UMTS Quick Guide
UMTS Quick Guide
The first commercial mobile telephone system was launched by BELL in St. Louis, USA, in 1946. Few lucky customers got the services.
Early mobile systems used single high power transmitters with analog Frequency Modulation techniques to give coverage up to about 50
miles and hence only limited customers could get the service due to this severe constraints of bandwidth.
Cellular Era
To overcome the constraints of bandwidth scarcity and to give coverage to larger sections, BELL lab introduced the principle of Cellular
concept. By frequency reuse technique this method delivered better coverage, better utility of available frequency spectrum and reduced
transmitter power. But the established calls are to be handed over between base stations while the phones are on move.
Even though the US based BELL lab introduced the cellular principle, the Nordic countries were the first to introduce cellular services for
commercial use with the introduction of the Nordic Mobile Telephone (NMT) in 1981.
Disadvantages of 1G systems
They were analog and hence are were not robust to interference.
To overcome the difficulties of 1G, digital technology was chosen by most of the countries and a new era, called 2G, started.
Advantages of 2G
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 1/53
10/2/2017 UMTS Quick Guide
Lower bit rate voice coding enabled more users getting the services simultaneously.
Good source and channel coding techniques make the signal more robust to Interference.
GSM-Global System for Mobile communication European Countries and International applications
History of GSM
GSM standard is a European standard, which has addressed many problems related to compatibility, especially with the development of
digital radio technology.
Milestones of GSM
1982- Confederation of European Post and Telegraph (CEPT) establishes Group Special Mobile.
1986- Different field tests were done for radio technique for the common air interface.
1987- TDMA was chosen as the Access Standard. MoU was signed between 12 operators.
Example
A single RF loop requires 50 kHz B/W; then for one lakh subscribers we need 1,00,000 x 50 kHz = 5 GHz.
To overcome this B/W problem, subscribers have to share the RF channels on need basis, instead of dedicated RF loops. This can be
achieved by using multiple access methods FDMA, TDMA, or CDMA. Even then the number of RF channels required to serve the subscribers,
works out to be impracticable.
Example
Consider a subs density of 30Sq.Km., Grade of service as 1%, Traffic offered per mobile sub as 30m E. Then number of RF channels
required are:
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 2/53
10/2/2017 UMTS Quick Guide
Radius(km) Area in Sq.km Subs RF Channels
1 3.14 100 8
3 28.03 900 38
For 10,000 subs to allot 360 radio channels we need a B/Wof 360 x 50 KHz = 18 MHz. This is practically not feasible.
Cellular Approach
With limited frequency resource, cellular principle can serve thousands of subscribers at an affordable cost. In a cellular network, total area
is subdivided into smaller areas called “cells”. Each cell can cover a limited number of mobile subscribers within its boundaries. Each cell
can have a base station with a number of RF channels.
Frequencies used in a given cell area will be simultaneously reused at a different cell which is geographically separated. For example, a
typical seven-cell pattern can be considered.
Total available frequency resources are divided into seven parts, each part consisting of a number of radio channels and allocated to a cell
site. In a group of 7 cells, available frequency spectrum is consumed totally. The same seven sets of frequency can be used after certain
distance.
The group of cells where the available frequency spectrum is totally consumed is called a cluster of cells.
Two cells having the same number in the adjacent cluster, use the same set of RF channels and hence are termed as “Co-channel cells”.
The distance between the cells using the same frequency should be sufficient to keep the co-channel (co-chl) interference to an acceptable
level. Hence, the cellular systems are limited by Co-channel interference.
Manufacturing of every piece of subscriber's terminal within a region with the same set of channels so that any mobile can be used
anywhere within the region.
Shape of Cells
For analytical purposes a “Hexagon” cell is preferred to other shapes on paper due to the following reasons.
A hexagon layout requires fewer cells to cover a given area. Hence, it envisages fewer base stations and minimum capital
investment.
Other geometrical shapes cannot effectively do this. For example, if circular shaped cells are there, then there will be overlapping of
cells.
Also for a given area, among square, triangle and hexagon, radius of a hexagon will be the maximum which is needed for weaker
mobiles.
In reality cells are not hexagonal but irregular in shape, determined by factors like propagation of radio waves over the terrain, obstacles,
and other geographical constraints. Complex computer programs are required to divide an area into cells. One such program is “Tornado”
from Siemens.
Operating Environment
Due to mobility, the radio signals between a base station and mobile terminals undergo a variety of alterations as they travel from
transmitter to receiver, even within the same cell. These changes are due to:
Physical environment of the path i.e. terrain, buildings, and other obstacles.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 3/53
10/2/2017 UMTS Quick Guide
Slow Fading
In free space conditions (or) LOS, RF signal propagation constant is considered as two i.e. r = 2. This is applicable for static radio
systems.
In mobile environment, these variations are appreciable and normally ‘r’ is taken as 3 to 4.
Rayleigh Fading
The direct line of sight in mobile environment, between base station and the mobile is not ensured and the signal received at the receiver is
the sum of a number of signals reaching through different paths (multipath). Multipath propagation of RF waves is due to the reflection of
RF energy from a hill, building, truck, or aero plane etc.; the reflected energy undergoes a phase change also.
If there are 180 out-of phase with direct path signals, they tend to cancel out each other. So the multipath signals tend to reduce the signal
strength. Depending upon the location of the transmitter and receiver and various reflecting obstacles along the path length, signal
fluctuates. The fluctuations occur fast and it is known as “Rayleigh fading”.
In addition, multipath propagation leads to “pulse widening” and “Inter symbol Interference”.
Doppler Effect
Due to the mobility of the subscriber, a change occurs in the frequency of the received RF signals. Cellular mobile systems use following
techniques to counter these problems.
Channel coding
Interleaving
Equalization
Rake receivers
Antennae diversity
q=3N=D/R
N= 1 3 4 7 9 12
Q= 1.73 3 3.46 4.58 5.20 6.00
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 4/53
10/2/2017 UMTS Quick Guide
More number of channels / cells,
m2b
I= ∑ Im
Mz1
R – Propagation constant.
c α R-r
R = Radius of cell.
I α 6 D-r
Q = [6 × C/I]1/r
Based upon the acceptable voice quality, the value of C/I has been found to be equal to 18 dB.
Assuming,
Value r is taken as 3.
This is an ideal condition, considering the distance of the mobile units from the interfering cells to be uniformly equal to ‘D’ in all cases. But
practically mobile moves and distance ‘D’ reduces to ‘D-R’ when it reaches the boundary of the cell, and C/I drops to 14.47 dB.
Hence ‘freq’ reuse pattern of 7 is not meeting C/I criteria with omni directional antennae.
Hence, either 9 or 12 cell pattern is to be with omni directional antennae, but traffic handling capacity is reduced. Hence they are not
preferred.
In order to use N=7 (or lower), directional antennas are used in every cell site. A cell having 3 sectors is very popular and will be like the
figure shown below.
With omni directional antennae, number of interfering cells shall be six. With directional antennae & 3 sectors the same is reduced to two.
For N=7 and three sectors, the C/I improves from 14.47 dB to 24.5 dB even in worst conditions. Then C/I meets the requirement of 18dB.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 5/53
10/2/2017 UMTS Quick Guide
For Urban applications, N=4 and a three sector cell is used so that more number of carriers per cell are obtained than N=7. Also the C/I
becomes 20 dB in worst cases.
Advantages of sectoring
Decrease co-channel interference
Disadvantages of sectoring
Large number of antennas at the base station.
Hand Off
When the mobile unit travels along a path it crosses different cells. Each time it enters into a different cell associated with f=different
frequency, control of the mobile is taken over by the other base station. This is known as ‘Hand off’.
It can be reduced by keeping the frequency separations between each RF channel in a given cell as large as possible. When the reuse factor
is small, this separation may not be sufficient.
A channel separation, by selecting RF frequencies, which are more than 6 channels apart, is sufficient to keep adjacent channel
interferences within limits.
Sectors = 3/cell
Trunking
Cellular radios rely on trunking to accommodate a large number of users in a limited radio spectrum. Each user is allocated a channel on
need/per call basis and on termination of the cell, the channel is returned to the common pool of RF channels.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 6/53
10/2/2017 UMTS Quick Guide
Because of trunking, there is a likelihood that a call is blocked if all the RF channels are engaged. This is called ‘Grade of Service’ “GOS”.
Cellular designer estimates the maximum required capacity and allocates the proper number of RF channels, in order to meet the GOS. For
these calculations, ‘ERLANG B’ table is used.
Cell Splitting
When the number of users reaches a saturation in a start-up cell (initial design) and no more spare frequency is available, then the start-up
cell is split, usually in four smaller cells and traffic increases by four and more number of subscribers can be served.
T2 = T0 x 42
P2 = P0 – n x 12 db
Hence cell splitting improves the capacity and lowers the transmission power.
The switching system also called as Network and Switching System (NSS), is responsible for performing call processing and subscriber-
related functions. The switching system includes the following functional units:
Authentication Center
Functions of MSC
Call handling that copes with the mobile nature of subscribers considering Location Registration, Authentication of subscribers and
equipment, Handover and Prepaid service.
Handling location registration and ensuring interworking between mobile station and VLR.
Acting as a gateway MSC to interrogate HLR. The MSC which is connected to the PSTN/ISDN network is called as GMSC. This is the
only MSC in the network connected to the HLR.
The identity of mobile subscriber called International Mobile Sub Identity (IMSI).
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 7/53
10/2/2017 UMTS Quick Guide
Subscription information on services.
Service restrictions.
One HLR per GSM network is recommended and it may be a distributed database. Permanent data in HLR is changed by the man-machine
interface. Temporary data like location information changes dynamically in HLR.
Part of the data of HLR for the mobiles that are currently located in MSC service area.
Grey List- The terminal is under observation from the network for the possible problems.
Black List- The terminals reported as stolen are not type approved. They are not allowed to connect to the network. EIR informs the
VLR about the list, the particular IMEI is in.
Authentication Centre
It is associated with an HLR. It stores an Identity key called Authentication key (Ki) for each Mobile subscriber. This key is used to generate
the authentication triplets.
Kc (Cipher Key) - To cipher communication over the radio path between the MS and the network.
Software installation
Traffic management
Configuration management
Subscriber administration
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 8/53
10/2/2017 UMTS Quick Guide
BTS and BSC communicate across the standardized Abis interface. BTS is controlled by BSC and one BSC can have many BTS under its
control.
Functions of BTS
The process of channel coding, Encryption, Multiplexing and modulation for trans-direction and reverse for reception are to be
carried out.
It has to arrange for transmission in advance from the mobiles depending upon their distance from BTS (Timing Advance).
It has to detect Random access requests from mobiles, measure and monitor the radio channels for power control and handover.
Mobile Station
It refers to the terminal equipment used by the wireless subscribers. It consists of:
Mobile Equipment
SIM is removable and with appropriate SIM, the network can be accessed using various mobile equipments.
The equipment identity is not linked to the subscriber. The equipment is validated separately with IMEI and EIR. The SIM contains an
integrated circuit chip with a microprocessor, random access memory (RAM) and read only memory (ROM). SIM should be valid and should
authenticate the validity of MS while accessing the network.
SIM also stores subscriber related information like IMSI, cell location identity etc.
Speech encoding/decoding
Mobility management
Performance measurements up to a maximum of six surrounding BTSs and reporting to the BSS, MS can store and display short received
alphanumeric messages on the liquid crystal display (LCD) that is used to show call dialing and status information.
There are five different categories of mobile telephone units specified by the European GSM system: 20W, 8W, 5W, 2W, and 0.8W. These
correspond to 43-dBm, 39-dBm, 37-dBm, 33-dBm, and 29-dBm power levels. The 20-W and 8-W units (peak power) are either for vehicle-
mounted or portable station use. The MS power is adjustable in 2-dB steps from its nominal value down to 20mW (13 dBm). This is done
automatically under remote control from the BTS.
Transcoders
Transcoders are a network entities inserted to interface the MSC side to Mobile side. The voice coding rate on the PSTN side is 64Kbps, and
in GSM over the air the voice is coded as 13Kbps. To reduce the data rate over the air interface and to reduce the loading of the terrestrial
link (4 : 1), transcoders are introduced at an appropriate place, mostly with MSC.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 9/53
10/2/2017 UMTS Quick Guide
The transcoder is the device that takes 13-Kbps speech or 3.6/6/12-Kbps data multiplexes and four of them to convert into standard 64-
Kbps data. First, the 13 Kbps or the data at 3.6/6/12 Kbps are brought up to the level of 16 Kbps by inserting additional synchronizing data
to make up the difference between a 13-Kbps speech or lower rate data and then four of them are combined in the transponder to provide
64 Kbps channel within the BSS. Four traffic channels can then be multiplexed in one 64-Kpbs circuit. Thus the TRAU output data rate is 64
Kbps.
Then, up to 30 such 64-Kpbs channels are multiplexed onto a 2.048 Mbps if a CEPT1 channel is provided on the A-bis interface. This
channel can carry up to 120-(16x 120) traffic and control signals. Since the data rate to the PSTN is normally at 2 Mbps, which is the result
of combining 30- by 64-Kbps channels, or 120- Kbps by 16-Kpbs channels.
SMS Flow
When a user sends an SMS, the request is placed via the MSC.
The MSC forwards the SMS to the SMSC where it gets stored.
The SMSC queries the HLR to find out where the destination mobile is and forwards the message to the destination MSC if the
destination mobile is available.
If the mobile is not available the message gets stored in the current SMSC itself. In most installations if a mobile is not available for
SMS delivery the SMSC does not retry. Instead, the destination MSC informs the SMSC when the mobile comes back in range. SMS
handling is a store and forward operation unlike USSD.
SMS has got a validity period for which it will wait for the destination mobile to be available. After that time the SMSC will delete
the message. The validity period can be set by the user. Normal validity is 1 day.
The signal strength variation for mobile is due to the different types of signal strength fading. There are two types of signal strength
variations.
Macroscopic Variations: Due to the terrain contour between BTS and MS. The fading effect is caused by shadowing and diffraction
(bending) of the radio waves.
Microscopic variations: Due to multipath, Short-term or Rayleigh fading. As the MS moves, radio waves from many different path
will be received.
Rayleigh Fading
Rayleigh Fading or Macroscopic Variations can be modeled as the addition of two components that make up the path loss between the
mobile and the base station. The first component is the deterministic component (L) that adds loss to the signal strength as the distance
(R) increases between the base and the mobile. This component can be written as:
Where n is typically 4. The other macroscopic component is a Log normal random variable which takes into account the effects of shadow
fading caused by variations in terrain and other obstructions in the radio path. Local mean value of path loss = deterministic component +
log normal random variable.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 10/53
10/2/2017 UMTS Quick Guide
Microscopic Variations or Rayleigh Fading occurs as the mobile moves over short distances compared to the distance between mobile and
base. These short term variations are caused by signal scattering in the vicinity of the mobile unit say by a hill, a building, or traffic. This
leads to many different paths that are followed between the transmitter and the receiver (Multipath Propagation). The reflected wave is
altered in both phase and amplitude. The signal may effectively disappear if the reflected wave is 180 degree out of phase with the direct
path signal. The partial out of phase relationships among multiple received signal produce smaller reduction in received signal strength.
Transmitting/Receiving Processes
There are two major processes involved in transmitting and receiving information over a digital radio link, coding, and modulation.
Coverage Extension
Multipath propagation allows radio signals to reach behind hills and buildings and into tunnels. Constructive and destructive
interference signals received through multi paths may add together or destroy each other.
Coding
Coding is the information processing that involves preparing the basic data signals so that they are protected and put in a form that the
radio link can handle. Generally the coding process includes the Logical EXclusive OR (EXOR). Coding is included in:
Interleaving
Encryption
Burst Formatting
Human speech is band limited between 300Hz to 3400Hz and undergoes Frequency Modulation in analog systems. In digital fixed PSTN
systems band limited speech is sampled at the rate of 8KHz and each sampled is encoded into 8 bits leading to 64Kbps (PCM A-Law of
encoding). Digital cellular radio cannot handle the high bit rate used for PSTN systems. Smart techniques for signal analysis and processing
have been developed for reduction of the bit rate.
Speech Properties
Human speech can be distinguished in elementary sounds (Phonemes). Depending on the language, there are 30 to 50 different phonemes.
The human voice is able to produce up to 10 phonemes per second, so that about 60 bit/s are required to transfer the speech. However, all
individual features and intonations would disappear. To preserve the individual features, the real amount of information to be sent is a
number of times higher, but still a fraction of the 64 Kbit/s used for PCM.
Based upon the phoneme production mechanism of the human organs of speech, a simple speech production model can be made. It
appears that during a short time interval of 10-30 ms, the model parameters like pitch-period, voiced/unvoiced, amplification gain, and
filter parameters remain about stationary (quasi stationary). The advantage of such a model is the simple determination of the parameters
by means of linear prediction.
Waveform Coding : Speech is transmitted as good as possible in wave form coding. PCM is an example of waveform coding. Bit
rate ranges from 24 to 64kbps and the quality of speech is good and the speaker can be recognized easily.
Parameter Coding : Only a very limited quantity of information is sent. A decoder built up according to the speech production
model will regenerate the speech at the receiver. Only 1 to 3kbps is required for the speech transmission. The regenerated speech
is intelligible but it suffers from noise and often the speaker cannot be recognized.
Hybrid Coding : Hybrid Coding is a mix of waveform coding and parameter coding. It combines the strong points of both
techniques and GSM uses a hybrid coding technique called RPE-LTP (Regular Pulse Excited-Long Term Prediction) resulting in
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 11/53
10/2/2017 UMTS Quick Guide
13Kbps per voice channel.
In a normal burst to blocks of 57 bits can be accommodated and if 1 such burst is lost there is a 25% BER for the entire 20ms.
Encryption /Ciphering
The purpose of Ciphering is to encode the burst so that it may not be interpreted by any other devices than the receiver. The Ciphering
algorithm in GSM is called the A5 algorithm. It does not add bits to the burst, meaning that the input and output to the Ciphering process is
the same as the input: 456 bits per 20ms. Details about Encryption are available under the special features of GSM.
Modulation
Modulation is the processing that involves the physical preparation of the signal so that the information can be transported on an RF
carrier. GSM uses Gaussian Minimum Shift Keying technique (GMSK). Carrier frequency is shifted by +/- B/4, where B=Bit rate. However
using the Gaussian filter, reduces the bandwidth to 0.3 instead of 0.5.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 12/53
10/2/2017 UMTS Quick Guide
Authentication
Encryption
Timing Advance
Discontinuous transmission
Power Control
Adoptive equalization
Authentication
Since the air interface is vulnerable to fraudulent access, it is necessary to employ the authentication before extending the services to a
subscriber. Authentication is built around the following notions.
Authentication Key (Ki) resides only in two places, SIM card and Authentication Center.
Authentication Key (Ki) is never transmitted over air. It is virtually impossible for unauthorized individuals to obtain this key to
impersonate a given mobile subscriber.
Authentication Parameters
The MS is authenticated by the VLR with a process that uses three parameters:
SRES which is an authentication signed response. It is generated by applying an authentication algorithm (A3) to RAND and Ki.
Kc which is cipher key. The Kc parameter generated by applying the cipher key generation algorithm (A8) to RAND and Ki.
These parameters (named an authentication triplet) are generated by the AUC at the request of the HLR to which the subscriber belongs.
The algorithms A3 and A8, are defined by the PLMN operator and are executed by the SIM.
The new VLR sends a request to the HLR/AUC (Authentication Center) requesting the "authentication triplets" (RAND, SRES, and
Kc) available for the specified IMSI.
The AUC using the IMSI, extracts the subscribers authentication key (Ki).The AUC then generates a random number (RAND),
applies the Ki and RAND to both the authentication algorithm (A3) and the cipher key, generation algorithm (A8) to produce an
authentication Signed Response (SRES) and a Cipher Key (Kc). The AUC then returns an authentication triplet: RAND, SRES and Kc
to the new VLR.
The MSC/VLR keeps the two parameters Kc and SRES for later use and then sends a message to the MS. The MS reads its
Authentication Key (Ki) from the SIM, applies the received random number (RAND) and Ki to both its authentication algorithm (A3)
and Cipher key generation Algorithm (A8) to produce an Authentication Signed Response (SRES) and Cipher key (Kc). The MS
saves Kc for later, and will use Kc when it receives command to cipher the channel.
The MS returns the generated SRES to the MSC/VLR. The VLR compares the SRES returned from the MS with the expected SRES
received earlier from the AUC. If equal, the mobile passes authentication. If unequal, all signaling activities will be aborted. In this
scenario, we will assume that authentication is passed.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 13/53
10/2/2017 UMTS Quick Guide
Encryption/Ciphering
Data is encrypted at the transmitter side in blocks of 114 bits by taking 114-bit plain text data bursts and performing an EXOR (Exclusive
OR) logical function operation with a 114-bit cipher block.
The decryption function at the receiver side is performed by taking the encrypted data block of 114 bits and going through the same
"exclusive OR" operation using the same 114-bit cipher block that was used at the transmitter.
The cipher block used by both ends of transmission path for a given transmission direction is produced at the BSS and MS by an encryption
algorithm called A5. The A5 algorithm uses a 64-bit cipher key (Kc), produced during the authentication process during call setup and the
22-bit TDMA frame number (COUNT) which takes decimal values from 0 through 2715647, and has a repetition time of 3.48 hours (hyper
frame interval).The A5 algorithm actually produce two cipher blocks during each TDMA period. One path for the uplink path and the other
for the downlink path.
Reason
By shifting three time slots, the mobile station avoids the ‘transmit and receive’ processes simultaneously. This allows an easier
implementation of the mobile station; the receiver in the mobile station does not need to be protected from the transmitter of the same
mobile station. Typically a mobile station will receive during one time slot, and then shifts in frequency by 45 MHz for GSM-900 or 95 MHz
for GSM-1800 to transmit sometime later. This implies that there is one time base for downlink and one for uplink.
Timing Advance
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 14/53
10/2/2017 UMTS Quick Guide
Timing Advance is the process of transmitting the burst to the BTS (the timing advance) early, to compensate for the propagation delay.
Why is it Needed?
It is required because of the time division multiplexing scheme used on the radio path. The BTS receives signals from different mobile
stations very close to each other. However when a mobile station is far from the BTS, the BTS must deal with the propagation delay. It is
essential that the burst received at the BTS fits correctly into time slot. Otherwise the bursts from the mobile stations using adjacent time
slots could overlap, resulting in a poor transmission or even in loss of communication.
Once a connection has been established, the BTS continuously measures the time offset between its own burst schedule and the reception
schedule of the mobile station burst. Based on these measurements, the BTS is able to provide the mobile station with the required timing
advance via the SACCH. Note that timing advance is derived from the distance measurement which is also used in the handover process.
The BTS sends a timing advance parameter according to the perceived timing advance to each mobile station. Each of the mobile station
then advances its timing, with the result that signals from the different mobile stations arriving at BTS, and are compensated for
propagation delay.
A 6 bit number indicates how many bits the MS must advance its transmission. This time advance is TA.
The 68.25 bit long GP (guard period) of the access burst provides the required flexibility to advance the transmission time.
The time advance TA can have a value between 0 and 63 bits long, which corresponds to a delay of 0 to 233 micro second. For
instance the MS at 10 km away from the BTS must start transmitting 66 micro second earlier to compensate for the round trip
delay.
The maximum mobile range of 35Km is rather determined by the timing advance value than by the signal strength.
It should be a cell of the selected PLMN. The mobile station checks whether the cell is part of the selected PLMN.
It should not be "barred". The PLMN operator may decide not to allow mobile stations to access certain cells. These cells may, for
example only be used for handover traffic. Barred cell information is broadcast on the BCCH to instruct mobile stations not to
access these cells.
The radio path loss between the mobile station and the selected BTS must be above a threshold set by the PLMN operator.
If no suitable cell is found then the MS enters a "limited service" state in which it can only make emergency calls.
A page message its broadcast which contains the identification code of the MS. Not every Base Station Controller (BSC) in the
network is requested to transmit the page message. The broadcast is limited to a cluster of radio cells that together form a location
area. The last reported position of the MS identifies the location area to be used for the broadcast.
The MS monitors the page message transmitted by the radio cell in which it is located and, on detecting its own identification code,
responds by transmitting a page response message to the Base Transceiver Station (BTS).
Communication is then established between the MSC and the MS via BTS that received the page response message.
Location Update
Case 1: Location never updates.
If location never updates the implementation for location update, cost becomes zero. But we have to page every cell for locating the MS
and this procedure will not be cost effective.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 15/53
10/2/2017 UMTS Quick Guide
Location updates are taking place as per the requirements of the network, may be time or movement or distance based. This procedure
involves high cost, but we have to page single cell or few cells only for locating the MS and this procedure will be cost effective.
Network Configuration
The configuration of a Public Land Mobile Network (PLMN) is designed so that active mobile station moving in the network area is still able
to report its position. A network consists of different areas:
PLMN area
Location area
MSC area
PLMN Area
A PLMN area is the geographical area in which land mobile communication services are provided to the public by a particular PLMN
operator. From any position within a PLMN area, the mobile user can set up calls to another user of the same network, or to a user of
another network. The other network may be a fixed network, another GSM PLMN, or another type of PLMN. Users of the same PLMN or
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 16/53
10/2/2017 UMTS Quick Guide
users of other networks can also call a mobile user who is active in the PLMN area. When there are several PLMN operators, the
geographical areas covered by their networks may overlap. The extent of a PLMN area is normally limited by national borders.
Location Area
To eliminate the need for network-wide paging broadcasts, the PLMN needs to know the approximate positions of the MSs that are active
within its coverage area. To enable the approximate positions of any MS to be represented by a single parameter, the total area covered by
the network is divided into location areas. A Location Area (LA) is a group of one or more radio cells. This group fulfills the following
requirements:
BSCs those serve the same location area are always connected to the same MSC.
Radio cells with BTSs controlled by a common BSC can lie in different location areas.
As the MS moves through the network area, the signal received from the selected control channel gradually diminishes in strength until it is
no longer the strongest. At this point the MS re-tunes to the channel that has become dominant and examines the LAI code that it is
broadcasting. If the received LAI code differs from that stored on the SIM, then the MS has entered another location area and initiates a
location update procedure to report the change to the MSC. At the end of the procedure, the LAI code in the SIM is also updated.
MSC areas
An MSC area is a region of the network in which GSM operations are controlled by a single MSC. An MSC area consists of one more location
areas. The boundary of an MSC area follows the external boundaries of the location areas on its periphery. Consequently, a location area
never spans beyond the boundary of an MSC area.
VLR area
A VLR area is region of the network that is supervised by a single Visitor Location Register (VLR). In theory, a VLR area may consist of one
more MSC areas. In practice, however the functions of the VLR are always integrated with those of the MSC so that the terms "VLR area"
and "MSC area" have become synonymous.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 17/53
10/2/2017 UMTS Quick Guide
or from an MS in the area. When an MS moves from one area to another, the responsibility for its supervision passes from one VLR to
another. A new data record is created by the VLR that has adopted the MS, and the old record is deleted. Provided that aninter-working
agreement exists between the network operators concerned, data transaction can cross both network and national boundaries.
SUBSCRIPTION INFORMATION
The subscription information includes the IMSI and directory number allocated to the subscriber, the type of services provided and any
related restrictions.
LOCATION INFORMATION
The location information includes the address of the VLR in the area where the subscribers MS is currently located and the address of the
associated MSC.
The location information enables incoming calls to be routed to the MS. The absence of this information indicates that the MS is inactive
and cannot be reached.
When an MS moves from one VLR area to another, the location information in the HLR is updated with the new entry for the MS, using
subscription data copied from the HLR. Provided that an inter-working agreement exists between the network operators, concerned data
transactions can move across both network and national boundaries.
The composition of the MSISDN is such that it can be used as a global title address in the Signaling Connection Control Part (SCCP) for
routing message to the HLR of the mobile subscriber.
An MS is identified by its IMSI. The IMSI is embedded in the SIM of the mobile equipment. It is provided by the MS anytime it accesses the
network.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 18/53
10/2/2017 UMTS Quick Guide
A VLR allocates a unique TMSI code to each mobile subscriber that is operating in its area. This code which is only valid within the area
supervised by the VLR is used to identify the subscriber, in messages to and from the MS. When a change of location area also involves a
change of VLR area, a new TMSI code is allocated and communicated to the MS. The MS stores the TMSI on its SIM. The TMSI consists of
four octets.
The MS enters a new cell area, listens to the Location Area Identity (LAI) being transmitted on the broadcast channel (BCCH), and
compares this LAI with the last LAI (stored in the SIM) representing the last area where the mobile was registered.
The MS detects that it has entered a new Location Area and transmits a Channel Request message over the Random Access
Channel (RACH).
Once the BSS receives the Channel Request message, it allocates a Stand-alone Dedicated Control Channel (SDCCH) and forwards
this channel assignment information to the MS over the Access Grant Channel (AGCH). It is over the SDCCH that the MS will
communicate with the BSS and MSC.
The MS transmits a location update request message to the BSS over the SDCCH. Included in this message are the MS Temporary
Mobile Subscriber Identity (TMSI) and the old Location Area Subscriber (old LAI). The MS can identify itself either with its IMSI or
TMSI. In this example, we will assume that the mobile provided a TMSI. The BSS forwards the location update request message to
the MSC.
The VLR analyses the LAI supplied in the message and determines that the TMSI received is associated with a different VLR (old
VLR). In order to proceed with the registration the IMSI of the MS must be determined. The new VLR derives the identity of the old
VLR by using the received LAI, supplied in the location update request message. It also requests the old VLR to supply the IMSI for
a particular TMSI.
Location Update Scenario-Update HLR/VLR is a point where we are ready to inform the HLR that the MS is under control of a new
VLR and that the MS can be de-registered from the old VLR. The steps in update HLR/VLR phase are:
The new VLR sends a message to the HLR informing it that the given IMSI has changed locations and can be reached by
routing all incoming calls to the VLR address included in the message.
The HLR requests the old VLR to remove the subscriber record associated with the given IMSI. The request is
acknowledged.
The HLR updates the new VLR with the subscriber data (mobiles subscribers’ customer profile).
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 19/53
10/2/2017 UMTS Quick Guide
The MSC forwards the location update accept message to the MS. This message includes the new TMSI.
The MS retrieves the new TMSI value from the message and updates its SIM with this new value. The mobile then sends an update
complete message back to the MSC.
The MSC requests from the BSS, that the signaling connection be released between the MSC and the MS.
The MSC releases its portion of the signaling connection when it receives the clear complete message from the BSS.
The BSS sends a "radio resource" channel release message to the MS and then free up the Stand-alone Dedicated Control Channel
(SDCCH) that was allocated previously. The BSS then informs the MSC that the signaling connection has been cleared.
Hand Over
This is the process of automatically switching a call in progress from one traffic channel to another to neutralize the adverse effects of the
user movements. Hand over process will be started only if the power control is not helpful anymore.
The Hand Over process is MAHO (Mobile Assisted Hand Over). It starts with the Down Link Measurements by the MS (Strength of the signal
from BTS, Quality of the signal from BTS). MS can measure the signal strength of the 6 best neighboring BTS downlink (candidate list).
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 20/53
10/2/2017 UMTS Quick Guide
Maximize the amount of time the mobile station is in the best cell.
Distance (propagation delay) between the MS and BTS becomes too big.
Path loss situation for the mobile station to another cell is better.
Serving GPRS Support Node (SGSN): the MSC of the GPRS network.
GPRS is designed to work within the existing GSM infrastructure with additional packet switching nodes.
This packet mode technique uses multi-slot technology together with support for all coding schemes (CS-1 to CS-4) to increase the
data rates up to 160 kbit/s.
The GPRS system uses the physical radio channels as defined for GSM. A physical channel used by GPRS is called a Packet Data
Channel (PDCH).
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 21/53
10/2/2017 UMTS Quick Guide
The PDCHs can either be allocated for GPRS (dedicated PDCH) or used by GPRS only if no circuit-switched connection requires them
(on-demand). The operator can define 0-8 dedicated PDCHs per cell. The operator can specify where he wants his PDCHs to be
located.
The first dedicated PDCH in the cell is always a Master PDCH (MPDCH). The on-demand PDCHs can be pre-empted by incoming
circuit switched calls in congestion situations in the cell.
CS-1 8.0
CS-2 12.0
CS-3 14.4
CS-4 20.0
Mobility management
Authentication
Attach/detach
Charging data
There is a location register within the SGSN and this stores the location information (e.g., current cell, current VLR). It also stores the user
profiles (e.g., IMSI, packet addresses used) for all the GPRS users registered with the particular SGSN.
The GGSN organizes the inter-working between the GPRS/EDGE network and external packet switched networks to which the
mobiles may be connected. These may include both Internet and X.25 networks.
The GGSN can be considered to be a combination of a gateway, router and firewall as it hides the internal network to the outside.
In operation, when the GGSN receives data addressed to a specific user, it checks if the user is active, then forwards the data. In
the opposite direction, packet data from the mobile is routed to the right destination network by the GGSN.
BSC: Requires a software upgrade and the installation of new hardware called the packet control unit (PCU). PCU is responsible for
handling the Medium Access Control (MAC) and Radio Link Control (RLC) layers of the radio interface and the BSSGP and Network
Service layers of the Gb interface. There is one PCU per BSC. The Gb interface, carry GPRS/EGPRS traffic from the SGSN (Serving
GPRS Support Node) to the PCU.
GPRS Support Nodes (GSNs): The deployment of GPRS requires the installation of new core network elements called the serving
GPRS support node (SGSN) and gateway GPRS support node (GGSN).
Databases (HLR, VLR, etc.): All the databases involved in the network will require software upgrades to handle the new call models
and functions introduced by GPRS.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 22/53
10/2/2017 UMTS Quick Guide
Cell: Cell is the basic service area and one BTS covers one cell. Each cell is given a Cell Global Identity (CGI), a number that
uniquely identifies the cell.
LA: A group of cells form a Location Area. This is the area that is paged when a subscriber gets an incoming call. Each Location
Area is assigned a Location Area Identity (LAI). Each Location Area is served by one or more BSCs.
MSC/VLR Service Area: The area covered by one MSC is called the MSC/VLR service area.
PLMN: The area covered by one network operator is called PLMN. A PLMN can contain one or more MSCs.
GSM Service Area: The area in which a subscriber can access the network.
UMTS - Edge
Enhanced Data rates for Global Evolution (EDGE) introduces a new modulation technique, as well as protocol enhancements for
transmitting packets over the radio.
The use of the new modulation and the protocol enhancements, result in dramatically increased throughput and capacity gains enabling 3G
services in the existing GSM/GPRS networks.
No changes are needed to the existing core network infrastructure to support EDGE. This emphasizes the fact that EDGE is only an “add-
on” for BSS.
For EDGE, nine Modulation and Coding Schemes (MCS) are introduced (MCS1 to MCS9) and optimized for different radio environment. Four
EDGE coding schemes are using GMSK and five are using 8 PSK Modulation.
Upgradation to EDGE
Mobile Station (MS): MS should be EDGE enabled.
GPRS Support Nodes (GSNs): Definitions for Edge need to be defined in GSNs.
Benefits of EDGE
Short-term benefits: Capacity and performance,
Cost effective,
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 23/53
10/2/2017 UMTS Quick Guide
Long-term benefit: Harmonization with WCDMA.
Quicker MMS
Video phone
Network Evolution
The main idea behind 3G is to prepare a universal infrastructure able to carry existing and also future services. The infrastructure should be
so designed that technology changes and evolution can be adapted to the network without causing uncertainties to the existing services
using the existing network structure.
WCDMA Technology
The first Multiple Access Third Generation Partnership Project (3GPP) Wideband Code Division networks (WCDMA) were launched in 2002.
At the end of 2005, there were 100 WCDMA networks open and a total of more than 150 operators with licenses for frequencies WCDMA
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 24/53
10/2/2017 UMTS Quick Guide
operation. Currently, WCDMA networks are deployed in UMTS band of around 2 GHz in Europe and Asia, including Japan and America
Korea. WCDMA is deployed in the 850 and 1900 of the existing frequency allocations and the new 3G band 1700/2100 should be available
in the near future. 3GPP has defined WCDMA operation for several additional bands, which are expected to be commissioned in the coming
years.
As WCDMA mobile penetration increases, it allows WCDMA networks to carry a greater share of voice and data traffic. WCDMA technology
provides some advantages for the operator in that it allows the data, but also improves the voice of base. Voice capacity offered is very
high due to interference control mechanisms, including frequency reuse of 1, fast power control, and soft handover.
WCDMA can offer a lot more voice minutes to customers. Meanwhile WCDMA can also improve broadband voice service with AMR codec,
which clearly provides better voice quality than fixed telephone landline. In short, WCDMA can offer more voice minutes with better quality.
In addition to the high spectral efficiency, third-generation (3G) WCDMA provides even more dramatic change in capacity of the base
station and the efficiency of the equipment. The high level of integration in the WCDMA is achieved due to the broadband carrier: a large
number of users supported by the carrier, and less radio frequency (RF) carriers are required to provide the same capacity.
With less RF parts and more digital baseband processing, WCDMA can take advantage of the rapid evolution of digital signal processing
capability. The level of integration of the high base station enables efficient building high capacity sites since the complexity of RF
combiners, additional antennas or power cables can be avoided. WCDMA operators are able to provide useful data services, including
navigation, person to person video calls, sports and video and new mobile TV clips.
WCDMA enables simultaneous voice and data which allows, for example, browsing or email when voice conferencing or video sharing in real
time during voice calls.
The operators also offer mobile connectivity to the Internet and corporate intranet with maximum bit rate of 384 kbps downlink and both
uplink. The first terminals and networks have been limited to 64 to 128 kbps uplink while the latter products provide 384 kbps uplink.
HSPA Standardization
High-speed downlink packet access (HSDPA) was standardized as part of 3GPP Release 5 with the first specification version in
March 2002.
High-speed uplink packet access (HSUPA) was part of 3GPP Release 6 with the first specification version in December 2004.
HSDPA and HSUPA together are called High-Speed Packet Access’ (HSPA).
The first commercial HSDPA networks were available at the end of 2005 and the commercial HSUPA networks were available on
2007.
The HSDPA peak data rate available in the terminals is initially 1.8Mbps and will increase to 3.6 and 7.2 Mbps during 2006 and
2007, and later on 10Mbps and beyond 10Mbps.
The HSUPA peak data rate in the initial phase was 1–2 Mbps and the second phase was 3–4Mbps.
HSPA is deployed over the WCDMA network on the same carrier or - for high capacity and high speed solution - using another carrier, see
figure above. In both cases, WCDMA and HSPA can share all the network elements in the core network and the radio network comprising
base stations, radio network controller (RNC), Serving GPRS Support Node (SGSN) and the Gateway GPRS Support Node (GGSN). WCDMA
and HSPA also share the site base station antennas and antenna cables.
The upgrade WCDMA HSPA requires new software and potentially new equipment in the base station and RNC to support the rate and
higher data capacity. Because of the shared infrastructure between WCDMA and HSPA, the cost of the upgrade WCDMA HSPA is very low
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 25/53
10/2/2017 UMTS Quick Guide
Uplink: 50 Mb/s
Above numbers are only valid for a reference configuration of two antennas for reception and one transmit antenna in the terminal, and
within a 20 MHz spectrum allocation.
Looking at the protocol stacks for interfaces between the network nodes, it is clear that simple model of IP is not applicable to a mobile
network. There are virtual layers in between, which is not applicable to a mobile network. There are virtual layer in between, in the form of
“tunnels”, providing the three aspects - mobility, security, and quality of service. Resulting, IP based protocols appear both on the transport
layer (between network nodes) and on higher layers.
The minimum transmission and signaling overhead especially in air, in an idle mode of the dual mode UE signaling should be minimized, in
the radio channel multicast capability. It is required to be reused or extended, as roaming and network sharing restrictions, compatible with
traditional principles established roaming concept, quite naturally, the maximum transmission delay required is equivalent to the fixed
network, specifically less than 5 milliseconds, set to control plane is less than 200 milliseconds delay target.
Looking at the evolution of the 3GPP system in full, it may not seem less complex than traditional 3GPP system, but this is due to the huge
increase in functionality. Another strong desire is to arrive at a flat structure, reducing CAPEX/OPEX for operators in the 3GPP architecture
carriers.
Powerful control functions should also be maintained with the new 3GPP systems, both real-time seamless operation (for example, VoIP)
and non-real-time applications and services. The system should perform well for VoIP services in both the scenarios. Special attention is
also paid to the seamless continuity with legacy systems (3GPP and 3GPP2), supports the visited network traffic local breakout of voice
communications.
The Home Location Register (HLR) keeps track of the current location of all the home network subscribers. Mutual authentication between a
mobile station and a visited network is carried out with the support of the current GSN (SGSN) and the MSC / VLR, respectively. UMTS
supports encryption of the radio interface and the integrity protection of signaling messages.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 26/53
10/2/2017 UMTS Quick Guide
in the near future. 3GPP has defined WCDMA operation for several additional bands, which are expected to be commissioned in the coming
years.
As WCDMA mobile penetration increases, it allows WCDMA networks to carry a greater share of voice and data traffic. WCDMA technology
provides some advantages for the operator in that it allows the data, but also improves the voice of base. Voice capacity offered is very
high due to interference control mechanisms, including frequency reuse of 1, fast power control, and soft handover.
WCDMA can offer a lot more voice minutes to customers. Meanwhile WCDMA can also improve broadband voice service with AMR codec,
which clearly provides better voice quality than fixed telephone landline. In short, WCDMA can offer more voice minutes with better quality.
In addition to the high spectral efficiency, third-generation (3G) WCDMA provides even more dramatic change in capacity of the base
station and the efficiency of the equipment. The high level of integration in the WCDMA is achieved due to the broadband carrier: a large
number of users supported by the carrier, and less radio frequency (RF) carriers are required to provide the same capacity.
With less RF parts and more digital baseband processing, WCDMA can take advantage of the rapid evolution of digital signal processing
capability. The level of integration of the high base station enables efficient building high capacity sites since the complexity of RF
combiners, additional antennas or power cables can be avoided. WCDMA operators are able to provide useful data services, including
navigation, person to person video calls, sports and video and new mobile TV clips.
WCDMA enables simultaneous voice and data which allows, for example, browsing or email when voice conferencing or video sharing in real
time during voice calls.
The operators also offer mobile connectivity to the Internet and corporate intranet with maximum bit rate of 384 kbps downlink and both
uplink. The first terminals and networks have been limited to 64 to 128 kbps uplink while the latter products provide 384 kbps uplink.
WCDMA-3G
3G wireless service has been designed to provide high data speeds, always-on data access, and greater voice capacity. Listed below are a
few notable points:
The high data speeds, measured in Mbps, enable full motion video, high-speed internet access and video-conferencing.
3G technology standards include UMTS, based on WCDMA technology (quite often the two terms are used interchangeably) and
CDMA2000, which is the outgrowth of the earlier CDMA 2G technology.
UMTS standard is generally preferred by countries that use GSM network. CDMA2000 has various types, including 1xRTT, 1xEV-DO
and 1xEV-DV. The data rates they offer range from 144 kbps to more than 2 mbps.
Sub-systems of 3G Network
A GSM system is basically designed as a combination of three major subsystems:
Network Subsystem (NSS): MSC/VLR, HLR, AuC, SMSC, EIR, MGW. Common for both 2G & 3G Network.
IuCS: Between RNC and MSC for speech & Circuit data;
High-speed downlink packet access (HSDPA) was standardized as part of 3GPP Release 5 with the first specification version in
March 2002.
High-speed uplink packet access (HSUPA) was part of 3GPP Release 6 with the first specification version in December 2004.
HSDPA and HSUPA together are called High-Speed Packet Access’ (HSPA).
The first commercial HSDPA networks were available at the end of 2005 and the commercial HSUPA networks were available on
2007.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 27/53
10/2/2017 UMTS Quick Guide
The HSDPA peak data rate available in the terminals is initially 1.8Mbps and will increase to 3.6 and 7.2 Mbps during 2006 and
2007, and later on 10Mbps and beyond 10Mbps.
The HSUPA peak data rate in the initial phase was 1–2 Mbps and the second phase was 3–4Mbps.
HSPA is deployed over the WCDMA network on the same carrier or - for high capacity and high speed solution - using another carrier, see
figure above. In both cases, WCDMA and HSPA can share all the network elements in the core network and the radio network comprising
base stations, radio network controller (RNC), Serving GPRS Support Node (SGSN) and the Gateway GPRS Support Node (GGSN). WCDMA
and HSPA also share the site base station antennas and antenna cables.
The upgrade WCDMA HSPA requires new software and potentially new equipment in the base station and RNC to support the rate and
higher data capacity. Because of the shared infrastructure between WCDMA and HSPA, the cost of the upgrade WCDMA HSPA is very low
compared to the construction of a new stand-alone data network.
UMTS - Objectives
Of many, below mentioned are few objectives of UMTS -
Uplink: 50 Mb/s
Above numbers are only valid for a reference configuration of two antennas for reception and one transmit antenna in the terminal, and
within a 20 MHz spectrum allocation.
Looking at the protocol stacks for interfaces between the network nodes, it is clear that simple model of IP is not applicable to a mobile
network. There are virtual layers in between, which is not applicable to a mobile network. There are virtual layer in between, in the form of
“tunnels”, providing the three aspects - mobility, security, and quality of service. Resulting, IP based protocols appear both on the transport
layer (between network nodes) and on higher layers.
The minimum transmission and signaling overhead especially in air, in an idle mode of the dual mode UE signaling should be minimized, in
the radio channel multicast capability. It is required to be reused or extended, as roaming and network sharing restrictions, compatible with
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 28/53
10/2/2017 UMTS Quick Guide
traditional principles established roaming concept, quite naturally, the maximum transmission delay required is equivalent to the fixed
network, specifically less than 5 milliseconds, set to control plane is less than 200 milliseconds delay target.
Looking at the evolution of the 3GPP system in full, it may not seem less complex than traditional 3GPP system, but this is due to the huge
increase in functionality. Another strong desire is to arrive at a flat structure, reducing CAPEX/OPEX for operators in the 3GPP architecture
carriers.
Powerful control functions should also be maintained with the new 3GPP systems, both real-time seamless operation (for example, VoIP)
and non-real-time applications and services. The system should perform well for VoIP services in both the scenarios. Special attention is
also paid to the seamless continuity with legacy systems (3GPP and 3GPP2), supports the visited network traffic local breakout of voice
communications.
The Home Location Register (HLR) keeps track of the current location of all the home network subscribers. Mutual authentication between a
mobile station and a visited network is carried out with the support of the current GSN (SGSN) and the MSC / VLR, respectively. UMTS
supports encryption of the radio interface and the integrity protection of signaling messages.
UMTS - Authentication
UMTS is designed to interoperate with GSM networks. To protect GSM networks against man-in-middle attacks, 3GPP is considering to add
a structure RAND authentication challenge.
The mobile station and the base station to establish a radio resource control connection (RRC connection). During the establishment
of the connection the mobile station sends its security capabilities to the base station. Security features include UMTS integrity and
encryption algorithms supported and possibly GSM encryption capabilities as well.
The mobile station sends its temporary identity TMSI current on the network.
If the network cannot solve the TMSI, he asks the mobile station to send its permanent identity and the mobile stations responding
to the request with the IMSI.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 29/53
10/2/2017 UMTS Quick Guide
The visited network requests authentication of the home network of the mobile station data.
The home network returns a random challenge RAND, the corresponding authentication token AUTN, authentication
The visited network sends RAND authentication challenge and authentication token AUTN to the mobile Station.
The mobile station checks AUTN and calculates the authentication response. If AUTN is corrected.
The mobile station sends its authentication response RES to the visited network.
Visiting the network checks if RES = XRES and decide which security algorithms radio subsystem is allowed to use.
The radio access network informs the mobile station of their choice in the security mode command message.
The message also includes the network security features received from the mobile station in step 1.
The mobile station confirms the protection of the integrity and verify the accuracy of the safety functions.
The MSC / SGSN decides which GSM encryption algorithms are allowed and calculates the key GSM Kc UMTS keys IK, CK.
The MSC / SGSN advises the GSM BSS authorized algorithms and transmits the GSM cipher key Kc.
GSM BSS decide which encryption algorithms allowed to use based encryption capabilities of the mobile station.
GSM BSS sends the GSM cipher mode command to the station.
First step is to connect to and register with the network. For this the transmission of user data requires the establishment of PDP (Packet
Data Protocol) environment. At this point only the IP address is assigned. GPRS is also known as 2.5G network.
For both GSM/CS (Circuit Switching) and GPRS/PS (Packet Switching), continuous efforts for optimizations were made on the basis of
higher modulation efficiency under EDGE (Enhanced Data Rates for GSM Evolution), but nothing was changed fundamentally.
The next 3G generation of mobile networks (UMTS) built on a new radio technology known as WCDMS (Wideband CDMA) and it ensured
two things:
UMTS network architecture was designed keeping both CS and PS in parallel. Later on, a completely different service layer was created in
form of the Internet and Multimedia Subsystem (IMS). UMTS was latter on improved for higher data rates by HSPA and HSPA+. This was
divided into downlink/HSDPA and uplink/HSUPA. 3GPP Rel 5 has standardized for HSDPA and Rel 6 has standardized for HSUPA. HSPA+
comes under Rel. 7 standard of 3GPP.
Continuous improvement was achieved already within the legacy PS technology by Direct Tunnel approach. However, it was clear that more
changes in architecture are required to achieve this goal. Another aspect of improvement in the legacy technology can be identified with
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 30/53
10/2/2017 UMTS Quick Guide
supernatural efficiency, the effective number of bits deliverable per radio frequency unit and time unit. Even though new radio spectrum
has been made available for mobile communication, the pressure for cost reduction and competitiveness required further gain.
Release 4 March 2001 MSC Split into MSC server and Media Gateway
Release 7 Dec 2007 Unified PCC, Direct Tunnel, MIMO, HSPA+, IMS, VCC
RNC network Radio NW controller: controlling and concentrating node in the 3G radio
(G)MSC Nodes (Gateway) Mobile Switching Center: circuit switched core network
S/GGSN Nodes Serving/Gateway GPRS Support Node: packet switched core network
HLR/HSS base Home Location Register / Home Subscription Server: central data
PCRF Policy and Charging Rules Function: a control node for policy management and charging
The access networks which are not defined by the 3GPP, but may be used in conjunction with the evolved 3GPP system are called "non-
3GPP access networks".
The area of service must be understood as the multitude of IP services, so in general they are represented and implemented by packet data
networks (PDN). IP service can simply offer a raw IP connectivity (i.e. allowing an internet connection), providing a connection to a
corporate network, or an advanced IP-based control functionality such as telephony and instant messaging via IMS.
It is called "Evolved UTRAN" (EUTRAN). GERAN and UTRAN are the existing radio access networks and are connected to the legacy PS
domain.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 31/53
10/2/2017 UMTS Quick Guide
Evolved Packet Core (EPC) in addition to the basic functions to manage packet routing and forwarding (for the transport of user data)
contains all the features necessary to control especially for mobility, session handling, safety and load.
For interworking with legacy CS domain, the CS core network should be considered as well and interfaced with the backend IMS. The
dotted arrow indicates an optional interconnection between legacy CS core networks and the new network Evolved Packet Core, the decline
in profit to the CS domain for voice services, if necessary.
Point to the EU reference (which includes radio link interface and a mobile network protocol stack bound) is called "LTE-U u" to indicate that
it differs from the legacy counterpart EU X2 connectivity neighboring eNodeBs. They may be considered for most of the E-UTRAN and is
used in most cases of handovers between radio cells.
As the UE moves, long handover preparation is done via signaling, through X2 between the two data eNodeBs and affected users can be
transmitted between them for a short period of time. Only in special cases, it may happen that X2 is not configured for eNodeB between
two neighbors. In this case transfers are always supported, but the preparation of transfer and the data transmission is then made via the
EPC. Accordingly, higher latency and less "homogeneity" must therefore be provided.
Radio Resource Management: Radio Bearer Control, Radio Admission Control, Connection Control Mobility, dynamic allocation of
resources (i.e. scheduling) to UES as uplink and downlink.
Forwarding the data packets of user plane to the EPC (especially, toward the GW node service).
Transport level packet marking in the uplink, for example, DiffServ code point setting, based on the QoS class index (QCI) of the
EPS bearer associated.
Planning and transmission of broadcast information (origin of the MME or O & M).
Measurement configuration delivering and reporting on the extent of mobility and programming.
The first was promoted as the good performance of the GPRS Tunneling Protocol (GTP), while the other pushed for the new (and the so-
called "base" of the IETF) protocols.
GTP evolution : This protocol has proven its usefulness and capabilities to operators, and was very successful in the large scale
operations. It was designed exactly to the needs of the mobile networks PS.
IETF based protocols : IETF is the de facto standards body for the internet. Their mobility protocols have evolved from focusing
on mobile IP-based network client to "Proxy Mobile IP (MIP)." PMIP was standardized in 3GPP Evolved parallel system. (But Mobile
IP client base is used in EPS in conjunction with non-3GPP access support.)
LTE-Uu
LTE-Uu is the point of reference for radio interface between EU and eNodeB, encompasses control plane and user plane. The top layer of
the control plan is called "Radio Resource Control" (RRC). It is stacked on "Packet Data Convergence Protocol" (PDCP), Radio Link Control
and MAC layers.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 32/53
10/2/2017 UMTS Quick Guide
S1-U
SI-U is the point for user plane traffic between eNodeB and serve GW reference. The main activity via this benchmark is to transfer IP
packets encapsulated users arising from traffic or tunnel shape. Encapsulation is needed to realize the virtual IP link between eNodeB and
GW service, even during the movement of EU, and thus enable mobility. The protocol used is based on GTP-U.
S1-MME
S1-MME is the point for the control plane between eNodeB and MME reference. All control activities are carried out on it, for example,
signaling for attachment, detachment, and the establishment of the support of the change, safety procedures, etc. Note that some of this
traffic is transparent to the E-UTRAN and is exchanged directly between EU and MS, it is a part called "non-access stratum" (NAS)
signaling.
S5
S5 is the benchmark that includes the control and user plane between GW and PDN GW Service and applies only if both nodes reside in the
HPLMN; the corresponding reference point when serving GW is VPLMN is called S8. As explained above, two protocol variants are possible
here, an enhanced GPRS Tunneling Protocol (GTP) and Proxy Mobile IP (PMIP).
S6a
S6a is the reference point for the exchange of information relating to subscriptions equipment (download and purging). It corresponds to Gr
and D reference point in the existing system, and is based on the DIAMETER protocol.
SGi
This is the point of exit for DPR, and corresponds to the Gi reference point GPRS and Wi in I-WLAN. IETF protocols are based here for the
user plane (i.e. IPv4 and IPv6 packet forwarding) protocols and control plane as DHCP and radius/diameter for configuring IP
address/external network protocol are used.
S10
S10 is a reference point for the MME relocation purposes. It is a pure control plane interface and advanced GTP-C protocol is used for this
purpose.
S11
S11 is a reference point for the existing control plane between MME and GW service. It employs the advanced GTP-C (GTP-C v2) protocol.
The holder(s) of data between eNodeB and serve GW are controlled by the concatenation S1-S11 and MME.
S13
S13 is the reference point for Equipment Identity Register (EIR) and MME, and it is used for identity control (e.g. based on IMEI, if
blacklisted). It uses the diameter protocol SCTP.
Gx
Gx is the reference point of the QoS policy filtering policy and control the load between PCRF and PDN GW. It is used to provide filters and
pricing rules. The protocol used is the DIAMETER.
Gxc
Gxc is the reference point that exists in over Gx but is located between GW and PCRF and serves only if PMIP is used on S5 or S8.
Rx
Rx is defined as an application function (AF), located in NDS and PCRF for the exchange of policy and billing information; it uses the
DIAMETER protocol.
Extends back to the HPLMN (via an interconnection network), which means that all EU user traffic is routed through a PDN GW in the
HPLMN, where the DPRs are connected; or
For the sake of a more optimal way of traffic, it leaves a PDN GW in the VPLMN to a local PDN.
The first is called "home routed traffic" and the second is called "local breakout". (Note that the second term is also used in the discussion
of traffic optimization for home NBs/eNodeB, but with a different meaning because in the concept of roaming 3GPP, the control plan always
involves the HPLMN).
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 33/53
10/2/2017 UMTS Quick Guide
From the beginning, it was clear that the 3GPP Evolved system will interoperate seamlessly with existing 2G and 3G systems, 3GPP PS
widely deployed or, more precisely, with GERAN and UTRAN GPRS base (For aspects of interworking with the old CS system for the
treatment of optimized voice).
The question of the basic architectural design to 2G/3G in EPS is the location of the GGSN map. Two versions are available, and both are
supported:
The GW used : It is the normal case where serving the GW ends the user plane (as seen in the existing GPRS network).
The control plan is completed in the MME, according to the distribution of users and control plane in EPC. S3 and S4 reference
points are introduced, and they are based on GTP-U and GTP-C, correspondingly. S5/S8 is chained to the PDN GW. The advantage
is that interoperability is smooth and optimized. The downside is that for this kind of interoperability SGSN must be upgraded to
Rel. 8 (due to the necessary support new features on S3 and S4).
The PDN GW : In this case the unchanged benchmark inheritance Gn (when roaming, it would Gp) is reused between SGSN and
PDN GW, for both control and user plane. The advantage of this use is that SGSN can be pre-Rel. 8. Furthermore, it carries a
certain restriction on IP versions, transfer and S5 / S8 protocol.
Single Radio Voice Call Continuity (SRVCC) for transferring voice calls from LTE (with voice over IMS) to the legacy system.
CS fallback: Enabling a temporary move to the legacy CS before a CS incoming or outgoing activity is performed.
Note that the MSC serving the EU can be different than supporting the Sv interface. In the IMS, an application server (AS) for SRVCC is
necessary. Sv is based on GTPv2 and helps prepare resources in the target system (access and core network and the interconnection
between CS and IMS domain), while being connected to access the source.
Similarly, with SRVCC CDMA 1xRTT requires interworking 1xRTT Server (IWS), which supports the interface and signal relay from / to
1xRTT MSC serving the UE S102 with the same purpose. S102 is a tunnel interface and transmits 1xRTT signaling messages; between MME
and UE these are encapsulated.
CS Fallback
Serving GW and PDN GW are not separated (S5/S8 is not exposed) and the VLR is integrated with the MSC server. A new SG interface is
introduced between the MSC Server/VLR and MME, allowing combined and coordinated procedures. The concept consists of:
Signal relay to end the CS request (incoming calls, handling network triggered additional service or SMS Legacy) from the MSC
Server for MS on SG and vice versa;
The combined operating procedures between the PS domain and the CS domain.
In general, complete systems for mobile and fixed networks have an architecture similar to that described above. For the evolved 3GPP
system there is normally an access network and a core network. In the interworking architecture scheduled evolved 3GPP system, other
access technologies systems connect to the EPC.
In general, complete mobile network system and fixed network systems have a similar architecture as described outlined in Evolved 3GPP
system and normally consist of an access network and a core network.
It was also decided to allow two different types of interoperability, based on the property of the access systems. For networks with non-
3GPP access confidence, it is assumed that secure communication between them and the EPC is implemented and also robust data
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 34/53
10/2/2017 UMTS Quick Guide
protection is sufficiently guaranteed.
GTP for Evolved 3GPP system is available in two variants, control and user plane. GTP-C manages the control plane signaling, and it is
necessary in addition to the data transfer protocol on the purity of the user, GTP-U; it is called user plane. Current versions, suitable for
EPS are GTPv1 US and GTPv2-C.
The peculiarity of GTP is that it supports the separation of traffic within its primary GTP tunnel holder, or in other words, the ability to group
them together and treat carriers. The ends of GTP tunnels are identified by TEIDs (Tunnel Endpoint identifiers); they are assigned to the
local level for the uplink and downlink by peer entities and reported transversely between them. TEIDs are used on different granularity by
specific example PDN connection on S5 and S8 and EU on S3 / S4 / S10 / S11 interfaces.
Corresponding to this, a typical GTPv2-C protocol data unit like shown in the figure above, the specific part GTP is preceded by IP and UDP
headers, it consists of a header GTPv2-C and part containing information GTPv2-C variable in number, length and format, depending on the
type of the message. As the echo and the notification of a protocol version is not supported, TEID information is not present. The version is
obviously firmly set at 2 in this version of the protocol.
GTP had a complex legacy extension header mechanism; it is not used in most GTPv2-C. The message type is defined in the second byte
(so the maximum of 256 messages can be defined for future extensions). Below table provides an overview of messages currently defined
GTPv2-C. The length of the message is coded in bytes 3 and 4 (measured in bytes and not containing the first four bytes themselves).
TEID is the ID of the tunnel end point, a single value on the opposite/receiving side; it allows multiplexing and de-multiplexing tunnels at
one end in the very frequent cases over a GTP tunnel must be distinguished.
0 Reserved Shall never be used (intentionally excluded from protocol, to enforce explicit
setting)
1/2 Echo Request/ Response Used to probe if a GTP version supported by the sending node.
3 Version Not Supported Contains the latest GTP version supported the sending node.
Indication
4/5 Direct Transfer Request/ Used for tunneling signaling message on S101 interface for optimized handover,
Response between HRPD access not and MME
6/7 Notification Request/ Response Used for tunneling notification on S101 between HRPD access node and MME
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 35/53
10/2/2017 UMTS Quick Guide
25/26 SRVCC PS to CS request Used to trigger and confirm SRVCC initiation between SGSN/MME and MSC server
27/28 SRVCC PS to CS complete Used to indicated and confirm completion of SRVCC between MSC server and
Notification SGSN/ MME
32/33 Create Session Request Used to establish connectivity between two nodes
34/35 Modify Bearer Request Used to modify properties of a single or of multiple bearer, include bearer context
information
66/67 Delete bearer command/ Instruct nodes to delete bearer and confirm back
failure indication
95/96 Create bearer request/ Instruct nodes to install bearers and confirms back
response
97/98 Update bearer request Used to inform the control plane nodes from the user plane about bearer changes
Enhanced GTPv1-U
Only a small but effective improvement was applied to GTP-U, and for that it was not considered necessary to strengthen the number of
protocol version. Thus, we still expect GTPv1-U, but at least it’s most recent Rel. 8.
The protocol stack is essentially the same as for GTPv2-C with only the name of the layers and the protocols substituted accordingly. The
extension header mechanism is kept in place; it allows inserting two elements if necessary.
PDCP PDU number: related to the characteristic transfer without loss; in this case, data packets need to be numbered in the EPC
(two octets).
The improvement is the ability to transmit an "end market" in the user plane. It is used in the inter-eNodeB handover procedure and gives
the indication that the pathway is activated immediately after the data packet, for example, the feature is not necessary to pre-Rel.8
because GTP-U did not end in the radio access node (i.e. not in the BS or NodeB) only a few messages exist. GTPv1-U, and they are listed
in the table above.
It is clear that, in fact a very limited kind of signaling is possible via GTPv1-U (echo mechanisms and end labeling). The only message that
the transfer of real user data is of type 255, the so-called G-PDU message; the only piece of information it carries, after the header is the
original data packet from a user or external PDN equipment.
Not all instances of GTP-U tunnels are listed in the reference architecture (which aimed to capture the associations were no longer living
between network nodes); temporary tunnels are possible:
Between two Serving GWs, applicable for the transfer based on S1, in the case that the service is moved GW;
Between two SGSNs, corresponds to the previous case, but in the legacy PS network;
Between two RNCs, applicable for the relocation of the RNC in the 3G PS network (no relation to the EPC, it is mentioned here just
for completeness).
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 36/53
10/2/2017 UMTS Quick Guide
To allow IPv4 only transport across the access network; in this case the MAG may use also an IPv4 private address, and a NAT may
be deployed along the path towards the LMA.
These two features can be used independently. To solve these requirements, the following extensions made:
IPv4 address assigned to the mobile node and now registered with the mobile access gateway (including corresponding subnet
mask). It comes either from static configuration/profile or is dynamically allocated by LMA.
IPv4 default router of the mobile node. The LMA and MAG should implement IPv6, and they also need an IPv4 address. MAG is the
IPv4 Default Router for the UE on its access link.
PMIPv6 Signaling
Table below provides an overview of PMIPv6 signaling messages (basic PMIPv6 and specified improvements in IETF for connecting dismissal
and way of management). Signaling PMIPv6 base is made with "Binding Update" (BU) MAG to LMA, and a corresponding "Update
acknowledgment Binding" (BUA) messages back to MAG is used for registering, refreshing and binding deletion. IP address information
(IPv4 or IPv6 address prefix) is usually requested by the LMA and MAG assigned by the initial enrollment.
Binding Update PBU MAG -> LMA Requests creations, extension and deletion of a mobility binding. It
is also used to request a new IPv4 address.
Binding Update Acknowledgement PBA LMA -> MAG Acknowledges the requests for creation, extension and deletion of a
mobility binding. It is also used to allocate and IPv4 address.
Binding Revocation Indication BRI LAM -> MAG Notification that a binding is revoked and thus will be deleted by
LAM, allows also bulk revocations.
Binding Revocation Acknowledgement BRA MAG -> LMA Acknowledges a binding revocation.
Heartbeat HB MAG -> LMA Periodic signaling message, used for detecting failure.
Protocol Configuration MAG->LMA Mirrored from GTP, used to transfer frequently needed,
protocol related data
Specific 3GPP related error code LMA->MAG It can indicate that no access is given to an APN.
Connection Set Identifier (CSI) LMA->MAG Contains one or more CSIs. It is generated for each new
PDN connection and used in case of partial node failure to
MAG->LMA identify the PDN.
PDN type indication LMA->MAG Used to indicate the decision of the PDN GW.
DHCPv4 address allocation indication LMA->MAG Indicates that IP at allocation through DHCPv4 is to be used
by the UE.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 37/53
10/2/2017 UMTS Quick Guide
The EAP specific use for interworking with a 3GPP system is defined by the EAP-AKA method EAP-AKA is already used in I-WLAN.
EAP authenticator sends an authentication request to the target device/EU (L2); it receives the response from the target device/EU
and transmits it to the AAA infrastructure.
AAA server performs the EAP method, resulting in a challenge to the target device, which is sent by the authenticator.
The target device must meet the challenge; the answer is relayed to the AAA server via the authenticator.
AAA server compares the response to challenge with that expected and decides to successful authentication. An indication of
success or failure is returned to the target device.
Optionally, the notifications can be used to transfer additional information; this is used for the IP mobility mode selection indication. During
the design there was a major decision to separate areas of the safety of non-3GPP access networks in the field of security 3GPP, and also to
the other domain.
The practical consequence is that the identifier of non 3GPP access network enters the security algorithm, which requires the specification
of a variant of EAP-AKA, EAP-AKA (premium).
Comprehensive IKEv2 session consists of multiple dialogues, structured phases. The flow of messages and typical base is given in the
figure below, and a description of how it is applied in the context of signaling between EU and ePDG:
IKEv2Phase Comments
Initial Exchange Notifies payload as MOBIKE support indication. IP address to be requested/ delivered in
configuration payload.
Create child SA For creating protected tunnel for DSM IPv6 signaling
Diameter
The diameter is a generic AAA protocol, with additional functions for network access, mobility and QoS handling. Although it is in principle,
of a general nature peer-to-peer, it is used in the 3GPP architecture in the client-server mode. It has a built-in extensibility and so perfectly
supports message structures on the interfaces with the need for some flexibility. In addition, it supports multiple server configurations with
failure and failover handling. Functionally, it has similarities with its predecessor radius but differs profoundly on the level of message and
parameters. DIAMETER offers ability to detect a dead peer by pairs of heartbeat messages. It can be run over SCTP or TCP and uses the
3868 port.
S6a for subscription download and update between MME and HSS.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 38/53
10/2/2017 UMTS Quick Guide
S6d (between an upgraded SGSN and HSS), which is the counterpart of S6a for the legacy world with interworking capability with
the new system.
SWa for authentication between untrusted non-3GPP access and AAA server.
STa for authentication between trusted non-3GPP access and AAA server and authorization.
SWd for forwarding between an AAA proxy and a AAA server (forwarding between VPLMN and HPLMN).
S6b for authorization of APN and mobility between PDN GW and AAA server.
SWm for authentication and authorization between ePDG and AAA server.
SWx for exchange of authentication vector and registration information between AAA server and HSS.
Gx for IP-CAN session handling and GW-Control Session handling between PDN GW and PCRF.
A selective retransmission mechanism is applied to correct the loss or corruption of data. The decisive difference is TCP multi-homing and
the concept of multiple streams in a connection. Where in a TCP flow is called a sequence of bytes, a SCTP stream represents a sequence of
messages. SCTP tries to combine the advantages of UDP and TCP, but avoid their drawbacks; it is defined in IETF RFC 4960.
SCTP is used on several network internal control plane interfaces, with these SCTP applications:
S1 Application Protocol
Two categories of procedures across S1-MME exist: UE associated and non-associated UE. Furthermore two classes of messages are
defined: Class1 is with the class 2 is answered. Class 1 and related procedures initiator/response messages are listed in the table below;
procedures for Class 2 message names are largely identical to the procedure names, and the table below (second table) lists only these.
Initial context setup Initial context setup req. Initial context setup Resp.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 39/53
10/2/2017 UMTS Quick Guide
Elementary Procedure
Handover Notification
Paging
Initial UE message
Deactivate Trace
Trace start
Location report
Error indication
Overload Start
Overload Stop
MME configuration
X2 Application Protocol
X2 application protocol has much in common with the S1-AP; same categorization in class 1 and class 2 messages is made. The setup
message is much smaller, corresponding to the specialized function of X2.
eNodeB Configuration update ENB Configuration update 1 ENB Configuration update ack.
Resource Status Reporting Initiation Resource Status req. 1 Resource Status resp.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 40/53
10/2/2017 UMTS Quick Guide
Reporting update
MME for EPC and legacy network nodes (SGSN for GPRS and MSC for CS domain).
Messages exchanged.
Only cases of success were presented (if an error occurred using appropriate rejection messages, mainly through the network); the
explanation does not include all possible cases. The dialogues messages are usually kept by timers against loss of messages; e.g. timer
T3410 is used to supervise the procedure and attach expires after 15 seconds. So if no response (acceptance or rejection) from the
network, a retry procedure is started. Counters are used to limit retries. Mobility EPS Management network operates seven timers and
timers UE 14.
GUTI reallocation GUTI reallocation command ← Used to allocate a temporary identifier to the UE.
Authentication resp.→
Security mode control Security mode command← Used to negotiate between UE and MME.
Identity resp.→
Attach Attach req.← Used to register the UE with the network and allocation of the resources.
Attach accept←
Attach Complete→
Detach Detach req.→ Used to remove a UE’s registration with the network.
Detach accept ← or →
Tracking area updating Tracking area update req.→ Used for idle mode mobility.
Paging Request to lower layer for paging Used when UE is in idle mode and downlink traffic arrives.
Service req.
Transport of NAS message UL/DL NAS transport ← / → Used for SMS transport in encapsulated form.
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 41/53
10/2/2017 UMTS Quick Guide
The second block of the NAS signaling functionality is related to the handling of the session. Four insider network and four UE has initiated
the procedures that exist in ESM. Following table lists the messages with the corresponding flows for the success (again, negative cases are
created using appropriate reject messages). Some of them are grafted on EMM NAS messages, where a container is provided (for example
a REQUEST PDN connectivity is packed on the attach request message). Also two simple messages have been defined for general
information exchange.
Default EPS bearer context Activate default EPS bearer context Establishes a default EPS bearer context between UE and EPC.
activation req. ←
Dedicated EPS bearer context bearer context req.← context with QoS and TFT between UE and EPC.
activation
Activate dedicated EPS bearer context
req.→
EPS bearer context Modification Modification EPS bearer context req. Modifies an existing EPS bearer context for QoS and TFT between
← UE and EPC.
EPS bearer context deactivation Deactivation EPS bearer context req. Deactivate an EPS bearer context.
←
UE requested PDN connectivity PDN connectivity req. → Requests setup of a default bearer to a PDN.
UE requested PDN disconnect PDN disconnect req. → Disconnect UE from one PDN.
UE requested bearer resources Bearer resource allocation. → Used to request bearer resources.
allocation
Modify EPS bearer context req. ←
ESM information request ESM information request ← Used to request protocol configuration option.
ESM status ESM status ← or → Informs to other NAS signaling peer of errors.
Advertisements
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 42/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 43/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 44/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 45/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 46/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 47/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 48/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 49/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 50/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 51/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 52/53
10/2/2017 UMTS Quick Guide
https://www.tutorialspoint.com/umts/umts_quick_guide.htm 53/53