04 - UMTS Traffic Management

62
8/13/2019 04 - UMTS Traffic Management http://slidepdf.com/reader/full/04-umts-traffic-management 1/62 SYSTEM TRAINING 3G/UMTS Traffic Management Training Document 6-65758 Issue 3.0 © Nokia Oyj 1 (62)  

Transcript of 04 - UMTS Traffic Management

Page 1: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 1/62

SYSTEM TRAINING

3G/UMTS Traffic Management

Training Document

6-65758Issue 3.0

© Nokia Oyj 1 (62)

 

Page 2: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 2/62

UMTS Traffic Management

The information in this doument is su!jet to han"e #ithout notie and desri!es on$y the%rodut defined in the introdution of this doumentation. This doument is intended for theuse of Nokia Net#orks& ustomers on$y for the %ur%oses of the a"reement under #hih thedoument is su!mitted' and no %art of it may !e re%rodued or transmitted in any form ormeans #ithout the %rior #ritten %ermission of Nokia Net#orks. The doument has !een

%re%ared to !e used !y %rofessiona$ and %ro%er$y trained %ersonne$' and the ustomerassumes fu$$ res%onsi!i$ity #hen usin" it. Nokia Net#orks #e$omes ustomer omments as%art of the %roess of ontinuous de(e$o%ment and im%ro(ement of the doumentation.

The information or statements "i(en in this doument onernin" the suita!i$ity' a%aity' or%erformane of the mentioned hard#are or soft#are %roduts annot !e onsidered !indin"!ut sha$$ !e defined in the a"reement made !et#een Nokia Net#orks and the ustomer.)o#e(er' Nokia Net#orks has made a$$ reasona!$e efforts to ensure that the instrutionsontained in the doument are ade*uate and free of materia$ errors and omissions. NokiaNet#orks #i$$' if neessary' e+%$ain issues #hih may not !e o(ered !y the doument.

Nokia Net#orks& $ia!i$ity for any errors in the doument is $imited to the doumentaryorretion of errors. Nokia Net#orks ,I NOT / /2ONI/ IN N4 //NT O/O IN T)I O9:/NT O O N4 :;/' INI/NT OON/<9/NTI =IN9IN; :ON/T4 O/>' that mi"ht arise from the use of thisdoument or the information in it.

This doument and the %rodut it desri!es are onsidered %roteted !y o%yri"ht aordin"to the a%%$ia!$e $a#s.

NO?I $o"o is a re"istered trademark of Nokia or%oration.

Other %rodut names mentioned in this doument may !e trademarks of their res%eti(eom%anies' and they are mentioned for identifiation %ur%oses on$y.

o%yri"ht © Nokia Oyj @003. $$ ri"hts reser(ed.

@ (62)© Nokia Oyj 6-65758

Issue 3.0

Page 3: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 3/62

ontent!

ontent!

" Mo#u$e o%&ecti'e!

2 Intro#uction to UMTS traffic management*

3 Su%!cri%er information an# #ata%a!e!+

Net,or- traffic an# ra#io connection"2

* Mo%i$it. management2

6 Se!!ion management3

+ ommunication management**

Re'ie, 0ue!tion!*1

6-65758Issue 3.0

© Nokia Oyj 3 (62)

Page 4: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 4/62

UMTS Traffic Management

" Mo#u$e o%&ecti'e!

The aim of this module is to give the student the conceptual knowledge needed

for explaining how traffic management is visualised in a UMTS network.Topics to be covered in this module include understanding the network

databases and the information stored within them. At an overview level, we will

look at the different management layers in the network.

After completing the module, the participant should be able to

• !ist and identify the databases used within the UMTS network 

• "dentify the subscriber addressing information

•  #ame the characteristics of a bearer 

• $escribe how the connection moves with the subscriber when a bearer is

in use

• %xplain what is meant by the term U&A

• !ist the procedures used to maintain mobility management in the network 

• !ist the procedures done when the mobile gains access to the network.

Also, identify how the network selection is made

• 'ith the help of the material, describe how the session management of

real time and non(real time bearers are handled through the network 

without using any references )if not otherwise stated*.

A (62)© Nokia Oyj 6-65758

Issue 3.0

Page 5: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 5/62

Se!!ion management

2 Intro#uction to UMTS trafficmanagement

'hen visualising a UMTS network, there are three ways to approach this. The

first view is from the point of view of the architecture and the functions of the

elements within the &AS and the core network subsystem. The second approach

is through the different interfaces between the mobile, &AS, and the core

network. The third approach is to look at how the data and signalling are carried

through the network )management layers*.

6i!er 6i!er 

 B8

ATM Acce!!

Internet

RAN (UTRAN GERAN) ore Net,or-

ontro$ $ane

Gate,a. $ane

STN2G

SGSN3G

SGSN GGSNRN

4S

No#e 4

No#e 4

No#e 4

5R

Au

3GMS

SE

SMS

4TS

i"ure 1. 3;C9:T net#ork arhiteture

The above figure illustrates the UMTS &elease ++ architecture, which is divided

into two planes. The control plane is responsible for the control of the

information through the network, whereas the gateway plane manages the user

data or bearer through the network.

'hen thinking of managing the subscriber within a network, there are many

 procedures used for locating and paging, as well as for control activities such as

moving and charging. 'e can think of all these activities as management

functions that the network is performing. The functions and procedures are

clearly defined in the specifications.

The functions can be divided into management layers. %ach management layer

is responsible for certain procedures. The following figure illustrates the four

management layers in the network. The higher layers reuire the functions and

6-65758Issue 3.0

© Nokia Oyj 5 (62)

Page 6: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 6/62

UMTS Traffic Management

 procedures that are used on the lower layers. -or example, you must have a

connection to the mobile before you can send or receive signalling messages.

"n UMTS networks, we can identify four network(wide layers of functionality.

Mobility Management (MM)

Session Management (SM)

Communication Management (CM)

Radio Resource Management (RRM)

UE   RAN   CN

i"ure @. 3;-net#ork mana"ement $ayers

The radio resource management )&&M* is completely covered between the

radio access network )&A#* and the user euipment )U%*, and it involves

managing how the channels are allocated. The mobility management, session

management and call control are maintained by the core network )#* domains.

There the function depends on whether the domain is S )circuit switched* or

/S )packet switched*. The higher(layer functions performed between the U%

and # are often called as communication management )M*. The M entitycovers the topics like call control )*, supplementary services )SS* and short

message service )SMS*.

The radio resource management is the lowest level and it is responsible for the

network communication with the mobile over the air interface. 'e will discuss

&&M only briefly in this module.

"n this module we will first look at how the subscriber0s information is stored.

Also the structure of the cellular network and the functions of the management

layers will be explained.

6 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 7: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 7/62

Se!!ion management

3 Su%!cri%er information an# #ata%a!e!

"nformation about the subscriber is stored in several parts of the network. This

information is used to identify the location of the subscriber when transmittingthe paging signal. The network uses uniue information to identify a subscriber,

and there are different types of databases throughout the network. Most of the

 procedures are similar compared with 1SM and 1/&S. 2ence, this chapter is

mainly of a repetitive nature.

3" Net,or- #ata%a!e!

The databases are used all the time to control activities such as paging, channel

set(up and authentication. 3ther information about the subscriber may include,

for example, rights to services, security data, and identification numbers. The

figure below summarises the databases that are found within the network.

i"ure 3. Net#ork re"isters

Since the core network will not change dramatically in the first release of

UMTS, the registers are similar to those in 1SM and 1/&S.

6-65758Issue 3.0

© Nokia Oyj 7 (62)

-iber -iber 

A4.

ATM access

Internet

Mobility CoreRAN

Control Plane

Gateway Plane

PSTN2G

SGSN

3G

SGSN GGSNRNC

SC

!"R 

AuC

#IR 

3G

MSC

SMSC

Used as anintermediate store

for SMS

Contains subscriber IDs, serviceinformation and location

attributes. In AuC subscribersecurity information and insome implementations EIR

Used to supportsubscriber services

Contains temporaryinformation on

subscriber

Contains temporaryinformation on the

subscriber

SC#P

Mo#e4TS

Tri7$eMo#e 4TS

Mo#e4TS

8DMA4TS

Mo#e4TS

GSM 4TS

Page 8: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 8/62

UMTS Traffic Management

The $isitor "ocation Register )5!&* is considered to be an integral part of the

Serving MS. The 5!& maintains mobility management related procedures

like location update, location registration, paging, and security activities. The

5!& database contains temporary copies of the active subscribers, who have

 performed a location update in its area.

The !ome "ocation Register )2!&* contains permanent data of the

subscribers. 3ne subscriber can always be in only one 2!&. The 2!& is

responsible for mobility management related procedures in both the circuit

switched and packet switched domains.

The Authentication Centre )A6Au* is a database handling the

Authentication 5ectors. These contain the parameters that the 5!& uses for

security activities performed over the "u interface. The #%ui&ment I'entity

Register )%"&* maintains the security information related to the user euipment

)U%* hardware.

The Short Message Ser(ice Centre )SMS* is an intermediate store for thereceived6sent short messages. Thus, it has signalling connections with the 5!&,

1/&S Support #odes, and 1ateway6"nterworking MS.

The "# Ser(ice Control Point )S/* nowadays has "#A/ )"ntelligent #etwork

Application /art* and6or A/ )amel Application /art* connections towards the

core network circuit switched )#(S* domain elements. The #(S domain

elements having the "# connection is called Service Switching /oints )SS/s*.

"n the packet switched domain, the 2!& is still a centralised source of

information. 2owever, two service nodes are used to supply the reuired "/

access information the)omain Name Ser(er

 )$#S* and*irewalls

. The $#S

is used for "/ address translation. As an example, when the subscriber enters an

"nternet address )for example, http66www.nokia.com*, the Serving 1/&S

Support #ode )S1S#* needs to find out which 1ateway 1/&S Support #ode

)11S#* that supports access to this address )access point*. The role of the $#S

is therefore to give the S1S# the "/ address to the 11S#. After this, the 11S#

is able to route the user0s reuest further. The 71 core network packet switched

)71 #(/S* domain with its "/ backbone network actually forms an intranet

having its own facilities available for the mobile subscribers. The border

 between the corporate networks, public "/, and 71 #(/S domain is

maintained by the -irewall Server controlling the inter(network connections and

their access.

3ther nodes )such as voice mail systems and application servers* can alsocontain subscriber and network information.

8 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 9: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 9/62

Page 10: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 10/62

UMTS Traffic Management

The MS"S$# consists of three parts

 MSISDN = CC + NDC + SN 

'here

• 9 ountry ode ): to 7 digits*

•  #$ 9 #ational $estination ode ): to 7 digits*

• S# 9 Subscriber #umber.

This number format follows the %.:<= numbering specification. 5ery often this

number is called >directory number? or @ust simply >subscriber number?.

$ue to security reasons it is very important that the uniue identity

)"MS"6"MU"* is transferred in non(ciphered mode as less as possible. -or this

 purpose, the UMTS system uses TMSI )Temporary Mobile Subscriber "dentity*

number, which is also called TM+I )Temporary Mobile User "dentity*. The

 packet switched domain of the core network allocates similar temporaryidentities for the same purpose. "n order to separate this type from the

TMS"6TMU", it is named P,TMSI )/acket Temporary Mobile Subscriber

"dentity*.

6i!er 6i!er 

 B8

ATM Acce!!

Internet

RAN (UTRAN GERAN) ore Net,or-

ontro$ $ane

Gate,a. $ane

STN2G

SGSN

3G

SGSN GGSNRN

4S

No#e 4

No#e 4

No#e 4

56R

Au

3G

MS

SE

SMS

4TS

!"MSI is allocatedfor pac#et

transactions by theS$S%.

"he "MSI&"MUI is'enerated by the ()R

and used for CStransactions

i"ure 5. Tem%orary information stored in the net#ork

TMS"6TMU" and /(TMS" are random(format numbers, which have limited

validity time and validity area. The TMS"6TMU" numbers are allocated by the

5!& and they are valid until the U% performs the next location update

 procedure. The TMS"6TMU" may also change earlier, and the network controls

this pace of change. The /(TMS" is allocated by the S1S# and it is valid over

10 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 11: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 11/62

Se!!ion management

the S1S# area. The /(TMS" is changed when the U% performs routing area

update.

IM#I )"nternational Mobile %uipment "dentity* is a number uniuely

identifying the user euipment0s hardware. There is a separate register called%"& )%uipment "dentity &egister* handling these identities. The network may

or may not ask the U% to identify itself with "M%" number either in context of

every transaction or occasionally in the cases defined by the network operator.

6i!er 6i!er 

 B8

ATM Acce!!

Internet

RAN (UTRAN GERAN) ore Net,or-

ontro$ $ane

Gate,a. $ane

STN2G

SGSN

3G

SGSN GGSNRN

4S

No#e 4

No#e 4

No#e 4

56R

Au

EIR

3G

MS

SE

SMS

4TS

RAN"he IMEI is used to trac#le'al mobile e*uipment

+optional

i"ure 6. /nsurin" termina$ e*ui%ment seurity

All the "M%" numbers are handled in three categories within the core network.

These categories are called lists, that is, 'hite !ist, 1rey !ist and lack !ist.

'hite listed "M%" numbers are normal identities, which do not have any

troubles. The grey listed "M%" numbers are under observation, and every time a

U% having grey listed "M%" used, the network produces an observation report

about the transaction. "f the accessing U% is on the black list, the network

re@ects the transaction, except in case of an emergency call.

There are several other addresses that are used. 3ne is the MSRN )Mobile

Subscriber &oaming #umber*, which is used for call routing purposes. Theformat of the MS&# is the same than MS"S$#, that is, it consists of three parts

), #$, and S#* and it follows %.:<= numbering specification. The MS&#

is used during a call set(up between the network and a subscriber on another

MS. The implementation of this explanation is beyond the scope of this

module.

6-65758Issue 3.0

© Nokia Oyj 11 (62)

Page 12: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 12/62

UMTS Traffic Management

Net,or- traffic an# ra#io connection

"n the previous chapter we looked at the type and location of information that is

stored about a subscriber within the network. "n this chapter, the focus is onhow the user traffic )also known as the user plane* is visualised in the network

and how the connection is managed in the air interface.

The first concept to clarify is the bearer. The figure below illustrates that a

 bearer is like a tunnel that goes through the different network elements and is

carried on the different network interfaces.

UE Node B RNC

Uu Iub/Iur Iu

Core Networ 

i"ure 7. Thinkin" in terms of a net#ork !earer 

The application )such as video* in the mobile has a point(to(point connection to

a remote application )such as video on another terminal*. -rom the physical 

network0s point of view, the UMTS radio access network )UT&A#* must

ensure that the bearer is maintained over the air interface and is correctly routed

to the core network.

The core network ensures that the bearer is either connected into the service

 platform, "nternet, external network or, in the case of a voice6video call, onto

the /ST# )see the figure below*. "n the case of the /ST#, the information in the

 bearer pipe must be converted to a form that is understood by the outside world.

UE Node B RNC

Uu Iub/Iur Iu

Core Network 

Data/Wireless Protocols are transparent to surrounding network 

MG8

The !W "or #!$%C per"or&s speech transcoding

i"ure 8. ata and s%eeh throu"h the !earer 

1@ (62)© Nokia Oyj 6-65758

Issue 3.0

Page 13: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 13/62

Se!!ion management

" 9aracteri!tic of a net,or- %earer  

"f you think in terms of 1SM, you probably consider the traffic channel to be

the same as a bearer in the air interface. A traffic channel does share some samecharacteristicsB for example, it can carry different types information )such as

speech and circuit switched data*. The fundamental difference between 1SM

and UMTS is that in UMTS, the bearer is fle-ible. The type of the bearer

reserved and the way it is routed through the network depends on the

subscriber0s service need. To better understand this concept, let us take two

examples.

E:am7$e "; <oice traffic

5oice reuires a data speed of, for instance, :8.8 kb6s. )The bit rate depends of

course on which speech coding method we use.* "f we add error correction

information )to ensure uality*, the total amount of data needed in the airinterface is approximately 8= kb6s. -or the interfaces within the radio access

network )"ub, "ur* and towards the circuit switched core network )"u*, the bit

rate reuired is around :<(:+ kb6s, including overhead. Therefore, we need a

connection from the mobile to the Media 1ateway that can support these bit

rates. Also, we have to take the 'elay factor into account. As subscribers we

are not tolerant of delays in our speech or video conversations. 

•  8on(ersationa$ $ass

•  5oie and (ideo

•  treamin" $ass

•  treamin" (ideo

•  Interati(e $ass

•  ,e! !ro#sin"

•  ak"round $ass

•  :ai$ do#n$oadin"

i"ure D. The different air interfae $assifiations

E:am7$e 2; Internet connection

The first characteristic to remember is that "nternet traffic is often bursty and

asymmetric )there is usually more to download than to upload*. Also, the delay

factor is not as significant as for conversation, which means that we can tolerate

more variable bit rates. 3n the other hand, the data may be very sensitive to

6-65758Issue 3.0

© Nokia Oyj 13 (62)

Page 14: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 14/62

UMTS Traffic Management

errors, compared with, for instance, voice transmission. "t means that we may

need to apply more ambitious error correction.

As a conclusion from these two cases, the network will allocate the bearer based

upon the reuest of the subscriber0s need. To be more precise, it is the radionetwork controller )&#* that makes the decision about the bearer allocation.

T.7e! an# configuration of %earer!

As with all mobile systems, the largest bottlenecks in allocating resources to a

mobile subscriber is in the air interface. This is the reason why the &# is

responsible for the bearer allocation. The air interface is limited in terms of the

maximum amount of subscribers, the maximum data  rates, the coverage area,

and uality. "n UMTS, all of these factors are linked together. "f you introduce

more people to a cell, then the siCe and bit rate reduces.

The UMTS specification defines four classifications of bearers. These were

summarised in the previous figure. The below figure illustrates typical services

and their reuired data rates. 3f course the transmission and core networks must

 be capable to support the different needsB one of the important tasks for the

network planners is to dimension the accurate capacity in the network beyond

the air interface.

$oice$oice Messages

MessagingTransactionalInfoser(ices

... browsingIntranet access)ownloa'ing

Au'io Streaming

; D :< 78 =D <= D; +< ::8 :8D :== :<; /bit0s

$i'eo Streaming$i'eotele&hony

UE Node B RNC

Uu Iub/Iur Iu

Core Network 

i"ure 10. Ty%ia$ data s%eeds needed for ommon 3; ser(ies

1A (62)© Nokia Oyj 6-65758

Issue 3.0

Page 15: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 15/62

Se!!ion management

!et us assume that a video call is to be made through the network. A dedicated

traffic channel for the air interface must then be reuested. The U% must also

inform the network about the needed classification and data speed. "t is then the

&#0s responsibility to allocate an air interface channel and to establish the

connections through to the core network.

2 4earer tran!mi!!ion in t9e net,or-

3n its @ourney throughout the network, the bearer 0sits0 in a physical channel. 3n

the connection between the TS and the &# and towards the MS6S1S#, a

 frame-structure protocol  )typically ATM* is used.

3G

SGSN

GGSN

RNC

!"R 

AuC

#IR  3G

MSC

Channels from the air interface alongthe Iub interface

Physical channels in theair interface are se&arate' by co'es

ATM lin/ to the MG. at the MSC

Pac/ets tunnelle' to theSGSN

Pac/ets tunnelle' from theSGSN to the GGSN

Pac/et )ata

)e'icate' circuit

PSTN

Internet

i"ure 11. Transmission throu"h the net#ork

The air interface also has physical channels, which are used to carry signalling

messages and data between the terminal and the network.

The above figure shows that between elements we have pipes. The networkelements ensure that the right information is moved from one pipe to another. "n

the circuit switched core network )S(#* domain, there is always a dedicated

circuit for the connection and it is only released at the end of the call.

"n the packet switched core network )/S(#*, we use tunnelling  to make a

virtual connection between "/ network elements. Although tunnelling ensures a

semi(dedicated channel in an "/ network, it is still not the same as having a

dedicated circuit in the network. asically, the tunnel enables a virtual circuit

6-65758Issue 3.0

© Nokia Oyj 15 (62)

Page 16: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 16/62

UMTS Traffic Management

 between the &# via the Serving 1/&S Support #ode )S1S#*, and towards

the 1ateway 1/&S Support #ode )11S#*.

Stu#ent E:erci!e;,hy do you think the N makes the deision on the ty%e of !earer that isa$$oated to a su!sri!erE

4earer! an# t9e #ifferent $e'e$! of =oS

 #etwork services are considered end(to(end, this means from terminal

euipment )T%* to another T%. An end(to(end service may have a certain EoS,which is provided for the user of a network service. "t is the user that decides

whether he6she is satisfied with the provided EoS or not.

To realise a certain network EoS, a bearer service with clearly defined

characteristics and functionality is to be set up from the source to the destination

of a service.

A bearer service includes all aspects to enable the provision of a contracted

EoS. These aspects are among others the control signalling, user plane

transport, and EoS management functionality. UMTS bearer service layered

architecture is depicted in the below figure )taken from the specifications*. %ach

 bearer service on a specific layer offers its individual services and uses services

 provided by the layers below.

16 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 17: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 17/62

Se!!ion management

T/ :T 9T0N 8N Iu/7;/NO7/

8N;ate#ay

T/

/nd-to-/nd er(ie

T/C:T oa$earer er(ie

9:T earer er(ie /+terna$ earer er(ie

9:T earer er(ie

0adio ess

earer er(ie

8N earer er(ie

ak!oneearer er(ie

Iu earer er(ie

0adio earer er(ie

9T0

677CT77er(ie

2hysia$

earer er(ie

'

(

#)

i"ure 1@. ayered arhiteture of the !earer ser(ies in 9:T

3" T9e en#>to>en# !er'ice an# UMTS %earer !er'ice

:3n its way from the terminal euipment )T%* to another, the traffic has to pass

different bearer services of the network)s*. A T% is connected to the UMTS

network by use of a mobile terminal )MT*. The end(to(end service on the

application level uses the bearer services of the underlying network)s*. As the

end(to(end service is conveyed over several networks )not only UMTS*, it is not

sub@ect for further elaboration in the present document.

The end(to(end(service used by the T% will be realised using a T%6MT local

 bearer service, a UMTS bearer service, and an external bearer service.

T%6MT local bearer service is not further elaborated here as this bearer service is

outside the scope of the UMTS network.

"t is the various services offered by the UMTS bearer service that the UMTS

operator offers. "n other words, it provides the UMTS EoS.

The external bearer service is not further elaborated here as this bearer may be

using several network services, such as another UMTS bearer service.

6-65758Issue 3.0

© Nokia Oyj 17 (62)

Page 18: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 18/62

UMTS Traffic Management

T9e ra#io acce!! %earer !er'ice an# t9e core net,or- %earer !er'ice

8The UMTS bearer service consists of two parts the radio access bearer service

and the core network bearer service. oth services reflects the optimised way to

realise the UMTS bearer service over the respective cellular network topologytaking into account such aspects as, for example, mobility and mobile subscriber

 profiles.

The radio access bearer service provides confidential transport of signalling and

user data between MT and # "u %dge #ode with the EoS adeuate to the

negotiated UMTS bearer service or with the default EoS for signalling. This

service is based on the characteristics of the radio interface and is maintained for

a moving MT.

T9e ra#io %earer !er'ice an# t9e Iu>%earer !er'ice

3The radio access bearer service is realised by a radio bearer service and an

"u(bearer service.

The role of the radio bearer service is to cover all the aspects of the radio

interface transport. This bearer service uses the UT&A -$$6T$$. UMTS

Terrestrial &adio Access6-reuency $ivision $uplex will be forming the

 physical layer in the first phase of UMTS. !ater also Time $ivision $uplex is

expected to be implemented.

To support uneual error protection, UT&A# and MT shall have the ability to

segment and reassemble the user flows into the different subflows reuested by

the radio access bearer service. The segmentation6reassemble is given by theS$U payload format signalled at radio access bearer establishment. The radio

 bearer service handles the part of the user flow belonging to one subflow,

according to the reliability reuirements for that subflow.

The "u(bearer service together with the physical bearer service provides the

transport between UT&A# and #. "u(bearer services for packet traffic shall

 provide different bearer services for variety of EoS.

T9e %ac-%one net,or- %earer !er'ice

= The core network bearer service uses a generic backbone network service. The backbone network service covers the !ayer :6!ayer 8 functionality and is

selected according to operator0s choice in order to fulfil the EoS reuirements of

the core network bearer service. The backbone network service is not specific to

UMTS but may reuse an existing standard.

18 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 19: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 19/62

Se!!ion management

Managing t9e %earer t9roug9 t9e net,or-

The UMTS network is responsible to establish a flexible bearer for user data

transport between the Mobile Terminal )MT* and the external networks. "n the bearer set(up phase, the EoS parameters must be known, so that the individual

network elements within the UMTS network FknowG, how to set(up the bearer.

TEe*ternalnetwork #!$ +!,%C/!!%NT UTR-N #!$ %C/%!%N

UT% B%anager 

UT% B%anager 

UT% B%anager 

R-B

anager 

CN B%ana$

ger 

IuB%ana$

ger 

E*t. B%ana$

ger 

CN B%ana$

ger 

Iu B%ana$

ger 

RadioB%

ana$ger 

RadioB%

ana$ger 

ocalB%

ana$ger 

BB N%ana$

ger 

Iu N%ana$

ger 

BB N%ana$

ger 

Iu N%ana$

ger 

UTR-ph. B%ana$

ger 

UTR-ph. B%ana$

ger 

%ubscr Control

-d&/Cap.

Control

-d&/Cap.

Control

Trans$lation

-d&/Cap.

Control

-d&/Cap.

Control

Trans$lation

i"ure 13. <o mana"ement in the ontro$ %$ane

As can be seen, a hierarchical approach is used for bearer establishment "n

order to establish a bearer in accordance to the EoS reuirements of the user?s

circuit switched application, a peer(to(peer bearer service )S* signalling

 between the MT, MS, and )1*MS takes place. "n case of a packet orientated

service reuest, bearer related signalling and control information must be

exchanged between the MT, S1S#, and 11S#. )"n the next lines, we refer to

MT, S1S#, and 11S#. /lease note, that there is no significant difference for

the circuit switched case.* The peer(to(peer signalling is necessary, so that the

affected network elements can determine the reuired EoS parameters for theend(to(end bearer. "f one network element is not capable to establish the bearer,

a re(negotiation can be initiated to find an alternative bearer H if the user?s

application permits it H or the UMTS /!M# is not capable to offer the

reuested service.

"f the UMTS bearer service )S* manager use the 1/&S Tunnelling /rotocol

)1T/* for EoS negotiation between each other. "f they have agreed on the EoS

 parameters for the bearer, the UMTS S manager of the # inform the # S

manager about the EoS parameters for the bearer between S1S# and 11S#. "t

6-65758Issue 3.0

© Nokia Oyj 1D (62)

Page 20: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 20/62

UMTS Traffic Management

lies then in the responsibility of the # S manager to negotiate on how to

make the bearer available, which route to take between the S1S# and 11S#. "f

they have agreed on the EoS parameter on their level, they inform then the

ackbone network service ) #S* manager about the set EoS parameter.

'ithin the backbone, "/ over ATM may be applied, "/ over -rame &elay, etc.$epending on the underlying transmission technology and signalling protocols

used, the network elements must conduct signalling to step by step establish the

 bearer between S1S# and 11S#.

A bearer also must be established between the MT and the S1S#. The &# is

responsible for the resource management within UT&A#. The &# is

managing so(called &adio Access earer )&A*. A &A stand for one bearer6

connection between a MT and a core network edge element )S1S#, MS*.

The &# must establish the bearer on Uu, "ub, "u, and H if reuired H on "ur.

After determining the EoS parameter internally used from the EoS parameters

set by the bearer service manager in the S1S#, it informs its "u bearer service

manager to negotiate and establish the bearer between itself and the S1S#. The&A manager also informs the &adio S manager about the reuired EoS

 parameterB the &adio S manager then determines the radio EoS parameters.

The physical parameters for the transmission via the radio interface are then

determined in the underlying UT&A physical S manager, parameters such as

spreading codes, spreading factor, type of convolutionary coding.

The whole process is conducted to establish on every physical link within the

UMTS operator?s network a bearer in accordance to the EoS reuired for the

subscriber?s application.

earers for signalling can be negotiated, too. ut often, they are made available

during operation and maintenance.

Managing t9e %earer o'er UTRAN

"n UMTS there may be a number of connections between the core network and

the mobile. As an example, a subscriber may have a video, voice, and "nternet

connection bearer open. This means that the subscriber will be using multiple

 bearers to support each service. %ach of this connection is known as a RA,

)radio access bearer*.

The &As for an individual subscriber are grouped together into a RRC )radioresource connection*. && is a stack structure, in which the &As are located.

Therefore, if we need to move the && )in the case of a handover  from one

TS to another*, then we need to move the whole &&.

@0 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 21: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 21/62

Se!!ion management

8N0N

0N2 8onnetion

0adio ess earer 

0N2 8onnetion

  0 a d  i o

  3   e s

 s   . e a

 r e r

008 8onnetion

:

2aketNet#ork

8iruit #ithedNet#ork

2aket 7ata er(ie

%eeh er(ie

5ideo er(ie

0adio ess earer 

i"ure 1A. The re$ationshi% !et#een the and in the 9TN

As the above figure illustrates, the different &As are received by the &# and

combined together to form a single RRC connection. The 71 Specifications

make provision for procedures that allow for the &A to be added, modified,

and removed. This would happen if the subscriber needed an additional service

)for example, downloading email*.

To control the connection between the network and the mobile, a signalling

 protocol called ra'io resource control is used. y use of the protocol, the

network can carry messages that are reuired to set up, modify and release radio

resource connection.

Stu#ent E:erci!e;an you think of an e+am%$e #here it may !e neessary to modify the radioresoure onnetionE

*" E:am7$e; Sim7$ifie# %earer e!ta%$i!9ment for a ca$$

The UMTS bearer service manager in the S1S# reuests a bearer set(up

 between the MT and itself. "t send a &A Assignment reuest to the radio

resource control unit &#. The bearer control messages are exchanged between

S1S# and &# with &A#A/ messages. &A#A/ stands for &adio Access

 #etwork Application /rotocol.

-ollowing the UMTS specific &A Assignment &euest message, the "ub

 bearer between S1S# and &# can be set up in accordance to the reuired

uality of service parameter. etween S1S# an &# the "ub bearer is

nowadays a AA!I virtual channel.

Then, a "ub bearer between #ode and &# can be established. This bearer

will be later on used for user data transport and is an AA!8 virtual channel.

6-65758Issue 3.0

© Nokia Oyj @1 (62)

Page 22: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 22/62

UMTS Traffic Management

A signalling connection already exists between the U% and the &#. This

connection is used to send the &adio Set(up earer message to the U%. The U%

is informed about the physical layer characteristics, MA layer characteristics

)e.g. puncturing, data rate*, &# modus )e.g. acknowledged6unacknowledged

mode*, etc.

The &adio !ink &econfiguration message informs the #ode among others

about the physical and MA layer characteristics of the Uu interface

transmission.

The #ode confirms this message by returning a &adio !ink onfiguration

omplete message.

The U% confirms the &adio earer Set(up message with the &adio earer Set(

up omplete message.

 #ow the bearer between the U% and the &# exists. The &# returns the &A

Assignment omplete message to the S1S#, with which the UMTS bearer

 between U% and S1S# is established.

/lease note, that this example is highly simplified. The bearer establishment

within UT&A# is very complex and allows a wide range of different options.

Uu   Iub Iu

RAB Assignment Request

RAB Assignment Complete

 SGSNRNC

Node B

Iub bearer set!up+AA) - virtual channel

Iub bearer set!up+AA) virtual channel

Radio Bearer Set- up Complete

Radio Bearer Set-up

Radio Link Reconfiguration

Radio Link Reconfiguration Complete

i"ure 15. esta!$ishment =sim%$ified>

@@ (62)© Nokia Oyj 6-65758

Issue 3.0

Page 23: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 23/62

Se!!ion management

*2 Managing t9e %earer ,9en t9e !u%!cri%er i! mo'ing

As a subscriber moves through the network, the radio resource connection must

follow. The below figure illustrates a network with the path of a bearer being

connected from end to end )U% to MS and U% to S1S#*. As the mobilemoves, the signal it receives from the serving TS will change )possibly

decrease as in the below example* and the signal received from a neighbouring

TS will increase.

"t makes sense that the mobile should receive the signal from the TS with the

 best signal uality and strength. 3ne characteristic of a $MA network is that

there could be simultaneous connections between different base stations and the

mobile. "t is the same information, @ust being transmitted and received by

different sources.

3GSGSN

RN

3GMS

RN

RN

Mo%i$e 9a! a !ing$e

RR

i"ure 16. The initia$ situation of an end-to-end !earer onnetion

The base stations that have simultaneous radio resource connections to the same

terminal are known to belong to an acti(e set. As the mobile moves, the base

stations are constantly being added and removed from the active set.

3ne common uestion that students ask is why use the extra resources, surely itwould be better to @ust use the one connectionJ "n principle this is true, but by

transmitting the signal from different sources there are advantages in gain that

can be achieved. "n theory, we are able to decrease the interference and power

in the radio network, therefore increasing capacity.

6-65758Issue 3.0

© Nokia Oyj @3 (62)

Page 24: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 24/62

UMTS Traffic Management

* Mo%i$it. management

Note for !e$f>!tu#.ingKou will notice that this chapter uite much repeats the concepts from 1SM and

1/&S. ut, please be aware that some new concepts are introduced in this

chapter too.

As the user terminals are not fixed to certain positions, the network must keep

track on where the mobile is located. The system must at least be capable of

knowing the geographical area in which the subscriber is located. As in 1SM

networks, UMTS has a cellular architecture that allows the network to identify

the subscriber. As discussed in the previous section, the network maintains

information about the location of a subscriber, and the procedures are specified

to allow a constant updating of these databases as the subscriber moves aroundthe network, and also from one network to another.

3G

SGSN GGSN

RNC

3G

MSC

3G

SGSN

GGSN

RNC

3G

MSC

3G

MSC

Core Networ/ 

*oreign Networ/ 

Ra'io Access!"R 

AuC

#IR Su&&lementary Ser(ices

"ocation +&'ating

"ocating the Subscriber

Ser(ice Information

i"ure 17. The ro$e of the ) as the entra$ised data!ase

The 2ome !ocation &egister )2!&* is the central database that stores

information on the subscriber, such as the "MS" and MS"S$#. The 2!& also

stores information on which serving MS and S1S# the subscriber can be

found.

@A (62)© Nokia Oyj 6-65758

Issue 3.0

Page 25: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 25/62

Se!!ion management

Also in the 2!& we store information on the subscriber0s service profile. "n

other words, we have a record of the different services )teleservices,

supplementary and packet services* that the subscriber can6cannot use.

Therefore, if the network needs to locate the subscriber in the case of a mobileterminated call, or if the network needs to check if the subscriber is valid, then

all reuests are sent to the 2!&.

*" e$$u$ar arc9itecture

The smallest entity within the radio network is known as a cell, which is being

served by a base station. The operating siCe of the cell )CI* can change

geographically depending on the parameters used. The cells are grouped

together geographically into location areas )"A*, routing areas )RA*, andUT&A# registration areas )+RA*.

!A 9 !ocation Area )MS.*&A 9 &outing Area )S1S#*U&A 9 UT&A# &egistrat ion Area )&#.*.ell 9 .ell )&#.*

CE)) URA CE))

URA

  R/U"I%$

  AREA +RA

CE))

/osition 9 /ositioningService )UT&A#*

CE))

CE))

CE))

CE))

CE))

CE))

CE))

CE))

R/U"I%$

AREA +RA

)ocation Area +)A

i"ure 18. 9:T e$$u$ar arhiteture

The above figure illustrates the structure of the network. This may look

confusing and overly complex. The reasoning behind the structure is to make

UMTS backward compatible with 1SM and 1/&S. The location areas are used

in the circuit switched domain as the routing areas are used in the packet

switched domain. A single cell can belong to both a !A and &A and this

information is used by the core network for routing information to the radio

access network )&A#*.

6-65758Issue 3.0

© Nokia Oyj @5 (62)

Page 26: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 26/62

UMTS Traffic Management

"n 1SM, two separate connections are made for circuit and packet switched

data. "n UMTS, there is a single connection that can carry multiple bearers.

Therefore, to reduce the excessive amount of signalling that may occur, an

UT&A# registration area )U&A* is introduced to more intelligently monitor the

location of a subscriber in the &A#.

Stu#ent Re'ie,;One : an ha(e many s' !ut an annot ross :s. an rosss' !ut not :s. e$$ annot !e$on" to different or F they must !euni*ue. e$$ an !e$on" to more than one 9.

Net,or- $ocation area!

The location area )!A* is used in the circuit switched domain. The !A consists

of cellsB minimum is one cell and the maximum is all the cells under one 5!&.

Thus, the maximum siCe of one !A could be the same than 5!& area.

"n the location u&'ate procedure the location of the U% is updated in the 5!&

with !A accuracy. This information is needed in case of mobile terminated callB

the 5!& pages the desired U% from the location area it has performed the latest

location update.

"t should be noted that in other respects than the 5!&, the !A does not have any

other hardware bindings. -or instance, one &# may have several location

areas or one location area may cover several &#s.

Code LA MNC  MCC  LAI     ++=

'here the M and M# ) see previous section* is the same as in "MS"

number. The !A code is @ust a number identifying !A. !A" is uniue number  

throughout the world.

To globally separate cells from each other, the identity must be expanded and in

this case it is called cell global i'entity )1"*

The 1" value covers the country of the network )M*, the network within a

country )M#*, location area in the network, and finally the cell number within

the network.

@6 (62)© Nokia Oyj 6-65758

Issue 3.0

CI  LACode MNC  MCC CGI    +++=

Page 27: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 27/62

Se!!ion management

*"2 Net,or- routing area!

The packet switched domain has its own location definitions based on a routing

area )&A*. A routing area is definition(wise very similar than the !A, that is, it

is the area where the U% may move without performing the routing area update.

3n the other hand, the &A is kind of a 0subset0 of !A one !A may have several

&As within it, but not vice versa. "n addition, one &A cannot belong to two

!As. The reason why these two definitions co(exist is the possibility to have a

U% supporting either circuit or packet traffic, but not both. At the core network

side the 5!& and the S1S# can have a common optional interface, 1s, through

which these nodes may change location information. -or example, if the U%

 performs a location update, the 5!& may inform S1S# through the 1s

interface that the U% should also perform routing area update in order to

guarantee packet traffic.

*"3 UTRAN regi!tration area!

As mentioned before, the reasoning for having the "s, !As and &As is to

ensure compatibility to 1SM and 1/&S networks. "n 716UMTS, an additional

grouping of cells is introduced, the +TRAN registration area )U&A*.

As the &# has greater mobility management functions, and it controls

handovers between &#s, it must identify which cells belong to which &#.

As a subscriber moves into the geographical range of the &#s serving area,

the subscriber is allocated into the ser(ing +RA. 3nly when the subscriber

moves from the control or supervision of one &# to another, the information

has to be updated.

'hen transmitting the paging signal, the &# can limit the paging to the U&A

area, thus reducing the amount of signalling in the network. S1S# uses the

&# address when routing packets for a designated user. 'ith U&A, it is also

 possible to create more accurate demographic areas within the network. "t

means that we can define an U&A more flexibly than !A6&A with respect to

where people are located )and what patterns of movement they have*.

6-65758Issue 3.0

© Nokia Oyj @7 (62)

Page 28: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 28/62

UMTS Traffic Management

3G

SGSN

5R

Au

RN RN RN

URA URA URAURAURAURA

3G

MS

If t9e A an#/or RAc9ange!? RN ,i$$ en!uret9atu7#ate# informationi! !entto t9e core net,or-

A! t9e !u%!cri%er mo'e! from oneURA to anot9er? a

URA u7#ate i! 7erforme#

i"ure 1D. N and 9 arhiteture in the net#ork

Note! on GSM e'o$ution of UMTS

The MS and the 5!& still use the !A(based method for mobility management

functions for circuit switched operations such as S call set(up. As for 1/&S,

the 71(S1S# still works on the basis of &As. Therefore, the only new entities

are the U&A and UT&A# positioning services. Unlike in 1SM, the &# can

handle inter(&# handovers via the "ur interface. "n 1SM, the MS is alwaysresponsible for inter(S handovers. As UMTS networks are designed to work

with different types of core network, the only way that the network can identify

which cells belong to which &# is based upon the use of U&A.

ocation %a!e# information !er'ice!

Another characteristic of a 716UMTS network is that it is possible to determine

a more accurate position of the subscriber by using the +TRAN &ositioning

ser(ice. Unlike the U&A, !A and &A, which are used for controlling mobility

management )that is, subscriber location for call set(up*, the future for UT&A# positioning service is for the provisioning of services that are based upon the

subscriber0s exact location. %xamples of such services could be emergency

calls, viewing maps, and locating the nearest doctor.

The aim is to be capable of locating the subscriber within a I; ( L; m range.

There are different techniues that can be used, such as 1/S )1lobal

/ositioning System*. 2owever, this may have limitations due to line of sight,

indoor coverage, and even political reasons. 3ther techniues exist, which use

the triangulation between base stations to measure the delay in signals.

@8 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 29: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 29/62

Se!!ion management

i"ure @0. er(ie %ossi!i$ities

*2 Mo%i$it. 7roce#ure > ocation u7#ating

As the network maintains three layers of information on the subscriber0s

location )!A, &A and U&A*, there are multiple procedures used to track the

subscriber0s movements. "n practice, there are three basic types of location

update procedures• !ocation registration )power on 6 cell attach*

• Movement between area

• /eriodic update

These are explained in more detail in the forthcoming pages. "n a 1SM network

the S took no responsibility for mobility managementB instead the mobile

would contact the core networks directly to inform about a change in location.

"n UMTS, the situation is different as the &# not only keeps information on

which subscribers are in which U&A, but is also responsible for the location

updating to the core network.

6-65758Issue 3.0

© Nokia Oyj @D (62)

'hen location updating is active

)option that the subscriber can

enable with the exception of law

enforcement*, then the mobile isconstantly informing the network

of its current location.

This information can then be

accesses by different types of

service applications. -or example,

if an emergency call is made, the

mobile0s location can be given to

the police 6 ambulance services.

Page 30: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 30/62

UMTS Traffic Management

3G

SGSN

3GMS

RN

RN

56R

89en !,itc9ing on/off 

IMSI Attac9/Detac9

89en mo'ing from area to area >

@n a ce$$/6A/RA/URA $e'e$

If the 50 is not informed

a!out the user then the

data is remo(ed

<6R

The 0N8 kee%s trak of the

mo!i$es #ithin the 90s. It a$so

informs the ore net#ork #hen

the su!sri!er han"es andCor 

0

The ;N kee%s a trak

of the mo!i$es

erio#ica$$. o'er time if mo%i$e

#oe! 7erform an u7#ate

i"ure @1. oation u%date "eneri %roedures and information in thenet#ork

As the &# receives a location updating message, it takes responsibility for

informing the core network. The &# will update its own information about thesubscriber within the U&A and inform the S1S# and 5!&, respectively, if the

routing area 6 location area also change.

'hy bother to keep updating a locationJ The reason is that the network0s 5!&

and S1S# databases are only temporary. $epending on the parameters that the

operator use, the information is only stored for a certain time. "f there has been

no updating, it is assumed that the information is old. Therefore, to stop having

a huge amount of useless data in the network, the information is removed.

ocation area %a!e# 7roce#ure!

!ocation registration )"MS" attach* takes place when a user euipment )U%* is

turned on and it informs the 5!& that it is now back in service and is able to

receive calls. &elated to this process, the network sends the U% two numbers

that are stored in the US"M )Subscriber "dentity Module* card of the U%.

These two numbers are the current !ocation Area "dentity )!A"* and the

Temporary Mobile Subscriber "dentity )TMS"*. The network, via the control

channels of the air interface, sends the !A". The TMS" is used for security

30 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 31: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 31/62

Se!!ion management

 purposes, so that the "MS" of a subscriber does not have to be transmitted over the

air interface. The TMS" is a temporary identity, which regularly changes.

%very time the mobile receives data through the control channels, it reads the

!A" and compares it with the !A" stored in its US"M card. A  generic locationu&'ate is performed if they are different. The mobile starts a location update

 process by accessing the MS65!& that sent the location data.

A channel reuest message is sent that contains the subscriber identity )that is,

"MS"6TMS"* and the !A" stored in the US"M card. 'hen the target MS65!&

receives the reuest, it reads the old !A", which identifies the MS65!& that

has served the mobile up to this point. A signalling connection is established

 between the two MS65!&s and the subscriber0s "MS" is transferred from the

old MS to the new MS. Using this "MS", the new MS reuests the

subscriber data from the 2!& and then updates the 5!& and 2!& after

successful authentication.

Perio'ic location u&'ate is carried out when the network does not receive anylocation update reuest from the mobile in a specified time. Such a situation is

created when a mobile is switched on but no traffic is carried, in which case the

mobile is only reading and measuring the information sent by the network. "f

the subscriber is moving within a single location area, there is no need to send a

location update reuest.

A timer controls the periodic updates and the operator of the 5!& sets the timer

value. The network broadcasts this timer value so that a U% knows the periodic

location update timer values.

The location registration procedure is similar for both circuit and packet

switched domains. "n case of packet switched domain the MS65!&s are

replaced with S1S#s.

'hen the 5!&6S1S# is changed, the new 5!&6S1S# sends information about

this change to the 2!&. The 2!& responds by sending the subscriber

information to the 5!&6S1S#. "f the subscriber had earlier location

information present in the 2!&, the 2!& cancels the previous location.

IMSI attac9/#etac9 (circuit !,itc9e#)

"n the circuit switched domain the U% may have two states, attached and

detached. "n the attache' state the U% is able to handle transactions and it is

active in the network. The U% continuously analyses its radio environment,

!A and cell identities being 0visible0. 'hen the U% is switched off, 'etache',

it stores the latest radio environment information into its memory and informs

the network that it is now being switched off. The 5!& stores this state change

and the U% is not tried to be reached in case of mobile terminated transaction.

'hen the U% is switched on again, it first checks whether the radio

environment matches to the one it has in its memory. "f it matches, the U% @ust

informs the 5!& that it is now attached again and able to handle transactions. "f

not, the U% performs a location area update.

6-65758Issue 3.0

© Nokia Oyj 31 (62)

Page 32: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 32/62

UMTS Traffic Management

Routing area u7#ate (7ac-et !,itc9e#)

As a procedure, the routing area u&'ate is very similar to the location update

and it is performed for the same purpose. /eriodic routing area update is used

for checking that a U% that has not performed any routing area updates for some period of time is still reachable.

The U% performs a cell u&'ate )also cell reselection* when it changes cell

within a routing area in &eady mode. This could be compared to a handover in

UMTS61SM for circuit switched connections. ell update and routing area

updates halt possible reception or sending of data. The possibility of buffering

data in the Serving 1/&S Support #ode )S1S#* can be in such cases.

SGSN,1

RNC,1

RA,1

l' cell New cell

i"ure @@. The routin" area u%date

'hen the U% changes cells between the different routing areas, it performs a

routing area update. There are two types of routing area updates the intra,

SGSN routing area u&'ate and the inter,SGSN routing area u&'ate. 3ne

S1S# can manage many routing areas.

"f the new routing area is managed by the same S1S# as the old one, an intra(

S1S# routing area update is performed.

"f the new routing area is managed by a different S1S#, an inter(S1S# routingarea update is performed. The old S1S# then forwards user packets to the new

S1S#.

3@ (62)© Nokia Oyj 6-65758

Issue 3.0

Page 33: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 33/62

Se!!ion management

e$$ attac9/#etac9

"n the core network packet domain the MM(state changes during the packet

switched connection, and it can be said that the MM(state mostly depends on

the activity of the connection. That is, when there are packets to send or receive,

the MM(state of the connection is MM,connecte'. 'hen there is nothing to

transfer, the MM(state of the connection is MM,i'le. The MM,'etache' state

has the same meaning in both of the # domains.

D e t a c h D e t a c hP a c k e tA t t a c h

P a c k e tA t t a c h

P a c k e t R e c e i v e d P a c k e t R e c e i v e d

R a d i o L i n k R e l e a s e I u C o n n e c t i o n R e l e a s e

M M S t a t e s i n U E : M M S t a t e s i n S G S N :

i"ure @3. :o!i$ity mana"ement state dia"ram in %aket domain

"n order to utilise the 71 network resources )such as radio bandwidth* as

effectively as possible, the MM(state management is as such not enough for the

 packet switched )/S* traffic. "n /S traffic, the traffic delivered can be presented

as occasional packet bursts. etween these bursts the connection is not used.

This leads to the situation where it is reasonable to 0cut0 the connection  through

the network in order to make the network resources available for other active

connections. The way to suppress the packet connection, but still remain the

necessary information in both ends of the connection, is called cell attach 0

'etach.

Note! on GRS e'o$ution to UMTS

"f you are familiar with 1/&S, the above figure about the different states may

seem confusing. "n UMTS, the &# has different RRC states depending on the

traffic situation. Therefore, the two figures are purely from the point of view of

the U% and the S1S#. -rom the point of view of S1S#, it is in MM(connected

state when there is a packet attach6received message. Signalling may be opened

to the &#, but the MM(connected state is only used when there is actual

traffic.

6-65758Issue 3.0

© Nokia Oyj 33 (62)

Page 34: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 34/62

UMTS Traffic Management

ocation info retrie'a$ (circuit an# 7ac-et !,itc9e#)

"n case of mobile terminated transaction, the 1ateway MS )the first MS to

realise that this transaction is to be terminated to the same network the called

subscriber belongs to* performs the location info retrieval procedure.

In ca!e of t9e circuit !,itc9e# #omain;

This procedure starts when a MS reuests routing information for the called

subscriber from the 2!&. The 2!& checks its database and finds out the

destination MS65!& where the called subscriber  has performed the location

update. The 2!& then asks the destination 5!& to provide MS&# for call path

connection purposes. The 5!& responds by giving a MS&#, which the 2!&

forwards to the reuesting MS. #ow the MS may start the activities for call

 path connection towards the target MS65!&. 'hen the call path is established

up to the MS65!&, the called subscriber can be paged.

In ca!e of t9e 7ac-et !,itc9e# #omain;

This procedure starts when the 11S# reuests routing information for the

called packet data subscriber from the 2!&. The 2!& checks its database and

finds out the latest S1S# where the subscriber has performed the routing area

update. The address of this S1S# is submitted to the 11S# for the data

connection establishment. #ow the 11S# has address information, with which

it is able to establish the GTP tunnel between itself and the S1S#. )1T/ 9

1/&S Tunnelling /rotocol.* 'hen the 1T/ tunnel is established up to the

S1S#, the paging of the called subscriber can be started.

Management of t9e UTRAN regi!tration area!

"n UMTS the &# can handle simultaneous S and /S connections to the

subscriber. oth domains use the !A and &A respectively to track the

subscriber0s location. The &#, however, must track which +RA the subscriber

is within. "n networks where the &#s are connected through "ur interfaces )as

opposed to the MS controlling handovers*, the subscribers drift through the

radio network passing from one &# to another. Therefore, the serving &#

must identify in which U&A a subscriber is located when it receives traffic for

him6her )that is, for a circuit switched connection*.

3A (62)© Nokia Oyj 6-65758

Issue 3.0

Page 35: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 35/62

Se!!ion management

*3 Mo%i$it. management > aging t9e !u%!cri%er  

-rom the 2!&, the network is able to determine at the very least in which

location area6routing area the subscriber is located. The network )e.g. MS*will contact the MS6S1S# serving that area and reuest contact to the mobile.

The 5!&6S1S# will then send a paging message, which contains the "$ of the

subscriber on a dedicated channel in the air interface. A mobile in idle mode is

always listening to this channel.

TS TS

Paging

TS

Mobile res&on's

to &aging

&outing Area

Paging

Paging

i"ure @A. 2a"in" in the net#ork

"f the mobile is able to detect that the network is trying to contact it, the mobile

will reuest access to the network to gain a signalling channel to determine

what the network is asking )such as set up a call, or receive the SMS*.

"n 1SM, the 5!&6S1S# would ask every cell in a certain location area to send

the same paging message. "n UMTS, if the subscriber is known to be located in

a certain U&A )UT&A# registration area*, the &# can intelligently page for

the subscriber in the U&A, therefore re'ucing the signalling in the network.

6-65758Issue 3.0

© Nokia Oyj 35 (62)

Page 36: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 36/62

UMTS Traffic Management

Mo%i$it. management > Roaming in anot9er net,or-

'hen a subscriber is in a foreign network, the procedures are the same. 'hen

the subscriber registers in the visiting network, it will in turn contact the homenetwork )remember that part of the IMSI code specifies the home network*. "f

the two operators have a roaming agreement and the subscriber is valid, the

subscriber information is copied into the ser(ing 5!& of the MS and the

information on the subscriber is stored in the 2!&.

%very 5!& in the world has a uni%ue a''ress. As a subscriber moves from one

network to another, the location updating proceeds as normal. The 2!& is

always informed of the uniue 5!&, in which the subscriber was last seen.

3G

SGSN

!"R 

3G

SGSN

3G

MSC

RNC

!"R 

3GMSC

RNC

SC

SC

!ome Networ/ 

$isitor Networ/ 

International Networ/ 

3 Networ/ Confirm access

1 +ser re%uests access 4IMSI Attach5

2 If o&erators ha(e a roaming agreement6 information isco&ie' to (isitor networ/ 4from $"R0!"R5

i"ure @5. oamin" in another net#ork

!et us take one example A subscriber is roaming in another network. 'hen the

network needs to contact him6her )for example to receive a video call*, the

subscriber0s location is always checked from the !"R . The 2!& will thencontact the serving MS to check that the subscriber is still located in the 5!&

)!"R re%uest*. This information is returned to the MS and a call is routed to

the foreign MS. So, the paging process can begin.

%ven if the calling subscriber is located in the foreign network, the call still has

to be initially placed back to the home MSC.

36 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 37: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 37/62

Se!!ion management

** Mo%i$it. management 7roce#ure!

There are several different mobility management procedures, some of which

have been mentioned in this module. The following is a short list of UMTSspecified procedures. "n the following chapter we will look at some of the

 procedures in their context of the session management layer

• !ocation registration )S and /S*

• !ocation update )S*

• "MS" attach6detach )S*

• &outing area update )/S*

• ell attach6detach )/S*

• !ocation info retrieval )S and /S*

• /aging )S*

• /aging )/S*

• Authentication procedure )S6/S*

• iphering procedure )S6/S*

• U% identity checking )S6/S*

• U% hardware )"M%"* checking )S6/S*

This chapter has given the initial first look at how mobility management is

achieved in a 71 network. "f you reuire more information and a detailed lookat different scenarios, please check the specifications.

The specification contains the so(called S$! figures. The figures illustrate how

signalling messages are passed from one element to another, in the seuence of

time and condition )that is, what happens in case of a failure*. Also, the

specifications give detailed information on the content of such messages.

6-65758Issue 3.0

© Nokia Oyj 37 (62)

Page 38: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 38/62

UMTS Traffic Management

6 Se!!ion management

"n the previous chapter we looked at the mobility management and how the

network keeps track of the location of the subscriber and the procedures it performs. "n this chapter we look at how the mobile is able to access the

network and to obtain a bearer. 'e will also cover two simplified cases of how

real time and non,real time bearers are set up in the network.

!ike the previous two chapters, the aim is to give an overall  picture of the

 procedures used to set up a session. More details on these procedures can be

found from the specifications.

Mobility Management (MM)

Session Management (SM)

Communication Management (CM)

Radio Resource Management (RRM)

! RA" C"

6i!er  6i!er 

 B8

ATM Acce!!

Internet

RAN (UTRAN GERAN) ore Net,or-

ontro$ $ane

Gate,a. $ane

STN2G

SGSN

3G

SGSN GGSNRN

4S

No#e 4

No#e 4

No#e 4

56R

Au

EIR

3G

MS

SESMS

4TS

i"ure @6. ession mana"ement re*uires %roedures from : and ::

As this chapter will look at the procedures used to obtain a bearer through thenetwork, the first concept to clarify is how a terminal is capable of determining

one network from another. "f you remember, each country has its own MCC 

)mobile country code* and each operator within a country has a uniue  MNC 

)mobile network code*. This information is broadcasted  by every cell in the

network. Therefore, when the mobile is activated, it is able to distinguish

 between operators by checking this information.

Through co(operation between operators, the network planning of freuencies

and codes used6shared in inter(boarder areas are selected to reduce conflict.

38 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 39: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 39/62

Page 40: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 40/62

UMTS Traffic Management

IMSI attac9 for an e:i!ting !u%!cri%er  

"f the subscriber is already registered in the network and is still registered in the

same 5!&, the information is updated. Also the 2!& is informed of the new

information.

3G

SGSN

RNC

5R

AC

#IR 3G

MSC

3G

MSC

0N8 a$so kee%s information

a!out su!sri!ers #ithin

the 90.

" Re0ue!t ocation U7#ate (IMSI Attac9)

2 Ne, <R re0ue!t! an# recei'e! aut9entication

information an# IMSI from 7re'iou! <R

Ne, MS/<R u7#ate! 5R ,it9 ne, $ocation 5R

!en#! ac-no,$e#gement an# !u%!cri%er information

3 Aut9entication re0ue!t an# re!7on!e

6 TMSI/TMUI a$$ocation/ac-no,$e#gement

an# $ocation u7#ate ac-no,$e#gement

* 5R cance$! t9e o$# $ocation?

o$# <R !en#! ac-no,$e#gement

16

26

36

86

96

:6

i"ure @8. :o(in" the su!sri!er&s information !et#een s

!et us now assume that the mobile has moved between to 5!& areas while

 being switched off. The figure above shows such a case. 'hen the user

switches on the mobile again, a location update reuest will be transmitted to

the new 5!& ):*. Then the authentication and "MS" information is copied

 between the old and the new 5!& )8*. )Similar steps would take place between

the U% and the S1S# in case of a routing area update.* After a successful

authentication )7*, the 2!& is updated with the new location information, after

which the 2!& sends the subscriber information to the new 5!& )=*, and

cancels the old 5!& )I*. -inally, an acknowledge message is sent to the mobile,together with the TMS"6TMU" number )<*. The packet core domain is also

updated with the new location information.

Moreover, the &# is constantly keeping track of all the connected subscribers0

current +RAs.

A0 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 41: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 41/62

Page 42: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 42/62

UMTS Traffic Management

5o, to gain acce!! ,it9out interfering ,it9 ot9er mo%i$e! too muc9

Technically, when the mobile attempts to gain access to the network, it is not

aware of the power level to use. 2ence, it estimates an appropriate level. Then

the mobile sends a short burst of information, which includes a random

seuence to the random access channel. 'hen the network receives the reuest,

it will re(transmit the random part of the initial burst on a separate channel. "f

the mobile detects this signal, it assumes that the network has heard it. "f not,

the mobile must re(transmit again, but using more power. This process

continues until either the power level set by the network is reached or the

network responds. Then, the network will transmit on a different channel

information about the channel that the mobile can use, given that one is

available.

Acce!! !ecurit. in UMTS

"n UMTS reuirements for access security are not changed. "t is reuired that

end users of the system are authenticated , i.e. identity of each subscriber is

verifiedB nobody wants to pay for calls that are made by a cheating impostor.

The confidentiality of voice calls is protected in radio access network, as well as

the confidentiality of transmitted user data. This means that the user has control

of choosing the parties with whom he6she wants to communicate. Users also

want to no! that the confidentiality protection is really applied visi"ility of

applied security mechanisms is needed. #rivacy of the user0s whereabouts is

generally appreciated. Most of the time an average citiCen does not care whether

anybody can trace where he6she is. ut if a persistent tracking of users would

occur, he6she would be uite irritated. Similarly, exact information aboutlocation of people would be useful, e.g., for burglars. Also, privacy of the user

data is a critical issue when data is transferred through the network. /rivacy and

confidentiality are largely synonymous in this presentation.

 Availa"ility of the UMTS access is clearly important for a subscriber who is

 paying for it. #etwork operators consider relia"ility of the network functionality

to be important they want control inside network to function effectively. This is

guaranteed by inte$rity of all radio network signallingB it is checked that all

control messages have been created by authorised elements of the network. "n

general, integrity checking protects against any manipulation of a message, e.g.,

insertion, deletion or substitution.

The most important ingredient in providing security for network operators andsubscribers is crypto$raphy. That consists of various techniues which all have

roots in the science and art of secret !ritin$ . "t is sometimes useful to make

communication deliberately incomprehensive, i.e. to use ciphering )or,

synonymously, encryption*. This is the most effective way to protect

communications against malicious purposes.

A@ (62)© Nokia Oyj 6-65758

Issue 3.0

Page 43: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 43/62

Se!!ion management

3G

SGSN

3G

MSC

RNC

!"R The IMSI an' IM#I are chec/e' 4o&tionalan' at a changeable inter(al5

"he 1)R contains information on thesubscriber, terminal, locat ion and

services. Authenti cation codes and#eys are stored and 'enerated in the

AuC

"he SIM and terminalcontain authenticat ion

#eys

Information is chec/e' from the !"R 

i"ure 30. Net#ork authentiation

UMTS !ecurit. feature!

The most important security features in the access security of UMTS are thefollowing

• Mutual authentication of the user and the network 

• Use of temporary identities

• &adio access network encryption

• /rotection of signalling integrity inside UT&A#

 #ote that publicly available cryptographic algorithms are used for encryption

and integrity protection. Algorithms for mutual authentication are operator(

specific.

%ach of these features are described in the following subsections.

6"" Mutua$ Aut9entication

There are three entities involved in the authentication mechanism of the UMTS

system being

• 2ome network 

• Serving network )S#*

6-65758Issue 3.0

© Nokia Oyj A3 (62)

Page 44: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 44/62

UMTS Traffic Management

• Terminal, more specifically US"M )typically in a smart card*

The basic idea is that the serving network checks subscriber?s identity )as in

1SM* by a so(called challenge(and(response techniue while the terminal

checks that serving network has been authorised by the home network to do so.The latter part is a new feature in UMTS )compared to 1SM* and through it the

terminal can check that it is connected to a legitimate network.

The cornerstone of the authentication mechanism is a master ey K   that is

shared between the US"M of the user and the home network database. This is a

 permanent secret with the length of :8D bits. The key K  is never transferred out

from the two locations. -or instance, the user has no knowledge of her6his

master key.

At the same time with mutual authentication, keys for encryption and integrity

checking are derived. These are temporary keys with the same length of :8D

 bits. #ew keys are derived from the permanent key K  during every

authentication event. "t is a basic principle in cryptography to limit the use of permanent keys to minimum and instead derive temporary keys from it for

 protection of bulk data.

'e describe now the Authentication and ey Agreement )AA* mechanism at

general level. The authentication procedure can be started after the user is

identified in the serving network. The identification occurs when the identity of

the user, i.e. permanent identity "MS" or temporary identity TMS", has been

transmitted to 5!& or S1S#. Then 5!& and S1S# send an authentication

data re%uest to the Authentication enter )Au* in the home network.

The Au contains master keys of the users and based on the knowledge of "MS"

the Au is able to generate authentication vectors for the user. The generation

 process contains executions of several cryptographic algorithms. The generatedvectors are sent back to 5!&6S1S# in the authentication data response& This

 process is depicted in figure below These control messages are carried on the

MA/ protocol.

AA (62)© Nokia Oyj 6-65758

Issue 3.0

Page 45: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 45/62

Se!!ion management

V L R A u C

0 3 N 7 ? 1 < N

B 0 / 1 3 9 T N 8 ? I ?

I : 1 I

0 3 N 7 ' 3 9 T N ' B 0 / 1 ' 8 ? ' I ?

S G S N

i"ure 6.31 uthentiation ata e*uest and uthentiation ataes%onse

"n the serving network, one authentication vector is needed for each

authentication instance, i.e. for each run of the authentication procedure. This

means the )potentially long distance* signalling between S# and the Au is not

needed for every authentication event and it can in principle be done

independently of the user actions after the initial registration. "ndeed, the

5!&6S1S# may fetch new authentication vectors from Au well before the

number of stored vectors runs out.

The serving network )5!& or S1S#* sends a user authentication re%uest to the

terminal. This message contains two parameters from the authentication vector,

called &A#$ and AUT#. These parameters are transferred into the US"M that

exists inside a tamper(resistant environment, i.e. in UMTS " card )U"*. The

US"M contains the master key K , and using it with the parameters &A#$ and

AUT# as inputs, US"M carries out a computation that resembles the generation

of authentication vectors in Au. This process also contains executions of

several algorithms, as is the case in the corresponding Au computation. As the

result of the computation US"M is able to verify whether the parameter AUT#

was indeed generated in Au and, in the positive case, the computed parameter

&%S is sent back to 5!&6S1S# in the user authentication response. #ow the5!&6S1S# is able to compare user response &%S with the expected response

4&%S which is part of the authentication vector. "n the case of match,

authentication ends positively. This part of the process is depicted below.

6-65758Issue 3.0

© Nokia Oyj A5 (62)

Page 46: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 46/62

UMTS Traffic Management

V L R

0 3 N 7 ' 3 9 T N

0 / 1

0 3 N 7 ? 3 9 T N

0 / 1 1 < N 8 ? I ?

U ES G S N

5 - 0 C 1 ; 1 N h e k s# h e t h e r 0 / 1 G B 0 / 1

9 / h e k s # h e t h e r t h e1 < N i s ! i " e n o u " h

 

i"ure 6.3@ 9ser uthentiation e*uest and 9ser uthentiationes%onse

The keys for radio access network encryption and integrity protection, namely

and ", are created as a by(product in the authentication process. Thesetemporary keys are included in the authentication vector and, thus, are

transferred to the 5!&6S1S#. These keys are later transferred further into the

&# in the radio access network when the encryption and integrity protection

are started. 3n the other side, the US"M is able to compute and " as well

after it has obtained &A#$ )and verified it through AUT#*. Temporary keys

are subseuently transferred from US"M to the mobile euipment where the

encryption and integrity protection algorithms are implemented.

A6 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 47: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 47/62

Se!!ion management

3G

SGSN

3G

MSC

RNC

!"R 

Authentication codes are used tocreate a si'nal 0hich is

scrambled 0ith the data. It is

almost impossible to decode thesi'nal 0ithout #no0in' the #eys

Cipherin' is performed inthe R%C and the mobile

In UM"S, multiple air!interfacechannels are used in theconnection to the mobile

i"ure 33. i%herin" in 9:TC9TN

62 Managing a rea$ time (circuit !,itc9e#) %earer  

The following section describes how a real time bearer is allocated. The whole

 process is summarised in a figure at the end of this chapter, with brief

descriptions of the steps. The next two pages discuss the process in more detail.

At the first stage of any mobile originated action, a signalling channel needs to

set up between the mobile and the &#. This channel is used to verify the

US"M, to identify the subscriber, to find out what the subscriber needs, and to

 perform the authentication procedures.

The mobile will reuest a connection ):*, the &# will then instruct a TS to

reserve a signalling channel )8*, and through a common channel )that is, all

mobiles in the area can share*, inform the mobile which channel to use )7*. The

mobile can then use the signalling channel to communicate with the &#.

The mobile will now inform the &# what are its service or bearer

reuirements. "f the mobile @ust wishes to perform signalling, the already

dedicated channel will be sufficient )that is, location update*.

A subscriber wishing to access the "nternet will be discussed in the next section.

Should the subscriber wish a EoS assured service )such as voice*, the &#

forwards the call set(up message to the S(# )I*. $epending how the network

is configured, the subscriber0s identity is checked before any bearer set(up

6-65758Issue 3.0

© Nokia Oyj A7 (62)

Page 48: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 48/62

UMTS Traffic Management

 proceeds. These transactions are usually performed not by using the subscribers

"MS", but by the TMS". "f this is not available, then the "MS" is used.

The network will check if the subscriber is allowed to use the service. Also, it is

 possible that the user euipment can be crosschecked to ensure that it is valid."n the case of a call, the &# informs the S(# )MS* that a traffic channel

is needed.

The MS will respond to the &# with information about the bearer it should

 provide )<*. "n return, the &# will allocate the correct bearer service to mobile

in the radio network )L*. 3nce the connection is made, the &# informs the

MS that the connection is complete and the transaction can start )D*.

The system knows that a voice6video call is reuired, so the MS or Media

1ateway )M1'* understands where the end point should be.

"n this case, the subscriber wants to call to another mobile. The procedure is the

same as in 1SM, where the 2!& enuiry is sent from the MS65!& )+*. The

2!& will now reuest the MS&# )Mobile Station &oaming #umber* from the

target 5!& ):;*. The 2!& will also inform the reuesting MS of the MS&#

of the target subscriber )::*. The serving MS will now contact the target MS

in order to make the final connection to the subscriber ):8*.

The target MS will now page the called party. As the 5!& only knows the

location area of the subscriber, then all the cells in the target !A are reuested

to send a paging message ):7*. The mobile will then answer by reuesting a

signalling channel.

"f the call terminates in a UMTS network, a similar bearer assignment

 procedure will happen as described in steps : ( D above. The set(up procedure

for the target subscriber starts with the allocation of a bearer for a signalling

channel. The subscriber identity is checked and a bearer for the traffic channel

is allocated. 3nce the radio access bearer is in place, the &# will respond with

a confirmation of the set(up. #ow, the two parties can start the conversation.

This process provides a basis for UMTS to add easily into an existing 1SM

network. "n case of services such as video, the core network will either have a

direct connection via an ATM network, or through a server that supports video

streaming.

"n the next figure, a simplified UMTS originated ( 1SM terminated call set(up

case is shown. This case clearly shows that specifications have as much as

 possible been based on the 1SM procedures.

A8 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 49: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 49/62

Se!!ion management

 

U% S S&# TS MSMS65!& MS65!& 2!&  

2. 1)R En*uiry

34. Send Routin' Information +MSR%

33. Call Setup Continues

35. a'in' Response

36. Setup

3-. Call Confirmed&Alert37. Conversation

-. Call Setup

8. RA9 Setup & Radio )in# Modification

7. 9earer Assi'nment Re*uest +Create ! 9earer arameters and 9indin' ID

:. 9earer Assi'nment Complete

6. RRC Setup Complete

. Radio )in# Setup

5. Radio Resource Connection Setup

3. Radio Resource Connect ion Re*uest

3. a'in'

i"ure 3A. im%$ified 9:T ori"inated H ;: terminated a$$ set-u%

Summary of the steps in the figure

:. A ra'io resource connection reuest for a signalling channel is reuested.

8. The &# sets up the ra'io lin/  between the base station and itself.

7(=. RRC set,u& )downlink* and RRC set,u& com&lete )uplink* messages.

I. Call set,u& message to the MS65!&. Security procedures are also

 performed )not shown in the figure above*.

<. earer assignment re%uest. "n this step, the bearer parameters

  are definedB also a binding identification number is allocated. inding "$ is

  used to tie together control information with user data for a certain

  connection.

L. Ra'io access bearer set,u& and ra'io lin/ mo'ification. 1iven the inputs

  from the MS65!& concerning the bearer, the &# allocates an

  appropriate radio access bearer )&A* in the air interface. Also the radio  link between the TS and the &# is modified in accordance with the

  bearer need.

D. The &# informs the MS65!& that the bearer has been assigne'.

+(:L. Since the circuit switched core network )S(#* is common for UMTS

and 1SM, the call set(up procedures within the # are the same, including

2!& enuiry, MS&# allocation, etc. #ote also that for calls terminating in

a UMTS network, a bearer and a radio link in the terminating side should

 be allocated in a similar way as in the originating side.

6-65758Issue 3.0

© Nokia Oyj AD (62)

Page 50: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 50/62

UMTS Traffic Management

Note! on GSM e'o$ution in t9e No-ia !o$ution

The function of the MS is the same as in 1SM. The new element Me'ia

Gateway 4MG.5 for 3G,MSC is responsible for converting the "u )UMTS*

messages to be compatible with the MS )A(interface*. The effect is that the

MS recognises and treats UMTS calls in a similar way than 1SM calls.

The M1' for 71(MS )71("'U* also has to convert the ATM connection

into /M to make it compatible with the MS. The "u interfaces  offer more

service possibilities than the A(interface. Therefore M1' also supports these

services. Unlike in 1SM, the voice transcoders )which are based upon adaptive

multi(rate codecs, AM&* are located in the Media 1ateway.

-urthermore, the 71// Specifications have finally stated that the transcoding

function also logically belongs to the core network, which is the most logical

solution, as it allows more cost(efficient transmission.

Managing a non>rea$ time (7ac-et) %earer 

This chapter describes the /$/ context activation and the allocation of a non(

real time bearer. The whole process is shown in figures at the end of the next

 page. &eferences to the different steps are found in the text below. The /$/

context terminology and the 1T/ )1/&S tunnelling protocol* are discussed

after that. The last part of the chapter shows the signalling when the user uits

the connection.

The same way as the circuit switched )S* management is based upon 1SM,

the management of packet switched )/S* bearers is based upon 1/&S. The process also starts in the similar way, as the mobile first reuests a signalling

channel from the network ):*. At this stage the &# is not yet aware what

service the subscriber wishes to use, therefore it will allocate a dedicated

signalling channel )8(7* and inform the mobile which channel to use. An

acknowledgement is also sent from the mobile.

 #ow it is time for the mobile to reuest a bearer. "n this reuest are, for

example, access point name )A/# ' and the "/ address )if the field is empty,

then a dynamic "/ address needs to be allocated*. The A/# is a symbolic name

for a network interface in the 11S#. The interface leads to an external packet

network. 3ne 11S# could have several different access points to different

networks )=*.

Then, the S1S# checks the subscription data. %arlier, when the subscriber

made a routing area update, the S1S# received the subscriber information from

the 2ome !ocation &egister )2!&*. Also, security information for

authentication and encryption is stored in the S1S#. "t is thus possible to

authenticate the U% )US"M* )I*. Also "M%" checking may be performed. "f

"M%" checking is performed, then the %uipment "dentity &egister )in 2!&* is

interrogated )not shown in the figure*.

50 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 51: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 51/62

Se!!ion management

The next step of context activation is to find the reuested 11S# and send the

reuest for context creation to it. The S1S# gets the 11S# "/ address from the

$omain #ame Server )$#S* )<(L*. The $#S finds the correct 11S# "/

address based on the access point name )A/#*.

The S1S# now sends a 0reate /$/ ontext &euest0 message to the 11S#

)D*. The reuest includes the A/# and the proposed tunnel identification )T"$*.

T"$ consists of the "MS" number and the network service access point identifier

)#SA/"*. #SA/" is used as a reference number of the /$/ context.

The 11S# now selects the access point it will use )not shown in the figure*.

The A/# is associated with the external network the subscriber wants to use. "t

is a physical or logical interface in the 11S#. 3ne could say that the access

 point is similar to the default gateway defined for a normal "/(subnetwork − it

is a point out from the subnetwork. -or the U%, the access point is its >default

gateway?. "n the case of a dynamic address, the 11S# or an external network

element can issue the "/ address. The external element may be a $ynamic 2ost

onfiguration /rotocol )$2/* server, which issues dynamic addressing

information. The external element might alternatively be a &emote Access $ial

"n User Service )&A$"US* server, whose primary function is user

authentication.

"n )+* the 11S# sends a 0reate /$/ ontext &esponse0 back to the 71(S1S#,

which includes given "/ address, T"$ confirmation, and a charging "$.

This is followed by ):;* the 71(S1S# sending a bearer assignment reuest

)reate* to the &#.

The &# will then modify the radio link and set up the bearer over the air

interface )::*.

'hen this is done, the &# will send a message to 71(S1S# to notify that the

 bearer assignment is completed ):8*.

-inally, the 71(S1S# can send an 0Activate /$/ ontext Accept0 message to

the U% ):7*. The 71(S1S# is now ready to route user traffic between the user

euipment and the 11S#.

6-65758Issue 3.0

© Nokia Oyj 51 (62)

Page 52: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 52/62

UMTS Traffic Management

+. reate /$/ ontext &esponseB $yn. "/(address, harging "d

D. reate /$/ ontext &euestB A/#, $ynamic "/ Address

U% S &# 71(S1S# $#S 11S#(:

:8. earer Assignment omplete

:. &adio &esource onnection reuest

8. &adio !ink Setup

7. &adio &esource onnection Setup 6 omplete

=. /$/(ontext Activation &euest ( )Access /oint #ame, EoS, "/ address if available*

::. &A Setup 6 &adio !ink Modification

:7. /$/ ontext Activation Accept #SA/", given dynamic "/(address, offered EoS

:;. earer Assignment &euest )reate* #SA/", offered EoS

I. Authentication

<. 11S# address resolution &euest )A/#*

L. 11S# address resolution &esponse

GTP P)+P)P P)+ GTP P)+

/$/ /acket $ata /rotocolA/# Access /oint #ame1T/ 1/&S Tunneling /rotocol

i"ure 35. 22 onte+t ati(ation

A very important concept of the packet switched session management is /$/

context )/$/ 9 /acket $ata /rotocol*. The /$/ context is used for two

 purposes for /$/ address allocation to the user and to make a logical

connection with the reuired6desired EoS )Euality of Service* level through the

71 network. The /$/ context is an entity defining all reuired information for

the U% H network connection establishment. -rom the session management

)SM* point of view, the /$/ context has two states, acti(e and inacti(e.

The inacti(e state means that the packet data services related to a certain /$/

address are not activeB the network does not have any routing information

available for that /$/ address and thus it is not possible to transfer any data. "f

the location of the U% changes, the /$/ context information is not updated.

"n SM acti(e state the network has routing information available and it is possible to transfer data between the U% and the network. Also the U% location

information is updated in the /$/ context.

5@ (62)© Nokia Oyj 6-65758

Issue 3.0

Page 53: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 53/62

Se!!ion management

# P D P C o n t e $ t A c t i v a t i o n # P D P C o n t e $ t D e a c t i v a t i o n  ( l a s t )# P a c k e t D a t a D e t a c h

# P D P C o n t e $ t A c t i v a t io n R e % e c t e d

# P D P C o n t e $ t A c t i v a t io n# P D P C o n t e $ t M o d i & ic a t i o n# P D P C o n t e $ t D e a c t i v a t i o n

i"ure 36. 22 onte+t states

The figure illustrates how the different /$/ context procedures are used in

different session management states. 3ne allocated /$/ address may have

many /$/ contexts and one /$/ context always has one EoS class )EoS

 profile*. This makes it possible to have many packet data connections, each of

them simultaneously having a different EoS. The U% may, for instance, be used

for software downloading and web browsing at the same time.

As the network connection is established, packets of data in the /$U are

transferred through the network by using different types of protocols.

etween the mobile and the radio network controller )&#*, the packet data

 protocol is used. etween the &#, 71(S1S#, and the 11S# the packet of

"nternet data is transferred in the GPRS tunnelling &rotocol )GTP*.

 U ! e r

 7 a c - e tU!er 

3 ac - e t U!er 

7ac-etU!er 

7ac-et

GGSN

T9e !tream of container!formin a tunne$

U!er 7ac-et

3G,

SGSN

RNC

i"ure 37. The ;T2 tunne$

6-65758Issue 3.0

© Nokia Oyj 53 (62)

Page 54: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 54/62

UMTS Traffic Management

The user data packets are carried from &# to 11S# via 71(S1S# in

>containers?. 'hen a packet from an external packet network arrives at the

11S#, it is inserted into a container and sent to the S1S#. The container is

then opened and packed into a new container towards the &#. The stream of

containers from &# all the way to the 11S# is totally transparent to the user."t seems as if the user is connected directly via a router to an external network,

or to an application. "n data communications this type of virtual stream of

containers is called a tunnel H the 1S#s and &# perform tunnelling of user

 packets.

9/ 0N8 3;-;N

1. 272 8onte+t 7eati(ation 0e*uest

@. 272 8onte+t 7eati(ation e%t

3. earer ssi"nment 0e*uest=0e$ease>

A. 0adio -ink 0e$ease

5. earer ssi"nment 8om%$ete=0e$ease>

i"ure 38. The user *uits the onnetion

Although the connection may remain active for some time, the mobile may

deactivate the /$/ context. This is shown in the figure above. A reuest is sent

from the mobile, through the &# to the 71(S1S# to release the resources

):(8*. 3nce the mobile is deactivated, the radio resources are then released

)7(=*. -inally, the &# sends an acknowledgement to the 71(S1S# )I*.

5A (62)© Nokia Oyj 6-65758

Issue 3.0

Page 55: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 55/62

Se!!ion management

+ ommunication management

A UMTS network is a platform to give the operator0s the best solution to

 provide a varied amount of services. The subscriber0s applications and controlcomponents sit upon the bearer. Therefore, communication management in

UMTS is all about managing mobility, security and charging of a bearer.

The below figure illustrates the services and control of the services that sit upon

the physical connection. "t is the role of communication management to route

the bearer to the high application layers, manage the connection through

mobility management, and handle the bearer security and charging for the

session.

Networ/ A&&licationIntelligence

Connection

Ser(ice an' customer

a&&lication control  

N Subscriber;s ser(ice &rofile

, location information

, billing of ser(ice

, &ush control

, &ersonalisation, etc

N Security

N Mobility

N Charging information collection

#n' user a&&lication  N #mailN M,MT SMS

N etc

i"ure 3D. untions of ommuniation mana"ement

The communication management needs the services of the lower layers, as

these maintain the bearer.

This chapter exemplifies the high level functions in terms of the call control

 process for circuit switched calls. Also, there are a few notes about emergencycalls and charging.

6-65758Issue 3.0

© Nokia Oyj 55 (62)

Page 56: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 56/62

UMTS Traffic Management

a$$ contro$ for circuit !,itc9e# (rea$ time) ca$$!

all control is a high(level name describing the functions reuired for incoming

and outgoing call handling within a switch. 1enerally speaking, the switchshould perform three activities before a call can be connected through. Those

activities are number analysis, routing, and charging. all control can

functionally be divided into three phases, which the call attempt must pass in

order to perform through connection.

 #umber analysis is a collection of rules how the incoming call should be

handled. #umber analysis investigates both the calling and called numbers and

makes decisions based on the rules defined. #umber analysis is performed both

in call control /hase " and /hase "". "n /hase " the switch checks whether the

called number is reasonable at all and if any restriction such as call barring is to

 be applied with the calling number.

I   I I I I I

' a i l # n s u c c e s s & u l S e t u # R e s t r i c t i o n s# n r e a s o n a b l e " u m b e r s

' a i l # * r o n g D i a l l i n g# I n t e r * o r k i n g ' a i l u r e

' a i l # C i r c u i t s " o t A v a i l a b l e# S e r v i c e " o t S u o r t e d

" u m b e r A n a l y s i s R o u t i n g

C h a r g i n g

 A c a l l c o m i n g i n  A c a l l g o i n g o u t 

i"ure A0. a$$ ontro$ %rini%$es

"n call control /hase "" the system concentrates on the called number. The

nature of the call is investigated "s it an international or national call and is

there any routing rule defined for the called number at allJ "n addition, the

system checks if the call reuires any inter(working euipment )like a modem*

to be connected and if the call is chargeable or not. Also statistics for this call is

initiated in this phase.

As a successful result of call control /hase "", the system knows where the call

attempt should be routed. 'hen the correct destination for the call is known, the

system starts to set up channel)s*6bandwidth towards the desired destination by

56 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 57: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 57/62

Se!!ion management

using, for instance, "SU/ signalling protocol. $uring the call, the switch stores

statistical information about the call and its connection and collects charging

information )if the call was @udged to be chargeable*. 'hen the call is finished,

call control /hase """ takes care of releasing all the resources related to the call.

+2 Generation an# co$$ection of c9arging #ata

The 71// Specifications give a detailed list of reuirements for the type of

$& )charging data record* to collect. The harging 1ateway, MS, 2!& and

many elements within the service platform generate $&s, which describe

different events in the network. An event could be a call, SMS, data usage,

location update, and in fact almost any different type of network activity.

3perators select what causes a $& to be generated. The $&s are transferredto the illing entre where the information is collected and priced.

RNC

illing Centre

Charging Gateway

!"R 

3G

SGSN

3G

MSC

GGSN

CDR +Char'in' DataRecords are sent to the

9illin' Centre

i"ure A1. o$$etion of har"in" data

As part of the evolution from 1SM61/&S towards UMTS, the amount ofinformation contained in the $& has been increased to include details of the

service uality and the network elements used.

Also, the UMTS Specifications describe features that allow the subscriber to see

more information on the cost of a service. This network feature is called Ao

)Advice of harge* and is a supplementary service, which give the subscriber

details of the service cost almost immediately.

6-65758Issue 3.0

© Nokia Oyj 57 (62)

Page 58: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 58/62

UMTS Traffic Management

Note on 9an#$ing emergenc. ca$$!

"n UMTS )and in the evolved 1SM*, when location based servers are in place,

it will be possible to actually specifically locate the subscriber within I;(L; m.'hen an emergency call is received, the operator can check in which location

the subscriber is based and hence direct the emergency services to the scene

more uickly than today.

RNC

!"R 

3G

MSC

"he MSC defines if calls areallo0ed and 0here they

should be routed to, basedupon location

3G

SGSNGGSN

To 'ifferentregional call

centres

%o chec#in' is done +alsoSIM does not need to be

active to ma#e emer'encycall

"ocation ase' Ser(er

I" location based ser0ices areused1 then the e&ergenc2 ser0ices can gain accurate

in"or&ation on thesubscriber3s location

 i"ure A@. )and$in" emer"eny a$$s

58 (62)© Nokia Oyj 6-65758

Issue 3.0

Page 59: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 59/62

Se!!ion management

Re'ie, 0ue!tion!

/lease spend some time to complete the following review uestions. The aim of

the review is for you to reflect and apply what you have studied.

:. "n which network elements is security related information locatedJ

a. US"M

 b. &#

c. Au

d. S1S#

e. #ode

f. non of all above

8. 'hich parameter identifies the subscriberJ

a. "MS"

 b. "M%"

c. M

d. /(TMS"

e. TMS"

f. /"#

7. 'hich location information is known in the U%J

a. !A

 b. &A

c. U&A

d. 71(MS supply area

e. 71(S1S# supply area

6-65758Issue 3.0

© Nokia Oyj 5D (62)

Page 60: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 60/62

UMTS Traffic Management

=. 'hich of the following is6are characteristic)s* of a UMTS bearerJ

a. 5ariable data rate

 b. Transparent through the &A#

c. $ifferent lengths of delay

d. Asymmetric connection

e. #one of the above.

I. "n the following figure, fill in the missing names of the cellular network

architecture.

<. 'hich of the following sentences about location update is not trueJ

a. "MS" attach is always made when the terminal is switched on.

 b. !ocation6routing area update takes place when a subscriber moves

 between !As and6or &As.

c. /eriodic location updates are not used in UMTS.

d. #one of the above.

L. The U&A )UT&A# registration area* is used by the core network to keep

track of subscribers in the network.

True   ο -alse   ο

60 (62)© Nokia Oyj 6-65758

Issue 3.0

9sed !y the 8N 8 7omain

 IIIIIIIIIIIIIIIIIIIIII 

9sed !y the 8N 2 7omain

 IIIIIIIIIIIIIIIIIIIIII 

9sed in the 0N8

 IIIIIIIIIIIIIIIIIIIIII 

,hat other information is ke%tE

 IIIIIIIIIIIIIIIIII 

 IIIIIIIIIIIIIIIIII 

 IIIIIIIIIIIIIIIIII 

 IIIIIIIIIIIIIIIIII 

9sed !y the 8N 8 7omain

 IIIIIIIIIIIIIIIIIIIIII 

9sed !y the 8N 2 7omain

 IIIIIIIIIIIIIIIIIIIIII 

9sed in the 0N8

 IIIIIIIIIIIIIIIIIIIIII 

,hat other information is ke%tE

 IIIIIIIIIIIIIIIIII 

 IIIIIIIIIIIIIIIIII 

 IIIIIIIIIIIIIIIIII 

 IIIIIIIIIIIIIIIIII 

Page 61: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 61/62

Se!!ion management

D. 'hich of the following sentences about the && )radio resource

connection* is trueJ

a. "t is only used in 1/&S networks.

 b. "t is a collection of radio access bearers over the air interface.

c. "t is a wireless protocol.

d. All of the above.

+. The operation of reuesting a subscriber to contact the network is called

a. "MS" attach

 b. !ocation update

c. /aging

d. earer allocation

:;. 'hich of the following sentences best describes authenticationJ

a. Security of the user information on the air interface

 b. "MS" and "M%" checking

c. Supplementary service status checking )by the subscriber*

d. A process used by the 11S# to determine firewall access

::. "n UMTS a terminal has two states, i'le and connecte'. "n the followinglist, identify which state the mobile is in.

a. The mobile is in OOOOOOOOOOOO mode when it is camping on a cell.

 b. The mobile is in OOOOOOOOOOOO mode when it does not have any

connection state.

c. "f data is being transferred from the packet core to the mobile, then

the state is OOOOOOOOOOOOO .

:8. $uring a /$/ context activation process, which information us

transmitted from the U% to the S1S#J

a. A/#

 b. /$/

c. 11S# address

d. $#S address

e. T"$

6-65758Issue 3.0

© Nokia Oyj 61 (62)

Page 62: 04 - UMTS Traffic Management

8/13/2019 04 - UMTS Traffic Management

http://slidepdf.com/reader/full/04-umts-traffic-management 62/62

UMTS Traffic Management

:7. 'hen a subscriber triggers an event in the network )for example a call*,

a $& is generated. 'hat is a $&J

a. harging data record which is sent to a illing6harging entre

 b. aller digital reset to the MS

c. ustomer data receipt, which is a bill that is sent to the customer 

d. All of the above.

:=. SMS messages can be sent via the S1S#.

True   ο -alse   ο