Implementing ATCA Serving Gateways for LTE Networks
|
|
- Adele Potter
- 8 years ago
- Views:
Transcription
1 White Paper February 2010 Implementing ATCA Serving Gateways for LTE Networks By Karl Wale, Director of PLM and Sridharan Natarajan, Lead Engineer The ever-increasing demand for wireless broadband by mobile data users is constantly forcing telecom standards bodies to look for newer specifications which can deliver multi-megabit throughput and lower latency levels. In response, 3GPP developed Long Term Evolution which brings with it not only higher throughput but also a flatter architecture with lower latencies and an all-ip infrastructure promising reduced operating expenses. LTE s packetoptimized radio access technology, along with an Evolved Packet Core (EPC) network suitable for always on operation, lowers the cost per bit and coexists nicely with other existing access technologies. One key challenge of LTE, however, is how core network components will keep up with massive increases in access link throughput (e.g., seven times HSPA data rates). How evolved core network equipment manufacturers (NEPs) rise to this challenge will be critical for determining subscriber satisfaction with their LTE service experiences. To focus on the challenge, this article discusses the best practices approach for building an ATCA Serving Gateway node, the very backbone of the LTE network user plane. CONTENTS LTE Network Architecture & the Serving Gateway Application pg. 1 Serving Gateway Platform Requirements pg. 2 Building an ATCA Serving Gateway pg. 2 Fault-Tolerant ATCA Platform Architecture pg. 3 Application Failover and Trillium Protocol Integration pg. 5 Load Balancing & Deep Packet Inspection pg. 6 Conclusion pg. 7 LTE Network Architecture & the Serving Gateway Application An LTE network consists of the network elements enodeb (or Base Station, part of E-UTRAN) and Access Gateway to support control and user plane access to LTE User Equipment (i.e., wireless devices). Access Gateway functionality is supported by the Mobility Management Entity (MME) to manage the control plane, the Serving Gateway (SGW) for the user plane, and the PDN Gateway for access to the Internet. EPC nodes are also connected to legacy systems (GERAN and UTRAN) so that LTE systems can co-exist with existing access technologies and facilitate seamless handovers. See Figure 1. The SGW terminates user plane access for the enodeb, routes user plane traffic, performs accounting and monitoring of user data, and acts as a local mobility anchor point for handovers.
2 2 Here is a summary of SGW functionality: User Plane Packet routing & transfer functions Uplink & Downlink charging per UE, PDN & QCI Accounting on user & QCI granularity for interoperator charging Setting end-marker to the transmission to assist in enodeb reordering function Transport-level packet marking in the uplink & downlink based on the QCI of the associated EPS bearer Lawful intercept Control Plane User session establishment & management ECM-IDLE mode DL packet buffering & triggering network triggered service request Mobility management (Mobility anchor for Inter enodeb handovers & inter-3gpp handovers) Resource Management Hardware system management Configuration management Call data logging Performance statistics Fault management Serving Gateway Platform Requirements An SGW platform requires many capabilities: Optimization for Packet (Bearer Plane) Processing: Since the SGW is designed to do user plane functionality for higher bandwidth systems, the platform on which the SGW resides should be optimized for packet processing. Deep Packet Inspection (DPI): An SGW requires DPI capability from the platform to support lawful intercept, policy control, and QoS enforcement to manage access to services and available bit rate during times of congestion. DPI can also support functions such as targeted advertising. Figure 1. 3G and LTE Networks Carrier-Grade Reliability: A field-proven, highlyavailable architecture is needed to eliminate data/ control PDU loss with no switch-over delay. Computing Power: An SGW platform needs substantial compute power for the control plane signaling between MME, SGSN, and PGW. Scalability: An SGW platform should be scalable so that capacity may be increased easily and robust enough to handle high load conditions. In addition, it should also be possible to co-locate functions in a single shelf (i.e., a single chassis may contain both MME and SGW functions). Quality of Service (QoS): QoS can be included as part of the DPI service control and enforcement functions. IP Security, Threat Management & Intrusion Detection/Prevention: Being part of an all-ip LTE network node, the SGW requires these securityrelated functionalities. Because mobile users are expected to hold carriers responsible for security breaches (much more so than users on wireline broadband connections), it is vital for wireless operators to ensure that subscribers are protected from malware reaching their handsets. Building an ATCA Serving Gateway There is a growing requirement from NEPs for preintegrated, system-level products that combine standards-based ATCA hardware, system and element management software, and high availability (HA) middleware. Pre-integration saves developers significant time and engineering costs, thereby
3 3 allowing NEPs to get to market much faster than they could have even a few years ago and often in less than 12 months. Purchasing pre-integrated platforms also facilitates a common infrastructure approach which allows NEPs to extend their solutions to include multiple network elements. In fact, in response to the current economic downturn, the trend now is for NEPs to outsource even more of what they formerly did themselves. It is common today to see requests for pre-integrated application software and higher-layer management tools including complete unified management software and Element Management Systems (EMS). In terms of applications, the requirements range from protocol stacks preintegrated with HA middleware to complete functional elements such as the SGW application modules shown in Figure 2. What s more, NEPs and service providers are starting to recognize that Deep Packet Inspection (DPI) may be applied to many functions within SGW nodes to help increase Average Revenue per User (ARPU) for capabilities such as tiered services, congestion management, and security. As a result, DPI is a rapidly growing area for which wireless developers are starting to request significant hardware, software, and integration support. For example, DPI modules that can detect application protocols and apply traffic shaping enable NEPs to integrate sophisticated policy control and enforcement directly into the SGW or PDN Gateway, which is often preferred over delivering such functionality with separate devices. Figure 3 shows a typical ATCA system-level solution for an SGW. Fault-Tolerant ATCA Platform Architecture Figure 4 shows the functional connectivity of an ATCA-based SGW, in this case one based on Radisys pre-integrated ATCA platform. With a standardsbased, bladed approach like ATCA it is relatively straightforward for NEPs to scale the solution from small to medium to large with common platform sizes being 2-slot (2U or 3U), 6-slot (5U or 6U), and 14-slot (12U). A carrier-class ATCA system consists of compute blades, packet processing blades, switches, system Figure 2. Serving Gateway Interfaces & Protocols Figure 3. ATCA-based Serving Gateway Solution Stack controllers, and shelf manager blades. Redundancy is employed with all platform components to avoid any single point of failure, and payload blades support 1+1 (active / standby), N+1 (N active with one standby spare), and N+M (N active with M standby spares)
4 4 configurations. HA middleware and applications checkpoint across blades and clusters, while power and configuration management is controlled via shelf managers and Essential Services software. The system controller is where HA middleware runs with a persistent storage database that contains all configuration information, HA middleware, unified management interface, HPI services, and Essential Services. The system controller blade maintains the application model per the Application Management Framework (AMF) and runs in active-standby mode whereby all database information is replicated across the active and standby blades. The EMS interface to the ATCA system can be an SNMP agent, Command Line Interface (CLI), Web/ XML, or NETCONF; at a minimum, SNMP and CLI are present. The EMS/NMS will contact the SNMP agent of the system controller to manage the hardware and software components in the chassis. The middleware redirects hardware management requests coming from the EMS to the HPI implementation which has connectivity to the shelf manager. As a result, the EMS can manage all hardware components in the chassis. Figure 4. Serving Gateway Fault-Tolerant Architecture Compute blades are where the SGW control plane user application(s) run and contain control plane protocols (egtp-c), application and protocol MIBs, middleware, and a platform management interface. The compute blades are configured in a 1+1 redundancy model. Packet processor blades are where the SGW user plane application(s) and DPI applications run. They contain the user plane protocol (egtp-u), application and protocol MIBs, middleware, and an Essential Services interface. The packet processor blades are configured with N+M redundancy. The hub switch and network uplinks are configured for 1+1 redundancy. The Radisys ATCA platform in particular is supported by what is known as Layer 2 High Availability (L2HA) for checkpointing network configuration. L2HA provides hub switch status checkpointing and failover, bonding drivers, and dual star connectivity to avoid link loss on the base and fabric aspects of the switch. Figure 5. ATCA HA System Architecture The shelf manager is an important chassis-related function which manages hardware elements including fans, power supplies, and blades. It manages the blades through an Intelligent Platform Management Interface (IPMI) which runs over the IPM Bus, and all ATCA blades have an IPM controller for performing activities as directed by the shelf manager. If the shelf manager cannot recover from a fault condition, the system controller will treat this as un-recoverable fault and failover to the standby.
5 5 Application Failover and Trillium Protocol Integration HA middleware runs on the system controller blade and monitors applications running on active blades through the middleware agent running on each blade. Failures are detected by exchanging heartbeats between nodes, and upon failure of an active node the standby will take over and become the active node. Checkpointing services in HA middleware are used to share data and parameters between active and standby components. HA middleware provides services to create checkpoints, manage the lifecycle of checkpoints, and establish mechanisms for active components to write the latest state and for standby components to read the latest state. Protocol stacks such as Radisys Trillium protocol software product line consists of sophisticated protocol layers with operating system abstraction and relay called inter-process communication. Since most stacks do not natively comply with recent Service Availability Forum (SAF) specifications on their own, functions are written to provide support for AMF- AIS application programming interfaces (known as an AMF interface engine) and IMM-AIS application programming interfaces (known as a Stack Manager, or SM interface engine). In the case of Trillium stacks ported to SAF-compliant HA middleware, the AMF interface engine handles life cycle requests such as instantiation, suspension, and termination as well as the high availability states like active and standby. Instead of propagating the request directly to the stack, the AMF interface engine also takes care of other housekeeping functions and informs the patented Trillium DFT/HA (Distributed Fault-Tolerant / High Availability) core component to take care of high availability requests. Note too that the Trillium DFT/HA core consists of elements that manage the HA state of the Trillium layers and message delivery between these layers. Such functionality resides in the system controller blade because it controls Trillium stacks running on multiple payload blades and also follows the same Figure 6. Application Redundancy and Failover Architecture Figure 7. Trillium Stack Integration into HA Middleware lifecycle as the middleware in the system controller. A Trillium Protocol Specific Function (PSF) is used to update the protocol-specific state information to the standby unit, and a Trillium Load Distribution Function (LDF) takes care of distributing traffic across available resource sets.
6 6 Load Balancing & Deep Packet Inspection User data traffic is diverted to the egtp-u server running in the packet processor blade by the load balancer in the hub switch. The load balancer must extract the packets from GTP tunnels and consistently direct sessions to the same blade, processor, and hardware thread on the packet processor blade(s). It is vitally important to maintain the associations between respective GTP flows to the serving blade(s). The GTP-u server de-tunnels the user packets, inspects the user traffic, and then classifies, authenticates, forwards, or blocks as determined by policy control parameters. Extracted user packet are passed to a DPI engine for further processing and action, such as policy control, intrusion detection and prevention (IPS/IDS), lawful intercept, charging (service-based charging as well capacity-based charging), bandwidth shaping, etc. All such functions may be implemented within or in conjunction with the SGW itself. DPI servers can run on compute-centric resources or on dedicated packet processor blades such as Radisys ATCA-PP50s which deliver up to 10G per blade. Fast path software increases performance dramatically, especially for small packet sizes, and an experienced professional services team can extract optimized performance for nearly any application type. In addition to the classic 5-tuple lookup, DPI firewalls have application awareness and understand protocols such as HTTP, SMTP, POP3, IMAP, and FTP, and also recognize the actual applications that rely on those protocols (e.g., BitTorrent, Skype, webmail services, etc). DPI IPS/IDS systems range from connection-oriented intrusions and Denial of Service (DoS) attacks to dynamic, content-based threats such as viruses, worms, trojans, spyware, and phishing. DPI systems are powerful and allow operators to classify traffic by multiple parameters including subscriber, service, application, origin/destination, IP address, and more. Traffic classification can also be based on usage and/or subscriber session traffic patterns. Based on the network traffic classification Figure 8. Sample ATCA Load Balancing Architecture and policies, DPI platforms allow the service provider to control traffic flows including blocking, rate shaping, and redirection of packets to different destinations. DPI platforms can also limit the data rate of users, block access, account and prioritize traffic, etc. For example, with lawful intercept it is necessary to identify a Voice over IP (VoIP) session in a high-speed packet stream, copy the VoIP packets, and then send them to a lawful intercept point for monitoring. In VoIP networks this process is further complicated by the fact that SIP messages can follow a different path in the network than the associated RTP content. With new communication media such as social networking and instant messaging, there is an increasing need for DPI to recognize specific applications and extract session information (e.g., calling party, called party, duration, etc.) to meet legal intercept requirements. Policy management functions supported by DPI systems are charging (whether per-access billing or flat rate), authentication of access (e.g., service access entitlement), QoS prioritization of latency-critical traffic (e.g., prioritization over VoIP, P2P, or general web-browsing traffic), and congestion management based on parameters such as service level or other subscriber-specific flags, time of day, etc.
7 7 Conclusion ATCA is well-suited to implementing the Serving Gateway node for LTE networks. Through an outsourced platform acquisition strategy, NEPs can attain the key SGW platform functionality required while minimizing time-to-market and development expense. And, by incorporating the latest system technologies such as load balancing and DPI, the SGW represents a fresh opportunity to increase new revenue streams while managing subscriber traffic according to operator-driven priorities. An experienced wireless and DPI solution provider such as Radisys can help NEPs with such ATCA platform integration and, in the process, free up in-house resources to focus on new application development and unique market differentiation. References 1. 3GPP TS GPRS enhancements on EUTRAN access 2. 3GPP TS E-UTRAN overall description 3. 3GPP TS Evolved GPRS Tunneling Protocol for control plane 4. 3GPP TS GPRS Tunneling Protocol User Plane Corporate Headquarters 5435 NE Dawson Creek Drive Hillsboro, OR USA Fax Toll-Free info@radisys.com 2011 Radisys Corporation. Radisys is a registered trademark of Radisys Corporation. Convedia, Microware and OS-9 are registered trademarks of Radisys Corporation. Promentum, and Procelerant are trademarks of Radisys Corporation. *All other trademarks are the properties of their respective owners. February 2010
Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well
White Paper Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well By: Manish Singh, CTO Overview The introduction of flat rate all-you-can-eat data plans was, if not the most important, a very
More informationNokia Siemens Networks Flexi Network Gateway. Brochure
Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband
More informationWhy Is DPI Essential for Wireless Networks?
White Paper Why Is DPI Essential for Wireless Networks? By: Manish Singh, CTO Overview The biggest challenge network operators continue to face is how to keep up with seemingly insatiable demand for mobile
More informationProtocol Signaling Procedures in LTE
White Paper Protocol Signaling Procedures in LTE By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer Overview The exploding growth of the internet and associated services has fueled
More informationSecuring Next Generation Mobile Networks
White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile
More informationSingle Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS
White Paper Single Radio Voice Call Continuity (SRVCC) with LTE By: Shwetha Vittal, Lead Engineer Overview Long Term Evolution (LTE) is heralded as the next big thing for mobile networks. It brings in
More informationNokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
More informationIntegrating Lawful Intercept into the Next Generation 4G LTE Network
Integrating Lawful Intercept into the Next Generation 4G LTE Network All telecommunication providers that currently or plan to provide 4G LTE service to their customers must consider significant changes
More information10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationDiameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationOptimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan
More informationAmdocs Policy Controller
Amdocs Policy Controller The Amdocs Policy Controller is a highly flexible and scalable policy server specifically designed to help service providers manage the impact of mobile data growth on their networks
More informationArchitecture Overview NCHU CSE LTE - 1
Architecture Overview NCHU CSE LTE - 1 System Architecture Evolution (SAE) Packet core networks are also evolving to the flat System Architecture Evolution (SAE) architecture. This new architecture optimizes
More informationLTE Performance and Analysis using Atoll Simulation
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation
More informationCisco Wireless Security Gateway R2
Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network
More informationDistributed Fault-Tolerant / High-Availability (DFT/HA) Systems
White Paper February 2010 Distributed Fault-Tolerant / High-Availability (DFT/HA) Systems By Ravi Raj Bhat, Vice President of Engineering Today s telecommunication platforms must provide five nines availability,
More informationLong-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
More informationIntel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
More informationTechnical white paper. Enabling mobile broadband growth Evolved Packet Core
Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective
More informationPractical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
More informationALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE
ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports
More informationNTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
More informationSecurity Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
More informationHow To Choose Radisys
ENABLING WIRELESS Infrastructure Solutions Radisys Your Trusted Partner As the world s networks evolve from 3G to 4G LTE and beyond, the wireless industry is accelerating into a period of unprecedented
More information3GPP Long Term Evolution: Architecture, Protocols and Interfaces
3GPP Long Term Evolution: Architecture, Protocols and Interfaces Aderemi A. Atayero, Matthew K. Luka, Martha K. Orya, Juliet O. Iruemi Department of Electrical & Information Engineering Covenant University,
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationThe LTE Challenge. for the Small-to- Midsize Mobile Network Operator
The LTE Challenge for the Small-to- Midsize Mobile Network Operator The next mobile generation is not just for Tier 1 carriers. How to tap into the business opportunities of LTE in Tier 2 and Tier 3 markets
More informationAccelerating 4G Network Performance
WHITE PAPER Accelerating 4G Network Performance OFFLOADING VIRTUALIZED EPC TRAFFIC ON AN OVS-ENABLED NETRONOME INTELLIGENT SERVER ADAPTER NETRONOME AGILIO INTELLIGENT SERVER ADAPTERS PROVIDE A 5X INCREASE
More informationEnd to End Delay Performance Evaluation for VoIP in the LTE Network
ENSC 427 COMMUNICATION NETWORKS SPRING 2013 Final Project Presentation End to End Delay Performance Evaluation for VoIP in the LTE Network Dai, Hongxin Ishita, Farah Lo, Hao Hua danield @ sfu.ca fishita
More informationLTE Attach and Default Bearer Setup Messaging
LTE Attach and Default Bearer Setup Messaging 2012 Inc. All Rights Reserved LTE Attach Message Sequence Chart enodeb MME SGW HSS Initial UE Message Update Location Update Location Answer Create Session
More informationSecurity MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.
Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for
More informationVoice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
More informationLTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
More informationIntel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
More informationSignaling is growing 50% faster than data traffic
Signaling is growing 50% faster than data traffic To enable future-proof mobile broadband networks, Nokia Siemens Networks has designed its Evolved Packet Core to handle high signaling load. 2/8 Signaling
More informationTelesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER
Telesystem Innovations LTE in a Nutshell: Protocol Architecture WHITE PAPER PROTOCOL OVERVIEW This whitepaper presents an overview of the protocol stack for LTE with the intent to describe where important
More informationLTE Mobility Enhancements
Qualcomm Incorporated February 2010 Table of Contents [1] Introduction... 1 [2] LTE Release 8 Handover Procedures... 2 2.1 Backward Handover... 2 2.2 RLF Handover... 3 2.3 NAS Recovery... 5 [3] LTE Forward
More informationSingle Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester
Application Note Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester September 2013 Rev. A 09/13 Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8
More information1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7
Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview
More informationMobility Management for All-IP Core Network
Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6
More informationThe changing face of global data network traffic
The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This
More informationLTE X2 Handover Messaging
LTE X2 Handover Messaging 2013 Inc. All Rights Reserved LTE X2 Handover Sequence Diagram UE Target enodeb Source enodeb MME SGW Handover Confirm X2AP Handover Request X2AP Handover Request Acknowledge
More informationTowards Software Defined Cellular Networks
Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN
More informationOverview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
More informationGet the best performance from your LTE Network with MOBIPASS
Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationMultimedia Conferencing Solutions
Multimedia Solutions Fixed users are migrating to... Mobile Audio users are migrating to... Video CSPs are migrating to... Radisys ECONOMICAL FLEXIBLE RELIABLE DIFFERENTIATED INTEGRATED SCALABLE The conferencing
More informationDemo 1. Network Path and Quality Validation in the Evolved Packet Core
Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer
More informationImproving Network Efficiency for SMB Through Intelligent Load Balancing
Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business
More informationLTE Control Plane on Intel Architecture
White Paper Soo Jin Tan Platform Solution Architect Siew See Ang Performance Benchmark Engineer Intel Corporation LTE Control Plane on Intel Architecture Using EEMBC CoreMark* to optimize control plane
More informationGame changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
More informationAn Integrator s Guide to MicroTCA Part III System management software
An Integrator s Guide to MicroTCA Part III System management software By Peter Marek, Advantech In the previous article of this series we explained the basic processes of the start up of a Field Replaceable
More informationTrillium Multi-Core SIP: Why Throughput Matters
White Paper February 2010 Trillium Multi-Core SIP: Why Throughput Matters By Todd Mersch, Director of Product Line Management Why Does SIP Matter? Session Initiation Protocol (SIP) is the foundation for
More informationManaged 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service
Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless
More informationMobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
More informationAppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
More informationMigration to LTE: Infrastructure Impact. Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009
Migration to LTE: Infrastructure Impact Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009 LTE to ehpd/hpd Interworking ehpd Internet Intranet IMS AT: Access Terminal enc: Enhanced
More informationNEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
More information464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
More informationRadware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...
More informationDeploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
More informationSERVICE CONTINUITY. Ensuring voice service
SERVICE CONTINUITY FOR TODAY S Voice over LTE SUBSCRIBERS Ensuring voice service with Single Radio Voice Call Continuity (SR-VCC) TECHNOLOGY White Paper Subscribers expectations for mobile data services
More informationRouting Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
More informationClavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication
Feature Brief Policy-Based Server Load Balancing March 2007 Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
More informationLTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *
VoLTE esrvcc VSRVCC Inter-domain Handover Technologies in LTE for Voice (VoLTE) and TV Phone A data communication service called Xi (Crossy) has started in LTE. In the future, voice and TV phone services
More informationNetwork Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07
Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements
More informationImplementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
More information3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationIP Multimedia System: general aspects and migration perspectives
IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network
More informationUse of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
More informationHandover Management Optimization for LTE Terrestrial Network with Satellite Backhaul
Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul Michael Crosnier a b, Fabrice Planchou a, Riadh Dhaou b, André-Luc Beylot b a EADS Astrium, 31 avenue des cosmonautes,
More informationWHITE PAPER. Authoritative Guide to Advanced LTE Testing
WHITE PAPER Authoritative Guide to Advanced LTE Testing 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-3102-01 Rev. A, August 2013 2 Table of Contents Introduction...
More informationTÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
More informationContent Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router
Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router Product Overview The Cisco Content Switching Module (CSM) is a Catalyst 6500 line card that balances client traffic to farms
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationImplementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
More informationehrpd Mike Keeley Market Segment Director
ehrpd Mike Keeley Market Segment Director Agenda ehrpd What, Why, and When? ehrpd s Impact on the Core Network ehrpd s Impact on the Mobile Device Verifying ehrpd works 2 Acronyms AAA AN BSC EAP- AKA ehrpd
More informationLTE - Can SDN paradigm be applied?
LTE - Can SDN paradigm be applied? Source of this presentation: Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationThe future of mobile networking. David Kessens <david.kessens@nsn.com>
The future of mobile networking David Kessens Introduction Current technologies Some real world measurements LTE New wireless technologies Conclusion 2 The future of mobile networking
More informationVirtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA
Virtualization techniques for redesigning mobile backhaul networks: challenges and issues Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA MobiArch 2015 September 7, 2015 Outline 1 2 3 Introduction Convergent
More informationIntroduction to Evolved Packet Core
S T R A T E G I C W H I T E P A P E R Introduction to Evolved Packet Core This white paper provides a brief introduction to Evolved Packet Core a new mobile core for LTE. Herein, key concepts and functional
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationSonicWALL Corporate Design System. The SonicWALL Brand Identity
SonicWALL Corporate Design System The SonicWALL Brand Identity 1 SonicWALL Corporate Vision Vision Dynamic Security for the Global Network Our vision is simple: we believe security solutions should be
More informationElfiq Networks Vital for Hospitality
Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...
More informationWhitepaper. A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity
Whitepaper A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity Table of Content Executive Overview 1 The Challenge 1 The Solution: Multi-Link Technology 3 Making Your VPNs Reliable
More informationSAE and Evolved Packet Core
SAE and Evolved Packet Core Farooq Bari Seattle Communications (COM-19) Society Chapter Nov. 13, 2008 1 SAE/EPS Background Around 2005, 3GPP RAN groups initiated the LTE work and in parallel the SAE work
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationPART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
More informationWhy an Intelligent WAN Solution is Essential for Mission Critical Networks
Why an Intelligent WAN Solution is Essential for Mission Critical Networks White Paper Series WP100135 Charles Tucker Director of Marketing June 1, 2006 Abstract: Reliable Internet connectivity is now
More informationWireless & Mobile. Working Group
Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...
More informationCS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
More informationAssuring Your Business Continuity
Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)
More informationPROMENTUM ATCA-2210. ATCA Switch and Control Module FEATURE SUMMARY
PROMENTUM ATCA-2210 ATCA Switch and Control Module FEATURE SUMMARY Single slot ATCA PICMG 3.0/3.1 compliant module Industry first 10GE fabric in AdvancedTCA highest bandwidth user plane connectivity per
More informationUtimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention
Realtime Network Monitoring for Lawful Interception and Data Retention 2 Realtime Network Monitoring with Passive Probes Realtime monitoring of network connections has been used by telecom operators for
More informationDraft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
More information