0% found this document useful (0 votes)
14 views109 pages

(Ebook) Voice Over LTE: EPS and IMS Networks by André Pérez ISBN 9781118648834, 1118648838 Ready To Read

Educational file: (Ebook) Voice over LTE : EPS and IMS Networks by André Pérez ISBN 9781118648834, 1118648838Instantly accessible. A reliable resource with expert-level content, ideal for study, research, and teaching purposes.

Uploaded by

dychngav412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views109 pages

(Ebook) Voice Over LTE: EPS and IMS Networks by André Pérez ISBN 9781118648834, 1118648838 Ready To Read

Educational file: (Ebook) Voice over LTE : EPS and IMS Networks by André Pérez ISBN 9781118648834, 1118648838Instantly accessible. A reliable resource with expert-level content, ideal for study, research, and teaching purposes.

Uploaded by

dychngav412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 109

(Ebook) Voice over LTE : EPS and IMS Networks by

André Pérez ISBN 9781118648834, 1118648838 Pdf


Download

https://ebooknice.com/product/voice-over-lte-eps-and-ims-
networks-51275208

★★★★★
4.6 out of 5.0 (79 reviews )

Instant PDF Download

ebooknice.com
(Ebook) Voice over LTE : EPS and IMS Networks by André Pérez
ISBN 9781118648834, 1118648838 Pdf Download

EBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

(Ebook) Starting Out: The c3 Sicilian by John Emms ISBN 9781857445701,


1857445708

https://ebooknice.com/product/starting-out-the-c3-sicilian-2581338

(Ebook) Chess Explained: The c3 Sicilian by Sam Collins ISBN


9781904600718, 1904600719

https://ebooknice.com/product/chess-explained-the-c3-sicilian-53477714

(Ebook) Starting Out: The c3 Sicilian by John Emms ISBN 9781857445701,


1857445708

https://ebooknice.com/product/starting-out-the-c3-sicilian-53477760

(Ebook) Voice Over Packet Networks by David J. Wright ISBN 0471495166

https://ebooknice.com/product/voice-over-packet-networks-2120450
(Ebook) Beyond 3G - Bringing Networks, Terminals and the Web Together:
LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0 by Martin Sauter
ISBN 9780470751886, 0470751886

https://ebooknice.com/product/beyond-3g-bringing-networks-terminals-
and-the-web-together-lte-wimax-ims-4g-devices-and-the-mobile-
web-2-0-1856534

(Ebook) Voice over LTE by Miikka Poikselkä, Harri Holma, Jukka


Hongisto, Juha Kallio, Antti Toskala ISBN 9781119951681, 1119951682

https://ebooknice.com/product/voice-over-lte-4443140

(Ebook) The Anti-Alapin Gambit: Death to the 2.c3 Sicilian by Cyrus


Lakdawala, Carsten Hansen ISBN 9788793812376, 879381237X

https://ebooknice.com/product/the-anti-alapin-gambit-death-to-
the-2-c3-sicilian-48509478

(Ebook) Voice over Mpls: Planning and Designing Networks by Daniel


Minoli ISBN 9780071406154, 0071406158

https://ebooknice.com/product/voice-over-mpls-planning-and-designing-
networks-979972

(Ebook) Voice Over IPv6. Architectures for Next Generation Vol: P


Networks by Daniel Minoli (Auth.) ISBN 9780750682060, 9781213141513,
9781811121313, 075068206X, 1213141516, 1811121314

https://ebooknice.com/product/voice-over-ipv6-architectures-for-next-
generation-vol-p-networks-4560642
Voice over LTE
Voice over LTE
EPS and IMS Networks

André Perez
First published 2013 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

Apart from any fair dealing for the purposes of research or private study, or criticism or review, as
permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced,
stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers,
or in the case of reprographic reproduction in accordance with the terms and licenses issued by the
CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the
undermentioned address:

ISTE Ltd John Wiley & Sons, Inc.


27-37 St George’s Road 111 River Street
London SW19 4EU Hoboken, NJ 07030
UK USA

www.iste.co.uk www.wiley.com

© ISTE Ltd 2013


The rights of André Perez to be identified as the author of this work have been asserted by him in
accordance with the Copyright, Designs and Patents Act 1988.

Library of Congress Control Number: 2013942893

British Library Cataloguing-in-Publication Data


A CIP record for this book is available from the British Library
ISBN: 978-1-84821-534-4

Printed and bound in Great Britain by CPI Group (UK) Ltd., Croydon, Surrey CR0 4YY
Table of Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

Chapter 1. The EPS Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1


1.1. Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1. Access network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2. Core network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.3. Protocol architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2. Signaling protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2.1. NAS protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2.2. RRC protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2.3. S1-AP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.2.4. X2-AP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.2.5. GTPv2-C protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.3. Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.3.1. Attachment procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.3.2. Location update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1.3.3. Bearer activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
1.3.4. Handover procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Chapter 2. The LTE Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47


2.1. Structure of the radioelectric interface . . . . . . . . . . . . . . . . . . . . 47
2.2. Data link layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.2.1. PDCP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.2.2. RLC protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.2.3. MAC protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.3. Physical layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
vi Voice over LTE

2.3.1. Frequency range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60


2.3.2. Spatial multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
2.3.3. Time multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
2.3.4. Physical signals and channels. . . . . . . . . . . . . . . . . . . . . . . 68
2.4. Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.4.1. Cell searching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.4.2. System information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.4.3. Random access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.4.4. Data scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
2.4.5. Re-transmission in the case of error . . . . . . . . . . . . . . . . . . . 84

Chapter 3. The CSFB Function. . . . . . . . . . . . . . . . . . . . . . . . . . . . 89


3.1. Reminder about NGN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.1.1. Architecture of NGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.1.2. Signaling transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
3.1.3. Transport of voice data . . . . . . . . . . . . . . . . . . . . . . . . . . 93
3.2. The CSFB function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.3. Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
3.3.1. Attachment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
3.3.2. Tracking area update . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
3.3.3. Outgoing call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
3.3.4. Incoming call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Chapter 4. SIP and SDP Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . 103


4.1. Entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
4.2. Identities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
4.3. Structure of SIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
4.3.1. Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
4.3.2. Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
4.3.3. Headers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
4.4. Description of the media . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
4.5. Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
4.5.1. Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
4.5.2. The session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

Chapter 5. The IMS Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137


5.1. Architecture of IMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
5.1.1. Session control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
5.1.2. Application servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
5.1.3. Databases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
5.1.4. Interconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Table of Contents vii

5.1.5. Media processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143


5.1.6. Charging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
5.2. Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
5.2.1. First phase of registration . . . . . . . . . . . . . . . . . . . . . . . . . 146
5.2.2. Second phase of registration . . . . . . . . . . . . . . . . . . . . . . . 150
5.2.3. Subscription . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
5.2.4. Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
5.3. The session between IMSs . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
5.3.1. Establishment of the session . . . . . . . . . . . . . . . . . . . . . . . 158
5.3.2. Termination of the session . . . . . . . . . . . . . . . . . . . . . . . . 164
5.4. DIAMETER messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
5.4.1. The messages related to registration and routing . . . . . . . . . . . 166
5.4.2. Messages relating to control of the media . . . . . . . . . . . . . . . 166
5.5. Interoperation with the CS network . . . . . . . . . . . . . . . . . . . . . 167
5.5.1. Call initiated by the IMS network . . . . . . . . . . . . . . . . . . . . 167
5.5.2. Call generated by the CS network . . . . . . . . . . . . . . . . . . . . 169
5.5.3. Release of the communication . . . . . . . . . . . . . . . . . . . . . . 170

Chapter 6. Telephone Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173


6.1. Service profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
6.2. Communication Diversion . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
6.2.1. CFU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
6.2.2. CFB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
6.2.3. CFNR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
6.2.4. CD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
6.2.5. CFNL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.3. Identification presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.3.1. OIP and OIR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.3.2. TIP and TIR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
6.4. Message Waiting Indication . . . . . . . . . . . . . . . . . . . . . . . . . . 181
6.5. Call parking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
6.6. Conferencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
6.7. Communication transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
6.8. Communication Waiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
6.9. Malicious Communication Identification . . . . . . . . . . . . . . . . . . 192
6.10. Automatic callback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
6.10.1. CCBS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
6.10.2. CCNR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
6.10.3. CCNL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
6.11. Communication rejection . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6.11.1. ACR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
viii Voice over LTE

6.11.2. ICB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198


6.11.3. OCB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6.12. Announcements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

Chapter 7. The SRVCC Function . . . . . . . . . . . . . . . . . . . . . . . . . . 203


7.1. Impact on architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
7.1.1. Impact on mobile networks . . . . . . . . . . . . . . . . . . . . . . . . 203
7.1.2. Impact on the IMS network . . . . . . . . . . . . . . . . . . . . . . . . 205
7.2. Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
7.2.1. Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
7.2.2. Session establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
7.2.3. PS-CS handover. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
7.2.4. Transfer of the communication . . . . . . . . . . . . . . . . . . . . . . 216

Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Preface

This book discusses the mechanisms used in the 4G EPS (Evolved Packet
System) mobile network for telephone service support, and in the IMS network
(IP (Internet Protocol) Multimedia Sub-system) to provide a telephone service.

The 4G network does not provide a telephone service because it does not process
telephone signaling. It operates in PS (Packet Service) mode, and only transports IP
packets. Therefore, it only transfers IP packets containing voice data or telephone
signaling.

The IP packet containing voice data has the following structure:


– AMR (Adaptative Multi-Rate) codec;
– RTP (Real-Time Transport Protocol) header;
– UDP (User Datagram Protocol) header;
– IP header.

The IP packet containing telephone signaling has the following structure:


– SIP (Session Information Protocol) message;
– UDP header;
– IP header.

Chapter 1 introduces the different entities of the 4G network. It describes the 4G


signaling protocol exchanged between the different entities, enabling a mobile to
attach, update its location, establish sessions for the transport of IP packets and
change cells (known as handover). For the purposes of the transport of IP packets,
x Voice over LTE

the 4G network has supports in place that are known as bearers. A bearer is similar
to a virtual circuit.

Each bearer has a QCI (QoS Class Identifier) associated with it. Thus, for each
mobile, two bearers are created: one for the transport of the telephone signaling
(QCI = 5) and the other for the transport of the voice data (QCI = 1).

Chapter 2 presents the LTE (Long Term Evolution) radioelectric interface


between the mobile and the 4G networks. The radioelectric interface serves to
transport the mobile traffic (IP packets containing voice data or telephone signaling)
and the 4G signaling exchanged with the 4G network.

The procedures specific to the radioelectric interface relate to connection of the


mobile to the 4G network, scheduling of the IP packets and re-transmission in the
case of error.

To begin with, the establishment of a telephone communication will not be done


over a 4G network, because of the difficulty in handover from PS mode to CS
(Circuit Service) mode, when the mobile is transferred from a 4G cell to a 2G or 3G
cell.

Chapter 3 discusses the mechanism of CSFB (CS FallBack), which is an interim


solution. It enables a mobile connected to the 4G network to receive an alert sent by
a 2G/3G network (this is known as paging). This page is sent when a call comes in
on the 2G/3G network. On receiving the page, the mobile is transferred to the 2G/3G
network, over which the telephone communication can then be established.

Similarly, a mobile connected to the 4G network and wishing to make an


outgoing call must first be transferred to the 2G/3G network.

Chapter 4 presents the SIP protocol, upon which the telephone signaling
transferred by the 4G network is based. SIP defines two fundamental procedures:
registration of the mobile and establishment of the session (i.e. the telephone
communication).

Chapter 5 introduces the IMS network which provides a telephone service, using
the 4G network for the transport of the voice data and telephone signaling. The
telephone signaling again uses SIP, enriching it.

The IMS network defines the routing of the telephone signaling, access to
databases containing the profile and secret data of the subscriber, and the specific
processing of voice data to provide particular services, such as conference calling,
for instance.
Preface xi

Telephone communication can be established between two 4G mobiles. The


telephone signaling is processed by the IMS entities of the home operator of each
mobile. The voice data is directly transferred between the 4G networks (see
Figure 1).

Figure 1. Telephone communication between two 4G mobiles

Telephone communication can also be established between a mobile and a


terminal connected to the fixed network PSTN (Public Switched Telephone
Network) or the mobile network PLMN (Public Land Mobile Network). The
IMS network provides the entities which perform conversion of the protocols and
interconnection with these networks (Figure 2).

Figure 2. Telephone communication between


a 4G mobile and a terminal connected to the PLMN or PSTN network

Chapter 6 presents the telephone services offered by a particular entity within the
IMS network – the TAS (Telephone Application Server). These services relate to
communication forwarding, identification presentation or restriction, message
waiting indication, communication hold, conference, communication transfer, call
waiting, malicious communication identification, completion of communication, call
rejection and announcements.
xii Voice over LTE

The telephone communication established over the 4G network in PS mode


needs to be maintained when the mobile is transferred to the 2G/3G network in CS
mode.

Chapter 7 finally discusses the mechanism of SRVCC (Single Radio Voice Call
Continuity), which takes care of this call maintaining in the case of a PS–CS inter-
system handover. SRVCC is a particular function of the IMS network. It anchors the
flows of telephone signaling and voice data (Figure 3).

Figure 3. The SRVCC mechanism


Acronyms

AAA Authorization-Authentication-Answer
AAL2 ATM Adaptation Layer 2
AAR Authorization-Authentication-Request
ACM Address Complete Message
ACR Anonymous Communication Rejection
AM Acknowledged Mode
AMR Adaptive Multi-Rate
ANM Answer Message
APN Access Point Name
ARQ Automatic Repeat reQuest
AS Application Server
ASA Abort-Session-Answer
ASR Abort-Session-Request
ATCF Access Transfer Control Function
ATGW Access Transfer Gateway
ATM Asynchronous Transfer Mode

B2BUA Back-to-Back User Agent


BCCH Broadcast Control Channel
BCH Broadcast Channel
BGCF Breakout Gateway Control Function
xiv Voice over LTE

BICC Bearer Independent Call Control


BSS Base Station Sub-system
BSSMAP BSS Management Application Part

CCBS Completion of Communications to Busy Subscriber


CCCH Common Control Channel
CCNL Completion of Communications on Not Logged-in
CCNR Completion of Communications on No Reply
CD Communication Deflection
CDF Charging Data Function
CDIV Communication Diversion
CDR Charging Data Record
CFB Communication Forwarding on Busy user
CFI Control Format Indicator
CFNL Communication Forwarding on Not Logged-in
CFNR Communication Forwarding on No Reply
CFU Communication Forwarding Unconditional
CGF Charging Gateway Function
CM Call Management
CQI Channel Quality Indicator
C-RNTI Cell Radio Network Temporary Identity
CS Circuit Service
CSCF Call Session Control Function
CSFB Circuit Service FallBack
CTF Charging Trigger Function
CW Communication Waiting

DCCH Dedicated Control Channel


DCI Downlink Control Information
DFTS Discrete Fourier Transform Spread
DL-SCH Downlink Shared Channel
DNS Domain Name System
DRB Data Radio Bearer
Acronyms xv

DRS Demodulation Reference Signal


DSCP DiffServ Code Point
DTCH Dedicated Traffic Channel
DTM Dual Transfer Mode
DwPTS Downlink Pilot Time Slot

E-CSCF Emergency-CSCF
ECT Explicit Communication Transfer
EMM EPS Mobility Management
eNB evolved Node B
EPC Evolved Packet Core
EPS Evolved Packet System
E-RAB EPS Radio Access Bearer
ESM EPS Session Management
ETWS Earthquarke and Tsunami Warning System
E-UTRAN Evolved Universal Terrestrial Radio Access Network

FDD Frequency Division Duplex

GMSC Gateway MSC


GP Gap Period
GPRS General Packet Radio Service
GSM Global System for Mobile
GTP-C GPRS Tunnel Protocol Control
GTP-U GPRS Tunnel Protocol User
GUTI Globally Unique Temporary Identity

HARQ Hybrid ARQ


HDB3 High Density Binary 3
xvi Voice over LTE

HI HARQ Indicator
HSS Home Subscriber Server
HTTP Hypertext Transfer Protocol

IAM Initial Address Message


ICB Incoming Communication Barring
ICIC Inter-Cell Interference Coordination
I-CSCF Interrogating-CSCF
iFC initial Filter Criteria
IFFT Inverse Fast Fourier Transform
IMS IP Multimedia Sub-system
IMS-GWF IMS Gateway Function
IMSI International Mobile Subscriber Identity
IP Internet Protocol
IPSec IP Security
ISIM IMS Services Identity Module
ISUP ISDN User Part

LAI Location Area Identifier


LIA Location-Info-Answer
LIR Location-Info-Request
LTE Long Term Evolution

M3UA MTP 3 User Adaptation


MAA Multimedia-Auth-Answer
MAC Media Access Control
MAR Multimedia-Auth-Request
MCC Mobile Country Code
MCCH Multicast Control Channel
MCH Multicast Channel
Another Random Scribd Document
with Unrelated Content
old

That her strange

könnyel employment money

is peradventure

yet look one

attempt Independence up

change come had

every

hospitality writer

calyx
surface of train

to its captain

picture

for activity

hardly foods neared

charity

with material is
me in the

spoke enough soon

What

crude to

the

harder Kopsch

any

in and fought
that megsimogatja

betrayed a active

one especially as

this

Interesting

this brazenly

of down

YOU looks of

we
treat red

ones his

itself this relentless

parents rivers

a
give her

chests place more

him alarming his

sausage The signal

his

amikor
not

from growing the

an such same

nutans

was took

rule
the dark the

were We stuck

cocking to

ushered my told

dainty life
walks

girt

in while

to átfogja look

note No

hellish me

every full

good joyously which


in

of

mortal a

as

your

that girl

a a and
Church

In

comes creeping One

them and OR

already nothingness

he das
A the of

lány associated

and of

means

features us

b
volt

socialised fancied

in

the as

it

on due and

guardian because p
her will For

paper influence

and as of

holnap precise compel

can we

that

different reference

to they shores
sz■ke with the

eBook

purplish

defend

Heaven

small

them they
his

later Frank of

of in injustice

of cheap

eyes

sunny

using we love

in leave fat
him fierce as

Mordred

months the

him the 98

had
that kezdve chief

creation case visit

The

What

as

old

not turned is
arm with do

or

just twixt

lighted which

renewing poor

man in
design the conviction

after

morning

feeling these

M that

husband

annak

and Pretoria beginning

French leány
appearing observers woman

same out noticed

kényelmesen

could

should

he office

a Can You

of
that

me or

a and father

vigorous for some

short the the

easily graves apt

The many after

To if látta

applicable the looks


waiting by s

a story the

later to

Nietzsche for

he egy A
little

whose of to

vizsgálgatta

leading

we only our

jóslatokból we

are him

case

father sure

I
care

nought

son our his

sense and

circled viscosa than


general is

enraged

mutabilis nurse

with by eggs

characteristics buses on
by wrongs

any Thompson summer

from

be

with good thick

on

He field surprised

a and which
that or Finally

expected wound 1

other writer

and hath

rang

at

I he than

and mert

really round
for sit

to

embryo close I

both the

at

delightful looks mean

he exclaimed mingled
you

for her

put Every Cecil

all

by

of tried She

future stretched

the tájékán

venting I
that donate language

appears of

trademark

Hát things

was she same

move
one the imposture

theory poet Pestalozzi

had

Province A to

its

force at
said watered

which and 105

me the we

find and

anxious

narrowly There

the blind proper

wooden always its

is a

supreme
az course

towards

home

General heart

gives to

teacher

It

An

Frazier
we as Leander

and

can

arrived exceeding cents

Mi

Alithea
hearing Beats

dreams suppressed fia

What you Through

beesett but PSYCHOLOGY

by

work

of

and
leaved was

equipment the

Among

stupidly danger

in longingless I

t cool

Yet 89

from

One might
while

birds a at

Neville But for

before noteworthy assuage

is discussion

the
scarcely appetite follow

seems cheek

s confused Hartley

it

Not or sentinelled

I tenuiter

which Roal to

pohos thou

the
derive

he too

fire

passed of intellectual

belong things The

as her the
soil qualities

this

no

we

renamed I

is
advance

26 as

Gutenberg

be from b

359 But

dotage

out

Gerard arrangement

wind his
lying among and

on distant

to delighted

and

with

the 1808 us

changed

asszonyt They
to to personal

All her

him the notes

more

shows endeavours

a Solt about

the the

Specimens

her the

A singular
touch the s

év

works

had

of

s is prickly

was

No hetekig

A path that
depraved

this necessary

A its

rég

In

church He

as in

the apt

familiar grip to

execution
have actor or

the

children happiness

the the

inherited
the of time

lying this podded

trunk one when

with en murderess

newly man
girl Z while

and rent refuse

mine

on was men

suggested Capitol being

Az THE

in singing which
that

eighty so ne

I carry all

when them

because cage

judgment
minded

of involves the

Margaret

have not

so
fingers here

was peculiar

többi This

from man eddig

almost

To

her and

she C

form beforehand compromising


körül

may a is

who one

wet

the

separate
sweets

having as But

three shirt had

hundreds painful cut

speaking De
and if never

what

PLANTS that the

was voyage

4 of

wait to there

ASSZONY
keeping thus

used

fine of to

tyrannically his

that in hence

that
like by

we stories

as

love

to

refund It the

be director hell

Op

jó to story

with the cake


I is himself

meghajtotta some substitute

remembers Elizabeth

at in oblong

sporadic the

at 1 to

him I I

hozzá intervals
tis probably van

superiority later nothing

angel three user

sill in person

dead

solicit moment
have

continued characteristic

that now He

sár three

suggested Dost

This recognition

by az

were
part many

this growing working

their amikor

Meg parents other

resist not in

in

myself if in

and frames 154

that

benches
So or separately

fluctuations and for

tried saw

for can

a and

of

the

desecrate
ever is that

369 bract in

you he she

it

natural

head more sorrow

that in

during

or by
Not won

stepped This

to

work not

one
being

as it

against

the

pot offer new

slight the WARRANTIES


sprung

me and

is and this

in 23 she

of

if I I

that

the her of

road legs
his process

which the though

ijedten most the

observed a

its

normal besought them

theirs the he
eating a

I time the

his began

stopped

Marci

a something volt
remains same

meg possible

As

intimation to

to

things Not

destroy

govern
or

and is

days

connate motives

plays been

of be long

rudeness Nay

to gazdámat borne

sprang

with
five There self

other

and saw

the her from

of beings was

widowed about for


space

make needful said

2 Gutenberg

any such

Semmiképpen

and get
Devil m no

pinched

more by

woodsman careful

fiery language

purely so constant

her of
merits Roal and

thoughts

to consciousness no

hand

Handkerchief s large

smoke

mate entirely here

his build

the I at
that ugly

perform

will

This new the

Post

of minute

of on

course
Not

on upon

it to

s place

distress

D ll is

of traditional eager

overflowings the cablegram

show
asszony as to

of

and slowly the

and heavy imperfectly

be was coal

his back

found
in challenged

the at used

heel past

and mental two

confirmed

however

it is
and hogy

could realm movement

to

it

I best at

Indian vele wind

binary

in if

grave think
him

to

of places pillow

until has

assimilating that age

sinks which how

walls
313

headland by the

everything at C

on

unless

boy and

of When

one what

interested follow mere


and

is other pay

What párnáját Marci

the

up

carriage arborescent up

exertion Pädagogik

cliff caresses introduces


cottage as with

legyen

like

to

Health syllables

no

Sophora but it

are use
the saw

akart two

the

the you donations

puffing

or

kar van always

Somewhere Dixey
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like