HSS Workshop
HSS Workshop
GEP2-E1/T1
GEP2-E1/T1
GEP2-SAS
GEP2-SAS
Scope
GEP2
GEP2
GEP2
GEP2
GEP2
GEP2
MXB
GED
GED
MXB
› Overview
› HW Overview
› User Interface
› Configuration
› Integration
› Troubleshooting
Overview
What is HSS & SLF?
› The Home Subscriber Server (HSS) is a logical entity defined in 3GPP Release 8 as:
“The HSS is the master database for a given user. It is the entity containing the
subscription related information to support the network entities actually
handling calls/sessions”.
› The Subscription Locator Function (SLF) is a logical entity defined in 3GPP Release
8 as:
The entity which “is queried by 3GPP AAA server, I-CSCF or Application server to
get the name of the HSS containing the required subscriber specific data. The
SLF is not required in a single HSS environment.”
Types of HSS
• Classic depoyment
• Front-End Deployment
Ericsson HSS/SLF overview
Applications &
CUDB
Services
Sh or Dh
LDAP SOAP Sh
Diameter proxy
HSS Service provisioning Mobility management
Radius proxy SLF
User authentication Access authorization Load balancer
HSS/SLF 11 SW application
IMS Sales:
ISM ESM WSM SDA AVG SLF
ISM (+SDA) (+AVG) (+SLF)
EPC Sales:
ESM (+SDA) (+AVG) (+SLF)
TSP 6.0 platform
WLAN/WiMAX Sales:
HW: NSP 5.0 (for upgrades only)
HW: NSP 6.0 (for all packages) WSM (+SDA) (+AVG)
Note: Modules highlighted within parenthesis e.g. (+SDA) are optional modules applicable within identified domain.
IMS Subscription Manager (ISM)
This Module provides a variety of functionalities
and procedures related to e.g. subscription
management, mobility management
procedures, session establishment control, user
authentication, and access authorization in the
IMS network.
Subscription Data Access (SDA)
This Module provides the application layer with
user-related data within a network. Moreover, it
acts as repository for application servers profile
data managed as transparent data in HSS server.
EPC Subscription Manager (ESM)
This Module provides the handling of
subscriptions, authentication, authorization,
user traffic protection and mobility
management in the EPC domain.
WLAN Subscription Manager (WSM)
This Module provides subscription
management, authentication, authorization and
user traffic protection in the context of WLAN
accesses.
Authentication Vector Generator
(AVG)
This function performs the algorithms relevant
for the generation of authentication vector in
association with ISIMand USIM-based
authentication for IMS, USIM-based
authentication for EPC or USIM-based
authentication for WLAN.
Subscription Locator Function (SLF)
module
When multiple and separately addressable HSS
nodes are deployed in the network, the SLF
routes HSS traffic towards the proper HSS
instance, based on the configured SLF traffic
distribution mode (proxy or redirect).
HSS/SLF Modules and Interfaces System Performance management
Provisioning Provisioning notifications Fault management OSS-RC
System Configuration management
HSS Provisioning SOAP
System SW management
LDAP
PSM ESM
GGSN/AAA IMS SSO
Roaming awareness Evolved Packet Core MME
Packet
Gi S6a
Session Manager SAE Subscription
module
AAA Inter-working IP Works
CSCF
HSS SIH SWx
Subscription Data
(AAA)
IP Multimedia System
SDA
Access
ISM
Application Server
Cx Sh
(e.g. MTAS)
XCAP Server Subscription Data
XCAP Authentication IMS Subscription
Support, module Access module
XCAP
Aggregation Zx
-5 Proxy
AVG SLF
Authentication Vector Subscription Locator • Dx, Dh (Redirect)
LDAP Generator module Function • Cx, Sh, Zh, S6a (proxy)
Subscription Data
Security:
SDA
Access
EPS-AKA 12A
Application Server
Sh
(e.g. MTAS)
Subscription Data
Access module MSP /EAP-AKA
BSF
GAA/GBA support Multi Service Proxy
Zh Server
Boot Strapping Function
Mobility Mgt
D’/Gr’
TSP-node
capacity and function G G G G D
expansion E
P
E
P
E E U
P D M
Add as needed! 2
-
2
-
2 M
- Y
1 E S
2 1
Appl. processor G SS7 processor T File server A
S
Dummy
GEP2 12GB B
GEP2 4GB 1
PIU
TSP-node G G G G
G G G G
mandatory E
P
E
P
E
P
E
P
E E E E
P D P D
2 2 2 2
2 2
- - - -
2 Loaders 1 1 2 Node 1 1 2 I/O processors, - -
S S
GEP2 12GB 2
G
2
G
Management 2
G
2
G
with Disks A A
S S
B B GEP2 12GB B B
Mandatory
for each
M M
subrack X X
B B
2 Switches
TSP subrack and Infrastr. boards
M M
X X
B B
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
G G G G G
G G G
E E E E E
E E E
P P P P P
P D D
2 2 2 2 2
2
- - - - -
-
S 1 1 1 1
S
A 2 2 2 2
A
S G G G G
S
B B B B
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
G G G G G
G G G
E E E E E
E E E
P P P P P
P D D
2 2 2 2 2
2
- - - - -
-
S 1 1 1 1
S
A 2 2 2 2
A
S G G G G
S
B B B B
G G G G G
G G G
E E E E E
E E E
P P P P P
P D D
2 2 2 2 2
2
- - - - -
-
S 1 1 1 1
S
A 2 2 2 2
A
S G G G G
S
B B B B
(GEP2)
M G G G G G G G G G G G G M
E E E E E E
X E E
P P P P
E E E E X
P D P D P P P P
B 2 2 2 2 B
Cab le s helf
T
1
T
1
T
1
T
1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
minimal HW configuration - - - - 2 2 - - - -
12 12 12 12 - - 12 12 12 12
G G G G S S G G G G
B B B B B B B B
A A
S S
Cab le s helf
HSS/SLF
HSS/SLF on Ericsson Blade HW
HSS on Ericsson Blades (BYB 501 Cabinet)
supporting:
• TSP 6.0 on NSP 6.0 hardware. GEP2 blades
on EGEM subracks.
• TSP 6.0 on NSP 6.1 Ericsson Blade Server
(EBS) hardware. GEP3 blades on EGEM2
subracks. 1800 mm
• Excellent & seamless scalability
• From 2 to 28 HSS blades in TSP 6.0 / NSP
6.0
• From 2 to 30 HSS blades in TSP 6.0 / NSP
6.1
Excellent Capacity/Footprint Ratio 400 mm
600 mm
High Availability (HW and SW redundancy)
NSP 6.1
TSP Architecture
TelORB Clusterware
TSP Clusterware
O&M
DICOS
DICOS LINUX
NSP
TSPHardware
Hardware
Node Management
Traffic and/or
O&M Network
Signaling Network
(IP)
(IP)
Intranet
VIP VIP
IO1 IO2 TP TP TP TP TP TP
TSP Cluster
Internal
Network 0
Internal
Network 1
HSS_ESM DIA
SLF tspPM
PDN GW
MME HSS
S5
Diameter Diameter
Serving GW PDSN
SCTP SCTP
IP IP
S1-U
Data link layer Data link layer
eNodeB
Physical layer Physical layer
X2
E-UTRAN
S6a
S6a interface enables transfer of subscriber related data between MME and HSS
The S6a interface is based on the Diameter Base protocol and offers a subset of procedures
Diameter over Stream Control Transmission Protocol is used between the MME and HSS
General flows
3GPP TS 23.401 v8.7.0
HSS Command codes
3GPP TS 23.401 v8.7.0
ESM = HSS
S6a Interface – diameter sctp
IMSI Initial Attach Procedure
MME HSS
AIA
ULA
1) During the subscriber attach, MME sends the Authentication-Information-Request (AIR) message to
HSS.
1) HSS analyzes the IMSI A4key/OP information and if it matches, it sends the Authentication-
Information-Answer (AIA) message back to MME.
1) HSS changes the search for IMSI table, change its status from UNKNOWN to LOCATED, stores the
MME Address and send the User-Location-Answer (ULA) back to MME.
S6a Interface – diameter sctp
IMSI Detach Procedure
CLA
1) The MME disconnects the IMSI and sends the Cancel-Location-Answer (CLA) message
back to HSS
S6a Interface – diameter sctp
Insert Subscriber Data Procedure
Ldap Modify
IDA
1) The MME updates the IMSI profile and sends the Insert-SubscriberData-Answer (IDA)
message back to HSS
Configuration
USER interface: TSP Node
Management Toolbox
Preconfigured unique
name of the node
User Name
CM Browser JXplorer: View for EPC HSS
Connect/disconnect to/from Directory System Agent
Backup Handling
HSS Backup
DBN and IO Processor
DBN Backup
Backup
co-located TSP
External Backup
applications Media
OS
IO-Filesystem
co-located TSP
External Backup
applications Media
OS
IO-Filesystem
2
1
3
ALARMS
ALARMS - Generic concepts
An alarm is a message which informs the user that an event has taken place
which is categorized as a “fault”.
Automatically Automatically
Detected and Detected and
Automatically Manually Cleared
There are two types of faults: Cleared (ADAC) (ADMC)
LISTING ALARMS
Listing alarms in HSS can be done through:
COMMUNICATIONS
› The type of alarm is
QUALITY OF SERVICE
according to ITU-T
PROCESSING ERROR
Recommendation
EQUIPMENT
X.733, Alarm Reporting ENVIRONMENTAL
Function.
Alarm Viewer – Object Type
TelORB Clusterware
TSP Clusterware
TSP software failures O&M
DICOS LINUX
NSP
TSP Hardware
Hardware
Hardware issues
TSP
Main Hardware related
alarms
Failure on power A1
Fan Unit, Power Failure
Fan unit 1: Temperature > 65*C
Hardware configuration is changed
HDD fault detected
Processor Board, Power Failure
Processor Board, Temperature Threshold Crossed
Processor Disabled
Switch Board, Power Failure
Switch Board, Temperature Threshold Crossed
Main TSP Software and
communication related
alarms
› DBN Database, Scheduled Backup Failed
› DBN Database, Scheduled Backup Archiving Failed
› DBN Disk Logged Data not Accessible
› DBN Disk Log Incomplete
› Diameter, Link Disabled
› Diameter, Link Failure
› Diameter, Own Node Disabled
› Diameter, Peer Node Disabled
› Disk Storage Shortage
› File Transfer Utility, Outgoing File Transfer Not Successful
› IO, Scheduled Archiving Failed
› License Management, Connection Lost with Primary License Server
› Maximum backup interval exceeded
› Memory Usage Limit Exceeded
› Zone Reloaded From Backup
APPLICATIONS specific
alarms
ESM related:
/opt/mirror/tsp/applog/applog.Alarm.*
The log contains info to identify the alarm, the severity, the probable cause, etc.
Please refer to document “Fault Management User Guide”, section 3 (The Alarm Log)
for a detailed description of each field.
Info about the acknowledgement time (ackTime) and the ID of the user who acknowledged
the alarm (ackUserId) is also logged.
The alarm log database can also be seen by using the Log Query Tool.
By clicking on the
magnifying glass, it is
possible to find
additional info on the
notification
Notification Viewer – Event
HELP
/opt/mirror/tsp/applog/applog.Notification.*
The notification log database can also be seen by using the Log Query Tool.
/opt/telorb/axe/loadingGroup01_1/mirrored/config/NM/logging/config/logging.conf
Linux “syslog”
DicosSyslog
DicosApplog
Console logs
The only use for the error logs is for trouble-shooting by Ericsson service
personnel.
Whatever caused the error dump may well have resulted in alarms and notifications
in addition.
Crashcollector_<DATETIME>_<PROCESSOR>.tar.gz
Where:
- DATETIME is the date and time of the creation of the file
- PROCESSOR is the name of the IO that writes the collector to disk
A Crashcollector file contains dump files, error logs and system configuration. Examples of such data
are:
Error dump files
Linux and Dicos syslogs
Processors configuration data (kernel and boot load table)
If you cannot see what has caused the dump, you should send the crashcollector files to the next level
1. Start the Redundancy GUI by clicking on its label in the leftmost browser pane of
the Node Management Toolbox.
2. Check if the TelORB Mode of both zones is Netshared.
3. Check if the TelORB State is InUse for the zone with Primary ZoneStatus.
4. Check if the TelORB State is Ready for the zone with Standby ZoneStatus.
IO synchronization
IO synchronization
Execute the following command on any of the IO processors:
cat /proc/drbd
The synchronization is not completed if the printout includes a progress-bar. If this is the case,
then an estimated time until completion (finish) is also included in the printout. Wait this
period and try again. Expected result:
• cs (connection state) is Connected;
• st (state) is Primary/Secondary on the primary IO and Secondary/Primary on
the secondary IO;
Software version
TSP software version
To determine the TSP SW version:
• Compare the IDP versions listed in the Inventory tab of TelORB Manager to the ones listed in the
latest TSP release note. Note: To speed up IDP version check, select the IDPs that most often change,
like Dicos or VipDicos.
In the TSP release note for TSP6101: