Home > Technical Articles > 5G call flow Wireshark

5G call flow Wireshark

Wireshark is a network protocol analyzer that can be used to capture and analyze network traffic. It can be used to troubleshoot network problems, analyze network security, and learn about network protocols.

To use Wireshark to capture 5G call flow, you will need to:

  1. Install Wireshark on your computer.
  2. Connect your computer to the 5G network.
  3. Start Wireshark and select the interface that is connected to the 5G network.
  4. Start a call on your phone.
  5. Wireshark will capture the 5G call flow.
  6. You can then analyze the captured traffic to learn more about the 5G call flow.

Here are some of the things that you can learn from the captured traffic:

  • The signaling messages that are exchanged between the UE and the core network.
  • The data that is exchanged between the UE and the core network.
  • The performance of the 5G call.
  • The security of the 5G call.

Wireshark is a powerful tool that can be used to learn more about 5G call flow. By capturing and analyzing network traffic, you can gain insights into how 5G calls work and how they can be secured.

Here are some of the key things to look for when analyzing 5G call flow with Wireshark:

  • NAS signaling: NAS signaling is used to establish and maintain the 5G call. You can look for NAS signaling messages such as Attach Request, Attach Accept, and Paging Request.
  • Data traffic: Data traffic is the actual data that is exchanged between the UE and the core network during the call. You can look for data traffic in the form of IP packets.
  • Performance: You can use Wireshark to measure the performance of the 5G call. For example, you can measure the latency and throughput of the call.
  • Security: You can use Wireshark to assess the security of the 5G call. For example, you can look for security protocols such as IPsec and TLS.

Analyzing 5G call flow with Wireshark

By analyzing 5G call flow with Wireshark, you can gain a deeper understanding of how 5G calls work and how they can be secured. This information can be used to troubleshoot network problems, improve network performance, and protect network security
Analyzing the 5G call flow using Wireshark involves capturing and inspecting network packets to understand the communication between various network entities. Here is a detailed explanation of how Wireshark can be used to examine the 5G call flow:

Capture Network Packets:

Start Wireshark and select the network interface connected to the 5G network. Begin capturing packets by clicking on the "Start" button or using the keyboard shortcut (Ctrl + E). This will start capturing network traffic.


Filter the Packets:

Apply appropriate filters in Wireshark to focus on 5G-specific packets. For example, you can use filters like "gtpv2" or "diameter" to capture GTPv2 or Diameter protocol messages, respectively. These protocols are commonly used in 5G call flows.


Analyze Initial Access:

Look for packets related to the initial access phase. This includes messages such as Random Access Request (RAR) sent by the User Equipment (UE), followed by Random Access Response (RAR) from the base station (gNB). Analyze the timing, parameters, and responses exchanged during this phase.


Authentication and Security:

Identify authentication-related packets in the Wireshark capture. These packets may include messages like Authentication Request (A-Req) and Authentication Response (A-Res). Analyze the authentication procedure and security mechanisms employed during the call setup.


Network Registration:

Look for packets related to network registration. This involves messages such as Registration Request (REG-REQ) and Registration Accept (REG-ACC). Analyze the registration procedure, including the allocation of resources and network configuration.


Session Establishment:

Identify packets related to session establishment. This includes messages like Session Establishment Request (EST-REQ) and Session Establishment Accept (EST-ACC). Analyze the session setup process, including the establishment of bearer contexts and Quality of Service (QoS) parameters.


Data Transmission:

Analyze packets related to data transmission. Look for packets carrying user data and analyze the packet headers, payload, and flow characteristics. Identify the User Plane Function (UPF) and examine the packet routing, forwarding, and transport protocols.


Policy Control:

Look for packets related to policy control. These packets may include messages like Policy and Charging Control Request (PCC-REQ) and Policy and Charging Control Accept (PCC-ACC). Analyze the policy enforcement and resource allocation based on service requirements.


Call Termination:

Identify packets related to call termination or session release. Look for messages such as Session Release Command (REL-CMD) and Session Release Complete (REL-COMP). Analyze the release procedure and resource deallocation.

Wireshark provides powerful filtering and analysis capabilities that allow for in-depth inspection of the 5G call flow. By examining the captured packets and understanding the sequence of messages exchanged between different network entities, you can gain insights into the network behavior, performance, and protocols involved in the 5G call setup and data transmission process.