Data Offload. Use Case. AWTG Limited 7th Floor, Westgate House, Westgate Road, London, W5 1YY. Tel , Fax
|
|
- Elmer Warren
- 7 years ago
- Views:
Transcription
1 Data Offload Use Case AWTG Limited 7th Floor, Westgate House, Westgate Road, London, W5 1YY. Tel , Fax Copyright AWTG Ltd Page 0 of 7 August 2013
2 Contents Executive Summary... 2 Introduction... 2 Use Case... 3 Objective & Scope of Work... 3 Demonstration and Results... 4 Step 1: 3G connectivity- EAP/AKA authentication:... 4 Step 2: WiFi connectivity- EAP/AKA and EAP-SIM authentication... 5 Step 3: 3G to WiFi handover, EAP-AKA authentication... 6 Step 4: WiFi to 3G handover, EAP-AKA authentication... 6 Conclusion... 7 Future work... 7 References... 7 Copyright AWTG Ltd Page 1 of 7 August 2013
3 Executive Summary WiFi enabled Smartphones, Tablets and Mobile Broadband enabled Laptops have led to an increased appetite for mobile data bandwidth hungry applications. Many of today s devices are dual mode, for example a 3G/LTE handset often has a WiFi chipset onboard. With the amount of cellular traffic being consumed by these Smart devices set to increase further, mobile operators are increasingly turning to WiFi as a complementary technology to work alongside traditional mobile access technologies. Data Offload Use Case Figure 2. Global Handset Data Traffic One of the available options for operators to answer the data hungry users is to offload 3G data to WiFi networks. There are different approaches for mobile operators to offload data onto WiFi and these approaches differ based on the level of integration of WiFi into the mobile core network, each approach gives the operator different levels of control over the subscriber. Figure 1. Wireless data traffic generated of out of home and place of work by network type, developed markets (Source :Analysis Manson 2013) With the rise in number of Carrier-class WiFi networks and the uptake of WiFi by mobile carriers as shown in Figure 1, it becomes extremely important to ensure that end user experience is not degraded when a mobile handset switches between access technologies. AWTG has carried out a 3G data offloading demonstration under lab conditions to study the results and challenges of seamless offloading, the demonstration was defined based on real life scenarios and used industrial standards as a basis. The network design and topology was based on Cisco and Ericsson solutions. Introduction During recent years, WiFi enabled Smart phones and Mobile Broadband enabled laptops have increased the data usage demand from bandwidth-hungry, real-time streaming video and data applications. This unexpected demand has increased the operator s network usage exponentially as shown in figure 2 whilst the operator s network was not fully ready to support the amount of requested data. In the integrated model proposed by 3GPP, WiFi is internetworked with the core mobile network through a bridge for controlling and managing the mobile data offloading. In this approach, operators can seamlessly move the mobile device from the cellular network to the WiFi network and seamlessly transfer the data through WiFi. However, this approach adds more complexity to the 3G/4G core network architecture in terms of mobile and WiFi network integration challenges. The offloading solution may also require access layer applications to be installed on handsets to make this technology available to more customers. There are already handsets on the market which can use 3G offloading solutions without additional applications on the client side, this can help operators connect these clients to their WiFi network seamlessly and offload data traffic to the WiFi. This model is called clientless offload solution. Clientless offload solutions provide operators with relatively quick solutions with low cost to their capacity issue by having solutions without heavy investment in complex integration level issues. Another advantage of this approach is that it does not require any special application running on the mobile devices to enable operators to define and enable QoS, security policies and accounting services. Copyright AWTG Ltd Page 2 of 7 August 2013
4 Use Case Objective & Scope of Work Data traffic has increased significantly on today s 3G network, this situation is not only creating the problem but also creating an opportunity for carriers. Providers are focusing on WiFi networks and using 3G data offloading solutions. 3G data offloading has numerous challenges. The demonstration has been defined to simulate a 3G data offloading solution based on the combination of Cisco (WiFi AP and ASR5K used as Gateway) and Ericsson (SGSN, HLR) hardware as shown in figure 3. The detailed scope of work for this document includes user authentication, testing both trusted and untrusted WiFi, clientless and client based and also seamless mobility for real time applications. There are various ways to authenticate and manage subscriber access to WiFi networks. Transparency in the authentication method could affect the subscriber confidence in the network, the more transparent the authentication method, the larger the probability that the subscriber will connect to the network. There are two different authentication methods, portal based authentication and EAP authentication. Portal based authentication is a complicated method which requires HTTP and layer-3 connectivity before the authentication process starts. The alternative way is EAP authentication which provides easy and transparent access. In this demonstration we simulate EAP authentication. EAP-AKA (EAP Authentication and Key Agreement) and EAP-SIM are two different standards used for the encapsulation, we test both EAP-AKA and EAP-SIM authentication with a WiFi Network. Another crucial challenge in 3G data offloading is the behaviour of near real time applications such as YouTube, FTP and real time applications such as VoIP and VPN during handover between 3G and WiFi, we go further and test seamless mobility for these near real time applications and Real Time applications for mobility between 3G and WiFi. Based on the defined scope of work we have set the objectives of the demonstration and track the results and also ensure that the chosen architecture and message flows to authenticate (using EAP-SIM and EAP-AKA) between the Mobile Packet Core and the WiFi Core are inline with the scope. Figure 3. Demonstration Topology User authentication is an important aspect in 3G data offloading, in the demonstration we capture and verify the message flows for authentication and mobility between 3G and WiFi networks. Untrusted WiFi networks were introduced in the early phase of WiFi specification in 3GPP release 6, access to these networks includes any type of WiFi access that is not controlled by the operator. Another scenario for untrusted access could be that the network might be under control of the operator but does not present a satisfactory level of security. Examples of Untrusted Access are Home WLAN and publically open hotspots. Trusted IP Access was introduced only with the LTE model in 3GPP release 8. Trusted WiFi Access refers to provider or mobile operator owned or controlled WiFi access providing over the air encryption and secure authentication methods. Mobile operators are not only focusing on deploying their own WiFi networks but also willing to expand their WiFi access via untrusted networks. In this demonstration we have set up the solution for both trusted and untrusted WiFi access and tested both clientless and client based solutions. We analyze a clientless solution to monitor its limitations in seamless mobility and then prove functions of a client based solution for seamless mobility. Various test scenarios are run to show that there is no impairment in user experience when the user moves between WiFi and the 3G Packet Core. The network used for the 3G offload solution simulation has been illustrated as below: Figure 4. Network layout used for the 3G offload simulation Copyright AWTG Ltd Page 3 of 7 August 2013
5 Lab Setup This section describes the devices, applications and protocols we have used to simulate 3G data offloading. Cisco Access Point Wireless LAN Controller Cisco ASR5K used as Gateway Ericsson SGSN Ericsson HLR GTP and Mobile IP protocols are used to maintain the IP address for UE when moving between technologies Both Trusted (VF-X1-TEST) and Untrusted WiFi (VF-X1- TTG) SSIDs configured in the lab WiFi network Four Samsung phones (UE) are used in this testing with SIM IDs of , 259, 260 and 267. These are configured on both 3G and WiFi core so that interworking can be tested. Third-Party client is used to test client based solution for seamless mobility. Test Execution Methodology To simulate 3G data offloading and the scenarios that we have discussed in this document, we have executed following test plan. To simulate the scenario we first turned off both WiFi and 3G on the UE and then whilst the WiFi was off we turned on 3G connectivity. Once the UE successfully connected to 3G we verified the IP address allocated to the UE from the GGSN/HA pool. After verification that the UE is connected to 3G we started an application under test for mobility from 3G to WiFi. While the application was running we turned on WiFi and verified that UE was connected to the WiFi network and received the IP allocated to the UE from the client pool and also that the application was not disrupted. We turned off the WiFi to move back to 3G and again confirmed the IP address allocation and checked the application status and confirmed that the application was not disrupted at this stage. Demonstration and Results The demonstration has been divided into four main steps as below: Step 1: 3G connectivity- EAP/AKA authentication: After setting up our lab we verified the 3G connectivity. We have the 3G network setup in the lab and verified connectivity by switching on the UE to get the coverage and network related configurations from the core network to establish the connection with the GGSN. Pre-Conditions Before we set up 3G connectivity we have to verify some settings which should be present in the UE. The APN for vzwinternet-wifi was configured on the Samsung Galaxy 3 phone with a 226 SIM. The SIM was also configured for EAP- AKA authentication. The 3G connectivity test was an important prerequisite for the 3G to WiFi offloading test. Execution Steps Ensuring that there is no data connection present at the UE, we monitored the activity on the GGSN to confirm that we are not receiving any PDP context requests. Then we switched on the 3G data connection and checked to see if the phone connects to the 3G UMTS network Results The 3G connectivity flow was as expected, Ericsson s SGSN received the data connectivity request and the SGSN communicated with the HLR to authenticate the subscribers from a 3G perspective. Once authentication was completed, the SGSN initiated a PDP context request to the ASR5K GGSN and in turn the GGSN accepted the request and sent PDP context response. The UE was assigned an address from the GGSN pool between ( ) stating IUCNAI for UMTS. We verified the address allocation on the ASR5k by issuing a "show subs all command. This info was stored in a log file for all the test cases. To summarise, the following steps were completed during the procedure: Turn off WiFi, attach the UE to the 3G network and start an application under test for mobility Check the IP address allocated to the UE from the GGSN/HA pool Turn on the WiFi and see that another IP address is allocated to the UE from the client pool Check that the application is not disrupted Move back to 3G and check that the earlier IP addresses are maintained and the application session is not disrupted Figure 5. UE assigned IP Address Call flows were verified using Wireshark traces stored during testing, as seen in figure 6 the successful RANAP attach and PDP context activation message goes to Cisco GGSN using GTP control messages. Copyright AWTG Ltd Page 4 of 7 August 2013
6 Figure 6. Wireshark Trace for PDP context request and response Step 2: WiFi connectivity- EAP/AKA and EAP-SIM authentication Results: Following on from the testing of 3G connectivity, we test WiFi connectivity. To simulate WiFi connectivity on the UE the WiFi network was switched on and the connection from UE to GGSN was traced and monitored. The connection was established after EAP authentication and IP addresses assigned from the client pool to the mobile wireless interface as can be seen in figure below. Figure 7. Wireshark Trace showing connection established and IP addresses assigned from the pool Copyright AWTG Ltd Document V 1.11 Page 5 of 7 August 2013
7 Step 3: 3G to WiFi handover, EAP-AKA authentication During this step the EAP-AKA authentication flow for 3G to WiFi handover was captured. To observe the impact on data services on the UE and also observe the packet flow of 3G to WiFi offloading we took following steps: Connect to 3G network Monitor EAP-AKA authentication Start ICMP traffic Switch on the WiFi Monitor WiFi Authentication Monitor effect on ICMP traffic Results: As expected, when we switched on the WiFi after initiating ICMP traffic while the 3G connection was established, the UE connects to WiFi by going through EAP-AKA authentication in the WiFi core. A GTP tunnel is established between the ewag and the Cisco GGSN. The UE is allocated another IP address from the client pool, we verify the address allocated to the handset by issuing the "show subs all command on the ASR5K, we note that the IP addresses are maintained from the previous addresses allocated when connected to 3G. This info is stored in the Log file for all the test cases. During the 3G handover to WiFi we found some ICMP traffic packets were lost. We use Wireshark traces to verify the call flows for GTP, IP and Radius messages stored in the file WiFi connectivity 226 Figure 8. Only four packets lost during 3G to WiFi handover Step 4: WiFi to 3G handover, EAP-AKA authentication In step 3, we monitored the packet flow and service impact of 3G to WiFi handover. In this step we observe the signalling flow of WiFi to 3G handover. To test WiFi to 3G handover we take the following steps. Ensure handset is connected to WiFi and 3G is also enabled. After verification of connectivity, verify that the handset is receiving an IP address from WiFi client IP Address pool. Initiate the ICMP traffic. Switch off WiFi and observed the packet flow and impact on ICMP traffic. Figure 9. WiFi to 3G handover flow Copyright AWTG Ltd Page 6 of 7 August 2013
8 Results: Results of WiFi to 3G handover were as expected, the UE connects to WiFi by going through EAP AKA authentication. A GTP tunnel is set between the SGSN and the CISCO GGSN and the UE gets another IP address from GGSN. We verified the address allocated to the UE by checking on GGSN and confirmed that the IP addresses are maintained from the previous address allocated when connected to 3G. This info is stored in the Log file for all the test cases also verify the call flows in the Wireshark traces for GTP, IP and Radius messages stored in the file. During the handover we found a small number of packets were lost. Only two packets were dropped during handover from WiFi to 3G. Conclusion The main aim of this demonstration was to test a 3G offloading solution based on Cisco s ASR5K solution in AWTG s lab and to study the challenges and observe the outcomes. AWTG s lab setup enabled us to replicate a 3G offloading scenario based on a multivendor network consisting of a combination of Cisco and Ericsson hardware. During these demonstrations we verified vendor claims and also tested connectivity and seamless handover between two technologies. We demonstrate that WiFi is inter-networked with the core mobile network through a bridge for controlling and managing the mobile data offloading. We showed that operators can seamlessly move the mobile device from the cellular network to the WiFi network and seamlessly transfer data through WiFi. The summary to take from these demonstrations and the related logs are: Successful end-to-end 3G network connectivity using Ericsson SGSN and HLR for authentication with UE address allocation from Cisco s GGSN. Successful WiFi network connectivity and IP address allocation using GTP and Mobile IP with Cisco GGSN/HA /FA whilst retaining IP address from 3G for mobility. When users move between 3G and WiFi, the IP addresses allocated to the handset by the network are maintained as users move between the technologies Figure 10. Wireshark Trace showing IP addresses are maintained The call flows on the 3G and WiFi technologies allow us to verify our network architecture and the expected messaging for RANAP, GTP, RADIUS and Mobile IP protocols. Future work AWTG constantly investigate future technologies to help our clients improve their offloading solutions and such we continue to develop more use cases in our lab covering the following bullets: Test untrusted WiFi offloading scenario which includes the TTG function and a client on the UE. Testing offloading while reducing the power of 3G or WiFi AP to force handover between 3G and WiFi rather than switching on/off Change the timer value for IP allocation on ASR5000 to study the impact on end user experience Testing trusted and untrusted scenarios with Ericsson GGSN to simulate a multivendor offload environment. Implement 4G to WiFi offload and test seamless mobility References Copyright AWTG Ltd Page 7 of 7 August 2013
3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationU.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD
U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationOracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure
Oracle s Secure HetNet Backhaul Solution A Solution Based on Oracle s Network Session Delivery and Control Infrastructure HetNets are a gradual evolution of cellular topology, not a distinct network unto
More informationALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE
ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports
More informationCellular Data Offload. And Extending Wi-Fi Coverage. With Devicescape Easy WiFi
Cellular Data Offload And Extending Wi-Fi Coverage With Devicescape Easy WiFi Case Study October 2010 List of Acronyms 3G Third Generation 4G Fourth Generation API Application Programming Interface AP
More informationAmdocs Smart Net Solution
Amdocs Smart Net Solution With the explosive growth of mobile data and the popularity of Wi-Fi as an access technology, Wi-Fi services have become a key strategy for service providers to alleviate network
More informationChapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
More informationSecurity and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
More informationBroadband Revolution: Roadmap for Safety and Security Mobile Communication Services
Broadband Revolution: Roadmap for Safety and Security Mobile Communication Services Contents What You Will Learn 3 Executive Summary 3 Overview 4 Emergency Response Use Cases 6 Key Trends Impacting Requirements
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationCo-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
More informationARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org
More informationSecuring Next Generation Mobile Networks
White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile
More informationNokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi
Nokia Networks Voice over Wi-Fi White paper Nokia Networks white paper Voice over Wi-Fi Contents 1 Why consider VoWiFi? 3 2 User experience requirements 4 3 Mobile operator vs. OTT services 5 4 VoWiFi
More informationWi-Fi integration with cellular networks enhances the customer experience. White paper
Wi-Fi integration with cellular networks enhances the customer experience White paper Executive summary Contents Executive Summary 2 Mobile data services fuel 3 the traffic tornado Wi-Fi integration offers
More informationRIDE-IT System Overview
RIDE-IT System Overview 2 BROADBAND BUS ROUTER Dragontech Systems www.dragontech.hk Demands on Operator Enabling with Broadband Connectivity 3 SAFETY CUSTOMER SERVICE BUS OPERATIONS IT EFFICIENCY On-Board
More informationUnlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi
More informationAlcatel-Lucent 9360 Small Cell Solution for the Home. Delivering big gains all around
Alcatel-Lucent 9360 Small Cell Solution for the Home Delivering big gains all around The Alcatel-Lucent 9360 Small Cell solution for the home (9360 SCH) cost-effectively extends W-CDMA capacity and coverage
More informationPerformance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing
Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing Muhammad Tariq Afridi 1, Safdar Nawaz Khan Marwat 1, Yasir Mehmood 2, Jebran Khan 1, Carmelita Görg 2 1 Department of Computer
More informationIPV6 IN MOBILE NETWORKS
IPV6 IN MOBILE NETWORKS APNIC37 - TUTORIAL PRESENTATION TUESDAY 25/02/2014 TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 Sunny Yeung Senior Technology Specialist Telstra Wireless Data Engineering AGENDA 1. Why
More informationSmart Wi-Fi A Smart Offload Solution for Smart Phones Kineto Wireless, Inc.
A Smart Offload Solution for Smart Phones January 2010 Kineto Wireless, Inc. 1601 McCarthy Blvd. Milpitas, CA 95035 Tel: +1 408 546 0660 2010 Kineto Wireless, Inc. All rights reserved. www.kineto.com The
More informationSeamless Mobility over Broadband Wireless Networks
Seamless Mobility over Broadband Wireless Networks F. Steuer, M. Elkotob, S. Albayrak, H. Bryhni, T. Lunde Abstract A broadband wireless architecture with 802.11 (/WiFi) as a core coverage technology supported
More informationAccess to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur
More informationSecurity Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
More informationHALYS VOIP to GSM SOLUTION
1 HALYS VOIP to GSM SOLUTION Stay connected to office and home. 2 Halys VoiP to GSM Since two years, smartphones and tablets support the EAP-SIM authentication for the WiFi access, which involves the SIM
More informationDemo 1. Network Path and Quality Validation in the Evolved Packet Core
Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer
More informationFOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology
FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology SHINOHARA Masahito, ITOH Masashi, IWATA Shinichiro, NISHIMURA Yasunori, ZAITSU Makoto Abstract FOMA (R) /wireless LAN dual terminals are dual-phone
More informationDelivering Network Performance and Capacity. The most important thing we build is trust
Delivering Network Performance and Capacity The most important thing we build is trust The Ultimate in Real-life Network Perfomance Testing 1 The TM500 Family the most comprehensive 3GPP performance and
More informationMobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
More informationCisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
More informationNokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationH3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
More informationwww.anite.com Application Testing
www.anite.com Application Testing Comprehensive application testing capabilities for accelerated approval of mobile devices by Tier 1 operators Testing higher order protocols and application enablers is
More informationDesign and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
More informationPractical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
More informationJurgen@juve-consulting.be +32 (491) 56.35.96
Whitepaper: Fortinet wireless Title: FAP 221C & Fortigate 60D Author: Jurgen Vermeulen Jurgen@juve-consulting.be +32 (491) 56.35.96 JUVE Consulting BVBA Roosgrachtlaan 27, B-3400 Landen Tel.: +32 (491)
More informationPCC. Policy Server. Charging Systems PCEF PDN GW PCEF GGSN. Figure 1 : Generic Policy and Charging Control Architecture
PCC (Policy and Charging Control) Applications EFORT http://www.efort.com In a first EFORT tutorial related to PCC (Policy and Charging Control), the PCC architecture has been described with its entities,
More informationApplication Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
More informationBirdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
More informationJarkko Kuisma jikuisma@cc.hut.fi
Jarkko Kuisma jikuisma@cc.hut.fi 1 Roaming the ability for a cellular customer to automatically make & receive voice calls, send & receive data, or access other services when travelling outside the geographical
More informationNSW Government. Wireless services (WiFi) Standard
NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT
More informationSecurity Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
More informationHow To Make A Cell Phone Converged Into A Cell Network
MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationFMC (Fixed Mobile Convergence)
FMC (Fixed Mobile Convergence) What About Security? Vancouver June 2008 Franck Veysset, Orange Labs Firstname.lastname at orange-ftgroup dot com Agenda Introduction - FMC? WIFI-SIP overview UMA overview
More informationApple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
More informationWLAN as easy as a mobile service. Philipp Michalschik LANCOM Systems GmbH
WLAN as easy as a mobile service Philipp Michalschik LANCOM Systems GmbH!1 Mobile Service Turn your mobile device on Enter PIN to unlock SIM Mobile device connects to your service provider automatically!2
More informationConfiguring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0
Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different
More informationAirMax4GW 4G LTE + WiFi Outdoor Gateway
4G LTE + WiFi Outdoor Gateway Solution Hardware Specification The is a standalone 4G LTE outdoor gateway that can distribute 4G or 3G Internet signal through WiFi or Ethernet connec ons. It is equipped
More informationSolving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i
SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt
More informationGet the best performance from your LTE Network with MOBIPASS
Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network
More informationA Uni ed Wireless Strategy for Cable Operators
Cable operators (MSOs) are leveraging the use of unlicensed Wi-Fi spectrum to enable reliable and persistent wireless access for their customers. This involves integrating Wi-Fi capabilities into the cable
More informationTelkomInternet APN Device Settings
TelkomInternet APN Device Settings Page 2 of 32 1. Telkom Devices 1.1. Huawei Mobile WiFi E5330 setting Switch the device on Connect the device using the USB cable Using your web browser, go to http://192.168.8.1
More informationLTE Attach and Default Bearer Setup Messaging
LTE Attach and Default Bearer Setup Messaging 2012 Inc. All Rights Reserved LTE Attach Message Sequence Chart enodeb MME SGW HSS Initial UE Message Update Location Update Location Answer Create Session
More informationBT IP Exchange helps mobile operators accelerate VoLTE deployment
Mobile operators face a huge task: the longterm evolution (LTE) of technology already drives a commercial revolution in the way networks are deployed and interconnected and the way services are launched
More informationGPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
More informationSingle Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester
Application Note Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester September 2013 Rev. A 09/13 Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8
More informationADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
More informationMobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca
Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects
More informationA User s Perspective on Voice over WiFi Calling
A User s Perspective on Voice over WiFi Calling An Ascom Network Testing White Paper By Dr. Irina Cotanis 1 Contents 1 VoWiFi s Impact in Moving beyond Traditional Voice Services 3 2 A User s Perspective
More informationWireless Security for Hotspots & Home PCCW Feb, 2009
Wireless Security for Hotspots & Home PCCW Feb, 2009 Ubiquitous Wireless Indoor & Outdoor Wireless Security for Home Provides all-in-one DSL modem with Wi-Fi capability to residential customers Simplify
More informationMETHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
More informationCisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
More informationA Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
More informationBusiness Case for Cisco Evolved Services Platform and NFV
Business Case for Cisco Evolved Services Platform and NFV s Executive Summary New services are driving strong traffic growth as well as creating demand for service personalization and novel consumption
More informationCase Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
More informationAppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
More informationDeploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
More informationMobile broadband. Trends and future evolution. LUIS MUCHACHO MBB Customer Solutions
Mobile broadband Trends and future evolution LUIS MUCHACHO MBB Customer Solutions Mobile Broadband - Trends and Future Evolution Commercial in confidence 2014-05-29 Page 1 Working with customers in >180
More informationLab Testing Summary Report
Lab Testing Summary Report May 2007 Report 070529 Product Category: Network Acceleration Vendor Tested: Cisco Systems Product Tested: Cisco Wide Area Application Services (WAAS) v4.0.7 Key findings and
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationUMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationA Comparison of LTE Advanced HetNets and Wi-Fi
Qualcomm Incorporated October 2011 QUALCOMM is a registered trademark of QUALCOMM Incorporated in the United States and may be registered in other countries. Other product and brand names may be trademarks
More informationNetwork Service Points
Solution Overview Network Service s In the developing world the cost of digital connectivity using traditional communications technologies becomes increasingly prohibitive outside of urban areas. First
More informationComparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
More informationSmartCell Gateway 200 CARRIER CLASS WLAN CONTROLLER WITH 3GPP WLAN GATEWAY SUPPORT
data sheet KEY FEATURES/BENEFITS Scalability Grow your Wi-Fi network with ease through tens of thousands of APs, hundreds of thousands of subscribers, and tens of Gbps of aggregate traffic. Active/active
More informationSpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
More informationCisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
More informationCircuit-switched fallback. White Paper
Circuit-switched fallback. White Paper In collaboration with: Qualcomm Circuit-switched fallback. The first phase of voice evolution for mobile LTE devices. 1 LTE Growth and Challenges The 3GPP Long Term
More informationSupporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
More informationInterworking Wi-Fi and Mobile Networks The Choice of Mobility Solutions
white paper Introduction Operators are compelled to explore options to meet ever-rising mobile Internet data demand including extending existing 3G networks, rolling out LTE macro networks, adding LTE
More informationService Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement
Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement Ngoc-Duy Nguyen and Christian Bonnet Department of Mobile Communications EURECOM Sophia Antipolis, France Email:
More informationTop 10 Questions about VoWiFi
Top 10 Questions about VoWiFi Copyright 2015 For over ten years, Taqua has worked with mobile operators from around the world as they ve looked to deploy VoWiFi services. Taqua has also been fortunate
More informationThe Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial
More informationImplementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
More informationDeploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
More informationAradial Enforcer / AAA Features & capabilities
Aradial Enforcer / AAA Features & capabilities 2013 Aradial This document contains proprietary and confidential information of Aradial and shall not be reproduced or transferred to other documents, disclosed
More informationUMA/GAN the next wireless revolution?
UMA/GAN the next wireless revolution? Sandy Fraser Mobile Broadband Division This paper includes the opinions of the author and should not be taken as fact All trademarks are the properties of their respective
More informationConfigure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationLab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication
Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationNokia WLAN gateway. Foundation to deliver a superior customer experience
Foundation to deliver a superior customer experience White paper Carrier Wi-Fi technologies are playing an ever more important role in the mobile broadband strategies of telecom operators, including fixed
More informationManaged Network Services
Managed Network Services Delivering innovative network data services to business NETWOR Communications are an essential and integral part of any IT strategy and are as important as the systems and processes
More informationPassguide 500-451 35q
Passguide 500-451 35q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Cisco 500-451 Cisco Unified Access Systems Engineer Exam 100% Valid in US, UK, Australia, India and Emirates.
More informationCisco Network Planning Solution 2.0 Cisco Network Planning Solution Service Provider 2.0
Cisco Network Planning Solution 2.0 Cisco Network Planning Solution Service Provider 2.0 Cisco Network Planning Solution (NPS) and Cisco Network Planning Solution Service Provider (NPS-SP) help enterprises
More information