Professional Documents
Culture Documents
improving
performance
inStudent:
IMS networks
Communications
Alexandros Fragkopoulos
Technologies &
Group Number: 12GR890
Entrepreneurship
8
t h
Semester
Supervisors:
Abstract
During the last decades the development and improvement of
telecommunications is massive. If one considers how long ago the
telephone was a privilege that only a few possessed, then one can see the
big onward steps technology has made. In this rapid rhythm of
technological advances, people demanded to be connected more and
more time until they reached the point that they want anywhere and
anytime full access into the digital world. It either serves their needs for
work or entertainment. Looking in this direction, research has been made
the last years on the development of efficient usage of the internet
services via smartphones or any other portable device and through any
type of network. An important issue that has to be solved and clarified is
how does someone utilize same services through all these different
technologies (old and new, complex and simple, wired and wireless
oriented)? And if one manages to do that, then who is benefited from that?
All these questions bring more and more issues on the surface. In an effort
to address all these issues the IMS framework has been created. Although
it is relatively still new as a framework, numerous benefits have been
discovered through research for this network. IMS networks help to
interconnect devices through different technologies and still provide the
same quality and number of services. In this way users are satisfied by the
operators and operators find the opportunity to setup a unified charging
policy (through the IMS network) that will help them increase their profits.
This project though, is being focused on the performance of these
networks from the point of improving them but also defining what are the
most important KPIs that depict weaknesses in performance issues.
Concerning the part of improvement, some ideas from two papers are
being presented and an approach of them is being implemented. In the
end of this project some results from simulations are derived and
discussed. Last but not least is a small reference to the future technologies
such LTE and LTE-A.
Alexandros Fragkopoulos
ICTE 8
Table of Contents
Abstract....................................................................................................... 1
List of Figures.............................................................................................. 3
List of Tables................................................................................................ 3
List of Abbreviations.................................................................................... 3
Chapter 1 Introduction..............................................................................5
Chapter 2 - IMS............................................................................................ 7
2.1 Why IMS?............................................................................................ 7
2.2 3GPP: Requirements and Standards...................................................7
2.3 IMS Architecture................................................................................. 9
2.4 Entities inside an IMS.......................................................................10
Chapter 3 Analysis..................................................................................15
3.1 State of the art................................................................................. 15
3.2 Performance in IMS services.............................................................16
3.3 KPIs for the IMS network..................................................................17
3.3.1 Accessibility KPIs........................................................................17
3.3.2 Retainability and Utilization KPIs................................................19
Chapter 4 Design.................................................................................... 20
4.1 First use case................................................................................... 20
4.2 Second use case...............................................................................21
4.3 Improving performance in IMS networks..........................................22
Chapter 5 Implementation......................................................................23
5.1 Description of the algorithm.............................................................23
5.2 Figures and Results..........................................................................25
5.3 Results Analysis...............................................................................28
Chapter 6 Conclusions............................................................................ 30
6.1 Future Vision in Communication Technologies..................................30
Bibliography.............................................................................................. 31
Alexandros Fragkopoulos
ICTE 8
List of Figures
Figure
Figure
Figure
Figure
Figure
Figure
Figure
1
2
3
4
5
6
7
List of Tables
Table 1 Acquisition of data from the simulations....................................28
List of Abbreviations
PSTN
IP
DSL
3G
4G
IMS
3GPP
VoIP
QoS
QoE
GPRS
LAN
WCDMA
WLAN
WiMAX
OFDM
Flash-OFDM
LTE
CSCF
HSS
P-CSCF
I-CSCF
S-CSCF
E-CSCF
Alexandros Fragkopoulos
ICTE 8
AS
SIP
SLF
MGCF
BGCF
DL
UL
SISO
MIMO
CS
CSN
NACF
IP-CAN
UE
UA
CLF
CN
RAN
Application Server
Session Initiation Protocol
Subscriber Location Function
Media Gateway Control Function
Breakout Gateway Control Function
Download
Upload
Single Input Single Output
Multiple Input, Multiple Output
Circuit Switched
Circuit Switched Network
Network Attachment Control Function
IP Connectivity Access Network
User Equipment
User Agent
Connectivity Session Location and Repository Function
Core Network
Radio Access Network
Alexandros Fragkopoulos
ICTE 8
Chapter 1 Introduction
Telecommunications is a very valuable and indispensable part of peoples
lives. In every aspect of everyday life there is an increasing need to
communicate with people that are far from someone. This need started in
the ancient times for different reasons and purposes than nowadays. Since
then it developed and today weve reached to a point that
telecommunications is a very important part of our work, lives and also
free time activities. Since telecommunications is so important in various
different levels, there has being great effort to combine different types of
telecommunications.
In
reality
combining
different
types
of
telecommunications is much more complicated than it looks like. There are
old (PSTN) and new (IP networks) technologies that have to be combined.
Another factor should also be met and that is the combination of wired
(DSL) and wireless networks (3g/4g). An effort in combining all these
networks, technologies, mediums etc. under one architecture is called IMS
(IP Multimedia Subsystem) networks. In the evolving world of
telecommunications the need for creating converged networks has
prevailed and the IMS networks pointing to this direction. Although they
already operate in many places of the world many things still remain
unsolved.
This project will give an insight on how IMS networks function, which are
their features but also which are their advantages and disadvantages in
combining different technologies. Furthermore, there will be an analysis on
how does someone monitor performance on these networks and which are
the challenges. Significant key factor in performance of the networks is
security but this project will not get into security issues.
Motivation
IMS networks seem to be the next big thing in the market of
telecommunications from the point of combining different technologies
and exchange content between them, making our communication
experience richer and the technologies interoperable. Since IMS are in the
center of attention, industry is pushing through R&D (research and
development) for improvement of these networks and defining some
aspects of them that are not yet so well defined, such as performance or
security. By allowing this act as an incentive, this project focuses on
matters of performance. Performance is quite important in general but
specifically in IMS networks, performance is really important since it needs
to:
Alexandros Fragkopoulos
ICTE 8
1. Be
well
defined.
Which
are
the
performance
characteristics that affect an IMS network and why.
2. How could one improve the performance on a framework
that uses different technologies?
By monitoring and better understanding of the ideas behind performance
and control, one would be able to set the best parameters or make the
most optimum alterations in order to have the best possible results, and
thus efficiency in a network that has IMS functionality. Thus, this project is
trying to address some issues in two entities of the IMS networks, the
Proxy-CSCF and the Server-CSCF. There is still space for improvement
there and by investigating some alternatives on how the user could get
connected in these two entities; one could derive useful information
concerning the general improvement of the IMS.
Problem Formulation
Performance in IMS networks is of vital importance as the wireless
networks and services becoming more demanding and QoS needs to be
increased. The idea is that in this project there will be a description of the
main KPIs (Key Performance Indicators) and then there will be an effort to
determine how some changes in the parameters of the IMS or some extra
attention in the aforementioned entities could increase their efficiency and
performance. This will be done by the introduction of different cases for
the same problem and then there will be a discussion on which approach
fitted better and why.
Alexandros Fragkopoulos
ICTE 8
Chapter 2 - IMS
In this chapter there will be an analytical description of what is an IMS
through investigation of why do we need it , which are its requirements
and how does its entities function. There will also be examples of how the
services are provided to the end users in certain cases.
Alexandros Fragkopoulos
ICTE 8
All of the above requirements bring a unified structure for all different
applications and benefit users, vendors and operators in different ways
each of them.
Alexandros Fragkopoulos
ICTE 8
Alexandros Fragkopoulos
ICTE 8
SIP in IMS
SIP (Session Initiation Protocol) is the most important signaling protocol of
the IMS. SIP is used for arranging sessions and establishes them but also
manages and controls them. Basically, in the Control and Signaling layers
are the places where this protocol is mostly used. The SIP protocol is
based in requests and acknowledgements or rejections. These messages
are sent in the form of a number and a word summarizes the function of
the message. These numbers are three digits long and the first digit gives
information about the type of the message. Below are presented the six
different types of messages:
1xx: Provisional Messages
2xx: Successful answers
3xx: Redirection Answers
4xx: Method Failures
5xx: Server Failures
Alexandros Fragkopoulos
10
ICTE 8
CSCF
Call/Session Control Functions are components that make use of SIP
signaling and help in various cases such as establishment, monitoring
and controlling sessions and are consisted of P-CSCF, I-CSCF, S-CSCF, ECSCF. Generally, CSCF is responsible for the following matters:
P-CSCF
The Proxy-CSCF is the component that makes the direct communication
with the user. Any IMS requests from the user are routed to a P-CSCF node,
through a RAN (Radio Access Network) or a WLAN or in general any other
type of network and from the P-CSCF node to an S-CSCF node. P-CSCF
features are SIP compression (SigComp (Signaling Compression)),
interaction with PCRF and establishment a mutual authenticated
communication with the user with the help of IPsec [5]. SigComp is used
because if the available bandwidth is low, then the establishment of the
connection will take a long time to be completed. In order to avoid that, a
compression method is used [1].
I-CSCF
The Interrogating-CSCF is responsible for querying the HSS to assign an SCSCF node to the user that have communicated with the P-CSCF, and by
querying the HSS, then the HSS assigns an S-CSCF to the user/subscriber.
The I-CSCF together with P-CSCF were also enrolled to hide the rest of the
IMS network from the users and making a hiding topology but that
happened until the 7th release of 3GPP. Thereafter, these two elements
Alexandros Fragkopoulos
11
ICTE 8
stopped having this function and became part of the IBCF (Interconnection
Border Control Function) [5], [6].
S-CSCF
The responsibilities of the Serving-CSCF are about: maintaining sessions,
decisions on how to route data, storage of service profiles and handling for
the SIP registrations coming from the subscriber. The S-CSCF checks in the
HSS whether the user is authenticated to perform a certain registration for
a certain service. After the HSSs approval, the S-CSCF continues to
monitor the registration [5]. Another important process that is used by the
S-CSCF in order to provide routing services and support the connectivity
with older technologies such as PSTN or ISDN is ENUM (E.164 Number
Mapping). ENUM is used to interconnect the telephone number based
systems (such as PSTN) to the URIs based system (such as SIP protocol).
This function is managed by ENUM with the translation of telephone
numbers into URIs. E in ENUM stands for E.164 ITU-T standard for
international numbering where all globally-reachable telephone numbers
are registered and organized [7].
E-CSCF
The Emergency-CSCF is a newer component in the control functions and is
responsible for controlling the request of an emergency call. The
subscriber is calling an emergency number and the SIP request is being
directed directly to the E-CSCF through the SGSN (Serving GPRS Support
Node). Information concerning the users location is also important and
that is the responsibility of HSS and GMLC (Gateway Mobile Location
Center) collaborating to locate the SGSN and send the information to the
E-CSCF and then to determine which is the closest PSAP (Public Safety
Answering Point) [8].
Alexandros Fragkopoulos
12
ICTE 8
circuit switched network. The interwork with the circuit switched network
is accomplished by the use, from both sides, of a circuit switched signaling
over IP.
Finally, the control function of the BGCF is actually choosing which MGCF
will handle the session, whether it is in the same domain or in a different
one, where, in the latter case, it directs the SIP request to the desired
BGCF [1].
Alexandros Fragkopoulos
13
ICTE 8
SIPs Functionality
In Figure 2 it is presented how SIP signaling will function in order to
establish a session.
Alexandros Fragkopoulos
14
ICTE 8
Initially, there is a SIP Invite request to the P-CSCF entity. This entity sends
the request to the S-CSCF that the HSS assigned the user to. Then, the
request is being forwarded to the I-CSCF where this entity queries HSS for
information about the other S-CSCF. The query is sent to the HSS with the
aid of DIAMETER protocol. After a successful reply from the HSS, the ICSCF connects with the other S-CSCF that makes an evaluation of the
users filters and controls whether it needs an AS invocation or not.
Afterwards, the request is being forwarded to the user through the P-CSCF
that is assigned for it. After the process is completed and before the
establishment of the session, a provisional response is sent and at that
time both terminals try to reserve resource from their access network. In
this way there is an effort to reassure QoS during the initiation of the
session. After the QoS is achieved the terminal starts ringing and the
session is established. The example shown above describes a successful
establishment of a Voice session scenario between two terminals through
the IMS network [1].
Alexandros Fragkopoulos
15
ICTE 8
Chapter 3 Analysis
In this chapter there will be a reference to state of the art work which is
happening in the field of IMS. There will also be a detailed explanation of
all important KPIs that play an important role in improving IMS networks
and how to estimate the improvement accurately.
Alexandros Fragkopoulos
16
ICTE 8
that 50%, 90%, 95% or 99% of the service was handled smoothly. So one
could see where the time was increased and under which circumstances
(what amount of workload).
The last work that is presented here is entirely based on internal
performance of the IMS core network. According to [11] there have been
several tests regarding different issues in an IMS core network. The first
test determined some performance factors by increasing the number of
simultaneous calls/sec. It was observed that as long the server could
handle the routing of more calls everything were steadily increasing. The
number of calls/sec was increasing and the processor load was increasing
too; until the point that the number of simultaneous calls/sec reached to
the value of 150 and the server rebooted due to overloading. Throughout
the test, the memory utilization didnt exceed 65%. The second test was
more focused into security and robustness matters by sending malformed
INVITE requests. The messages were sent either to the UA (User Agent) or
the SIP proxy server. These messages were containing exceptional
elements; that is, data that could arise undesired behavior to the receiving
point as the device or process could crash, or needed to be rebooted
manually or consume a considerable amount of memory and/or CPU for a
fair or infinite amount of time. If one of the above actions takes place, the
test fails. The third and last test that was introduced in this paper
evaluated the behavior and the response of the system when sending SIP
requests. The test cases that were used are introduced in the ETSI TS 102
027-2 V4.1.1. The test cases included messaging, call control and querying
capabilities series. The conclusions that were drawn showed that all three
tests passed successfully. The first one determined the maximum amount
of simultaneous routable calls and it could be used to benchmark the
capacity of different vendors. The second one passed the test, as there
was no failure to the devices or the services due to malformed messages.
The third test finished also successfully and the responses were correct
according to the RFC 3161 standard.
Alexandros Fragkopoulos
17
ICTE 8
18
ICTE 8
This KPI evaluates the success rate concerning the number of successful
registrations to the S-CSCF over the number of attempted registrations.
This evaluation aids to control the accessibility of the network [12].
Alexandros Fragkopoulos
19
ICTE 8
Alexandros Fragkopoulos
20
ICTE 8
This KPI helps for the evaluation of the retainability of the sessions. In
order to calculate this rate, the fraction would be the amount of dropped
sessions over the number of successful ones. This is also an important key
indicator but doesnt give a lot of insight as to where could be the
problem. It indicates performance matters that could be caused by the IMS
network or the user side [12].
Mean Session Utilization
This KPI tries to address the utilization of the network by calculating the
mean number of simultaneously online and answered sessions over the
capacity of the network. This indicator reflects the relation between the
size of the network and the utilization of it. So, in case this number is low,
this gives an indicator that the network is utilized up to a good level [12].
Alexandros Fragkopoulos
21
ICTE 8
Chapter 4 Design
All the KPIs in the chapter above test the performance of the IMS
networks from different aspects and from different technologies that
cooperate with the IMS networks. In this chapter the project will move one
step further and provide an insight to what exactly is happening when the
network reaches its limitations. From that point and after, its entities
become unstable and the whole system cant provide services until it
reboots or until it overcomes the overload of the processor. There will also
be an analysis on how the sessions are directed into the IMS when
balancing a load of calls and what is happening while trying to establish
the nearest P-CSCF in a network. Both cases mentioned will be
represented by two scenarios.
Solution
As stated in [13] I-CSCF is responsible for assigning the users to an S-CSCF
but the control for an overloaded S-CSCF comes afterwards. That means
that a I-CSCF directs a user to the S-CSCF and if the S-CSCF node become
overloaded then the I-CSCF starts de-register users from there and
registers them to another S-CSCF node. The problem that derives from this
action is low performance and a possibility that the user will be assigned
again at the same S-CSCF node as it will not seem to be overloaded after a
Alexandros Fragkopoulos
22
ICTE 8
Solution
In [14] they propose a model based on two individual things. Initially, the
idea is that every P-CSCF will be characterized by two factors: firstly a
Alexandros Fragkopoulos
23
ICTE 8
Alexandros Fragkopoulos
24
ICTE 8
introduction of both changes are much greater, and these are speed,
reliability and higher utilization of the network.
Alexandros Fragkopoulos
25
ICTE 8
Chapter 5 Implementation
After having analyzed many different aspects of the IMS networks and
presented two papers that actually propose improvements in two
important entities of the IMS framework, the project will go further in
presenting an implementation inspired by these two proposals mentioned
in the two different use cases in chapter 4. In this chapter the
implementation will be shown and important aspects of it will be
discussed. Results will also be given and compared with different cases.
Alexandros Fragkopoulos
26
ICTE 8
Alexandros Fragkopoulos
27
ICTE 8
Alexandros Fragkopoulos
28
ICTE 8
First Case
In this scenario (Figure 3) the user is connected with a random selection of
a P-CSCF and a random selection of a S-CSCF.
Alexandros Fragkopoulos
29
ICTE 8
Second Case
In this scenario (Figure 4) the user is connected with a selection based on
the minimum possible delay to a P-CSCF and a random selection of an SCSCF.
Alexandros Fragkopoulos
30
ICTE 8
Third Case
In this scenario (Figure 5) the user is connected with a selection based on
the minimum possible delay to a P-CSCF and a selection based on the
minimum possible delay to a S-CSCF.
Alexandros Fragkopoulos
31
ICTE 8
Fourth Case
In this scenario (Figure 6) the user is connected with a random selection of
a P-CSCF and a selection based on the minimum possible delay to a SCSCF.
Users Connected
Elapsed Time
Alexandros Fragkopoulos
First
Case
195
111.392
2
Second
Case
183
Third
Case
193
Fourth
Case
200
75.7921
70.5785
110.5606
32
ICTE 8
Average
Time
Connection
1.4659
1.0588
0.6169
1.1107
In most of the cases (except the total number of connected users), the
third case (selection of node with minimum delay in both P-CSCF & S-CSCF
entities) is better. The performance of this approach of an IMS network is
improved by applying the selection of a node based on its minimum delay
in both P-CSCF and S-CSCF.
The following figure (Figure 7) derived from the sum of the normalized
values of the table above and shows clearly which case achieves the best
results.
2.03
1.75
1.5
1.49
1.09
1
0.5
0
First Case
Second Case
Third Case
Fourth Case
As it was stated above, the algorithm in the third case decreased the delay
by 46.22% from the first case where every selection in each entity was
random. The only parameter that the first case had exceeded by the third
was the number of users that assigned during the process but the
difference was only 1.01% more users compared to the third one. The third
case had also an exceptional average time of connection (until an S-CSCF)
for each user (57.91% lower delay from the first case) since the algorithm
was searching in both entities the connection path with the lowest
available delay factor. Even the elapsed time for the algorithm to finish
directing all the users to the available slots, was smaller than all the other
cases. With respect to the first case the third case was faster by 36.64%.
Alexandros Fragkopoulos
33
ICTE 8
The overall behavior of the customization in the third case is the optimal
one in respect to the other three cases.
Alexandros Fragkopoulos
34
ICTE 8
Chapter 6 Conclusions
Along this report many topics were discussed concerning the IMS
networks. Moreover, two papers were presented and a suggestion that the
combination of them could improve even more the IMS framework, in
terms of performance and reliability, was given. Finally, an approach
inspired from these two papers was introduced and some results derived,
showing that in a system where randomness is narrowed down and
information is exchanged, the system becomes more reliable and faster so
the final user experience and the QoS are increased. The only
disadvantage in order to exchange information that will make the system
more intelligent, flexible and more reliable, is that one has to add
overhead in messages. In the next subchapter there will be a reference to
the LTE and LTE-A networks and what users should expect in the near
future.
35
ICTE 8
Alexandros Fragkopoulos
36
ICTE 8
Bibliography
1. Shyam Chakraborty, Tomas Frankkila, Janne Peisa, Per
Synnergren. IMS Multimedia Telephony over Cellular Systems. s.l. : John
Wiley & Sons, Ltd., 2007.
2. Challenges to the Next Generation Services in IP Multimedia Subsystem.
Kai-Di Chang, Chi-Yuan Chen,Jiann-Liang Chen, Han-Chieh Chao. 2,
s.l. : Journal of Information Processing Systems, 2010, Vol. 6. 1976-913X.
3. SIP Messages. Voip Think. [Online] [Cited: April 26, 2012.]
http://www.en.voipforo.com/SIP/SIP_messages.php.
4. Himanshu Pant, Andrew R. McGee, Uma Chandrashekhar,
Steven H. Richman. Optimal Availability and Security for IMS-Based VoIP
Networks. Bell Labs Technical Journal. 2006, Vols. 11(3), 211223.
5. Call and Messaging Performance Comparison Between IMS and SIP
Networks. Jari Kellokoski, Erno Tukia, Eero Wallenius, Timo
Hmlien. Jyvskyl : IEEE, 2010.
6. IMS interworking using IBCF . R. Vargic, Krhla M., Schumann S.,
Kotuliak I. s.l. : Convergence and Hybrid Information Technology, 2008.
ICCIT '08. Third International Conference, 2008, Vols. 2 (89-94).
7. J. Peterson, H. Liu, J. Yu, B. Campbell. IETF Documents. [Online]
June 2004. [Cited: April 26, 2012.] http://tools.ietf.org/html/rfc3824.
8. Active location reporting for emergency call in UMTS IP multimedia
subsystem. Meng-Hsun Tsai, Yi-Bing Lin, Hsiao-Han Wang. 12 (5837 5843 ), s.l. : Wireless Communications, IEEE Transactions on, 2009, Vol. 8.
9. Asif, Saad Z. Next Generation Mobile Communications Ecosystem Technology Management for Mobile Communications. s.l. : John Wiley and
Sons, Ltd., 2011. 9780470747469.
10. Performance Analysis of IP Multimedia Subsystem (IMS) Signaling in
Heterogenous Access Networks. Shyam S.Wagle, Nikolaos Doulamis,
Minesh Ade, M. Ghazanfar Ullah. 2011 : IEEE.
11. IP-Multimedia Subsystem (IMS) Performance Evaluation and
Benchmarking. Wagdy A. Aziz, Salwa H. EL-Ramly, Magdy M.
Ibrahim. Irkutsk Listvyanka : IEEE Region 8 SIBIRCON-2010, 2010.
12. Project, 3rd Generation Partnership. 3GPP TS 32.454 V11.0.0
(2011-12) (11th Release). s.l. : 3rd Generation Partnership Project, 201112.
13. Notification based S-CSCF load Balancing in IMS Networks. Isam
Abdalla, S. Venkatesan. Dallas : IEEE, 2011.
Alexandros Fragkopoulos
37
ICTE 8
Alexandros Fragkopoulos
38
ICTE 8