UMTS NETWORKSAND BEYOND
Cornelia Kappler
deZem GmbH, Germany
UMTS NETWORKSAND BEYOND
UMTS NETWORKSAND BEYOND
Cornelia Kappler
deZem GmbH, Germany
This edition first published 2009# 2009 John Wiley & Sons, Ltd
Registered officeJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply forpermission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright,Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in anyform or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UKCopyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not beavailable in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names andproduct names used in this book are trade names, service marks, trademarks or registered trademarks of theirrespective owners. The publisher is not associated with any product or vendor mentioned in this book. Thispublication is designed to provide accurate and authoritative information in regard to the subject matter covered. It issold on the understanding that the publisher is not engaged in rendering professional services. If professional adviceor other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
Kappler, Cornelia.UMTS networks and beyond / Cornelia Kappler.
p. cm.Includes bibliographical references and index.ISBN 978-0-470-03190-2 (cloth)1. Universal Mobile Telecommunications System. I. Title.TK5103.4883.K36 2009621.3845’6–dc22 2008041818
A catalogue record for this book is available from the British Library.
ISBN 9780470031902 (H/B)
Typeset in 10/12pt Times by Thomson Digital, Noida, India.Printed in TJ International Ltd, Padstow, Cornwall.
Contents
Preface xv
Acknowledgement xxi
About the Author xxiii
Acronyms xxv
Part I UMTS Networks
1 Introduction 3
1.1 Mobile Telecommunication Networks and Computer Networks 4
1.2 Network Design Principles and Business Models 5
1.2.1 Business Models 5
1.2.2 The Cathedral and the Bazaar 5
1.2.3 Operator Control and User Control 6
1.2.4 In the Beginning is the Architecture and In the Beginning
is the Protocol 7
1.2.5 Convergence 8
1.3 Summary 8
2 UMTS Motivation and Context 11
2.1 The Evolution of the Mobile Telecommunication Market 12
2.1.1 Overall Market Evolution 12
2.1.2 Service Evolution 14
2.2 The Evolution of Mobile Telecommunication Technology 15
2.3 The Genesis of UMTS 17
2.3.1 UMTS Services 18
2.3.2 UMTS Technical Requirements 19
2.4 Comparison of UMTS with Other Mobile Technologies 21
2.4.1 WLAN 21
2.4.2 Other Mobile Technologies 21
2.5 Summary 24
3 Standardization 25
3.1 The Importance of Standardization 26
3.2 Standardization Bodies 27
3.2.1 ITU 27
3.2.2 3GPP 27
3.2.3 3GPP2 29
3.2.4 IETF 29
3.2.5 IEEE 30
3.3 Summary 31
4 UMTS Architecture and Functionality 33
4.1 Overview of Telecommunication Network Architecture 34
4.1.1 Overview of Mobile Network Functionality 34
4.1.2 User-Plane, Control-Plane and Management Plane 35
4.2 High-Level Architecture of 3G Networks 36
4.3 GSM Architecture 37
4.4 GPRS Architecture 38
4.4.1 PS Domain and CS Domain 39
4.5 UMTS Architecture 39
4.5.1 IMS 40
4.6 3GPP System Architecture 40
4.7 WLAN Architecture 41
4.8 Summary 42
5 UMTS Radio Interface Technology—the Physical Layer 45
5.1 Information Coding 46
5.2 Sharing the Electromagnetic Spectrum 49
5.2.1 Frequency Division 49
5.2.2 Time Division 50
5.2.3 Space Division 50
5.2.4 Code Division 51
5.2.4.1 The Near-Far Effect 52
5.2.4.2 Macrodiversity 53
5.2.4.3 Channelization Code and Scrambling Code 54
5.2.5 Advanced Division Techniques 55
5.2.5.1 Orthogonal Frequency Division Multiple Access 55
5.2.5.2 Single-Carrier Frequency Division Multiplex Access 56
5.3 Summary 57
6 Packet-switched Domain—Architecture and Protocols 59
6.1 Architecture 60
6.1.1 Serving GPRS Support Node (SGSN) 61
6.1.2 Gateway GPRS Support Node (GGSN) 62
6.1.3 Home Location Register (HLR) 62
6.2 Protocols 62
6.2.1 User-Plane 62
6.2.2 Control-Plane 64
6.2.3 Discussion 65
6.3 Summary 66
vi Contents
7 Circuit-switched Domain—Architecture and Protocols 67
7.1 Architecture 68
7.2 Protocols 69
7.2.1 User-Plane 70
7.2.2 Control-Plane 70
7.3 Summary 72
8 UMTS Terrestrial Radio Access Network—Architecture and Protocols 73
8.1 Architecture 73
8.1.1 Node B 75
8.1.2 RNC 75
8.2 Protocols and Channels 76
8.2.1 User-Plane 77
8.2.2 Control-Plane 77
8.2.3 Lower Layers and Channels 78
8.3 Summary 80
9 User Equipment—Architecture and Protocols 81
9.1 Architecture 81
9.1.1 TE 82
9.1.2 MT 82
9.1.3 UICC 83
9.2 Summary 84
10 IP Multimedia Subsystem—Architecture and Protocols 85
10.1 IMS Service Support 86
10.1.1 Basic Service Support 87
10.1.2 Advanced Service Support 87
10.2 Architecture 87
10.2.1 CSCF 89
10.2.2 IP Connectivity Access Network 89
10.3 Protocols 90
10.3.1 User-Plane 90
10.3.2 Control-Plane 90
10.4 Summary 91
10.4.1 Introduction to Chapters 11–17 92
11 Basic UMTS Functionality 93
11.1 Public Land Mobile Network (PLMN) 95
11.2 The Bearer Concept 96
11.3 UE Preparation 96
11.3.1 Searching for a Suitable Cell 97
11.3.2 Searching for a Suitable Network 97
11.4 RRC Connection Set-up Procedure 98
11.4.1 Message Flow for RRC Connection Set-up 98
Contents vii
11.5 GPRS Attach Procedure 99
11.5.1 Mobility Management States 99
11.5.2 Determining the Location of the UE 100
11.5.3 Message Flow for GPRS Attach 101
11.5.4 Combined GPRS/IMSI Attach 102
11.6 PDP Context Establishment Procedure 103
11.6.1 The PDP Context 103
11.6.2 PDP States 104
11.6.3 Message Flow for PDP Context Establishment 104
11.7 Detaching from the Network 105
11.8 Basic UMTS Functionality in Roaming Scenarios 106
11.9 Basic WLAN Functionality 106
11.9.1 Mobile Station Preparation 106
11.9.2 Establishing Radio Connectivity 108
11.9.3 Establishing IP Connectivity 108
11.10 Discussion 108
11.11 Summary 109
12 Mobility 111
12.1 Description of the Problems 112
12.2 Mobility in UMTS 113
12.2.1 Mobility in PMM-IDLE State 114
12.2.1.1 Routing Area Updates 114
12.2.1.2 Paging 116
12.2.2 Mobility in PMM-CONNECTED State 117
12.2.2.1 Handover 117
12.2.2.2 SRNC Relocation 117
12.3 Link-Layer Mobility in a WLAN 118
12.4 Mobility in Computer Networks 119
12.4.1 Basic Mobility Support by the IETF 120
12.4.1.1 Mobile IPv6 120
12.4.1.2 Mobile IPv4 121
12.4.2 Advanced Mobility Support by the IETF 122
12.4.2.1 Context Transfer Between Old Access Router and
New Access Router 122
12.4.2.2 Seamless Mobility 123
12.4.2.3 Power-Saving Mode and Paging 124
12.5 Discussion 124
12.6 Summary 125
13 Security 127
13.1 Description of the Problems 128
13.1.1 Information Disclosure 129
13.1.2 Information Forgery 129
13.1.3 Theft of Service 130
13.1.4 Denial of Service 131
viii Contents
13.2 General Approach to Solutions 131
13.2.1 Secret Keys 131
13.2.2 Integrity Protection 132
13.2.3 Encryption 133
13.2.4 Authentication 133
13.2.5 Authorization 134
13.2.6 Discussion 134
13.3 Security in UMTS 134
13.3.1 Secret Keys 135
13.3.2 Authentication and Authorization
in the PS Domain 135
13.3.3 Authentication and Authorization in the IMS 137
13.3.4 Integrity Protection 137
13.3.4.1 Integrity Protection on the Air Interface 137
13.3.4.2 Integrity Protection in Inter-PLMN
Scenarios 138
13.3.5 Encryption 138
13.4 Security in a WLAN 138
13.4.1 Secret Keys 138
13.4.2 Authentication and Authorization 139
13.4.3 Integrity Protection and Encryption 140
13.5 Security Computer Networks 140
13.5.1 Authentication and Authorization 140
13.5.1.1 General Authentication Scenario 140
13.5.1.2 Network Access Authentication Scenario 141
13.5.1.3 Network Access Authentication Scenario
with Roaming 141
13.5.1.4 Front end Protocols and back end Protocols 142
13.5.2 Integrity Protection and Encryption 144
13.6 Discussion 144
13.7 Summary 145
14 Quality of Service 147
14.1 Description of the Problems 148
14.1.1 QoS and Scalability 148
14.1.2 QoS Parameterization 149
14.1.3 QoS Signalling and QoS Provisioning 150
14.1.4 QoS and Seamless Mobility 151
14.2 QoS in Computer Networks 151
14.2.1 QoS Provisioning 152
14.2.1.1 Overprovisioning 152
14.2.1.2 Differentiated Services 154
14.2.1.3 Integrated Services 155
14.2.1.4 MPLS 155
14.2.2 QoS Signalling 157
14.2.2.1 RSVP 157
Contents ix
14.2.2.2 QoS NSLP 160
14.2.2.3 SIP 160
14.2.3 End-to-end QoS Signalling Scenarios 161
14.3 QoS in UMTS 162
14.3.1 UMTS Traffic Classes 162
14.3.2 QoS Signalling for the UMTS Bearer 163
14.3.2.1 UMTS QoS Signalling to the PS Domain 163
14.3.3 UMTS QoS Provisioning 163
14.3.4 QoS of the End-to-End Bearer in UMTS 164
14.3.4.1 Service Level Agreements 164
14.3.4.2 UMTS End-to-end QoS Scenarios 164
14.4 Link-Layer QoS in a WLAN 166
14.5 Discussion 166
14.6 Summary 167
15 Session Control 169
15.1 Description of the Problems 170
15.2 SIP 171
15.2.1 SIP Identifiers 171
15.2.2 SIP Infrastructure 172
15.2.3 SIP Transactions 173
15.2.4 Session Description 174
15.2.5 SIP Example Message Flows 175
15.3 SIP in the IMS 177
15.3.1 SIP Infrastructure in the IMS 178
15.3.1.1 Proxy CSCF 178
15.3.1.2 Serving CSCF 179
15.3.1.3 Interrogating CSCF 179
15.3.1.4 SIP Octagon 179
15.3.2 UE Registration in the IMS 180
15.3.2.1 Message Flow for UE Registration in the IMS 181
15.3.3 Session Creation in the IMS 182
15.3.3.1 Message Flow for Session Creation in the IMS 183
15.3.4 Session Release and UE Deregistration in the IMS 185
15.4 Discussion 186
15.5 Summary 186
16 Charging 189
16.1 Description of the Problems 190
16.2 Charging in Computer Networks and WLAN 192
16.3 Charging in UMTS 192
16.3.1 Offline Charging and Online Charging 193
16.3.2 UMTS Charging Architecture 194
16.3.2.1 Offline Charging Architecture 195
16.3.2.2 Online Charging Architecture 196
16.3.2.3 Flow-based Charging 197
x Contents
16.3.3 Charging in the PS Domain 200
16.3.3.1 Offline Charging in the PS Domain 201
16.3.3.2 Online Charging in the PS Domain 201
16.3.3.3 Roaming Scenario 202
16.3.4 Charging in the IMS 202
16.3.4.1 Offline Charging in the IMS 202
16.3.4.2 Online Charging in the IMS 204
16.3.4.3 Roaming Scenario 204
16.4 Discussion 204
16.5 Summary 205
17 Policy Control 207
17.1 Description of the Problems 208
17.2 Policy Control in Computer Networks 209
17.2.1 Policy Control in Roaming 209
17.2.2 Policy Control in QoS Authorization 210
17.2.3 The IETF Policy Architecture 210
17.2.4 Policy Push 211
17.3 Policy Control in UMTS 212
17.3.1 Service-based Local Policy 212
17.3.1.1 Message Flow for Service-based
Local Policy 213
17.3.2 Policy and Charging Control 215
17.3.2.1 Policy and Charging Control in Roaming
Scenarios 217
17.4 Discussion 217
17.5 Summary 219
18 WLAN and Other Alternative Access Methods 221
18.1 Interworking WLAN 222
18.1.1 I-WLAN Scenarios 222
18.1.2 I-WLAN Architecture 223
18.1.2.1 Non-roaming Case 224
18.1.2.2 Roaming Case 226
18.1.3 I-WLAN Basic Functionality 226
18.1.4 I-WLAN Mobility 227
18.1.5 I-WLAN Security 227
18.1.6 I-WLAN QoS 227
18.1.7 I-WLAN Charging 228
18.1.8 I-WLAN Policy Control 228
18.2 Generic Access Network 229
18.2.1 Enhanced GAN 232
18.3 Comparison and Discussion 232
18.4 Femtocells 233
18.5 Summary 234
Contents xi
19 UMTS Releases Summary 235
19.1 Release 99 235
19.2 Release 4 236
19.3 Release 5 236
19.4 Release 6 236
19.5 Release 7 237
19.6 Outlook 239
Part I Epilogue—Convergence 241
Part II Beyond UMTS Networks
20 4G Motivation and Context 245
20.1 Today’s Mobile Telecommunication Networks 246
20.1.1 Today’s Services and Technology Trends 246
20.1.1.1 Regional Differences 248
20.1.1.2 Summary of Today’s Services
and Technology Trends 248
20.1.2 Today’s Business Models 248
20.1.2.1 Connectivity Provisioning 249
20.1.2.2 Service Provisioning 250
20.1.2.3 Summary of Today’s Business Models 251
20.2 Short-term Evolution Towards 4G 251
20.2.1 Short-term Service and Technology Trends 251
20.2.1.1 User Services 251
20.2.1.2 Radio Interface and Bandwidth 252
20.2.1.3 Access Network 252
20.2.1.4 Mobile Stations and Networks of Mobile
Stations 255
20.2.1.5 Service Creation 260
20.2.1.6 Summary of Short-term Services
and Technology Trends 260
20.2.2 Short-term Business Models 260
20.3 IMT-Advanced 262
20.3.1 IMT-Advanced Services and Technologies 262
20.3.1.1 Radio Interface and Bandwidth 262
20.3.1.2 Access Networks 263
20.3.1.3 Mobile Terminals 263
20.3.1.4 Service Creation 264
20.3.1.5 Other Technical Features 265
20.3.1.6 IMT-Advanced Architecture 265
20.3.2 Summary of IMT-Advanced 266
20.4 Discussion 266
20.5 Summary 267
xii Contents
21 Evolution Towards 4G: 3GPP 269
21.1 3GPP Rel-8—Architecture and Protocols 271
21.2 E-UTRA 271
21.3 EPC—Architecture and Protocols 273
21.3.1 High-level View of the EPC Architecture
and Protocols 273
21.3.2 Detailed EPC Architecture and Protocols 274
21.3.2.1 3GPP Access Network Architecture 274
21.3.2.2 3GPP Access Network Protocols 276
21.3.2.3 Untrusted non-3GPP Access Network Architecture 277
21.3.2.4 Untrusted non-3GPP Access Network Protocols 278
21.3.2.5 Trusted non-3GPP Access Network Architecture 278
21.3.2.6 Trusted non-3GPP Access Network protocols 279
21.3.2.7 PGW 279
21.3.3 E-UTRAN: Architecture and Protocols 280
21.3.3.1 E-UTRAN Architecture 280
21.3.3.2 Protocols and Channels 280
21.4 3GPP Rel-8 Functionality 281
21.4.1 Basic Functionality 281
21.4.1.1 Proxy Mobile IP 282
21.4.1.2 Network Attach 284
21.4.1.3 Dedicated Bearer Establishment 286
21.4.1.4 Detaching 287
21.4.1.5 Roaming 287
21.4.2 Mobility 288
21.4.2.1 Mobility within 3GPP Access Networks 289
21.4.2.2 Mobility Involving non-3GPP Access Networks 290
21.4.3 Security 291
21.4.3.1 Secret Keys 292
21.4.3.2 Authentication and Authorization 292
21.4.3.3 Encryption and Integrity Protection 292
21.4.4 QoS 293
21.4.4.1 QoS Parameterization 293
21.4.4.2 QoS Signalling 293
21.4.5 Charging 294
21.4.6 Policy Control 294
21.5 Discussion 294
21.6 Summary 294
22 Evolution Towards 4G: Non-3GPP Technologies 297
22.1 cdma2000 298
22.1.1 cdma2000-1xRTT and cdma2000-1xEV-DO 299
22.1.2 UMB 299
22.1.2.1 Radio Interface 299
22.1.2.2 Architecture and Protocols 299
22.1.2.3 Interworking with Other Technologies 301
Contents xiii
22.2 Mobile WiMAX 301
22.2.1 Radio Interface 302
22.2.2 Architecture and Protocols 302
22.2.3 Interworking with Other Technologies 304
22.2.4 Mobile WiMAX and IMT-Advanced 304
22.3 Next Generation Networks 304
22.3.1 ETSI NGN 305
22.3.1.1 Architecture and Protocols 305
22.3.1.2 Interworking with Other Technologies 307
22.3.2 PacketCable 307
22.3.2.1 Architecture and Protocols 308
22.3.2.2 Protocols 309
22.3.2.3 Interworking with Other Technologies 309
22.4 Discussion 310
22.5 Summary 311
23 Beyond 4G? 313
23.1 Self-managing Networks 313
23.1.1 Self-management in a 3GPP System 315
23.1.2 Discussion 316
23.2 Ubiquitous Computing, the Internet of Things
and Ambient Intelligence 316
23.3 Clean Slate Approach 318
23.3.1 Discussion 319
23.4 Summary 319
Part II Epilogue—Convergence Revisited 321
Appendix A: Terminology 323
Appendix B: The Systematics of 3GPP Specification Numbering 327
References 331
Index 337
xiv Contents
Preface
What is this book about?
This is a book on Mobile Communication Networks, in particular the Universal Mobile
Telecommunication System (UMTS) and its successor technologies. UMTS is the
successor of GSM, and is expected to become one of the world’s most common mobile
telecommunication technologies.
This is also a book on the evolution of Mobile Communication Networks—towards
something called 4G—and the design principles guiding both this evolution and individual
technical choices.
As we will show, the design principles of a Telecommunication Network such as UMTS
differ somewhat from those of traditional IP Networks, called Computer Networks in this
book. In fact, this book is written especially for readers with a background in Computer
Networks and aims at introducing them to the world of Telecommunication Networks.
This book therefore offers a systematic overview of UMTS and a thorough explanation of
the technical details, comparing consistently the ‘‘Telecommunication solution’’ for solving
a particular problem with the ‘‘Computer Network solution’’ for solving the analogous
problem. We also discuss why particular technical solutions are favoured, why particular
choices were made and how Communication Networks will develop in the future.
Today’s Telecommunication Networks—e.g. UMTS—employ the IP protocol, as do
Computer Networks. Telecommunication Networks, as do Computer Networks, offer data
services, voice service and many other services. Therefore, it is often said that the evolution
of Communication Networks consists of an overall technical convergence. The book’s
ongoing comparisons of ‘‘Telecommunication solutions’’ and ‘‘Computer Networks
solutions’’ allows for a more detailed investigation of the phenomenon.
How is this book structured?
The first part of the book provides an in-depth description of UMTS network technology as
specified in 2008. We cover architecture, protocols and overall functionality. We also discuss
how UMTS evolved from the earlier mobile telephony system Global System for Mobile
Communications (GSM).
The second part of the book discusses the successor technologies to today’s mobile
Telecommunication Networks and Computer Networks, e.g. Long Term Evolution (LTE)/
System Architecture Evolution (SAE)—also known as Evolved Packet System (EPS),
Ultra Mobile Broadband (UMB), Mobile WiMAX, and Next Generation Networks
(NGN). We give an overview of what these technologies are likely to offer, and describe in
detail the ongoing research and development, in particular regarding the evolution of
UMTS.
A typical chapter is structured as follows:. An introduction to the technical problems covered in the chapter.. Two or more subsections detailing the solutions for these problems employed by the different
communities—typically the UMTS solution and the Computer Networks Solution.. A discussion of the motivation for technical choices, and a comparison of the different
solutions.. A brief summary of the main results of the chapter.
A note about the discussion sections: it is in the nature of discussion to move beyond
technical fact and to offer interpretations. While the author substantiates these interpretations
with solid arguments, they are obviously inspired by her own—possibly somewhat
opinionated—view of things. Readers are encouraged to review the discussions critically
and to construct their own interpretation.
This book was completed in mid-2008 and accordingly reflects the status-quo at that time.
Conventions—what should the reader know before starting to read?
As the reader will soon become aware, terminology plays a crucial role in Communication
Networks: there is a veritable abundance of technical terms and acronyms. Furthermore, basic
terms may be interpreted differently in the various networking communities, or, alternatively,
different terms mean the same thing! For example, what is called a Mobile Node in a
Computer Network is conceptually equivalent to theUser Equipment in UMTS, which in turn
is not quite identical to what is called a User Equipment in a fixed Telecommunication
Network. A very interesting example is IP Protocol for which various interpretations exist.
Correspondingly, special care is taken with the terminology in this book:. Since this book covers parallel networks from different communities, generic terms are
introduced for typical network components and functions. For example, ‘‘Mobile Station’’
is used as a technology-independent term for referring to the user’s mobile device, known
as the Mobile Node or User Equipment in specific technologies.. The meaning of some terms is clarified and/or restricted (e.g. ‘‘IP Protocol’’) for the
purpose of this book. The book-specific definition of these terms can be looked up in
Appendix A. Obviously, the terms are used more loosely outside this book.. Technical terms carrying a special meaning—either technology-specific or book-specific—
are put in boldwhen they are introduced or explained. Terms referring to concepts defined in
a narrow technical context are additionally capitalized in order to alert the reader to that fact,
e.g. ‘‘GPRS Attach’’. Since capitalizing is somewhat cumbersome and also inhibits the
reading flow, it is not applied to well-known terms such as ‘‘IP address’’.. The most important terms and acronyms discussed in each chapter are summarized in
‘‘terminology boxes’’. Since some concepts are discussed more than once, the corresponding
terms appear in more than one ‘‘terminology box’’. Vice versa, very special terms appearing
only once in a chapter do not make it into the box. Of course, the index at the back of the
book will also help in finding the corresponding reference. Book-specific terms are put in
Arial in the terminology box in order to simplify their identification.
xvi Preface
. Appendix A summarizes the key terminology, also indicating which terms are book-
specific, and which terms valid generally.
What is this book not about?
The scope of a book becomes clearer by defining that which it does not include. This book
focuses on the network aspects of UMTS and other Communication Networks. It is not a
book on radio technology or services—although an overview of the UMTS radio technology
is in fact given since it is one of UMTS’s most important distinguishing features. UMTS’s
Virtual Home Environment (VHE) or Personalized Service Environment (PSE) are not
the subject of this book.
Who is the envisaged reader?
This book is a textbook for advanced students and professionals.
As a textbook, its focus is on explaining the relevant concepts and on enabling the reader
to study the original technical specifications.
As a book for advanced students, it assumes basic knowledge of communication networks,
in particular IP networks, at about the level provided by [Tanenbaum 2002]. For example, the
reader should be familiar with the OSI Reference Model and the protocols commonly used
in IP Networks, such as IP, the Dynamic Host Configuration Protocol (DHCP), etc.Finally, this book is aimed at professionals who wish to extend their knowledge both
within and beyond the UMTS area. As such, the book goes beyond basic concepts and
examines some aspects in detail. Special emphasis is given to providing the relevant
references that will enable the reader to deepen his or her own expertise on the subject.
Storyline overview
This preface closes with a brief overview of the book’s ‘‘storyline’’ in order to help readers
orient themselves.
The book begins with Part I on UMTS. It provides three introductory chapters with
background information that is vital in order to understand the hard-core technical chapters
that follow:. Chapter 1
Introduces the main characters: Mobile Telecommunication Networks, in particular
UMTS, and Computer Networks. We derive different design principles which guide
their technical development. We also show how the difference in design principles is
indeed rooted in the difference of the business models of the operators of these networks.
We ask ourselves what convergence could mean in the light of the different approaches to
network design.. Chapter 2
Provides an overview of both the technical and the non-technical sides of the evolution of
mobile Communication Networks, in particular UMTS.. Chapter 3
Introduces standardization as a key activity in specifying mobile Telecommunication
Networks. We cover a number of standardization bodies, in particular the 3rd Generation
Partnership Project (3GPP) responsible for UMTS.
Preface xvii
The book now becomes more technical. We introduce the central concept of network
architectures. We then provide a concise overview of the UMTS radio interface as one of
UMTS’s characteristic features. In subsequent chapters we present the individual architectural
components of UMTS in more detail: what is their role, what is their substructure, and which
protocols do they employ?. Chapter 4
Explains the concept of network architectures and presents the basic architectural components
of UMTS—Packet-switched Domain,Circuit-switched Domain,UMTS Terrestrial Radio
Access Network, User Equipment and IP Multimedia System—and other mobile
Communication Networks such as WLAN.. Chapter 5
Covers the physical layer of the UMTS radio interface.. Chapter 6
Covers the Packet-switched Domain.. Chapter 7
Is about the Circuit-switched Domain.. Chapter 8
Describes the UMTS Terrestrial Radio Access Network.. Chapter 9
Deals with the User Equipment.. Chapter 10
Presents the IP Multimedia Subsystem.
The following chapters are function-oriented, and thus in some sense orthogonal to the
previous architecture-oriented chapters. Each chapter deals with a key functionality provided
by UMTS and shows how the individual architectural components presented above collaborate
in order to provide this functionality. Concurrently, the Computer Network approach for
providing the same functionality is presented. We also discuss how the design principles
influenced the technical solutions.. Chapter 11
Presents basic functionality such as establishing connectivity between User Equipment
and network, and setting up user sessions.. Chapter 12
Is concerned with mobility support.. Chapter 13
Explains the security concepts.. Chapter 14
Discusses Quality of Service.. Chapter 15
Deals with session control.. Chapter 16
Covers charging.. Chapter 17
Is on policy control.
xviii Preface
. Chapter 18
Moves on to an advanced functionality of UMTS, the support of alternative accesstechnologies, e.g. WLAN. This feature is an indication of what to expect from successor
technologies.. Chapter 19
Is the last chapter of Part I. It establishes the time line in which the functionalities
discussed in previous chapters were introduced into UMTS and by doing so also reviews
the previous chapters.
An Epilogue summarizes the first part of the book, and in particular revisits the original
question about convergence of UMTS and Computer Networks.
In Part II we discuss the ongoing, highly active evolution towards the next generation of
Mobile Networks, called the 4th Generation (4G).. Chapter 20
Reflects Chapter 2 and sets the stage by considering the evolution ofMobile Communication
Networks since UMTS was conceived. What are the business models of future
Communication Networks, what functionality will they provide, how are they different
from networks of previous generations?. Chapter 21
Presents EPS—sometimes called LTE/SAE—the evolution of UMTS towards 4G. We
cover architecture, protocols and functionalities.. Chapter 22
Introduces other technologies whose immediate evolution may be candidates for 4G: Ultra
Mobile Broadband (UMB), Mobile WiMAX, ETSI’s Next Generation Networks—
which in fact evolved from a fixed telephony network, and PacketCable 2.0—which
originally evolved from cable TV.. Chapter 23
Gives an overview of the technology and ideas that are under discussion for 4G which,
however, are at this point not included.
In an Epilogue to Part II we ask ourselves to what extent convergence between
Telecommunication Networks and Computer Networks will be achieved in 4G.
Preface xix
Acknowledgements
The author would like to sincerely thank a number of colleagues for providing support in
writing this book—unless otherwise stated, all of them are with Nokia Siemens Networks:
Ralph K€uhne (Univ. T€ubingen, Germany), Frank-Uwe Andersen, Nadeem Akhtar (IIT
Madras, India) and Ulrike Meyer (Univ. Aachen, Germany) reviewed critically several
chapters, gave constructive as well as most welcome advice, and were invaluable discussion
partners.
Mirko Schramm helped me keep up-to-date with the latest developments in 3GPP SA2,
G€unther Horn and Ulrike Meyer clarified the 3GPP work on security, Ralph K€uhne and Uwe
F€oll did the same with 3GPP charging issues, as did Ulrich Thomas with the UTRAN. J€orgSwetina (NEC) provided me with insight into the ongoing work on 3GPP SA1, Max Riegel
answered my numerous questions on WiMAX, Hannes Tschofenig shared his expertise on
security issues in the IETF, Andreas K€opsel supported me regarding IETF mobility protocols
and Pierre Lescuyer (Nortel Networks) explained radio interface issues.
A number of key ideas in this book were developed together with Robert Hancock and
Eleanor Hepworth (Roke Manor Research, UK) in the course of our joint work on future
Mobile Communication Networks.
Thanks go also to Georg Carle (Univ. T€ubingen, Germany) who was crucial in the initial
process of formulating what this book would be about.
This book is based on a course which I taught at the Technical University of Berlin,
Germany. Thanks therefore go also to my students for their critical and curious questions
which helped to improve both the book’s concept and its technical accuracy.
Finally, I’d like to thank my editors at Wiley—Birgit Gruber, Richard Davies, Sarah
Hinton and Sarah Tilley who supported the writing process, answered all of my queries and
managed the production process seamlessly.
About the Author
Cornelia Kappler studied physics at the Ludwigs-Maximilians University in Munich, Harvard
University and the University of Toronto where she earned a Ph.D. in 1995. Later, she moved
into the area of future communication networks. She has worked for NEC, Siemens and Nokia
Siemens Networks, managing international research projects, contributing to standards in the
IETF and 3GPP, publishing scientific articles, writing patents and teaching courses at
universities. Since April 2008 she has been responsible for the technology concepts of a
Berlin start-up company, deZem, which is developing sensor networks for supporting energy
efficiency.
Acronyms
1G 1st Generation
2G 2nd Generation
3G 3rd Generation
3GPP 3rd Generation Partnership Project
3GPP AN 3GPP Access Network
3GPP2 3rd Generation Partnership Project 2
4G 4th Generation
AAA Authentication, Authorization, Accouting
AAL2 ATM Adaptation Layer 2
AF Application Function
AGW Access Gateway
AIPN All-IP Network (in 3GPP System)
AKA Authentication and key agreement
ALG Application Level Gateway
AN Access Network
AP Access Point
APN Access Point Name
AS Application Server
ASN Access Service Network (in WiMAX)
AT Access Terminal (in UMB)
ATM Asynchronous Transfer Mode
B3G Beyond 3G
BB Bandwidth Broker
BCCH Broadcast Control Channel
BGCF Breakout Gateway Control Function
BICC Bearer Independent Call Control
BMC Broadcast and Multicast Control
CAN Converged Access Network
CARD Candidate Access Router Discovery
CC Call Control protocol
CCCH Common Control Channel
CDF Charging Data Function
CDMA Code Division Multiple Access
cdma2000 Code Division Multiple Access 2000
cdmaOne Code Division Multiple Access One
CDR Charging Data Record
cell ID Cell Identifier
CGF Charging Gateway Function
ChC Channelization code
CK Cryptographic Key
CMTS Cable Modem Termination System (in PacketCable)
CN Core Network
CN Correspondent Node
COPS Common Open Policy Service Protocol
CPICH Common Pilot Channel
CS Domain Circuit-switched Domain
CSCF Call State Control Function
CSN Connectivity Service Network (in WiMAX)
CTF Charging Trigger Function
DCCH Dedicated Control Channel
DECT Digital Enhanced Cordless Telecommunications
DiffServ Differentiated Service
DL-SCH Downlink Shared Channel (in EPS)
DOCSIS Data Over Cable Service Interface Spec. (in PacketCable)
DRNC Drift RNC
DSCH Downlink Shared Channel (in GPRS)
DSCP DiffServ Code Point
DSL Digital Subscriber Line
DSMIPv6 Dual-Stack Mobile IPv6
EAP Extensible authentication protocol
EAPOL EAP over LAN
EDGE Enhanced Data rates for GSM Evolution
EGAN Enhanced GAN
EGANC EGAN Controller
eNB Evolved Node B
EPC Evolved Packet Core
ePDG Evolved PDG
ePDIF Evolved Packet Data Interworking Fct.
EPS Evolved Packet System
ESS Extended Service Set (in WLAN)
ETSI European Telecommunication Standards Institute
E-UTRA Evolved UMTS Radio Access Network
E-UTRAN Evolved UTRAN
FDD Frequency Division Duplex
FDMA Frequency Division Multiple Access
FMC Fixed-Mobile Convergence
FMIP Fast Handoff for Mobile IP
GAN Generic Access Network
GANC GAN Controller
GBR Guaranteed Bitrate
GCID GPRS Charging Identifier
xxvi Acronyms
GERAN GSM/EDGE RAN
GGSN Gateway GPRS Support Node
GMM GPRS Mobility Management
GMSC Gateway Mobile Switching Center
GPRS General Packet Radio Service
GPS Global Positioning System
GRE Generic Routing Encapsulation
GRX GPRS Roaming Network
GSM Global System for Mobile Communication
GSMA GSM Asscociation
GSN SGSN or GGSN
GTP GPRS Tunnelling Protocol B132
GTP-C GPRS Tunneling Protocol - Control Plane
GTP-U GPRS Tunneling Protocol - User Plane
Heterogeneous AN Heterogeneous Access Network
HIP Host Identity Protocol
HLR Home Location Register
HMIP Hierarchical Mobile IP
HPLMN Home PLMN
HSDPA High Speed Downlink Packet Access
HSPA High Speed Packet Access
HSPA High Speed Packet Access
HSS Home Subscriber Server
HSUPA High Speed Uplink Packet Access
IAPP Inter Access Point Protocol (in WLAN)
I-CSCF Interrogating CSCF
ID Internet Draft
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IK Integrity Key
IKE Internet Key Exchange
IMS IP Multimedia Subsystem
IMS-GWF IMS Gateway Function
IMSI International Mobile Subscriber Identity
IMT-2000 International Mobile Telecommunications at 2000 MHz
IntServ Integrated Service
IP Internet Protocol
IP-CAN IP Connectivity Access Network
IPX IP Roaming Exchange
ISDN Integrated Services Digital Network
ISIM IP Multimedia Services Identity Module
ISUP ISDN User Part
ITU International Telecommunications Union
I-WLAN Interworking WLAN
LA Location Area
LMA Local Mobility Anchor
Acronyms xxvii
LSP Label Switched Path
LTE Long Term Evolution
M3UA MTP3-User Adaptation Layer
MAC Message Authentication Code
MAG Mobile Access Gateway
MANET Mobile Ad-hoc Network
MAP Mobile Application Part
MAP Mobility Anchor Point
MBMS Multimedia Broadcast Multicast Service
MCC Mobile Country Code
ME Mobile Equipment
MEGACO Media Gateway Control Protocol
MGCF Media Gateway Control Function
MGW Media Gateway
MIH Media Independent Handover (in IEEE)
MIMO Multiple-Input Multiple-Output
MIPv4 Mobile IPv4
MIPv6 Mobile IPv6
MM Mobility Management (protocol)
MM Context Mobility Management Context
MME Mobility Management Entity
MMS Multimedia Message Service
MNC Mobile Network Code
MN-HoA Mobile Node Home Address
MOBIKE Mobile IKE
MPLS Multiprotocol Label Switching
MRFC Media Resource Function Controller
MRFP Media Resource Function Processor
MSC Mobile Switching Center
MSIN Mobile Subscription Identification Number
MSISDN Mobile Station International ISDN number
MT Mobile Terminal
MT Mobile Termination
MTP Message Transfer Part
NAI Network Access Identifier
NAS Network Access Server
NASS Network Attachment Subsystem
NAT Network Address Translater
NEMO Network Mobility
NGN Next Generation Networks (in ITU)
non-3GPP AN Non-3GPP Access Network
NSIS Next Steps in Signalling
OCF Online Charging Function
OCS Online Charging System
OFDMA Orthogonal Frequency Division Multiple Access
OMA Open Mobile Alliance
xxviii Acronyms
Top Related