VoLTE Call Flow and Procedures - Voice Over IP Tutorial
VoLTE Call Flow and Procedures - Voice Over IP Tutorial
com/volte-call-flow-procedures/
3glteinfo.com
VoLTE call flow and procedures is very big area to cover because
of the many scenarios to consider from both UE and network
perspective.
In this article I will try to put some examples of VoLTE call flow
from UE point of view. These procedures are the most important for
VOLTE calls.
From the UE’s point of view the initial step is to camp on the
network and read system information in the form of Master
Information Blocks (MIBs) and System Information Blocks (SIBs).
Once that information has been processed the UE can initiate its
own processes.
1 of 7 8/7/2019, 11:27 AM
VoLTE Call Flow and Procedures - Voice Over IP Tutorial about:reader?url=http://www.3glteinfo.com/volte-call-flow-procedures/
PDN Connectivity
Authentication
P-SCCF Discovery
2 of 7 8/7/2019, 11:27 AM
VoLTE Call Flow and Procedures - Voice Over IP Tutorial about:reader?url=http://www.3glteinfo.com/volte-call-flow-procedures/
PDN Connectivity
Authentication
3 of 7 8/7/2019, 11:27 AM
VoLTE Call Flow and Procedures - Voice Over IP Tutorial about:reader?url=http://www.3glteinfo.com/volte-call-flow-procedures/
Bearer Setup
P-CSCF Discovery
4 of 7 8/7/2019, 11:27 AM
VoLTE Call Flow and Procedures - Voice Over IP Tutorial about:reader?url=http://www.3glteinfo.com/volte-call-flow-procedures/
SIP Registration
5 of 7 8/7/2019, 11:27 AM
VoLTE Call Flow and Procedures - Voice Over IP Tutorial about:reader?url=http://www.3glteinfo.com/volte-call-flow-procedures/
UE can start SIP registration towards the IMS for VoLTE call.
3. The I-CSCF polls the HSS for data used to decide which S-CSCF
should manage the REGISTER request. The I-CSCF then makes
that decision.
7. Both the UE and the network have stored some Shared Secret
Data (SSD), the UE in its ISIM or USIM and the network on the
HSS. The UE uses an algorithm per RFC 33101 (e.g. AKAv2-MD5)
to hash the SSD and the nonce.”
10. The I-CSCF forwards the new REGISTER request to the S-CSCF.
11. The S-CSCF polls the HSS (via the I-CSCF) for the SSD, hashes it
against the nonce and determines whether the UE should be
allowed to register. Assuming the hashed values match, the
6 of 7 8/7/2019, 11:27 AM
VoLTE Call Flow and Procedures - Voice Over IP Tutorial about:reader?url=http://www.3glteinfo.com/volte-call-flow-procedures/
7 of 7 8/7/2019, 11:27 AM