Professional Documents
Culture Documents
Reference Document
www.mpirical.com
VoLTE End to End Architecture
Reference Document
Mpirical classes have been developed in accordance with the technical specifications
published by the 3GPP. As such the 3GPP have granted Mpirical Limited the right to use the
3GPP logo to identify specifications, compliant products and services.
Contents
Figures
800 LTE
700
600
500
400
VoLTE
300
200
100
5G
0
2009 2010 2011 2012 2013 2014 2015 2016 2017 2019 2019 2020
Figure 2 is a map taken from the GSMA (GSM Association) which highlights
the global distribution of VoLTE (as of mid 2017). Note also that although
South Korea was the first country to support VoLTE interconnect between
service providers, other countries have now followed suit.
Despite the global success of LTE, it is important to remember that the service
control framework behind VoLTE, namely the IMS (IP Multimedia Subsystem),
is not limited to using LTE as the signalling and
media transport network; already, numerous
providers are deploying voice services over Wi-
Fi using the same IMS call control network as
their VoLTE service. Moreover, as 5G begins to
be commercially available, the same IMS call
control network can potentially utilize the IP
based 5G access network.
Voice packets are in the form of RTP (Real time Transport Protocol).
Minimizing delay for voice packets is essential, however it is possible
to drop packets without degrading the call (as long as it is not a
consecutive group of packets). This is due to the fact that an individual
voice packet carries a very small sample (typically 20ms) of actual
voice.
IP Multimedia Subsystem
The IMS provides call control services, in that when a VoLTE subscriber
wishes to make a call, they will send SIP signalling towards the IMS. The IMS
will process this SIP signalling and ultimately ensure the call gets set up
towards the correct recipient.
If the call is from a VoLTE user to a VoLTE user, all of the call control
will be handled by the IMS and call control signalling will be SIP on an
end to end basis.
If the call is from a VoLTE user to a subscriber on legacy voice,
including emergency services support, the IMS will interact with the
legacy voice network, which may involve converting the SIP signalling
into a different call control protocol appropriate to the legacy network.
Before using the VoLTE service, the IMS must also handle the subscriber’s
registration process.
Policy and Charging Control
PCC (Policy and Charging Control) acts as the gateway between the SIP
based session signalling related to the IMS, and the LTE based signalling
which is used to establish bearers.
In order to make or receive a call, SIP signalling must be sent to the IMS via
the LTE network using the Default bearer. In turn, a Dedicated Bearer must
then be established to support the voice packets. The problem is that the LTE
network does not read the SIP signalling; from the perspective of LTE, SIP is
just user data that the LTE network will dutifully transport from the mobile to
the IMS. Therefore, the IMS will take session level information from the SIP
signalling and supply it to the PCC architecture. In turn, PCC will use this
information to ensure the correct resources are established in the LTE
network in order to support the call.
1
GSMA IR.92 – IMS Profile for Voice and SMS
Protocol
Media
IMS Aspects LTE Aspects Stacks and
Aspects
Subsystems
User to
Interconnect
Network Roaming NNI
NNI
Interface
A complete list of all the 3GPP/IETF specifications used to support VoLTE is provided in GSMA
IR.92.
HSS
IP Multimedia
Subsystem
IP Access
CSCF
Network
UE PSTN
Access
independence
Service while Service based on
roaming capabilities
IP Multimedia
Subsystem
Security, privacy
Negotiable QoS and
authentication
Service to
multiple
terminals
2
Rich Communication Suite 6.0 Advanced Communications Services and Client Specification
HSS
TAS
I Cx Cx
S
CSCF CSCF
IS C
Mw
ISC
To P-GW Mw
Mw Mw SCC
SG ATCF
i
P Mw Iq
To PCRF CSCF
ATGw
Rx
To P-GW
Gm C A N Mb
IP-
3
3GPP TS 23.228 - IP Multimedia Subsystem (IMS); Stage 2
the IMS destined for the IMS of a different service provider or alternatively,
towards a compatible SIP network potentially hosted on the Internet.
In addition to SIP, another control plane protocol found in the IMS is Diameter,
which is a AAA protocol found on a number of interfaces in the core network
(as a general rule, HSS interaction and PCC (Policy and Charging Control)
interaction is based on Diameter).
H.248 (also commonly termed MEGACO) is also used as a control protocol in
the IMS but like Diameter, is only encountered on a handful of interfaces; in
Figure 10, the Iq interface is based on H.248.
For service configuration, HTTP (Hypertext Transfer Protocol) is used on the
Ut interface (not shown in Figure 10). The Ut interface is based on XCAP
(XML Configuration Access Protocol), which in turn utilises HTTP.
MSRP (Message Session Relay Protocol) may potentially be encountered in
order to support next generation messaging services.
Finally, DNS (Domain Name System) is a crucial protocol found in any IMS
implementation which supports features such as load balancing across
multiple instances of CSCFs, as well as ENUM (e.164 to SIP URI Mapping).
HTTP
IMS Services Configuration
(XCAP)
H.248
Media Gateway Control
(MEGACO)
DNS
SIP address to Telephone Number Mapping
(ENUM)
User Plane
While SIP will be used as the standardized interface to control service delivery
and service mobility, the application data (eg voice packets in the case of
VoLTE) will be varied. The common factor is the use of IP for transport but
apart from this, the payload of the IP datagram is largely dependent on the
service. For example, VoLTE and ViLTE (Video over LTE) use RTP (Real time
Transport Protocol), whereas an IPTV service could use MPEG (Moving
Picture Experts Group) transport. Messaging services can utilize MSRP and
FTP (File Transfer Protocol) sessions can also be established in order to
transfer files.
The P-CSCF (Proxy Call Session Control Function) is the first SIP signalling
interface between the UE (User Equipment) and the IMS, regardless of
whether the user is on the home network or roaming. In this role it is
responsible for supporting a mobile subscriber’s requests for services
including:
Routing - the P-CSCF must route SIP signalling towards the S-CSCF
(Serving - Call Session Control Function) that the user is registered
with. This may be directly or via an I-CSCF (Interrogating Call Session
Control Function), which would be the case in a roaming scenario.
Likewise, any SIP signalling destined to the IMS subscriber must be
forwarded appropriately by the P-CSCF. Although the P-CSCF will not
change the Request URI in the SIP INVITE, it may add information to
the SIP signalling. This includes information associated with the routing
path of the SIP message, the access network used by the subscriber,
billing information and security information.
Security - the P-CSCF is responsible for establishing two security
associations with the user. These are based on the requirements of
“ipsec-3gpp” with a separate security association being put in place for
both uplink and downlink signalling. In addition, to protect the integrity
of the network, the P-CSCF will append an indication if signalling
messages passed from the user were successfully integrity protected.
It should be noted that security in the IMS is a service provider
specific choice. It is quite possible that the P-CSCF has no
security role, particularly if SBCs (Session Border Controllers) are
used in the network.
PCC Interaction - for VoLTE services, the P-CSCF will support the
Diameter based Rx interface in order to supply session related
information (extracted from SIP signalling) to the PCRF (Policy and
Charging Rules Function).
Interrogating CSCF
The I-CSCF (Interrogating Call Session Control Function) handles signalling
arriving at the edge of the home network’s IMS. The I-CSCF can also format
signalling leaving the IMS which is destined for roaming subscribers. The
functions performed by the I-CSCF include:
However, the actual algorithms and variables are derived from the
same process used within the UMTS AKA (Authentication and Key
Agreement) process.
Registration - in terms of the Registration process, the S-CSCF acts as
the SIP Registrar for users who have been assigned to it through the
initial Registration process. Consequently, address bindings between
the user’s address of record and their contact address will be stored in
a database that can be accessed by the S-CSCF. Subsequent
registrations triggered by refresh timers indicated in the Expires field of
the initial registration confirmation message will also terminate at the
S-CSCF.
Billing and Routing - the S-CSCF is a prime location for the generation
of CDRs, since all SIP signalling associated with a subscriber will pass
through the S-CSCF assigned to them. Likewise, one of the key
functions of the S-CSCF is the routing of SIP signalling to Application
Servers, P-CSCFs or I-CSCFs, depending on the scenario.
ATCF ATCF
ATGw ATGw
Voice Voice Voice
AS
S
CSCF HSS
I
CSCF
IP Multimedia IP Multimedia
Subsystem Subsystem
UE UE
“A” Leg “B” Leg
Media
Topology Hiding
Management
SBC
4
3GPP TS 24.173 - IMS multimedia telephony communication service and supplementary services
The following paragraphs describe in greater detail the various roles a SBC
may be responsible for:
Topology Hiding
Topology hiding is a security function which is applied to signalling traffic
leaving the relative security of the service provider’s network. In essence, SIP
headers can contain a number of fields which can potentially reveal
information about the internal architecture of the service provider’s network,
typically in the form of addressing associated with the subscriber or SIP
proxies in the network. The SBC will remove this addressing information prior
to the SIP signalling being passed to a potentially insecure network. Topology
Hiding is a function of the IBCF (Interconnection Border Control Function) or I-
CSCF within the standard IMS architecture, each of which are logical roles
which the SBC may deployed to conduct.
Media Management
Signalling and resultant media traffic may take different routes through a
network, with media potentially not passing through the service provider’s
network at all. This may be undesirable from a media traffic management
perspective, since the service provider may want to enforce the use of
particular codecs, provide a point for lawful intercept or implement specialized
billing models. As such, media streams can be directed through the SBC to
allow the SBC to provide these media management facilities. This is an
example the SBC adopting the role of an MRF (Multimedia Resource
Function) or ATCF/ATGw.
Interoperability
In terms of signalling and media interoperability between VoIP service
providers, problems can arise for a whole host of reasons. Typically, these
problems are in the form of incompatibility issues such as IPv4 to IPv6
conversion, networks implementing different SIP versions eg IETF vs 3GPP or
even networks employing different signalling protocols altogether eg SIP vs
H.323. The SBC can be used to overcome these interoperability issues.
NAT Traversal
The SIP INVITE is used to establish a VoIP call within a SIP environment. The
INVITE contains IP and Port addressing information which will pass through
NAT unchanged, meaning that the recipient of the INVITE will potentially be
supplied with private, unusable addressing information for the media stream.
The SBC will actively amend SIP signalling with usable IP addressing in order
to overcome this, usually acting as a “man in the middle” for the media
stream.
Access Control and QoS Enforcement
The SBC acts as an ALG (Application Level Gateway) in order to filter
potentially malicious SIP traffic entering the network. As part of this role, traffic
can also be filtered to support access control, which allows the service
provider to determine who is permitted to use the network to establish calls. In
addition, traffic can also be monitored for QoS Enforcement purposes, with
the SBC potentially restricting the number of calls being established, in order
to avoid detrimentally affecting calls already in progress.
Media Encryption
Although media is typically not encrypted across the service provider’s
network, there may be a requirement to encrypt / decrypt media traffic as it
leaves or enters other networks. As such, the SBC can carry out this function,
employing protocols such as SRTP (Secure Real time Transport Protocol),
which in turn employs AES (Advanced Encryption Standard).
SBC Deployment
The term SBC does not belong to any one particular standard, since the SBC
is a non-standardized device whose features are largely dependent on the
manufacturer. An SBC will typically be deployed in one of two scenarios, both
of which involve the SBC being positioned at the border of the service
provider’s network. Figure 20 highlights the two predominant deployment
scenarios; an A-SBC (Access - Session Border Controller) or I-SBC
(Interconnect - Session Border Controller).
A I
SBC SBC
In terms of peering and interconnect, the SBC acts as a focal point for
signalling and potentially media that flows from the service provider’s network
to a peer VoIP service provider. This may be in order to support
interoperability or possibly QoS Enforcement.
Conversely, an SBC deployed in the Access scenario is designed to handle
signalling and media flowing between the VoIP service provider’s network and
an access network such as an Enterprise VoIP network or residential
customers.
In each case, when an SBC is positioned in a service provider’s network, it
usually assumes several logically separate roles within the same box. The
logical roles an SBC may perform is outlined in Figure 21 (this is often termed
“Edge Controlled IMS” due to the fact that the SBC is performing a multitude
of key roles).
Application
Geographic
Services Hub and Spoke 3 rd Party Hosted
Consolidation
Centralization
Geographic Consolidation
Application Services Centralization
Application
Servers
Centralized
Network
I-SBC
Access CSCF Interconnect
Network
P S
CSCF CSCF
National Group
Operations Operations
National A-SBC
Access
Network AS
HSS
I
A-SBC
I-SBC
National A-SBC
Access CSCF Interconnect
Network
P S
CSCF CSCF
National A-SBC
Access
Network
HSS
Service A-SBC
Access AS
Provider A
HSS
I
A-SBC
I-SBC
Service A-SBC
Access CSCF Interconnect
Provider B
P S
CSCF CSCF
Service A-SBC
Access
Provider C
HSS
Physical Consolidation
VoLTE in a Box
HSS
I VoLTE In a Box
CSCF
Access A-SBC I-SBC
S Interconnect
Network CSCF
P AS
CSCF
With this physical consolidation approach, all the IMS and VoLTE functionality
required by the service provider is part of a “one box” solution. This eases
deployment complexity significantly, although for future scalability it is prudent
to ensure the device will interoperate with other IMS elements.
IMS in a Box
AS AS
HSS
I IMS in a Box
CSCF
Access A-SBC I-SBC
Interconnect
Network S
CSCF
P
CSCF
AS
IMS HSS IMS
Network Network
Access A-SBC I-SBC
Edge Edge Interconnect
Network
S
CSCF
P I
CSCF CSCF
PCC Architecture
PCC5 was introduced before VoLTE, largely as a means to have very granular
control of the IP traffic flowing across the service provider’s network. PCC
allows the service provider to implement different service profiles for different
customers, and bill appropriately for the service delivery. For VoLTE, PCC
provides a critical link between the LTE bearer network and the IMS service
control network.
Figure 29 outlines the basic PCC architecture required for VoLTE, including all
nodes and associated interfaces.
5
3GPP TS 23.203 - Policy and charging control architecture
PCEF ISC
SG
S1 i Mw
1 S-GW S5
Gx ISC
Mw
S1 Mw ATCF TAS
-M
ME
PCRF
Mw
-U
S1
P Mw
Rx I
CSCF
CSCF
Mb
eNB Iq
Uu
Cx
Gm ATGw HSS
Mw
ISC
PCEF SG
i
S1
1 S-GW S5 Iq Mw SCC
Gm
27
VoLTE End to End Architecture
Glossary
Contact Us
Tel: +44 (0) 1524 844669
Email: enquiries@mpirical.com
www.mpirical.com