wireless and mobile - gbv

8
Wireless and Mobile All-IP Networks Yi-Bing Lin and Ai-Chun Pang ® WILEY Wiley Publishing, Inc.

Upload: others

Post on 20-Jan-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Wireless and Mobile All-IP Networks

Yi-Bing Lin and Ai-Chun Pang

® WILEY

Wiley Publishing, Inc.

Contents

Acknowledgments xv Introduction xvii

Short Message Service and IP Network Integration 1

1.1 SMS-IP Integration with SM-SC 3 1.1.1 NCTU Short Message System 4 1.1.2 Statistics for SMS Delivery 7

1.2 iSMS System Architecture 10

1.3 iSMS Communication Protocols 14 1.3.1 SMS AT Command Set 15 1.3.2 iSMS Communication API 17 1.3.3 Implementation of an Echo Server 18

1.4 Examples of Services 20 1.4.1 Accessing the Web from GSM MSs 20 1.4.2 Handset Music Service 23 1.4.3 Train Schedule System 25 1.4.4 Other iSMS Services 26

1.5 Caching for iSMS-Based Wireless Data Access 29

1.6 Concluding Remarks 34

1.7 Questions 36

Mobility Management for GPRS and UMTS 39

2.1 Network Architectures 39

2.2 Concepts of Mobility Management 45

2.3 Mobility Management States 48

vii

2.4 MM and PDP Contexts 51 2.4.1 Contexts in SGSN 51 2.4.2 Contexts in the MS 54 2.4.3 Relationship between the MM States and the

Contexts 55

2.5 Attach and Detach 56

2.6 Location Update 59

2.7 Serving RNC Relocation 64

2.8 UMTS-GPRS Intersystem Change 70 2.8.1 SGSN Change from UMTS to GPRS 70

2.8.2 SGSN Change from GPRS to UMTS 72

2.9 Concluding Remarks 73

2.10 Questions 74

Session Management for Serving GPRS Support Node 77

3.1 Session Management Functions 80 3.1.1 PDPContextActivation 80 3.1.2 PDP Context Deactivation 83 3.1.3 PDP Context Modification 85

3.2 SM Software Architecture 86 3.2.1 SM REGistration 86 3.2.2 SNDCPSM 88 3.2.3 RelayUnit 89 3.2.4 QoS Manager 89 3.2.5 GMMSM 89 3.2.6 Maintenance Unit and Operating Service 90 3.2.7 Network Manager 90 3.2.8 SM for UMTS 90

3.3 SM Software Initiation and Configuration 91 3.3.1 Initiation 91 3.3.2 Configuration 93

3.4 SM Procedures in the SGSN 93 3.4.1 PDPContextActivation 93 3.4.2 PDP Context Deactivation 97 3.4.3 PDP Context Modification 101

3.5 Concluding Remarks 103

3.6 Questions 103

Session Management for Gateway GPRS Support Node 105

4.1 APN Allocation 108

4.2 IP Address Allocation 110

4.3 PDP Context Activation 112

Contents

4.4 Tunneling between UMTS and External PDN 115

4.5 Quality of Service 118

4.6 Concluding Remarks 123

4.7 Questions 124

Serving Radio Network Controller Relocation for UMTS 125

5.1 SRNC Duplication 127

5.2 Core Network Bi-casting 130

5.3 Fast SRNC Relocation 132

5.4 Comparison of the Relocation Mechanisms 135

5.5 Concluding Remarks 137

5.6 Questions 137

UMTS and cdma2000 Mobile Core Networks 143

6.1 UMTS and cdma2000 Protocol Stacks 146 6.1.1 Point-to-Point Protocol 149 6.1.2 Tunneling Protocols 150

6.2 Mobility and Session Management Mechanisms 151 6.2.1 Mobility Management 152 6.2.2 Session Management 154 6.2.3 Remarks on Mobility and Session Management 157

6.3 IP Mobility 157

6.4 UMTS and cdma2000 Interworking 164

6.5 Concluding Remarks 167

6.6 Questions 168

UMTS Charging Protocol 171

7.1 The GTP' Protocol 173

7.2 Connection Setup Procedure 176

7.3 GTP' CDR Transfer Procedure 177

7.4 GTP' Failure Detection 178

7.5 Concluding Remarks 180

7.6 Questions 182

Mobile All-IP Network Signaling 185

8.1 Signaling System Number 7 186

8.2 Stream Control Transmission Protocol (SCTP) 190

8.3 UMTS Network Signaling 193

8.4 UMTS MAP Software Architecture 196 8.4.1 The MAP Layer Architecture 196 8.4.2 An MTP-based SS7 Implementation 197 8.4.3 An SCTP-based SS7 Implementation 199

8.5 TCAP and SCCP Based on M3UA 201 8.5.1 SCCP Stack Entity 202 8.5.2 TCAP Stack Entity 203

8.6 MAP Message Delivery 207

8.7 SCTP and MTP Approaches 210 8.7.1 Message Format 210 8.7.2 Connection Setup 213 8.7.3 Data Transmission 217

8.8 Concluding Remarks 223

8.9 Questions 223

UMTS Security and Availability Issues 225

9.1 Authentication Signaling for UMTS 225 9.1.1 UMTS Authentication Procedura 227 9.1.2 Network Traffic Due to UMTS Authentication 229

9.2 Fraudulent Usage in UMTS 230 9.2.1 Circuit-Switched Registration and Call Termination 231 9.2.2 Fraudulent Registration and Call Setup 235

9.3 Eavesdropping a Mobile User 239

9.4 HLR Failure Restoration 242

9.5 Concluding Remarks 245

9.6 Questions 246

VolP for the Non-All-IP Mobile Networks 255

10.1 GSM-IP: VolP Service for GSM 256 10.1.1 MGCP Connection Model and the GSM-IP

Architecture 259 10.1.2 GSM-IP Message Flows 261

10.2 vGPRS: VolP Service for GPRS 274 10.2.1 Registration 277 10.2.2 MS Call Origination 279 10.2.3 MS Call Termination 281 10.2.4 Intersystem Handoff 283 10.2.5 Comparing vGPRS and

3GPP TR 21.978 285

10.3 Concluding Remarks 288

10.4 Questions 289

Contents

11 Multicast for Mobile Multimedia Messaging Service 291

11.1 Existing Multicast Mechanisms for Mobile Networks 294

11.2 The SMS Multicast Approach III 296 11.2.1 Location Tracking of the Multicast Members 297 11.2.2 Mobile Multicast Message Delivery 298

11.3 The MMS Multicast Approach IV 300 11.3.1 Location Tracking of the Multicast Members 301 11.3.2 Mobile Multicast Message Delivery 305

11.4 Concluding Remarks 306

11.5 Questions 307

12 Session Initiation Protocol 309

12.1 An Overview of SIP 309

12.2 SIP-based GPRS Push Mechanism 316

12.3 SIP-based VoIP Prepaid Mechanism 319 12.3.1 Prepaid Call Setup 323

12.3.2 Forced Termination of a Prepaid Call 325

12.4 Concluding Remarks 326

12.5 Questions 326

13 Mobile Number Portability 329

13.1 Number Portability for Mobile Telecommunications Networks 332

13.2 Call Routing Mechanisms with Number Portability 333 13.2.1 The SRF-based Solution for Call-Related Signaling 335 13.2.2 The SRF-based Solution for Noncall-Related

Signaling 339 13.2.3 The IN-based Solution for Call-Related Signaling 341

13.3 Number Porting and Cost Recovery 343 13.3.1 Number Porting Administration 343 13.3.2 Costsof Number Portability 346

13.4 Concluding Remarks 348

13.5 Questions 349

14 Integration of WLAN and Cellular Networks 351

14.1 The WGSN Approach 353 14.1.1 WGSN Network Architecture 353 14.1.2 WGSN Features 354

14.2 Implementation of WGSN 356

14.3 Attach and Detach 362

xii Contents

14.4 WGSN Push Mechanism 366

14.5 IEEE 802.lX-based Authentication 368 14.5.1 Related Protocols for IEEE 802.IX Authentication 370 14.5.2 SIM-based IEEE 802.IX Authentication 373 14.5.3 EAPOL Timers 376

14.6 Concluding Remarks 378

14.7 Questions 379

15 UMTS All-IP Network 381

15.1 All-IP Architecture 382 15.1.1 Option 1 for All-IP Architecture 382 15.1.2 Option 2 for All-IP Architecture 385 15.1.3 Partitioning of All-IP Architecture in Horizontal

Layers 386

15.2 All-IP Core Network Nodes 387 15.2.1 Call Session Control Function 388 15.2.2 Home Subscriber Server 389 15.2.3 Other Network Nodes 390

15.3 Registration and Call Control 391 15.3.1 Application-Level Registration 392 15.3.2 CS Mobile Call Origination 395 15.3.3 PS Mobile Call Origination 396 15.3.4 PS Mobile Call Termination 400

15.4 Open Service Access 403

15.5 EfficiencyoflP Packet Delivery 407

15.6 Concluding Remarks 409

15.7 Questions 410

16 Issues for the IP Multimedia Core Network Subsystem 413

16.1 Caching in I-CSCF 414 16.1.1 Standard IMS Registration and Call Setup 414 16.1.2 IMS Registration and Call Setup with Cache 416

16.2 Integrated Authentication for GPRS and IMS 421 16.2.1 3GPP Two-Pass Authentication 422 16.2.2 One-Pass Authentication Procedure 425 16.2.3 Correctness of the One-Pass Procedure 429

16.3 Concluding Remarks 432

16.4 Questions 432

17 A Proxy-based Mobile Service Platform 439

17.1 iProxy Middleware 442

Contents xi i i

17.1.1 iProxy System Architecture 17.1.2 Personal Services

17.2 iMobile Service Platform 17.2.1 Dev-Let 17.2.2 Info-Let 17.2.3 App-Let

17.3 User and Device Management 17.3.1 Device Profile and Device-to-User Mapping 17.3.2 User Profile

17.4 iMobile-based Peer-to-Peer Mobile Computing 17.4.1 iMobile ME Services 17.4.2 Queue Synchronization

17.5 Concluding Remarks

17.6 Questions

Bibliography Index

442 447

450 451 453 458

459 459 461

462 465 465

468

468

471 487