T325 Summary T305 T325 B BLOCK 2 4 PART III T325. Session 1 Block III Part 2 Section 2 - Continous Network Architecture. Dr. Saatchi, Seyed Mohsen

Similar documents
UMTS System Architecture and Protocol Architecture

UMTS Addresses and Identities Mobility and Session Management

New service standardisation approach

EP B1 (19) (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION

GPRS and UMTS T

DAY 2. HSPA Systems Architecture and Protocols

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

A Flow Label Based QoS Scheme for End-to-End Mobile Services

3GPP TS V9.2.0 ( )

3GPP TS V ( )

Configuring Security on the GGSN

COPYRIGHTED MATERIAL. Contents. 1 Short Message Service and IP Network Integration 1. 2 Mobility Management for GPRS and UMTS 39

1. Do the Create PDP or Update PDP requests from the SGSN arrive at the GGSN?

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

General Packet Radio Service (GPRS) 13 年 5 月 17 日星期五

4 rd class Department of Network College of IT- University of Babylon

Communication Systems for the Mobile Information Society

GPRS System Architecture

GSM and Similar Architectures Lesson 13 GPRS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

Networking interview questions

Contents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS

GPRS for Mobile Internet

3G/UMTS Complete Mobile Originated Circuit Switched Call Setup. July 2009, Turin

5. Functions and Procedures within GPRS

System Architecture Evolution

End-to-end IP Service Quality and Mobility - Lecture #6 -

Understand iwag Solution for 3G Mobile Data

WIDESTAR II Satellite Core Network System. any Access Point Name (APN) *2 available. APNs in any way. A FAX gateway. the existing satellite system.

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

3GPP TS V1.3.1 ( )

GPRS security. Helsinki University of Technology S Security of Communication Protocols

The Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough

Overview of GPRS and UMTS

COOPERATIVE PATENT CLASSIFICATION

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一

USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006

Sh Gy. Ro Gx. Cx Ici. Mr Mj

UMTS. Antti Siitonen. Technologist, MSc (EE), Radiolinja

End-to-end IP Service Quality and Mobility - Lecture #5 -

Security functions in mobile communication systems

IPSec. Overview. Overview. Levente Buttyán

ETSI TS V3.1.0 ( )

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

UNIK4230: Mobile Communications Spring Semester, Per Hj. Lehne

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

3GPP TR V7.0.0 ( )

LTE Security How Good Is It?

Multimedia Broadcast and Multicast Service

L6: OSI Reference Model

Configuring GPRS Tunneling Protocol Support

GPRS billing: getting ready for UMTS

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Part V. Appendices. Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN:

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

JP-3GA (R99) GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR)

SGSN in a 2.5G GPRS Network, page 1

Signaling Protocol Structure in GSM

GTP-U Service Configuration Mode Commands

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

3GPP TS V ( )

dit Efficiency Issues in MPLS Transport for the UMTS Access Network E. Vázquez, M. Álvarez-Campana, A. B. García

3GPP TS V ( )

UMTS Terminal Equipment For All-IP Based Communications

ETSI TS V3.4.0 ( )

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Telecommunication Services Engineering Lab

TS V6.1.0 ( )

ETSI TS V6.4.0 ( )

ETSI TS V1.1.1 ( )

POWER-ON AND POWER-OFF PROCEDURES

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

IxLoad LTE Evolved Packet Core Network Testing: enodeb simulation on the S1-MME and S1-U interfaces

PLEASE READ CAREFULLY BEFORE YOU START

UMTS Services. Part I: Basics Bearer services and teleservices Supplementary services Multimedia services QoS architecture

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Cisco IP Fragmentation and PMTUD

Table of Contents. Computer Networks and the Internet

WIRELESS SYSTEM AND NETWORKING

WCDMA evolution: HSPA and MBMS

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Telecommunication Services Engineering Lab

System Enhancements for Accessing Broadcast Services in All-IP Networks. Motivation

Operating Systems CS 571

ET4254 Communications and Networking 1

4. The transport layer

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

IPv6 in 2G and 3G Networks. John Loughney. North American IPv6 Forum 2004

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

SIMULATION FRAMEWORK MODELING

Transcription:

T305 T325 B BLOCK 2 4 PART III T325 Summary Session 1 Block III Part 2 Section 2 - Continous Network Architecture [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by: Dr. Saatchi, Seyed Mohsen T325

Block III Network Architecture Q1: Different protocols are used for 2G, 2.5G and 3G Q2: 2G and 2.5G : different protocol stacks are used for the control plane and the user plane Q3: 3G : same protocols are used for the control place and the user plane Q4: What is the different between 2G, 2.5G and 3G in using the protocols. 2G and 2.5G : different protocol stacks are used for the control plane and the user plane 3G : same protocols are used for the control place and the user plane Q5: Mention the protocols used in empty places for the layered protocols in 3G packet domain. Prepared by: Dr. Saatchi, Seyed Mohsen 2

Q6: Each service provides data in blocks called data units Q7: The set of blocks at each node is often known as the protocol stack Q8: The set of blocks at each node is often known as the protocol stack, give an example: PHY protocol: UE and Node B GPRS mobility management (GMM): UE and the SGSN Q9: in previous figure The UE and SGSN are not adjacent on the diagram, which means the GMM messages are carried over the intermediate nodes (Node B and RNC) by lower level protocols; in this case the radio resource control (RRC) and radio access network application protocol (RANAP). Q10: In previous figure these transport the GMM messages but do not alter them in any way, so the intermediate nodes are invisible to the GMM protocol. Prepared by: Dr. Saatchi, Seyed Mohsen 3

Q11: Each block can be thought of as communicating with the block of the same name at the other end point using the services of the layers below. Q12: Radio Link control (RLC) block in the RNC communicates with the RLC block in the UE, using the services of the medium access control (MAC) and PHY layers. Q13: Blocks communicating in this way are said to be communicating on a peer-topeer basis and the two blocks are often referred to as peer entities. Q14: Protocol interworking: A node converts from one protocol to another in each direction. Example: At the lowest level, the Node B has blocks labeled PHY and ATM Prepared by: Dr. Saatchi, Seyed Mohsen 4

Q15: Protocol interworking: A node converts from one protocol to another in each direction. Q16: The blocks labeled PHY refer to the physical layer of the radio interface, which comprises a number of different physical channels Q17: In 3G, the primary means of sharing the allocated radio bandwidth between these channels is W-CDMA Q18: What does the physical channels are used for: User traffic Transport of Signaling messages Management of the radio link itself. Q19: PHY interworks at the Node B with the ATM protocol Q10: ATM protocol is used to transport user traffic and Signaling messages across the fixed part of the network from the Node B to the SGSN (and the MSC for circuitswitched traffic) via the RNC Q11: The RRC, RLC and Mac protocols to consider are those which are used to manage the flow of data between the UE and the radio access network and to control the allocation of radio channels. Note: The end points for all of these protocols are the UE and the RNC (except for one specific case which need not concern us here). Prepared by: Dr. Saatchi, Seyed Mohsen 5

Q12: This means that in virtually all cases the; Node B does not participate in these protocols it simply forwards the data to the UE Q13: List some MAC Layer : Principal functions Prioritization between: data flows addressed to a single piece of UE data flows addressed to different pieces of UE. Multiplexing data units arriving from the upper layers onto the data units delivered to the physical layer and demultiplexing flows in the opposite direction. Encryption (if this has not been carried out by the RLC layer) Traffic volume measurement. Q14: List some responsibility of RLC layer: Segmentation of data units received from the next layer up (the RRC layer) into smaller data units to be forwarded to the MAC layer. Reassembling data units received from the MAC layer into larger data units for forwarding to the RRC layer. If instructed to do so, the RLC layer will also routinely acknowledge packets and retransmit those which are reported by the receiver to contain errors. Q15: List three types of communication channels (3G standards): Logical channels: data flows between the RLC blocks Transport channels: the data flows between the MAC blocks Physical channels: the data flows transmitted across the radio interface by the physical layer Q16: The top layer of the three is the RRC protocol, which handles most of the major functions in the radio network, List those functions: Setting up of physical radio channels Reporting of radio measurements Transport of Signaling messages between the mobile and the core network It also instructs the RLC layer whether or not to acknowledge packets. Q17: The three protocols (MAC/RLC/RRC) and the physical layer protocol PHY are classified together in the standards as the access stratum Note: The level which provides the UE with access to the core network Prepared by: Dr. Saatchi, Seyed Mohsen 6

Q18: Radio network controller needs to interact with the core network. Q19: Radio network controller needs to interact with the core network, this will done by using a protocol called RANAP. Q20: The RANAP, which is used to interact with the SGSN (and also the MSC in the circuit-switched domain). Q21: RANAP makes use of a version of the standard Signaling protocol used in the circuit-switched domain, Signaling System No. 7 (SS7). Q22: The version of SS7 used in RANAP has been modified to run over ATM. Prepared by: Dr. Saatchi, Seyed Mohsen 7

Q23: At the very top of the stack is the non-access stratum (NAS), which handles direct Signaling between the mobile and the core network. Q24: In the 3G packet domain, the principal constituent of the non-access stratum is the GMM protocol. Q25: IP addressing in fixed networks is hierarchical Network/subnetwork address and Host address. Q26: IP addressing in fixed networks is hierarchical is used for routing purposes Q27: List some problems of Mobility in IP-based Mobile networks in 3G If a device were to move from one subnetwork to another: It could be come invisible at the subnetwork routing level, since the top-level routing would direct the packets to the previous subnetwork. Since its IP address would almost certainly not match the addressing scheme of the new subnetwork, messages from the device might also be rejected by firewalls checking for valid source addresses. Prepared by: Dr. Saatchi, Seyed Mohsen 8

Q28: How to solve problem of Mobility in IP-based Mobile networks in 3G Solving the mobility problem for mobile data communication, therefore, depends on using the location information the network holds, in order to make the IP addressing system continue to work as the mobile moves from one subnetwork to another. A clever solution is for the network to put each IP packet inside another IP packet. The outer packet can then be used to get the message to the router to which the mobile device is currently connected, at which point this router extracts the inner packet and sends it directly to the mobile device. This approach is known as tunneling, and in GPRS and 3G it is provided using the GPRS tunneling protocol (GTP). Q29: GTP stands for GPRS tunneling protocol Q30: What will happen when an IP packet arrives at the GGSN from an external IP network addressed to an active mobile: GGSN adds the GTP header and the UDP header and puts the result in an IP packet addressed to the radio network controller in whose area the mobile is located. GGSN sends the packet through the appropriate tunnel, which ends at the relevant RNC. The RNC then extracts the inner IP packet and forwards it to the user equipment using the RRC protocol and the lower layers in the access stratum. The UE then handles the IP packet just as if it had received it from a local IP router. Prepared by: Dr. Saatchi, Seyed Mohsen 9

Q31: Packets from the UE to the GGSN follow a similar process and are routed by the GGSN to a specific external IP network depending on the session associated with the user traffic tunnel through which the packet arrived. Q32: What does the inner and outer level represent: Inner level represents the packet to be sent through the tunnel Outer level consists of the headers added by the tunnelling protocol. Q33: GTP uses the user datagram protocol (UDP) to send the tunnelled packets and also adds its own control header, which is used, among other things, to identify which tunnel is which. Q34: In GTP the session information in the packet-switched side of the network is stored in a series of tables maintained by the SGSN and the GGSN called the packet data protocol (PDP) context. Q35: In GTP structure each session is directed to a particular network physically connected to one GGSN, and this network is identified by a uniform resource locator (URL) known as the access point name (APN). Q36: In GTP structure the APN and the tunnel identifiers are held as part of the PDP context tables. Q37: Typical APNs point towards the internet via a network belonging to an internet service provider (ISP), or to a corporate data network. Prepared by: Dr. Saatchi, Seyed Mohsen 10

Q38: In addition to data transfers to single recipients, 3G also offers a multicast streaming and download service called the multimedia broadcast and multicast service (MBMS). Q39: MBMS stands for Multimedia broadcast and multicast service Q40: MBMS the Multimedia broadcast and multicast service allows an IP multicast tree to be constructed within the mobile network, eliminating the need to send multiple copies of the data across the network. Q41: Most networks offer additional facilities associated with the voice service, known as supplementary services. Q42: List some of supplementary services: Call forwarding, call on hold, notification of a waiting incoming call, conference calls, prevention of calls to or from a mobile handset, voice mail 3G networks allow video calls The user requests a video call using the normal phone number and the network attempts to set it up with the called party. Second most popular service offered by mobile networks (after voice calls) is texting, or SMS (short message service). Q43: In the circuit-switched domain, the Signaling required to set up and clear down calls uses the ISDN SS7 protocol, which can be seen as an early packet-based protocol. Q44: Text messaging makes use of the SS7 protocol to deliver the messages, avoiding the need to reserve bandwidth to transmit a message. Q45: Internet Access: the user is connected to the internet via an internet service provider working in partnership with the mobile network. Q46: Access to corporate networks through a virtual private network (VPN): typically utilize an IPsec tunnel in order to provide an additional layer of security. Note: IPsec is a set of protocols for making IP communication more secure. Prepared by: Dr. Saatchi, Seyed Mohsen 11

Q47: Multimedia Messaging Service (MMS): allows still pictures, video clips and audio messages to be sent, as well as much longer text messages than SMS permits. Q48: Streaming services present audiovisual content to the mobile device for buffering and immediate replay Q49: List two types of video streaming service: Mobile TV User can choose from a number of channels but is constrained by a programme schedule Content-on-demand. Content is downloaded to the mobile device and can be replayed several times The content provider may restrict the number of times the content can be played or specify an expiry date beyond which it is no longer available. Q50: How data services are provided? The user is provided with a standard APN, which is a URL specific to the mobile network and which needs to be selected as a setting on a mobile device or on a USIM card associated with the device The APN points towards the GGSN interface connected to the ISP s network, and the mobile device can use this to set up web browsing sessions. Prepared by: Dr. Saatchi, Seyed Mohsen 12

Q50: How data (Multimedia Messaging) services are provided? Multimedia messaging is similar in one way to text messaging, in that it makes use of a multimedia messaging centre (MMSC) which is used to store and forward messages. Unlike the SMSC, however, the MMSC is a fully IP-based device which can only be accessed through an IP network. When the user wants to send a message, the user equipment sets up a session using an APN (URL) pointing to the MMSC. Prepared by: Dr. Saatchi, Seyed Mohsen 13

Q51: How an authentication will process function in 2G and 3G? In 2G, authentication is the process used to prove to the network that the mobile device is genuine and allowed to use the network. In 3G, the process is mutual; it also allows the mobile to prove to itself that the network is genuine. In both 2G and 3G, authentication is a function of the non-access stratum Takes place between the user equipment (actually the USIM card) and the core network without the intervention of the radio access network. 1. On receipt of an authentication request, the SGSN sends a request to the AuC to begin the authentication process. 2. The AuC does this by calculating an authentication vector (AV), which is a sequence of, which includes the following five components: RAND : a random number. AUTN : the authentication token, which depends among other things on a sequence number SQN, which the UE and the AuC synchronise between them, and the random number RAND. XRES : an expected result, to be used by the SGSN to check the authentication response from the UE. Prepared by: Dr. Saatchi, Seyed Mohsen 14

CK : a temporary cipher key, to be used to encrypt the user data until the next authentication request. IK : a temporary integrity key, to be used to verify the integrity of Signaling messages to and from the UE. 3. SQN and RAND are used to prove that the AV has been freshly generated, to prevent replay attacks based on captured AVs. Good Luck,,, Prepared by: Dr. Saatchi, Seyed Mohsen 15