Design and Analysis of Ip Multimedia Subsystem I Ms
Design and Analysis of Ip Multimedia Subsystem I Ms
net/publication/263778191
CITATIONS READS
0 8,095
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
High Availability Solution over Hybrid Cloud Using Failover Clustering Feature View project
Performance Evaluation of VoWiFi (Voice over WiFi) Using IMS (IP Multimedia Subsystem) View project
All content following this page was uploaded by Wagdy Anis Aziz on 10 July 2014.
Submitted by
Supervised by
Prof . Dr. Salwa Hussein El-Ramly Prof . Dr. Magdy Mahmoud Ibrahim
Professor of Communication Engineering Professor of Communication Engineering
Electronics and Communication Engineering Dept. Electronics and Communication Engineering Dept.
Faculty of Engineering Faculty of Engineering
Ain Shams Univeristy Ain Shams Univeristy
Cairo 2011
STATEMENT
This thesis is submitted to Ain Shams University for the degree of Doctor of
Philosophy in Electrical Engineering (Electronics and communication Engineering)
The work included in this thesis was carried out by the author in the Department of
Electronics and Communication Engineering, Ain Shams University.
No Part of this thesis has been submitted for a degree or a qualification at any other
university or institute.
i
ABSTRACT
Key words:
U
i
Thesis supervisor:
v
PUBLICATION ARISING FROM THIS THESIS
JOURNAL PAPERS
v
CONFERENCE PAPERS (FULLY REFEREED)
i
Table of Contents
Acknowledgment i
Abstract ii
Publication Arising From This Thesis v
Table of Contents vii
List of Figures xiv
List of Tables xvii
List of Abbreviations xviii
CHAPTER 1 1
INTRODUCTION AND MOTIVATION
1.1 Introduction 1
1.2 Problem Statement 3
1.3 Thesis Contribution 3
1.4 Thesis Structure 4
CHAPTER 2 5
TELEPHONY EVOLUTION
2.1 Introduction 5
2.2 Motivation 6
2.3 Today’s Story-Exiting Technologies 9
2.3.1 GSM 10
2.3.2 GPRS 10
2.3.3 UMTS 11
2.4 Next Story-IP Multimedia Subsystem 11
2.4.1 Requirements of Communication Market 11
2.4.1.1 User Requirements 11
2.4.1.2 Enterprise Requirements 13
2.4.1.3 Operator Requirements 14
2.4.2 What is IMS? 15
2.4.3 IMS Architecture Overview 16
2.4.4 IMS Major Components 17
CHAPTER 3 18
IP MULTIMEDIA SUBSYSTEM (IMS) ARCHITECTURE
3.1 Introduction 18
3.2 History 19
3.3 IMS Architecture 20
3.3.1 Access Network 21
3.3.2 Subscriber and User Equipment(UE) 23
3.3.2.1 User and Service in IMS 23
3.3.2.2 Subscriber Identity Modules (SIM) 25
3.3.2.3 Generation and Storage of User Identities 28
3.3.3 Signaling Components 29
3.3.3.1 Proxy Call Session Control Function (P-CSCF) 29
3.3.3.2 Interrogating Call Session Control Function (I-CSCF) 29
3.3.3.3 Serving Call Session Control Function (I-CSCF) 29
3.3.4 Interworking Components 30
3.3.4.1 Interconnection Border Control Function (IBCF) 31
3.3.4.2 Border Gateway Control Function (BGCF) 33
3.3.4.3 Media Gateway Control Function (MGCF) 34
3.3.4.4 Signaling Gateway (SGW)\ 34
3.3.4.5 Media Gateway (MGW) 34
3.3.5 QoS Related Components 35
3.3.6 Application and Service Provisioning Related Components 36
3.3.7 Database Related components 38
3.3.8 Charging in IMS 38
CHAPTER 4 41
IP MULTIMEDIA SUBSYSTEM (IMS) SIGNALING
ANALYSIS
4.1 Introduction 41
4.2 Protocols Used in IMS 41
4.2.1 Session Initiation Protocol (SIP) 41
4.2.1.1SIP Network Elements 42
4.2.1.1.1 User Agent (UA) 42
4.2.1.1.2 SIP Servers 42
4.2.1.2 SIP Request 44
4.2.1.2.1 INVITE 44
4.2.1.2.2 BYE 45
4.2.1.2.3 CANCEL 45
4.2.1.2.4 REGISTER 45
4.2.1.2.5 OPTIONS 46
4.2.1.3 SIP Response 46
4.2.1.4 SIP Session Setup 46
4.2.2 SIP in IMS 48
4.2.3Session Description Protocol (SDP) 48
4.2.4 Real-time Transport Protocol(RTP) 49
4.2.5 Real-time Transport Control Protocol(RTCP) 49
4.2.6 The Secure Real-time Transport Protocol (SRTP) 50
4.2.7 Diameter 50
4.3 IMS Interfaces or Reference Points 50
CHAPTER 5 54
CAPACITY MEASUREMENT FOR IMS CONTROLLERS
5.1 Introduction 54
5.2 Related Work 54
5.3 Experimental Test Bed 56
5.3.1 SIP Server Software 57
5.3.2 SIP Client Workload Generator 57
5.3.3 Client and Server OS Software 57
5.3.4 Hardware and Connectivity 57
x
5.3.5 Experiments and Metrics 58
5.3.6 Restrictions, Limitations and Scope 58
5.4 Measurement Scenario 58
5.5 Results 60
5.6 Conclusion 64
CHAPTER 6 66
IP MULTIMEDIA PERFORMANCE EVALUATION
6.1 Introduction 66
6.2 Related Work 66
6.3 New Proposed Methods for IMS Performance Evaluation 67
6.3.1 FUZZING Testing (PROTOS) 68
6.3.2 Testing with Spectra 2|SE 78
6.4 Conclusion 81
CHAPTER 7 83
IMS SESSION SETUP ANALYSIS
7.1 Introduction 83
7.2 Related Work 84
7.3 Background 86
7.3.1 IMS Architecture 86
7.3.2 SIP in IMS 88
7.3.2.1 INVITE-retransmissions 90
7.3.2.2 Non-INVITE-retransmissions 90
7.4 IMS Session Establishment Phases 90
7.4.1 INVITE / 100 Trying (1-14) 92
7.4.2 Session Progress 183 / PRACK (15-26) 92
7.4.3 PRACK/ 200 OK (22-31) 92
7.4.4 UPDATE / 200 OK (32-41) 93
7.4.5 Ringing 180 / PRACK (42-52) 93
7.4.6 PRACK/ 200 OK (48-57): 93
7.4.7 Final Response (200 OK) / ACK (58-68) 93
x
7.4.8 BYE / 200 OK 94
7.5 Modeling IMS Session Establishment 94
7.5.1 Modeling Retransmission of SIP Messages 94
7.5.1.1 Modeling the retransmission of the INVITE Request 94
7.5.1.2 Losses during INVITE Phase 97
7.5.1.3 Modeling the retransmission of the Non-INVITE Request 100
7.5.1.4 Losses during Non-INVITE phase 104
7.5.2 Bandwidth Consumption of IMS session establishment in a
Lossy Network 105
7.5.2.1 For INVITE/100 Trying phase 105
7.5.2.2 For Session Progress 183/PRACK /200 OK Phase 106
7.5.2.4 For UPDATE / 200 OK Phase 108
7.5.2.5 For Ringing 180 / PRACK / 200 OK Phase 108
7.5.2.6 For PRACK / 200 OK Phase 109
7.5.2.7 Final Response 200 OK / ACK Phase 109
7.5.2.9 Total Bandwidth Usage 110
7.5.3 Estimation of the IMS Session Establishment Delay 112
7.5.3.1 INVITE Phase Delay 112
7.5.3.2 Non-INVITE Phase Delay 113
7.5.3.3 Provisional Responses (183, 180) Delay 114
7.5.3.4 Total Delay 114
7.6 Conclusion 115
CHAPTER 8 116
VoIP Quality Optimization IN IMS Networks
8.1 Introduction 116
8.2 E-Model Parameters 118
8.3 The R-Factor 121
8.5 Description of E-Model Optimization 123
8.6 Assumptions for E-Model 124
8.6.1To Calculate The Delay Impairment Id 126
i
8.6.2 To Calculate Equipment Impairment Ie 126
8.7 Mapping R factor Into MOS Scale 128
8.8 IMS Architecture for VoIP Quality Optimization 128
8.9 Project Setup 130
8.9.1 IMS Network Topology 131
8.9.2 Project Simulation Parameters 132
8.10 Results 132
8.10.1 Case 1 - Optimizing for Coder Selection 133
8.10.2 Case 2 - Optimizing for Coder and Packet Loss Level 137
Selection
8.10.3 Case 3 – Optimizing for Coder and Background Link 141
Utilization
8.10.4 Discussion of E-Model Optimization Results 145
8.11 Proposal to Enhance the E-Model 147
8.12 Conclusion 150
CHAPTER 9 151
CONCLUSIONS AND FUTURE WORK
9.1 Conclusions 151
9.2 Future Work 153
REFERENCES 155
LIST OF FIGURES
Page
U
v
LIST OF TABLES
Table Page
U
i
HSPA high-speed packet access
HSS Home Subscriber Server
HTTP Hypertext Transport Protocol
IBCF Interconnection Border Control Function
ICS IMS centralized services
I-CSCF Interrogating-Call/Session Control Function
Id Delay Impairment Factor
IDE Integrated Development Environment
Ie Equipment Impairment Factor
IETF Internet Engineering Task Force
IK Integrity Key
IM Instant Messaging
IMS IP Multimedia Subsystem
IMSI International Mobile Subscriber Identity
IMS-MGW IP Multimedia Subsystem-Media Gateway
IM-SSF IP Multimedia Service Switching Function
INMD In-service Non-intrusive Measurement Device
IP Internet Protocol
IPsec IP Security
Is Simultaneous Impairment Factor
ISDN Integrated Service Digital Network
ISIM IP Multimedia Subscriber Identity Module
ISP Internet Service Provider
ISUP ISDN User Part
ISWC International Symposium on Wearable Computers
ITU International Telecommunication Union
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
LSTR Listener Side tone Rating
LTE 3GPP Long Term Evolution
MAA Multimedia Authentication Answer
MAR Multimedia Authentication Request
MC Multipoint Controller
MCU Multipoint Control Unit
MEGACO Media Gateway Control Protocol
MGCF Media Gateway Control Function
MIME Multipurpose Internet Mail Extension
MIP Mobile IP
MMD Multimedia Domain
MMTel IMS multimedia telephony services
MN Mobile Node
MNB Measuring Normalizing Blocks
MOS Mean Opinion Score
MP Multipoint Processor
MPA Mobile Phone Application
MRF Media Resource Function
MRFC Media Resource Function Controller
MRFP Multimedia Resource Function Processors
MSC Mobile Switching Center
MSRP Message Session Relay Protocol
MTU Maximum Transmit Unit
NAF Network Application Function
NAI Network Access Identifiers
NAT Network Address Translator
Nc Circuit Noise referred to 0 dBr-point
Nfor Noise Floor at the Receive Side
NINA Non-Intrusive Network Assessment
NIQA Non-Intrusive Quality Assessment
NNI network-to-network interface
NP Network Performance
OLR Overall Loudness Rating
OMA Open Mobile Alliance
OPEX operating expenses
OSA-SCS Open Service Access-Service Capability Server
PA Presence Agent
PAMS Perceptual Analysis Measurement System
x
PBX Private branch exchange
PC Personal computer
PCM Pulse Code Modulation
P-CSCF Proxy-Call Session Control Function
PDA Personal Digital Assistant
PDF Policy Decision Function
PDP Policy Decision Point
PDV Packet Delay Variation
PESQ Perceptual Evaluation of Speech Quality
PESQM Perceptual Echo and Sidetone Quality Measure
PGM Presence and Group Management
PLB Packet Loss Burst
PLC Packet Loss Concealment
PoC Push-to-Talk over Cellular
PoW Poor or Worse
Ppl Random Packet-loss Probability
Pr Room Noise at the Receive Side
PRACK Provisional Acknowledgement
PS Presence Server
Ps Room Noise at the Send Side
PSOM Perceptual Single-Ended Objective Measure
PSQM Perceptual Speech Quality Measurement
PSTN Public Switched Telephone Network
PTT Push-to-Talk
PUA Presence User Agent
qdu Number of Quantization Distortion Units
QoS Quality of Service
R Overall transmission quality rating
RAN Radio Access Network
RAND Random challenge
RCS Rich Communication Suite
RLR Receive Loudness Rating
RLS Resource List Server
Ro Basic signal to noise ratio
RPID Rich Presence Information Data Format
RSVP Resource Reservation Protocol
RTCP Real-Time Transport Control Protocol
RTP Real-time Transport Protocol
SAA Server Assignment Answer
SAR Server Assignment Request
SCN Switched Communication Networks
S-CSCF Serving- Call/Session Control Function
SCTP Stream Control Transmission Protocol
SDP Session Description Protocol
SGSN Serving GPRS Support node
SGW Signaling Gateway
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SLF Subscriber Location Function
SLR Send Loudness Rating
SMS Short Messaging Service
SMTP Simple Mail Transport Protocol
SNR Signal-to-Noise Ratio
SPP Serial Port Profile
SPU Signaling and Processing Unit
SQ Speech quality
SQN Sequence number
SQUAD Speech Quality Detector
SRTP Secure Real-time Transport Protocol
SR-VCC single radio voice call continuity
SSI Simple Sensor Interface
STMR Side tone Masking Rating
STQ Speech processing, transmission and quality aspects
T Mean one-way Delay of the Echo Path
Ta Absolute Delay in echo-free Connections
TCP Transmission Control Protocol
TELR Talker Echo Loudness Rating
THD Total Harmonic Distortion
TIA Telecommunications Industry Association
TIPHON Telecommunications and Internet Protocol Harmonization
Over Networks
TMNB Time Measuring Normalizing Blocks
ToS Type of Service
TOSQA Telecommunication Objective Speech Quality Assessment
Tr Round Trip Delay in a 4-wire Loop
TRU Transmit/Receive Unit
TTL Time to Live
UA User Agent
UAA User Authentication Answer
UAC User Agent Client
UAR User Authentication Request
UART Universal Asynchronous Receiver/Transmitter
UAS User Agent Server
UDP User Datagram Protocol
UE User Equipment
UICC Universal Integrated Circuit Card
UMTS Universal Mobile Telecommunications System
URI Uniform Resource Identifier
USIM Universal Subscriber Identity Module
UTRAN Umts Terrestrial Radio Access Network
VAD Voice Activity Detection
VLR Visited Location Register
VoIP Voice transmission over the Internet Protocol
VPN Virtual Private Network
WAN Wide Area Network
WCBQ Weighted Class Based Queuing
WEPL Weighted Echo Path Loss
WFQ Weighted Fair Queuing
XCAP XML Configuration Access Protocol
i
XDMC XML Document Management Client
XDMS XML Document Management Server
XML Extensible Mark up Language
XRES Expected Response
Chapter 1 Introduction and Motivation
CHAPTER 1
INTRODUCTION AND MOTIVATION
1.1 Introduction
The Internet and mobile telephony services have been the two major
driving forces in the communication area in the last twenty years. On the one
side, the Internet has evolved from a tool for research and academia to a
commodity that is the basis for entertainment, communication and data
exchange in various aspects of our daily life today. Mobile phones, on the
other side have moved from an expensive gadget available only to a few
people to an affordable appliance that is used by people of various ages,
nationalities and wealth.
The IP Multimedia Subsystem (IMS) has resulted from the work of the
Third Generation Partnership Project (3GPP) toward specifying an all-IP
communication service infrastructure. The 3GPP is a collaboration agreement
that was established in December 1998 between a numbers of
telecommunications standards bodies. Mainly looking at the needs and
requirements of mobile operators, the 3GPP first specified IMS as a service
architecture combining the Internet’s IP technology and wireless and mobility
services of current mobile telephony networks. 3GPP has introduced IMS in
few phases (release 5, 6, 7 and release 8) [1-6]. Through the work of the
Telecoms and Internet converged Services and Protocols for Advanced
Networks (TISPAN), the IMS architecture was extended to include fixed
networks as well.
1
Chapter 1 Introduction and Motivation
The IMS concept was introduced to address the following network and
user requirements:
Therefore, the IMS is the technology that will merge the Internet
(packet switching) with the cellular world (circuit switching). It will make
Internet technologies, such as the web, email, instant messaging, presence, and
videoconferencing available nearly everywhere. One of the reasons for
creating the IMS was to provide the Quality of Service (QoS) required for
enjoying, rather than suffering, real time multimedia sessions. The IMS takes
care of synchronizing session establishment with QoS provision so that users
have a predictable experience. Another reason for creating the IMS was to be
able to charge multimedia sessions appropriately. Furthermore, the aim of IMS
is not only to provide new services but also to provide all the services, current
and future, that the Internet provides. In addition, users have to be able to
execute all their services when roaming as well as from their home networks.
To achieve these goals, the IMS uses Internet technologies and Internet
protocols. So a multimedia session between two users over Internet is
established using exactly the same protocol. It is to be mentioned that, the IMS
does not depend on the circuit-switched domain [1-6].
2
Chapter 1 Introduction and Motivation
This thesis covers the topic of design, analysis and QoS of IMS. The
primary contributions of this dissertation are as follows:
1. Proposing a robust and scalable method that can be used to measure the
capacity of the IMS controllers, Call Session Control Function (CSCF)
and benchmark their different vendors.
2. Introducing two methods that can be used to test the performance of the
IMS controllers.
3. Developing a theoretical model to dimension IMS session establishment
in terms of the needed Bandwidth and the estimated Delay of IMS
Session Setup.
4. Optimizing the VoIP quality over IMS Network using a new technique.
3
Chapter 1 Introduction and Motivation
4
Chapter 2 Telephony Evolution
CHAPTER 2
TELEPHONY EVOLUTION
2.1 Introduction
4
Chapter 2 Telephony Evolution
the industry gives IMS such a high expectation from the advantage of basic
architecture of service control feasibility.
2.2 Motivation
First of all, let's take a look at this network evolution diagram. We could
see the biggest architecture change is more clearly layered architecture. We
know that the network evolution brings us the boom of handset devices and
more wireless technology, and the users want richer content and mobile
experiences. The convergence of fixed and mobile even internet seems to be
the key for this demand, The division of application, control and connection
layers make the more and more complexes multi domain network simplified to
some extent. So what architecture do we have now for this division, how to
realize it?
In pace with more and more end-users equip themselves with the newest
high tech handsets and the understanding of what benefits the new generation
network can bring to them, customers would tend to consider real-time
5
Chapter 2 Telephony Evolution
information and multi-media services as basic services. They require not only a
steady voice communications, but also to ask for data and multimedia
communications in various forms and more practical and commercial use. That
makes the operators must not only meet user needs, but also to changes in the
current era of communication to ensure their own strengths. This requires
operators to build a strong foundation for operation support network, to a rapid
increase in new business to improve the permeability and reduce the loss of
customers, maintaining its core competitiveness.
Here comes to some new creative ideas such as 3G, 4G, NGN (Next
Generation Network), and so on. The technology developers and operators
promise to offer voice, Internet access, video conferencing and access to
traditional broadcasting services to their subscriber and the provision of mobile
content and applications prospers, convergence would result at many levels
and opportunities would arise. For example, mobile network operators and
service providers will soon become information service providers. From the
users' point of view, a mobile phone will soon become a digital assistant and
an entertainment tool in addition to a host of other value-added functions.
6
Chapter 2 Telephony Evolution
There are a number of trend that we can identify related to new next
generation applications with the core of IMS:
7
Chapter 2 Telephony Evolution
So, will all of these prediction be realized in the future and bring so many
benefits for users and business? How to coordinate among mobile operators,
service providers and content providers and how to make the multi domain
service running robustly? And is there any guarantee for another crucial
problem- Security? These still needs further consideration.
There are several mobile wireless solutions for operators using Global
System of Mobile communication (GSM), General Packet Radio Service
8
Chapter 2 Telephony Evolution
2.3.1 GSM
Now GSM is a term that not only used in professional technology field,
but also a wide accepted fashion word when people enjoy all the fun brought
by modern mobile communication. GSM is Global System of Mobile
communication. It is, well known, currently the most widely used mobile
phone standard. Globally, more than 200 countries and regions and more than
one billion people use GSM phones. Compared with the previous standard, the
biggest difference of GSM is that the signaling and voice channels are digital.
GSM therefore is seen as second-generation (2G) mobile phone system.
From the point of view of the consumers, the key advantage of GSM
systems has been higher digital voice quality and low cost alternatives to
making calls such as text messaging. The advantage for network operators has
been the ability to deploy equipment from different vendors because the open
standard allows easy inter-operability. Like other cellular standards GSM
allows network operators to offer roaming services which mean subscribers
can use their phones all over the world.
2.3.2 GPRS
01
Chapter 2 Telephony Evolution
2.3.3 UMTS
In this subchapter we will stress the ink to our core concept IMS. Stared
from the requirements from users, operators, enterprises, the paper will show
blueprint of the technology.
00
Chapter 2 Telephony Evolution
New, exciting services and enhancements to existing services have a key role
to play in making the communications experience much more like interacting
face-to-face. New advanced terminals and communication mechanisms
adapted for user needs will enable this and hide technical complexity [15].
Users are now used to obtain access of information, fun and other
content-rich services through a variety of channels. Telecom operators have a
great opportunity to integrate and extend the multimedia experience through
new highly personalized person-to-person, person-to-content and group
services. The widespread adoption of mobile telephony, SMS and Instant
Messaging shows how readily users adopt services that fulfill an emotional
need to communicate in a variety of ways. Operators can help users extend
such behavior with enriched services that enable users to discuss and
communicate in real time using any combination of voice, video, picture and
messages.
01
Chapter 2 Telephony Evolution
Now subscribers are looking for ways to manage this reach ability or their
presence, so that they can control how, where, when and by whom they can be
reached. For example, research has shown that they would value simply being
able to see in advance who they can contact, and how.
Safe Communication
Telephony services have always been reliable and largely immune from
curses of intrusion, viruses and spam attacks that have come to characterize the
Internet. IP-based multimedia communications services must be safe for
people to use. Free from malware or malicious attacks whether through their
mobile or fixed terminals. Users will also want reassurance that others cannot
gain unauthorized access to their personal services and information.
02
Chapter 2 Telephony Evolution
In general, operators are looking for quick and flexible ways to respond
to new business opportunities. As users expand their voice telephony behavior
into multimedia services, operators want to be able to deliver a seamless and
consistent user experience wherever and however the services are accessed
[12].
03
Chapter 2 Telephony Evolution
04
Chapter 2 Telephony Evolution
3GPP IMS architecture is shown as figure 2.2. IMS applies SIP as core
call control protocol and provides multimedia call control business (such as
video phone Mandarin Tone). An IMS main entity includes CSCF, MGCF,
BGCF, MGFC, MRFP and HSS [1].
05
Chapter 2 Telephony Evolution
In IMS Core:
• S-CSCF (Serving Call Session Control Function) - the key point in the
home network
• I-CSCF (Interrogating Call Session Control Function) -providing topology
hiding
• P-CSCF (Proxy Call Session Control Function) -entry point into IMS
world
• MS (Media Server). Media server hosting special resources
• MGF (Media Gateway) -interworking with legacy networks
• PDF (Policy Decision Function) - QoS Control using Policies (COPS)
In IMS Application Layer:
• HSS (Home Subscriber System) -maintaining subscriber and AS profiles
• AS (Application Server Function) -hosting applications
• IMS enablers specific ASs with generic functions [1]
The details for IMS architecture and the function of each component
will be presented in Chapter 3, IMS signaling analysis with more focus on SIP
protocol will be described in Chapter 4.
06
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
CHAPTER 3
IP MULTIMEDIA SUBSYSTEM (IMS)
ARCHITECTURE
3.1 Introduction
To ease the integration with the Internet, IMS uses IETF protocols
wherever possible, e.g. Session Initiation Protocol (SIP). According to the
3GPP [14], IMS is not intended to standardize applications but rather to aid the
access of multimedia and voice applications from wireless and wireline
terminals, i.e. create a form of fixed-mobile convergence (FMC). This is done
by having a horizontal control layer that isolates the access network from the
service layer. From a logical architecture perspective, services need not have
their own control functions, as the control layer is a common horizontal layer.
However in implementation this does not necessarily map into greater reduced
cost and complexity.
81
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
Access Network, soft switches and "naked" SIP. It is easier to sell services
than to sell the virtues of "integrated services", but additionally the task to sell
an IMS based on a single service is also difficult as there are often (cheaper)
alternatives to creating and deploying that particular service.
3.2 History
81
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
02
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
These components can be roughly divided into the following functional areas:
• Access Network
• User equipment (UE): The UE is a SIP user agent with IMS specific
features such as support for QoS reservations and the IMS authentication
methods as well as the capability of accessing 3GPP network technology.
• Signaling Components: The IMS supports different call session control
functions that are responsible for routing the SIP messages between the
caller and callee.
• Interworking Components: The interworking components enable the
IMS subscribers to communicate with subscribers of other IMS or SIP-
based networks as well with legacy circuit switched (CS) networks.
• QoS: The QoS related components enable the signaling components to
interact with the underlying transport network.
• Application and Service Provisioning Servers
• Charging in IMS
The user can connect to an IMS network in various ways, most of which
use the standard Internet Protocol (IP). IMS terminals (such as mobile phones,
personal digital assistants (PDAs) and computers) can register directly on an
IMS network, even when they are roaming in another network or country (the
visited network). The only requirement is that they can use IP and run Session
Initiation Protocol (SIP) user agents. Fixed access (e.g., Digital Subscriber
08
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
00
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
The user equipment (UE) represents the devices and applications used by
the subscriber to initiate and receive multimedia sessions in IMS. In general,
the UE resembles a user agent (UA) as defined in [16] with a number of
extensions required for IMS networks. These extensions include a number of
SIP extensions that are mandatory for IMS as well as the support for IMS
related security and networking technologies.
In order to make sure that a call is routed to the correct user, the user must
have a unique identity that cannot be shared by any other user. In the PSTN,
these identities are phone numbers. Hence, when a certain phone number is
dialed in PSTN, a phone that belongs to a certain user will ring. While in
PSTN user devices, i.e., phones, are assigned unique identities, in IMS, the
users’ themselves are assigned unique identities. These identities are then
mapped to one or more devices through an explicit registration process. IMS
supports two kinds of user identities: public and private identities. The public
identity is used to route a call to the right user. Private identities are used by
the operator for internal purposes such as generating billing records.
02
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
GSM [17]. Before the user is able to receive or initiate a call at least one
public identity must be registered with the IMS network. As the
subscriber might have several public identities, IMS defines implicit
registration sets. An implicit registration set consists of a number of
public identities. Once any one of the public identities in the set is
registered or deregistered all other identities of the set are registered or
deregistered as well.
IMS Private User Identity (IMPI) The private user identity is used by
the network operator for various internal operations mainly concerning
user authentication, authorization, and accounting and administration
purposes. Each subscriber will have at least one unique identity and
possible more. The private identity has the format of a network address
identifier (NAI) [18] .That is, a private identity can be presented as
[email protected] for example. Unlike the public identity, a user’s
private identity is not used for routing purposes and is probably not even
known to the user. In some sense it resembles the usage of the IMSI
(International Mobile Subscriber Identity) in GSM [17].
02
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
Figure 3.3 Relationships of the Private User Identity and Public User Identities
The 3GPP specifications discuss not only IMS services but also IP based
services and 2G services. Each of these services has specific requirements
regarding the information needed for user authentication and controlling the
access to the services as well as the features supported at the user equipment.
Hence, 3GPP defines different identity modules for each type of service. These
modules have rather similar requirements in terms of processing needs,
memory and encryptions schemes. The Universal Integrated Circuit Card
(UICC) as shown in figure 3.4 is a microcontroller based access module that
provides the platform for the different identity module [19]. These identity
modules are:
Subscriber Identity Module (SIM): The SIM module [20] is required for
accessing 2G services, i.e., circuit switched based GSM services. While in 2G
02
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
devices there was no distinction between the SIM and UICC, in 3G equipment
SIM is only an application running on top of the UICC and needs only to be
present on the device if it is to also access GSM services . The SIM stores
information required for accessing GSM services such as the phone number
and passwords.
02
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
IMS Subscriber Identity Module (ISIM): The ISIM [22] is the identity
module used for accessing IMS services. The ISIM contains the following
information:
– Authentication functions and information: Similar to the USIM the
ISIM includes the necessary secrets and crypto graphic functions
needed for authenticating the subscriber towards the operator.
– IMS Private User Identity (IMPI): The ISIM stores one private user
identity.
– IMS Public User Identity (IMPU): The ISIM can store one or more
public user identities.
– Home network domain name: The SIPURI of the user’s home
domain.
02
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
In case the UE contains an ISIM application, then the user’s public and
private identities will be stored in the ISIM. However, especially during the
early deployment stages of IMS it is also possible to have a 3G UE with only a
USIM application. To still be able to participate in the IMS authentication
procedure, the IMPI and home network domain name will have to be generated
using the IMSI.
01
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
The P-CSCF acts as the outbound proxy and the first point of contact for
the subscriber’s user equipment (UE). Hence, all SIP traffic sent or received
by the UE will traverse the P-CSCF. The communication between the UE and
the P-CSCF is conducted over the Gm reference point [23].Once a P-CSCF
was discovered all SIP traffic sent or received by the UE will traverse the
discovered P-CSCF.
01
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
When a user registers a SIP identity, an S-CSCF is allocated to the user and
this S-CSCF act as the home S-CSCF to this user for the duration of the user’s
registration.
22
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
28
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
Security related features: The IBCF is also tasked with screening SIP
messages and rejecting messages which do not fulfill certain operator
defined rules, e.g., include headers that are not allowed in the operators’
network. Further, the IBCF can remove certain IMS related headers such
as charging and authorization headers when sending messages to a non-
trusted network. Finally, the IBCF can provide the topology hiding
functionality (THIG).
The IBCF interacts with the session control functions over the Mx
reference point. The IMS-ALG communicates with the TrGW over the Ix
reference point. This reference point is described in details in Chapter 4.
20
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
The BGCF is a SIP proxy that routes SIP requests destined to a user in the
circuit switched domain using a dial plan. This dial plan indicates which
PSTN/CS gateways or other networks serve a certain phone number. When a
phone number is served by another network, then the BGCF forwards the
request to a BGCF in that network over the Mk reference point. Otherwise, the
request gets forwarded to an MGCF in the same network as the BGCF over the
Mj reference point.
22
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
While the MGCF is responsible for converting the SIP messages into
ISUP/BICC and vice versa the SGW performs lower layer protocol conversion.
The SGW translate the SCTP/IP transport [30] used in IMS with into MTP
[31] used in SS7 networks. The SGW does not interpret the application layer
messages but may have to interpret the underlying layer to ensure proper
routing of the signaling.
While the MGCF converts the signaling part of a call between an IMS
user and a CS user, the MGW converts the media, e.g. audio or video,
exchanged between the two. The MGW terminates the CS bearer and generates
Real Time Transport Protocol (RTP) [32] packets based on the received
content and vice versa. Besides unpacking the media content from the one
technology and packing it into the other, the MGW might perform transcoding
in case the codec used by the IMS terminal is not supported by the CS
terminal.
22
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
22
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
Application servers (AS) are SIP servers that host and execute services.
Application servers interface the S-CSCF over the SIP based Service Control
Interface (ISC). In general one can distinguish between native SIP application
servers that host and execute services based on SIP and application servers that
provide an interface between the IMS and legacy service infrastructures such
as the OSA-SCS and the IM-SSF. The Open Service Access-Service
Capability Server (OSA-SCS) provides an interface to the OSA framework
application server [39] which offers the capability to access the IMS securely
from external networks as shown in figure 3.8. The IP Multimedia Switching
Function (IM-SFF) [40] allows the IMS to reuse CAMEL (Customized
Applications for Mobile networks Enhanced Logic) [41] developed for GSM.
Both the OSA-SCS and IM-SSF act toward the IMS as SIP application servers
and as native OSA or CAMEL entities toward the OSA or CAMEL
infrastructures.
22
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
22
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
In IMS there are two main databases: the Home Subscriber Server
(HSS) and the Subscription Locator Function (SLF).
The HSS is the main database for storing all subscriber information and
service-related data. This includes the subscriber’s identity, the access
information needed for authenticating the subscriber and the subscriber service
profile which describes which services the user is subscribed to, which
application servers should be used when the subscriber is called or is
establishing a call. Further, the HSS maintains the subscriber’s registration
status and the address of the S-CSCF the subscriber is registered with. The
subscriber’s access, registration and profile information are used by the S-
CSCF for authenticating and authorizing the subscriber’s requests for services.
The I-CSCF, S-CSCF and AS contact the HSS when they need to
authenticate or authorize a request or require some subscriber-related
information. In case more than one HSS is deployed in an IMS network, the
SLF acts as a resolution mechanism that enables the I-CSCF, S-CSCF and AS
to find the HSS that holds the subscriber data for a certain user identity.
The I-CSCF and SCSCF communicate with the HSS via the Cx
reference point and with the SLF via the Dx reference point [42]. The AS
communicates with the HSS via the Sh reference point and with the SLF via
the Dh reference point [43]. The Cx, Dx, Sh, Dh reference points are based on
the DIAMETER protocol [44].
21
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
Charging function addresses are addresses distributed to each IMS entities and
provide a common location for each entity to send charging information.
Charging Data Function (CDF) addresses are used for offline billing and
Online Charging Function (OCF) for online billing.
Offline Charging: All the SIP network entities (P-CSCF, I-CSCF, S-
CSCF, BGCF, MRFC, MGCF, AS) involved in the session use the
Diameter Rf interface to send accounting information to a CDF located
in the same domain. The CCF will collect all this information, and build
a Call Detail Record (CDR), which is sent to the billing system (BS) of
the domain as shown in figure 3.9.
Each session carries an IMS Charging Identifier (ICID) as a unique
identifier generated by the first IMS entity involved in a SIP transaction
and used for the correlation with CDRs. Inter Operator Identifier (IOI)
is a globally unique identifier shared between sending and receiving
networks. Each domain has its own charging network. Billing systems
in different domains will also exchange information, so that roaming
charges can be applied.
21
Chapter 3 IP Multimedia Subsystem (IMS)
Architecture
22
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
CHAPTER 4
IP MULTIMEDIA SUBSYSTEM (IMS)
SIGNALING ANALYSIS
4.1 Introduction
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
Are the end components in a SIP network, they make SIP requests to
establish media sessions; they may also send and receive media. A UA can be
a SIP phone or SIP client software installed on a PC or other system. UAs
generally contain both a client and a server part. The UA client (UAC)
generates SIP requests, while the UA server (UAS) responses to received SIP
requests.
Are SIP intermediaries that are located within a SIP network (i.e., the
network of devices which understand SIP). These servers assist the UAs in
session establishment and in other functions (such as routing of SIP requests
and responses). SIP servers can be divided into Proxy servers, Redirect servers,
and Registrar servers.
- Proxy servers receive SIP requests from UAs or other proxies and
forwards or proxy the request to another destination. A proxy server can also
authenticate and authorize users for services, implement provider call-routing
policies, and assist users with features that will control the behavior of the
proxy for subsequent sessions (for example, defining what is to be done with
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
calls from a certain source, defining what is to be done with calls at different
times or the day or on different days, etc.).
SIP proxies, redirect, and registrar servers are purely logical SIP
elements. They have no media capabilities and do not initiate requests - except
on behalf of UAs. They can be implemented in one machine or replicated over
many nodes (for increased reliability, availability, and capacity).
- Location servers are not SIP entities, but they are an important part of
a SIP network’s architecture. A location server stores, and returns the
location(s) of the user's user agent(s) when queried by a SIP server. The
location server can make use of information from registrars or other databases.
Most registrars upload location updates to a location server upon reception of
new location information. The location server's database may store information
about the user's user agent(s) such as their URIs, IP addresses, features, and
other information. It may also contain routing information.
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
UAs do not interact directly with the location server, but rather do so via
a registrar server. SIP servers use a non-SIP protocol to query, update, and
retrieve records from the location servers (some servers uses the Lightweight
Directory Access Protocol (LDAP) [48]).
4.2.1.2.1 INVITE
11
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
4.2.1.2.2 BYE
This request is used to leave a session. When the session is only a two-
party session, a BYE message will cause the session to end. In a multicast
scenario, however, a BYE request from one of the participants simply indicates
that a particular participant has left the session, but the session itself is not
affected, unless this was the last participant - in which case the session should
be terminated.
4.2.1.2.3 CANCEL
4.2.1.2.4 REGISTER
The REGISTER request is used when a user wants to inform their SIP
domain of the current location of one of this user's UAs. This is done by
sending a REGISTER requests to a registrar server. The information that the
registrar receives through the REGISTER request is stored in this SIP domain's
location server(s), thus making the new information available for other SIP
servers in this SIP domain. The registrar service offers flexibility, for instance
a user can register a location until a certain time of the day, and after that the
calls will be redirected to another of the currently registered locations.
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
4.2.1.2.5 OPTIONS
This request is used to query a server about its capabilities. For example,
what methods, encodings, and session description protocols it supports.
Many of the SIP response codes have been inspired by HTTP. The SIP
response codes are divided into six classes, identified by the first digit of the
code, as shown in table 4.2.
Table 4.2 Response codes
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
1) with the Registrar server, which updates its location server. The Registrar
server acknowledges Bob's UA's registration (message 2).
When later Alice tries to call Bob (using SIP URI [email protected]),
her UA must first find the proxy server that can handle the request, this is done
by querying a DNS server to find the in-coming SIP proxy for Bob's SIP
domain, based upon the string to the right of the at-sign in Bob's SIP URI
(message 3). An INVITE request (message 5) is forwarded to the proxy server
who must decide where to forward the request; the proxy first queries
(message 7) the location server to determine the callee’s current location(s). If
the proxy server can at this stage directly forward the request, it will, otherwise
it will query (message 9) a DNS to resolve the domain’s address, this may
result in forwarding the request to another proxy server, that will repeat the
process (not shown in the figure 4.1).
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
Note: Messages 7 and 8 are not SIP messages (they could be an LDAP
query and response). Similarly the DNS queries and responses of messages 3,
4, 9, and 10 are not SIP messages.
The SDP protocol was defined by the IETF in RFC 4566 [50]. SDP is
purely a format for session description. A session description could include
information such as the purpose of the session, the media and the codec’s used
in the session. SDP can use various transport protocols among them SIP. SDP
is not intended to support negotiation of session content or media encoding.
[50]
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
IMS utilizes RTP for media sessions. This protocol was developed by the
IETF and defined in RFC 3550 [51]. RTP was primarily designed to satisfy the
needs of multi-participant multimedia conferencing, but today it is used for
many different types of applications. RTP provides end-to-end delivery
services for data with real-time characteristics, such as audio and video. RTP
typically runs on top of UDP, no specific ports are defined for this purpose, but
rather an even port and the next higher odd port are used (the later is used by
the Real-time Transport Control Protocol (RTCP) to provide feedback on the
RTP transported data). RTP does not provide any Quality of Service (QoS)
guarantees at all. However, it does allow transmission imperfections such as
packet loss or jitter to be detected with the help of the sequence numbers and
time stamps in the RTP packets and the sender and receiver reports sent in
RTCP. [51]
RTCP was defined by the IETF in RFC 3550 [51]. The primary function
of this protocol is to provide information to monitor the quality of service for
RTP flows. This information includes the number of bytes sent, packets sent,
lost packets, jitter, and round trip delay. RTCP also transmits control packets to
participants in a multimedia streaming session, so that the participants can
learn who the other participants are. An application may use RTCP
information to increase the quality of service perhaps by limiting flow,
switching to a low compression coder-decoder (CODEC) instead of a high
compression CODEC, turning off specific types of media (for example, turning
off video), etc. For a description of this see [52].
14
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
There are several types of RTCP packets: Sender report packet, Receiver
report packet, Source Description RTCP Packet, Goodbye RTCP Packet, and
Application Specific RTCP packets as defined in RFC 3550 [51].
The secure real-time transport protocol (SRTP) was defined by the IETF
in RFC 3711 [53]. SRTP is a profile of RTP. It can provide confidentiality,
message authentication, and replay protection to the RTP traffic and to RTCP.
For further details see [54].
4.2.7 Diameter
The 3GPP standards body has adopted Diameter as the primary signaling
protocol for authentication, authorization, and accounting (AAA) in IMS.
Diameter was developed and standardized by IETF as described in RFC 3588
[55]. Diameter is used by IMS’s SIP servers (CSCFs) to perform
authentication using information provided by the HSS and to determine if a
client is authorized to access the services provided by the server.
45
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
44
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
Mp MRFC, MRFP Allows an MRFC to control media stream resources provided by an MRFP. H.248
Sr MRFC, AS Used by MRFC to fetch documents (scripts and other resources) from an AS HTTP
Used by MRFC to fetch documents (e.g. scripts, announcement files and other TCP/SCTP
Cr MRFC, AS
resources) from an AS. Also used for media control related commands. channels
(I-CSCF, Used to send subscriber data to the S-CSCF; including Filter criteria and their
Cx Diameter
S-CSCF), HSS priority. Also used to furnish CDF and/or OCF addresses.
44
Chapter 4 IP Multimedia Subsystem (IMS)
Signaling Analysis
44
Chapter 5 Capacity Measurement for IMS Controllers
CHAPTER 5
CAPACITY MEASUREMENT FOR IMS
CONTROLLERS
5.1 Introduction
There are some methods and tools provided by different vendors that
could be used to measure the capacity of IMS controllers like:
45
Chapter 5 Capacity Measurement for IMS Controllers
4. Intel and Open Cloud performed the SIP Application Server tests in
May 2006. This method was designed for a special SIP servers
developed by Intel called SIP Application Server running on Intel®-
based Modular Communications Platforms [60].
The novelty in our method is that it is the first time to use the
simulation tool OpenSER [61] to measure the IMS servers capacity and also
in the development of the SIPp [62] tool to generate calls and increase the
number of generated calls till overloading the IMS server.
The Capacity here means how many calls can be handled by one of the
IMS controllers at the same time, what the consequences of overloading the
44
Chapter 5 Capacity Measurement for IMS Controllers
Server are and the behavior of the Server after overloading it with
maximum number of calls.
This method is tested using a simulation tool called Open SIP Express
Router (OpenSER).This tool is installed on a PC to simulate one of the IMS
servers which we want to measure its capacity.
This chapter proposes a robust and scalable method that could be used
to measure the capacity of the IMS SIP servers Call Session Control
Function (CSCF) and benchmark their different vendors.
This method is used to know how many calls are routable into a
defined time interval and what the consequences of overloading the system
are.
The chapter also provides the test results for Open SIP Express Router
(OpenSER).
45
Chapter 5 Capacity Measurement for IMS Controllers
We use the Open SIP Express Router version 1.3-2 (Open-SER) [61],
a freely-available, open source SIP proxy server. OpenSER is a “fork” of
SIP Express Router (SER) [63], sharing much of its code base.
We use the SIPp [62] SIP workload generator, another freely available
open-source tool. SIPp allows a wide range of SIP scenarios to be tested,
such as user-agent clients (UAC), user-agent servers (UAS) and third-party
call control (3PCC). SIPp is also extensible by writing third-party XML
scripts that define new call flows.
The OpenSER is running on Intel Pentium 4 CPU with 5.20 GHz and
1 GB RAM. The operating system is Debian/Linux with Kernel version
2.6.18-6-686.
46
Chapter 5 Capacity Measurement for IMS Controllers
SIPp in this test runs as SIP User Agent Server (UAS) and SIP User
Agent Client (UAC) on separated computers which allow differentiating
between the sent messages and the received messages.
47
Chapter 5 Capacity Measurement for IMS Controllers
the proxy. The proxy responds with a 100 TRYING message to inform the
UAC that the message has been received.
The proxy then looks up the contact address for the SIP URI of the
UAS and forwards the message. The UAS in turn, acknowledges receipt of
the message and informs the proxy that it is notifying the user via the 180
RINGING message.
The proxy then forwards that message to the initiator of the INVITE,
informing the client that the end host has received the message and that the
line is ringing. The user on the UAS then accepts the call, generating a 200
OK message, which is sent to the proxy which forwards it on to the UAC.
48
Chapter 5 Capacity Measurement for IMS Controllers
5.5 Results
Figure 5.2 Shows that the OpenSER can at maximum handle 150 calls
or sessions per sec and after that when overloading the OpenSER, it
reboots.
In our test we have used a work load generator which generates calls
and increases the number of generated calls till the IMS server stop
handling any call.
From our measurement we found that that IMS server stop handling
any call and reboot when the maximum number of call generated in the
second was 150 calls per second then the server reboot.
56
Chapter 5 Capacity Measurement for IMS Controllers
The results achieved for the simulation test showed that the IMS
Server with software OpenSER when it was running on a specific Hardware
Server (Intel Pentium 4 CPU with 5.20 GHz and 1 GB RAM) the maximum
number of calls at the same time could be handled by this server is 150
Calls per sec and after that the server did reboot.
From the observation, it is noticed that the processor load reached 40%
and the memory utilization reached 65% which were a good indicator
because there was no crash in the server or it was no down after
overloading.
The above results were achieved when we run this method for this
type of hardware however this result could be changed if the test run on
different server with different processor and memory and in this case we
can achieve another result for the maximum number of calls, the processor
load and the memory utilization.
56
Chapter 5 Capacity Measurement for IMS Controllers
Processor Load (CPU profile) and memory usage of the server are
used to measure the consequences of overloading the system.
CPU profile and memory usage of the server were examined during
the test. The tool for measurement is command “# top –d l -i -b” for CPU
and memory.
Command “# top –d l -i -b” was used and repeated each second and
delivers the output at the console which was redirected into the file for the
test measurement. Figure 5.3 shows an Example output command “# top –
d l -i -b”.
Figure 5.3 Example output command “# top –d l -i -b” during the Performance
Test
56
Chapter 5 Capacity Measurement for IMS Controllers
Figure 5.4 shows the processor load during the test and its maximum
load about 40% and after the total number of calls reached 150 calls or
sessions per sec and after that when overloading the OpenSER, it reboots.
The Processor Load reached 40% while the server reached the
maximum number of calls at the same time. The observation results during
the test showed that the IMS server remained stable although it reached the
maximum number of calls.
The memory usage did not exceed 65% as shown in figure 5.5.The
memory utilization reached 65% while the server reached the maximum
number of calls at the same time. The observation results during the test
showed that the IMS server remained stable although it reached the
maximum number of calls.
56
Chapter 5 Capacity Measurement for IMS Controllers
5.6 Conclusion
The purpose of this test is to know how many calls are routable into a
defined time interval and what the consequences of overloading the system
are.
This chapter proposed robust and scalable method that can be used to
measure the capacity of the IP Multimedia Subsystem (IMS) controllers,
Call Session Control Function (CSCF) and benchmark their vendors.
55
Chapter 5 Capacity Measurement for IMS Controllers
The novelty in our method is that it is the first time to use the
simulation tool OpenSER to measure the IMS servers capacity and also in
the development of the SIPp tool to generate calls and increase the number
of generated calls till overloading the IMS server.
54
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
CHAPTER 6
IP–MULTIMEDIA SUBSYSTEM (IMS)
PERFORMANCE EVALUATION
6.1 Introduction
There are some methods and tools provided by different vendors that
could be used to measure the performance of IMS as described in section
5.2.
These methods are tested using a simulation tool called Open SIP
Express Router (OpenSER) which can simulate the Call Session Control
Function (CSCF) or IMS Controllers.
66
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
This chapter proposes robust and scalable methods that can be used
to evaluate the performance of the IMS SIP servers and benchmark their
different vendors.
The first method is the FUZZING Testing. This test suite focuses
the robustness and security testing of the Implementation Under Test
(IUT) when receiving malformed INVITE requests. The test fails if the
IUT stops running, hangs up, crashes, restarts and consumes all CPU
or/and memory for a long time [64].
This chapter proposes robust and scalable methods that can be used
to evaluate the performance of the IMS SIP servers and benchmark their
different vendors.
67
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
The first method is the FUZZING Testing. This test suite focuses
the robustness and security testing of the Implementation Under Test
(IUT) when receiving malformed INVITE requests. The test fails if the
IUT stops running, hangs up, crashes, restarts and consumes all CPU
or/and memory for a long time [64].
This test suite focuses on the robustness and security testing of the
Implementation Under Test (IUT) receiving malformed and INVITE
requests. The test suite tests SIP via UDP only due to the fact that it is
not recommended that the IUT supports TCP. To provoke failures the
sent INVITE Messages contain one or more of the exceptional elements
68
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
• Failure criteria:
1. A device undergoes a fatal failure and stops functioning
normally
2. A process or a device crashes or hangs and needs to be
restarted manually
3. (A process or a device crashes and restarts automatically)
4. A process consumes almost all CPU and/or memory
resources for an exceptionally long or indefinite time
• The test fails if one of the above mentioned failures occurs due to
receiving an INVITE containing one or more of the exceptional
elements
69
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
• The test suite enfolds 4527 SIP INVITE tests which are
subdivided into 54 sub-category
• Due to the fact that a detailed test set-up is not available, two
major kinds and three different sub-kinds of measurements are
issued
• The two major kinds are:
1. With a 2000 ms delay between each test and optional
teardown/validcase, the two seconds space makes it easy to
find out later if there any issue occurred
2. With 100 ms between each test and optional
teardown/validcase
70
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
71
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
SIP Request:
aaaaaaaa sip:[email protected] SIP/2.0
Via: SIP/2.0/UDP rx-desktop:5060;branch=z9hG4bK00003000003
From: 3 <sip:user@rx-desktop>;tag=3
To: Receiver <sip:[email protected]>
Call-ID: 3@rx-desktop
CSeq: 1 INVITE
Contact: 3 <sip:user@rx-desktop>
Expires: 1200
Max-Forwards: 70
Content-Type: application/sdp
Content-Length: 120
v=0
o=3 3 3 IN IP4 rx-desktop
s=Session SDP
c=IN IP4 127.0.1.1
t=0 0
m=audio 9876 RTP/AVP 0
a=rtpmap:0 PCMU/8000
SIP Response:
SIP/2.0 404 Not Found
Via: SIP/2.0/UDP rx-desktop:5060;branch=z9hG4bK00003000003;received=192.168.1.235
From: 3 <sip:user@rx-desktop>;tag=3
To: Receiver <sip:[email protected]>;tag=fa997f81440371de71ab448ebdb9af56-6192
Call-ID: 3@rx-desktop
CSeq: 1 INVITE
Server: OpenSER (1.3.2-notls (i386/linux))
Content-Length: 0
72
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
Figure 6.4 shows a Wireshark trace as one example for one of the
exceptional elements categories tested during the experiment.
The test was to provoke the INVITE message with 'a' character
overflows, OpenSER responded correctly to this error and replied with
404 Not Found. By this the test was passed successfully for OpenSER.
73
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
Figure 6.5 shows a Wireshark trace as one example for one of the
exceptional elements categories tested during the experiment.
The test was to provoke the INVITE message with 'edv' character
overflows, OpenSER responded correctly to this error and replied with
404 Not Found. By this the test was passed successfully for OpenSER.
74
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
Figure 6.6 shows a Wireshark trace as one example for one of the
exceptional elements categories tested during the experiment.
The test was to provoke the INVITE message with Format strings
(eg. %s%s%s or %.4097d), OpenSER responded correctly to this error
and replied with 404 Not Found. By this the test was passed successfully
for OpenSER.
Figure 6.6 PROTOS test trace for OpenSER Format strings (eg.
%s%s%s or %.4097d)
CPU profile and memory usage of the server were examined during
the test. The tool for measurement is command “# top –d l -i -b” for CPU
and memory. Command “# top –d l -i -b” was used, repeated each
75
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
second and delivers the output at the console which was redirected into
the file for the test measurement. Figure 6.7 shows an Example output
command “# top –d l -i -b”.
From the measurement file, the CPU load and the memory usage
are calculated. These two measurements are enough because due to the
failure criteria the IUT stops running, hangs up, crashes, restarts and
consumes all CPU or/and memory for a long time. Figure 6.8 shows the
Processor Load during PROTOS test and Figure 6.9 shows Memory
utilization during PROTOS test.
76
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
77
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
The following test cases were extracted and done according to ETSI
TS 102 027-2 V6.1.1:
78
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
Figure 6.11 shows one test of the Proxy test extracted from ETSI
TS 102 027-2 V6.1.1 for call control. This test was one of the tests
applied on OpenSER using Spectra 2| SE tool.
TPId: IP_CC_PR_MP_RQ_V_032
Status: Mandatory
Ref: RFC 3261 [2] sections 16.3, item 3 and 16.10.
Purpose: Ensure that the IUT on receipt of a CANCEL request that does
not correspond to an existing context including a Max-Forwards header set
to 0, sends a Too many hops (483 Too many hops) request failure
response.
Figure 6.12 is a Wireshark trace for this test show that the test was
passed successfully and the server response was according to the
standard.
79
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
SIP Response:
SIP/2.0 483 Too Many Hops
Via:SIP/2.0/UDP192.168.1.87:5060;branch=z9hG4bK3776328-bdcc3b69
From: sip:[email protected]
To:sip:[email protected];tag=e42c76af37d5792c84fff6077ad77fa8.7a49
Call-ID: [email protected]
CSeq: 0 CANCEL
Server:OpenSER (1.3.2-notls (i386/linux))
Content-Length: 0
80
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
6.4 Conclusion
81
Chapter 6 IP–Multimedia Subsystem (IMS)
Performance Evaluation
The novelty in our method is that it is the first time to use the
simulation tool OpenSER to measure the IMS servers performance and
also in the development of the SIPp tool to generate calls and increase
the number of generated calls till overloaded the IMS server.The benefits
of our methods are:
The first method is the FUZZING Testing. This test suite focuses
the robustness and security testing of the Implementation Under Test
(IUT) when receiving malformed INVITE requests. The test fails if the
IUT stops running, hangs up, crashes, restarts and consumes all CPU
or/and memory for a long time .PROTOS test suite has been passed
successfully over the OpenSER. This is because nothing appeared from
the failure criteria. The novelty in this method is that the use of
FUZZING Test proposed by the university of Olou in Finland practically
in our test and provide the test results for OpenSER SIP server.
The second method is the testing with Spectra2|SE to test the
behavior and the response of the system to the standard SIP
requests.Spectra2|SE selected tests were also passed successfully over
the OpenSER as it responded to the SIP request according to RFC 3261
standard. The novelty in this test is using Spectra2|SE tool practically in
measuring the IMS performance according to RFC 3261 standard.
82
CHAPTER 7 IMS Session Setup Analysis
CHAPTER 7
IMS SESSION SETUP ANALYSIS
7.1 Introduction
38
CHAPTER 7 IMS Session Setup Analysis
are more than 200 million subscribers using the IMS technology for
telephony services [69].
SIP can be used over various transport protocols such as UDP, TCP
or SCTP. To enable the reliable transmission of SIP messages even when
used over UDP, SIP supports application level retransmission mechanisms.
That is in case no response was received for a sent request then after a
timeout the request is retransmitted. Thereby, losses due to overloaded
servers or lossy links would cause delays in the session establishment and
hence reduce the perceived service quality.
With the success of SIP, there have already been a number of studies
addressing aspects of performance evaluation and modeling of SIP.
38
CHAPTER 7 IMS Session Setup Analysis
38
CHAPTER 7 IMS Session Setup Analysis
discussed in IETF. The work in this chapter takes the multi-hop nature of
IMS into account as well as the SIP specifications.
7.3 Background
Figure 7.1 shows the common nodes included in the IMS .These nodes are:
38
CHAPTER 7 IMS Session Setup Analysis
38
CHAPTER 7 IMS Session Setup Analysis
9. The Home Subscriber Server (HSS) contains all the user related
subscription data required to handle multimedia sessions.
33
CHAPTER 7 IMS Session Setup Analysis
38
CHAPTER 7 IMS Session Setup Analysis
7.3.2.1 INVITE-retransmissions
7.3.2.2 Non-INVITE-retransmissions
Figure 7.2 illustrates a basic session establishment in the IMS with the
caller and callee roaming to foreign networks. The example is based on the
scenario provided in [83].
89
CHAPTER 7 IMS Session Setup Analysis
89
CHAPTER 7 IMS Session Setup Analysis
In this phase the caller and callee negotiate the audio and video codes
to be used as well as the QoS criteria. The 183 provisional response is sent
reliably. That is, the callee will retransmit it using the INVITE-
retransmission mode until a PRACK was received
89
CHAPTER 7 IMS Session Setup Analysis
Note that the PRACK will start its retrsanmission timer as soon as it
receives the 183 response. Further, the PRACK will not be retransmit each
time a 183 is retransmitted but only when a retransmission timer is
triggered (i.e., T1, 3T1…).
In this phase the caller and callee compete the code and QoS
negotiations. In case the UPDATE request or the 200 Ok acknowledgement
were lost the caller will retransmit the UPDATE request until a 200 OK is
received using the Non-INVITE-retrnsmission mode.
In this phase the callee informs the caller that the user is being alerted
about the call. The 180 provisional response is sent reliably. That is, the
callee will retransmit it using the INVITE-retransmission mode until a
PRACK was received.
In this phase the callee informs the caller that the call was accepted. In
case the response or the ACK were lost, the callee will retransmit the 200
OK response using the Non-INVITE-retransmission mode until an ACK
was received.
88
CHAPTER 7 IMS Session Setup Analysis
During this phase one of the users terminates the call. In case the
BYE or the acknowledging 200 OK response are lost the sender of the BYE
request will retransmit the BYE until a 200 OK is received in a the Non-
INVITE-retransmission mode.
(7.1)
88
CHAPTER 7 IMS Session Setup Analysis
At time 2T1 r new requests will be sent plus the requests that were lost
T1 seconds ago, e.g., (l x r) requests. Out of the sent request (l x (r + (l x r))
will be lost. These would be retransmitted at time 4T1 and so on.
The number of INVITE requests (Ri) sent by the sender at any time
point (n) can, hence, be determined as:
88
CHAPTER 7 IMS Session Setup Analysis
(7.3)
Figure 7.3 and Figure 7.4 show the relation between and at different
values of and the relation between and at different values of
respectively.
88
CHAPTER 7 IMS Session Setup Analysis
At this stage the number of new losses, e.g. losses of newly generated
requests, would become equal to the number of retransmissions that will be
terminated as the maximum number of attempts was already tried. Hence, at
this stage the system reaches a steady state.
88
CHAPTER 7 IMS Session Setup Analysis
(7.4)
(7.5)
with N = .
Figure 7.6 shows the relation between and at different values of
83
CHAPTER 7 IMS Session Setup Analysis
(7.6)
88
CHAPTER 7 IMS Session Setup Analysis
1 (7.7)
with
The number of retransmissions ( ) conducted in the exponential
manner up to the T2 Timer is determined as:
999
CHAPTER 7 IMS Session Setup Analysis
(7.8)
(7.9)
999
CHAPTER 7 IMS Session Setup Analysis
With the value of T2 set to 4 seconds and T1 set to 0.5 seconds. In this
case, the number of Non-INVITE requests ( ) sent by the sender at any
time point ( ) can be determined as:
(7.10)
(7.11)
999
CHAPTER 7 IMS Session Setup Analysis
Figure 7.8 and Figure 7.9 show the relation between and at different
values of and the relation between and at different values of
respectively.
998
CHAPTER 7 IMS Session Setup Analysis
998
CHAPTER 7 IMS Session Setup Analysis
The end-to-end loss for a request plus response would in this case be
= (7.13)
= (7.14)
( INVITE Retransmission with two ways Losses)
998
CHAPTER 7 IMS Session Setup Analysis
(7.15)
( INVITE Retransmission with one way Losses)
998
CHAPTER 7 IMS Session Setup Analysis
= = (7.16)
( INVITE Retransmission with one way End to End Losses)
(7.17)
(7.18)
(7.19)
(7.20)
(7.21)
998
CHAPTER 7 IMS Session Setup Analysis
= = (7.22)
( Non-INVITE Retransmission with two ways End to End
Losses)
= = (7.23)
( Non-INVITE Retransmission with one way End to End Losses)
(7.24)
(7.25)
= (7.26)
= = (7.27)
( Non-INVITE Retransmission with two ways End to End
Losses)
= = (7.28)
( Non-INVITE Retransmission with one way End to End Losses)
(7.29)
(7.30)
= (7.31)
993
CHAPTER 7 IMS Session Setup Analysis
= = (7.32)
( INVITE Retransmission with one way End to End Losses)
(7.33)
(7.34)
(7.35)
= = (7.36)
( Non-INVITE Retransmission with two ways End to End
Losses)
= = (7.37)
( Non-INVITE Retransmission with one way End to End Losses)
(7.38)
(7.39)
= (7.40)
= = (7.41)
Non-INVITE Retransmission with two ways End to End Losses)
= = (7.42)
( Non-INVITE Retransmission with one way End to End Losses)
998
CHAPTER 7 IMS Session Setup Analysis
(7.43)
The total amount of bandwidth (B) that would be caused by the SIP
signaling for IMS call establishment rate of r , η hops and an SIP packet
size of S as shown in Table IV. The message sizes for session sequences are
provided in Table 7.3. These values are consistent with [84, 85, and 86]
(these chapters evaluated SIP-based session performance under UDP in
different types of networks for instance UMTS etc.).
999
CHAPTER 7 IMS Session Setup Analysis
B= )
(7.44)
B=
)
(7.45)
999
CHAPTER 7 IMS Session Setup Analysis
999
CHAPTER 7 IMS Session Setup Analysis
retransmit the request after T1 seconds. However, P-CSCF does not need to
consider this and would forward the INVITE to S-CSCF and start its own
retransmission timeout. Hence, for determining the delay of the INVITE
requests, one needs to consider the one-way loss (l) between the hops.
Thereby, the delay of the INVITE phase ( ) on the hops between the caller
UE and P-CSCF as well as P-CSCF and S-CSCF can be estimated as
follows:
(7.45)
(7.46)
(7.47)
(7.48)
(7.49)
(7.50)
998
CHAPTER 7 IMS Session Setup Analysis
delay caused by the loss is already accounted for in the increased number of
request retransmissions. Hence, sending of the response only adds
propagation delay to the total delay. We can apply Eqn. (7.32) for
PRACK/200 OK, UPDATE / 200 OK, Final Response 200 OK / ACK and
BYE phase (BYE / 200 OK) with delays , and
(7.51)
Where:
(7.52)
(7.53)
(7.54)
Where:
(7.55)
(7.56)
(7.57)
998
CHAPTER 7 IMS Session Setup Analysis
7.6 Conclusion
998
CHAPTER 8 VoIP Quality Optimization in IMS Networks
CHAPTER 8
VoIP QUALITY OPTIMIZATION IN IMS
NETWORKS
8.1 Introduction
116
CHAPTER 8 VoIP Quality Optimization in IMS Networks
video and data and the second one is for SIP signaling traffic. This chapter
focuses on the VoIP Quality of Service over IMS using SIP as a signaling
protocol.
117
CHAPTER 8 VoIP Quality Optimization in IMS Networks
1. Find voice coder given link bandwidth, packet loss level, and link
utilization level.
2. Find voice coder and packet loss level given link bandwidth and
background link utilization.
3. Find voice coder and background link utilization level given link
bandwidth and packet loss level
OPNET and MATLAB are the optimization tools that are used in
this chapter.
In this section all relevant factors affecting the R value are described.
The R-value is calculated according to the E-model formula [90]:
R = Ro – Is – Id – Ie,eff + A (8.1)
118
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The factor Is is the sum of all impairments that occur more or less
simultaneously with the voice transmission. The simultaneous impairment
factor is divided into three subdivisions:
Is Iolr Ist Iq
Iolr represents the decrease in quality due to too-low values
of OLR, also called excessive loudness.
Ist is the impairment caused by non-optimum side tone effects.
Iq represents the impairment caused by quantizing distortion.
The factor Id is the delay impairment factor that can be divided into
three parts [137]:
(8.3)
119
CHAPTER 8 VoIP Quality Optimization in IMS Networks
R = Ro – Is – Id – Ie,eff (8.4)
120
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The main output from the E-model is the single R value, produced
by an equation combining all relevant impairments. The R factor ranges
from 0-100 but is basically unacceptable below 50. It is recommended for
most networks to arrive at a score above 70 when measuring.
121
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Table 8.2: The R value and its correlation into subjective quality scores [90]
In some cases not only the R score is important but also some of the
specific impairment values Is, Id or Ie. Their individual contribution can be
interesting when determining major impairments or when testing different
impairment solutions. By using these metrics and combining all information
gathered for a connection, a fault diagnosis generally ranging from 0-1 can
be made to indicate the most likely reason for the impairment.
122
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The E-Model has several qualities that interact with each other. For
example, subjective tests have shown that there is a tradeoff between
bandwidth and quality when looking at compression methods. There is also
a relationship between delay and quality [89].
123
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Idte=0 (8.35)
Idle=0 (8.36)
And since
Id=Idte+Idle+Idd (8.37)
So
Id=Idd (8.38)
For Ta 100 ms:
Idd 0
For Ta 100 ms:
1
X 6 6
1
Idd 25 1 X 6 6 – 31 2 (8.39)
3
With:
Ta
log
X 100
(8.40)
log 2
Second, the Advantage (A) is assumed to be equal to zero.
A=0 (8.41)
124
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Is=0 (8.42)
Due to the complexity of the E-Model, the approach used here is to try
to identify which E-Model parameters are fixed and which parameters are
not. In the context of this research the only parameters of the E-Model that
are not fixed are:
Where T is the mean one way delay of the echo path, Ta is the absolute
delay in echo free conditions [89]. In addition, parameters that affect delay
Id and Ie are introduced:
PL - Packet Loss %
ρ- Link Utilization
Coder Type
125
CHAPTER 8 VoIP Quality Optimization in IMS Networks
1
X 6 6
1
Id= Idd 25 1 X 6 6 – 31 2 (8.45)
3
With:
Ta
lg
X 100
lg2
126
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Ie eff Ie 95 Ie
Ppl
(8.46)
Ppl Bpl
Packet Size Ie
Codec Rate (Kbps) Bpl
(msec) (no packet loss)
G 711 64 10 0 25.1
G.729A + VAD 8 20 11 19.0
G.723.1+VAD 8.3 30 15 18.1
127
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Figure 8.4 R-factor values from the E-model and corresponding MOS values
128
CHAPTER 8 VoIP Quality Optimization in IMS Networks
129
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The links between the routers and the Internet are T1 with link speed
1.544 Mbps and the links between the dialer, dialed, Proxy Server and the
routers are 1000 Base-x. The idea is to configure the network with a certain
parameters and run the simulation then getting from the tool the result
values which used in E-Model equations to measure the Quality of service
Factor R.
130
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The objective function for all cases is to maximize the number of calls
that can be active on a link while maintaining a minimum level of voice
quality (R). The cases considered are:
1. Find the optimal voice coder given link bandwidth, packet loss level,
and background link utilization level.
2. Find the optimal voice coder and the optimal packet loss level given
link bandwidth and background link utilization.
3. Find the optimal voice coder and the optimal background link
utilization level given link bandwidth and packet loss level.
Standard parameters for each codec used in the analysis are listed in
Table 8.7.
131
CHAPTER 8 VoIP Quality Optimization in IMS Networks
8.10 Results
In this part the results of the 3 cases are presented and also the
comments for this results.
The results are divided into three general cases. For all cases, the aim
is to maximize the number of calls that can be carried on a link while
maintaining a minimum voice quality level (R > 70).If two combinations
132
CHAPTER 8 VoIP Quality Optimization in IMS Networks
produce the same number of calls, the highest R value will be considered the best
selection.
The goal of this case is to find the optimal voice coder given link
bandwidth, packet loss level, and background link utilization level.
Table 8.8 and Table 8.9 are containing the coding parameters used
in Case1-1 of the simulation. OPNET is configured by these parameters
which are according to the ITU-T G.107 [87]
Table 8.9 also shows other differences between voice codes G.711,
G.729 and G.723.1 with respect to the bandwidth calculations like voice
payload size, number of packets per second and the bandwidth required
after adding the headers of other protocols.
For Case 1 with a link speed of 1.544 Mbps, The simulation was run
for 2 hours and 4 hours and in all cases G.723.1 gave the max. Number of
calls with R value more than 70, so G.723.1 was selected as the optimum
Coder.
133
CHAPTER 8 VoIP Quality Optimization in IMS Networks
For Case 1 with a link speed of 1.544 Mbps, The simulation was run
for 2 hours and 4 hours and in all cases G.723.1 gave the max. Number of
calls with R value more than 70, so G.723.1 was selected as the optimum
Coder.
134
CHAPTER 8 VoIP Quality Optimization in IMS Networks
For G.711 gave the max. Quality of service (Highest R value) but the
lowest number of calls, G.729 gave middle number of calls between G.711
and G.723 and also middle R value. As shown in Table 8.10
Figure 8.7 shows the average packet end to end delay for different
codecs and figure 8.8 shows the number of connected calls for different
coders.
135
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The following table (8.10) contains data collected from OPNET in this case
of 4 hours observation
The results of this case are shown in Figure 8.9 not surprising, as
G.723.1 is a more efficient but lower quality of voice.
136
CHAPTER 8 VoIP Quality Optimization in IMS Networks
100
90
80
Number of Calls
70
R-Value
60 R-Value
50 Number of Calls
40 Thershold R-Value
30
20
10
0
G.711 G.729 G.723
Coder
For Case 1 with a link speed of 1.544 Mbps, G.723.1 was selected as
the optimum coder by the OPNET tool. It found 15 calls in 2 hours
simulation and 39 calls for 4 hours observations.
The goal of this case is to find the optimal voice coder and the
optimal packet loss level given link bandwidth and background link
utilization.
137
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Table 8.11 contains the parameters used for case 2 of the simulation
which is according to the ITU-T recommendation G.113 [89].
The simulation was run for 1 hour, 2 hours and 4 hours and for the 3
coders G.711, G.729 and G.723 with different values of packet loss ratio.
The test was run with a link speed of 1.544 Mbps. The maximum
number of calls was 29 calls. G.723.1 with packet loss of 0.5% was the
combination chosen and the same combination was chosen till packet loss
of 1.5 %.
138
CHAPTER 8 VoIP Quality Optimization in IMS Networks
For packet loss more than 2 % G.723.1 and G.729 became not
feasible and the only feasible coder is G.711.G.711 with packet loss more
than 2 % was the combination chosen. The results for case 2 is listed in
table 8.12
Table 8.12 Results for case (2)
Delay
PL
CODEC (Ta) ID IE R MOS Calls
Ratio
(ms)
G.711
142 0.054 1.855 91.29 4.36 27
G729a
0.50% 86 0 13.15 80.05 4.02 28
VAD+
G723.1
91 0 18.4 75.8 3.7 29
VAD+
G.711
141 0.053 3.64 89.51 4.3 27
G729a
1.00% 86 0 15.2 78 3.8 28
VAD+
G723.1
91.4 0 19.678 73.522 3.6 35
VAD+
G.711
141 0.053 5.36 88.78 4.2 25
G729a
1.5% 87 0 18.15 78.05 3.8 29
VAD+
G723.1
93 0 21.82 71.38 3.6 33
VAD+
G.711
140 0.053 0118. 88.136 4.2 27
G729a
2% 87 0 19 74.99 3.7 29
VAD+
G723.1
92 0 23.839 69.153 3.5 34
VAD+
G.711
137 0.052 15.78 74.732 3.7 28
G729a
5% 86 0 28.5 64.7 3.3 26
VAD+
G723.1
91 0 33.95 59.25 3.04 27
VAD+
139
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Packet
Case # loss% Optimum Coder
1 0.5% G.723.1
2 1% G.723.1
3 1.5% G.723.1
4 2% G.729
5 > 3.5% G.711
140
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The goal of this case is to find the optimal voice coder and the
optimal background link utilization level given link bandwidth and packet
loss level.
The simulation was run for link speed T1 1.544 Mbps with
variable background link utilization (90%, 92%, 94% and 95%) and
different coders; the packet loss ratio was considered 0 % in all cases.
It was shown that that all three coders were in a feasible range until
background link utilization reached approximately 94%.
141
CHAPTER 8 VoIP Quality Optimization in IMS Networks
It is also noticed that the most affected parameter in this case is the
Id , as the Background Link Utilization is affecting the Delay (Id)
parameters as shown in Figure 10. The optimization results for case (3) are
listed in Table 8.14
Frame Number
Codec Voice
Look length of Voice IE
Bit Frame
Standard Type ahead (ms) Frames No
Rate Lenght
(ms) Packet per PL
(kbps) (ms)
Length Packet
G.711 PCM 64 0.125 0 20 1 0
CS-
20 2 11
G.729 ACELP 8 10 5
MP-
G.723.1
MLQ 8.3 30 7 30 1 15
The test was run with a link speed of 1.544 Mbps and the simulation
was run for 2 hours.
With Back ground link utilization 92%, 94% and 95%, G.723.1
became the chosen coder.
With back ground link utilization 95% G.711 became not feasible as
its R value was below 70 and the feasible coders were G.729 and G.723.1.
Table 8.15 contains the results obtained for case 3; the variables in
this case are the Background Link Utilization and the coder type.
142
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Looking at Figure 8.11 we can see that all three coders were in a
feasible range until background link utilization reached approximately 94%.
Background
Delay
Link
Utilization Codec (Ta)
ID IE R MOS Calls
% (ms)
G.711
132 0.02 0 93.18 4.4 13
G729A
90%
91 0 11 82.2 4.1 13
G723.1
97 0 15 78.2 3.9 13
G.711
148 0.13 0 93.07 4.4 14
G729A
92%
94 0 11 82.2 4.1 18
G723.1
104 0 15 78.2 3.9 19
G.711
278 12.28 0 80.9 4 17
G729A
94%
97 0 11 82.2 4.1 14
G723.1
106 0 15 78.2 3.9 18
G.711
2326 49.4 0 43.79 2.2 22
G729A
95%
123 0.004 11 82.196 4.1 8
G723.1
124 0.004 15 78.196 3.9 15
143
CHAPTER 8 VoIP Quality Optimization in IMS Networks
In Figure 8.10, R remains constant for all coders until a point where
R declines rapidly.
Figure 8.11 R Value, Background link Utilization % vs. Coder – case (3)
It is also noticed that the most affected parameter in this case is the
Id which is expected as the Background Link Utilization is affecting the
Delay (Id) parameters as shown in Figure 8.12.
144
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Figure 8.12 Background Link Utilization % and Id vs. Coder – case (3)
Background
Case # Link Utilization Optimum Coder
1 90% G.711
2 92% G.723
3 94% G.723
4 95% G.723
145
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Case 2 found that G.723.1 with 0.5%, 1% and 1.5% packet loss was
optimal but with packet loss 2 % it was not feasible and G.729 was the
optimum coder.
146
CHAPTER 8 VoIP Quality Optimization in IMS Networks
The ability to analyze various coders, delay, packets loss and the
effect of background link utilization is vital to the design of VoIP network.
The optimization of the E-Model provides a tool that is useful for this
purpose.
Case 2 required additional analysis because not all of the packet loss
percentages have been tested and recorded (as shown in Table 8.7).
147
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Figure 8.14 shows a graph of the observed versus the curve fit.
Figure 8.15 shows a graph of the observed data versus the curve fit.
148
CHAPTER 8 VoIP Quality Optimization in IMS Networks
Figure 8.16 shows a graph of the observed data versus the curve fit.
149
CHAPTER 8 VoIP Quality Optimization in IMS Networks
8.12 Conclusions
150
CHAPTER 9 Conclusions and Future Work
CHAPTER 9
CONCLUSIONS AND FUTURE WORK
9.1 Conclusions
151
CHAPTER 9 Conclusions and Future Work
(NGN) of the Fixed and Mobile Networks. This Thesis proposes robust and
scalable methods that can be used to test the performance of the IP Multimedia
Subsystem (IMS) controllers, Call Session Control Function (CSCF) and
benchmark their vendors.
151
CHAPTER 9 Conclusions and Future Work
The objective function for all cases is to maximize the number of calls that
can be active on a link while maintaining a minimum level of voice quality
(R< 70).
In case one, we found that G.723.1 is the optimized coder as it gives the
maximum number of calls keeping its R factor more than 70. The quality of
speech is generally higher with G.729A and G.711. But G.729A and G.711
uses more bandwidth than G.723.1. In Case 2, both G.729A and G.723.1 were
sensitive to changes in packet loss, but G.711 was not as sensitive. In Case 3,
voice quality was not sensitive to changes in the link load until the link load
grew above approximately 94%.
151
CHAPTER 9 Conclusions and Future Work
messages and the session establishment delay. The presented theoretical model
will need to be verified more thoroughly using more elaborated loss models,
different usage scenarios, traffic models as well as investigate the effects of
overloaded servers.
Further, the presented models in Chapter 7 assume using UDP as the transport
protocol and do not consider TCP. As TCP uses its own retransmission
mechanisms, the number of sent messages and the delay would differ from the
results presented here. With SIP gaining in complexity the message sizes are
increasing as well leading to possible message fragmentation. This can further
change the loss characteristics and needs to be considered in our future work.
Additionally, we only considered calls to single destinations. SIP supports so
called forking that would allow a proxy to forward a request to different
destinations and wait for their responses. This would add additional
complexities in determining the loss behavior and delay values.
The tests applied in this thesis in chapter 8 for VoIP Quality Optimization in
IMS used a well known codecs (G.711, G.729 and G.723.1) and in future we
are looking forward to apply the same optimization model on Adaptive multi-
rate (AMR) codec. AMR has been chosen by 3GPP as a mandatory codec and
is widely used in current 3G mobile handsets. AMR is a multi-mode codec
with eight modes (AMR475 to MR122) with bit rates between 4.75 Kb/s to
12.2 Kb/s. In current 3G mobile handsets, a fixed bit rate AMR codec (e.g.,
12.2 Kb/s) is normally used.
The approach discussed in this thesis chapter 8 for VoIP Quality Optimization
in IMS to deal with QoS problems for VoIP can be extended towards different
types of applications, such as video services and web browsing, amongst others.
151
REFERENCES
155
[15] Alexander Harrowell, (October 2006), A Pointless Multimedia Subsystem?,
Mobile Communications International.
[16] Rosenberg, J; and Schulzrinne, H; 2002b Reliability of Provisional Responses
in Session Initiation Protocol (SIP) RFC 3262.
[17] 3GPP, Technical Specification Group Core Network and Terminals ; Numbering,
addressing and identification, TS 23.003,2008
[18] Aboba, B and Beadles, M; 1999 The Network Access Identifier RFC 2486
[19] 3GPP, Technical Specification Group Core Network and Terminals; General
Universal Mobile Telecommunications System (UMTS) architecture, TS
23.101, 2007.
[20] 3GPP, Technical Specification Group Core Network and Terminals; Specification
of the Subscriber Identity Module - Mobile Equipment (SIM-ME) Interface,
TS 11.11, 2007.
[21] 3GPP, Technical Specification Group Core Network and Terminals;
Characteristics of the Universal Subscriber Identity Module (USIM)
application, TS 31.102,2008
[22] 3GPP, Technical Specification Group Core Network and Terminals;
Characteristics of the IP Multimedia Services Identity Module (ISIM)
application, TS 31.103,2008
[23] 3GPP, Technical Specification Group Core Network and Terminals; Signaling
flows for the IP multimedia call control based on session initiation protocol
(SIP) and session description protocol (SDP),TS 24.228,2007.
[24] 3GPP, Technical Specification Group Core Network and Terminals; IP multimedia
call control protocol based on Session Initiation Protocol (SIP) and Session
Description Protocol (SDP); Stage 3 (Release 7).TS 24.229,2005.
[25] 3GPP, Technical Specification Group Core Network and Terminals; Interworking
between the IM CN subsystem and IP networks; TS 29.162, 2008.
[26] Tsirtsis, G; and Srisuresh, P; Network Address Translation - Protocol
Translation (NAT-PT) RFC 2766 (2000).
[27] ITU-T Rec. Q.761, Signaling System No. 7 - ISDN User Part functional
description. Technical report, ITU-T, 1999.
156
[28] ITU-T Rec. Q.1902.3, Bearer independent call control protocol (Capability Set
2) and Signaling System No. 7 ISDN user part: Formats and codes. Technical
report, ITU-T, 2003.
[29] H.248.1 Gateway control protocol. Technical report, ITU-T, ITR 2005.
[30] Stewart, R; Stream Control Transmission Protocol RFC 4960 (2007).
[31] ITU-T Rec. Q.701, Functional description of the message transfer part (MTP)
of Signaling System No. 7. Technical report, ITU-T, 1993.
[32] Schulzrinne, H; Casner, S; Frederick, R; and Jacobson, V; RTP: A Transport
Protocol for Real-Time Applications RFC 3550 (2003).
[33] 3GPP, Technical specification group core network and terminals, End-to-end
Quality of Service (QoS) signaling flows, TS 29.208, 2007.
[34] 3GPP, Technical specification group core network and terminals, General
Universal Mobile Telecommunications System (UMTS) architecture, TS
23.101, 2007.
[35] 3GPP, Technical specification group core network and terminals, Policy
control over Gq interface, TS 29.209, 2007.
[36] Calhoun, P; Loughney, J; Guttman, E; Zorn, G; and Arkko, J; Diameter Base
Protocol RFC 3588 (2003).
[37] Durham, D; Boyle, J; Cohen, R; Herzog, S; Rajan, R; and Sastry, A; The
COPS (Common Open Policy Service) Protocol RFC 2748 (2000). Updated by
RFC 4261.
[38] 3GPP, Technical specification group core network and terminals, Policy
control over Go interface. TS 29.207, 2005.
[39] 3GPP, Open Service Architecture (OSA) Application Programming Interface
(API) - Part 1, TS 29.198 ,2001
[40] 3GPP, Technical specification group core network and terminals, Customized
Applications for Mobile network Enhanced Logic (CAMEL); CAMEL
Application Part (CAP) specification for IP Multimedia Subsystems (IMS). TS
29.278, 2005.
[41] Noldus, R; CAMEL: Intelligent Networks for the GSM, GPRS and UMTS
Network. John Wiley &Sons, 2006.
157
[42] 3GPP, Technical specification group core network and terminals, IP
Multimedia (IM) Subsystem Cx and Dx Interfaces; Signaling flows and
message contents. TS 29.228, 2008.
[43] 3GPP, Technical specification group core network and terminals, IP
Multimedia Subsystem (IMS) Sh interface; Signaling flows and message
contents. TS 29.328, 2008.
[44] Calhoun, P; Loughney, J; Guttman, E; Zorn, G; and Arkko, J; Diameter Base
Protocol RFC 3588 (2003).
[45] J. Rosenberg , H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R.
Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol,
RFC3261. IETF, June 2002.
[46] J. Peterson. S/MIME Advanced Encryption Standard (AES) Requirement for
the Session Initiation Protocol (SIP), RFC 3853. IETF, July 2004.
[47] R. Sparks. Actions Addressing Identified Issues with the Session Initiation
Protocol's (SIP) Non-INVITE Transaction, RFC 4320. IETF, January 2006.
[48] K. Zeilenga. Lightweight Directory Access Protocol (LDAP): Technical
Specification Road Map, RFC 4510. IETF, June 2006.
[49] Garcia-Martin, M; Henrikson, E; and Mills, D ; Private Header (P-Header)
Extensions to the Session Initiation Protocol (SIP) for the 3rd-Generation
Partnership Project (3GPP) RFC 3455 (2003).
[50] M. Handley, V. Jacobson, and C. Perkins. Session Description Protocol (SDP).
RFC 4566. IETF, July 2006.
[51] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport
Protocol for Real-Time Applications. Request for Comments: 3550. IETF, July
2003.
[52] X. Yi. Adaptive Wireless Multimedia Services. Wireless Center, KTH, May
2006.
[53] M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman. The
Secure Real-time Transport Protocol (SRTP), Request for Comments: 3711.
IETF, March 2004.
[54] E.Carrara. Security for IP Multimedia Applications over Heterogeneous
Networks. [Online] [Cited: September 12, 2008]
158
[55] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko. Diameter Base
Protocol, Request for Comments: 3588. IETF, September 2003.
[56] Miikka Poikselkä, Georg Mayer, The IP Multimedia Concepts and Services,
3rd Eidtion, 2009 John Wiley & Sons Ltd, ISBN 978-0-470-72196-4
[57] Performance Measurement Tools for SIP Server by Samit Jain from Columbia
University, New York, 2008.
[58] SIPstone - Benchmarking SIP Server Performance by Henning Schulzrinne,
Sankaran Narayanan, Jonathan Lennox and Michael Doyle from Columbia
University, Ubiquity. April 12, 2002.
[59] Testing Session Initiation Protocol.(SIP) Saturation . The University of New
Hampshire, Interoperability Laboratory © 2005.
[60] Intel and Open Cloud performed the SIP Application Server tests in May 2006.
[61] The open SIP express router (OpenSER) http://www.openser.org.
[62] R. Gayraud and O. Jacques. SIPp. SIPp Tool (http://sipp.sourceforge.net).
[63] iptel.org. SIP express router (SER).http://www.iptel.org/ser.
[64] “PROTOS Security Testing of Protocol Implementations” University of
Oulu.www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip
[65] Spectra2|SE2 Software-only IMS and VoIP Testing Solution. Functional and
Load Testing from Your Laptop. Solution Note |
www.tektronix.com/spectra2SE.
[66] Wireshark Network Protocol Analyzer, www.wireshark.org
[67] Methods for Testing and Specification (MTS); Conformance Test Specification
for SIP (IETF RFC 3261); Part 1: Protocol Implementation Conformance
Statement (PICS), ETSI TS 102 027-1 V4.1.1 (2006-07).
[68] 3GPP, Internet Protocol (IP) multimedia call control protocol based on Session
Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3
(Release 9), TS 24.229 V9.2.0 (2009-12).
[69] http://www.ilocus.com/content/report/global-voip-market-2010-11th-annual-
update
[70] H. Chebbo and W. M, “Traffic and load modeling of an IP mobile network,” in
Fourth International Conference on 3G Mobile Communication Technologies,
London, UK, June 2003.
159
[71] V. K. Gurbani, L. Jagadeesan, and V. B. Mendiratta, “Characterizing session
initiation protocol (SIP) network performance and reliability.” In ISAS, ser.
Lecture Notes in Computer Science, M. Malek, E. Nett, and N. Suri, Eds.
Springer, pp. 196–211.
[72] J.-S. Wu and P.-Y. Wang, “The performance analysis of SIP-T signaling
system in carrier class voip network,” in AINA ’03: Proceedings of the 17th
International Conference on Advanced Information Networking and
Applications. Washington, DC, USA: IEEE Computer Society, 2003, p. 39.
[73] H. Fathi, S. S. Chakraborty, R. Prasad, “On SIP session setup delay for VoIP
services over correlated fading channels,” IEEE Transactions on Vehicular
Technology, vol. 55, no 1, pp. 286–295, January 2006.
[74] Muhammad T. Alam (2005). “An Optimal Method for SIP-Based Session
Establishment over IMS” 2005 International Symposium on Performance
Evaluation of Computer And Telecommunication Systems (SCS 2005), July
24-28, Hilton Cherry Hill/Philadelphia, Philadelphia, Pennsylvania, Sim
Series.,Vol 37, No. 3, pp: 692-698.
[75] Sisalem, D.; Liisberg, M.; Rebahi, Y., "A Theoretical Model of the Effects of
Losses and Delays on the Performance of SIP", Globecom 2008, New Orleans,
December 2008
[76] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, “Diameter Base
Protocol.” RFC 3588, Internet Engineering Task Force, Sep 2003.
[77] Faltstrom, P., "E.164 number and DNS", RFC 2916, September 2000
[78] ITU-T, Gateway control protocol: Version2.Recommendation.
[79] H.248, International Telecommunications Union, May 2002.
[80] H. Schulzrinne, S. Casner, S. Frederick, and R . Jacobson, "RTP: a Transport
Protocol for Real-Time Applications", STD 64, RFC 3550, July 2003.
[81] J. Rosenberg, H. Schulzrinne , G. Camarillo, A. Johnston, J. Peterson, R.
Sparks, M. Handley, E. Schooler, “SIP: Session Initiation Protocol.” Internet
Engineering Task Force, RFC 3261, June 2002.
[82] “Signaling flows for the IP multimedia call control based on session initiation
protocol (SIP) and session description protocol (SDP),” 3rd Generation
160
Partnership Project, Technical Specification Group Core Network and
Terminals, 2007.
[83] Sisalem, D.; Floroiu, J.; Kuthan, J.;Abend,U.; H. Schulzrinne, " SIP Security
", 2009
[84] V. Kueh, R. Tafazolli, B. Evans, “Performance evaluation of SIP-based
session establishment over satellite-UMTS.” Vehicular Technology
Conference, 2003. VTC 2003-Spring. The 57th IEEE Semiannual, Vol: 2, 22-
25 Apr 2003, pp: 1381 – 1385.
[85] H. Fathi, S. S. Chakraborty, R. Prasad, “Optimization of SIP session setup
delay for VoIP in wireless networks,” IEEE Transactions on Mobile
Computing, vol. 5, no 9, pp. 1121–1132, September 2006
[86] 3GPP TSG GERAN, “A Comparison between Packet-Switched Call Setup
Using SIP and GSM Circuit-Switched Call Setup Using RIL3-CC, RIL3-MM,
RIL3-RR, and DTAP,” GP-000508, Nortel Networks, Nov 2000.
[87] ITU-T Recommendation G.107, “The E-model, a Computational Model for use
in Transmission Planning”, Mar. 2005.
[88] 3GPP, TSG SSA, IP Multimedia Subsystem (IMS) – Stage 2 (Release 9), TS
23.228 V9.2.0 (2009-12).
[89] ITU-T Recommendation G.113, “Transmission impairments due to speech
processing”, (11/2007).
[90] ITU-T Recommendation G.108, “Application of the E-model: A planning
guide”, Sep., 1999
[91] ITU-T Recommendation G.729, "Coding of Speech at 8 kbit/s Using
Conjugate-Structure Algebraic-Code-Excited Linear-Prediction (CS-ACELP)",
(01/2007).
[92] ITU-T Recommendation G.723, " Dual rate speech coder for multimedia
communications transmitting at 5.3 and6.3 kbit/s)", (05/2006)
161