Connection-less communication of IoT devices over LTE mobile networks

Size: px
Start display at page:

Download "Connection-less communication of IoT devices over LTE mobile networks"

Transcription

1 Connection-less communication of IoT devices over LTE mobile networks Roger Piqueras Jover, Ilona Murynets AT&T Security Research Center, New York, NY Abstract The emergence of the Internet of Things (IoT) introduces a vast ecosystem of new network-enabled objects. Although most current cellular IoT services run over 2G and 3G cellular networks, the Long Term Evolution (LTE) is expected to be one of the main platforms for the emergence of new Machine to Machine (M2M) communication systems. Cellular communication protocols were designed and optimized to handle human-originated communications. However, with the forecasted deployment of billions of M2M devices, there is a growing concern in the industry that the cellular core may be overloaded by the sharp increase in control plane signaling load. The traffic characteristics of IoT devices are very different from those of smartphones and can enhance the risk for signaling storms. A new connection-less communication protocol for IoT systems over LTE mobile networks is proposed to spare signaling exchanges at the cellular core for M2M communications. It requires no standards modification and provides an overlaying channel between connected objects and base stations. Its effectiveness is demonstrated through simulations with realistic background network load parameters extracted from real LTE traffic sniffed from a busy downtown Manhattan intersection. I. INTRODUCTION The recent evolution of communication systems introduces a great variety of network-enabled objects which interact with each other and provide a broad spectrum of new services. From a traditional scenario of connected computers and handheld devices (i.e. mobile-phones and smart-phones), connectivity is now reaching home appliances, machinery and vehicles. The convergence of the Internet and cellular mobile networks is breeding new Machine-to-Machine (M2M) communication systems, defining mobile networks as one of the main platforms for the Internet of Things (IoT) [1]. The surge of M2M embedded devices, with billions expected within the next few years [2], will set the foundations of the IoT, fueling the advent of novel communication services [3]. Wireless mobile networks are one of the main platforms for the widespread emergence of M2M systems. Although most current M2M systems run over 2G and 3G networks, the Long Term Evolution (LTE) is expected and widely acknowledged as the main enabler for the advent of the IoT [4], with major equipment manufacturers already starting to focus their investment in LTE-based IoT [5]. The combination of the planned shut down of 2G networks [6] and the higher capacity and low-power performance of LTE is shifting the deployment of the IoT towards LTE mobile networks. The traffic characteristics of many M2M networked appliances are known to be substantially different to those /15/$31.00 c 2015 IEEE from smartphones [7]. Mobile networks were designed and optimized to transport human-originated traffic, and hence they are known to suffer from resource utilization inefficiencies when handling M2M communication [8]. These are the source of increasing concern within the industry to understand the dynamics of M2M growth on LTE networks. It is acknowledged that LTE could be overwhelmed by the surge in both traffic and control plane signaling load [9], [10]. Instances of the impacts of such a surge in load at the mobile core have been reported in recent years [11] [13]. Security researchers have also argued that such inefficiencies could be exploited in malicious attacks. This has resulted in standardization bodies starting to propose solutions [14] to prevent signaling overloads and to propose enhanced M2M communication systems over LTE. This paper presents a new technique to transport M2M data over an LTE wireless access with no expensive signaling exchange at the mobile core. This connection-less M2M communication is designed to fit within the 3GPP (3rd Generation Partnership Project) standards. It leverages low level channels mapped on the LTE frame in order to encode data both in the uplink (UL) and downlink (DL). By encoding user data within certain fields of the packets in these physical layer (PHY) channels, one can potentially achieve throughputs of about 16kbps in the DL and 3.84 kbps in the UL. Given the characteristics of connection-less links, the method is intended for low throughput and delay tolerant M2M applications, such as remote security cameras, status check systems sending a stay alive message periodically, fleet location trackers reporting coordinates periodically, etc. The proposed method defines an alternative layer 1 protocol, providing a small Slotted ALOHA-like link at each LTE base station. Enhancements to the basic system are also proposed, which increase the maximum achievable throughput substantially. The feasibility of this new technology is demonstrated with system simulations. In order to provide highly realistic results, the simulations include a real background load of LTE traffic captured with a state of the art LTE sniffer in a crowded intersection of downtown Manhattan. The results indicate that connection-less M2M communications over LTE networks are feasible. They are a potential trafficand signaling-efficient alternative for the deployment of the IoT on LTE networks with close to zero impact on regular LTE traffic. The successful deployment of this technology, though, would require to address a number of security implications, discussed in the paper as well. The remainder of this manuscript is organized as follows. Section II briefly introduces basic concepts on LTE architecture and the main channels leveraged in connection-less M2M

2 communications systems. Section III overviews the known challenges of the spread of the IoT on mobile networks. Next, Section IV introduces connection-less communications on LTE networks and how they are framed considering real LTE traffic captures. In Section V, the connection-less simulation results are presented. Finally, Section VI discusses the main implementation and security considerations of this proposed technique and Section VII concludes the paper. II. LTE MOBILE NETWORKS As opposed to the previous 3GPP-based standards for mobile communications, LTE was designed with the goal of offering only packet-switched services, providing IP connectivity between mobile devices and the Internet. The LTE network architecture defines two portions: the Radio Access Network (RAN) and the cellular packet core, known as Enhanced Packet Core (EPC) [15]. The EPC contains the nodes responsible for establishing a tunnel, known as bearer, to transport traffic between mobile devices and the Internet. Moreover, the EPC manages the bearer logistics and the authentication and encryption functions. The RAN is composed of two types of nodes, the User Equipment (UE), or mobile terminals, and the enodeb, or LTE base station. The RAN assigns radio resources to mobile terminals and manages their radio resource utilization. Fig. 1. LTE frame structure and mapping of DL control channels The LTE RAN provides capacity to UEs by means of a PHY layer based on Orthogonal Frequency Division Multiple Access (OFDMA) [15]. Radio resources are divided in both time and frequency. The minimum unit of allocation, known as Physical Resource Block (PRB), encodes 7x12 symbols in a block of one 1ms resource block in time and a Resource Block (RB) of 12 subcarriers in frequency. Two contiguous resource blocks in time form a subframe and, in turn, the 10ms LTE frame is formed by 10 subframes. The LTE standard supports multiple bandwidth (BW) configurations, from 1.5MHz (6 RBs in frequency per frame) to 20MHz (100 RBs in frequency per frame), being 10MHz the most commonly deployed. Figure 1 depicts the LTE frame in the case of a BW configuration with 6 RBs. A set of PHY channels are defined, mapped and modulated on the LTE frame. They are used to transport both signaling traffic as well as actual user communications [16]. The main PHY channels in the DL are included in Figure 1. With the exception of the allocation and mapping of radio resources for user traffic, the PRB mapping for all other channels is constant and known a priori, thus allowing the phone to correctly camp and connect to an enodeb. Any UE willing to access the network must first perform a cell selection procedure. Next, the UE decodes the Physical Broadcast Channel (PBCH) to extract basic system configuration, necessary to map and decode the other channels in the cell. At this point, the UE can initiate an actual connection by means of a Random Access procedure. Finally, a bearer is established through the EPC in order to send and receive user traffic. A. LTE random access procedure The Random Access Channel (RACH) is an uplink channel used to request a radio resource assignment during the initial access to the system. The first message exchange on this channel also allows the UE to achieve UL synchronization. The transmission on this channel is shared by all users within a sector and follows a Slotted-ALOHA/CSMA-like protocol, so collisions might occur. The RACH is multiplexed in time and frequency on each frame, with a number of RACH resources mapped on each frame. There is up to 16 different RACH configurations, allowing from 1 to 10 RACH resources to be mapped in a frame in time. The case of 10, with one RACH resource in each subframe, is designed for situations in which the RACH load is high. The LTE Random Access procedure, which is initiated by the UE, is based on the transmission of short preambles that contain one signature selected randomly from a pool of 64 available signatures. This procedure is performed in two steps, which are depicted in Figure 2. In the first step, a signature is randomly chosen from the pool of available signatures and a preamble packet is transmitted on one of the RACH resources. Upon reception of a preamble, the enodeb generates a reply message known as Random Access Response (RAR), which includes the signature used in the preamble that originated the RAR. In case of a collision detected by the enodeb or unavailability of radio resources, the enodeb includes a field in the RAR packet instructing the UE to backoff for a randomly generated number of frames. The mobile terminal expects to receive the RAR message within a pre-defined time window. If no response is received, the preamble is retransmitted after a minimum time of 3ms. The preamble message does not encode any information, so it has a 0 bit payload. It is built with prime-length Zadoff- Chu sequences, allowing for improved preamble detection performance. The RAR is a 56 bit packet that contains a series of fields: the id of the time-frequency slot where the preamble was received, the signature used in the preamble, a Time Advance (TA) instruction (for UL synchronization) and an initial UL resource grant. The RAR also includes the assignment of an arbitrary 16 bit network temporary id for the UE, known as Radio Network Temporary Identifier (RNTI). Figure 2 includes a real capture of the Random Access procedure between a smartphone and an Ericsson commercial lab enodeb. The capture was obtained with an off-the-shelf

3 Sanjole WaveJudge-Intelijudge 4900 LTE traffic sniffer [17]. All the traffic captures presented in this manuscript have been obtained with the same tool. B. Initial attach and RRC state transitions After the Random Access procedure, a Radio Resource Control (RRC) connection is set up, with a number of messages being exchanged between the enodeb and the UE. If the UE is connecting for the first time, the identity and authentication procedures are executed. At this stage, a pointto-point bearer through the EPC is set up, and the UE s RRC connection is reconfigured according to the type of IP service and Quality of Service (QoS) requested. The scarcity of spectrum and radio resources results in strict resource management policies. Whenever a UE has been observed as idle by the enodeb for more than a few seconds (often between 10 and 15 seconds), the RRC connection for this UE is released and its associated radio resources freed to be reused by other UEs [18]. Although just one message from the enodeb to the UE is sufficient to transition it down to an idle RRC state, each idle-connected and connected-idle transition involves a substantial amount of control plane signaling, with a large number of messages within the EPC. III. SCALABILITY AND IMPACT OF M2M/IOT ON MOBILE NETWORKS The emergence of the IoT has a direct impact on the signaling load in the EPC. Certain features of the mobile core should be considered before deploying wireless embedded appliances that make use of packet services. Each individual traffic flow between a UE and an external host often results in control plane signaling to transition between RRC states. It is widely acknowledged that unnecessary signaling traffic could potentially overburden the core network, and researchers have theoretized that this could be leveraged in security attacks [20]. The negative consequences of a signaling overload in a mobile network were already observed in the wild [11] [13], [21] [23]. Such a large amount of known instances of signaling storms in the wild are a clear motivation to design new transmission techniques that require no control plane signaling. In this regard, the expected surge of such signaling due to expansion of M2M systems is acknowledged as a potential threat against LTE [14]. Consequently, the mobility network utilization should be optimized in order to minimize the ratio of signaling load per user data traffic. There is also a growing interest in the research community on the impact of the surge of the IoT on LTE. For example, the authors of [8] presented insights on such impact with a simulation study. Similarly, [24] introduces a performance study of LTE under M2M traffic load, concluding that a large number of low throughput devices could potentially induce the most negative effects. This correlates with the observations in [7], which presented the first analysis of M2M traffic over mobile networks and identified certain low throughput devices that induce large amounts of state transition. Similar results are presented in [10]. In parallel, extensive research aims to design new network mechanisms to efficiently handle the surge of cellular traffic originated from the IoT. In [25] and [26], new congestion control techniques for M2M LTE traffic are proposed. Fig. 2. C. Paging LTE Random Access procedure and capture from a real network Paging is the process used to initiate a mobile terminated connection and to trigger, from the network side, the idleto-connected state transition. Whenever there is an incoming communication addressed to a UE, the network must determine in which cell this user is located. If this location were known a priori, a mobile terminal would have to update its location with the network - a costly operation - each time it moved to a new cell. In order to reduce the load of location update signaling, the location of each UE is only known with a much larger granularity, known as the Tracking Area (TA). Upon receiving incoming traffic for UE j that is in idle state, the EPC triggers the broadcast of a paging message over each cell within the TA where UE j is known to be [19]. The mobile terminal replies to the paging message, disclosing its precise location in terms of cell or sector and triggers the establishment of a bearer by initiating a Random Access procedure. IV. CONNECTION-LESS IOT COMMUNICATIONS OVER LTE MOBILE NETWORKS This paper introduces a novel connection-less communication protocol for IoT devices over LTE mobile networks which requires no control plane signaling at the EPC. This technique is specifically designed for M2M embedded devices with low throughput and delay tolerant traffic, which often are the worst case scenario in terms of signaling load at the EPC. For example, a security camera reporting a picture every 5 minutes induces two RRC state transitions (idle-to-connected and connected-to-idle) every five minutes. In order to achieve the zero signaling goal, connection-less communication maps user data on the initial handshake messages between the UE and the enb. These are the messages exchanged until the Attach Request message from the UE, embedded within the RRCConnectionSetupComplete message, triggers the control plane signaling at the EPC [18]. To illustrate this message handshake, Figure 3 (a) plots the LTE attach procedure as defined by the 3GPP standards. Note that, in order to simplify the figure, certain handshakes are bundled into a single arrow. For the case of the RACH procedure and the RRC connection between the UE and enb, Figure 3 (b)

4 presents a real capture of the individual messages involved in both handshakes. One can observe the Attach Request message included within the RRCConnectionSetupComplete UL packet. (a) (b) Fig. 3. NAS attach procedure: a) control plane signaling and b) real capture of the initial UE-eNB handshake (RACH+RRC) Another goal of the connection-less protocol is a fully standards compliant design, requiring no standard modifications to operate. In this regard, the protocol embeds itself in the 3GPP standards, though requiring custom cellular modems for the IoT devices and a new software functionality at the enb. A. Uplink traffic An IoT device communicating over a connection-less link maps its UL traffic on the RACH preambles. The choice of a given signature from a pool of 64 signatures results in encoding 6 bits of information. Assuming a number k of RACH resources mapped on each 10ms LTE frame, the total throughput available to be shared by all IoT devices would k 6 be of 0.01 bits per second. This capacity would also have to be shared with the actual RACH preambles transmitted by smartphones and other mobile devices in the context of the Random Access procedure. Section IV-D discusses how this will not be a problem, as the RACH load is very low even in an urban densely populated area. The RACH can be mapped in 16 different configurations, with k ranging from 1 to 10, being 10 the case where there is a RACH resource allocated in every subframe [27]. In the frequency domain, studies demonstrate that the optimal preamble detection performance at the enb is with preamble signals of 6 and 12 RBs BW, which corresponds to 1.08MHz and 2.16MHz respectively [15]. Therefore, one can theoretically map up to 8 RACH resources in frequency within a 10MHz frame [27]. However, a configuration with multiple simultaneous RACH Fig. 4. LTE Random Access Time Advance measurement and transmission of two preambles within one subframe resources in frequency is not recommended in order to avoid processing spikes at the enb, which would have to detect and decode multiple preamble signals simultaneously. Based on this, the range of possible values for k is k = 1,..., Note that the case of k = 80 implies that the entire frame is devoted to the transmission of preambles, with no room for actual data transmission. This case would only make sense in the scenario of an enb exclusively dedicated to connectionless traffic, perhaps covering an indoors warehouse or other area with no smartphone traffic. Note also that k = 80 would also result in processing spikes. Assuming a collision probability of p UE collision = 1% (which includes RACH collisions, decoding errors, etc), k = 10 RACH frequency-time resources per frame and 64 signatures, the RACH can process a load of up to RRACH max = ln(1 p UE collision ) = preambles per frame. This results in a maximum connection-less UL traffic capacity of RUL max = = 3.86kbps. Note that this raw maximum capacity would be shared among all the connection-less IoT devices within the cell. The RACH resources are also shared with the preamble traffic from smartphones and other connected devices communicating normally over LTE. The capacity for UL connection-less traffic can potentially be enhanced in a number of ways. The most basic one is increasing the number of RACH resources per frame. In parallel, multiple preambles could potentially be received by the enb within a RACH slot. The duration of a preamble signal is substantially shorter than the actual slot it is transmitted in, preventing the propagation delay from resulting in collision with the next slot 1. Therefore, a smart scheduler could allow two or more IoT devices to transmit a preamble within the same slot if they were at sufficiently dissimilar distances from the enb, such as in the scenario depicted in Figure 4. B. Downlink traffic DL traffic is transmitted as a response to a given UL communication from an IoT connection-less device or as network initiated DL traffic. Either way, the data is encoded in the RNTI field. This arbitrary id, not necessary in connectionless mode, allows encoding 16 bits of DL traffic in each RAR message. Independently of whether there are collisions or decoding errors at the RACH, this channel is designed in such a way that a RAR message can be transmitted in the DL upon reception of a preamble in a given RACH slot. Therefore, the maximum number of RAR messages that can be transmitted per frame is one per each RACH resource mapped on the LTE frame [15]. Assuming the same configuration as in Section IV-A, with 10 RACH resources assigned per frame, the maximum throughput 1 Note that the UE is not yet UL synchronized at the time of the RACH preamble transmission [15].

5 that can be delivered to connection-less devices in the DL is RDL max = = 16kbps. As with the UL capacity, this link raw throughput is to be shared among all connection-less IoT devices within the cell plus the RAR messages transmitted to regular mobile devices. Results on the investigation of this background RACH load are discussed in Section IV-D. A potential way to enhance the DL throughput leverages the fact that the TA field in the RAR message is not necessary for connection-less devices, as these do not require UL synchronization to encode and transmit data. Therefore, the enb can encode further data in this 11 bit field, achieving a maximum DL throughput of 10 (16+11) 0.01 = 27kbps. Alternatively, a portion of the 11 bit TA field could be used as a destination id field, such that the intended IoT device can identify its corresponding DL traffic. Given the design and transmission characteristics of the RACH, it is possible to correctly decode multiple preambles within a single slot, either due to different signatures or sufficiently dissimilar propagation delays. In the case of connection-less DL traffic transmitted as a response to UL traffic, all the colliding UEs would receive the same RAR message. By means of checking the signature encoded in one of the fields in the RAR, the intended recipient would be identified and the other UEs would discard the message. If two or more UEs had selected the same signature, though, this would result in a collision that should be detected and resolved at higher layers or with the aforementioned destination id field encoded in part or the totality of the 11 bit TA field. Section IV-E discusses some potential system enhancements to resolve such collisions. C. Connection-less mode initiation In order to be able to transmit data on a connectionless link, both the UE and the enb have to perform a handshake such that both parties know that UL and DL data will be encoded in the preamble signatures and the RNTI field, respectively. This handshake should be designed such that it can be triggered by the UE (mobile originated traffic) and by the enb (mobile terminated traffic). Fig. 5. bits LTE paging message captured from a real network with 3 padding In the event of a burst of mobile terminated traffic, the enb triggers the activation of the connection-less mode by means of a Paging message. This type of message includes a tail of 3 padding bits, which are always set to zero. A capture of a real paging message from an LTE network is displayed in Figure 5, with the 3 padding bits set to 0 highlighted. Without disrupting the operation and communication of regular LTE mobile devices, the enb encodes in those 3 bits the instruction to activate the connection-less mode. In that case, the TMSI (Temporary Mobile Subscriber Identity) field in the Paging message would correspond to a device specific id assigned to each connection-less embedded device. The capacity of the PCH (Paging Channel) is shared for both connection-less IoT appliances and regulat LTE mobile devices camped on the same cell. The experiments in Section IV-D indicate that the current load in the PCH is low enough to allow mapping the trigger for a connection-less mobile terminated flow. In the event of a mobile initiated flow of data, the UE initiates the connection-less mode. The simplicity of the preamble message makes such action very complex. Nevertheless, it is very important to be able to trigger connection-less communication from the UE because this is the predominant traffic flow direction of many delay tolerant and low throughput M2M applications [7]. This is the case of, for example, security cameras and alarms reporting periodically. The simplest method to initiate an UL connection-less flow is to reserve one of the 64 RACH signatures to this end. This would result in marginal deterioration of the maximum UL throughput capacity. In the event of a regular LTE terminal transmitting a preamble with the reserved signature, the enb would process it as both regular and connection-less preamble, responding with a RAR message to the former. In the case of a regular LTE device, the UL RRCConnectionRequest message would indicate the enb that it was indeed a regular preamble. The absence of such message would indicate the opposite. An alternative to trigger the connection-less mode would be to define a sequence of M signatures S = [s 1, s 2, s M ] : s i {64RACHsignatures}. The transmission of M preambles in contiguous frames, with its signatures corresponding to sequence S would indicate to the enb the beginning of an UL connection-less flow. D. LTE mobile background traffic at the RACH and paging channels As discussed in the previous subsections, the messages leveraged in connection-less data transmission (RACH preambles, RARs and paging messages) share the same resources as very important control channels of the LTE PHY layer. In order to assess the feasibility of a connection-less link, one should investigate the load in these channels in current LTE mobile networks. A 30 minute over the air capture of real LTE traffic was taken on Friday October 24th 2014 during lunch break. The capture was taken at a busy intersection in downtown Manhattan, one of the most densely populated areas in the US. Traffic for two cells was captured. It is important to explicitly highlight that all traffic over the LTE air interface is encrypted, so no user data communication can be extracted from the traffic capture. Moreover, specific filters were applied to the capture such that only signaling plane messages were recorded. RACH preambles, RAR messages and paging traffic were analyzed individually. In the case of RACH preambles and

6 their corresponding RAR responses, both slots and signatures were checked in order to identify any potential collisions. The results can be summarized as follows: RACH load: The Random Access traffic per cell is very low, with an absence of RACH traffic in most frames and, at most, one preamble attempt per frame. Utilizing basic statistical tools, the RACH load was approximated and modeled as a Bernoulli random variable with parameter p = (probability of having one preamble in one 10ms frame). Random Access Responses: Given the low RACH load, only one RAR response per preamble was observed, resulting in the same number and frequency of RAR DL messages as RACH preamble attempts in the UL. Paging: An average of 2.55 paging messages per second are observed, which results in paging messages per frame. Based on these results, one can observe that the traffic load on both the RACH and PCH is very low, even in a highly densely populated area during a time of the day, lunch break, when users commonly check social networks, read news and overall generate a spike in mobile network traffic. This supports the feasibility of deploying connection-less links overlayed on current LTE deployments without noticeably affecting the background RACH and paging traffic from the LTE network. E. System enhancements and limitations It is imperative that the enb always gives absolute priority to regular LTE traffic on the RACH and the paging channels. Therefore, the start of a DL connection-less flow, triggered by a Paging message, would be deferred until there was no regular paging messages in queue to be transmitted. Given the paging load observed in Section IV-D, the latency this would introduce would be marginal, with no impact to the delay tolerant connection-less traffic. DL RAR messages, which transport DL connection-less traffic, can also be used to acknowledge (ACK) UL messages. For example, out of the 16 bits of data that can be encoded in the RNTI field, a number of bits could be used to transmit a hash of the 6 bits transmitted in the UL. Alternatively, the ACK bits could be encoded in the 11 bit TA command of the RAR, which is not necessary in connection-less mode. Either way, the enb shall not transmit a connection-less ACK in the corresponding DL resource to the RACH slot in which a regular LTE RACH preamble was received. The system gives priority to the Random Access RAR messages sent to standard LTE mobile devices. In the event of multiple preambles transmitted in the same RACH slot from different connection-less IoT devices, a collision could not be resolved if two or more preambles had the same signature. The weighting of the TA command as ACK message provides a method for such collision resolution. The 3 unused padding bits of the Paging message allow for up to 8 different connection-less modes. The connection-less mode defines the amount of RACH slots per frame a flow will attempt to utilize. A connection-less link might be configured to map data on, for example, just one RACH slot per frame or only in odd numbered frames. This would result a lower load on the RACH and less collisions at the cost of a lower traffic throughput. It would also allow to synchronize connection-less traffic from multiple devices. This new PHY layer method for data communication is mainly designed and intended for very low throughput and delay-tolerant IoT applications. Connection-less links could theoretically also be used for high throughput IoT applications and even to provide a link for smartphones similar to that of the Universal Mobile Telecommunications System (UMTS) Cell-FACH RRC state [28]. This option is not recommended, though, due to the high load the connection-less traffic would induce on essential LTE PHY control channels, which could result in service deterioration for regular mobile devices. In this regard, there are certain key security and implementation considerations that should be considered, which will be discussed in Section VI. A further limitation of connection-less links is that, as an alternative layer 1 transmission protocol, it bypasses all the higher layer LTE protocols, thus not providing the means for seamless mobility. This technology is therefore only intended for non-mobile applications. F. End-to-end architecture Connection-less IoT communications are only intended to provide a layer 1 link between M2M devices and LTE base stations with a PHY architecture that does not impact the standardized LTE PHY. As such, this new type of connection provides a narrow slotted-aloha access link at each enb. In order to interface this technology to the layer 3 Packet Data Network (PDN), two alternatives are proposed. On one hand, the enb can be securely directly interfaced with the PDN such that connection-less traffic is directly forwarded to the Internet. This option, although feasible, is not recommended due to its scalability challenges. In order to ensure a secure connection, each enb should be equipped with a secure gateway which implemented several security functions, such as the firewall functionality, as opposed to the current network-based implementation of security functions. On the other hand, the current EPC could alternatively set and maintain a perpetual bearer between the enb and the P- GW. All the connection-less traffic originating at or terminating at M2M connected devices camped on a given cell would then be routed through that always-on bearer to the P-GW, where firewall, NAT (Network Address Translation) and other security functions are executed in a standard LTE architecture. V. EXPERIMENTAL RESULTS In order to assess the feasibility of the proposed protocol, two system models of a connection-less link have been built in Python and on the OPNET Modeler network simulation tool [29]. The simulation scenario consists of one 10MHz LTE enb. A variable number k of RACH resources is mapped on each frame, with k ranging from 1 to 20. The special case of a dedicated connection-less cell with N = 80 is also simulated. In the simulation, a number N of M2M devices is camped on the cell with a constant flow of UL traffic reaching their modem. Each M2M device attempts the transmission of one

7 preamble in each frame. In the DL, a constant flux of traffic per UE is assumed as well, mapping data on the RAR messages sent to ACK UL packets. Thus, a maximum of one DL packet per UE per frame is transmitted. In order to provide realistic results, a background RACH, RAR and paging load is added to the simulation. This background load is modeled from the same 30 minute over the air capture of real LTE traffic described in Section IV-D. Note that this is the network load seen during lunch break on a weekday on a busy intersection in downtown Manhattan. Simulations are also run for the case of a RACH and PCH load 10 times higher to the one observed in downtown Manhattan. 20 repetitions of each simulation are run and their results averaged. Fig. 6. UL and DL connection-less throughput with different RACH resource allocations in the LTE frame Figure 6 plots the raw throughput, both in the UL and the DL, for three different configurations of the RACH resources mapped in an LTE frame (k). The third case, with k = 80 RACH resources within a 10MHz frame, is the case of a fully connection-less dedicated cell. As expected, the contentionbased nature of the connection-less link results in a substantial deterioration of the throughput as the load increases. Note that this deterioration would also severely tamper the performance of the regular LTE network. Based on the results, and assuming a controlled deployment with no malicious or misbehaving IoT devices, 20 to 30 IoT devices could be deployed within a cell without impact on regular LTE traffic and a maximum UL throughput of about 4kbps to 8kbps, which corresponds with the derivations in Section IV-A. Though small, this number of connected devices would be sufficient for typical M2M applications, such as security cameras and remote alarms in a office/warehouse facility or commercial mall under the coverage of a couple of cells. A connection-less dedicated enb could host around 120 embedded devices. This could be the case of dedicated LTE small-cells deployed throughout the warehouse with a very dense deployment of M2M devices. The next step of this analysis is to determine the connection-less achievable throughput reduction due to the LTE background load at the RACH. This is investigated in Figure 7, which plots the throughput with a configuration of 10 RACH resources per frame. Results are collected in the event of no background load, with the aforementioned downtown Manhattan load and, finally, with a hypothetical load 10 times higher. Fig. 7. load UL and DL connection-less throughput with background LTE RACH The results indicate that the RACH background load of one of the most highly densely populated areas in the US would not impact the performance of a connection-less link. As a result, assuming a controlled M2M deployment and absence of adversarial UEs, the impact of the connection-less link on regular LTE communications would be almost null. In the hypothetical case of a RACH background load 10 times more intense than downtown Manhattan, the connection-less data throughput would be potentially degraded by 5% in the DL and 4% in the UL. In this scenario, both the cellular operator and the M2M service provider should carefully plan and deploy the connection-less UEs in order to prevent deterioration of the LTE performance in that cell. One could argue, though, that a 10MHz cell with 10 times more users than downtown Manhattan would not be a hot-spot of high QoS without the overlay of connection-less devices anyways. A potential way to reduce the impact of a connectionless link to the QoS of regular LTE users is to reserve a number of RACH resources for each type of traffic. With a 20 RACH resources mapped fer frame, simulations were run to compare the performance of the system leveraging all the RACH slots and the case where 50% of the slots are used for LTE traffic and the rest for connection-less communication. In this configuration, there would be no impact of the connectionless traffic on the operation of regular LTE devices, at the expense of less RACH resources for both system. The results, summarized in Figure 8, indicate an expected decrease in throughput and capacity for M2M devices. The maximum achievable throughput decreases by over 50% due to the 50% decrease in RACH slots for traffic plus the increase in collisions between connection-less preambles. Despite this decrease in throughput, the system is still able to efficiently operate about 66% of the M2M population. The decrease in capacity for regular LTE RACH traffic is out of the scope of this analysis, but the notably low load of preambles and RAR messages seen in the wild in very dense areas indicates that the impact would be marginal. Finally, we aim to investigate the impact of connectionless traffic on the Random Access procedure of LTE devices. To this end, we implement a complete simulation of an enodeb and its RACH channel. A series of regular LTE mobile devices connect and communicate with this enb, generating the same RACH load as extracted from the over

8 collisions is very low. As a result, given that the network would always give priority to LTE RACH traffic, the impact of connection-less links on the LTE RACH performance would be close to zero. Fig. 8. UL and DL connection-less throughput analysis when reserving RACH slots the air capture analyzed in Section IV-D. A variable number of connection-less devices is overlayed, with the same constant traffic pattern implemented in the previous results. Two types of collision are defined. A recoverable collision occurs when an LTE RACH preamble is sent in the same RACH resource as any connection-less UL message. Despite the collision, the different signature in the LTE RACH preamble allows the enb to decode it and reply with the appropriate RAR message. A non-recoverable collision is defined as a recoverable collision with the addition that the LTE preamble selects the same signature as any of the connection-less UL messages it collides with. In this case, the enb will not be able to decode the LTE preamble, resulting in a small negative contribution on the network access latency of LTE users. Fig. 9. traffic Collisions in standard RACH traffic due to M2M connection-less Figure 9 plots the average percentage of both types of collision. The results indicate that, although the optimal size of an M2M connection-less deployment (as determined from Figure 6) would result in about 50% of recoverable collisions, the amount of non-recoverable collisions is close to zero. This result is intuitive as non-recoverable collisions would occur only in the event that a connection-less preamble matched in RACH resource and signature with an LTE preamble. Given the very low load of LTE RACH preambles observed in downtown Manhattan, the probability of non-recoverable VI. SECURITY AND IMPLEMENTATION CONSIDERATIONS Despite the potential functionality and results of connection-less links for IoT low throughput delay tolerant traffic over LTE links, there are several important aspects to consider. As a basic layer 1 data transmission protocol, this technology does not provide any means for authentication and encryption. This functionality, commonly implemented at the LTE Mobility Management Entity (MME) and the Home Subscriber Server (HSS), is bypassed in a connection-less system. Therefore, both authentication and encryption should be managed at upper layers. A service provider deploying a new connection-less-based IoT system must implement traffic encryption to prevent an attacker to eavesdrop the data traffic. Mutual authentication must also be explicitly implemented in order to prevent Man in the Middle (MitM) attacks. With a partnership with the cellular network operator, service providers could implement authentication and encryption at the enb. This would require substantial changes at the enb, though, plus M2M service and subscriber provisioning at the base stations, which could be complex. Either way, it is important to note that such explicit encryption and authentication overhead will reduce the maximum achievable throughput for the connection-less data channel. The main challenge of the proposed protocol is to minimize its impact on the regular operation of LTE terminals. A connection-less UE modem wil inject load on the LTE RACH channel in order to establish a data link. Although careful planning and a controlled number of IoT devices per cell will keep the RACH load under control, both the M2M Original Equipment Manufacturer (OEM) and the cellular operator must enforce strict policies to prevent the radio access to be overloaded. The saturation of the RACH channel has been proven to result in a total denial of service for the overloaded cell [30]. At the protocol layer, a number of resources can be applied to prevent saturation of the RACH. For example, a number of signatures can be reserved for regular LTE traffic. Importing RACH load control techniques from UMTS, a persistency probability p can be defined, such as that a connection-less IoT device with data to transmit will send a preamble in a given frame with probability p. With probability 1 p, transmission will be deferred to the next frame. A further layer of protection is necessary as there are known instances of attacks which, by interacting with the modem s drivers or firmware, implement protocol misbehavior in CSMA-like access networks [31]. Connection-less M2M devices should be hardware (HW) limited such that the interference with LTE RACH traffic is minimized. For example, the Radio Frequency (RF) front end of such devices could be designed such that the effective BW of the device is only 1.5MHz to 3MHz, thus preventing M2M nodes from injecting load in the RACH resources mapped in the outermost RBs of the frame. As with the connection-less protocol schemes to

9 throttle RACH load, the RF BW reduction would come at the cost of reduced maximum achievable throughput. Despite the aforementioned security considerations, connection-less links should still be carefully planned and deployed. VII. CONCLUSIONS Given the expected surge in IoT devices, there is an ongoing concern in the industry regarding the potential impact that billions of embedded devices will have on modern LTE mobile networks. The traffic characteristics of many types of M2M systems are acknowledged to exacerbate the inefficiencies of the bearer-based architecture of the mobile core architecture. As a result, there is a notable risk of potential signaling storms that could severely impact the performance of the network. Although there are ongoing standardization efforts proposing means to mitigate such threats, there is a growing need to provide connectivity to M2M devices over mobile networks without requiring expensive signaling traffic among the cellular core nodes. This paper has proposed and analyzed a novel technique to provide a small slotted ALOHA-like communication link embedded within each LTE enb, providing the means for connection-less communications for IoT devices. This new type of wireless link is designed for low throughput delay tolerant IoT applications, which are often the least efficient in terms of the ratio of signaling traffic load to actual data traffic. This new technology leverages certain PHY layer LTE channels to embed both UL and DL data traffic within the initial handshake of mobile devices with the enb, resulting in no control plane signaling at the EPC. Over the air captures of real LTE traffic in one of the most densely populated regions in the US (downtown Manhattan) indicated that the current load of such channels is very low. Therefore, although the proposed system adds load to essential LTE control channels, there is plenty of room for a connection-less link with no impact to regular LTE traffic. Realistic simulation results, including the background load observed in a real LTE network, evidence the feasibility of the proposed technique. A connection-less link could potentially provide, under a typical RACH configuration as defined by the 3GPP standards, a maximum achievable throughput of about 4kbps in the UL and 9kbps in the DL. The analysis herein presented show that the impact a connection-less link would have on current LTE networks would be marginal, while the potential benefits are substantial. REFERENCES [1] A. Iera, C. Floerkemeier, J. Mitsugi, and G. Morabito, Special Issue on the Internet of Things, in IEEE Wireless Communications, vol. 17, December 2010, pp [2] More than 50 billion connected devices, Ericsson, Ericsson White Paper, February 2011, [3] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, M2M: From mobile to embedded internet, Communications Magazine, IEEE, vol. 49, no. 4, pp , april [4] D. Lewis, Closing in on the Future With 4G LTE and M2M, Verizon Wireless News Center, September 2012, [5] Sierra Wireless invests in LTE-M future for lower power and better coverage in the Internet of Things, M2M NOW, July 2014, gl/nfs33w. [6] M2M Industry Faces Call to Action with 2G GSM Sunset, Aeris, January 2014, [7] M. Shafiq, L. Ji, A. Liu, J. Pang, and J. Wang, Large-scale measurement and characterization of cellular machine-to-machine traffic, Networking, IEEE/ACM Transactions on, vol. 21, no. 6, pp , December [8] T. Petsch, S. Khan Marwat, Y. Zakit, and C. Gorg, Influence of Future M2M Communication on the LTE system, in Wireless and Mobile Networking Conference (WMNC), th Joint IFIP. IEEE, 2013, pp [9] A. Prasad, 3GPP SAE-LTE Security, in NIKSUN WWSMC, July [10] M. Jaber, N. Kouzayha, Z. Dawy, and A. Kayssi, On cellular network planning and operation with m2m signalling and security considerations, in Communications Workshops (ICC), 2014 IEEE International Conference on. IEEE, 2014, pp [11] M. Dano, The Android IM app that brought T-Mobile s network to its knees, Fierce Wireless, October 2010, [12] C. Gabriel, DoCoMo demands Google s help with signalling storm, Rethink Wireless, January 2012, [13] Signal storm caused Telenor outages, Norway News in English, June 2011, [14] 3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects, Study on Core Network Overload and Solutions. 3GPP TR , vol. v0.7.0, [15] S. Sesia, M. Baker, and I. Toufik, LTE, The UMTS Long Term Evolution: From Theory to Practice. Wiley, [16] 3rd Generation Partnership Project; Technical Specification Group Radio Access Network, Physical layer aspects for Evolved Universal Terrestrial Radio Access (UTRA). 3GPP TR , vol. v7.1.0, [17] Sanjole, WaveJudge 4900A LTE analyzer, [18] 3rd Generation Partnership Project; Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E- UTRA) - Radio Resource Control (RRC) - Protocol Specification. 3GPP TS , vol. v8.20.0, [19], Evolved Universal Terrestrial Radio Access (E-UTRA) - User Equipment (UE) procedures in idle mode. 3GPP TS , vol. v9.11.0, [20] P. Lee, T. Bu, and T. Woo, On the Detection of Signaling DoS Attacks on 3G Wireless Networks, in INFOCOM th IEEE International Conference on Computer Communications. IEEE, May [21] M. Donegan, Operators Urge Action Against Chatty Apps, Light Reading, September 2011, [22] S. Corner, Angry Birds + Android + ads = network overload, iwire, June 2011, [23] S. Decius, OTT service blackouts trigger signaling overload in mobile networks, Nokia Networks, September 2013, [24] C. Ide, B. Dusza, M. Putzke, C. Muller, and C. Wietfeld, Influence of M2M communication on the physical resource utilization of LTE, in Wireless Telecommunications Symposium (WTS), IEEE, 2012, pp [25] S. Duan, Congestion control for M2M communications in LTE networks, University of British Columbia, [26] S.-Y. Lien and K.-C. Chen, Massive Access Management for QoS Guarantees in 3GPP Machine-to-Machine Communications, Communications Letters, IEEE, vol. 15, no. 3, pp , March [27] 3rd Generation Partnership Project; Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Physical channels and modulation. 3GPP TS , vol. v10.3.0, [28] H. Holma and A. Toskala, HSDPA/HSUPA for UMTS: high speed radio access for mobile communications. John Wiley & Sons, [29] OPNET Modeler, [30] D. Spaar, A practical DoS attack to the GSM network, in In DeepSec, 2009, [31] A. L. Toledo and X. Wang, Robust detection of mac layer denial-ofservice attacks in csma/ca wireless networks, Information Forensics and Security, IEEE Transactions on, vol. 3, no. 3, pp , 2008.

Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks

Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin and Salvatore Stolfo Department of Computer

More information

Security and impact of the IoT on LTE mobile networks

Security and impact of the IoT on LTE mobile networks BOOK CHAPTER - PRE-PRINT AUTHOR VERSION Security and impact of the IoT on LTE mobile networks Book: Security and Privacy in the Internet of Things (IoT): Models, Algorithms, and Implementations Taylor

More information

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:

More information

LTE Performance and Analysis using Atoll Simulation

LTE Performance and Analysis using Atoll Simulation IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation

More information

Throughput for TDD and FDD 4 G LTE Systems

Throughput for TDD and FDD 4 G LTE Systems Throughput for TDD and FDD 4 G LTE Systems Sonia Rathi, Nisha Malik, Nidhi Chahal, Sukhvinder Malik Abstract Long Term Evolution (LTE) has been designed to support only packet-switched services. It aims

More information

LTE Evolution for Cellular IoT Ericsson & NSN

LTE Evolution for Cellular IoT Ericsson & NSN LTE Evolution for Cellular IoT Ericsson & NSN LTE Evolution for Cellular IoT Overview and introduction White Paper on M2M is geared towards low cost M2M applications Utility (electricity/gas/water) metering

More information

End to End Delay Performance Evaluation for VoIP in the LTE Network

End to End Delay Performance Evaluation for VoIP in the LTE Network ENSC 427 COMMUNICATION NETWORKS SPRING 2013 Final Project Presentation End to End Delay Performance Evaluation for VoIP in the LTE Network Dai, Hongxin Ishita, Farah Lo, Hao Hua danield @ sfu.ca fishita

More information

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan

More information

Protocol Signaling Procedures in LTE

Protocol Signaling Procedures in LTE White Paper Protocol Signaling Procedures in LTE By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer Overview The exploding growth of the internet and associated services has fueled

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: Cellular Overview: 3G and 4G http://lyle.smu.edu/~skangude/eets8316.html Dr. Shantanu Kangude skangude@lyle.smu.edu Third Generation Systems High-speed wireless

More information

Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE

Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE S. Saha * and R. Quazi ** * Helsinki University of Technology, Helsinki, Finland ** University of Dhaka, Dhaka, Bangladesh

More information

Architecture Overview NCHU CSE LTE - 1

Architecture Overview NCHU CSE LTE - 1 Architecture Overview NCHU CSE LTE - 1 System Architecture Evolution (SAE) Packet core networks are also evolving to the flat System Architecture Evolution (SAE) architecture. This new architecture optimizes

More information

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab. How to deal with a thousand nodes: M2M communication over cellular networks A. Maeder NEC Laboratories Europe andreas.maeder@neclab.eu Outline Introduction to M2M communications The M2M use case landscape

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

3GPP Technologies: Load Balancing Algorithm and InterNetworking

3GPP Technologies: Load Balancing Algorithm and InterNetworking 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology 3GPP Technologies: Load Balancing Algorithm and InterNetworking Belal Abuhaija Faculty of Computers

More information

Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks

Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number

More information

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015 ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits

More information

How To Protect Your Mobile From Attack From A Signalling Storm

How To Protect Your Mobile From Attack From A Signalling Storm ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem

More information

3GPP LTE Channels and MAC Layer

3GPP LTE Channels and MAC Layer 3GPP LTE s and MAC Layer 2009 Inc. All Rights Reserved. LTE MAC Layer Functions Mapping between Transparent and Logical s Error Correction Through Hybrid ARQ MAC Priority Handling with Dynamic Scheduling

More information

Inter-Cell Interference Coordination (ICIC) Technology

Inter-Cell Interference Coordination (ICIC) Technology Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit

More information

Temporal Load Balancing of Time-driven Machine Type Communications in Mobile Core Networks

Temporal Load Balancing of Time-driven Machine Type Communications in Mobile Core Networks Temporal Load Balancing of Time-driven Machine Type Communications in Mobile Core Networks Go Hasegawa Osaka University Osaka 560 0043, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp Takanori Iwai NEC Corporation

More information

LTE PHY Fundamentals Roger Piqueras Jover

LTE PHY Fundamentals Roger Piqueras Jover LTE PHY Fundamentals Roger Piqueras Jover DL Physical Channels - DL-SCH: The DownLink Shared CHannel is a channel used to transport down-link user data or Radio Resource Control (RRC) messages, as well

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Building Robust Signaling Networks

Building Robust Signaling Networks ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept

More information

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER Telesystem Innovations LTE in a Nutshell: Protocol Architecture WHITE PAPER PROTOCOL OVERVIEW This whitepaper presents an overview of the protocol stack for LTE with the intent to describe where important

More information

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols

More information

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Mobile Devices Security: Evolving Threat Profile of Mobile Networks Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications

More information

Get the best performance from your LTE Network with MOBIPASS

Get the best performance from your LTE Network with MOBIPASS Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network

More information

Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement

Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement Ngoc-Duy Nguyen and Christian Bonnet Department of Mobile Communications EURECOM Sophia Antipolis, France Email:

More information

Performance Comparison of Control-less Scheduling Policies for VoIP in LTE UL

Performance Comparison of Control-less Scheduling Policies for VoIP in LTE UL Performance Comparison of Control-less Scheduling Policies for VoIP in LTE UL Haiming Wang Nokia Device R&D/Wireless System Research Nokia (China) Investment Corporation Limited, 100176 Beijing, China

More information

Dynamic Access Class Barring for M2M Communications in LTE Networks

Dynamic Access Class Barring for M2M Communications in LTE Networks Dynamic Access Class Barring for 2 Communications in LTE Networks Suyang Duan, Vahid Shah-ansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering University of British Columbia,

More information

LTE Mobility Enhancements

LTE Mobility Enhancements Qualcomm Incorporated February 2010 Table of Contents [1] Introduction... 1 [2] LTE Release 8 Handover Procedures... 2 2.1 Backward Handover... 2 2.2 RLF Handover... 3 2.3 NAS Recovery... 5 [3] LTE Forward

More information

3GPP Wireless Standard

3GPP Wireless Standard 3GPP Wireless Standard Shishir Pandey School of Technology and Computer Science TIFR, Mumbai April 10, 2009 Shishir Pandey (TIFR) 3GPP Wireless Standard April 10, 2009 1 / 23 3GPP Overview 3GPP : 3rd Generation

More information

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07 Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements

More information

LTE Security How Good Is It?

LTE Security How Good Is It? LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Long Term Evolution - LTE. A short overview

Long Term Evolution - LTE. A short overview Long Term Evolution - LTE A short overview LTE Architecture 2 Conformance Test Suite Specification 3 GPP and ETSI product 3GPP TS 32.523-3 Evolved Universal Terrestrial Radio Access (E-UTRA) User Equipment

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam Cooperative Techniques in LTE- Advanced Networks Md Shamsul Alam Person-to-person communications Rich voice Video telephony, video conferencing SMS/MMS Content delivery Mobile TV High quality video streaming

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1.

Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1. TS 136 314 V11.1.0 (2013-02) Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1.0 Release 11) 1 TS 136 314 V11.1.0 (2013-02)

More information

Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions

Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions Roger Piqueras Jover AT&T Security Research Center New York, NY 10007 roger.jover@att.com Abstract Modern

More information

LTE protocol tests for IO(D)T and R&D using the R&S CMW500

LTE protocol tests for IO(D)T and R&D using the R&S CMW500 LTE protocol tests for IO(D)T and R&D using the R&S CMW500 The standardization of layer 3 signaling for the new UMTS long term evolution (LTE) standard is almost complete, and Rohde & Schwarz is ready

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Evolution of the Air Interface From 2G Through 4G and Beyond

Evolution of the Air Interface From 2G Through 4G and Beyond Evolution of the Air Interface From 2G Through 4G and Beyond Presentation to IEEE Ottawa Section / Alliance of IEEE Consultants Network (AICN) - 2nd May 2012 Frank Rayal BLiNQ Networks/ Telesystem Innovations

More information

NSN White paper February 2014. Nokia Solutions and Networks Smart Scheduler

NSN White paper February 2014. Nokia Solutions and Networks Smart Scheduler NSN White paper February 2014 Nokia Solutions and Networks Smart Scheduler CONTENTS 1. Introduction 3 2. Smart Scheduler Features and Benefits 4 3. Smart Scheduler wit Explicit Multi-Cell Coordination

More information

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network

More information

Potential of LTE for Machine-to-Machine Communication. Dr. Joachim Sachs Ericsson Research

Potential of LTE for Machine-to-Machine Communication. Dr. Joachim Sachs Ericsson Research Potential of LTE for Machine-to-Machine Communication Dr. Joachim Sachs Ericsson Research Outline Trend towards M2M communication What is the role of cellular communication Cellular M2M Communication Focus:

More information

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ] [ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

Enhancing the security of LTE networks against jamming attacks

Enhancing the security of LTE networks against jamming attacks Piqueras Jover et al. EURASIP Journal on Information Security 2014, 2014:7 RESEARCH Open Access Enhancing the security of LTE networks against jamming attacks Roger Piqueras Jover 1*, Joshua Lackey 1 and

More information

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System

More information

Downlink resource allocation algorithm: Quality of Service

Downlink resource allocation algorithm: Quality of Service International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

LTE security and protocol exploits

LTE security and protocol exploits LTE security and protocol exploits Roger Piqueras Jover Wireless Security Research Scientist Security Architecture Bloomberg LP ShmooCon January 2016 About me Wireless Security Researcher (aka Security

More information

LTE enhancements for Public Safety and Security communications to support Group Multimedia Communications

LTE enhancements for Public Safety and Security communications to support Group Multimedia Communications 1 LTE enhancements for Public Safety and Security communications to support Group Multimedia Communications Lorenzo Carlà, Romano Fantacci, Fellow, IEEE, Francesco Gei, Dania Marabissi, Senior Member,

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing

Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing Muhammad Tariq Afridi 1, Safdar Nawaz Khan Marwat 1, Yasir Mehmood 2, Jebran Khan 1, Carmelita Görg 2 1 Department of Computer

More information

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges

More information

Comparison of LTE and WiMAX on the Basis of Qualities

Comparison of LTE and WiMAX on the Basis of Qualities Comparison of LTE and WiMAX on the Basis of Qualities Poonam M.Bhagat, Prasad S.Halgaonkar, Vijay M.Wadhai Department of Computer Engg, MITCOE- Pune University, India Department of Computer Engg, MITCOE-

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: LTE Scheduling and DRX http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Scheduling & Rate Control Scheduler operation Signalling

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Nokia Siemens Networks LTE 1800 MHz Introducing LTE with maximum reuse of GSM assets

Nokia Siemens Networks LTE 1800 MHz Introducing LTE with maximum reuse of GSM assets Nokia Siemens Networks LTE 1800 MHz Introducing LTE with maximum reuse of GSM assets White paper Table of contents 1. Overview... 3 2. 1800 MHz spectrum... 3 3. Traffic Migration... 5 4. Deploying LTE-GSM

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012

More information

Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues

Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues Dennis Guster Statistics Department/MCS Program St. Cloud State University guster@mcs.stcloudstate.edu

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions

More information

Mobility Management. Sara Modarres Razavi

Mobility Management. Sara Modarres Razavi Mobility Management Sara Modarres Razavi Background BSc in Electrical Engineering (2000-2004), Ferdowsi University, Iran MSc in Hardware for Wireless Communications (2004-2006), Chalmers, Sweden PhD in

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]

192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] 192620010 Mobile & Wireless Networking Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] Geert Heijenk Outline of Lecture 5 Cellular Systems (UMTS / LTE) (1/2) q Evolution of cellular

More information

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

Nokia Siemens Networks Flexi Network Server

Nokia Siemens Networks Flexi Network Server Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted

More information

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM v. CDMA: Technical Comparison of M2M Technologies GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple

More information

1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7

1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview

More information

Seminar. Ausgewählte Kapitel der Nachrichtentechnik, WS 2009/2010. LTE: Der Mobilfunk der Zukunft. Random Access. Almamy Touray. 02.

Seminar. Ausgewählte Kapitel der Nachrichtentechnik, WS 2009/2010. LTE: Der Mobilfunk der Zukunft. Random Access. Almamy Touray. 02. Seminar Ausgewählte Kapitel der Nachrichtentechnik, WS 2009/2010 LTE: Der Mobilfunk der Zukunft Random Access Almamy Touray 02. December, 2009 Abstract An LTE User Equipment (UE) can only be scheduled

More information

Wireless & Mobile. Working Group

Wireless & Mobile. Working Group Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...

More information

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research

More information

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure GSM Channels Physical & Logical Channels Traffic and Control Mutltiframing Frame Structure Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Radio Interface The radio interface

More information

How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled

How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and

More information

Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul

Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul Michael Crosnier a b, Fabrice Planchou a, Riadh Dhaou b, André-Luc Beylot b a EADS Astrium, 31 avenue des cosmonautes,

More information

UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE)

UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE) UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE) Long Term Evolution of the 3GPP radio technology 3GPP work on the Evolution of the 3G Mobile System started with the RAN

More information

What is going on in Mobile Broadband Networks?

What is going on in Mobile Broadband Networks? Nokia Networks What is going on in Mobile Broadband Networks? Smartphone Traffic Analysis and Solutions White Paper Nokia Networks white paper What is going on in Mobile Broadband Networks? Contents Executive

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training

Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training Customer Training Catalog Training Programs Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training HUAWEI Learning Service 2015 COMMERCIAL IN CONFIDENCE 1 Customer Training Catalog

More information

An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink Yong-Seok Kim Abstract In this paper, an efficient scheduling scheme is proposed to increase the available

More information