prepared by: Dr. Saatchi, Seyed Mohsen 6

7 Q18: Radio network controller needs to interact with the core network. Q19: Radio network controller needs to interact with the core network, this will done by using a protocol called RANAP. Q20: The RANAP, which is used to interact with the SGSN (and also the MSC in the circuit-switched domain). Q21: RANAP makes use of a version of the standard Signaling protocol used in the circuit-switched domain, Signaling System No. 7 (SS7). Q22: The version of SS7 used in RANAP has been modified to run over ATM. Prepared by: Dr. Saatchi, Seyed Mohsen 7

8 Q23: At the very top of the stack is the non-access stratum (NAS), which handles direct Signaling between the mobile and the core network. Q24: In the 3G packet domain, the principal constituent of the non-access stratum is the GMM protocol. Q25: IP addressing in fixed networks is hierarchical Network/subnetwork address and Host address. Q26: IP addressing in fixed networks is hierarchical is used for routing purposes Q27: List some problems of Mobility in IP-based Mobile networks in 3G If a device were to move from one subnetwork to another: It could be come invisible at the subnetwork routing level, since the top-level routing would direct the packets to the previous subnetwork. Since its IP address would almost certainly not match the addressing scheme of the new subnetwork, messages from the device might also be rejected by firewalls checking for valid source addresses. Prepared by: Dr. Saatchi, Seyed Mohsen 8

9 Q28: How to solve problem of Mobility in IP-based Mobile networks in 3G Solving the mobility problem for mobile data communication, therefore, depends on using the location information the network holds, in order to make the IP addressing system continue to work as the mobile moves from one subnetwork to another. A clever solution is for the network to put each IP packet inside another IP packet. The outer packet can then be used to get the message to the router to which the mobile device is currently connected, at which point this router extracts the inner packet and sends it directly to the mobile device. This approach is known as tunneling, and in GPRS and 3G it is provided using the GPRS tunneling protocol (GTP). Q29: GTP stands for GPRS tunneling protocol Q30: What will happen when an IP packet arrives at the GGSN from an external IP network addressed to an active mobile: GGSN adds the GTP header and the UDP header and puts the result in an IP packet addressed to the radio network controller in whose area the mobile is located. GGSN sends the packet through the appropriate tunnel, which ends at the relevant RNC. The RNC then extracts the inner IP packet and forwards it to the user equipment using the RRC protocol and the lower layers in the access stratum. The UE then handles the IP packet just as if it had received it from a local IP router. Prepared by: Dr. Saatchi, Seyed Mohsen 9

10 Q31: Packets from the UE to the GGSN follow a similar process and are routed by the GGSN to a specific external IP network depending on the session associated with the user traffic tunnel through which the packet arrived. Q32: What does the inner and outer level represent: Inner level represents the packet to be sent through the tunnel Outer level consists of the headers added by the tunnelling protocol. Q33: GTP uses the user datagram protocol (UDP) to send the tunnelled packets and also adds its own control header, which is used, among other things, to identify which tunnel is which. Q34: In GTP the session information in the packet-switched side of the network is stored in a series of tables maintained by the SGSN and the GGSN called the packet data protocol (PDP) context. Q35: In GTP structure each session is directed to a particular network physically connected to one GGSN, and this network is identified by a uniform resource locator (URL) known as the access point name (APN). Q36: In GTP structure the APN and the tunnel identifiers are held as part of the PDP context tables. Q37: Typical APNs point towards the internet via a network belonging to an internet service provider (ISP), or to a corporate data network. Prepared by: Dr. Saatchi, Seyed Mohsen 10

11 Q38: In addition to data transfers to single recipients, 3G also offers a multicast streaming and download service called the multimedia broadcast and multicast service (MBMS). Q39: MBMS stands for Multimedia broadcast and multicast service Q40: MBMS the Multimedia broadcast and multicast service allows an IP multicast tree to be constructed within the mobile network, eliminating the need to send multiple copies of the data across the network. Q41: Most networks offer additional facilities associated with the voice service, known as supplementary services. Q42: List some of supplementary services: Call forwarding, call on hold, notification of a waiting incoming call, conference calls, prevention of calls to or from a mobile handset, voice mail 3G networks allow video calls The user requests a video call using the normal phone number and the network attempts to set it up with the called party. Second most popular service offered by mobile networks (after voice calls) is texting, or SMS (short message service). Q43: In the circuit-switched domain, the Signaling required to set up and clear down calls uses the ISDN SS7 protocol, which can be seen as an early packet-based protocol. Q44: Text messaging makes use of the SS7 protocol to deliver the messages, avoiding the need to reserve bandwidth to transmit a message. Q45: Internet Access: the user is connected to the internet via an internet service provider working in partnership with the mobile network. Q46: Access to corporate networks through a virtual private network (VPN): typically utilize an IPsec tunnel in order to provide an additional layer of security. Note: IPsec is a set of protocols for making IP communication more secure. Prepared by: Dr. Saatchi, Seyed Mohsen 11

12 Q47: Multimedia Messaging Service (MMS): allows still pictures, video clips and audio messages to be sent, as well as much longer text messages than SMS permits. Q48: Streaming services present audiovisual content to the mobile device for buffering and immediate replay Q49: List two types of video streaming service: Mobile TV User can choose from a number of channels but is constrained by a programme schedule Content-on-demand. Content is downloaded to the mobile device and can be replayed several times The content provider may restrict the number of times the content can be played or specify an expiry date beyond which it is no longer available. Q50: How data services are provided? The user is provided with a standard APN, which is a URL specific to the mobile network and which needs to be selected as a setting on a mobile device or on a USIM card associated with the device The APN points towards the GGSN interface connected to the ISP s network, and the mobile device can use this to set up web browsing sessions. Prepared by: Dr. Saatchi, Seyed Mohsen 12

13 Q50: How data (Multimedia Messaging) services are provided? Multimedia messaging is similar in one way to text messaging, in that it makes use of a multimedia messaging centre (MMSC) which is used to store and forward messages. Unlike the SMSC, however, the MMSC is a fully IP-based device which can only be accessed through an IP network. When the user wants to send a message, the user equipment sets up a session using an APN (URL) pointing to the MMSC. Prepared by: Dr. Saatchi, Seyed Mohsen 13

14 Q51: How an authentication will process function in 2G and 3G? In 2G, authentication is the process used to prove to the network that the mobile device is genuine and allowed to use the network. In 3G, the process is mutual; it also allows the mobile to prove to itself that the network is genuine. In both 2G and 3G, authentication is a function of the non-access stratum Takes place between the user equipment (actually the USIM card) and the core network without the intervention of the radio access network. 1. On receipt of an authentication request, the SGSN sends a request to the AuC to begin the authentication process. 2. The AuC does this by calculating an authentication vector (AV), which is a sequence of, which includes the following five components: RAND : a random number. AUTN : the authentication token, which depends among other things on a sequence number SQN, which the UE and the AuC synchronise between them, and the random number RAND. XRES : an expected result, to be used by the SGSN to check the authentication response from the UE. Prepared by: Dr. Saatchi, Seyed Mohsen 14

15 CK : a temporary cipher key, to be used to encrypt the user data until the next authentication request. IK : a temporary integrity key, to be used to verify the integrity of Signaling messages to and from the UE. 3. SQN and RAND are used to prove that the AV has been freshly generated, to prevent replay attacks based on captured AVs. Good Luck,,, Prepared by: Dr. Saatchi, Seyed Mohsen 15

UMTS System Architecture and Protocol Architecture

UMTS System Architecture and Protocol Architecture UMTS System Architecture and Protocol Architecture Overview on overall system architecture UMTS network architecture and elements Mobile station High-level functions UMTS domains and strata UMTS/GPRS protocol

More information

UMTS Addresses and Identities Mobility and Session Management

UMTS Addresses and Identities Mobility and Session Management UMTS Addresses and Identities Mobility and Session Management - Numbering, addressing and location identities - UE modes - Mobility management - Session management and QoS Numbering, Addressing and Location

More information

New service standardisation approach

New service standardisation approach UMTS Part of the IMT 2000 family 3 nd Generation digital cellular mobile system Approximately old (GSM + GPRS) core network + new radio access network (UTRAN) including new radio interface (WCDMA) New

More information

EP B1 (19) (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION

EP B1 (19) (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION (19) (11) EP 1 432 271 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.06. Bulletin /26 (1) Int Cl.: H04W 12/06 (09.01) H04L 9/32 (06.01) H04W 12/02

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

DAY 2. HSPA Systems Architecture and Protocols

DAY 2. HSPA Systems Architecture and Protocols DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

A Flow Label Based QoS Scheme for End-to-End Mobile Services

A Flow Label Based QoS Scheme for End-to-End Mobile Services A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract

More information

3GPP TS V9.2.0 ( )

3GPP TS V9.2.0 ( ) TS 29.281 V9.2.0 (2010-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; General Packet Radio System (GPRS) Tunnelling Protocol User

More information

3GPP TS V ( )

3GPP TS V ( ) TS 29.281 V11.5.0 (2012-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; General Packet Radio System (GPRS) Tunnelling Protocol

More information

Configuring Security on the GGSN

Configuring Security on the GGSN CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco

More information

COPYRIGHTED MATERIAL. Contents. 1 Short Message Service and IP Network Integration 1. 2 Mobility Management for GPRS and UMTS 39

COPYRIGHTED MATERIAL. Contents. 1 Short Message Service and IP Network Integration 1. 2 Mobility Management for GPRS and UMTS 39 Acknowledgments Introduction xv xvii 1 Short Message Service and IP Network Integration 1 1.1 SMS-IP Integration with SM-SC 3 1.1.1 NCTU Short Message System 4 1.1.2 Statistics for SMS Delivery 7 1.2 isms

More information

1. Do the Create PDP or Update PDP requests from the SGSN arrive at the GGSN?

1. Do the Create PDP or Update PDP requests from the SGSN arrive at the GGSN? Contents Introduction Background Information GGSN Behavior Cause Code 192 Error Example Scenarios Introduction This document describes the behavior of the Gateway General Packet Radio Service (GPRS) Supporting

More information

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003

More information

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros

More information

General Packet Radio Service (GPRS) 13 年 5 月 17 日星期五

General Packet Radio Service (GPRS) 13 年 5 月 17 日星期五 General Packet Radio Service (GPRS) What is GPRS? GPRS (General Packet Radio Service) A packet oriented data service for IP and X.25 over GSM networks Enables packet-switched services on the resources

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

Communication Systems for the Mobile Information Society

Communication Systems for the Mobile Information Society Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix

More information

GPRS System Architecture

GPRS System Architecture 1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet

More information

GSM and Similar Architectures Lesson 13 GPRS

GSM and Similar Architectures Lesson 13 GPRS GSM and Similar Architectures Lesson 13 GPRS 1 Two switching modes Circuit Switching Packet switching 2 Circuit switching A connection first sets up Then the entire data transmits through the path that

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016 Communication and Distributed Systems Seminar on : LTE Security By Anukriti Shrimal May 09, 2016 LTE network with interfaces LTE Security 2 Contents LTE Security : Why, What, How EPS Architecture Design

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Contents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications

Contents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications Royal Holloway, University of London, IC3 Network Security, 13 November 2006 Contents GSM and UMTS Security Introduction to mobile telecommunications Second generation systems - GSM security Third generation

More information

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Lili Gu RMIT University Melbourne, Australia l.gu@student.rmit.edu.au Abstract As defined in the 3GPP specifications, a UMTS user device

More information

GPRS for Mobile Internet

GPRS for Mobile Internet GPRS for Mobile Internet Emmanuel Seurre Patrick Savelli Pierre-Jean Pietri Artech House Boston London www. artechhouse. com Contents Acknowledgments xiii Introduction to the GSM System 1 1.1 1.1.1 1.1.2

More information

3G/UMTS Complete Mobile Originated Circuit Switched Call Setup. July 2009, Turin

3G/UMTS Complete Mobile Originated Circuit Switched Call Setup. July 2009, Turin 3G/UMTS Complete Mobile Originated Circuit Switched Call Setup July 2009, Turin 1. System Information (BCCH) The UE reads the System Information that is broadcast on BCCH. The information is not read

More information

5. Functions and Procedures within GPRS

5. Functions and Procedures within GPRS GPRS Functions Page 41 5. Functions and Procedures within GPRS Within GPRS-Networks a large row of Functions and procedures have to be realised to enable the transport of packet switched data. These Functions

More information

System Architecture Evolution

System Architecture Evolution System Architecture Evolution Contents 2.1 Architecture of LTE 2.2 Communication Protocols 2.3 Example Information Flows 2.4 Bearer Management 2.5 State Diagrams 2.6 Spectrum Allocation 2.1 Architecture

More information

End-to-end IP Service Quality and Mobility - Lecture #6 -

End-to-end IP Service Quality and Mobility - Lecture #6 - End-to-end IP Quality and Mobility - Lecture #6 - Special Course in Networking Technology S-38.215 vilho.raisanen@nokia.com Planned contents & draft schedule 1. Introduction Jan 13th 2. Characteristics

More information

Understand iwag Solution for 3G Mobile Data

Understand iwag Solution for 3G Mobile Data Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services

More information

WIDESTAR II Satellite Core Network System. any Access Point Name (APN) *2 available. APNs in any way. A FAX gateway. the existing satellite system.

WIDESTAR II Satellite Core Network System. any Access Point Name (APN) *2 available. APNs in any way. A FAX gateway. the existing satellite system. WIDESTAR II Satellite Core Network System Mobile Satellite Communications Services SIP FAX Gateway Special Articles on WIDESTAR II High-speed Mobile Satellite Communications Service for Diverse Satellite

More information

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013 Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session

More information

3GPP TS V1.3.1 ( )

3GPP TS V1.3.1 ( ) Technical Specification 3 rd Generation Partnership Project (); Technical Specification Group (TSG) RAN UTRAN Iu Interface RANAP Signalling [UTS 25.413] [UTS 25.413] 2 Reference (.PDF)

More information

GPRS security. Helsinki University of Technology S Security of Communication Protocols

GPRS security. Helsinki University of Technology S Security of Communication Protocols GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting

More information

The Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough

The Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough The Evolution and Future of Mobile Communication Systems Written by David G Ainscough Copyright 2001 D.G.Ainscough Chapter 5 : UMTS (Universal Mobile Telecommunication System)...3 5.1 UMTS Introduction...5

More information

Overview of GPRS and UMTS

Overview of GPRS and UMTS CHAPTER 1 This chapter briefly introduces the 2.5G General Packet Radio Service (GPRS) and the 3G Universal Mobile Telecommunications System (UMTS) technologies, and their implementation in Cisco Gateway

More information

COOPERATIVE PATENT CLASSIFICATION

COOPERATIVE PATENT CLASSIFICATION CPC H04T 2014.07 Interleaved page 1 CPC COOPERATIVE PATENT CLASSIFICATION H04T INDEXING SCHEME RELATING TO STANDARDS FOR ELECTRIC COMMUNICATION TECHNIQUE ( CLASS H04 ) This scheme constitutes an nonassociated

More information

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一 Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA LTE was designed as a data

More information

USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006

USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 Hyeyeon Kwon, Kyung-yul Cheon, Kwang-hyun Roh, Aesoon Park Electronics and Telecommunications Research Institute 161, Gajeong-dong,

More information

Sh Gy. Ro Gx. Cx Ici. Mr Mj

Sh Gy. Ro Gx. Cx Ici. Mr Mj Sh Ro Cx Ici SIP UT IMS Sv LTE Mr Mj Mi Mg ISC Mw LTE / VoLTE IMS Protocols Interfaces LTE Protocol Stack IMS Protocol Stack LTE (4G) IMS PSTN / LTE Ex : S1, S5, SGi LTE Control Plane Ex : S1, S10, S11,

More information

UMTS. Antti Siitonen. Technologist, MSc (EE), Radiolinja

UMTS. Antti Siitonen. Technologist, MSc (EE), Radiolinja UMTS Technologist, MSc (EE), Radiolinja Antti.Siitonen@radiolinja.fi T-110.300 Telecommunications architectures Lectures on 15.11.2001 Introduction to UMTS 1 Contents 1. Introduction to UMTS 1.1. Standards

More information

End-to-end IP Service Quality and Mobility - Lecture #5 -

End-to-end IP Service Quality and Mobility - Lecture #5 - End-to-end IP Service Quality and Mobility - Lecture #5 - Special Course in Networking Technology S-38.215 vilho.raisanen@nokia.com Planned contents & draft schedule 1. Introduction Jan 13th 2. Characteristics

More information

Security functions in mobile communication systems

Security functions in mobile communication systems Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

ETSI TS V3.1.0 ( )

ETSI TS V3.1.0 ( ) Technical Specification Universal Mobile Telecommunications System (UMTS); UTRAN Iu Interface RANAP Signalling () 1 Reference RTS/TSGR-0325413UR1 Keywords UMTS 650 Route des Lucioles F-06921 Sophia Antipolis

More information

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality

More information

UNIK4230: Mobile Communications Spring Semester, Per Hj. Lehne

UNIK4230: Mobile Communications Spring Semester, Per Hj. Lehne UNIK4230: Mobile Communications Spring Semester, 2015 Per Hj. Lehne per-hjalmar.lehne@telenor.com 916 94 909 Network Architecture and Functionality 5 February 2015 Contents Network Architecture Protocol

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

3GPP TR V7.0.0 ( )

3GPP TR V7.0.0 ( ) TR 23.919 V7.0.0 (2007-06) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Direct Tunnel Deployment Guideline (Release 7) The present document

More information

LTE Security How Good Is It?

LTE Security How Good Is It? SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute

More information

Multimedia Broadcast and Multicast Service

Multimedia Broadcast and Multicast Service This chapter provides information on (MBMS) functionality on GGSN. The product Administration Guides provide examples and procedures for configuration of basic services on the system. It is recommended

More information

L6: OSI Reference Model

L6: OSI Reference Model EECS 3213 Fall 2014 L6: OSI Reference Model Sebastian Magierowski York University 1 Outline The OSI Reference Model An organized way of thinking about network design (from low-level to high-level considerations)

More information

Configuring GPRS Tunneling Protocol Support

Configuring GPRS Tunneling Protocol Support The GPRS Tunneling Protocol Support feature provides firewall support for General Packet Radio Switching (GPRS) Tunneling Protocol (GTP). GPRS is a data network architecture, which integrates with existing

More information

GPRS billing: getting ready for UMTS

GPRS billing: getting ready for UMTS GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Part V. Appendices. Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN:

Part V. Appendices. Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN: Part V Appendices Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN: 0-470-01807-0 A 3GPP Bearer Concepts In the following text, we shall review 3GPP (Third

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

JP-3GA (R99) GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR)

JP-3GA (R99) GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) JP-3GA-29.119(R99) GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) Version 1 Nov 30, 2000 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE JP-3GA-29.119(R99) GPRS Tunnelling

More information

SGSN in a 2.5G GPRS Network, page 1

SGSN in a 2.5G GPRS Network, page 1 , page 1 2.5G SGSN Configuration Components, page 2 How the 2.5G SGSN Works, page 4 Information Required for the 2.5G SGSN, page 7 This chapter outlines the basic configuration and operation of the Serving

More information

Signaling Protocol Structure in GSM

Signaling Protocol Structure in GSM GSM Signaling Protocol Structure in GSM Signaling Protocol Structure in GSM Layer 1 is the physical layer which uses the channel structures over the air interface. Layer 2 is the data link layer and across

More information

GTP-U Service Configuration Mode Commands

GTP-U Service Configuration Mode Commands GTP-U Service Configuration Mode Commands The GTP-U Service Configuration Mode is used to manage parameters applied to incoming GTP-U packets. Important The commands or keywords/variables that are available

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology

More information

3GPP TS V ( )

3GPP TS V ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Evolved Packet System (EPS); Sv interface (MME to MSC, and SGSN to MSC) for SRVCC ()

More information

dit Efficiency Issues in MPLS Transport for the UMTS Access Network E. Vázquez, M. Álvarez-Campana, A. B. García

dit Efficiency Issues in MPLS Transport for the UMTS Access Network E. Vázquez, M. Álvarez-Campana, A. B. García Efficiency Issues in MPLS Transport for the UMTS Access Network E. Vázquez, M. Álvarez-Campana, A. B. García Dept. of Telematic Engineering Technical University of Madrid, Spain www..upm.es 1 Outline in

More information

3GPP TS V ( )

3GPP TS V ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN Iu interface RANAP signalling (Release 1999) The present document has been developed

More information

UMTS Terminal Equipment For All-IP Based Communications

UMTS Terminal Equipment For All-IP Based Communications UMTS Terminal Equipment For All-IP Based Communications M. Ricardo 1,2, J. Dias 3,2, G. Carneiro 2, J. Ruela 1,2 1. Faculdade de Engenharia da Universidade do Porto, Rua Dr. Roberto Frias, 4200, Porto,

More information

ETSI TS V3.4.0 ( )

ETSI TS V3.4.0 ( ) TS 133 103 V3.4.0 (2000-10) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Integration Guidelines (3GPP TS 33.103 version 3.4.0 Release 1999) 1 TS 133 103 V3.4.0

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room

More information

TS V6.1.0 ( )

TS V6.1.0 ( ) Technical Specification Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); Interworking between the Public Land Mobile Network (PLMN) supporting GPRS and Packet

More information

ETSI TS V6.4.0 ( )

ETSI TS V6.4.0 ( ) TS 101 348 V6.4.0 (2001-02) Technical Specification Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); Interworking between the Public Land Mobile Network (PLMN)

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 101 863-6 V1.1.1 (2001-11) Technical Specification Digital Enhanced Cordless Telecommunications (); / Interworking Profile (IWP); Part 6: Packet switched data 2 TS 101 863-6 V1.1.1 (2001-11) Reference

More information

POWER-ON AND POWER-OFF PROCEDURES

POWER-ON AND POWER-OFF PROCEDURES POWER-ON AND POWER-OFF PROCEDURES TABLE OF CONTENTS 1. Power-On Sequence 2. Network and Cell Selection 3. RRC Connection Establishment 4. Attach Procedure 5. Detach Procedure 1. POWER-ON SEQUENCE The following

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

IxLoad LTE Evolved Packet Core Network Testing: enodeb simulation on the S1-MME and S1-U interfaces

IxLoad LTE Evolved Packet Core Network Testing: enodeb simulation on the S1-MME and S1-U interfaces IxLoad LTE Evolved Packet Core Network Testing: enodeb simulation on the S1-MME and S1-U interfaces IxLoad is a full-featured layer 4-7 test application that provides realworld traffic emulation testing

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

UMTS Services. Part I: Basics Bearer services and teleservices Supplementary services Multimedia services QoS architecture

UMTS Services. Part I: Basics Bearer services and teleservices Supplementary services Multimedia services QoS architecture UMTS Services Part I: Basics Bearer services and teleservices Supplementary services Multimedia services QoS architecture References Kaaranen, et al, Ch. 7 Walke, et al, ch. 10 3GPP TS 22.101: service

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

Cisco IP Fragmentation and PMTUD

Cisco IP Fragmentation and PMTUD Table of Contents IP Fragmentation and PMTUD...1 Introduction...1 IP Fragmentation and Reassembly...1 Issues with IP Fragmentation...3 Avoiding IP Fragmentation: What TCP MSS Does and How It Works...4

More information

Table of Contents. Computer Networks and the Internet

Table of Contents. Computer Networks and the Internet Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1

More information

WIRELESS SYSTEM AND NETWORKING

WIRELESS SYSTEM AND NETWORKING LECTURE 6 WIRELESS SYSTEM AND NETWORKING References: Rappaport (Chapter 9 and 10) Bernhard (Chapter 3, 4 and 5) Garg (Chapter 8 and 9) Kaarenen (Chapter 1-5 and 9) WIRELESS EVOLUTION Japan Europe Americas

More information

WCDMA evolution: HSPA and MBMS

WCDMA evolution: HSPA and MBMS Chapter: 3G Evolution 8 WCDMA evolution: HSPA and MBMS Isael Diaz isael.diaz@eit.lth.se Department of Electrical and Information Technology 02-Apr-2009 3G Evolution - HSPA and LTE for Mobile Broadband

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 4A0-M02 Title : Alcatel-Lucent Mobile Gateways for the LTE Evolved Packet Core Version : Demo 1 / 7

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15

More information

System Enhancements for Accessing Broadcast Services in All-IP Networks. Motivation

System Enhancements for Accessing Broadcast Services in All-IP Networks. Motivation System Enhancements for ing Broadcast Services in All-IP Networks Patrick Stupar, Krishna Pandit, and Wolfgang Granzow Qualcomm CDMA Technologies GmbH Motivation 54.2 % 18.0 % 23.1 % 36.4 % Over 4 billion

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

IPv6 in 2G and 3G Networks. John Loughney. North American IPv6 Forum 2004

IPv6 in 2G and 3G Networks. John Loughney. North American IPv6 Forum 2004 IPv6 in 2G and 3G Networks John Loughney North American IPv6 Forum 2004 Introduction Relevant IPv6 Status in the IETF Relevant IPv6 Status in 3GPP Relevant IPv6 Status in 3GPP2 Conclusion What IPv6 Brings

More information

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess

More information

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009 VPN and IPsec Network Administration Using Linux Virtual Private Network and IPSec 04/2009 What is VPN? VPN is an emulation of a private Wide Area Network (WAN) using shared or public IP facilities. A

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information