LTE Attach Part 1: Goals of LTE Attach

Irfan Ali
12 Feb 201714:23

Summary

TLDRThis video script delves into the LTE attach process, crucial for mobile registration and communication. It clarifies that a mobile's identity in the network is not just the phone number. The script outlines the LTE architecture, detailing the roles of eNodeBs, Serving Gateway, and PDN Gateway. It explains the importance of IP address allocation, maintaining a constant address for uninterrupted communication, and the use of non-topologically correct addresses due to mobility. The video also covers the concept of tunnels for routing packets to mobile devices and the signaling process required to set up these connections, highlighting the significance of GTP and the S1-MME interface in LTE networks.

Takeaways

  • ๐Ÿ“ฑ The LTE attach process is akin to registration, allowing a mobile device to join a network, obtain an IP address, and initiate communication.
  • ๐Ÿ†” Your identity in the network is not just your phone number; there's more to it that the network uses to recognize you.
  • ๐Ÿ“Š Call flow is crucial as it illustrates the procedures within the network and is a primary method used in LTE specifications.
  • ๐Ÿ” The concepts of Access Stratum and Non-Access Stratum are distinct and essential to understand their roles and differences in LTE.
  • ๐Ÿš€ Mobility Management and Session Management are key concepts in LTE, vital for understanding how the network operates.
  • ๐ŸŒ Protocol stacks are important, with GTP being a main protocol in LTE networks, and the S1-MME interface being another critical component.
  • ๐Ÿ—๏ธ The LTE architecture consists of eNodeBs, Serving Gateway, PDN Gateway, HSS for subscription info, and MME as the 'brains' of the system.
  • ๐ŸŒ The IP address provided by the network is globally routable and is translated into a private address used within the network.
  • ๐Ÿ”„ The IP address remains constant as a user moves within the network to maintain communication integrity.
  • ๐Ÿ”„ The address provided by the P-Gateway is not topologically correct, necessitating the use of tunnels for routing packets to the mobile device.
  • ๐Ÿ”„ Tunneling involves encapsulating IP packets within other IP packets to ensure they reach the intended destination, using protocols like GTP-U and UDP.

Q & A

  • What is the main goal of having a mobile phone according to the video script?

    -The main goal of having a mobile phone is to be able to communicate with other people.

  • What is the process of LTE attach and why is it important?

    -LTE attach is the process of registration by which a mobile device connects to a network, gets an IP address, and is able to communicate. It is important because it enables the mobile device to establish communication services.

  • What is the identity of a mobile device in the network and why might one's phone number not be the main identity?

    -The identity of a mobile device in the network is not necessarily the phone number. The network uses other identifiers for recognizing and managing devices, which can include SIM card details and unique device identifiers.

  • What is a call flow and why is it significant in the context of network procedures?

    -A call flow is a diagram or description of the path that a call takes through a telecommunications network. It is significant because it captures the various procedures in the network and helps in understanding how different components interact during a call or data session.

  • What are the differences between Access Stratum and Non-Access Stratum?

    -Access Stratum refers to the interface and protocols directly involved in the radio communication between a mobile device and a base station. Non-Access Stratum, on the other hand, involves the higher layers of the network that are not directly involved in the radio communication, such as the core network functions.

  • What are the two main concepts used in LTE for managing network operations?

    -The two main concepts used in LTE for managing network operations are Mobility Management (MM) and Session Management (SM).

  • What is the role of the Serving Gateway (S-GW) in the LTE architecture?

    -The Serving Gateway (S-GW) acts as an anchor for the user plane, managing the data flow between the mobile device and the Packet Data Network Gateway (P-GW), and handling the mobility aspect as the user moves between different base stations.

  • What is the function of the Packet Data Network Gateway (P-GW) in the LTE network?

    -The Packet Data Network Gateway (P-GW) serves as the connection point to the internet. It is responsible for routing all packets for the user equipment (UE) to and from the internet.

  • Why is the IP address provided by the P-GW not topologically correct?

    -The IP address provided by the P-GW is not topologically correct because it is a private address that does not correspond to the actual network segment of the base station the mobile device is connected to. This is due to the mobile nature of the devices, which frequently change their point of attachment in the network.

  • What is the purpose of GTP (GPRS Tunneling Protocol) in the LTE network?

    -GTP is used for tunneling user data through the LTE network. It enables the routing of packets to mobile devices that have non-topologically correct IP addresses by encapsulating the packets within another IP packet that can be routed to the correct network segment.

  • What are the signaling connections required to set up the necessary tunnels and connections for an LTE attach procedure?

    -The signaling connections required include the S1 Application Protocol (S1-AP) between the eNodeB and the MME, GTP Control Plane (GTP-C) between the MME and the Serving Gateway, and another signaling connection between the Serving Gateway and the P-GW for setting up user plane tunnels.

Outlines

00:00

๐Ÿ“ฑ LTE Attach Process Overview

This paragraph introduces the LTE attach process, which is essential for a mobile device to register with a network, obtain an IP address, and initiate communication. It clarifies that the primary identity of a device in the network is not the phone number but another identifier. The paragraph outlines the topics to be covered, including call flow, access and non-access stratum concepts, and the distinction between mobility and session management in LTE. It also mentions additional resources on protocol stacks, such as GTP primer and S1 MME interface, to provide a deeper understanding of LTE network operations.

05:00

๐ŸŒ Understanding LTE Network Elements and IP Addressing

This section delves into the LTE architecture, describing the roles of eNodeBs, the Serving Gateway, and the PDN Gateway. It explains how the PDN Gateway connects to the internet and routes packets to and from the user equipment (UE). The paragraph highlights the importance of a constant IP address for maintaining communication as the UE moves within the network. It also discusses the concept of topologically incorrect IP addresses provided by the P-Gateway and the necessity of tunnels for routing packets to the mobile device, introducing the GTP-U protocol and its role in the process.

10:03

๐Ÿ”„ Signaling and Tunneling in LTE Networks

The final paragraph focuses on the signaling process required to set up the necessary connections for data transmission in an LTE network. It explains the three logical signaling connections between the UE and eNodeB, the S1-MME interface for communication between eNodeB and MME, and the GTP-C protocol for signaling between MME and the Serving Gateway. The paragraph also details the process of tunneling packets from the P-Gateway to the Serving Gateway and then to the eNodeB, emphasizing the use of UDP and tunnel identifiers for routing packets to the correct destination. It concludes by discussing the signaling connections required for the LTE attach procedure to establish the network 'plumbing' for data flow.

Mindmap

Keywords

๐Ÿ’กLTE Attach

LTE Attach refers to the process by which a mobile device registers with a network, obtains an IP address, and becomes capable of communication. It is fundamental to the operation of mobile phones, as it allows them to connect to the internet and communicate with other devices. In the script, this process is the main focus, illustrating how a mobile device like Mehmet's smartphone becomes part of the LTE network.

๐Ÿ’กIdentity in the Network

The script mentions that one might assume their phone number is their identity in the network, but this is not the case. The network uses a different set of identifiers to recognize and manage connections. This concept is crucial for understanding how networks maintain security and individuality for each user, even though it may not be immediately apparent to the user.

๐Ÿ’กCall Flow

A Call Flow is a diagram or description that traces the path a call or data packet takes through a telecommunications system. In the context of the video, it is used to illustrate the various procedures that occur within the network, showing how a mobile device like Mehmet's goes through the LTE attach process.

๐Ÿ’กAccess Stratum

The Access Stratum (AS) is the part of the LTE network architecture that deals with the radio interface between the mobile device and the base station. It is distinct from the Non-Access Stratum and is responsible for the physical connection and communication over the air. The script explains the differentiation between AS and NAS, which is essential for understanding the layered structure of LTE.

๐Ÿ’กNon-Access Stratum

The Non-Access Stratum (NAS) is the part of the LTE network that handles the signaling and data delivery functions that are independent of the radio access technology. It is responsible for higher-level functions such as mobility management and session management. In the script, NAS is contrasted with AS to highlight the division of responsibilities within the LTE network.

๐Ÿ’กMobility Management

Mobility Management (MM) is a concept in LTE that deals with the tracking and management of mobile devices as they move around the network. It ensures that the network can maintain communication with the device even as it changes location. The script mentions MM as a key concept, emphasizing its importance in the LTE network's ability to handle mobile users like Mehmet.

๐Ÿ’กSession Management

Session Management (SM) in LTE is responsible for the establishment, maintenance, and release of user sessions. It ensures that data can be sent and received during a communication session. The script identifies SM as an important concept, which is essential for understanding how LTE networks manage communication sessions for users.

๐Ÿ’กGTP Primer

GTP Primer refers to a basic introduction to the GPRS Tunneling Protocol (GTP), which is a key protocol used in LTE networks for tunneling user data through the network. The script suggests that viewers interested in the technical details of LTE may want to look at a primer on GTP to better understand the protocol's role in the network.

๐Ÿ’กS1-MME Interface

The S1-MME Interface is the logical connection between the eNodeB (base station) and the MME (Mobility Management Entity) in an LTE network. It is used for the exchange of control plane information. The script mentions a primer on the S1-MME interface, indicating its importance in the network's control mechanisms.

๐Ÿ’กTopologically Incorrect Address

A topologically incorrect address is an IP address that does not match the actual network topology. In the script, it is mentioned that the IP address assigned by the P-Gateway to Mehmet is not topologically correct, meaning it cannot be directly routed to the eNodeB where Mehmet is connected. This concept is important for understanding how LTE networks use tunnels to route packets to mobile devices.

๐Ÿ’กTunneling

Tunneling in the context of LTE refers to the process of encapsulating a data packet within another packet to send it over a network. This is necessary when dealing with topologically incorrect addresses, as explained in the script. The script describes how tunneling is used to route packets from the internet to a mobile device like Mehmet's smartphone, even when the IP addresses are not directly routable.

Highlights

The video covers the LTE attach process, which is essential for a mobile device to register and communicate within a network.

The main identity of a mobile device in the network is not the phone number, contrary to common belief.

Call flow is crucial for understanding the procedures captured in the network specification.

The concept of Access Stratum and Non-Access Stratum are introduced, explaining their differences and purposes.

Mobility Management and Session Management are two key concepts used in LTE.

The video provides an overview of the LTE architecture, including E-NodeBs, Serving Gateway, and PDN Gateway.

The HSS stores user subscription information, and the MME acts as the 'brains' of the system for mobility management.

The process of a mobile device getting an IP address and the significance of a constant IP address for communication are discussed.

The provided IP address by the network is not topologically correct, which requires special routing methods.

Tunneling is used for routing packets in a mobile network with non-topologically correct addresses.

The role of the P-Gateway in connecting to the internet and the process of tunneling packets to the mobile device are explained.

The importance of the GTP-U protocol in the LTE network for user plane traffic is highlighted.

The video explains the signaling process required to set up tunnels and connections in the LTE network.

The signaling plane involves three logical connections between the mobile device and the E-NodeB for communication.

The S1-MME interface and the S1-AP protocol are discussed for their role in signaling between the E-NodeB and the MME.

The video describes the signaling connection between the MME, Serving Gateway, and P-Gateway for setting up user plane tunnels.

The entire attach procedure is summarized as the setup of network 'plumbing' for the attached case.

Transcripts

play00:00

this video we'll cover the process of

play00:02

Lte attach it's also called the process

play00:06

of registration by which a mobile comes

play00:09

into a network gets an IP address and is

play00:11

able to communicate I mean that's after

play00:13

all is your main goal of trying to have

play00:15

a mobile phone is that you can

play00:17

communicate with other people

play00:19

so in this lecture what we are going to

play00:21

cover are the following aspects we will

play00:24

cover what's your identity in the

play00:26

network you may think that your identity

play00:28

is your phone number but you'll be

play00:30

surprised to know that that's not the

play00:32

main identity by which the network knows

play00:35

you we will look at a call Flow and this

play00:38

is important to to take a look at

play00:40

because this is one of the main ways in

play00:43

which the specification captures the

play00:46

various procedures in the network and

play00:48

it's an example of such a procedure

play00:51

the concept of access stratum and

play00:54

non-axis stratum what these are and how

play00:56

they are different from each other and

play00:58

why they exist

play01:01

um and then also what is mobility

play01:03

management and what is session

play01:05

management these are two important

play01:07

Concepts that are used in LTE and you

play01:09

should be aware of these in addition if

play01:12

you want to take a look more at the

play01:14

protocol Stacks that are two separate

play01:16

short videos one on GTP primer which is

play01:20

one of the main protocols that is used

play01:22

in the LTE network and also there's a

play01:27

separate primer on the S1 mme interface

play01:30

and you may be interested in taking a

play01:33

look at those in order to get a little

play01:35

bit more overview of these two

play01:37

interfaces

play01:38

as we had covered in the previous

play01:40

lecture the main elements of the LTE

play01:43

architecture are shown in the figure

play01:45

here and we can see that the main

play01:49

elements that we do have are these base

play01:52

stations which are called e node B's and

play01:55

they are all anchored at something

play01:58

called the serving Gateway which anchors

play02:00

the mobility between them and then you

play02:02

have the P Gateway or the PDN Gateway

play02:06

which is the connection from the

play02:08

internet so all packets for the UE comes

play02:10

to this PDN Gateway and then from the

play02:12

PDN Gateway make their way through to

play02:15

the UE and back and forth these were the

play02:18

main elements in the user plane and then

play02:20

in the control plane we had said that

play02:21

the HSS is the one which stores the

play02:24

subscription information of the user and

play02:27

then

play02:28

subscription information and then we had

play02:31

this key element the mme which is kind

play02:34

of the brains of the system or the

play02:35

mobility management entity which acts

play02:38

also as a proxy for authenticating the

play02:42

user to the HSS and also for handling

play02:46

the mobility in between the base station

play02:48

so as you you move from one base station

play02:50

to the other it's the mme which kind of

play02:53

controls some of this Mobility it is it

play02:55

is essentially the the as we said the

play02:58

brains of the system now into this

play03:00

network works in our protagonist Mehmet

play03:05

he's got a cell phone it's got a Sim and

play03:07

this as you can see looks like an old

play03:09

cell phone this looks like before the

play03:11

iPhone ages but that's fine he's now

play03:14

upgraded to a smartphone and he wants to

play03:17

communicate with Aisha Aisha is his

play03:20

friend and she's connected somewhere to

play03:21

the internet and she probably has

play03:24

another mobile phone or she's com she's

play03:27

connected via a laptop we don't care

play03:30

about that so Mehmet wants to

play03:32

communicate with Aisha and for that the

play03:35

network will have to provide them with

play03:36

an IP address and now the the IP address

play03:39

that the network provides him is kind of

play03:42

pointing to the packet gateway to which

play03:45

which is connected to the internet and

play03:47

here is a globally routable address

play03:49

which gets netted into a private address

play03:52

which is the one which is used inside

play03:53

the network

play03:55

now the address which this network

play03:57

provides is remain going to remain

play04:00

constant unchanged as Mehmet moves in

play04:04

the network another important thing that

play04:07

happens is that and the reason that the

play04:09

address has to remain constant is that

play04:11

if its address changes then the

play04:14

communication will break between Aisha

play04:16

and Madness and that's one of the kind

play04:19

of properties the way today's protocol

play04:22

Stacks are working

play04:23

another important thing to kind of keep

play04:26

in mind is that the address that P

play04:28

Gateway provides to Mehmet is not

play04:31

topologically correct and when we say

play04:34

topologically correct what does that

play04:37

mean

play04:38

correct

play04:41

that means is that if this address which

play04:44

is here and Mehmet is connected to a

play04:47

base station over here and the IP

play04:49

address or or the sub Network or to

play04:52

which the space station belongs is not

play04:55

going to be is not going to be something

play04:57

that this packet here will get routed to

play05:00

so his his private IP address of the

play05:03

base station could be something like

play05:07

10.40.50.0 or dot one which is as you

play05:11

can see with the with the

play05:14

um

play05:15

Mosque of 24 bits that means these are

play05:18

the important bits over here and that's

play05:20

the sub Network in this e-node Beast is

play05:22

attached to whereas the IP address of

play05:25

this mobile has

play05:27

10.40.40.12 which doesn't belong to this

play05:29

network so uh it is not it cannot be

play05:33

routed directly to this base station and

play05:36

that is what's called topologically

play05:38

incorrect address because it cannot be

play05:41

routed to uh to the base station where

play05:44

the where Mehmet is connected and the

play05:48

reason that the network doesn't give a

play05:51

topologically correct address is that it

play05:54

is pretty sure it's a mobile network

play05:56

that that Mehmet very soon is going to

play05:59

be moving into another base station or

play06:01

there is a high probability that he

play06:03

would move and even if I give me the

play06:06

topologically correct address here that

play06:08

means belonging to dot 50.25 for example

play06:12

which would be topologically correct

play06:14

very soon he will end up in a base

play06:16

station where his address is not

play06:18

topologically correct

play06:20

so when you have addresses which are not

play06:23

topologically correct you need to kind

play06:26

of figure out how to route a packet so

play06:29

that it can reach the destination

play06:31

so for that what is done in the IP world

play06:35

are something called tunnels and there

play06:38

are two tunnels that gets created

play06:40

for in order to Route the packet which

play06:42

comes from the internet to the mobile

play06:45

and these two tunnels here are are the

play06:48

tunnels between the P gate Venus Gateway

play06:51

and between the S Gateway and the base

play06:53

station and then over the air it's not

play06:56

an IP connection it is just uh bytes

play06:59

being sent over over a modem so now

play07:02

let's take an IP packet that Aisha sends

play07:05

to mehmed saying hi that's coming from

play07:07

my IP address of Aisha down to the IP

play07:10

address of Mac meth and it comes all the

play07:12

way to the P Gateway now the P Gateway

play07:15

when it sees the IP address of mermaid

play07:17

knows that it needs to send this packet

play07:20

down to Mad Men but this packet cannot

play07:22

will not be routable over this interface

play07:25

so what he needs to do or what the P

play07:28

Gateway needs to do is to Tunnel this

play07:31

packet that means to put it inside

play07:33

another IP packet which now has the

play07:38

destination address of the s Gateway and

play07:41

says that it is coming from the P

play07:43

Gateway in this way by putting this

play07:45

packet which is coming from Aisha to

play07:48

mehmed inside this outer packet it is

play07:53

able to send the packet at least halfway

play07:55

there to Mammoth and that's reaching the

play07:58

S Gateway now the S Gateway is the end

play08:00

hosts so not only you need to have this

play08:03

address over here to enable to Route the

play08:05

packet but you also need to get the

play08:08

packet to S Gateway that means you

play08:10

either you need a transport level

play08:12

protocol and the transport level

play08:14

protocol which is being used for routing

play08:18

of packets or tunneling of packets is

play08:20

UDP so there is a UDP protocol running

play08:22

between P Gateway and S Gateway and

play08:25

there is a well-known destination Port

play08:27

which is 2152 which is the gtpu GTP user

play08:32

plane protocol at which there is a

play08:35

process in the serving Gateway which is

play08:37

listening for packets coming GTP packets

play08:40

coming over here so it so so the packet

play08:43

is now able to get to a particular

play08:45

process running in the S Gateway which

play08:48

is listening on Port 2152 but since

play08:51

there can be a large number of mobiles

play08:53

that are connected to a base station and

play08:56

connected to uh and and being forwarded

play08:59

by the S Gateway not only do you need to

play09:02

get to the right Port you also need to

play09:04

say that this packet is actually for

play09:06

mehmed and in order to do that there is

play09:09

another identifier inside the UDP uh

play09:13

packet in in What's called the GTP you

play09:16

header GTP user plane header which is

play09:18

called the tunnel identifier so this

play09:20

identifies magnet so this says that this

play09:24

packet is actually for Mehmet and not

play09:26

for Yusuf or for Ali or for Ashok or for

play09:30

John so each one has a different tunnel

play09:33

ID if all of them if all of these

play09:36

packets needs to be forwarded via

play09:38

serving gateway to to do magnets so

play09:42

um so we have a general overall

play09:45

structure a little bit of how packets

play09:47

are being tunnel from the P gateway to

play09:49

the S Gateway and uh we will now kind of

play09:53

continue on so we we've got the packet

play09:56

reached halfway there to uh to metmet

play09:59

but now they still need to get from uh

play10:02

mehmed from Escape way to the E node B

play10:05

and we don't have the keynote B written

play10:08

here as gateway to the E node B so now

play10:11

what this s Gateway does is it takes out

play10:14

this packet from here and puts it into

play10:16

yet another tunnel and this time the

play10:19

tunnel uh the the tunneling is to the E

play10:22

node beats going from the serving

play10:23

Gateway again at the E node B There is a

play10:27

a process which is listening on the

play10:29

socket UDP socket 2152 and it gets that

play10:33

packet from gets this packet coming from

play10:37

the S Gateway and also there is a tunnel

play10:40

ID here in this case on this interface

play10:42

coming into the E node B the tunnel

play10:44

identifier which identifies magnet is

play10:47

some other value which is X which is

play10:49

different from which can be different

play10:51

from from the value used in the S

play10:53

Gateway and so once it comes to with

play10:57

this identifier to this e node B the E

play10:59

node B knows that this packet is for

play11:01

matmit it map so this e node b gets that

play11:05

packet and then sends it out over the

play11:08

radio interface using a data radio

play11:11

better down to uh to magmet and over

play11:16

here this is not an IP in IP tunnel link

play11:18

this is just taking the the packet and

play11:20

sending down to Matt method and mehmed

play11:22

gets this packet so this is the way in

play11:24

which we are getting packets coming all

play11:27

the way from the internet from from

play11:29

Aisha all the way down to Mehmet and

play11:33

back and forth in the other way map is

play11:35

going to send an IP packet here which

play11:37

will go into another set of tunnels and

play11:40

then going and then finally from the P

play11:42

gateway to I say we will cover some more

play11:45

details of gtpu at least the concepts of

play11:48

gtpu a little bit in the Annex video for

play11:52

on GDP

play11:54

um so this was a user plane but then in

play11:56

order to set up all these tunnels you

play11:58

need to do some signaling they are

play12:00

obviously not present when magnet didn't

play12:02

come into the network in order to set up

play12:04

these connections you need to have some

play12:06

signaling uh plane and there are three

play12:09

signaling connections logical

play12:11

connections between mahmet and the E

play12:13

node B they're called signaling radio

play12:15

bearers uh these are just three logical

play12:19

bearers and so don't get worried why

play12:21

there are three and not one well all

play12:24

three of these constitute the signaling

play12:26

connection between mehmed's phone and

play12:29

the e-node B

play12:31

but this only gets magnets communication

play12:33

only up to the E node B the E node B

play12:36

also needs to communicate with the mme

play12:39

and not only for forwarding for example

play12:43

authentication messages to the mme but

play12:46

also saying hey I've got a new mobile

play12:48

what do I do about it and for that there

play12:51

is a per UE connection between the E

play12:55

node B and the mme over the S1 mme

play12:58

interface and the application protocol

play13:01

that is used over here is the S1

play13:03

application protocol S1 AP so there is a

play13:06

connection for the signaling messages

play13:09

for forwarding not only the messages

play13:12

from Mehmet to the mme but also for

play13:15

other e node B and mme signaling

play13:17

messages over this S1 mme interface

play13:21

using the s1ap protocol

play13:23

in addition you also need to have

play13:27

communication between the mme and the

play13:29

serving Gateway for setting up this

play13:31

tunnel as you can see the signaling

play13:33

connection doesn't there is no direct

play13:35

signaling connection between the E node

play13:37

V and S Gateway it all goes via the mme

play13:40

and that's why to go over the S1 AP

play13:44

protocol first and then the mme will do

play13:47

signaling to the serving Gateway over

play13:48

another signaling connection which is a

play13:51

GTP control plane or gtpc and then there

play13:55

is a signaling connection between the

play13:57

serving Gateway and the P Gateway which

play13:59

for example gets used for setting up

play14:01

this user plane tunnel

play14:04

so essentially

play14:06

the network Plumbing at the end of the

play14:09

attach procedure so so the entire

play14:11

attached procedure is used for setting

play14:14

up this uh this plumbing and this

play14:18

connection for the attached case

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
LTE AttachMobile NetworkIP AddressRegistration ProcessCommunicationCall FlowAccess StratumNon-Access StratumMobility ManagementSession ManagementProtocol Stacks