3G Communication Protocols: 4.1 UTRAN Protocol Structure: The Encryption Mechanism Is Built Into Radio
3G Communication Protocols: 4.1 UTRAN Protocol Structure: The Encryption Mechanism Is Built Into Radio
Chapter 4
3G Communication Protocols
4.1 UTRAN Protocol Structure: The encryption mechanism is built into radio
network protocols .The protocols in the RAN in UMTS are divided into three
layers namely physical layer, data link layer and network layer. This division is
according to OSI (Open systems Interconnection) model. Data link layer is further
divided into several sublayers:
• MAC;
• RLC;
• Packet Data Convergence Protocol(PDCP);
• Broadcast/Multicast Control (BMC).
The physical layer and MAC support both user (U)plane and control ( C ) plane
traffic in the same manner. Both the PDCP and BMC only exist in the U-plane
whereas the RLC and layer 3 are divided into U-plane and C-plane.
Network layer is divided into several sublayers. The lowest sublayer RRC
terminates in the UTRAN in the RNC. Higher sublayers terminate in the CN. The
RRC protocol exist in the C-plane. The protocol structure is shown in figure 4.1.
30
Chapter 4 : 3G Communication Protocols
4.2 Physical Layer: Physical layer services convert physical radio channels to
transport channels. Layer 1 services include error detection and correction,
frequency and time synchronization, multiplexing of transport channels,
interleaving, modulation, power control , measurements and execution of soft
handovers. The transport channels are divided into two main categories:
• Common channels- if only one particular UE(User Equipment) needs to be
addressed, inband signalling is used;
• Dedicated channels(DCH)- the whole channel is reserved for one
particular user.
Common channels include the Random Access channel (RACH) for
transmitting short uplink messages (e.g. for initial access),the Forward Access
channel (FACH) for short downlink messages, the Paging Channel(PCH) and the
Broadcast Channel(BCH).
In GSM, encryption is done in the physical layer. As the physical layer
terminates at the BS, an important target for improved security in UMTS was to
move the termination point of encryption further back into the network. For this
reason, encryption is not done in the physical layer in UMTS.
4.3 MAC Layer: The MAC layer converts transport channels into logical
channels, which are characterized by what kind of data are transferred. There
are two kinds of logical channels:
• Traffic channels -for U-plane information
• Control channels-for C-plane information
Logical channels include the broadcast control channel, paging control
channel, common control channel (CCCH), dedicated control channel (DCCH),
common traffic channels and dedicated traffic channels. These logical channels
are mapped into transport channels.
The MAC layer contains the following functions:
• Mapping logical channels into transport channels;
• Choosing an appropriate transport format for each transport channel;
• Identification of an addressed UE in common channels;
• Multiplexing of upper layer PDUs;
31
Chapter 4 : 3G Communication Protocols
4.4 RLC (Radio Link Control) Layer : The RLC layer provides the following
services to upper layers:
• Transparent data transfer-upper layer PDUs are transmitted without any
additional protocol information except possibly segmentation/reassembly
of them
• Unacknowledged data transfer-upper layer PDUs are transmitted without
guarantees of delivery, but with detection of transmission errors;
• Acknowledged data transfer-upper layer PDUs are transmitted with
guaranteed delivery, potential retransmissions are used for error-free
delivery and double transmissions are also detected
• Maintenance of Quality of Service(QoS) as defined by upper layers;
• Notification of irrecoverable errors to upper layers
The most important RLC functions are :segmentation and reassembly of
upper layer PDUs; concatenation of the of the first segment of an RLC SDU with
last segment of the previous RLC SDU into the same RLC PDU .adding padding
bits in case no concatenation is possible; data transfer; error correction; in
sequence delivery of upper layer PDUs, duplicate detection; RLC SQN check ;
protocol error detection and recovery.
32
Chapter 4 : 3G Communication Protocols
33
Chapter 4 : 3G Communication Protocols
34
Chapter 4 : 3G Communication Protocols
4.8.3 Protocol Stack : Figure 4.3 shows the protocol stacks provided by each of
the network elements in a mobile IP implementation.
PR = Frame relay
SVC = Switched virtual circuit
FA = Foreign agent
HA s Home aoent
4.8.4 Security:
• Three levels of authentication and authorization validation are provided
:IS-41 service authorization validation (mandatory), IS-41 authentication
(optional) and mobile HA authentication for mobile IP registration /reply
messages(mandatory)
• Data privacy over the air link can optionally be provided by using RLP
encryption between the mobile and packet switching unit(PSU).RLP
encryption requires the IS-41 authentication feature to be activated.
• Identification inserted in the mobile IP registration request/reply provides
antireply protection for registration messages.
35
Chapter 4: 3G Communication Protocols
4.8.6 Accounting: FA routers or IWFs collect accounting records and send them
to designated accounting servers for storage.
established by the client between itself and an L2TP server. All forward and
reverse traffic is sent through the L2TP tunnel. Voluntary tunneling is client-
initiated tunneling in which the client encapsulates and encrypts the data to be
transmitted right from his laptop. Mobile users initiate voluntary tunneling by
invoking L2TP client software on the laptop, which directly interacts with L2TP
server software on the L2TP network server (LNS) over the mobile IP
connection.
36
Chapter 4 : 3G Communication Protocols
4.8.8 Protocol Stack: Figure 4.5 shows the protocol stacks provided by each
network element in a mobile IP implementation using a voluntary L2TP tunnel.
■UOP/TCR uop/rcr
PPP ppp
IP *1 ICMP *-* IP IP
ICMP
ppp s s
E U
s
E U u
T B B
X7
T 8
H H N N N
RLP E E E E E
RL? AL AL R R T T T |
N N
E E * s s
IS* FR FR svc SVC T T r r r
IS-2000
2000 4* V V V
4.8.9 Addressing:
• Private network assigns address to terminal by LNS using PPP
contained within voluntary tunnel.
• Wireless session protocol (WSP) assigns IP address to user for link
between mobile and wireless network
4.8.10 Security and Firewall Traversal:
• Two levels of authentication are provided:IS-41 authentication(optional)
and mobile HA authentication during mobile IP registration (mandatory)
• Identification inserted in the mobile-IP registration request/reply provides
antireply protection
37
Chapter 4 : 3G Communication Protocols
38