Monday, 14 September 2015

3GPP Release-13 whitepapers and presentations

With 3GPP Release-13 due early/mid next year, there has been a flurry of presentations and whitepapers on this topic. This post provides some of these. I will try and maintain a list of whitepapers/presentations as part of this post as and when released.

1. June 2015: LTE Release 13 and road to 5G - Presented by Dino Flore, Chairman of 3GPP RAN, (Qualcomm Technologies Inc.)



2. Sep 2015: Executive Summary - Inside 3GPP Release 13 by 4G Americas



3. June 2015: Mobile Broadband Evolution Towards 5G: 3GPP Rel-12 & Rel-13 and Beyond by 4G Americas

4. April 2015: LTE release 13 – expanding the Networked Society by Ericsson


Saturday, 5 September 2015

HetNets and Ultra Dense Networks



When I did my 5G presentation back in Feb., I explained about Ultra Dense Networks (UDN) that will be a main feature of future traffic hotspots. I have also blogged about Qualcomm having tested 1000 small cells in a square km. Some operators are already running out of spectrum with traditional deployments in hotspots. They are already making their cells smaller (but not yet using Small cells) thereby having less users in each cell. This may not be enough so the approach likely to be taken is:

  • Offload to WiFi
  • Aggregate WiFi with LTE (different approaches including LTE-U, LAA and LWA)
  • Use Small cells and C-RAN
  • Multi technology Carrier Aggregation
  • Beamforming (and massive MIMO)


The above picture is from a presentation (embedded below) by ZTE in the LTE World Summit. Its a good attempt to show different technologies, the year they are expected to go mainstream, whether they are TDD or FDD and if they will form part of 5G.

Anyway, here is the presentation. There is some interesting information on C-RAN, D-RAN results and fronthaul too.



Friday, 28 August 2015

MCPTT Off-network and UE to UE/Network Relays

3GPP SA6 recently held a workshop on Mission Critical Push To Talk (MCPTT) stage 3 development in Canada. You can look at the meeting report here and download any presentations from here.

An interesting presentation that caught my attention was one on "MCPTT Off-network Architecture". The presentation is embedded below where it is described technically what is meant by Off-network. From my understanding an off-network from MCPTT point of view is one where the UE does not have network coverage.

In such a situation a UE can connect to another UE that can connect to UE/network (if available) to relay the message. Its similar to another technology that I have talked about, Multihop Cellular Networks and ODMA. Anyway, here is the presentation:



Sometimes the standards can take too long to develop a feature and apps can come and deliver a similar service at a very short notice. One such App that does something similar is called Firechat, which played a big role in many protests worldwide. The video explaining it below is worth watching.


The problem with Apps is that they cannot be used by the emergency services or other governmental organisations, unless a standard feature is available. This is the expectation from this Off-network relays. It would work in combination with D2D/ProSe.


For anyone interested in the latest Public Safety (PS), here is a presentation by SA6 chairman from July

Monday, 24 August 2015

Some interesting presentations from ETSI Security workshop


ETSI held their security week from 22-26 June 2015 at their headquarters. There are lots of interesting presentations (see agenda [PDF]); I am embedding some here.


This is a good presentation providing a summary of the reasons for IoT security issues and some of the vulnerabilities that have been seen as a result of that.




The next one is The Threat landscape of connected vehicles and ITS (Intelligent Transportation Systems) integration in general



This presentation provides a good summary of the threats in the connected cars/vehicles which is only going to become more common. Some of these issues will have to be solved now before we move on to the autonomous vehicles in future. Security issues there will be catastrophic and many lives can be lost.

The final presentation is from 3GPP SA3 that provides a quick summary of security related work in 3GPP.



Sunday, 16 August 2015

Challenges in the future 'Network of Networks'

Came across this paper from Dec. 2000 recently. Its interesting to see that even back then researchers were thinking about multiple networks that a user can have access to via handovers. Researchers nowadays think about how to access as many networks as possible simultaneously. I call is Multi-stream aggregation (MSA), some others call it Multi-RAT Carrier Aggregation (MCA) and so on.

If we look at the different access technologies, each has its own evolution in the coming years. Some of these are:

  • Fixed/Terrestrial broadband: (A)DSL, Cable, Fiber
  • Mobile Broadband: 3G, 4G and soon 5G
  • Wireless Broadband: WiFi
  • Laser communications
  • LiFi or LED based communications
  • High frequency sound based communications 
Then there could be a combination of multiple technologies working simultaneously. For example:
And the handover has to be seamless between different access technologies. For example:

There has been an interest in moving on to higher frequencies. These bands can be used for access as well as backhaul. The same applies for most of the access technologies listed above which can work as a backhaul to enable other access technologies.

While planned networks would be commonplace, other topologies like mesh network will gain ground too. Device to device and direct communications will help create ad-hoc networks.

While the current networks are mostly stationary, mobile networks will also become common. Opportunity Driven Multiple Access (ODMA) or Multihop Cellular Networks (MCN) would help devices use other devices to reach their destination. Non-standardised proprietary solutions (for example Firechat) will become common too. Security, Privacy and Trust will play an important role here.

Satellite networks, the truly global connectivity providers will play an important role too. While backhauling the small cells on planes, trains and ships will be an important part of satellite networks, they may be used for access too. Oneweb plans to launch 900 micro satellites to provide high speed global connectivity. While communications at such high frequencies mean that small form factor devices like mobile cant receive the signals easily, connected cars could use the satellite connectivity very well.

Samsung has an idea to provide connectivity through 4,600 satellites to be able to transmit 200GB monthly to 5 Billion people worldwide. While this is very ambitious, its not the only innovative and challenging idea. I am sure we all now about the Google loon. Facebook on the other hand wants to use a solar powered drone (UAV) to offer free internet access services to users who cannot get online.

As I mentioned, security and privacy will be a big challenge for devices being able to connect to multiple access networks and other devices. An often overlooked challenge is the timing and sync between different networks. In an ideal world all these networks would be phase and time synchronised to each other so as not to cause interference but in reality this will be a challenging task, especially with ad-hoc and moing networks.



I will be giving a keynote at the ITSF 2015 in November at Edinburgh. This is a different type of conference that looks at Time and Synchronisation aspects in Telecoms. While I will be providing a generic overview on where the technologies are moving (continuing from my presentation in Phase ready conference), I am looking forward to hearing about these challenges and their solutions in this conference.

Andy Sutton (Principal Network Architect) and Martin Kingston (Principal Designer) with EE have shared some of their thought on this topic which is as follows and available to download here.



Sunday, 9 August 2015

Diameter Security is worse than SS7 Security?


Back in December last year, there was a flurry of news about SS7 security flaw that allowed hackers to snoop on an unsuspecting users calls and SMS. The blog readers will also be aware that SS7 is being replaced by the Diameter protocol. The main reason being to simplify roaming while at the same time being able to manage the signalling storm in the networks.


The bad news is that while is case of SS7, security issues are due to network implementation and configuration (above pic), the security issues in Diameter seem to be due to the protocol and architecture themselves (below pic)


Diameter is very important for LTE network architecture and will possibly continue in the future networks too. It is very important to identify all such issues and iron them before some hackers start exploiting the network vulnerabilities causing issues for everyone.

The presentation by Cédric Bonnet, Roaming Technical Domain Manager, Orange at Signalling Focus Day of LTE World Summit 2015 is embedded below:


From SS7 to Diameter Security from Zahid Ghadialy

Some important information from this post has been removed due to a valid complaint.

Tuesday, 4 August 2015

The Importance of License Exempt Frequency Bands


Some of you may be aware that I am also a Technical Programme Manager with the UK Spectrum Policy Forum. Recently we published a whitepaper that we had commissioned to Plum consulting on "Future use of Licence Exempt Radio Spectrum". It is an interested read not only for spectrum experts but also for people trying to understand the complex world of spectrum.

The report is very well written. Here are a few extracts in purple:

Licence exempt frequency bands are those that can be used by certain applications without the need for prior authorisation or an individual right of use. This does not mean that they are not subject to regulation – use must still comply with pre-defined technical rules to minimise the risk of interference. Most licence exempt bands are harmonised throughout Europe and are shared with other services or applications, such as radars or industrial, scientific and medical (ISM) equipment. Wi-Fi and Bluetooth are probably the most familiar examples of mass-market licence exempt wireless applications, but the bands support many other consumer devices, such as cordless phones, doorbells, car key fobs, central heating controllers, baby monitors and intruder alarms. Looking to the future, licence exempt bands are likely to be a key enabler of wireless machine to machine (M2M) communication applications.

Key benefits of licence exempt bands include:
  • For end-users:
    • Greater convenience and flexibility by avoiding the need for lengthy runs of cable in home and work environments
    • Ability to connect mobile devices to a fixed broadband network, reducing dependence on the mobile network and potentially saving costs both for the service provider and the end-user
    • Enhanced convenience, safety and security, e.g. through installation of low cost wireless alarm systems or ability to unlock vehicles remotely rather than fumbling with keys
  • For equipment vendors and operators:
    • Facilitating market entry – there is no need to acquire a licence to deploy a service
    • Enabling niche applications or services to be addressed quickly and cheaply using existing technology and spectrum – this has been particularly effective in serving new machine to machine (M2M) applications in areas such as health, transport and home automation.
    • Providing certainty about spectrum access – there is no need to compete or pay for spectrum access (though the collective nature of spectrum use means quality of service cannot be guaranteed)
    • The ability to extend the reach of fixed communication networks, by providing wireless local area connectivity in homes, businesses and at public traffic hotspots.
The two most notable drawbacks are the inability to guarantee quality of service and the more limited geographic range that is typically available (reflecting the lower power limits that apply to these bands). Licence exempt wireless applications cannot claim protection from interference arising from other users or radio services. They operate in shared frequency bands and must not themselves cause harmful interference to other radio services.

From a regulator’s perspective, licence exempt bands can be more problematic than licensed bands in terms of refarming spectrum, since it is difficult to prevent the continued deployment of legacy equipment in the bands or to monitor effectively their utilisation. There is also generally no control over numbers and / or location of devices, which can make sharing difficult and limits the amount of spectrum that can be used in this way.

In Europe, regulation of licence exempt bands is primarily dealt with at an international level by European institutions. Most bands are fully harmonised, whereby free circulation of devices that comply with the relevant standards is effectively mandated throughout the EU. However some bands are subject to “soft” harmonisation, where the frequency limits and technical characteristics are harmonised but adoption of the band is left to national administrations to decide.

A key recommendation, which I think would be very interesting and useful would be: Promote further international harmonisation of licence exempt bands, in particular the recently identified 870 – 876 MHz and 915 – 921 MHz band that are likely to be critical for supporting future M2M demand growth in Europe.

Note that a similar sub-1GHz band has been recommended for 5G for M2M/IoT. The advantage for low frequencies is that the coverage area is very large, suitable for devices with low date rates. Depending on how the final 5G would be positioned, it may well use the license exempt bands, similar to the LAA/LTE-U kind of approach maybe.

The whitepaper is embedded below and is available to download from here:




Sunday, 26 July 2015

LTE vs TETRA for Critical Communications

Sometime back I was reading this interview between Martin Geddes and Peter Clemons on 'The Crisis in UK Critical Communications'. If you haven't read it, I urge you to read it here. One thing that stuck out was as follows:

LTE was not designed for critical communications.

Commercial mobile operators have moved from GSM to UMTS to WCDMA networks to reflect the strong growth in demand for mobile data services. Smartphones are now used for social media and streaming video. LTE technology fulfils a need to supply cheap mass market data communications.

So LTE is a data service at heart, and reflects the consumer and enterprise market shift from being predominantly voice-centric to data-centric. In this wireless data world you can still control quality to a degree. So with OFDM-A modulation we have reduced latency. We have improved how we allocate different resource blocks to different uses.

The marketing story is that we should be able to allocate dedicated resources to emergency services, so we can assure voice communications and group calling even when the network is stressed. Unfortunately, this is not the case. Even the 3GPP standards bodies and mobile operators have recognised that there are serious technology limitations.
This means they face a reputational risk in delivering a like-for-like mission-critical voice service.

Won’t this be fixed by updated standards?
The TETRA Critical Communications association (TCCA) began to engage with the 3GPP standards process in 2012. 3GPP then reached out to peers in the USA and elsewhere: the ESMCP project here in the UK, the US FirstNet programme, and the various European associations.

These lobbied 3GPP for capabilities specifically aimed at critical communications requirements. At the Edinburgh meeting in September 2014, 3GPP set up the SA6specification group, the first new group in a decade.

The hope is that by taking the critical communications requirement into a separate stream, it will no longer hold up the mass market release 12 LTE standard. Even with six meetings a year, this SA6 process will be a long one. By the end of the second meeting it had (as might be expected) only got as far as electing the chairman.

It will take time to scope out what can be achieved, and develop the critical communications functionality. For many players in the 3GPP process this is not a priority, since they are focusing solely on mass market commercial applications.

Similar point was made in another Critical communications blog here:

LTE has emerged as a long term possible replacement for TETRA in this age of mobile broadband and data. LTE offer unrivalled broadband capabilities for such applications as body warn video streaming, digital imaging, automatic vehicle location, computer-assisted dispatch, mobile and command centre apps, web access, enriched e-mail, mobile video surveillance apps such as facial recognition, enhanced Telemetry/remote diagnostics, GIS and many more. However, Phil Kidner, CEO of the TCCA pointed out recently that it will take many LTE releases to get us to the point where LTE can match TETRA on key features such as group working, pre-emptive services, network resilience, call set-up times and direct mode.
The result being, we are at a point where we have two technologies, one offering what end users want, and the other offering what end users need. This has altered the discussion, where now instead of looking at LTE as a replacement, we can look at LTE as a complimentary technology, used alongside TETRA to give end users the best of both worlds. Now the challenge appears to be how we can integrate TETRA and LTE to meet the needs and wants of our emergency services, and it seems that if we want to look for guidance and lessons on the possible harmony of TETRA and LTE we should look at the Middle East.
While I was researching, I came across this interesting presentation (embedded below) from the LTE World Summit 2015





The above is an interesting SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis for TETRA and LTE. While I can understand that LTE is yet unproven, I agree on the lack of spectrum and appropriate bands.

I have been told in the past that its not just the technology which is an issue, TETRA has many functionalities that would need to be duplicated in LTE.



As you can see from this timeline above, while Rel-13 and Rel-14 will have some of these features, there are still other features that need to be included. Without which, safety of the critical communication workers and public could be compromised.

The complete presentation as follows. Feel free to voice your opinions via comments.


Tuesday, 21 July 2015

TDD-FDD Joint Carrier Aggregation deployed


As per Analysis Mason, of the 413 commercial LTE networks that have been launched worldwide by the end of 2Q 2015, FD-LTE accounts for 348 (or 84%) of them, while TD-LTE accounts for only 55 (or 13%). Having said that, TD-LTE will be growing in market share, thanks to the unpaired spectrum that many operators secured during the auctions. This, combined with LTE-A Small Cells (as recently demoed by Nokia Networks) can help offload traffic from hotspots.

Light Reading had an interesting summary of TD-LTE rollouts and status that is further summarised below:
  • China Mobile has managed to sign up more than 200 million subscribers in just 19 months, making it the fastest-growing operator in the world today. It has now deployed 900,000 basestations in more than 300 cities. From next year, it is also planning to upgrade to TDD+ which combines carrier aggregation and MIMO to deliver download speeds of up to 5 Gbit/s and a fivefold improvement in spectrum efficiency. TDD+ will be commercially available next year and while it is not an industry standard executives say several elements have been accepted by 3GPP. 
  • SoftBank Japan has revealed plans to trial LTE-TDD Massive MIMO, a likely 5G technology as well as an important 4G enhancement, from the end of the year. Even though it was one of the world's first operators to go live with LTE-TDD, it has until now focused mainly on its LTE-FDD network. It has rolled out 70,000 FDD basestations, compared with 50,000 TDD units. But TDD is playing a sharply increasing role. The operator expects to add another 10,000 TDD basestations this year to deliver additional capacity to Japan's data-hungry consumers. By 2019 at least half of SoftBank's traffic to run over the TDD network.

According to the Analysis Mason article, Operators consider TD-LTE to be an attractive BWA (broadband wireless access) replacement for WiMAX because:

  • most WiMAX deployments use unpaired, TD spectrum in the 2.5GHz and3.5GHz bands, and these bands have since been designated by the 3GPP as being suitable for TD-LTE
  • TD-LTE is 'future-proof' – it has a reasonably long evolution roadmap and should remain a relevant and supported technology throughout the next decade
  • TD-LTE enables operators to reserve paired FD spectrum for mobile services, which mitigates against congestion in the spectrum from fixed–mobile substitution usage profiles.

For people who may be interested in looking further into migrating from WiMAX to TD-LTE, may want to read this case study here.


I have looked at the joint FDD-TDD CA earlier here. The following is from the 4G Americas whitepaper on Carrier Aggregation embedded here.

Previously, CA has been possible only between FDD and FDD spectrum or between TDD and TDD spectrum. 3GPP has finalized the work on TDD-FDD CA, which offers the possibility to aggregate FDD and TDD carriers jointly. The main target with introducing the support for TDD-FDD CA is to allow the network to boost the user throughput by aggregating both TDD and FDD toward the same UE. This will allow the network to boost the UE throughput independently from where the UE is in the cell (at least for DL CA).

TDD and FDD CA would also allow dividing the load more quickly between the TDD and FDD frequencies. In short, TDD-FDD CA extends CA to be applicable also in cases where an operator has spectrum allocation in both TDD and FDD bands. The typical benefits of CA – more flexible and efficient utilization of spectrum resources – are also made available for a combination of TDD and FDD spectrum resources. The Rel-12 TDD-FDD CA design supports either a TDD or FDD cell as the primary cell.

There are several different target scenarios in 3GPP for TDD-FDD CA, but there are two main scenarios that 3GPP aims to support. The first scenario assumes that the TDD-FDD CA is done from the same physical site that is typically a macro eNB. In the second scenario, the macro eNB provides either a TDD and FDD frequency, and the other frequency is provided from a Remote Radio Head (RRH) deployed at another physical location. The typical use case for the second scenario is that the macro eNB provides the FDD frequency and the TDD frequency from the RRH.

Nokia Networks were the first in the world with TDD-FDD CA demo, back in Feb 2014. In fact they also have a nice video here. Surprisingly there wasnt much news since then. Recently Ericsson announced the first commercial implementation of FDD/TDD carrier aggregation (CA) on Vodafone’s network in Portugal. Vodafone’s current trial in its Portuguese network uses 15 MHz of band 3 (FDD 1800) and 20 MHz of band 38 (TDD 2600). Qualcomm’s Snapdragon 810 SoC was used for measurement and testing.

3 Hong Kong is another operator that has revealed its plans to launch FDD-TDD LTE-Advanced in early 2016 after demonstrating the technology on its live network.

The operator used equipment supplied by Huawei to aggregate an FDD carrier in either of the 1800 MHz or 2.6 GHz bands with a TDD carrier in the 2.3 GHz band. 3 Hong Kong also used terminals equipped with Qualcomm's Snapdragon X12 LTE processor.

3 Hong Kong already offers FDD LTE-A using its 1800-MHz and 2.6-GHz spectrum, and is in the midst of deploying TD-LTE with a view to launching later this year.

The company said it expects devices that can support hybrid FDD-TDD LTE-A to be available early next year "and 3 Hong Kong is expected to launch the respective network around that time."

3 Hong Kong also revealed it plans to commercially launch tri-carrier LTE-A in the second half of 2016, and is working to aggregate no fewer than five carriers by refarming its 900-MHz and 2.1-GHz spectrum.

TDD-FDD CA is another tool in the network operators toolbox to help plan the network and make it better. Lets hope more operators take the opportunity to deploy one.

Sunday, 12 July 2015

S8HR: Standardization of New VoLTE Roaming Architecture

VoLTE is a very popular topic on this blog. A basic VoLTE document from Anritsu has over 40K views and my summary from last years LTE Voice summit has over 30K views. I assume this is not just due to the complexity of this feature.

When I attended the LTE Voice summit last year, of the many solutions being proposed for roaming, 'Roaming Architecture for Voice over LTE with Local Breakout (RAVEL)' was being touted as the preferred solution, even though many vendors had reservations.

Since then, GSMA has endorsed a new VoLTE roaming architecture, S8HR, as a candidate for VoLTE roaming. Unlike previous architectures, S8HR does not require the deployment of an IMS platform in VPLMN. This is advantageous because it shortens time-to-market and provides services universally without having to depend on the capability of VPLMN.



Telecom Italia has a nice quick summary, reproduced below:

S8HR simplicity, however, is not only its strength but also its weakness, as it is the source of some serious technical issues that will have to be solved. The analysis of these issues is on the Rel13 3GPP agenda for the next months, but may overflow to Rel14. Let’s see what these issues are, more in detail:


Regulatory requirements - S8HR roaming architecture needs to meet all the current regulatory requirements applicable to voice roaming, specifically:
  • Support of emergency calls - The issues in this context are several. For example, authenticated emergency calls rely on the existence if an IMS NNI between VPLMN and HPLMN (which S8HR does not provide); conversely, the unauthenticated emergency calls, although technically feasible in S8HR, are allowed only in some Countries subject to the local regulation of VPLMN. Also, for a non-UE-detectable IMS Emergency call, the P-CSCF in the HPLMN needs to be capable of deciding the subsequent action (e.g. translate the dialed number and progress the call or reject it with the indication to set up an emergency call instead), taking the VPLMN ID into account. A configuration of local emergency numbers per Mobile Country Code on P-CSCF may thus be needed.
  • ­Support of Lawful Interception (LI) & data retention for inbound roamers in VPLMN -  S8HR offers no solution to the case where interception is required in the VPLMN for inbound roamers. 3GPP is required to define a solution that fulfill such vital regulatory requirement, as done today in circuit switched networks. Of course VPLMN and HPLMN can agree in their bilateral roaming agreement to disable confidentiality protection to support inbound roamer LI but is this practice really viable from a regulatory point of view?
Voice call continuity – The issue is that when the inbound roamers lose the LTE coverage to enter into  a 2G/3G CS area, the Single Radio Voice Call Continuity (SRVCC) should be performed involving the HPLMN in a totally different way than current specification (i.e. without any IMS NNI being deployed).
Coexistence of LBO and S8HR roaming architectures will have to be studied since an operator may need to support both LBO and S8HR VoLTE roaming architecture options for roaming with different operators, on the basis of bilateral agreement and depending on the capability.
Other issues relate to the capability of the home based S-CSCF and TAS (Telephony Application Server) to be made aware about the VPLMN identity for charging purposes and to enable the TAS to subsequently perform communication barring supplementary services. Also, where the roaming user calls a geo-local number (e.g. short code, or premium numbers), the IMS entities in HPLMN must do number resolution to correctly route the call.
From preliminary discussions held at Working Group level in SA2 (architecture) and SA3 (security) in April, it was felt useful to create a new 3GPP Technical Report to perform comprehensive technical analysis on the subject. Thus it is expected that the discussions will continue in the next months until the end of 2015 and will overheat Release 13 agenda due to their commercial and “political” nature. Stay tuned to monitor the progress of the subject or contact the authors for further information!
NTT Docomo also did some trials back in February and got some brilliant results:

In the trials, DOCOMO and KT achieved the world's first high-definition voice and video call with full end-to-end quality of service. Also, DOCOMO and Verizon achieved the world's first transoceanic high-definition VoLTE roaming calls. DOCOMO has existing commercial 3G and 4G roaming relations with Verizon Wireless and KT.
The calls were made on an IP eXchange (IPX) and network equipment to replicate commercial networks. With only two months of preparation, which also proved the technology's feasibility of speedy commercialization, the quality of VoLTE roaming calls using S8HR architecture over both short and long distances was proven to be better than that of existing 3G voice roaming services.


In fact, NTT Docomo has already said based on the survery from GSMA's Network 2020 programme that 80% of the network operators want this to be supported by the standards and 46% of the operators already have a plan to support this.


The architecture has the following technical characteristics:
(1) Bearers for IMS services are established on the S8 reference point, just as LTE data roaming.
(2) All IMS nodes are located at Home Public Land Mobile Network (HPLMN), and all signaling and media traffic for the VoLTE roaming service go through HPLMN.
(3) IMS transactions are performed directly between the terminal and P-CSCF at HPLMN. Accordingly, Visited Public Land Mobile Network (VPLMN) and interconnect networks (IPX/GRX) are not service-aware at the IMS level. The services can only be differentiated by APN or QoS levels.

These three technical features make it possible to provide all IMS services by HPLMN only and to minimize functional addition to VPLMN. As a result, S8HR shortens the time-to-market for VoLTE roaming services.

Figure 2 shows the attach procedure for S8HR VoLTE roaming. From Steps 1 to 3, there is no significant difference from the LTE data roaming attach procedure. In Step 4, HSS sends an update location answer message to MME. In order for the MME to select the PGW in HPLMN (Step 5), the MME must set the information element VPLMN Dynamic Address “Allowed,” which is included in the subscribed data, to “Not Allowed.” In Step 6, the bearer for SIP signaling is created between SGW and PGW with QCI=5. MME sends an attach accept message to the terminal with an IMS Voice over PS Session Support Indication information element, which indicates that VoLTE is supported. The information element is set on the basis of the MME’s internal configuration specifying whether there is a VoLTE roaming agreement to use S8HR. If no agreement exists between two PLMNs, the information element will not be set.

The complete article from the NTT Docomo technical journal is embedded