ebook img

TS 129 212 - V7.15.0 - Universal Mobile Telecommunications System (UMTS); LTE; Policy and Charging Control (PCC); Reference points (3GPP TS 29.212 version 7.15.0 Release 7) PDF

0.31 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview TS 129 212 - V7.15.0 - Universal Mobile Telecommunications System (UMTS); LTE; Policy and Charging Control (PCC); Reference points (3GPP TS 29.212 version 7.15.0 Release 7)

ETSI TS 129 212 V7.15.0 (2013-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Policy and Charging Control (PCC); Reference points (3GPP TS 29.212 version 7.15.0 Release 7) 3GPP TS 29.212 version 7.15.0 Release 7 1 ETSI TS 129 212 V7.15.0 (2013-01) Reference RTS/TSGC-0329212v7f0 Keywords UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2013. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI 3GPP TS 29.212 version 7.15.0 Release 7 2 ETSI TS 129 212 V7.15.0 (2013-01) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http://webapp.etsi.org/key/queryform.asp. ETSI 3GPP TS 29.212 version 7.15.0 Release 7 3 ETSI TS 129 212 V7.15.0 (2013-01) Contents Intellectual Property Rights ................................................................................................................................ 2 Foreword ............................................................................................................................................................. 2 Foreword ............................................................................................................................................................. 5 1 Scope ........................................................................................................................................................ 6 2 References ................................................................................................................................................ 6 3 Definitions and abbreviations ................................................................................................................... 7 3.1 Definitions .......................................................................................................................................................... 7 3.2 Abbreviations ..................................................................................................................................................... 7 4 Gx reference point .................................................................................................................................... 7 4.1 Overview ............................................................................................................................................................ 7 4.2 Gx Reference model ........................................................................................................................................... 8 4.3 PCC Rules .......................................................................................................................................................... 8 4.3.1 PCC Rule Definition ..................................................................................................................................... 8 4.3.2 Operations on PCC Rules ........................................................................................................................... 10 4.4 Functional elements .......................................................................................................................................... 10 4.4.1 PCRF .......................................................................................................................................................... 10 4.4.2 PCEF ........................................................................................................................................................... 11 4.5 PCC procedures over Gx reference point ......................................................................................................... 11 4.5.1 Request for PCC rules................................................................................................................................. 11 4.5.2 Provisioning of PCC rules .......................................................................................................................... 13 4.5.2.1 Selecting a PCC rule for Uplink IP packets .......................................................................................... 15 4.5.2.2 Selecting a PCC rule and IP CAN Bearer for Downlink IP packets ..................................................... 15 4.5.2.3 Gate function ......................................................................................................................................... 15 4.5.2.4 Policy enforcement for "Authorized QoS" per PCC Rule ..................................................................... 16 4.5.3 Provisioning of Event Triggers ................................................................................................................... 16 4.5.4 Provisioning of charging related information for the IP-CAN session ....................................................... 16 4.5.4.1 Provisioning of Charging Addresses ..................................................................................................... 16 4.5.4.2 Provisioning of Default Charging Method ............................................................................................ 16 4.5.5 Provisioning and Policy Enforcement of Authorized QoS ......................................................................... 17 4.5.5.0 Overview ............................................................................................................................................... 17 4.5.5.0a Provisioning of authorized QoS per IP CAN bearer ............................................................................. 17 4.5.5.1 Policy enforcement for authorized QoS per IP CAN bearer ................................................................. 19 4.5.5.2 Policy provisioning for authorized QoS per service data flow .............................................................. 19 4.5.5.3 Policy enforcement for authorized QoS per service data flow .............................................................. 19 4.5.5.4 Coordination of authorized QoS scopes in mixed mode ....................................................................... 20 4.5.5.5 Provisioning of authorized QoS per QCI .............................................................................................. 20 4.5.5.6 Policy enforcement for authorized QoS per QCI .................................................................................. 20 4.5.6 Indication of IP-CAN Bearer Termination Implications............................................................................. 20 4.5.7 Indication of IP-CAN Session Termination ................................................................................................ 21 4.5.8 Request of IP-CAN Bearer Termination ..................................................................................................... 21 4.5.9 Request of IP-CAN Session Termination ................................................................................................... 22 4.5.10 Bearer Control Mode Selection .................................................................................................................. 22 4.5.11 PCC Rule Error Handling ........................................................................................................................... 22 4.5.12 Time of the day procedures ................................................................................................................................ 23 5 Gx protocol ............................................................................................................................................. 24 5.1 Protocol support ............................................................................................................................................... 24 5.2 Initialization, maintenance and termination of connection and session............................................................ 24 5.3 Gx specific AVPs ............................................................................................................................................. 24 5.3.1 Bearer-Usage AVP (GPRS access type only) ............................................................................................. 25 5.3.2 Charging-Rule-Install AVP (All access types) ........................................................................................... 26 5.3.3 Charging-Rule-Remove AVP (All access types) ........................................................................................ 26 5.3.4 Charging-Rule-Definition AVP (All access types) ..................................................................................... 26 5.3.5 Charging-Rule-Base-Name AVP (All access types) ................................................................................... 27 ETSI 3GPP TS 29.212 version 7.15.0 Release 7 4 ETSI TS 129 212 V7.15.0 (2013-01) 5.3.6 Charging-Rule-Name AVP (All access types) ............................................................................................ 27 5.3.7 Event-Trigger AVP (All access types)........................................................................................................ 27 5.3.8 Metering-Method AVP (All access types) .................................................................................................. 30 5.3.9 Offline AVP (All access types)................................................................................................................... 30 5.3.10 Online AVP (All access types) ................................................................................................................... 30 5.3.11 Precedence AVP (All access types) ............................................................................................................ 31 5.3.12 Reporting-Level AVP (All access types) .................................................................................................... 31 5.3.13 TFT-Filter AVP (GPRS access type only) .................................................................................................. 32 5.3.14 TFT-Packet-Filter-Information AVP (GPRS access type only) ................................................................. 32 5.3.15 ToS-Traffic-Class AVP (All access types) ................................................................................................. 32 5.3.16 QoS-Information AVP (All access types) ................................................................................................... 33 5.3.17 QoS-Class-Identifier AVP (All access types) ............................................................................................. 33 5.3.18 Charging-Rule-Report AVP (All access types) .......................................................................................... 34 5.3.19 PCC-Rule-Status AVP (All access types) ................................................................................................... 35 5.3.20 Bearer-Identifier AVP (Applicable access type GPRS) .............................................................................. 35 5.3.21 Bearer-Operation AVP (Applicable access type GPRS)............................................................................. 35 5.3.22 Access-Network-Charging-Identifier-Gx AVP (All access types) ............................................................. 35 5.3.23 Bearer-Control Mode-AVP ......................................................................................................................... 36 5.3.24 Network Request Support AVP .................................................................................................................. 36 5.3.25 Guaranteed-Bitrate-DL AVP ...................................................................................................................... 36 5.3.26 Guaranteed-Bitrate-UL AVP ...................................................................................................................... 36 5.3.27 IP-CAN-Type AVP (All access types) ....................................................................................................... 37 5.3.28 QoS-Negotiation AVP (GPRS Access Type only) ..................................................................................... 37 5.3.29 QoS-Upgrade AVP (GPRS Access Type only) .......................................................................................... 37 5.3.30 Rule-Failure-Code AVP (All access types) ................................................................................................ 38 5.3.31 Revalidation-Time (ALL Access Types) .................................................................................................... 39 5.3.32 Rule-Activation-Time (ALL Access Types) ............................................................................................... 39 5.3.33 Rule-Deactivation-Time (ALL Access Types) ........................................................................................... 39 5.3.34 Session-Release-Cause (All access types) .................................................................................................. 39 5.3.35 Security-Parameter-Index AVP (All access types) ..................................................................................... 39 5.3.36 Flow-Label AVP (All access types) ........................................................................................................... 39 5.3.37 Flow-Information AVP (All access types) .................................................................................................. 39 5.4 Gx re-used AVPs .............................................................................................................................................. 40 5.5 Gx specific Experimental-Result-Code AVP values ........................................................................................ 42 5.5.1 General ........................................................................................................................................................ 42 5.5.2 Success ........................................................................................................................................................ 43 5.5.3 Permanent Failures ..................................................................................................................................... 43 5.5.4 Transient Failures ....................................................................................................................................... 43 5.6 Gx Messages .................................................................................................................................................... 44 5.6.1 Gx Application ............................................................................................................................................ 44 5.6.2 CC-Request (CCR) Command .................................................................................................................... 44 5.6.3 CC-Answer (CCA) Command .................................................................................................................... 45 5.6.4 Re-Auth-Request (RAR) Command ........................................................................................................... 45 5.6.5 Re-Auth-Answer (RAA) Command ........................................................................................................... 46 Annex A (informative): Change history ............................................................................................... 47 History .............................................................................................................................................................. 49 ETSI 3GPP TS 29.212 version 7.15.0 Release 7 5 ETSI TS 129 212 V7.15.0 (2013-01) Foreword This Technical Specification has been produced by the 3rd Generation Partnership Project (3GPP). The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. ETSI 3GPP TS 29.212 version 7.15.0 Release 7 6 ETSI TS 129 212 V7.15.0 (2013-01) 1 Scope The present document provides the stage 3 specification of the Gx reference point for the present release. The functional requirements and the stage 2 specifications of the Gx refernce point are contained in 3GPP TS 23.203 [7]. The Gx reference point lies between the Policy and Charging Rule Function and the Policy and Charging Enforcement Function. Whenever it is possible the present document specifies the requirements for the protocol by reference to specifications produced by the IETF within the scope of Diameter. Where this is not possible, extensions to Diameter are defined within the present document. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication and/or edition number or version number) or non-specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". [2] 3GPP TS 29.210: "Charging Rule Provisioning over Gx Interface". [3] 3GPP TS 29.207: "Policy control over Go interface". [4] 3GPP TS 29.208: "End-to-end Quality of Service (QoS) signalling flows". [5] IETF RFC 3588: "Diameter Base Protocol". [6] IETF RFC 3556: "Session Description Protocol (SDP) Bandwidth Modifiers for RTP Control Protocol (RTCP) Bandwidth". [7] 3GPP TS 23.203: "Policy Control and Charging architecture". [8] 3GPP TS 29.213: "Policy and charging control signalling flows and Quality of Service (QoS) parameter mapping". [9] IETF RFC 4006: "Diameter Credit Control Application". [10] 3GPP TS 29.214: "Policy and Charging Control over Rx reference point". [11] 3GPP TS 29.061: "Interworking between the Public Land Mobile Network (PLMN) supporting packet based services and Packet Data Networks (PDN)". [12] IETF RFC 4005: "Diameter Network Access Server Application". [13] 3GPP TS 24.008: "Mobile radio interface Layer 3 specification". [14] 3GPP TS 29.229: "Cx and Dx interfaces based on Diameter protocol; Protocol details". [15] IETF RFC 3162: "Radius and IPv6". [16] 3GPP TS 32.295: "Telecommunication management; Charging management; Charging Data Record (CDR) transfer". [17] 3GPP TS 23.060: "General Packet Radio Service (GPRS); Service description; Stage 2". ETSI 3GPP TS 29.212 version 7.15.0 Release 7 7 ETSI TS 129 212 V7.15.0 (2013-01) [18] 3GPP TS 29.060: "General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface". [19] 3GPP TS 32.299: "Telecommunication management; Charging management; Diameter charging applications". [20] 3GPP TS 32.240: "Telecommunication management; Charging management; Charging architecture and principles". 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in 3GPP TR 21.905 [1] and the following apply: IP-CAN bearer: IP transmission path of defined capacity, delay and bit error rate, etc. See 3GPP TS 21.905 [1] for the definition of bearer. IP-CAN session: association between a UE and an IP network The association is identified by a UE IPv4 address or IPv6 prefix together with a UE identity information, if available. An IP-CAN session incorporates one or more IP-CAN bearers. Support for multiple IP-CAN bearers per IP-CAN session is IP-CAN specific. An IP-CAN session exists as long as the UE IPv4 address or IPv6 prefix are established and announced to the IP network. IP flow: unidirectional flow of IP packets with the same source IP address and port number and the same destination IP address and port number and the same transport protocol. Port numbers are only applicable if used by the transport protocol. 3.2 Abbreviations For the purpose of the present document, the abbreviations given in 3GPP TR 21.905 [1] and the following apply: AF Application Function OCS Online charging system OFCS Offline charging system PCEF Policy and Charging Enforcement Function PCRF Policy and Charging Rule Function 4 Gx reference point 4.1 Overview The Gx reference point is located between the Policy and Charging Rules Function (PCRF) and the Policy and Charging Enforcement Function (PCEF). The Gx reference point is used for provisioning and removal of PCC rules from the PCRF to the PCEF and the transmission of traffic plane events from the PCEF to the PCRF. The Gx reference point can be used for charging control, policy control or both by applying AVPs relevant to the application. The stage 2 level requirements for the Gx reference point are defined in 3GPP TS 23.203 [7]. Signalling flows related to the both Rx and Gx interfaces are specified in 3GPP TS 29.213 [8]. ETSI 3GPP TS 29.212 version 7.15.0 Release 7 8 ETSI TS 129 212 V7.15.0 (2013-01) 4.2 Gx Reference model The Gx reference point is defined between the PCRF and the PCEF. The relationships between the different functional entities involved are depicted in figure 4.1. Subscription Profile AF Repository (SPR) Rx Sp Policy and Charging Rules Function (PCRF) Online Charging System (OCS) CAMEL Service Data Flow SCP Gx Based Credit Control PC EF Gy GW Gz Offline Charging System (OFCS) Figure 4.1: Gx reference point at the Policy and Charging Control (PCC) architecture NOTE: The details associated with the Sp reference point are not specified in this Release. The SPR"s relation to existing subscriber databases is not specified in this Release. 4.3 PCC Rules 4.3.1 PCC Rule Definition The purpose of the PCC rule is to: - Detect a packet belonging to a service data flow. - The service data flow filters within the PCC rule are used for the selection of downlink IP CAN bearers. - The service data flow filters within the PCC rule are used for the enforcement that uplink IP flows are transported in the correct IP CAN bearer. ETSI 3GPP TS 29.212 version 7.15.0 Release 7 9 ETSI TS 129 212 V7.15.0 (2013-01) - Identify the service the service data flow contributes to. - Provide applicable charging parameters for a service data flow. - Provide policy control for a service data flow. The PCEF shall select a PCC rule for each received packet by evaluating received packets against service data flow filters of PCC rules in the order of the precedence of the PCC rules. When a packet matches a service data flow filter, the packet matching process for that packet is completed, and the PCC rule for that filter shall be applied. There are two different types of PCC rules as defined in [7]: - Dynamic PCC rules. Dynamically provisioned by the PCRF to the PCEF via the Gx interface. These PCC rules may be either predefined or dynamically generated in the PCRF. Dynamic PCC rules can be installed, modified and removed at any time. - Predefined PCC rules. Preconfigured in the PCEF. Predefined PCC rules can be activated or deactivated by the PCRF at any time. Predefined PCC rules within the PCEF may be grouped allowing the PCRF to dynamically activate a set of PCC rules over the Gx reference point. NOTE: The operator may define a predefined PCC rule, to be activated by the PCEF. Such a predefined rule is not explicitly known in the PCRF. A PCC rule consists of: - a rule name; - service identifier; - service data flow filter(s); - precedence; - gate status; - QoS parameters; - charging key (i.e. rating group); - other charging parameters. The rule name shall be used to reference a PCC rule in the communication between the PCEF and the PCRF. The service identifier shall be used to identify the service or the service component the service data flow relates to. The service flow filter(s) shall be used to select the traffic for which the rule applies. It shall be possible to define wildcarded service data flow filter(s), both for the dynamic and predefined PCC rules. The gate status indicates whether the service data flow, detected by the service data flow filter(s), may pass (gate is open) or shall be discarded (gate is closed) in uplink and/or in downlink direction. The QoS information includes the QoS class identifier (authorized QoS class for the service data flow) and authorized bitrates for uplink and downlink. The charging parameters define whether online and offline charging interfaces are used, what is to be metered in offline charging, on what level the PCEF shall report the usage related to the rule, etc. For different PCC rules with overlapping service data flow filter, the precedence of the rule determines which of these rules is applicable. When a dynamic PCC rule and a predefined PCC rule have the same precedence, the dynamic PCC rule takes precedence. PCC rule also includes Application Function record information for enabling charging correlation between the application and bearer layer if the AF has provided this information via the Rx interface. For IMS this includes the IMS Charging Identifier (ICID) and flow identifiers. ETSI

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.