Serving Gateway Overview

Serving Gateway Overview
 
 
The ASR 5000 Core Platform provides wireless carriers with a flexible solution that functions as a Serving Gateway (S-GW) in Long Term Evolution-System Architecture Evolution (LTE-SAE) wireless data networks.
 
This overview provides general information about the S-GW including:
 
 
eHRPD Network Summary
In a High Rate Packet Data (HRPD) network, mobility is performed using client-based mobile IPv6 or Client Mobile IPv6 (CMIPv6). This involves the mobile node with an IPv6 stack maintaining a binding between its home address and its care-of address. The mobile node must also send mobility management signaling messages to a home agent.
 
The primary difference in an evolved HRPD (eHRPD) network is the use of network mobility (via proxy) allowing the network to perform mobility management, instead of the mobile node. This form of mobility is known as Proxy Mobile IPv6 (PMIPv6).
One of the eHRPD network’s functions is to provide interworking of the mobile node with the 3GPP Evolved Packet Core (EPC). The EPC is a high-bandwidth, low-latency packet network also know as System Architecture Evolution (SAE), supporting the Long Term Evolution Radio Access Network (LTE RAN). The following figure shows the relationship of the eHRPD network with the EPC.
 
 
eHRPD Network Components
The eHRPD network is comprised of the following components:
 
Evolved Access Network (eAN)
The eAN is a logical entity in the radio access network used for radio communications with an access terminal (mobile device). The eAN is equivalent to a base station in 1x systems. The eAN supports operations for EPS – eHRPD RAN in addition to legacy access network capabilities.
 
Evolved Packet Control Function (ePCF)
The ePCF is an entity in the radio access network that manages the relay of packets between the eAN and the HSGW. The ePCF supports operations for the EPS – eHRPD RAN in addition to legacy packet control functions.
The ePCF supports the following:
 
 
HRPD Serving Gateway (HSGW)
The HSGW is the entity that terminates the HRPD access network interface from the eAN/PCF. The HSGW functionality provides interworking of the AT with the 3GPP EPS architecture and protocols specified in 23.402 (mobility, policy control (PCC), and roaming). The HSGW supports efficient (seamless) inter-technology mobility between LTE and HRPD with the following requirements:
 
 
SAE Network Summary
The System Architecture Evolution was developed to provide a migration path for 3GPP systems and introduce higher data rates and lower latency for a variety of radio access technologies. SAE defines the packet network supporting the high-bandwidth radio network as the Evolved Packet Core (EPC). The EPC provides mobility between 3GPP (GSM, UMTS, and LTE) and non-3GPP radio access technologies, including CDMA, WiMAX, WiFi, High Rate Packet Data (HRPD), evolved HRPD, and ETSI defined TISPAN networks.
The following figure shows the interworking of the EPC with the different radio access technologies.
 
 
E-UTRAN EPC Network Components
The E-UTRAN EPC network is comprised of the following components:
 
eNodeB
The eNodeB is the LTE base station and is one of two nodes in the SAE Architecture user plane (the other is the S-GW). The eNodeB communicates with other eNodeBs via the X2 interface. The eNodeB communicates with the EPC via the S1 interface. The user plane interface is the S1-U connection to S-GW. The signaling plane interface is the S1-MME connection to MME.
Basic functions supported include:
 
 
Mobility Management Entity (MME)
The MME is the key control-node for the LTE access-network. The MME provides the following basic functions:
 
 
Serving Gateway (S-GW)
For each UE associated with the EPS, there is a single S-GW at any given time providing the following basic functions:
 
 
PDN Gateway (P-GW)
For each UE associated with the EPS, there is at least one P-GW providing access to the requested PDN. If a UE is accessing multiple PDNs, there may be more than one P-GW for that UE. The P-GW provides the following basic functions:
 
 
Product Description
The Serving Gateway routes and forwards data packets from the UE and acts as the mobility anchor during inter-eNodeB handovers. Signals controlling the data traffic are received on the S-GW from the MME which determines the S-GW that will best serve the UE for the session. Every UE accessing the EPC is associated with a single S-GW.
The S-GW is also involved in mobility by forwarding down link data during a handover from the E-UTRAN to the eHRPD network. An interface from the eAN/ePCF to an MME provides signaling that creates a GRE tunnel between the S-GW and the eHRPD Serving Gateway.
 
Basic E-UTRAN/EPC and eHRPD Network Topology
The functions of the S-GW for both GTP-based and PMIP-based network sessions include:
 
 
Product Specifications
The following information is located in this section:
 
 
Licenses
The S-GW is a licensed product. A session use license key must be acquired and installed to use the S-GW service.
The following licenses are available for this product:
 
 
Hardware Requirements
Information in this section describes the hardware required to enable S-GW services.
 
Platforms
The S-GW service operates on the ASR 5000 Series platforms:
 
Components
The following application and line cards are required to support S-GW functionality on an ASR 5000 platform:
 
System Management Cards (SMCs): Provides full system control and management of all cards within the ASR 5000 platform. Up to two SMC can be installed; one active, one redundant.
Packet Services Cards (PSCs): Within the ASR 5000 platform, PSCs provide high-speed, multi-threaded PDP context processing capabilities for 4G S-GW services. Up to 14 PSCs can be installed, allowing for multiple active and/or redundant cards.
Switch Processor Input/Outputs (SPIOs): Installed in the upper-rear chassis slots directly behind the SMCs, SPIOs provide connectivity for local and remote management, central office (CO) alarms. Up to two SPIOs can be installed; one active, one redundant.
Line Cards: Installed directly behind PSCs, these cards provide the physical interfaces to elements in the E-UTRAN EPC data network. Up to 26 line cards can be installed for a fully loaded system with 13 active PSCs, 13 in the upper-rear slots and 13 in the lower-rear slots for redundancy. Redundant PSCs do not require line cards.
Redundancy Crossbar Cards (RCCs): Installed in the lower-rear chassis slots directly behind the SPCs/SMCs, RCCs utilize 5 Gbps serial links to ensure connectivity between Ethernet 10/100 or Ethernet 1000 line cards and every PSC in the system for redundancy. Two RCCs can be installed to provide redundancy for all line cards and PSCs.
Important: Additional information pertaining to each of the application and line cards required to support LTE-SAE services is located in the Hardware Platform Overview chapter of the Product Overview Guide.
 
Operating System Requirements
The S-GW is available for all Cisco ASR 5000 Platforms running StarOS Release 9.0 or later.
 
Network Deployment(s)
This section describes the supported interfaces and the deployment scenarios of a Serving Gateway.
 
Serving Gateway in the E-UTRAN/EPC Network
The following figure displays a simplified network view of the S-GW and how it interconnects with other 3GPP Evolved-UTRAN/Evolved Packet Core network devices.
 
S-GW in the E-UTRAN/EPC Network
 
Supported Logical Network Interfaces (Reference Points)
The following figure displays the specific network interface between a Serving Gateway and other E-UTRAN network devices.
 
S-GW Interfaces in the E-UTRAN/EPC Network
The S-GW provides the following logical network interfaces in support of the E-UTRAN/EPC network:
 
S4 Interface
This reference point (not shown in the figure above) provides tunneling and management between the S-GW and an SGSN.
 
S5/S8 Interface
This reference point provides tunneling (bearer channel) and management (signaling channel) between the S-GW and the P-GW. The S8 interface is used for roaming scenarios. The S5 interface is used for non-roaming.
Supported protocols:
 
 
 
S1-U Interface
This reference point provides bearer channel tunneling between the eNodeB and the S-GW. It also supports eNodeB path switching during handovers.
 
Supported protocols:
 
 
 
S11 Interface
This reference point provides GTP-C control signal tunneling between the MME and the S-GW.
Supported protocols:
 
 
 
Gxc Interface
This signaling interface supports the transfer of policy control and charging rules information (QoS) between the Bearer Binding and Event Reporting Function (BBERF) on the S-GW and a Policy and Charging Rules Function (PCRF) server.
Supported protocols:
 
 
 
Features and Functionality - Base Software
This section describes the features and functions supported by default in the base software for the S-GW service and do not require any additional licenses to implement the functionality.
Important: To configure the basic service and functionality on the system for the S-GW service, refer to the configuration examples provided in the Serving Gateway Administration Guide.
The following features are supported and described in this section:
 
 
Subscriber Session Management Features
This section describes the following features:
 
 
IPv6 Capabilities
Enables increased address efficiency and relieves pressures caused by rapidly approaching IPv4 address exhaustion problem.
The S-GW platform offers the following IPv6 capabilities:
IPv6 Connections to Attached Elements
IPv6 transport and interfaces are supported on all of the following connections:
 
Routing and Miscellaneous Features
 
Lawful Intercept
Provides a standardized architecture for lawful monitoring and interception of subscriber call content and control events as mandated by a court ordered warrant from a law enforcement agency.
In accordance with 3GPP TS 33.108 Release 8 requirements the Cisco S-GW supports the Lawful Intercept Access Function for intercepting control and data messages of mobile targets. Law Enforcement Agencies request the network operator to start the interception of a particular mobile user based on court ordered subpoenas.
 
The Cisco EPC gateways provide access to the intercepted Content of Communications (CC) and the Intercept Related Information (IRI) of the mobile target and services related to the target on behalf of Law Enforcement Agencies. In this release the S-GW supports the following three interfaces:
The intercepted call control data is encoded in a Cisco proprietary message header format using an optional TLV field to pack the IRI information. The message header also includes other identifying information including sequence numbers, timestamps and session & correlation numbers to correlate session and bearer related information with interception on other EPC elements. If provisioning is activated while the call is active for the target identity then the intercepted information is immediately forwarded to the mediation server. Otherwise camp-on monitoring is used and the system waits for the call to become active (ECM CONNECTED state) and compares the IMSI, MSISDN and MEI against the LI monitoring list as a trigger to begin the intercept.
A total of 20,000 simultaneous LI triggers can be provisioned on the Cisco P-GW, S-GW or MME. Our solution is currently interoperable with leading mediation solutions from partners such as SS8 and Utimaco.
Important: For more information on Lawful Intercept support, refer to the Lawful Intercept Configuration Guide.
 
Subscriber Level Trace
Provides a 3GPP standards-based session level trace function for call debugging and testing new functions and access terminals in an LTE environment.
As a complement to Cisco's protocol monitoring function, the S-GW supports 3GPP standards based session level trace capabilities to monitor all call control events on the respective monitored interfaces including S1-U, S11, S5/S8, and Gxc. The trace can be initiated using multiple methods:
 
Note: Once the trace is provisioned it can be provisioned through the access cloud via various signaling interfaces.
The session level trace function consists of trace activation followed by triggers. The time between the two events is treated much like Lawful Intercept where the EPC network element buffers the trace activation instructions for the provisioned subscriber in memory using camp-on monitoring. Trace files for active calls are buffered as XML files using non-volatile memory on the local dual redundant hard drives on the ASR 5000 platform. The Trace Depth defines the granularity of data to be traced. Six levels are defined including Maximum, Minimum and Medium with ability to configure additional levels based on vendor extensions.
All call control activity for active and recorded sessions is sent to an off-line Trace Collection Entity (TCE) using a standards-based XML format over a FTP or secure FTP (SFTP) connection. In the current release the IPv4 interfaces are used to provide connectivity to the TCE. Trace activation is based on IMSI or IMEI. Once a subscriber level trace request is activated it can be propagated via the S5/S8 signaling to provision the corresponding trace for the same subscriber call on the P-GW. The trace configuration will only be propagated if the P-GW is specified in the list of configured Network Element types received by the S-GW. Trace configuration can be specified or transferred in any of the following message types:
Performance Goals:
As subscriber level trace is a CPU intensive activity the max number of concurrently monitored trace sessions per Cisco P-GW or S-GW is 32. Use in a production network should be restricted to minimize the impact on existing services.
 
Session Recovery Support
Provides seamless failover and reconstruction of subscriber session information in the event of a hardware or software fault within the system preventing a fully connected user session from being disconnected.
In the telecommunications industry, over 90 percent of all equipment failures are software-related. With robust hardware failover and redundancy protection, any card-level hardware failures on the system can quickly be corrected. However, software failures can occur for numerous reasons, many times without prior indication. StarOS Release 9.0 adds the ability to support stateful intra-chassis session recovery for S-GW sessions.
 
When session recovery occurs, the system reconstructs the following subscriber information:
Session recovery is also useful for in-service software patch upgrade activities. If session recovery is enabled during the software patch upgrade, it helps to preserve existing sessions on the active PSC during the upgrade process.
Important: For more information on session recovery support, refer to the Session Recovery chapter in the System Enhanced Feature Configuration Guide.
 
Quality of Service Management Features
This section describes the following features:
 
 
QoS Bearer Management
Provides a foundation for contributing towards improved Quality of User Experience (QoE) by enabling deterministic end-to-end forwarding and scheduling treatments for different services or classes of applications pursuant to their requirements for committed bandwidth resources, jitter and delay. In this way, each application receives the service treatment that users expect.
 
An EPS bearer is a logical aggregate of one or more Service Data Flows (SDFs), running between a UE and a P-GW in case of GTP-based S5/S8, and between a UE and HSGW in case of PMIP-based S2a connection. An EPS bearer is the level of granularity for bearer level QoS control in the EPC/E-UTRAN. The Cisco P-GW maintains one or more Traffic Flow Templates (TFTs) in the downlink direction for mapping inbound Service Data Flows (SDFs) to EPS bearers. The P-GW maps the traffic based on the downlink TFT to the S5/S8 bearer. The Cisco P-GW offers all of the following bearer-level aggregate constructs:
QoS Class Identifier (QCI): An operator provisioned value that controls bearer level packet forwarding treatments (e.g. scheduling weights, admission thresholds, queue management thresholds, link layer protocol configuration, etc). The Cisco EPC gateways also support the ability to map the QCI values to DiffServ codepoints in the outer GTP tunnel header of the S5/S8 connection. Additionally, the platform also provides configurable parameters to copy the DSCP marking from the encapsulated payload to the outer GTP tunnel header.
Guaranteed Bit Rate (GBR): A GBR bearer is associated with a dedicated EPS bearer and provides a guaranteed minimum transmission rate in order to offer constant bit rate services for applications such as interactive voice that require deterministic low delay service treatment.
Maximum Bit Rate (MBR): The MBR attribute provides a configurable burst rate that limits the bit rate that can be expected to be provided by a GBR bearer (e.g. excess traffic may get discarded by a rate shaping function). The MBR may be greater than or equal to the GBR for a given dedicated EPS bearer.
Aggregate Maximum Bit Rate (AMBR): AMBR denotes a bit rate of traffic for a group of bearers destined for a particular PDN. The Aggregate Maximum Bit Rate is typically assigned to a group of Best Effort service data flows over the Default EPS bearer. That is, each of those EPS bearers could potentially utilize the entire AMBR, e.g. when the other EPS bearers do not carry any traffic. The AMBR limits the aggregate bit rate that can be expected to be provided by the EPS bearers sharing the AMBR (e.g. excess traffic may get discarded by a rate shaping function). AMBR applies to all Non-GBR bearers belonging to the same PDN connection. GBR bearers are outside the scope of AMBR.
Policing & Shaping: The Cisco P-GW offers a variety of traffic conditioning and bandwidth management capabilities. These tools enable usage controls to be applied on a per-subscriber, per-EPS bearer or per-PDN/APN basis. It is also possible to apply bandwidth controls on a per-APN AMBR capacity. These applications provide the ability to inspect and maintain state for user sessions or Service Data Flows (SDF's) within them using shallow L3/L4 analysis or high touch deep packet inspection at L7. Metering of out-of-profile flows or sessions can result in packet discards or reducing the DSCP marking to Best Effort priority. When traffic shaping is enabled the P-GW enqueues the non-conforming session to the provisioned memory limit for the user session. When the allocated memory is exhausted, the inbound/outbound traffic for the user can be transmitted or policed in accordance with operator provisioned policy.
 
Network Access and Charging Management Features
This section describes the following features:
 
 
Online/Offline Charging
The Cisco EPC platforms offer support for offline charging interactions with external OCS and CGF/CDF servers.
 
Ga/Gz Reference Interfaces
The Cisco P-GW supports 3GPP Release 8 compliant offline charging as defined in TS 32.251,TS 32.297 and 32.298. Whereas the S-GW generates SGW-CDRs to record subscriber level access to PLMN resources, the P-GW creates PGW-CDRs to record user access to external networks. Additionally when Gn/Gp interworking with pre-release SGSNs is enabled, the GGSN service on the P-GW records G-CDRs to record user access to external networks.
 
To provide subscriber level accounting, the Cisco S-GW supports integrated Charging Transfer Functions (CTF) and Charging Data Functions (CDF). Each gateway uses Charging-ID's to distinguish between default and dedicated bearers within subscriber sessions. The Ga/Gz reference interface between the CDF and CGF is used to transfer charging records via the GTPP protocol. In a standards based implementation, the CGF consolidates the charging records and transfers them via an FTP/S-FTP connection over the Bm reference interface to a back-end billing mediation server. The Cisco EPC gateways also offer the ability to FTP/S-FTP charging records between the CDF and CGF server. CDR records include information such as Record Type, Served IMSI, ChargingID, APN Name, TimeStamp, Call Duration, Served MSISDN, PLMN-ID, etc. The ASR 5000 platform offers a local directory to enable temporary file storage and buffer charging records in persistent memory located on a pair of dual redundant RAID hard disks. Each drive includes 147GB of storage and up to 100GB of capacity is dedicated to storing charging records. For increased efficiency it also possible to enable file compression using protocols such as GZIP. The Offline Charging implementation offers built-in heart beat monitoring of adjacent CGFs. If the Cisco P-GW have not heard from the neighbor CGF within the configurable polling interval, they will automatically buffer the charging records on the local drives until the CGF reactivates itself and is able to begin pulling the cached charging records.
The P-GW supports a Policy Charging Enforcement Function (PCEF) to enable Flow Based Bearer Charging (FBC) via the Gy reference interface to adjunct OCS servers (See Online Charging description above).
 
Network Operation Management Functions
This section describes the following features:
 
 
Support Interfaces (Reference Points)
 
S1-U (E-UTRAN EPC)
In an E-UTRAN network S1-U is the per-bearer user plane tunneling reference interface between the S-GW and eNodeB. The S-GW provides the local mobility anchor point for inter-eNodeB hand-overs. It provides inter-eNodeB path switching during hand-overs when the X2 handover interface between base stations cannot be used. The S1-U interface uses GPRS tunneling protocol for user plane (GTP-Uv1). GTP encapsulates all end user IP packets and it relies on UDP/IP transport.
 
In order to support S1-U hand-overs the source eNodeB initiates the hand-over by sending the hand-over required message over the S1-MME interface to the MME. The MME then determines if the S-GW needs to be relocated. The eNodeB decides which EPS bearers are subject to forwarding to the target base station. In the S1-U hand-over, the hand-off occurs indirectly from the source eNodeB to the target via the source and target S-GWs.
 
S11 (E-UTRAN EPC)
S11 is the reference interface that provides the control plane protocol (GTP-Cv2) between the MME and S-GW. As with all GTP-based interfaces S11 relies on UDP/IP transport. A GTP tunnel is identified in each node with a Tunnel Endpoint ID (TEID), IP address and UDP port number. The TEID values are exchanged between the tunnel endpoints using GTP-C. There is one GTP-C tunnel between the MME and S-GW for each mobile terminal. The GTP protocol provides the following functions:
 
Bearer management function: This functionality is responsible for bearer management; setting up, modifying and releasing EPS bearers, which are triggered by the MME. The release of EPS bearers may be triggered by the P-GW or HSS as well. The messages include Create Session request, Create Bearer request, Create bearer response etc. Additionally GTP tunnel management messages may be sent for any of the following reasons:
Path management function: This functionality is responsible for managing the path between the tunnel endpoints. It includes messages like ECHO request, ECHO response and version not supported indication.
Mobility management functions: This functionality consists of messages that are exchanged between GTP end points to manage UE mobility. Messages such as Forward Relocation request/response are sent between end points. These messages are not sent on the S11 interface.
 
S5/S8 GTP (E-UTRAN EPC)
In accordance with 3GPP TS 23.401 the Cisco S-GW platform supports GTPv2-C and GTPv1-U call control and user plane tunnelling. A GTP tunnel is identified in each node with a Tunnel Endpoint ID (TEID), an IP address and a UDP port number. The S-GW and P-GW nodes provision separate GTP tunnels for each attached subscriber and for the individual PDN connections initiated by the UE. The StarOS distributed software architecture enables each function to run as independent stand-alone services on separate chassis or as simultaneous combination services running on the same platform.
 
The S5 reference interface provides user plane tunnelling and tunnel management between an S-GW and P-GW located within the same administrative domain. It is used for S-GW relocation due to UE mobility and if the S-GW needs to connect to a non-collocated P-GW for the required PDN connectivity.
The S8 reference interface is an inter-PLMN reference point providing user and control plane between the S-GW in the VPLMN and the P-GW in the HPLMN. It is based on the Gp reference point as defined between SGSN and GGSN. S8a is the inter PLMN variant of S5.
 
Multiple PDN Support
Enables an APN-based user experience that enables separate connections to be allocated for different services including IMS, Internet, walled garden services, or offdeck content services.
The MAG function on the S-GW can maintain multiple PDN or APN connections for the same user session. The MAG runs a single node level Proxy Mobile IPv6 tunnel for all user sessions toward the LMA function of the P-GW. When a user wants to establish multiple PDN connections, the MAG brings up the multiple PDN connections over the same PMIPv6 session to one or more P-GW LMAs. The P-GW in turn allocates separate IP addresses (Home Network Prefixes) for each PDN connection and each one can run one or multiple EPC default & dedicated bearers. To request the various PDN connections, the MAG includes a common MN-ID and separate Home Network Prefixes, APNs and a Handover Indication Value equal to one in the PMIPv6 Binding Updates.
 
Congestion Control
The congestion control feature allows you to set policies and thresholds and specify how the system reacts when faced with a heavy load condition.
Congestion control monitors the system for conditions that could potentially degrade performance when the system is under heavy load. Typically, these conditions are temporary (for example, high CPU or memory utilization) and are quickly resolved. However, continuous or large numbers of these conditions within a specific time interval may have an impact the system’s ability to service subscriber sessions. Congestion control helps identify such conditions and invokes policies for addressing the situation.
Congestion control operation is based on configuring the following:
 
Congestion Condition Thresholds: Thresholds dictate the conditions for which congestion control is enabled and establishes limits for defining the state of the system (congested or clear). These thresholds function in a way similar to operation thresholds that are configured for the system as described in the Thresholding Configuration Guide. The primary difference is that when congestion thresholds are reached, a service congestion policy and an SNMP trap, starCongestion, are generated.
A threshold tolerance dictates the percentage under the configured threshold that must be reached in order for the condition to be cleared. An SNMP trap, starCongestionClear, is then triggered.
Port Utilization Thresholds: If you set a port utilization threshold, when the average utilization of all ports in the system reaches the specified threshold, congestion control is enabled.
Port-specific Thresholds: If you set port-specific thresholds, when any individual port-specific threshold is reached, congestion control is enabled system-wide.
Service Congestion Policies: Congestion policies are configurable for each service. These policies dictate how services respond when the system detects that a congestion condition threshold has been crossed.
Important: For more information on congestion control, refer to the Congestion Control chapter in the System Enhanced Feature Configuration Guide.
 
IP Access Control Lists
IP access control lists allow you to set up rules that control the flow of packets into and out of the system based on a variety of IP packet parameters.
IP access lists, or Access Control Lists (ACLs) as they are commonly referred to, are used to control the flow of packets into and out of the system. They are configured on a per-context basis and consist of “rules” (ACL rules) or filters that control the action taken on packets that match the filter criteria. Once configured, an ACL can be applied to any of the following:
 
Important: For more information on IP access control lists, refer to the IP Access Control Lists chapter in the System Enhanced Feature Configuration Guide.
 
System Management Features
This section describes following features:
 
 
Management System Overview
The system's management capabilities are designed around the Telecommunications Management Network (TMN) model for management - focusing on providing superior quality Network Element (NE) and element management system (Web Element Manager) functions. The system provides element management applications that can easily be integrated, using standards-based protocols (CORBA and SNMPv1, v2), into higher-level management systems - giving wireless operators the ability to integrate the system into their overall network, service, and business management systems. In addition, all management is performed out-of-band for security and to maintain system performance.
Cisco's O&M module offers comprehensive management capabilities to the operators and enables them to operate the system more efficiently. There are multiple ways to manage the system either locally or remotely using its out-of-band management interfaces.
These include:
 
The following figure demonstrates these various element management options and how they can be utilized within the wireless carrier network.
 
Element Management Methods
Important: P-GW management functionality is enabled by default for console-based access. For GUI-based management support, refer to the Web Element Management System section in this chapter.
Important: For more information on command line interface based management, refer to the Command Line Interface Reference and P-GW Administration Guide.
 
Bulk Statistics Support
The system's support for bulk statistics allows operators to choose to view not only statistics that are of importance to them, but also to configure the format in which it is presented. This simplifies the post-processing of statistical data since it can be formatted to be parsed by external, back-end processors.
When used in conjunction with the Web Element Manager, the data can be parsed, archived, and graphed.
The system can be configured to collect bulk statistics (performance data) and send them to a collection server (called a receiver). Bulk statistics are statistics that are collected in a group. The individual statistics are grouped by schema. Following is a partial list of supported schemas:
 
System: Provides system-level statistics
Card: Provides card-level statistics
Port: Provides port-level statistics
MAG: Provides MAG service statistics
S-GW: Provides S-GW node-level service statistics
IP Pool: Provides IP pool statistics
APN: Provides Access Point Name statistics
The system supports the configuration of up to 4 sets (primary/secondary) of receivers. Each set can be configured with to collect specific sets of statistics from the various schemas. Statistics can be pulled manually from the system or sent at configured intervals. The bulk statistics are stored on the receiver(s) in files.
The format of the bulk statistic data files can be configured by the user. Users can specify the format of the file name, file headers, and/or footers to include information such as the date, system host name, system uptime, the IP address of the system generating the statistics (available for only for headers and footers), and/or the time that the file was generated.
When the Web Element Manager is used as the receiver, it is capable of further processing the statistics data through XML parsing, archiving, and graphing.
The Bulk Statistics Server component of the Web Element Manager parses collected statistics and stores the information in the PostgreSQL database. If XML file generation and transfer is required, this element generates the XML output and can send it to a Northbound NMS or an alternate bulk statistics server for further processing.
Additionally, if archiving of the collected statistics is desired, the Bulk Statistics server writes the files to an alternative directory on the server. A specific directory can be configured by the administrative user or the default directory can be used. Regardless, the directory can be on a local file system or on an NFS-mounted file system on the Web Element Manager server.
Important: For more information on bulk statistic configuration, refer to the Configuring and Maintaining Bulk Statistics chapter in the System Administration Guide.
 
Threshold Crossing Alerts (TCA) Support
Thresholding on the system is used to monitor the system for conditions that could potentially cause errors or outage. Typically, these conditions are temporary (i.e high CPU utilization, or packet collisions on a network) and are quickly resolved. However, continuous or large numbers of these error conditions within a specific time interval may be indicative of larger, more severe issues. The purpose of thresholding is to help identify potentially severe conditions so that immediate action can be taken to minimize and/or avoid system downtime.
The system supports Threshold Crossing Alerts for certain key resources such as CPU, memory, IP pool addresses, etc. With this capability, the operator can configure threshold on these resources whereby, should the resource depletion cross the configured threshold, a SNMP Trap would be sent.
The following thresholding models are supported by the system:
 
Alert: A value is monitored and an alert condition occurs when the value reaches or exceeds the configured high threshold within the specified polling interval. The alert is generated then generated and/or sent at the end of the polling interval.
Alarm: Both high and low threshold are defined for a value. An alarm condition occurs when the value reaches or exceeds the configured high threshold within the specified polling interval. The alert is generated then generated and/or sent at the end of the polling interval.
Thresholding reports conditions using one of the following mechanisms:
 
SNMP traps: SNMP traps have been created that indicate the condition (high threshold crossing and/or clear) of each of the monitored values.
Generation of specific traps can be enabled or disabled on the chassis. Ensuring that only important faults get displayed. SNMP traps are supported in both Alert and Alarm modes.
Logs: The system provides a facility called threshold for which active and event logs can be generated. As with other system facilities, logs are generated Log messages pertaining to the condition of a monitored value are generated with a severity level of WARNING.
Logs are supported in both the Alert and the Alarm models.
Alarm System: High threshold alarms generated within the specified polling interval are considered “outstanding” until a the condition no longer exists or a condition clear alarm is generated. “Outstanding” alarms are reported to the system's alarm subsystem and are viewable through the Alarm Management menu in the Web Element Manager.
The Alarm System is used only in conjunction with the Alarm model.
Important: For more information on threshold crossing alert configuration, refer to the Thresholding Configuration Guide.
 
ANSI T1.276 Compliance
ANSI T1.276 specifies security measures for Network Elements (NE). In particular it specifies guidelines for password strength, storage, and maintenance security measures.
ANSI T1.276 specifies several measures for password security. These measures include:
 
These measures are applicable to the ASR 5000 Platform and the Web Element Manager since both require password authentication. A subset of these guidelines where applicable to each platform will be implemented. A known subset of guidelines, such as certificate authentication, are not applicable to either product. Furthermore, the platforms support a variety of authentication methods such as RADIUS and SSH which are dependent on external elements. ANSI T1.276 compliance in such cases will be the domain of the external element. ANSI T1.276 guidelines will only be implemented for locally configured operators.
 
Features and Functionality - External Application Support
This section describes the features and functions of external applications supported on the S-GW. These services require additional licenses to implement the functionality.
 
 
Web Element Management System
The Web Element Manager (WEM) provides a graphical user interface (GUI) for performing fault, configuration, accounting, performance, and security (FCAPS) management of the ASR 5000 Platform.
The Web Element Manager is a Common Object Request Broker Architecture (CORBA)-based application that provides complete fault, configuration, accounting, performance, and security (FCAPS) management capability for the system.
 
For maximum flexibility and scalability, the Web Element Manager application implements a client-server architecture. This architecture allows remote clients with Java-enabled web browsers to manage one or more systems via the server component which implements the CORBA interfaces. The server component is fully compatible with the fault-tolerant Sun® Solaris® operating system.
The following figure demonstrates various interfaces between the Cisco Web Element Manager and other network components.
 
Web Element Manager Network Interfaces
Important: For more information on WEM support, refer to the WEM Installation and Administration Guide.
 
Features and Functionality - Optional Enhanced Feature Software
This section describes the optional enhanced features and functions for the S-GW service.
Each of the following features require the purchase of an additional license to implement the functionality with the S-GW service.
This section describes following features:
 
 
IP Security (IPSec) Encryption
Enables network domain security for all IP packet switched LTE-EPC networks in order to provide confidentiality, integrity, authentication, and anti-replay protection. These capabilities are insured through use of cryptographic techniques.
The Cisco S-GW supports IKEv1 and IPSec encryption using IPv4 addressing. IPSec enables the following two use cases:
 
Important: For more information on IPSec support, refer to the IP Security chapter in the System Enhanced Feature Configuration Guide.
 
Traffic Policing and Shaping
Traffic policing and shaping allows you to manage bandwidth usage on the network and limit bandwidth allowances to subscribers. Shaping allows you to buffer excesses to be delivered at a later time.
Traffic Policing
Traffic policing enables the configuring and enforcing of bandwidth limitations on individual subscribers and/or APNs of a particular traffic class in 3GPP/3GPP2 service.
Bandwidth enforcement is configured and enforced independently on the downlink and the uplink directions.
A Token Bucket Algorithm (a modified trTCM) [RFC2698] is used to implement the Traffic-Policing feature. The algorithm used measures the following criteria when determining how to mark a packet:
 
The system can be configured to take any of the following actions on packets that are determined to be in excess or in violation:
 
Traffic Shaping
Traffic Shaping is a rate limiting method similar to the Traffic Policing, but provides a buffer facility for packets exceeded the configured limit. Once the packet exceeds the data-rate, the packet queued inside the buffer to be delivered at a later time.
The bandwidth enforcement can be done in the downlink and the uplink direction independently. If there is no more buffer space available for subscriber data system can be configured to either drop the packets or kept for the next scheduled traffic session.
Important: For more information on traffic policing and shaping, refer to the Traffic Policing and Shaping chapter in the System Enhanced Feature Configuration Guide.
 
Layer 2 Traffic Management (VLANs)
Virtual LANs (VLANs) provide greater flexibility in the configuration and use of contexts and services.
VLANs are configured as “tags” on a per-port basis and allow more complex configurations to be implemented. The VLAN tag allows a single physical port to be bound to multiple logical interfaces that can be configured in different contexts. Therefore, each Ethernet port can be viewed as containing many logical ports when VLAN tags are employed.
Important: For more information on VLAN support, refer to the VLANs chapter in the System Enhanced Feature Configuration Guide.
 
How the Serving Gateway Works
This section provides information on the function of the S-GW in an EPC E-UTRAN network and presents call procedure flows for different stages of session setup and disconnect.
The S-GW supports the following network flows:
 
 
GTP Serving Gateway Call/Session Procedures in an LTE-SAE Network
The following topics and procedure flows are included:
 
 
Subscriber-initiated Attach (initial)
This section describes the procedure of an initial attach to the EPC network by a subscriber.
 
 
Subscriber-initiated Attach (initial) Call Flow
 
Subscriber-initiated Attach (initial) Call Flow Description
 
Subscriber-initiated Detach
This section describes the procedure of detachment from the EPC network by a subscriber.
 
Subscriber-initiated Detach Call Flow
 
Subscriber-initiated Detach Call Flow Description
 
Supported Standards
The S-GW service complies with the following standards.
 
 
3GPP References
 
 
3GPP2 References
 
 
IETF References
 
 
Object Management Group (OMG) Standards
 

Cisco Systems Inc.
Tel: 408-526-4000
Fax: 408-527-0883