Project

General

Profile

Open5GS-Traces » History » Version 38

jolly, 02/01/2024 04:07 PM

1 1 jolly
h1. Open5GS-Traces
2
3 23 jolly
{{>toc}}
4
5 8 jolly
h2. Setup of this example
6
7
* Ericsson RBS 6402 (eNodeB)
8
* Open5GS (4G network elements)
9
* OsmoHLR with OsmoDia2GSUP (HSS)
10
* OsmoMSC (SMS)
11
12 37 jolly
h2. Wireshark trace
13
14
attachment:attach_detach.pcapn
15 38 jolly
attachment:"file name.zip"
16 17 jolly
17 8 jolly
h2. Idle
18 1 jolly
19
When all phones are Idle, one will see the following trace with Wireshark on the link between eNodeB (Ericsson RBS) and MME (Open5GS).
20 10 jolly
21 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_idle.png, size=600)}}
22 8 jolly
23
The eNodeB (IP 10.0.15.117) is connected to MME (IP 10.0.15.1) via SCTP. Also the eNodeB syncs its clock to NTP server (IP 10.0.15.1).
24 19 jolly
25 9 jolly
The network 10.0.15.0/24 is the RAN network in this example.
26
27 17 jolly
28 9 jolly
h2. 4G Attachment
29
30 27 jolly
!enb_attach.png!
31 1 jolly
32 23 jolly
The phone is turned on and ready to attach to 4G network. The filter of Wireshark is set to "s1ap", so that only packages between eNodeB and MME are shown.
33 20 jolly
34 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach.png, size=1000)}}
35 16 jolly
36 18 jolly
A 4G phone is attached to the network, using SIM cards that is registered in the HSS. The APN name used is "internet".
37 19 jolly
38 1 jolly
Lets go into detail:
39 12 jolly
40
h3. Attach request
41 1 jolly
42 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_attach_request.png, size=1000)}}
43 17 jolly
44 18 jolly
The UE sends an "Attach request". It is the message type of the "NAS-PDU" information element of the "initiatingMessage". The "NAS-PDU" message type is highlighted blue in the picture above.
45 19 jolly
46 17 jolly
Also within the "NAS-PDU" is the "EPS mobile identity". In this case the UE has the mobile country code "999" and the mobile network code "10". The IMSI is not shown. Because the UE was attached before, a TMSI is used. 
47 1 jolly
48
If the mobile station was not registered to the MME, the MME will request identity and authentication and send "Attach Request" again after enabling encryption
49
50
h3. "Identity request" and "Identity response"
51 24 jolly
52 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_identity_request.png, size=1000)}}
53 24 jolly
54 30 jolly
Because identity is not know, the MME requests IMSI, as . (The MME was restartet before this trace, so that the TMSI is unknown.)
55 1 jolly
56 34 jolly
The MME sends an "Identity request" to the UE. The "NAS-PDU" message type is highlighted blue in the picture above. The identity type requested is highlighted light blue in the picture above.
57
58 1 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_identity_response.png, size=1000)}}
59
60 35 jolly
The MME receives the response with IMSI. Again, the "NAS-PDU" message type is highlighted blue in the picture above. The mobile identity is highlighted light blue in the picture above. The IMSI is now known to the MME.
61 31 jolly
62 24 jolly
h3. "Authentication request" and "Authentication response"
63
64 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_authentication_request.png, size=1000)}}
65 1 jolly
66 35 jolly
The MME sends an "Authentication request" to the UE. The "NAS-PDU" message type is highlighted blue in the picture above.
67 1 jolly
68 35 jolly
A random value "RAND" and authentication parameters "AUTN" are used to request authentication from UE.
69
70 1 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_authentication_response.png, size=1000)}}
71 35 jolly
72
The UE sends an "Authentication response" to the UE. The "NAS-PDU" message type is highlighted blue in the picture above.
73
74
The result "RES" is returned to the MME. (Highlighted light blue in the picture above.)
75 28 jolly
76 24 jolly
The subsequent “Security mode command” and “Security mode complete” messages are not depicted. The latter message is sent after encryption between UE and eNodeB is enabled. The message also carries the Attach request again.
77
78
h3. "ESM information request" and "ESM information response"
79
80 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_ESM_infomation_request.png, size=1000)}}
81 1 jolly
82
The MME sends an "ESM information request" to the UE, to request APN name. The "NAS-PDU" message type is highlighted blue in the picture above.
83 16 jolly
 
84 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_ESM_infomation_response.png, size=1000)}}
85 19 jolly
86 1 jolly
The UE send an "ESM information response." The UE uses the APN name "internet". The "NAS-PDU" message type is highlighted blue in the picture above.
87 18 jolly
88
This is the default configuration in the example setup. It can be configured in the configuration file for OsmoHLR. (osmo-hlr.cfg)
89 14 jolly
90
91 24 jolly
h3. "Attach accept"
92 1 jolly
93 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_attach_accept.png, size=1000)}}
94 20 jolly
95 21 jolly
The MME sends an "Attach accept" to the UE. The "NAS-PDU" message type is highlighted blue in the picture above.
96 1 jolly
97 20 jolly
Also within the “NAS-PDU” is an “ESM message container” with an “EPS session management message” to activate the default EPS bearer context. (Highlighted light blue in the picture above.)
98
99 1 jolly
The subsequent “InitialContextSetupResponse” and “UECapabilityInfoIndication” messages are not depicted. The latter message contains capabilities of the UE.
100 20 jolly
101 1 jolly
h3. "Attach complete"
102 24 jolly
103 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_attach_attach_complete.png, size=1000)}}
104 1 jolly
105 20 jolly
Finally the UE sends an "Attach complete". The "NAS-PDU" message type is highlighted blue in the picture above.
106
107 36 jolly
Also within the “NAS-PDU” is an “ESM message container” with an “Activate default EPS bearer context accept”. (Highlighted light blue in the picture above.)
108 20 jolly
109
h2. Packet transfer
110
111 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_gtp_1.png, size=1000)}}
112 20 jolly
113 1 jolly
The "GPRS Tunneling Protocol" (GTP) is used to tunnel packet traffic of the user plane. between eNodeB and SGW.
114 20 jolly
115 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_gtp_2.png, size=1000)}}
116 20 jolly
117 21 jolly
As depicted above, the GTP packet transmitted from the eNodeB (IP 10.0.15.117) to the SGW (IP 10.0.15.3).
118 20 jolly
119 1 jolly
The carried packet is transmitted from the UE (IP 10.0.6.2) to the destination in the Internet (IP 104.26.15.42)
120 20 jolly
121 1 jolly
122 23 jolly
h2. 4G Detachment
123
124 26 jolly
!enb_detach.png!
125 1 jolly
126 20 jolly
The 4G phone is turned off or the airplane mode is turned on. The phone detaches from network.
127 10 jolly
128 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_detach.png, size=1000)}}
129 14 jolly
130 1 jolly
Lets go into detail:
131 14 jolly
132 26 jolly
133 25 jolly
h3. "Detach Request"
134 1 jolly
135 33 jolly
p{border: solid 1px #000; padding: 0.5em;}. {{thumbnail(wireshark_enb_detach_detach_request.png, size=1000)}}
136 21 jolly
137
Similar to the "Attach request", described above, the UE sends an "Detach request". It is the message type of the "NAS-PDU" information element of the "initiatingMessage". The "NAS-PDU" message type is highlighted blue in the picture above.
138
139
Also within the "NAS-PDU" is the "EPS mobile identity". This is also similar to the "Attach request".
140 1 jolly
141
The subsequent “UEContextReleaseCommand” message (sent from EMM) and “UEContextREleaseComplete” messages (sent from UE) are not depicted.
142 26 jolly
143
144
h2. Attachment inside EPC
145
146
!epc_attach.png!
147
148
After authentication is done and after receiving ESM information (e.g. APN), a session is created between network elements inside the Envolved Packet Code (EPC).
149
150 28 jolly
{{thumbnail(wireshark_epc_attach.png, size=1000)}}
151 26 jolly
152
h3. MME -> SGWc
153
154
As depicted in the Wireshark picture above, the MME sends "Create Session Request" towards the control plane of the SGW. The GPRS tunneling protocol (GTP) is used. The request is depicted at frame number 254, the response at frame number 266.
155
156
h3. SGWc -> SGWu
157
158
After receiving the "Create Session Request" from the MME, the control plane of the SGW sends a "PFCP Session Establishment Request" to the user plane of the SGW. The packet forwarding control protocol (PFCP) is used. The request is depicted at frame number 255, the response at frame number 257.
159
160
h3. SGWc -> PGWc
161
162
The control plane of the SGW also sends a "Create Session Request" to the control plane of the PGW. The GPRS tunneling protocol (GTP) is used here again. The request is depicted at frame number 258, the response at frame number 263.
163
164
h3. PGWc -> PCRF
165
166
The control plane of the PGW sends a "Credit-Control Request" to the PCRF. The Diameter protocol is used. The request is depicted at frame number 259, the answer at frame number 260.
167
168
h3. PGWc -> PGWu
169
170
After receiving the "Credit-Control Answer" from the PCRF, the control plane of the PGW sends a "PFCP Session Establishment Request" to the user plane of the PGW. The packet forwarding control protocol (PFCP) is used here again. The request is depicted at frame number 261, the response at frame number 262.
171
172
h3. SGWc -> SGWu
173
174
After receiving the "Create Session Response" from the control plane of the PGW, the control plane of the SGW sends a "PFCP Session Modification Request" to the user plane of the SGW. The packet forwarding control protocol (PFCP) is used here again. The request is depicted at frame number 264, the response at frame number 265.
Add picture from clipboard (Maximum size: 48.8 MB)