SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
İki Teknoloji 1
LTE:
A	feature	based	introduction
LTE	Core	Features
Annex.	GTP	Primer
Irfan Ali
Video at youtube:
https://www.youtube.com/watch?v=FPfExr9bEEg&list=PLgQvzs
PaZX_bimBc5Wu4m6-cVD4bZDav9&index=9
Irfan Ali 2İki Teknoloji 2
What	is	GTP?
• GTP		=	GPRS	Tunneling Protocol
• What	is	Tunneling in	the	IP	World?
Ø Tunneling	in	the	IP	world	means	putting	an	IP	packet	inside	
another	IP	packet.	
IP_src ->
IP_dst Payload
IP_a->
IP_b
Inner	IP	Packet
Outer	IP	Packet
GPRS General Packet Radio Service
Irfan Ali 3İki Teknoloji 3
What	is	the	purpose	of	GTP	Tunneling?
• Route	an	IP	packet	along	a	path	that	is	not	topologically	correct	for	
the	packet.
Mehmet’s IP address
46.1.78.189->
10.40.40.12 Internet
S-GW
P-GW
eNB
Ayse
Mehmet
10.10.10.1
10.10.10.2
10.10.10.0/24
10.10.20.1
10.10.20.0/24
10.10.20.2
GTPTunnel
IP_sgw ->
IP_enb
UDP_
dst=
2152
TEID_x
IP_pgw ->
IP_sgw
IP
UDP_
dst=
2152
UDP
TEID_k
GTP-U
header
Mehmet’s IP address
10.40.40.12
DHCP
GTP is
IP-in-UDP Tunneling
HiIP_a ->
IP_m
HiIP_a ->
IP_m
HiIP_a ->
IP_m
HiIP_a ->
IP_m
Irfan Ali 4İki Teknoloji 4
How	does	the	GTP-U	Tunnel	get	setup?
• GTP	Protocol	has	two	parts
Ø Signaling	part	called	GTP-C	(GTP-Control)
Ø User	data	part	called	GTP-U	(GTP-User)
• GTP-C	is	used	to	setup	GTP-U	tunnel
• Both	GTP-C	and	GTP-U	run	on	top	of	UDP
• IP-in-UDP	tunneling	is	only	used	for	GTP-U
• GTP-C	carries	control/signaling	messages
IP_pgw ->
IP_sgw
IP_a ->
IP_m
UDP_
dst=
2152
TEID_a
IP_pgw ->
IP_sgw
UDP_
dst=
2123
TEID_k
IP UDP GTP-U
header IP UDP GTP-C
header
GTP-C message
Irfan Ali 5İki Teknoloji 5
SGW PGW
TEID
21232123
2152
TEID
IPc,sgw
2152
IPu,pgwIPu,sgw
TxRx Tx Rx
TEID
TEID
TxRx Tx Rx
TEIDas
TEIDbs
TEIDcs
IPc,pgw
SGW PGW
TEID
2123
2152
2123
2152
TEID
IPc,sgw
IPu,sgw
IPc,pgw
IPu,pgw
TxRx Tx Rx
TxRx Tx Rx
TEIDTEID
How	does	GTP-U	Tunnel	get	setup:	Example
TEIDas
TEIDas
0
C.S. Req (IMSIa, C: IPc,sgw,TEIDas,
EBID5:IPu,sgw,TEIDas) C.S. Rsp (C:IPu,pgw,TEIDap,
EBID5:IPu,pgw, TEIDxp)
TEIDbs
TEIDcs
TEIDap
TEIDbp
TEIDcp
TEIDap
TEIDbs
TEIDcs
TEIDbp
TEIDcp
Irfan Ali 6İki Teknoloji 6
Packet	Trace:	Create	Session	Request	(S11);	MME->SGW
MME
SGW/
PGW
0
21232123
0x1
eNB
SGW/
PGW
21522152
S11
S1U
Irfan Ali 7İki Teknoloji 7
Packet	Trace:	Create	Session	Response	(S11);	SGW	->	MME
MME
SGW/
PGW
21232123
0x1
eNB
SGW/
PGW
21522152
S11
S1U
0x80..01
0xc0..1
Irfan Ali 8İki Teknoloji 8
Packet	Trace:	Modify	Bearer	Request	(S11);	MME	->SGW
MME
SGW/
PGW
21232123
0x1
eNB
SGW/
PGW
21522152
S11
S1U
0x80..01
0xc0..1
0x800..001
0x3ea
Irfan Ali 9İki Teknoloji 9
Packet	Trace:	GTP-U:	S1-U;	eNB ->	SGW/PGW
eNB
SGW/
PGW
21522152
S1U
0x010000
UE Server
10.255.1.111 10.0.0.10010.1.2.11 10.1.1.12
TxRx
Tx Rx
Irfan Ali 10İki Teknoloji 10
Packet	Trace	GTP-U:	S1-U;	eNB <- SGW/PGW
eNB
SGW/
PGW
21522152
S1U
0x010000
UE Server
10.255.1.111 10.0.0.10010.1.2.11 10.1.1.12
TxRx
Irfan Ali 11İki Teknoloji 11
GTP	Path	and	Path	Management
• Path	is	between	two	endpoints.	Each	end	
point	is	IP_address+UDP_Port#	
• There	can	be	several	GTP	tunnels	on	a	
path	(each	with	different	TEIDs).
• There	is	typically	a	“software	process”	that	
binds	to	each	end-point.
• Path	Management	messages:	To	ensure	
that	a	path	is	alive	(both	the	physical	link	
and	process	at	the	endpoint),	periodic	
echo-request and	echo-response are	sent.	
• Failure-detection	and	error-recovery	
mechanisms	are	defined.
SGW PGW
TEID
2123
2152
2123
2152
TEIDas
TEIDbs
TEIDcs
TEIDxs
TEIDys
TEIDzs
TEID
IPc,sgw
IPu,sgw
IPc,pgw
IPu,pgw
TxRx Tx Rx
Path
Path
Irfan Ali 12İki Teknoloji 12
Packet	Traces:	GTP-U	Echo-request	&	Echo	Response
In GTP-Cv2 Echo
request/response messages
do not contain TEID field
In GTP-Cv2 Echo
request/response messages
do not contain TEID field
Irfan Ali 13İki Teknoloji 13
Interfaces	on	which	GTP	is	used
• GTP-Cv2	is	used	not	only	for	
mobility	management,	but	
also	for	general	signaling	
purposes,	 eg providing	 UE’s	
cell	information	 to	the	PGW	
and	from	there	to	operator’s	
service	network.
Internet
MME
S-GW
P-GW
HSS
eNB
UE’s IP address
S1-MME
S11
S6a
S5
S1-U
MME
S10
S1AP
GTP C
GTP C
Irfan Ali 14İki Teknoloji 14
Specifications
• GTPC	v2 TS	29.274
• GTPU	v1 TS	29.281
• GTPC	v1 TS	29.060
• Historically	(before	Rel-8,	i.e.	before	2009Q1),	TS	29.060	used	to	be	
the	key	GTP	specification	(both	GTPC	v1	and	GTPU	v1).	But		since	
Rel-8,	TS	29.060	is	only	applicable	to	3G	interfaces	(Gn/Gp,	
between	SGSN	<->	GGSN	and	between	SGSNs)	and	not	to	EPC	
interfaces.	Its	specification	only	applies	to	GTPC	v1	
Ø Ignore	anything	that	29.060	says	about	GTPU.
İki Teknoloji 15
Annex
Irfan Ali 16İki Teknoloji 16
Rules	for	GTP-C	IP	address	and	port	numbers
• Three	types	of	messages
• Rules	for	Port#	and	IP	addresses
Ø Initial	Message:
1. The	UDP	Destination	 Port	number	for	GTPv2	Initial	 messages	shall	be	2123
2. The	UDP	Source	Port	 for	a	GTPv2	Initial	message	is	a	locally	allocated	port	 number.
3. During	the	establishment	 of	the	GTP	tunnel,	 the	GTPv2	entity	selects	and	communicates	 to	the	peer	GTPv2	entity	the	IP	Destination	 Address	at	
which	it	expects	 to	receive	subsequent	 control	 plane	Initial	messages	related	to	that	GTP	tunnel	 via	the "Sender	F-TEID	for	Control	 Plane"	IE	
Ø Triggered	message
1. The	IP	Source	Address	of	a	GTPv2	Triggered	message	and	for	a	Triggered	Reply	message	shall	be	copied	 from	the	IP	destination	 address	of	the	
message	to	which	 this	GTPv2	entity	is	replying
2. The	IP	Destination	 Address	of	a	GTPv2	Triggered	message	and	for	a	Triggered	Reply	message	shall	be	copied	 from	the	IP	Source	Address	of	the	
message	to	which	 this	GTPv2	entity	is	replying
3. The	UDP	Source	Port	 of	a	GTPv2	Triggered	message	shall	be	the	value	from	the	UDP	Destination	 Port	of	the	corresponding	 message	to	which	
this	GTPv2	entity	is	replying
4. The	UDP	Destination	 Port	 value	of	a	GTPv2	Triggered	 message	shall	be	the	value	of	the	UDP	Source	Port	 of	the	corresponding	 message	to	which	
this	GTPv2	entity	is	replying
Ø Triggered	Reply	message
1. Same	rules	as	triggered	message.
• Rules	for	TEID#
Ø The	first Create	Session	 Request	message	on	S11	for	a	UE	shall	have	TEID	=	0x0
Ø The	(first	and	subsequent)	 Create	Session	 Request	message	on	S5	for	a	UE	shall	have	TEID	=	0x0
GTP-C
Peer A
GTP-C
Peer B
Initial Message
Triggered Message
Triggered Reply Message

Contenu connexe

Tendances

Lte protocol Stack
Lte protocol StackLte protocol Stack
Lte protocol StackShoeb Ahmed
 
LTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical posterLTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical posterDavid Swift
 
Advanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive StateAdvanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive State3G4G
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.engsivakumar D
 
What LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedWhat LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)3G4G
 
Opinion: The Politics of SA vs NSA 5G & 4G Speeds
Opinion: The Politics of SA vs NSA 5G & 4G SpeedsOpinion: The Politics of SA vs NSA 5G & 4G Speeds
Opinion: The Politics of SA vs NSA 5G & 4G Speeds3G4G
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedurestharinduwije
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architectureVikas Shokeen
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisBiju M R
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTEmanish_sapra
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation3G4G
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...Vikas Shokeen
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
Lte outbound roaming_session
Lte outbound roaming_sessionLte outbound roaming_session
Lte outbound roaming_sessionSamir Mohanty
 

Tendances (20)

Lte protocol Stack
Lte protocol StackLte protocol Stack
Lte protocol Stack
 
LTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical posterLTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical poster
 
Advanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive StateAdvanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive State
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
What LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedWhat LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and Optimized
 
Lte epc kp is and signalling (sf)
Lte epc kp is and signalling (sf)Lte epc kp is and signalling (sf)
Lte epc kp is and signalling (sf)
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
Opinion: The Politics of SA vs NSA 5G & 4G Speeds
Opinion: The Politics of SA vs NSA 5G & 4G SpeedsOpinion: The Politics of SA vs NSA 5G & 4G Speeds
Opinion: The Politics of SA vs NSA 5G & 4G Speeds
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
 
End-to-End QoS in LTE
End-to-End QoS in LTEEnd-to-End QoS in LTE
End-to-End QoS in LTE
 
Lte signaling
Lte signalingLte signaling
Lte signaling
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional Analysis
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
Lte outbound roaming_session
Lte outbound roaming_sessionLte outbound roaming_session
Lte outbound roaming_session
 

Similaire à GTP Overview

SoHo Honeypot (LUGS)
SoHo Honeypot (LUGS)SoHo Honeypot (LUGS)
SoHo Honeypot (LUGS)Michael Boman
 
IPv6 at FPT Telecom
IPv6 at FPT TelecomIPv6 at FPT Telecom
IPv6 at FPT TelecomAPNIC
 
Experience of IPv6 Introduction in Japan
Experience of IPv6 Introduction in JapanExperience of IPv6 Introduction in Japan
Experience of IPv6 Introduction in JapanKoji Yasukagawa
 
Kernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with CiliumKernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with CiliumCynthia Thomas
 
Lte advanced (3 gpp rel. 11) technology introduction
Lte advanced (3 gpp rel. 11) technology introductionLte advanced (3 gpp rel. 11) technology introduction
Lte advanced (3 gpp rel. 11) technology introductionMuhammad Rauf Akram
 
LTE- Advanced (3GPP Rel.11) Technology Introduction
 LTE- Advanced (3GPP Rel.11) Technology Introduction LTE- Advanced (3GPP Rel.11) Technology Introduction
LTE- Advanced (3GPP Rel.11) Technology IntroductionPraveen Kumar
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9Irsandi Hasan
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorialsaryu2011
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9Joshua Torres
 
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Javier Benitez
 
CHT IPv6 Deployment
CHT IPv6 DeploymentCHT IPv6 Deployment
CHT IPv6 DeploymentAPNIC
 
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert DąbrowskiPLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert DąbrowskiPROIDEA
 
iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdfAdmin621695
 
ospf .pdf
ospf .pdfospf .pdf
ospf .pdftthind
 
4 g technology
4 g technology4 g technology
4 g technologyardneham
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds3G4G
 
OTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigitOTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigitSigit Puspito Wigati Jarot
 

Similaire à GTP Overview (20)

SoHo Honeypot (LUGS)
SoHo Honeypot (LUGS)SoHo Honeypot (LUGS)
SoHo Honeypot (LUGS)
 
IPv6 at FPT Telecom
IPv6 at FPT TelecomIPv6 at FPT Telecom
IPv6 at FPT Telecom
 
Experience of IPv6 Introduction in Japan
Experience of IPv6 Introduction in JapanExperience of IPv6 Introduction in Japan
Experience of IPv6 Introduction in Japan
 
Kernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with CiliumKernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with Cilium
 
Lte advanced (3 gpp rel. 11) technology introduction
Lte advanced (3 gpp rel. 11) technology introductionLte advanced (3 gpp rel. 11) technology introduction
Lte advanced (3 gpp rel. 11) technology introduction
 
LTE- Advanced (3GPP Rel.11) Technology Introduction
 LTE- Advanced (3GPP Rel.11) Technology Introduction LTE- Advanced (3GPP Rel.11) Technology Introduction
LTE- Advanced (3GPP Rel.11) Technology Introduction
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Exploration routing chapter_9
Exploration routing chapter_9Exploration routing chapter_9
Exploration routing chapter_9
 
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
 
CHT IPv6 Deployment
CHT IPv6 DeploymentCHT IPv6 Deployment
CHT IPv6 Deployment
 
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert DąbrowskiPLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
 
iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdf
 
ospf .pdf
ospf .pdfospf .pdf
ospf .pdf
 
cisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdfcisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdf
 
4 g technology
4 g technology4 g technology
4 g technology
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds
 
OTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigitOTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigit
 

Dernier

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

GTP Overview

  • 1. İki Teknoloji 1 LTE: A feature based introduction LTE Core Features Annex. GTP Primer Irfan Ali Video at youtube: https://www.youtube.com/watch?v=FPfExr9bEEg&list=PLgQvzs PaZX_bimBc5Wu4m6-cVD4bZDav9&index=9
  • 2. Irfan Ali 2İki Teknoloji 2 What is GTP? • GTP = GPRS Tunneling Protocol • What is Tunneling in the IP World? Ø Tunneling in the IP world means putting an IP packet inside another IP packet. IP_src -> IP_dst Payload IP_a-> IP_b Inner IP Packet Outer IP Packet GPRS General Packet Radio Service
  • 3. Irfan Ali 3İki Teknoloji 3 What is the purpose of GTP Tunneling? • Route an IP packet along a path that is not topologically correct for the packet. Mehmet’s IP address 46.1.78.189-> 10.40.40.12 Internet S-GW P-GW eNB Ayse Mehmet 10.10.10.1 10.10.10.2 10.10.10.0/24 10.10.20.1 10.10.20.0/24 10.10.20.2 GTPTunnel IP_sgw -> IP_enb UDP_ dst= 2152 TEID_x IP_pgw -> IP_sgw IP UDP_ dst= 2152 UDP TEID_k GTP-U header Mehmet’s IP address 10.40.40.12 DHCP GTP is IP-in-UDP Tunneling HiIP_a -> IP_m HiIP_a -> IP_m HiIP_a -> IP_m HiIP_a -> IP_m
  • 4. Irfan Ali 4İki Teknoloji 4 How does the GTP-U Tunnel get setup? • GTP Protocol has two parts Ø Signaling part called GTP-C (GTP-Control) Ø User data part called GTP-U (GTP-User) • GTP-C is used to setup GTP-U tunnel • Both GTP-C and GTP-U run on top of UDP • IP-in-UDP tunneling is only used for GTP-U • GTP-C carries control/signaling messages IP_pgw -> IP_sgw IP_a -> IP_m UDP_ dst= 2152 TEID_a IP_pgw -> IP_sgw UDP_ dst= 2123 TEID_k IP UDP GTP-U header IP UDP GTP-C header GTP-C message
  • 5. Irfan Ali 5İki Teknoloji 5 SGW PGW TEID 21232123 2152 TEID IPc,sgw 2152 IPu,pgwIPu,sgw TxRx Tx Rx TEID TEID TxRx Tx Rx TEIDas TEIDbs TEIDcs IPc,pgw SGW PGW TEID 2123 2152 2123 2152 TEID IPc,sgw IPu,sgw IPc,pgw IPu,pgw TxRx Tx Rx TxRx Tx Rx TEIDTEID How does GTP-U Tunnel get setup: Example TEIDas TEIDas 0 C.S. Req (IMSIa, C: IPc,sgw,TEIDas, EBID5:IPu,sgw,TEIDas) C.S. Rsp (C:IPu,pgw,TEIDap, EBID5:IPu,pgw, TEIDxp) TEIDbs TEIDcs TEIDap TEIDbp TEIDcp TEIDap TEIDbs TEIDcs TEIDbp TEIDcp
  • 6. Irfan Ali 6İki Teknoloji 6 Packet Trace: Create Session Request (S11); MME->SGW MME SGW/ PGW 0 21232123 0x1 eNB SGW/ PGW 21522152 S11 S1U
  • 7. Irfan Ali 7İki Teknoloji 7 Packet Trace: Create Session Response (S11); SGW -> MME MME SGW/ PGW 21232123 0x1 eNB SGW/ PGW 21522152 S11 S1U 0x80..01 0xc0..1
  • 8. Irfan Ali 8İki Teknoloji 8 Packet Trace: Modify Bearer Request (S11); MME ->SGW MME SGW/ PGW 21232123 0x1 eNB SGW/ PGW 21522152 S11 S1U 0x80..01 0xc0..1 0x800..001 0x3ea
  • 9. Irfan Ali 9İki Teknoloji 9 Packet Trace: GTP-U: S1-U; eNB -> SGW/PGW eNB SGW/ PGW 21522152 S1U 0x010000 UE Server 10.255.1.111 10.0.0.10010.1.2.11 10.1.1.12 TxRx Tx Rx
  • 10. Irfan Ali 10İki Teknoloji 10 Packet Trace GTP-U: S1-U; eNB <- SGW/PGW eNB SGW/ PGW 21522152 S1U 0x010000 UE Server 10.255.1.111 10.0.0.10010.1.2.11 10.1.1.12 TxRx
  • 11. Irfan Ali 11İki Teknoloji 11 GTP Path and Path Management • Path is between two endpoints. Each end point is IP_address+UDP_Port# • There can be several GTP tunnels on a path (each with different TEIDs). • There is typically a “software process” that binds to each end-point. • Path Management messages: To ensure that a path is alive (both the physical link and process at the endpoint), periodic echo-request and echo-response are sent. • Failure-detection and error-recovery mechanisms are defined. SGW PGW TEID 2123 2152 2123 2152 TEIDas TEIDbs TEIDcs TEIDxs TEIDys TEIDzs TEID IPc,sgw IPu,sgw IPc,pgw IPu,pgw TxRx Tx Rx Path Path
  • 12. Irfan Ali 12İki Teknoloji 12 Packet Traces: GTP-U Echo-request & Echo Response In GTP-Cv2 Echo request/response messages do not contain TEID field In GTP-Cv2 Echo request/response messages do not contain TEID field
  • 13. Irfan Ali 13İki Teknoloji 13 Interfaces on which GTP is used • GTP-Cv2 is used not only for mobility management, but also for general signaling purposes, eg providing UE’s cell information to the PGW and from there to operator’s service network. Internet MME S-GW P-GW HSS eNB UE’s IP address S1-MME S11 S6a S5 S1-U MME S10 S1AP GTP C GTP C
  • 14. Irfan Ali 14İki Teknoloji 14 Specifications • GTPC v2 TS 29.274 • GTPU v1 TS 29.281 • GTPC v1 TS 29.060 • Historically (before Rel-8, i.e. before 2009Q1), TS 29.060 used to be the key GTP specification (both GTPC v1 and GTPU v1). But since Rel-8, TS 29.060 is only applicable to 3G interfaces (Gn/Gp, between SGSN <-> GGSN and between SGSNs) and not to EPC interfaces. Its specification only applies to GTPC v1 Ø Ignore anything that 29.060 says about GTPU.
  • 16. Irfan Ali 16İki Teknoloji 16 Rules for GTP-C IP address and port numbers • Three types of messages • Rules for Port# and IP addresses Ø Initial Message: 1. The UDP Destination Port number for GTPv2 Initial messages shall be 2123 2. The UDP Source Port for a GTPv2 Initial message is a locally allocated port number. 3. During the establishment of the GTP tunnel, the GTPv2 entity selects and communicates to the peer GTPv2 entity the IP Destination Address at which it expects to receive subsequent control plane Initial messages related to that GTP tunnel via the "Sender F-TEID for Control Plane" IE Ø Triggered message 1. The IP Source Address of a GTPv2 Triggered message and for a Triggered Reply message shall be copied from the IP destination address of the message to which this GTPv2 entity is replying 2. The IP Destination Address of a GTPv2 Triggered message and for a Triggered Reply message shall be copied from the IP Source Address of the message to which this GTPv2 entity is replying 3. The UDP Source Port of a GTPv2 Triggered message shall be the value from the UDP Destination Port of the corresponding message to which this GTPv2 entity is replying 4. The UDP Destination Port value of a GTPv2 Triggered message shall be the value of the UDP Source Port of the corresponding message to which this GTPv2 entity is replying Ø Triggered Reply message 1. Same rules as triggered message. • Rules for TEID# Ø The first Create Session Request message on S11 for a UE shall have TEID = 0x0 Ø The (first and subsequent) Create Session Request message on S5 for a UE shall have TEID = 0x0 GTP-C Peer A GTP-C Peer B Initial Message Triggered Message Triggered Reply Message