Sunteți pe pagina 1din 6

V 2.

SAE / EPC from A-Z


Course Duration:

2 days

Course Description:

This course describes in detail the network architecture of the evolved packet core network (EPC) and it discusses mi ration strate ies and implementation options. !tartin out with an assessment of why an architecture evolution is necessary in the first place" the course outlines the most important tar ets of a system architecture evolution from the perspective of the #$PP. The course continues with the detailed evaluation and description of the different new network elements like the %%E" !&$'" P()&$' and eP($. This includes the detailed discussion of such important implementation aspects like !*+le, and how it can be applied under different circumstances. The followin part provides an overview over all kinds of EPC&related scenarios like attachment from #$PP& and non&#$PP&specific radio access technolo ies" host and network based mobility and call setup under different conditions. -nother section deals with the network layout and introduces new concepts like the trackin area and the new types of T%!./s. .n reat detail the course describes such important aspects like the 0o!&architecture and the security architecture of 1el. 2 and how it blends into the EPC. 3ne complete chapter has been dedicated to the introductory description of the various protocols that are used within the EPC&environment. This includes all EPC& and E&4T1-)&specific protocols like 11C or !*&-P but it also includes introductions into (.-%ETE1" .Pv5" 0o! in .P or !CTP. The final chapter has been dedicated to the presentation of the important EPC&related procedures like attachment from E&4T1-)" trackin area updatin " dedicated EP!&bearer establishment and handover.

As in all INACON courses we integrated several interactive exercises for a perfect learning experience.

Prerequisites:

The student must possess a thorou h understandin in mobile communication before comin to this course. -t the least we recommend our webinars or web based trainin courses on !-E and 6TE to be taken beforehand.

INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.

Course Target:

The student is enabled to develop" test and inte rate EPC&related networks.

Some of your Questions that will be answered:


'hy is there a system architecture evolution in the first place7 'hat are the re8uirements accordin to #$PP7 9ow will the protocol architecture of a typical 4E look like within the !-E&environment7 'hich potential improvements have not been covered yet by the !-E7 9ow do the network access and attachment work for the different 1-T/s7 'hat is !1VCC and how does it operate7 9ow does the 4E prioriti:e different available access networks and access network types7 9ow does a 4E which is attached to the EPC" establish a voice call7 9ow does inter&1-T mobility work while the 4E is attached to the EPC7 'hat are the most important differences between host and network based mobility7 'hat are trackin areas and what is their relationship to location areas and routin areas7 'hich new identifiers are used within the evolved core network environment to identify users7 9ow does the 0o!&architecture look like in the evolved network7 'hy are security procedures like encryption and inte rity protection provided twice for some content in the EP!&environment7 'hat is !*&+le, and how does it operate7 9ow do the e2e&protocol stacks look like within the !-E&environment7 'hich tasks do E%% and E!% take care of and how do E%% and E!% compare and relate to $%% and !%7 9ow does a 4E attach to the EPC throu h E&4T1-) and how does it establish the default EP!& bearer and how are dedicated EP!&bearers established7 9ow is handover performed in E&4T1-)7

Who should attend this Course:


Test en ineers who need to understand the EP!&architecture and its new concepts in detail. (esi n staff of EPC network elements who re8uire a deep inside view of the new architecture and protocols. Everybody who shall be able to respond to sophisticated EP!&related 8uestions.

INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.

Table of Contents: Assessment


Top !e"el #iew

Why is an Architecture $"olution necessary% &mportant 'equirements on SA$ according to ()PP Comprehension Check ; E,ercise< 1easons of a !ystem -rchitecture Evolution7

Seamless *obility +ptions and their Characteristics


.ntra&1-T %obility" .nter&1-T %obility (w=o 3ptimi:ations)" .nter&1-T %obility (with 3ptimi:ations))

Architecture +"er"iew Evolved Packet Core in Conte,t >oom into the EP!
EPC vs. EP!" )on&#$PP -ccess )etworks (trusted = non&trusted)) +unctional 3verview of Core )etwork Elements within the EPC) %obility %ana ement Entity (%%E) (Characteristics (.dentification)" .nterfaces ; Protocols (Tasks ; +unctions of the %%E)" !ervin $ateway (!&$') (Characteristics (.dentification)))))" .nterfaces ; Protocols" Tasks ; +unctions of the !&$')" P() $ateway (P&$' or P()&$') (Characteristics (.dentification)))))" .nterfaces ; Protocols" Tasks ; +unctions of the P&$')" en& hanced Packet (ata $ateway (eP($) (Characteristics (.dentification)))))" .nterfaces ; Protocols" Tasks ; +unctions of the eP($)" Protocol !tack -rchitecture on the 4E&!ide

)etwork Elements and their +unctions within the EPC

Comprehension Check ; E,ercise< .nterworkin within the EP!&-rchitecture

+perations +"er"iew
,etwor- Access to the $PC in case of ()PP.'AT/s E&4T1-)
1elated )etwork -rchitecture (1elated )etwork Elements)" !i nalin and .mportant !tate Chan& es (E%%" EC%" E!%) 1elated )etwork -rchitecture (!election of EPC vs. $$!))" !i nalin Procedures ($%%=P%%" !%)" Comprehension Check ; E,ercise< 1elate E&4T1-) Procedures to $E1-) = 4T1-) Procedures

$E1-) = 4T1-)

,etwor- Access in case of ,on.()PP 'AT/s )etwork (iscovery and !election Trusted )on&#$PP 1-T/s
Problem (escription" .nterworkin with the -)(!+" (istinction Trusted vs. )on&Trusted )on& #$PP 1-T/s

INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.

1elated )etwork -rchitecture" !i nalin Procedures if E-P and P%.Pv5 are used" !i nalin Procedures if %.Pv? is used

)on&Trusted )on&#$PP 1-T/s

1elated )etwork -rchitecture" !i nalin Procedures if .@Ev2 and P%.Pv5 are used" !i nalin Procedures if .@Ev2 and (!%.Pv5 are used

#oice Call $stablishment .%!&based


1elated )etwork -rchitecture" !i nalin Procedure (!.P" !(P" (.-%ETE1) 1elated )etwork -rchitecture" !i nalin Procedure for %3C" !i nalin Procedure for %TC" Comprehension Check ; E,ercise< Voice Call Establishment

Circuit&switched +allback

*acro *obility 0 &nter.'AT 'oaming 9andover E&4T1-) to Trusted )on&#$PP 1-T


1elated )etwork -rchitecture" !i nalin Procedure ()A% = P%.Pv5 on !2a)" 9andover E& 4T1-) to )on&Trusted )on&#$PP 1-T" 1elated )etwork -rchitecture" !i nalin Procedure ()A% = P%.Pv5 on !2b)" Comprehension Check ; E,ercise< .nter&1-T %obility

Architectural Details of the $PS


Comprehension Test 'epetition: ,etwor- &nterfaces and Protocols ,etwor- !ayout and &mportant &dentifiers 3r ani:ation of the E&4T1-) !&$' !ervice -reas .dentifiers of the 4E 1earer Concept
%&T%!. and !&T%!." $4T. Trackin -reas" T-. and T-.&list" E&4T1-) Pool -reas" %%E Pool/s and %%E." )

QoS.Architecture in SA$

!-E&Aearers" Classification and Policy Enforcement The 0o!&Profile of the !-E&Aearer


$A1 & $uaranteed Ait 1ate" %A1 & %a,imum Ait 1ate" -%A1 & - re ate %a,imum Ait 1ate" -1P & -llocation 1etention Priority)" 0C.&Values and their %eanin s (%appin between 1el. 2 0o! and earlier 1eleases)" 0o!&-rchitecture with 1elease 2 (PC1+ (Policy and Char in 1ules +unction)" AAE1+ (Aearer Aindin and Event 1eportin +unction)" PCE+ (Policy and Char in Enforcement +unction)" -+ (-pplication +unction)" !P1 (!ubscription Profile 1epository)" 3C! (3nline Char in !ystem)" 3+C! (3ffline Char in !ystem))

Aearer Establishment ; -uthori:ation & (ifferences 1el. 2 vs former 1eleases 1elationship and (ependency amon the different Aearers Security Architecture

INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.

3verview ; .ntroduction

Essentials" EP!&-@-" !ecurity is performed independently in two protocol layers" -l orithms)

3peration of 4%T!&-@ @ey (erivation +unction (@(+)


Comprehension Check ; Practical E,ercise< The @(+ !(*B) for @(-!%E) (.nput Parameters)

EP!&-@- in 3peration durin .nitial -ttach Procedure

Protocol Suite
The 2*ainstream3 Protocol Stac-s Control Plane = E&4T1-) & EPC 4ser Plane E&4T1-) C EPC (!D=!2 $TP&based) 4ser Plane E&4T1-) C EPC (!D=!2 P%.Pv5=$1E&based) )eneric Protocols within the $PC.$n"ironment .Pv? and .Pv5 and their (ifferences
9eaders and .P&-ddress 1an es" 9ow to obtain an .P&-ddress (.Pv? and (9CP" .Pv5 and E!tateless -utoconfi urationF" 1eal&6ife 1ecordin < !tateless -utoconfi uration)" +ra mentation in .Pv? and .Pv5 (iff!erv ((etails of the -+(G"H) P9A (-ssured +orwardin )" (etails of the E+ P9A (E,pedite +orwardin )) .mportant !CTP&+unctions" E,ample of an !CTP&Packet

0o! in .P&)etworks !CTP

(.-%ETE1 Protocols related to $.4T'A ,etwor-s EP! %obility %ana ement (E%%)
.mportant E%%&Procedures (Common Procedures" !pecific Procedures" Connection %ana e& ment Procedures)" !tate %achine (1elationship between E%% and EC%) .mportant E!%&Procedures (%%E&initiated" 4E&initiated)" !tate %achine 3verview (Transmission of broadcast information" Establish and maintain services" 0o! control" Transfer of dedicated control information)" !tate Characteristics of 11C (11CI.(6E" 11CIC3))ECTE() 3verview (1o9C" )umberin of P(CP P(4Js" .n&se8uence delivery of P(4Js" (uplicate deleti& on" Encryption" .nte rity Protection)" !tructure of P(CP P(4

EP! !ession %ana ement (E!%) 1adio 1esource Control 11C

Packet (ata Conver ence Protocol (P(CP) The !*&-P Protocol The G2-P Protocol

INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.

Protocol !tack on the G2&interface" Tasks ; +unctions (%obility %ana ement" 6oad %ana e& ment" G2&.nterface %ana ement)

Call 5lows

Scenarios

Attachment through $.4T'A, 0 new **$ Trac-ing Area 4pdate 6&nter.**$ 0 with new S.)W7
.nitial Conditions" (etailed (escription)

Dedicated $PS 1earer $stablishment )etwork .nitiated (.%! tri ered durin Call Establishment)
.nitial Conditions" (etailed (escription" (etailed (escription)

8ando"er Procedures G2&based 9andover !cenario

INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.

S-ar putea să vă placă și