Professional Documents
Culture Documents
04 Protocols Overview
04 Protocols Overview
Protocols in MSS/MGW
Training Document
Nokia Networks Oy
1 (99)
Protocols in MSS/MGW
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This document is intended for the
use of Nokia's customers only for the purposes of the agreement under which the document is
submitted, and no part of it may be reproduced or transmitted in any form or means without
the prior written permission of Nokia. The document has been prepared to be used by
professional and properly trained personnel, and the customer assumes full responsibility
when using it. Nokia welcomes customer comments as part of the process of continuous
development and improvement of the documentation.
The information or statements given in this document concerning the suitability, capacity, or
performance of the mentioned hardware or software products cannot be considered binding
but shall be defined in the agreement made between Nokia and the customer. However,
Nokia has made all reasonable efforts to ensure that the instructions contained in the
document are adequate and free of material errors and omissions. Nokia will, if necessary,
explain issues which may not be covered by the document.
Nokia's liability for any errors in the document is limited to the documentary correction of
errors. NOKIA WILL NOT BE RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS
DOCUMENT OR FOR ANY DAMAGES, INCIDENTAL OR CONSEQUENTIAL (INCLUDING
MONETARY LOSSES), that might arise from the use of this document or the information in it.
This document and the product it describes are considered protected by copyright according
to the applicable laws.
NOKIA logo is a registered trademark of Nokia Oyj.
Other product names mentioned in this document may be trademarks of their respective
companies, and they are mentioned for identification purposes only.
Copyright Nokia Oyj 2006. All rights reserved.
2 (99)
Nokia Networks Oy
Contents
Contents
1
Objectives ................................................................................. 5
Introduction............................................................................... 6
3
3.1
3.2
4
4.1
ATM cell..................................................................................... 9
Fields in the ATM cell header ................................................... 10
5
5.1
5.2
ATM connection...................................................................... 12
ATM virtual connections ........................................................... 12
Network elements involved in the transport of user plane
information................................................................................ 13
Statistical multiplexing........................................................... 16
7
7.1
9
9.1
9.2
10
10.1
10.2
10.3
11
11.1
11.2
11.3
12
12.1
12.2
12.3
12.4
Nokia Networks Oy
3 (99)
Protocols in MSS/MGW
13
13.1
13.2
13.3
14
14.1
14.2
14.3
14.4
14.5
15
15.1
15.2
16
17
17.1
18
18.1
SIGTRAN ................................................................................. 82
Stream Control Transmission Protocol...................................... 83
19
19.1
19.2
19.3
20
20.1
20.2
21
21.1
21.2
4 (99)
Nokia Networks Oy
Protocols
Objectives
After completing this module, the student should be able to:
List all the necessary internal and external IP addresses for relevant units
in MSS and MGW.
Name the three planes in ATM protocol reference model and their
functions.
List the three main protocol layers of ATM and describe their functions.
Describe the relation of BICC protocol with the device control protocol
H.248 with the help of a basic call case
Define the protocol structure in MSS for device control protocol H.248
needed between MSS and MGW
Nokia Networks Oy
5 (99)
Protocols in MSS/MGW
Introduction
Signalling is the exchange of information specifically concerned with the
establishment and control of connections, and with management, in a
telecommunications network.
To work efficiently, signals must be understood. Therefore, signalling systems
must be standardised for all users.
Sometimes groups of users may have differing standards. In this case, the
translation system that operates between the standards must be compatible for
all systems.
The International Telecommunication Union (ITU) is an international
organisation within which governments and the private sector co-ordinate
global telecom networks and services.
Signalling standards are nowadays set by the Telecommunication
Standardisation Sector of the ITU (ITU-T) and Third Generation Partnership
Project (3GPP) organizations.
6 (99)
Nokia Networks Oy
Protocols
3.1
3.2
Nokia Networks Oy
7 (99)
Protocols in MSS/MGW
The fundamental strategy behind ATM is to split the information into small
fixed-size units, called 'cells', that are easy to handle. The fixed size of the cell
allows efficient switching. ATM networks allow statistical multiplexing (that is,
multiplexing of many connections with variable rate characteristics), which
altogether reduces the overall bandwidth requirements.
8 (99)
Nokia Networks Oy
Protocols
ATM cell
The user traffic is split and delivered in fixed length packets called ATM cells.
The size of the cell is 53 bytes, which is divided into a 5-byte header and a
48-byte payload field. The ATM cell is relayed based on a label in the header:
Virtual Channel Identifier (VCI) and Virtual Path Identifier (VPI).
53 bytes
Header
5 bytes
Figure 2.
Payload
48 bytes
There are two formats of an ATM cell (depending on the type of the interface):
Nokia Networks Oy
9 (99)
Protocols in MSS/MGW
ATM is employed
Iu-CS
Iub
Uu
RNC
BS
UE
A
MGW
NNI
UNI
B
PSTN
MSC
Iur
NNI
Iu-PS
NNI
UNI
BS
RNC
UNI
Gn
Gi
BS
SGSN
Figure 3.
GGSN
IP network
There is a slight difference between the first byte of the UNI and NNI header.
The NNI header does not include the Generic Flow Control (GFC) field.
Instead the NNI header has a Virtual Path Identifier (VPI) field that occupies
the first 12 bits, allowing larger trunks between public ATM switches.
GFC
4.1
VPI
VCI
VPI
VCI
VCI
PT
VCI
CLP
PT
CLP
HEC
HEC
Payload
Payload
Payload
(48 bytes)
Figure 4.
VCI
VCI
GFC
VPI
VCI
VPI
VPI
Header
(5 bytes)
PT
CLP
HEC
Payload Type
Cell Loss Priority
Header Error Control
Provides local functions, such as identifying multiple stations that share a single
ATM interface. This field is typically not used and is set to its default value.
10 (99)
Nokia Networks Oy
Protocols
In conjunction with the VCI, identifies the next destination of a cell as it passes
through a series of ATM switches on the way to its destination.
Virtual Channel Identifier (VCI)
In conjunction with the VPI, identifies the next destination of a cell as it passes
through a series of ATM switches on the way to its destination.
Payload Type (PT)
Indicates in the first bit whether the cell contains user data or control data. If the
cell contains user data, the second bit indicates congestion, and the third bit
indicates whether the cell is the last in a series of cells that represent a single
AAL5 frame.
Cell Loss Priority (CLP)
Calculates the checksum only on the header itself. The network instantly
discards any cell that fails the header error check.
Nokia Networks Oy
11 (99)
Protocols in MSS/MGW
ATM connection
ATM is a connection-oriented technique. The end-to-end route is defined
through the network at the beginning of the connection setup and the route
remains the same throughout the connection. ATM cells are routed on the same
route to both directions. This guarantees that the cells arrive in the receiving end
in the same order they where sent. Furthermore, cell delay variation is also
minimised and since routes are known it is possible to predict link behaviour.
5.1
Each ATM cell contains a label in its header to explicitly identify the VC, to
which the cell belongs. This label consists of two parts: Virtual Channel
Identifier (VCI) and Virtual Path Identifier (VPI).
Virtual Channel Connection (VCC) is a logical connection in ATM.
Virtual Channel Identifier (VCI) identifies a particular VC link under a given
VPC. A specific value of a VCI is assigned each time a VC is switched in the
network. Hence, it has only local meaning.
Virtual Path Connection (VPC) is a logical grouping of VCCs having the
same endpoints. Thus, all the cells flowing in a single VPC are switched
together. Virtual paths are used for bundling a number of virtual channels into a
higher bandwidth stream routed through ATM switches. That is, crossconnection and switching can be done on a higher level and not on individual
VCC level.
Virtual Path Identifier (VPI) identifies a group of VC links at a given
reference point that share the same VPC. A specific value of a VPI is assigned
each time a VP is switched in the network.
Transmission path is a bundle of VPs. The following figure shows the relation
among VCs, VPs and a transmission path.
VC
VP
Transmission path
VP
VC
Figure 5.
12 (99)
Nokia Networks Oy
Protocols
Virtual paths help to reduce the control cost by grouping connections that share
common paths through the network into a single unit. Network management
actions can then be applied to a small number of groups of connections instead
of a large number of individual VCC connections.
Virtual Path Connections (VPCs) have many advantages:
Simplified network architecture
Much of the work is done when the VPC is set up. By reserving capacity on a
VPC in anticipation of later call arrivals, new VCCs can be established by
executing simple control functions at the end points of the VPC; no call
processing is required at transit nodes. Thus, the addition of new VCCs to an
existing VPC involves minimal processing which decreases the connection
setup delay.
Enhanced network services
The VPC is used internally in the network but is also visible to the end user.
Thus, the user may define closed user groups or closed networks of VC bundles.
5.2
Nokia Networks Oy
13 (99)
Protocols in MSS/MGW
Figure 6.
14 (99)
VC and VP switching
Nokia Networks Oy
Protocols
Figure 7.
VP switching
Nokia Networks Oy
15 (99)
Protocols in MSS/MGW
Statistical multiplexing
Statistical multiplexing is one of the main benefits of ATM. Operators can
utilise statistical multiplexing to take advantage of the inherently bursty nature
of applications. Users of ATM networks generate numbers of cells according to
the amount of information they want to transfer. The amount of network
resources required by users changes as a function of time. When these resources
are shared among users, like in ATM, it is very unlikely that all users send at
their peak cell rate simultaneously. This means that the network operator can
either reduce the amount of resources required for a fixed load or it can
accommodate more load with the same amount of resources. This phenomenon
is called statistical multiplexing. The network resources are shared among users
with either VCCs or VPCs.
Figure 8 shows an example of statistical multiplexing. The picture on the lefthand side shows required amount of bandwidth when the capacity of each
connection is reserved according to the peak cell rate. The picture on the right
hand side shows the so-called statistical multiplexing gain, when principle of
statistical multiplexing is used in the bandwidth reservation.
Figure 8.
When virtual paths are used, two levels of multiplexing exist: VC level and
VP level. At the VC level, VCs are statistically multiplexed on a VP. At the VP
level, VPs are either deterministically or statistically multiplexed on a physical
link.
If VPs are deterministically multiplexed, they do not share the bandwidth
reserved for them with the other VPs on the same link. The sum of the reserved
bandwidths of the VPs cannot exceed the bandwidth of the link. If VPs are
statistically multiplexed, they do share the bandwidth nominally reserved for
them with the other VPs on the same link. VPs do not have strictly reserved
bandwidths.
16 (99)
Nokia Networks Oy
Protocols
ATM protocol
The ATM reference model includes three planes, which consist of all layers:
User plane is responsible for user information transfer and associated controls
(such as flow control and error control)
Control plane performs call and connection control functions
(such as signalling procedures).
Management plane contains two components:
Physical layer
ATM layer
ATM Layer
ATM Layer
Figure 9.
This layer is responsible for coding, decoding, scrambling, and adaptation to the
medium. PMD sublayer is dependent on the physical medium used. ATM can
Nokia Networks Oy
17 (99)
Protocols in MSS/MGW
use any physical medium capable of carrying ATM cells, such as SDH, SONET
and E1.
Transmission Convergence (TC) sublayer
The convergence sublayer handles all the processes involved in taking cells
to/from the ATM layer, and performs bit rate adaptation, header protection, cell
delineation, and adaptation to the physical mediums structure.
Existing transmission networks are widely based on Plesiochronous Digital
Hierarchy (PDH). Although the Synchronous Digital Hierarchy (SDH) forms
the basis of transport of the ATM traffic, there is need to transport ATM cells
also using PDH transmission networks. PDH-based ATM interfaces are used for
providing low-speed link connections between the ATM network elements.
PDH interfaces are especially suitable for links between RNC and base station
(BS), where the bandwidth requirements are low and capacity and cost
optimisation are necessary. Interface types are E1, T1 and JT1.
In addition to traditional PDH order multiplexing levels (for example, between
E1 or E3 level), inverse multiplexing, which provides flexible transmission
capacity building according to the operator's needs, is also supported at the
ATM physical layer.
The user traffic is split and delivered in fixed length packets called ATM cells.
The size of the cell is 53 bytes, which is divided into a 5-byte header and a
48-byte payload field.
53 bytes
Header
5 bytes
Figure 10.
Payload
48 bytes
The ATM layer adds the cell header to the 48-byte cell payload after it has
been assembled in the ATM adaptation layer (AAL), and extracts the header
before the cell is delivered to the AAL. The layer translates the values of the
VCI and VPI at the ATM switches or cross-connects. In addition, multiplexing
and switching of cells takes place at the ATM layer. The ATM layer provides
virtual connections between end points and maintains the contracted quality of
service (QoS) by applying a traffic contract procedure at a call setup time. It is
also used to "police" the agreed traffic contract while the connection is in
progress.
The ATM adaptation layer (AAL) provides data link services for upper layer
protocols. AAL is needed for adapting upper-layer protocol data units such as
TCP/IP and signalling to ATM layer. Furthermore voice codecs generate short
voice packets, which must be adapted to ATM layer services.
18 (99)
Nokia Networks Oy
Protocols
The AAL maps user data from higher layer into standard ATM cells to be
transported over an ATM network. Then it collects information from the ATM
cells for delivery to higher layers. AAL layer includes two sublayers:
User data
AAL
Segmentation and Reassembly
Sublayer (SAR)
48 bytes
Header
ATM Layer
Payload
Header
Payload
Physical
Layer
Transmission Convergence
(TC)
Physical Medium Dependent
(PMD)
Figure 11.
Header
Payload
SDH O/H
5 bytes 48 bytes
STM-1 Frame
Convergence sublayer (CS) provides the AAL service to the higher layer
protocol. This sublayer is service dependent. It performs a variety of functions
that depend on the actual service being supported, including clock recovery,
compensating for cell delay variation and dealing with other problems
introduced by the network (e.g. cell loss).
Segmentation and reassembly sublayer (SAR) provides segmentation of the
users' information (together with any supporting information added by the
convergence sublayer) into 48-byte segments that form the payload field of an
ATM cell. It also reassembles the contents of the ATM cell information fields
into higher layer information formats.
Nokia Networks Oy
19 (99)
Protocols in MSS/MGW
7.1
There can also be a SDH transmission medium between a WCDMA BTS and a
RNC , between two RNCs or between MGW and RNC.
How does the inverse multiplexing work?
When user traffic is transmitted across the IMA link, the ATM cell stream is
passed from the ATM layer to the IMA sublayer. In the IMA sublayer, the
ATM cell stream is split on a cell-by-cell basis, and the traffic is distributed
evenly onto the physical links, in which IMA frames carry the traffic to the
receiving end of the IMA link. At the receiving end of the IMA link, the
original ATM cell stream is recreated and passed back to the ATM layer. The
transmitting end (the near-end) must align the transmission of IMA frames to all
physical links, which allows the receiving end (the far-end) to adjust for
differential link delays by measuring the arrival times of the IMA frames on
each physical link.
How are the IMA groups created?
The IMA groups are created at both ends of the transmission lines, which are
seen as one virtual IMA link. The PDH exchange terminals at both ends of the
IMA virtual link have to be tied up to the same kind of functional units.
The maximum number of transmission lines at Iub interface, between Nokia
WCDMA BTS and a RNC, that can be grouped into one IMA group is 8 x E1
(2 Mbit/s) lines or 8 x T1/J1 (1,5 Mbit/s) lines. At Iur interface, between two
RNCs, the maximum number is 16 x E1 or T1/J1 lines. At Iu-Cs interface,
between MGW and RNC, the maximum number is 8 x E1 (2 Mbit/s) lines or 8
x T1/J1 (1,5 Mbit/s) lines.
When creating IMA groups, the transmission lines are identified with the PDH
Exchange Terminals (PETs) that they are connected to. All the PETs of one
IMA group have to belong to the same NIP1 functional unit. There can be
several IMA groups per one functional unit, but all the transmission lines of one
IMA group must go to the same direction.
A PET can only belong to one IMA group. However, a PET can be transferred
from one IMA group to another, provided that the groups share the same
functional unit. When transferring a PET from one group to another, the
operator may also have to make changes in the switching.
Note
When configuring IMA groups, the grouped transmission lines should all have
20 (99)
Nokia Networks Oy
Protocols
the same physical route in order to keep the delays between the physical links as
small as possible. That is, the IMA frames from one link should not have to wait
for a long time for the IMA frames from other links before they are recombined
into an ATM cell stream at the receiving end of the IMA virtual link.
Note
One of the transmission lines in the IMA group is defined initially as a Timing
Reference Link (TRL). The transmission line defined as the TRL cannot be
removed from the IMA group and added to another IMA group.
Nokia Networks Oy
21 (99)
Protocols in MSS/MGW
Bit rate
Constant
Timing required
between source & dest.
Variable
Synchronised
Not synchronised
Connection oriented
Connection mode
Voice,
circuit
emulation
Example of
traffic types
AAL
AAL1
Video,
voice with
silence
removed
AAL2
Connection oriented
or connectionless
Data,
SMDS
Data,
Frame
Relay,
IP
AAL3/4
AAL5
ATM layer
Physical layer
Figure 12.
AAL1
AAL1 is for constant bit rate (CBR) information, which requires timing
synchronisation between the source and destination. It is appropriate for
transporting telephone traffic, uncompressed video traffic and circuit emulation
service.
AAL2
AAL2 is for variable bit rate (VBR) information, which requires a strict
relationship between the transmission and reception clocks. It provides the
bandwidth efficient transmission of short, variable length packets in delaysensitive applications. AAL2 multiplexes short packets from multiple users into
one ATM connection. It has been mainly designed for transporting compressed
voice in mobile networks, but will also be used for compressed voice in wireline
applications. This AAL is aimed at compressed video, which will vary its bit
rate significantly.
AAL3/4
22 (99)
Nokia Networks Oy
Protocols
8.1.1
Nokia Networks Oy
23 (99)
Protocols in MSS/MGW
Silence
....
ch#2
....
ch#1
CID in the header
Short packet
Standard
ATM cell
hh ch#1
ch#1
hh ch#2
ch#2
hh ch#3
ch#3
H
H
hh ch#4
ch#4
hh ch#2
ch#2
....
H
H
Start field
Figure 13.
AAL2 is especially suitable for carrying voice packets that are produced by
speech codecs. Also longer packet lengths up to 64 Kbytes are supported by
AAL2.
AAL2 is divided into two sublayers:
Service specific convergence layer (SSCS) performs the segmentation and
reassembly function for application packets longer than CPS packet size
(that is, 45 bytes by default), but also packet size of 64 bytes can be used.
Common part sublayer (CPS) enables variable-size packets (0 - 64 bytes)
from different users to be assembled in an ATM cell payload and transmitted on
the same ATM virtual connection. A packet (minicell) received from a user is
converted to a CPS packet with a 3-byte header that includes a single byte
Channel ID (CID) to distinguish AAL2 connections within a single ATM VCC.
Multiplexing and demultiplexing in the AAL2 occurs in the CPS. The Common
Part Sublayer
(CPS) encapsulates the segments created by the SSCS layer by adding a 3-byte
header. The encapsulated segments are called CPS Packets and their size is at
maximum 48 bytes (note that segmentation to 64 bytes is also allowed). The
AAL2 multiplexer assembles the CPS Packets into CPS PDUs (with 1 byte
header). The PDU:s are in fact the payload of the ATM cells and their
maximum size is 48 bytes.
In order to increase the multiplexing gain a timer is initialized whenever the
CPS PDU is smaller than 48 bytes i.e. the CPS Packets waiting in the assembly
buffer are not filling an ATM cell. The ATM cell is filled up with padding bits
and sent when the timer value expires and there is no new CPS Packet arriving
to the multiplexer. A longer timer value results in larger delay and higher
multiplexing gain, i.e., the load of ATM links is reduced. In order to reduce the
delay on the AAL2 layer the value of the timer is often set to zero. This way an
ATM cell is generated upon arrival of a CPS Packet into empty assembly buffer
regardless of its size.
24 (99)
Nokia Networks Oy
Protocols
User data
Higher layers
AAL2 SSCS
Segmentation and
reassembly function
for application packets
AAL2
AAL2 CPS
CPS AAL2 channel
multiplexing and
demultiplexing
ATM layer
CPS
SSCS
Figure 14.
8.1.2
25 (99)
Protocols in MSS/MGW
Higher layers
CS
SSCOP
Reliable data transfer
AAL5 CPS
CPCS
Transparent transport of
SDUs
SAR
SDU segmentation and
reassembly
CPCS
Common part
AAL5
SAR
SSCF
Maps Layer 3 to SSCOP
SSCS
AAL5 SSCS
ATM layer
Figure 15.
AAL5 can be used for IP over ATM traffic, signalling traffic bearer, and
FR/ATM interworking. Internal control connections of RNC/MGW (ATM
module) are based on ATM AAL5 connections between units. AAL5 capability
is available in all units having ATM connectivity (in some units only for system
internal use, e.g. message passing).
26 (99)
Nokia Networks Oy
Protocols
9.1
VP switching occurs when only the VPI field within the cell header is used to
describe the destination of the cells. This has the advantage that many VCIs
destined for the same network endpoint can be "bulk switched".
VP switches terminate VP links. A VP switch translates incoming VPIs to the
corresponding outgoing VPIs according to the destination of the VPC whereas
VCI values remain unchanged.
VP switching is shown in Figure 16.
Virtual channel (VC) switching
VC switching takes place when all cells on a physical interface are identified
and switched to their destination through the switch fabric based on a
combination of the VPI/VCI values. A table is maintained on each interface
identifying input and output ports associated with certain VPI/VCI.
The VCI values are changed in a VC switch and the VPI values are changed as
they pass through a VP switch. However, VCI values are not changed when
passing through a VP switch.
VC switching is shown in Figure 16.
Nokia Networks Oy
27 (99)
Protocols in MSS/MGW
VC switch
Port
Port
VCI 9
VCI 10
VPI 3
VP switch
VCI 9
VCI 10
VPI 23
VPI 36
VCI 15
VPI 8
VCI 26
VCI 9
VCI 10
VPI 9
Port
Figure 16.
9.2
28 (99)
Nokia Networks Oy
Protocols
User 1
User 2
RNC
MGW
Upper layer
Upper layer
BS
User 3
Upper layer
AAL2
ATM H
AAL2
Process
ATM H
#1 #2 #3
ATM cell
#1 #2 #3
ATM cell
PHY
PHY
AAL2 connections
VCC
ATM connection
Figure 17.
AAL2
Process
H
#5 #6 #7
Process
ATM H
ATM cell
#5 #6 #7
ATM cell
PHY
VCC
ATM connection
Nokia Networks Oy
29 (99)
Protocols in MSS/MGW
10
Signalling in 3G network
10.1
C-Plane
Signalling
protocol
U-Plane
User data
Signalling
AAL
AAL
ATM layer
Physical layer
Figure 18.
The SSCF maps signalling messages from the upper level in to SSCOP while
SSCOP provides mechanisms for establishing, releasing, and monitoring
signalling information exchange between signalling entities.
There are two types of SAAL:
30 (99)
SAAL-NNI
Nokia Networks Oy
Protocols
SAAL-UNI
Note
AAL type 2 signalling protocol and Node B Application Protocol (NBAP)
application protocol use UNI SAAL in point-to-point signalling connections in
3G RAN Iub interface where there is no SS7 signalling network available.
10.2
RNSAP/RANAP
AAL2 SIG
SCCP
STC
MTP3b
NBAP
SSCF-UNI
SSCF-NNI
SSCOP
AAL5
ATM
Physical
Figure 19.
Nokia Networks Oy
31 (99)
Protocols in MSS/MGW
AAL2
Switch
CID(x)
Signaling channel
AAL2 paths
AAL2
Switch
CID(x)
ATM
Switch
32 (99)
Nokia Networks Oy
Protocols
Note
The signalling bearer converters use AAL5 connections. These signalling
connections are configured as permanent ATM connections between AAL
type 2 switches.
AAL2 signalling complies with ITU-T Q.2630.1 AAL type 2 signalling
protocol (Capability Set 1).
10.3
Radio
Network
Layer
Control Plane
User Plane
Application
Protocol
Data
Stream(s)
Transport
Network
Layer
Transport
Network
Control Plane
Transport
Network
User Plane
Transport
Network
User Plane
ALCAP(s)
Signalling
Bearer(s)
Signalling
Bearer(s)
Data
Bearer(s)
Figure 21.
Horizontal layers
All UTRAN-related issues are visible only in the radio network layer. The
transport network layer represents standard transport technology that is selected.
Vertical planes
33 (99)
Protocols in MSS/MGW
Control plane
The control plane is used for all 3G specific control signalling. It includes
the application protocol (i.e. RANAP in Iu, RNSAP in Iur, NBAP in Iub)
and the signalling bearer for transporting the application protocol
messages.
The application protocol is used, among other things, for setting up
bearers to the UE (i.e. the radio access bearer in Iu and subsequently the
radio link in Iur and Iub). The signalling bearer for the application
protocol is always set up by O&M actions.
User plane
All information sent and received by the user, such as coded voice in a
voice call or the packets in an Internet connection, are transported via the
user plane.
The user plane includes the data stream(s) and the data bearer(s).
The data bearer(s) in the user plane and the signalling bearer(s) for the
application protocol also belong to the transport network user plane. The data
bearers in the transport network user plane are directly controlled by the
transport network control plane, but the control actions required for setting up
the signalling bearer(s) for the application protocol are considered O&M
actions.
34 (99)
Nokia Networks Oy
Protocols
11
11.1
11.1.1
Setup
Figure 22.
Nokia Networks Oy
CAC
User B
35 (99)
Protocols in MSS/MGW
11.1.2
User A
User B
UPC
UNI
ATM
Network
NPC
NPC
NNI
ATM
Network
UNI
UPC
Figure 2. Usage Parameter Control (UPC) and Network Parameter Control (NPC)
Traffic policing is defined as a set of actions taken by the network to monitor
and control the amount of incoming ATM traffic. The main purpose is to
protect resources from misbehaviour that can affect the QoS of other already
established connections. This is done by detecting violations of negotiated
parameters and taking appropriate actions. At the ATM cell level actions may
include cell passing, cell tagging (only for CLP=0 cell stream) and cell
discarding. UPC/NPC supports the QoS objectives for all compliant
connections.
Both UPC and NPC function can be enabled or disabled for all connections at
an interface.
11.1.3
Traffic shaping
Traffic shaping is a mechanism that alters the traffic characteristics of a stream
of cells on a connection to achieve better network efficiency whilst meeting the
QoS objectives, or to ensure conformance in a subsequent interface. Traffic
shaping is performed by delaying (buffering) cells until they can be transmitted
in accordance with the traffic parameters.
Traffic shaping capability is particularly important when connecting across a
public User-Network Interface (UNI) to a public network, since many such
networks are basing their tariffs to a particular aggregate bandwidth.
An ATM network does not need to guarantee QoS performance for nonconforming cells and thus a user wanting guaranteed QoS must shape traffic to
ensure conformance to the traffic parameters in an agreed traffic contract. A
network may employ shaping when transferring a cell flow to another network
in order to meet the conditions of a network-to-network traffic contract, or in
order to ensure that the receiving user application operates in an acceptable
way.
36 (99)
Nokia Networks Oy
Protocols
User A
Shaping
Figure 5.
Network A
Network B
Policing
Shaping
Policing
Shaping
Shaping
Policing
Shaping
Policing
User B
Shaping
Note
Traffic shaping capability is implemented in each RNC/MGW computer or
signal processing (DMCU/TCU) unit terminating/originating traffic. Traffic
originating unit provides shaping of generated ATM traffic according to
configured traffic parameters. In addition Multiplexing unit (MXU) and NIS
units shape outgoing traffic per port.
11.1.4
Priority control
Cell loss priority bit in ATM cell header can be used to generate different
priority cell flows within a virtual path or channel connection. A network
element may selectively discard cells with low priority (CLP=1) before higher
priority cell (CLP=0) in congestion situation.
11.1.5
Frame Discard
If a congested network needs to discard cells, it may be better to drop all the
cells of one Protocol Data Unit (PDU) rather than to randomly drop cells
belonging to different PDUs. If a single cell is discarded, it may cause the
retransmission of the whole PDU, which in turn may cause more traffic when
congestion is already occurring. Discarding a packet may help to avoid
congestion in the ATM network and can increase throughput.
The two most common congestion control mechanisms implemented in ATM
are:
Cell loss priority bit in ATM cell header can be used to generate different
priority cell flows within a virtual path connection or virtual channel
connection. Selective cell discard buffer management method ensures that lower
priority (CLP=1) ATM cells are dropped before higher priority CLP=0 cells in
Nokia Networks Oy
37 (99)
Protocols in MSS/MGW
This congestion control mechanism drops all subsequent cells from a PDU as
soon as one cell has been dropped. Once the switch drops a cell from a PDU,
the switch continues dropping cells from the same PDU until the end of the
PDU is indicated. The last cell is not discarded, as it is required to indicate the
end of the PDU and by implication indicate the start of the next PDU.
PPD offers limited improvement, because the switch begins to drop cells only
when the buffer overflows, the first cell dropped might belong to a packet in
which the majority of cells have already been forwarded. Also, when the switch
first drops a cell, the switch does not look in the buffer for earlier cells that
belong to the same packet. Therefore, cells from the corrupt packet may be
forwarded from the switch even though PPD is in effect.
Buffer positions
for cells
When the buffer reaches the
capacity, PPD discards the the
remaining cells, except the last
one.
Figure 6.
11.1.5.2
Early Packet Discard (EPD) greatly reduces the number of corrupted PDUs
transmitted, offering significant improvement over PPD. Whenever the
proportion of the buffer in use exceeds a fixed threshold, the ATM switch will
begin dropping entire PDUs prior to buffer overflow. The switch drops the first
arriving cell and all subsequent cells of that particular PDU. This will continue
until the number of cells in the buffer drops below the set threshold.
38 (99)
Nokia Networks Oy
Protocols
Buffer positions
for cells
When the buffer level exceeds the
EPD threshold, the cells are
selectively discarded from the entire
frames
EPD
Threshold
EPD Discards
Frames
Figure 7.
11.2
11.2.1
39 (99)
Protocols in MSS/MGW
Propagation delay dominates the fixed delay component of CTD, while queuing
behaviour contributes to delay variations in heavily loaded networks. The
effects of queue service strategy and buffer sizes dominate loss and delay
variation performance in congested networks. Transmission link error
characteristics largely determine the CER, SECBR and CMR parameters.
11.2.2
Traffic descriptors
The traffic parameters describe traffic characteristics of a source. The traffic
descriptors are the generic list of traffic parameters, which describe the traffic
characteristics of an ATM connection.
The traffic descriptor consists of:
40 (99)
Nokia Networks Oy
Protocols
11.2.3
11.3
Service Classes
Traffic Parameters
QoS Parameters
Figure 23.
Nokia Networks Oy
41 (99)
Protocols in MSS/MGW
Bandwidth
Time
Figure 24.
Bandwidth
Time
Figure 25.
Unspecified Bit Rate (UBR) is meant for non-real time applications that do not
have strict requirements for delay and delay variance. UBR does not have
guaranteed QoS and is also known as 'best effort' traffic class.
Note
CBR is equivalent to DBR (Deterministic Bit Rate), whereas VBR is equivalent
with SBR (Statistical Bit Rate). The CBR and VBR are the terms used by ATM
Forum, while the DBR and SBR are used by ITU-T.
42 (99)
Nokia Networks Oy
Protocols
12
The following figures illustrate the resource creation order when building
connections on VC level.
ATM interface
VC connection
Figure 26.
The ATM resources are created on the external interfaces of a network element
and they form the basis for VP and VC level connections to other network
elements.
Nokia Networks Oy
43 (99)
Protocols in MSS/MGW
- VPI
- VPL service level: VP/VC
- usage e.g. MTP3SL, AAL2UD, IPOAM, AAL2SL, DNBAP, CNBAP
- service category: CBR/UBR
- traffic parameters: PCR, CDVT, SCR, Burst tolerance
- QoS class
2
Access profile of
ATM interface
- max bandwidth
- max VPI/VCI bits
- interface id
- UNI / NNI
- phyTTP id
AT
M
Ph log VP VC
y ica Lt Lt
TT l p, p
P int
erf
ac
VC
e VP Lt
p
Lt
p,
VC
Lt
p
VP
VCLt
Lt
p,
p
Phy TTP
ATM logical interface
- phyTTP id
- PET/IMA/ SET/
PROTGROUP
RNC
3 4
VP
Lt VC
1 p, Lt
p
AT
M
VP logPh
VC
ica y
Lt Lt
p p, l TT
int P
erf
ac
VC
Lt VP
e
p
MGW
Lt
VC
p,
Lt
p
12.1
12.2
ATM interface
The ATM interface is an external logical interface, under which the connections
are built. The ATM interface can work as:
44 (99)
Nokia Networks Oy
Protocols
The capacity of an ATM interface must be smaller than the capacity of the
object it is tied up to.
For further information on ATM Interface creation, refer to refer to Nokia online document.
12.3
interface id
Interface id
Nokia Networks Oy
45 (99)
Protocols in MSS/MGW
For example, if the ATM interface is tied up to an IMA group with 3*2 Mbit/s
lines, the maximum bandwidth is 0.99*3*4528 c/s = 13448 c/s.
For further information on calculating bandwidth, refer to Inverse Multiplexing
for ATM (IMA) Specification Version 1.1, ATM Forum.
The maximum ingress and egress bandwidth unit
Note
The egress bandwidth (for outgoing traffic) cannot be defined larger than the
capacity of the neighbouring ATM exchange; otherwise ATM cells are lost.
The maximum number of VPI bits defines the space (number of bits) available
for specifying the VPLtp's under the interface. This defines the maximum
number of Virtual Paths (VPs). For example, if the space reserved for VPI is 4
bits, it means that the maximum number of VPLtp's that can be created under
the ATM interface is 16 (= 24). This parameter identifies the maximum number
of allocated bits of the VPI sub field for the defined ATM interface. The
parameter is used by the system to select the appropriate VPI values when
establishing ATM connections. The parameter value can range from 1 to 8 for a
UNI interface and from 1 to 12 for an NNI interface.
The maximum number of VCI bits defines the space (number of bits) available
for specifying VCLtp's under the interface. This defines the maximum number
of Virtual Channels (VCs) that can be created inside each virtual path. For
example, if the space reserved for VCI is 8 bits, the maximum number of
VCLtp's that can be created under a VPLtp is (= 28) - 1 = 255 (VCI with value 0
is not allowed). This parameter identifies the maximum number of allocated bits
of the VCI sub field per VPLtp of the defined ATM interface. This parameter is
used by the system to select the appropriate VCI values when establishing ATM
connections.
The parameter value can range from 1 to 14 for both UNI and NNI
interface. You should select the lowest possible value.
The VCI values 1 - 31 are reserved for specific purposes. For example, VCI 3
and VCI 4 are reserved for O&M (operation and maintenance). For this reason,
you must use VCI number 32 or bigger for an external VC connection. When
creating an access profile, you should reserve at least 6 VCI bits (= 26 different
VCI values).
46 (99)
Nokia Networks Oy
Protocols
It depends on the network level planning how the ATM interface and its access
profile, and thus the connections, should be created. For example, there can be
many Virtual Paths with a few Virtual Channels inside each path, or only a few
large VPs with numerous VCs inside each path.
12.4
VCC endpoints and thus for allowing the creation of AAL type 2
connections for user traffic
When creating a VPLtp with VC service level, you define the purpose, for
which the VPLtp and the underlying VCLtps will be used.
For further information on VP/VC link termination point, refer to Nokia on-line
document.
Service category and conformance definition
In the current ATM network, the service category CBR (Constant Bit Rate) is
applied for user plane and signalling traffic, and the service category UBR1
(Unspecified Bit Rate) is applied for IP over ATM connections. The
conformance definition must comply with the service category used. The
VCLtp's created under a certain VPLtp of UBR1 type must have the same
service category and conformance definition as that VPLtp. However, you can
create VCLtp's of UBR1 type under a VPLtp of CBR type.
Nokia Networks Oy
47 (99)
Protocols in MSS/MGW
13
13.1
Digit analysis
The purpose of the digit analysis is to find a destination for the call and to select
a route to the destination.
Digit analysis analyses the digit sequences that it receives. Typically the
received sequence is an address of the receiving end, but digit analysis may be
used to analyse any number sequence that can be analysed hierarchically digit
by digit. The received digits are analysed in an analysis tree to locate the
destination for the connection. An analysis tree is a chain of records in an
analysis file beginning from the first digit of the analysed number sequence.
Each unique set of digits is associated with a destination.
Destination is comprised of one or more routing alternatives. A Subdestination
determines which ATM route is selected. A Subdestination is always mapped to
one route.
When the result of digit analysis is the route, it is the starting point of routing.
Digit analysis is used in the RNC for finding a route to a Backbone MGW or an
RNC (in Iur interface). The digit is analysed when a new connection at Nb is
needed; for example, a new call establishment or soft handover branch to the
existing call is going to be added.
Digit analysis gets the address of other network element and finds the route for
the destination by analysing the address. The address to be analysed in MGW is
the AAL2 Service Endpoint Address (A2EA) which uses AESA format. The
address points to a certain AAL2 or ATM termination point in the neighbouring
node.
13.2
Routing
Routing is used for finding free resources under a given route for connections
going to another network element.
A route can be seen as a common concept in ATM/TDM environment.
In ATM, concept of circuit groups/circuits, used in TDM, are replaced by new
concepts:
48 (99)
Nokia Networks Oy
Protocols
13.3
49 (99)
Protocols in MSS/MGW
hunted, the resource is found for the connection. In ATM, CAC is needed after
selection of VPC/VCC. CAC decides finally if the new connection can be
accepted without violating the guaranteed quality of service for existing
connections.
The following steps show the function of the digit analysis and routing:
1.
2.
Digit analysis goes through the received digit sequence and the
information about the origin of the call in digit analysis tree in order to
find a destination for the call.
3.
The destination provides the subdestination. In the Iub and Iur interfaces
each destination currently provides only one subdestination.
4.
The subdestination determines which external ATM route is used for the
connection.
5.
The external ATM route is used for directing the call to another
exchange. Under the ATM route the routing selects an appropriate VCC
endpoint group.
6.
Under the VCC endpoint group the routing selects an appropriate VCC
endpoint and thus an appropriate virtual channel.
7.
Finally, AAL2 connection control selects a free AAL type 2 channel for
making the connection.
50 (99)
Nokia Networks Oy
Protocols
14
14.1
Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
Figure 28.
Application
Internet Protocol
ARP, RARP
Network Interface
(layer 1 and 2 are
not specified within
the Internet protocol suite)
Nokia Networks Oy
51 (99)
Protocols in MSS/MGW
Communication
Network
Server
Client
Figure 29.
14.1.1
Internet Protocol
Internet Protocol (IP) is a layer-3 protocol that is used to carry data over
different types of network. IP works in connectionless packet mode; that is, data
is transported to the destination without the establishment of a connection
between the source and the destination similar to a postal system. Each packet
will have an address for both sender and receiver, which is referred to as an IP
address. There are two types of IP address: private IP addresses and public IP
addresses. Public IP addresses are globally unique in that all IP packets in a
public network will have unique IP sender and receiver addresses.
52 (99)
Nokia Networks Oy
Protocols
IP Address logic
House 1
House 2
New Street
House 1
House 3
Crossing
A
Old Street
Router A
Network 1
Host 1
Network 2
Host 2
Figure 30
Host 1
Host 2
Host 3
IP Network B
Router 1
IP Network C
IP Network A
Router 2
Router 3
Internet
Figure 31.
IP network example
Nokia Networks Oy
53 (99)
Protocols in MSS/MGW
14.1.2
Net ID
Figure 32
Host ID
An IP address is composed of two parts: the Network ID (Net ID) and the Host
ID. The Net ID represents the network to which the host or gateway belongs to
and the Host ID identifies the specific host within that particular network. The
Net ID always precedes the Host ID. The number of bits used to represent the
Net ID and the Host ID varies depending if class or classless IP addressing is
used. All routing functions are based on the Net ID portion of the IP address.
14.1.3
54 (99)
Class A addresses were designed for very large organisations, which will
have a substantial amount of computers attached to their network.
Class C addresses were designed for small size organisations, which will
have a small number of computers attached to their network.
Nokia Networks Oy
Protocols
Class E addresses are reserved by the Internet for special use. Similarly,
class E type addresses have no Net ID or Host ID.
Oktet 2
Oktet 3
Oktet 4
11000000
01111010
01100010
01010000
192.122.98.
32 bits
binary format
0 1
7 8
31
0 Net ID
01 2
10
15 16
012 3
23 24
65534 users/net
128.0.0.1 to 191.255.255.254
Class C
254 users/net
192.0.0.1 to 223.255.255.254
Class D
268435454 groups
224.0.0.1 to 239.255.255.255
31
1110
Multicast
0 123 4
Figure 33.
Class B
31
Net ID
0 123 4
1111
16777214 users/net
0.0.0.1 to 126.255.255.254
31
Net ID
110
Class A
31
Class E
14.1.4
55 (99)
Protocols in MSS/MGW
If IP address = a.b.c.d/22
Then netmask = 11111111.11111111.11111100.0000000 = 255.255.252.0
Decimal Representation
IP Address
192.168.0.1
192.168.0.1
Binary Representation
11000000.10101000.00000000.00000001
11000000.10101000.00000000.00000001
Bitwise ANDing
Netmask
Network
Address
255.255.255.0
255.255.255.0
11111111.11111111.11111111.00000000
11111111.11111111.11111111.00000000
192.168.0.0
192.168.0.0
11000000.101010000.0000000.00000000
11000000.1010100.000000000.00000000
Figure 34.
The IP address and netmask are ANDed together bit wise resulting in the binary
representation of the network address
14.1.5
The increased address space of 128 bits will allow IPv6 to support more levels
of addressing hierarchy, as well as more addressable nodes and simple autoconfiguration of addresses. IPv6 also includes a new type of address, anycast
address, which is used to send a packet to any one group of nodes in a network.
Header format simplification
In contrast to the header format of IPv4, some of the header fields of IPv6 have
been discarded or made optional. This change was invoked so that the commoncase processing cost of packet handling can be reduced and limit the bandwidth
cost of IPv6 header.
56 (99)
Nokia Networks Oy
Protocols
The changes implemented in IPv6 for header options permit more efficient
forwarding. Additionally there are less stringent limits on the length of options,
this adds flexibility of further options that can be implemented in the future.
Flow labelling capability
This is a new capability feature, which allows the labelling of packets belonging
to a particular traffic flow, for which the user requests special handling. This
includes non-default quality of service or real time service.
Authentication and privacy capabilities
IPv4 did not have any authentication and privacy capabilities. This was
compensated by the development of IPsec. IPv6 contains many features of IPsec
as well as other features to support authentication, data integrity, and data
confidentiality.
14.1.6
Router
Routing is the process of selecting the
next destination using a routing table.
TCP/
UDP
IP
Relay
IP
Layer 3 switch
decides were to transmit
the IP packet next after
analysis of the IP header
information
depending on data link
and physical link layer,
segmentation or
reassembly may
necessary
IP
L2
L2
L2
L1
L1
L1
Router
Figure 35.
Routing can be either static or dynamic. In static routing the router will have a
fixed routing table, which includes the destination IP networks and
corresponding next hops. In dynamic routing, the routers exchange information
on the destination IP networks and corresponding next hops. This dynamic
information is exchanged via routing protocols like the OSPF (Open Shortest
Nokia Networks Oy
57 (99)
Protocols in MSS/MGW
Path First), the RIP (Routing Information Protocol), the IGRP (Interior Gateway
Routing Protocol) and the BGP (Border Gateway Protocol).
In real life it is impossible and impractical to know the route to every IPnetwork in the world, so the routers and the hosts use a default gateway or
default route. If more accurate information is not known of a destination IPnetwork, then the packet will be sent to the default gateway. The default
gateway/default route is typically marked with the address 0.0.0.0 / mask
0.0.0.0 -notation. A typical routing table for Router 1 is shown below.
Destination
192.168.0.0
192.168.1.0
192.168.2.0
0.0.0.0
Mask
255.255.255.0
255.255.255.0
255.255.255.0
0.0.0.0
192.168.0.1/24
192.168.2.3/24
192.168.0.0/24
Router 2
192.168.0.5
192.168.1.5
Router 1
Ethernet 0
192.168.2.0/24
Next hop
Interface
Ethernet 0
Ethernet 1
Ethernet 0
Ethernet 1
Ethernet 1
192.168.1.1/24
192.168.1.0/24
192.168.0.5/24
192.168.1.5/24
192.168.0.7/24
Internet
Figure 36.
Router 3
58 (99)
Nokia Networks Oy
Protocols
14.1.7
Transport protocols
Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and
SCTP are all layer-4 transport protocols. They are used to help in the end-to-end
transport of data over IP networks.
Appli cation
Appli cation
Communication
virtual connection
TCP/UDP
TCP/UDP/
SCTP
SCTP
Router
IP
Router
Relay
IP
IP
Relay
IP
IP
IP
L2
L2
L2
L2
L2
L2
L1
L1
L1
L1
L1
L1
Router
Figure 37.
Router
Both TCP and UDP can help, for example, in segmenting user data to variablelength IP packets and adding a sequence number to each packet. From the
sequence number the receiver knows how to reassemble the user data even if
the actual IP packets arrive in different order to that transmitted.
correct loss or corruption of data.
FTP (Data)
H.248
(Data)
Ethernet IP
IP SCTP
TCP H.248
FTP (Data)
Ethernet
(Data)
Packet 1.
Figure 38.
Ethernet IP
IP TCP
Ethernet
SCTP
FTP (Data)
H.248
(Data)
Packet 2.
IP data flow
TCP
59 (99)
Protocols in MSS/MGW
UDP
The User Datagram Protocol is used to provide fast data transfer between two
IP endpoints. Data corruption can be checked with the use of checksum, but this
is optional. This protocol is used instead of TCP when speed is more important
than reliability, and/or upper or lower layer protocols already support reliable
data transfer functionality.
SCTP
SCTP is a reliable transport protocol operating on top of a potentially unreliable
connectionless packet service such as IP. It offers acknowledged error-free nonduplicated transfer of datagrams (messages). Detection of data corruption, loss
of data and duplication of data is achieved by using checksums and sequence
numbers. A selective retransmission mechanism is applied to correct loss or
corruption of data.
The main difference to TCP is multi-homing and the concept of several streams
within a connection. Where in TCP a stream is referred to as a sequence of
bytes, an SCTP stream represents a sequence of messages.
SCTP can be used as the transport protocol for applications where monitoring
and detection of loss of session is required. For such applications, the SCTP
path/session failure detection mechanisms, especially the heartbeat, will actively
monitor the connectivity of the session.
14.1.8
Application protocols
There is a wide range of application layer protocols. Some of them are listed in
this section.
Telnet
This application layer protocol is used for providing virtual terminal (VT)
sessions between IP capable equipment.
HTTP
File Transfer Protocol is an application layer protocol used for file transfers.
60 (99)
Nokia Networks Oy
Protocols
ICMP
14.2
O&M traffic
O&M traffic:
O&M traffic exists in every network element. The O&M traffic is IPv4 based,
and private IP addresses can be used for the O&M related units. O&M traffic
may also include charging and statistics related information, even though
charging traffic, for example, can be separated from O&M. The O&M units are
mainly OMUs and NEMUs, but there can also be CHUs and STUs.
Control plane traffic:
Nokia Networks Oy
61 (99)
Protocols in MSS/MGW
public addresses are used. Examples of control plane units are the ISU in the
MGW, and the CCSU/SIGU in the MSS.
User plane traffic:
The user plane is used for carrying the actual user data. IP addresses must be
configured in TCUs and IP NIU.
Note: The decision of whether to use private or public addresses depends on the
site and backbone solution. If there are no external connections from the
backbone, all addresses can be private.
Additionally, there are OMU, STU, CHU (2N) and BDCU (N+1)
computer units that need an IP address.
62 (99)
Nokia Networks Oy
Protocols
In a Multimedia Gateway, units that require IP addresses are TCUs, ISUs, IPNIU pairs, OMUs, the NEMU and LAN switches. Each TCU has four
Transcoder Processor Groups which all need separate addresses.
In total, the number of IP addresses needed for an MGW is:
In a Circuit Switched Data Server, IP addresses are required for GSU (N+1),
OMU (2N) and LAN switches. In cases when the GSU units are communicating
with MGW, they can also have IPv6 addresses.
* For more details on IP connectivity refer to the Appendix of this module
and to Nokia Site connectivity documents and courses.
14.3
14.3.1
Unit type
The type of computer unit in which you want to configure a network interface.
The program provides a list of computer units for you to choose from. This
parameter is obligatory.
Unit group
The unit group number of the computer unit in which you want to configure a
network interface. The maximum value of the parameter is determined by the
number of computer unit groups (or stages). This parameter is asked for only
when it is needed, in which case it is obligatory.
Unit index
The index of the computer unit in which you want to configure a network
interface. The maximum value of this parameter is determined by the number of
units. This parameter is obligatory if you want to assign a physical IP address to
Nokia Networks Oy
63 (99)
Protocols in MSS/MGW
The name of the network interface that you want to configure. The name is from
3 to 8 characters long and must start with 'AA' (external ATM point to point
interface), 'AI' (internal ATM point to point interface), 'EL' (Ethernet interface
in DMX units), 'IFETH' and 'IFFGE' (Etherent interfaces in Chorus units), 'PPP'
(POS interface in IP-NIU units) or 'LO' (Loopback interface). You can use &&
mark to specify a group of interfaces to be configured. This parameter is
obligatory.
IP address
IP address for the network interface or for the interface pair of 2N redundant
unit. The address is specified in conventional dot notation (#.#.#.#).
The range of parameters for each part of the address is from zero to 255. If you
give several computer units with && mark, then the IP address you give is the
one to start with. It is assigned to the first unit you gave. The next IP address is
created by incrementing the previous address.
IP address type
netmask length
The length of the numerical part of the IP address (in bits). The value you enter
for this parameter must be a whole number between 4 and 30. The default
length of the netmask is determined by the IP address: 8 for class A address, 16
for class B address, and 24 for class C address.
The IP address of point-to-point link. Check that the interface really is point-topoint type with MML command.
MTU
The maximum transmittable size of a single, complete IP data unit. You can
only give MTU for some interfaces. For Ethernet interfaces the default MTU is
1500, for IP over ATM interfaces it is 9180.
State
64 (99)
Nokia Networks Oy
Protocols
14.4
14.4.1
For the integrated MSS control LAN topology with duplicated multilayer LAN
switch / edge routers (OSR) and duplicated DNS servers there are several
alternative control cabinet configurations:
Each cabinet has a redundant ESB20/ESB26 pair for the control LAN. Each
signalling unit is connected to the ESB20/ESB26 pair of the same cabinet.
In the maximum configuration, the control LAN reserves 2 x 4 x 10/100Base-T
Ethernet ports in the OSR7609. If one OSR is used, redundant ESB20/ESB26
LAN switches are connected to different Ethernet line cards in the OSR. In twoOSR configurations the redundant ESB20 LAN switches are connected to
different OSRs.
If a redundant DNS pair is used on the site, both DNS units reserve 2 ports from
each OSR7609, or 2 ports from two different Ethernet line cards in one OSR
configuration. The other port is used for DNS queries and the other one is for
O&M. The same DNS is used for the MSS, GCS, CDS and MGW.
Standalone MSS control LAN
The following figure presents the standalone MSS control LAN topology with
duplicated OSRs and DNS servers:
Nokia Networks Oy
65 (99)
Protocols in MSS/MGW
Each cabinet has a redundant ESB20/ESB26 pair for the control LAN.
In the minimum configuration there is only IPCF and one IPCG0 cabinet,
whereas IPCG1, IPCG2 and IPCH cabinets are optional.
In the maximum configuration the control LAN reserves 2 x 5 x 10/100Base-T
Ethernet ports in an OSR7609. If one OSR is used, redundant ESB20 are
connected to different Ethernet line cards in the OSR. In two-OSR
configurations the redundant ESB20 are connected to different OSRs.
If a redundant DNS pair is used on the site, the both DNS units reserve 2 ports
from each OSR7609, or 2 ports from two different Ethernet line cards in a oneOSR-configuration. One port is used for DNS queries and the other is for O&M.
The same DNS is used for the MSS, GCS, CDS and MGW. See Domain name
system in MSC Server system for more information about the recommended
DNS solutions.
14.4.2
O&M VLAN
Charging VLAN
BDCU VLAN
In the integrated MSC Server the radio network control traffic can be separated
into its own VLANs on a per port basis in the ESB20.
If necessary, some of the control plane signallings can be separated in the OSR
with help of the access lists. This separation can be done on the basis of an IP
address, TCP/UDP port number or protocol (SCTP, TCP, UDP).
66 (99)
Nokia Networks Oy
Protocols
If the core network control plane signallings are the only user of the DNS
services, the DNS can be included in the control VLAN.
The following figure presents an example of traffic separation in MSS by using
virtual LANs:
The VLAN access lists (VACL) on the OSR are configured so that they apply
to all packets that are either routed into or out of a VLAN, or are bridged within
a VLAN.
The VACLs are only restricted for security packet filtering and redirecting
traffic to specific physical switch ports in OSR. The configuration principles are
as follows:
The MSS/GCS control VLAN packets are either bridged or routed to the
GCS and MGW control VLANs
The charging VLAN packets are either routed to the Charging Gateway
(CG) or customer care and billing centre (CCBS)
The BDCU VLAN packets are routed to the short message service centre
(SMSC) or to the NetAct" Traffica
If charging traffic is separated into its own VLAN in the O&M LAN, a VLAN
trunk has to be defined between the ESB20 and the OSR, since both the
charging and O&M VLANs are using the same physical interface.
Nokia Networks Oy
67 (99)
Protocols in MSS/MGW
14.5
14.5.1
Each computer unit having a LAN interface (BDCU, BSU, CCSU, CHU, OMU,
SIGU, STU) has two functionally independent LAN interfaces. Thus each
computer unit has two separate connections to the LAN infrastructure. At any
given time, only one of the interfaces is used to carry traffic whereas the other
one is idle. Each computer unit independently makes the decision on which of
the two interfaces is active and which one is idle. The CPU LAN interfaces are
connected to different ESB20 switches. Thus, when selecting the LAN interface
the CPU simultaneously selects the ESB20 LAN switch, which it uses.
So, if the LAN cable or the LAN port in the CPU or ESB20 fails, the CPU can
perform switchover to the other interface and, at the same time, to the other
ESB20. During the switchover the IP address is retained and then the new MAC
address is advertised using a gratuitous ARP message with IPv4, and Neighbour
Discovery protocol with IPv6, after the interface switchover.
The physical layer supervision of the LAN interfaces in the CPU can only
detect failures in the link between the CPU and the ESB. Therefore the CPU
cannot make an interface changeover in cases when the link between ESB and
OSR fails. For this reason the redundant ESB20 pair can be interconnected in
order to supply a backup route to the OSR via the other ESB20. This
interconnection can be removed later if the CPU software is updated with higher
layer supervision, which can detect link failure behind an ESB.
68 (99)
Nokia Networks Oy
Protocols
15
RTP/RTCP
H.248
SIGTRAN
IP connection also adds the routing functionality to MGW Rel.4. The routing
functionality can be used for routing user plane (RTP), H.248 and SIGTRAN to
core network routers.
As regards the benefits, the IP backbone, connectivity provides the following:
Functionality
Nokia Networks Oy
69 (99)
Protocols in MSS/MGW
When Ethernet connections are used for transporting IP traffic, the Address
Resolution Protocol (ARP) is used for IP address mapping. As regards routing,
MGW supports both IPv4 and IPv6 routing. Routing in both IPv4 and IPv6 is
based on static routing.
15.1
Ethernet
The traffic types listed above are connected from different types of IP-NIU
units. All units are configured using MML commands, but the configuration
parameters and values differ. Ethernet connections cannot be configured via
IP4S1 units.
One IP4S1 in the MGW has four STM-1 ports with VC3/VC4 mapping offering
an interface speed of 155 Mbit/s each. Note that at the moment VC3 can only be
used for IPoA, but not for POS.
Selection of the used interface is based on available backbone devices. Ethernet
connections are commonly connected to an OSR, and IPoA connections to an
MGX.
Cisco MGX switch is used as an example of an ATM switch. Cisco OSR LAN
switch / IP router is used as an example for providing the local IP connectivity.
POS connections can be connected to an OSR or an MGX.
The values of the parameters can be modified, but it is recommended that the
default values for the OSR, for example, are used.
Ethernet interface
Gigabit Ethernet
Gigabit Ethernet interface from MGW for MSS (3GPP Rel-4) is possible with
IPGE/O type of IP-NIU.
The IP configuration is made using MML commands as described earlier in IP
address and stack configuration for IPv4 and IPv6 .
The Gigabit Ethernet interface is mainly used for user plane traffic and it is
connected directly to an OSR. With Gigabit Ethernet two types of physical
interfaces are possible: optical IPGO and electrical IPGE. The interfaces are of
the type 1000 Base-T, RJ-45 category 5, or 1000 Base-LX/LH SMF, LC
connector, MTU default 1500, No VLAN support, Encapsulation according
IEEE 802.3, Dual Stack.
70 (99)
Nokia Networks Oy
Protocols
100 Megabit Ethernet interfaces can be used in two ways: there can either be
separate IP-NIU with 100Mb interfaces or internal LAN switches with 100Mb
uplinks. In case of IP-NIUs, IPFE is used. An IPFE has eight interfaces to be
used for control plane and user plane traffic.
The IPFE units are of the type 100 Base-TX, RJ-45 category 5. The rest of the
configuration parameters are the same as with the Gigabit Ethernet interface
above.
Integrated LAN switches are used when control plane traffic is taken from the
ISU-units. These LAN switches are also used for O&M traffic. The ESA12
units used for integrated ESA 12 LAN switches are 12-port 10/ 100BaseT full
duplex Ethernet switches that comply with the IEEE standards 802.3, 802.1D,
802.3X, 802.1q and 802.1p.
Their functions include full/half duplex selection, auto negotiation
(enable/disable), back pressure support in HDX mode and flow control in FDX
mode. One or two trunks can be defined (1 - 6 ports per trunk).
IP over ATM interface (IPoA)
The MGW must support some suitable connection to the operators' existing
ATM networks. The uplink traffic from the MGW is connected to the MGX
using STM-1 link(s). The IPoA functionality connects the MGW's internal units
to the external devices via IP over ATM.
Packet over SDH/SONET interface (POS)
The Packet over SDH interface of the MGW is used for transmitting user plane
traffic to an IP backbone but can also be used for transmitting signalling
protocols
(RANAP, BSSAP) and Media Control Protocol (H.248) between a MGW and a
MSC Server. The IP over SDH/SONET requires some point-to-point link layer
protocol between IP and SDH, and the point-to-point protocol (PPP) is specified
for that.
The MGW can open PPP links for example to another MGW (over the Nb
interface) and to a core network router.
The PPP over SDH/SONET uses a high-level data link control protocol
(HDLC) such as standard framing.
Packet over SDH/SONET interface is a standard interface based on RFC2615
and RFC2472 (IPv6) specifications.
15.1.1
SDH exchange
This parameter identifies the SDH exchange terminal with a unique Numeric
Nokia Networks Oy
71 (99)
Protocols in MSS/MGW
This parameter identifies the numeric value of the SES (Severely Errored
Second) BIP (Bit Interleaved Parity check) threshold in the SDH interface.
This parameter is optional and the value can range from 1 to 8000 SDH
frames per second.
SD BER threshold
This parameter identifies the numeric value of the SD (Signal Degrade) BER
(Bit Errors Ratio) threshold in the SDH interface.
SF BER threshold
This parameter identifies the numeric value of the SF (Signal Fail) BER (Bit
Errors Ratio) threshold in the SDH interface.
diagnostic
This parameter identifies the status of the diagnostic loopback and is used for
testing purposes. It can be used for testing internal connections.
line loopback
This parameter identifies the status of the line loopback and is used for testing
purposes.
laser status
This parameter is used to switch the laser power on or off. The Off option can
be used for testing purposes, or to take SET out of use.
VC mapping
This parameter specifies the Virtual Container mapping on the SDH interface.
This parameter can have the following values:
VC3 = VC-3 mapping for STM-0 or 3xVC-3 mapping for STM-1
VC4 = VC-4 mapping for STM-1
SDH protocol
The parameter specifies which SDH protocol is used in the SDH interface.
This parameter can have the following values:
ITU = SDH standardised by ITU
ATMML = SDH specified by NTT ATM Mega Link Service
Physical layer configuration also includes configuring SDH protection group
and defining Physical Layer Trail Termination Point configuration. These are
configured using different MMLs.
Configuring Layer 2
For IPoA, you need to configure the following parameters (LCC/SNAP or VCMux):
interface ID
This parameter identifies the ATM interface with a unique numerical value. The
value can range from 1 to 320. As a default a free ID is selected by the system.
interface type
This parameter describes the type of the ATM interface. The parameter can
have the following values:
UNI = User-Network Interface is interface between the terminal equipment and
a network termination where the access protocols apply.
NNI = Network-Node Interface is the interface at a network node which is used
to interconnect with another network node. The parameter is obligatory.
PhyTTP
This parameter identifies the physical resource that the interface is based on. It
72 (99)
Nokia Networks Oy
Protocols
This parameter describes the administrative state of the ATM interface. The
parameter can have the following values:
Locked = The resource is administratively prohibited from performing services
for its users.
Unlocked = The resource is administratively permitted to perform services for
its users. The default value is unlocked.
For POS, you need to configure the following parameters (Point-to-point protocol (PPP)
configuration):
unit type
This parameter identifies the computer unit type. There are two possible values:
IPS1 and IPSP.
unit index
This parameter identifies the unit index for the computer unit. For IPS1, the
range of unit index is from 0 to 3.
The physical trail layer termination point parameter identifies a phyTTP with a
unique numerical value. It can range from 1 to 320. This parameter is unique
within the network element.
network interface
This interface parameter identifies a network interface with a unique name. The
value of the parameter is PPPxx, where xx is a decimal number from 0 to 99.
This parameter is unique within the network element.
supervision interval
This parameter defines the supervision interval of the PPP link. If set to 0
supervision is not used. It can range from 0 to 3600 seconds. Default value is 10
seconds.
maximum receive
This parameter indicates the packet size that the peer can handle. It can range
from 128 to 16384 bytes. Default value is 1500 bytes.
PPP interface
This parameter identifies the management state of the PPP interface. Allowed
values are UP and DOWN (default).
15.2
73 (99)
Protocols in MSS/MGW
Media over the IP backbone is transferred using the real time protocol (RTP).
RTP provides end-to-end delivery services for data with real-time
characteristics, such as interactive audio. These services include payload type
identification, sequence numbering, time stamping and delivery monitoring.
This makes RTP an ideal protocol for real-time applications such as voice over
IP (VoIP).
The network interface unit in the Nokia Multimedia Gateway provides the
following options for transmitting media over IP:
By default, both signalling (containing SIGTRAN traffic and H.248 traffic) and
user traffic are routed via the IP-NIU unit using either fast Ethernet (FE) or 1G
interfaces.
If FE interfaces are used, Multimedia Gateway provides the possibility of
assigning separate physical interfaces for signalling traffic and user plane
traffic. This is to provide better security for signalling against external attacks.
If 1G interface is used for the user plane, then there is no possibility to isolate
signalling traffic into a separate physical Ethernet interface via IP-NIU. In such
cases, the signalling can be routed directly from ISU units to layer 2 switches
located at the Multimedia Gateway cabinet, and from those switches then onto
the router and MSC Server or gateway control server.
New hardware in Nokia MGW
All hardware units from the U1.5 release are applicable as such in the same
network element. They can be utilised in another network element, as well.
The following new hardware items are provided:
74 (99)
Interface unit IP-NIU for IP user plane connectivity. If IP interface for the
user plane is not needed, then this unit is not needed.
Nokia Networks Oy
Protocols
15.2.1
Ethernet (1Gbit/s)
When Ethernet connections are used for transporting IP traffic, the Address
Resolution Protocol (ARP) is required for IP address mapping.
As regards routing, IP backbone must either support IPv4 or IPv6 routing. This
is because routing daemons implement different routing protocols for IPv4 and
IPv6 (IPv4 and IPv6 must also be given separate routing tables). Routing in
both IPv4 and IPv6 is based on static routing.
Nokia Networks Oy
75 (99)
Protocols in MSS/MGW
16
Physical interface
Functional unit
Physical unit
Gigabit Ethernet
IPGE (electr.)
IPFGE
IPGEP (electr.)
IPGO (optic.)
IPGOP (optic)
Fast Ethernet
IPFE
IPFGE
IPFEP
The key factor determining which IP backbone solution will be used is whether
the operator wants to separate the control plane traffic from the user plane
traffic.
In an IP backbone RTP and RTCP protocols are used. In each sent RTP packet,
there is 5 ms or 20 ms of coded voice as a payload, depending on the used
interface and codec. This means that 400 or 100 RTP packets with voice as
payload are sent per each RTP session (call with 2 participants) every second,
respectively. In the Nb interface with G.711 codec, the RTP packet contains 5
ms of voice. In the Multi- Access VoIP interfaces and Nb interface with some
other codec than G.711 (for example, UMTS AMR), the RTP packet contains
20 ms of voice. Every 5 seconds, two RTCP packets (one for each way) are sent
per active session for control purposes.
76 (99)
Nokia Networks Oy
Protocols
If the operator decides to use control plane isolation (for security or capacity
reasons), there are two options, which enable the encryption of the control plane
traffic with a separate device.
1.
When the Gigabit Ethernet physical interface is used for the user plane
traffic, IP-NIU (IPGE/IPGO) cannot be used to separate the control plane
traffic from the user plane traffic. However, it is still possible to isolate
control plane traffic by routing it directly from the ISU units into ESA12
(L2 switch). The new signalling unit CCP10 provides redundant LAN
interface for this purpose. The figure below illustrates the ESA12
solution.
Figure 44 IP backbone with Gigabit Ethernet (control plane and user plane
separated)
Nokia Networks Oy
77 (99)
Protocols in MSS/MGW
2.
When the Fast Ethernet physical interface is used, IP-NIU can be used to
separate the control plane traffic from the user plane traffic. The 2N
redundant IP-NIU has 8 Fast Ethernet interfaces, of which one or several
interfaces can be exclusively dedicated to the control plane, thus
providing a separate LAN for control plane traffic. The remaining
interfaces can be dedicated to user plane traffic.
Note
The Nb interface can be created using ATM backbone, IP backbone or TDM
backbone. However, it is also possible to utilise more than one backbone
solution simultaneously.
16.1.1
Configure the IP stack of the TPG units in TCU. Assign physical IP address for
the IP interface AI0 of the TPG units and give the IP address of the IFETH0
interface of the IP-NIU as the destination IP address. Then create the default
static route between the TPG units and the IP-NIU.
2.
Note
Before attempting to configure an IP address to the interface, the external
Ethernet cables should be attached to a router unit. If there is failure to the
connection, it will cause a 2-star recovery initiating alarm on the IPFGE unit.
78 (99)
Nokia Networks Oy
Protocols
Configure the same logical IP address for the ATM interfaces of IPFEP. Note
that you do not need to specify the destination address, because Inverse ATM
Address Resolution Protocol (InATMARP) is used in the IP over ATM
interfaces between TPG and IPFEP.
2. ZQRN:IPFEP,0:AI0&&AI7,U:192.160.1.5;
Note
The external IP interface addresses must be configured in different subnets.
Configure physical IP addresses for the ATM interfaces of TPG units. The
destination IP address is the logical IP address of IPFEP.
3. ZQRN:TPG,0&&7:AI0:196.160.2.1,P,::192.160.1.5;
Create the default routes from TPG units to the IPFEP unit.
4. ZQKC:TPG,0&&7::192.160.1.5;
Nokia Networks Oy
79 (99)
Protocols in MSS/MGW
80 (99)
Nokia Networks Oy
Protocols
17
17.1
Nokia Networks Oy
81 (99)
Protocols in MSS/MGW
18
SIGTRAN
Signaling Transport SIGTRAN is a Working Group in IETF, primary purpose
of this working group is to address the transport of packet-based PSTN
signaling over IP Networks, taking into account functional and performance
requirements of the PSTN signaling. SIGTRAN defines a framework how
different existing signalling protocols can be transferred over IP, like Q.921
(PBX) , ISUP and SCCP.
IETF has standardized various ways for adapting SS7 signalling messages on
the IP network. They include M3UA (SS7 MTP3-User Adaptation Layer) and
SUA (SS7 SCCP-User Adaptation Layer). Nokia implements the MTP layer 3
of the M3UA adaptation with feature 50035 and SCTP ((Stream Control
Transmission Protocol) protocol used for adapting SS7 messages to the IP
connections by the feature 50037.
Figure 46
MAP
TCAP
MAP
SCCP
TCAP
M3UA
SUA
SCTP
SCTP
IP
IP
Nokia Networks Oy
Protocols
Addressing based
on SPCs!
DX200
Signalling point A
Signalling point B
Association Set (up to 16 associations)
MSC (Server)
SCTP Association
CCSU_0
HLR (Client)
CCSU_0
IP
CCSU_1
CCSU_2
CCSU_1
CCSU_2
CM
CM
SPC_1
IP Addresses
SPC_2
Figure 47 Associations
18.1
Nokia Networks Oy
83 (99)
Protocols in MSS/MGW
19
Overview H.248
Megaco is a new protocol developed by IETF Megaco Working Group together
with ITU-T Study Group 16 to be the standard for physically decomposed
multimedia gateway structures. References for Megaco are available in RFC
2805 (requirements) and RFC 3015, which have been replaced by RFC3525 in
June, 2003. The protocol is specified by IETF as Megaco and by ITU-T as
H.248, the latest one is H.248.1, version 2, in May, 2002.
Megaco addresses the relationship between Media Gateways (MG) and Media
Gateway Controllers (MGC). (See Figure1) This relationship has a master/slave
structure, where masters are MGCs and slave devices are MGs, which execute
commands sent by master devices.
Megaco is a one to one protocol, where each MG is controlled by only one
MGC.
Media Gateway (MG): The media gateway converts media provided in one type
of network to the format required in another type of network. For example, a
MG could terminate bearer channels from a switched circuit network and media
streams from a packet network.
Media Gateway Controller (MGC): Controls the parts of the call state that
pertain to connection control for media channels in a MG.
19.1
H.248
Megaco/H.248 addresses the relationship between the Media Gateway, which
converts circuit-switched voice to packet-based traffic, and the Media Gateway
Controller which dictates the service logic of that traffic. Megaco/H.248
instructs a MGW to connect streams coming from outside a packet or cell data
network onto a packet or cell stream such as the Real-Time Transport Protocol
(RTP).
There are two basic components in Megaco/H.248: terminations and contexts.
Terminations represent streams entering or leaving the MGW (for example,
analogue telephone lines, RTP streams, or MP3 streams). Terminations have
properties, such as the maximum size of a jitter buffer, which can be inspected
and modified by the MSS.
Terminations may be placed into contexts, which are defined as when two or
more termination streams are mixed and connected together. Contexts are
created and released by the MGW under command of the MSS. A context is
created by adding the first termination, and it is released by removing
(subtracting) the last termination.
A termination may have more than one stream, and therefore a context may be a
multi-stream context. Audio, video, and data streams may exist in a context
among several terminations
For transport of the protocol over IP, MSS and MGW shall implement both
TCP and UDP. For pure IP connections, H.248/SCTP/IP should be used. The
MGW is provisioned with a name or address (such as DNS name or IP address)
84 (99)
Nokia Networks Oy
Protocols
of a primary and zero or more secondary MSS that is the address the MGW uses
to send messages to the MSS.
Protocol stack
MGW
H.248
context C
Ta
terminations
User data
Tb
SCTP
TCP
IPv4 or IPv6
L1
User data
Figure 48 H.248
19.1.1
Message structure
Megaco commands sent to the media gateway are grouped into an entity called
transaction. A transaction on the other hand contains actions, and actions
contain a list of commands. Each action applies only to one context. The reason
to have transactions is that transactions guarantee ordered command processing.
All commands within the same actions will be executed sequentially in the
order described in the transaction. Transaction on the other hand can be
executed in any order. Several transactions can be later concatenated into a
message. Such transactions remain independent though and no order is implied
by such a concatenation. A message is essentially a transport mechanism
19.2
BICC
The Bearer Independent Call Control Protocol (BICC, ITU-T Q.1902) is a call
control protocol designed to be able to transport call control signalling
information, independent of the used bearer technology and signalling message
transport technology. BICC accomplishes this by defining a set of procedures
separately for call control signalling and bearer control signalling. The actual
call control level signalling uses BICC, which is based on ISUP, and allows
different protocols, such as AAL2 signalling, to be used for bearer control
signalling. Signalling message transport independence means that BICC
signalling can be transported over several different signalling transports such as
MTP3, SSCOPMCE or SIGTRAN. Bearer independence means that the actual
used media can thus be ATM, IP/Ethernet or something else. Since BICC is
based on ISUP it provides natural interworking with ISUP and BICC networks
and allows the existing supplementary services to be used without
modifications.
The BICC protocol is an adaptation of the ISUP protocol definition, but it is not
peer-to-peer compatible with ISUP (see ITU-T Q.1912.1).
Nokia Networks Oy
85 (99)
Protocols in MSS/MGW
In the MSS concept the User Plane (bearer) and the Control Plane (signalling
and call control) have been separated. There is a new Network Element (NE),
Media Gateway (MGW), which takes care of the User Plane and the MSS
controls it. MGW is the based on ATM HW and IPA2800 platform. It brings
new media and functions which must be taken into account in call control
signalling. For that reason Bearer Association Transport Application Service
Element/Application Transport Mechanism (APM/BAT ASE) has been
introduced in BICC. Its main task is to transfer the bearer-specific information
between the two MSSs on a Control Plane level.
Nokia implements BICC with feature 1330. This feature implements the BICC
CS2 signalling through the IP network between the two MSSs according to
ITU-T Draft Recommendations Q.1902.X /1/, /2/, /3/, /4/ specifications. This
includes the following:
The vertical interface MGW-MSS (Mc in 3GPP) uses H.248 to convey the
bearer-related information. The needed bearer-information is transferred
between MSSs in BICC through APM-mechanism.
MSC Server
MSC Server
IAM
Bearer cntr
Bearer cntr
MGW address
MGW
MGW
86 (99)
Backward setup
Nokia Networks Oy
Protocols
Origination node always selects the bearer establishment method as well as used
bearer network connection characteristics
19.3
MSC Server
MSC Server
BSSAP RANAP
BSSAP
BSC
MTP
MTP
RNC
ISUP
BICC
M3UA
SCTP
IP
H.248
M3UA
SCTP
IP
SCCP
MTP3b
H.248
M3UA
SCTP
IP
SCCP
SCCP
RANAP
BICC
SCCP
M3UA
SCTP
IP
Backbone
MGW
MTP3b
AAL5
AAL5
ATM
ATM
Phy
Phy
MTP
MGW
MGW
PSTN
Nokia Networks Oy
87 (99)
Protocols in MSS/MGW
20
MSCi
MSS
TDM based
Backbone & PSTN
H.248/Megaco
Sigtran
A'
Packet based
Backbone (IP/ATM)
& TDM based PSTN
A & IuIu-CS
Iu-CS
Rel99
Rel 4
Figure 51
88 (99)
Nokia Networks Oy
Protocols in MSS/MGW
20.1
MSS B
A Circuit Group is related to
incoming traffic. A PUPD indicates
Preceding User Plane
Destination(PUPD)
MSS A
A route is related to outgoing
traffic. A SUPDR indicates
Succeeding User Plane
Destination(SUPD)
Topology database
UPD:s
Interconnections
MSS A
MSS B
ROUTE
BSC
GSM
BSC
BICC CGR
A
Mc
Mc
A
RNC
RNC
WCDMA
Iu-CS
MGW
IP/ATM
Backbone
UPD 10
90 (99)
Nokia Networks Oy
MGW
Iu-CS
The user plane routing and analysis consists of several entities connecting user
plane and control plane. The ultimate purpose of user plane routing and analysis
is to select MGWs and route user plane traffic.
The Multimedia Gateway (MGW) database is a common storage place in the
MSC Server (MSS) for MGW-specific parameters that are used for user plane
routing purposes. The user plane topology database contains user plane
topology information. The user plane control application uses topology data to
route the user plane to the proper destination.
A User Plane Destination (UPD) defines one or several MGWs controlled by
one MSS. In a UPD the MGWs share the same kind of interconnection type.
In the MSS routes are related to Succeeding User Plane References (SUPDR)
and BICC/SIP circuit groups to Preceding User Plane Destination References.
This creates a logical chain where analysis can be used to determine a route for
an outgoing call; this will lead to a SUPDR, which in turn is related to SUPD
ultimately leading to MGW selection. The same kind of logical chain can be
described for incoming calls where the analysis determines a circuit group,
which is related to PUPDR, which leads to a PUPD finally resulting in MGW
selection.
20.2
20.2.1
Phases
The different phase of User Plane Analysis have relationship to each other. The
result of an analysis can be the input parameter for the next phase. All phases
are not executed for each call case. The analysis chain is variable depending on
the call setup case.
Nokia Networks Oy
91 (99)
Protocols in MSS/MGW
3. CMN determination
6. Inter-Connecting BNC
Characteristics determination
Figure 53
Outgoing Signaling
Incoming Signaling
UE
MS
TRUNK
BICC
SIP
UE
6*
6*
6*
2,4,5,6*
2,4,6*
MS
6*
6*
6*
2,4,5,6*
2,4,6*
TRUNK
6*
6*
6*
2,4,5,6*
2,4,6*
BICC
1,6*
1,6*
1,6*
1,2,3,4,5,6*
1,2,4,6*
SIP
1,6*
1,6*
1,6*
1,2,4,5,6*
1,2,3,4,6*
92 (99)
Nokia Networks Oy
Nokia Networks Oy
93 (99)
Protocols in MSS/MGW
94 (99)
Nokia Networks Oy
21
21.1
In cases where the units are communicating with MGW, they can also have
IPv6 addresses.
Nokia Networks Oy
95 (99)
Protocols in MSS/MGW
96 (99)
Nokia Networks Oy
In a Multimedia Gateway, units that require IP addresses are TCUs, ISUs, IPNIU pairs, OMUs, the NEMU and LAN switches. Each TCU has four PQ2
processors which all need separate addresses.
In total, the number of IP addresses needed for an MGW is:
In a Circuit Switched Data Server, IP addresses are required for 3 x GSU (N+1),
1 +1 OMU (2N) and LAN switches. In cases when the GSU units are
communicating with MGW, they can also have IPv6 addresses.
In total, the number of IP addresses needed for a CDS is:
The table below sums up the number of IP addresses required for each MSC
Server system element. Allocation of these addresses into their own subnets and
VLANs is described in the next chapter Subnetworking principles in MSC
server.
Nokia Networks Oy
97 (99)
Protocols in MSS/MGW
Note
The numbers given in this table are indicative whereas the actual address
allocation should always be based on the latest information about the number of
units in each network element. The latest details can be checked from the
network element engineering descriptions, which are included in network
element specific documentation.
21.2
VLAN10
10.10.0.0/23
Control Plane Ipv4 addresses for units that require control plane addresses:
CP Publ
VLAN20
195.148.0/24
Control Plane Ipv4 addresses for units that require control plane addresses:
CP Publ
VLAN20
xxxx:xxxx:::xxx/64
VLAN30
130.12.0.0/22
VLAN30
xxxx:xxxx:::xxx/64
VLAN40
10.10.2.0/25
VLAN1
10.10.2.128/25
VLAN2
10.10.3.0/28
Since the IP-NIU interfaces in the MGW are configured as router interfaces, subnets must be created
between the IP-NIU and the OSR router. A Gigabit Ethernet requires two /29 subnets, and a Fast
Ethernet, sixteen /29 subnets. These subnets also include addresses that are configured in the OSR's
router interfaces. OSR is the multilayer LAN switch/edge router used in the example configurations
for providing in-site connectivity and the WAN interface.
98 (99)
Nokia Networks Oy
Nokia Networks Oy
99 (99)