Documente Academic
Documente Profesional
Documente Cultură
2 days
Course Description:
This course describes in detail the network architecture of the evolved packet core network (EPC) and it discusses mi ration strate ies and implementation options. !tartin out with an assessment of why an architecture evolution is necessary in the first place" the course outlines the most important tar ets of a system architecture evolution from the perspective of the #$PP. The course continues with the detailed evaluation and description of the different new network elements like the %%E" !&$'" P()&$' and eP($. This includes the detailed discussion of such important implementation aspects like !*+le, and how it can be applied under different circumstances. The followin part provides an overview over all kinds of EPC&related scenarios like attachment from #$PP& and non&#$PP&specific radio access technolo ies" host and network based mobility and call setup under different conditions. -nother section deals with the network layout and introduces new concepts like the trackin area and the new types of T%!./s. .n reat detail the course describes such important aspects like the 0o!&architecture and the security architecture of 1el. 2 and how it blends into the EPC. 3ne complete chapter has been dedicated to the introductory description of the various protocols that are used within the EPC&environment. This includes all EPC& and E&4T1-)&specific protocols like 11C or !*&-P but it also includes introductions into (.-%ETE1" .Pv5" 0o! in .P or !CTP. The final chapter has been dedicated to the presentation of the important EPC&related procedures like attachment from E&4T1-)" trackin area updatin " dedicated EP!&bearer establishment and handover.
As in all INACON courses we integrated several interactive exercises for a perfect learning experience.
Prerequisites:
The student must possess a thorou h understandin in mobile communication before comin to this course. -t the least we recommend our webinars or web based trainin courses on !-E and 6TE to be taken beforehand.
INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.
Course Target:
The student is enabled to develop" test and inte rate EPC&related networks.
'hy is there a system architecture evolution in the first place7 'hat are the re8uirements accordin to #$PP7 9ow will the protocol architecture of a typical 4E look like within the !-E&environment7 'hich potential improvements have not been covered yet by the !-E7 9ow do the network access and attachment work for the different 1-T/s7 'hat is !1VCC and how does it operate7 9ow does the 4E prioriti:e different available access networks and access network types7 9ow does a 4E which is attached to the EPC" establish a voice call7 9ow does inter&1-T mobility work while the 4E is attached to the EPC7 'hat are the most important differences between host and network based mobility7 'hat are trackin areas and what is their relationship to location areas and routin areas7 'hich new identifiers are used within the evolved core network environment to identify users7 9ow does the 0o!&architecture look like in the evolved network7 'hy are security procedures like encryption and inte rity protection provided twice for some content in the EP!&environment7 'hat is !*&+le, and how does it operate7 9ow do the e2e&protocol stacks look like within the !-E&environment7 'hich tasks do E%% and E!% take care of and how do E%% and E!% compare and relate to $%% and !%7 9ow does a 4E attach to the EPC throu h E&4T1-) and how does it establish the default EP!& bearer and how are dedicated EP!&bearers established7 9ow is handover performed in E&4T1-)7
Test en ineers who need to understand the EP!&architecture and its new concepts in detail. (esi n staff of EPC network elements who re8uire a deep inside view of the new architecture and protocols. Everybody who shall be able to respond to sophisticated EP!&related 8uestions.
INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.
Why is an Architecture $"olution necessary% &mportant 'equirements on SA$ according to ()PP Comprehension Check ; E,ercise< 1easons of a !ystem -rchitecture Evolution7
Architecture +"er"iew Evolved Packet Core in Conte,t >oom into the EP!
EPC vs. EP!" )on&#$PP -ccess )etworks (trusted = non&trusted)) +unctional 3verview of Core )etwork Elements within the EPC) %obility %ana ement Entity (%%E) (Characteristics (.dentification)" .nterfaces ; Protocols (Tasks ; +unctions of the %%E)" !ervin $ateway (!&$') (Characteristics (.dentification)))))" .nterfaces ; Protocols" Tasks ; +unctions of the !&$')" P() $ateway (P&$' or P()&$') (Characteristics (.dentification)))))" .nterfaces ; Protocols" Tasks ; +unctions of the P&$')" en& hanced Packet (ata $ateway (eP($) (Characteristics (.dentification)))))" .nterfaces ; Protocols" Tasks ; +unctions of the eP($)" Protocol !tack -rchitecture on the 4E&!ide
+perations +"er"iew
,etwor- Access to the $PC in case of ()PP.'AT/s E&4T1-)
1elated )etwork -rchitecture (1elated )etwork Elements)" !i nalin and .mportant !tate Chan& es (E%%" EC%" E!%) 1elated )etwork -rchitecture (!election of EPC vs. $$!))" !i nalin Procedures ($%%=P%%" !%)" Comprehension Check ; E,ercise< 1elate E&4T1-) Procedures to $E1-) = 4T1-) Procedures
$E1-) = 4T1-)
,etwor- Access in case of ,on.()PP 'AT/s )etwork (iscovery and !election Trusted )on&#$PP 1-T/s
Problem (escription" .nterworkin with the -)(!+" (istinction Trusted vs. )on&Trusted )on& #$PP 1-T/s
INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.
1elated )etwork -rchitecture" !i nalin Procedures if E-P and P%.Pv5 are used" !i nalin Procedures if %.Pv? is used
1elated )etwork -rchitecture" !i nalin Procedures if .@Ev2 and P%.Pv5 are used" !i nalin Procedures if .@Ev2 and (!%.Pv5 are used
Circuit&switched +allback
QoS.Architecture in SA$
Aearer Establishment ; -uthori:ation & (ifferences 1el. 2 vs former 1eleases 1elationship and (ependency amon the different Aearers Security Architecture
INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.
3verview ; .ntroduction
Protocol Suite
The 2*ainstream3 Protocol Stac-s Control Plane = E&4T1-) & EPC 4ser Plane E&4T1-) C EPC (!D=!2 $TP&based) 4ser Plane E&4T1-) C EPC (!D=!2 P%.Pv5=$1E&based) )eneric Protocols within the $PC.$n"ironment .Pv? and .Pv5 and their (ifferences
9eaders and .P&-ddress 1an es" 9ow to obtain an .P&-ddress (.Pv? and (9CP" .Pv5 and E!tateless -utoconfi urationF" 1eal&6ife 1ecordin < !tateless -utoconfi uration)" +ra mentation in .Pv? and .Pv5 (iff!erv ((etails of the -+(G"H) P9A (-ssured +orwardin )" (etails of the E+ P9A (E,pedite +orwardin )) .mportant !CTP&+unctions" E,ample of an !CTP&Packet
(.-%ETE1 Protocols related to $.4T'A ,etwor-s EP! %obility %ana ement (E%%)
.mportant E%%&Procedures (Common Procedures" !pecific Procedures" Connection %ana e& ment Procedures)" !tate %achine (1elationship between E%% and EC%) .mportant E!%&Procedures (%%E&initiated" 4E&initiated)" !tate %achine 3verview (Transmission of broadcast information" Establish and maintain services" 0o! control" Transfer of dedicated control information)" !tate Characteristics of 11C (11CI.(6E" 11CIC3))ECTE() 3verview (1o9C" )umberin of P(CP P(4Js" .n&se8uence delivery of P(4Js" (uplicate deleti& on" Encryption" .nte rity Protection)" !tructure of P(CP P(4
Packet (ata Conver ence Protocol (P(CP) The !*&-P Protocol The G2-P Protocol
INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.
Protocol !tack on the G2&interface" Tasks ; +unctions (%obility %ana ement" 6oad %ana e& ment" G2&.nterface %ana ement)
Call 5lows
Scenarios
Attachment through $.4T'A, 0 new **$ Trac-ing Area 4pdate 6&nter.**$ 0 with new S.)W7
.nitial Conditions" (etailed (escription)
Dedicated $PS 1earer $stablishment )etwork .nitiated (.%! tri ered durin Call Establishment)
.nitial Conditions" (etailed (escription" (etailed (escription)
INACON GmbH 1999 2009. All rights reserved. Reproductio ! d"or u !uthori#ed use o$ this m!teri!l is prohibited ! d %ill be prosecuted to the $ull e&te t o$ Germ! ! d i ter !tio !l l!%s.