Securing Next Generation Mobile Networks

Size: px
Start display at page:

Download "Securing Next Generation Mobile Networks"

Transcription

1 White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile access paradigms, examines the security challenges, and outlines the technical requirements for a new generation of security gateways. CONTENTS Executive Summary pg. 2 Growing Mobile Demand pg. 2 Expanding Mobile Network Capacity pg. 2 Securing Mobile Network Backhaul pg. 3 Network Security Technology Requirements pg. 3 Lte Security Gateway Solution pg. 4 Conclusion pg. 5 Glossary pg. 6 References pg. 6

2 2 Executive Summary Exploding data traffic on mobile networks is creating congestion and putting unprecedented pressure on network operators to meet nearly insatiable data demand. Most major worldwide mobile operators have announced plans to migrate their networks to Long Term Evolution (LTE), an all-ip network that will increase broadband capacity to support up to ten times higher data rates and enable an abundance of new mobile applications. In the near term, many operators are also considering alternative wireless offload solutions which route both voice and data traffic over the public Internet to relieve network congestion and improve coverage. In both situations, operators are exposed to inherent security threats and challenges familiar to enterprise IP networks. As cyber crime becomes more sophisticated and profitable, these attacks are occurring more frequently and with more severity and complexity. Mobile networks will have similar security requirements to enterprises, but on a much larger scale. This white paper will examine potential security challenges in both LTE infrastructure and wireless offload deployments, introduce the relevant 3GPP standards, and present solutions based on an LTE security gateway, or LTE. Growing Mobile Demand The increase in demand for mobile bandwidth is undeniable. Nokia Siemens Networks reported that in 2008, their customers saw an increase in High Speed Packet Access (HSPA) data traffic of 5.7 times the previous year, and eleven customers saw a ten-fold increase. So we re seeing a significant amount of stress on the network, said Patrick Donegan, Senior Analyst, Heavy Reading. 1 According to Cisco, mobile data traffic will double every year through 2014, increasing approximately 40 times over the next five years (Figure 1). By 2014, seventeen percent of this data will be transmitted over the Internet, much of which will need to be secured. IP has become the de facto transport, not only for user traffic, but also for control within network infrastructure. Security threats resulting from untrusted network endpoints, shared facilities, and disgruntled employees are magnified in an all-ip environment. Expanding Mobile Network Capacity In recent years, the convergence of telecom and IP networking, have driven new standards, technologies and platforms. Persistent growth of bandwidth hungry services and applications has driven the development of LTE, which supplies the bandwidth needed for these applications, while lowering operating costs and simplifying network management. LTE delivers four times more downlink bandwidth and eight times more uplink bandwidth than its predecessor, HSPA. It also provides better cell performance, lower latency and higher Quality of Service (QoS), while supporting more users at a lower cost per byte. LTE will take many years to rollout and become pervasive, however, and existing cellular networks are already becoming tapped out. With smartphones and other wireless devices becoming increasingly popular, some operators are looking for near term wireless offload and coverage solutions. A new study from ABI Research reports that CONSUMER INTERT TRAFFIC PETABYTES PER MONTH Mobile VoIP Mobile Gaming Mobile P2P Mobile Web/Data Mobile Video YEAR Figure 1. Cisco Global Mobile Data Traffic Forecast (Source: Cisco, ) 4% 5% 8% 17% 66%

3 3 about sixteen percent of data traffic is diverted from mobile networks today and is expected to increase to forty-eight percent by Cisco estimates that by 2014, twenty-three percent of U.S. smartphone traffic could be offloaded through the public Internet, using wireless LANs and femtocells. Even higher percentages are forecasted for Western Europe and Russia. Wireless offload relieves pressure on 3G access networks, but introduces the need for security gateways. Securing Mobile Network Backhaul Both LTE access and 3G wireless offload present new security challenges not encountered in traditional mobile network backhaul, the infrastructure for connecting cell sites to the core network. Historically, backhaul employed dedicated T1 and unshared facilities between macro cellsites and the core network base stations. LTE phases out TDM connected cell sites in favor of Ethernet and IP connections, and for both cost and bandwidth reasons, LTE backhaul may leverage commercial broadband links. LTE networks have more small and distributed cell sites, which are difficult and costly to physically protect against criminal activity. Operators are also increasingly sharing cell sites to get around government limitations and use the best locations. The LTE architecture pushes more mobility function out to the cell sites, enabling hackers to disrupt subscribers and penetrate new data applications. And the flat LTE topology provides a direct route from cell sites to the network core, creating the possibility for Denial-of-Service (DoS) attacks and interception of user communications. All these factors drive new security requirements in LTE. The security exposures in wireless offload applications are more obvious. WiFi access points and femtocells are connected over the public Internet and expose the core network to the full range of Internet attacks, including address spoofing, identity theft, man-in-themiddle, and DoS. In addition to securing the wireless segment of a connection with appropriate wireless security like WPA, mobile devices require end-to-end security to the core network, and network gateways must be appropriately firewalled to protect the core network. The security topology for LTE Access and Wireless Offload networks is shown in Figure 3. Dual Mode Handset WiFi Access Point Figure 2. Wireless Offload 4G 3G 2G 3G LTE enodeb WiFi Access Point Femtocell Backhaul Network or Public Internet Standard 3G/4G Handset Network Security Technology Requirements A security gateway is required to secure the connections between network elements over an untrusted communications link. The link may be untrusted because the elements are owned by different operators and therefore reside in different security domains (Za interface), or because the elements are owned by the same operator in the same security domain but are connected in a way that may lead to security breaches because the interfaces are not protected (e.g. no use of between internal elements). The elements may be part of the LTE backhaul network, like cell sites (enodebs), or part of the enhanced packet core, like Serving and Packet Gateways (S-GWY, P-GWY). Wu UMA-Enabled Femtocell Up S1 Wu Up lub Firewall and Tunneling Technology Wireless Data Offload Public Internet (Untrusted) 3G Core Network (Trusted) LTE Serving Gateway (SGW) I-WLAN Terminating Gateway (TTG) Femtocell Gateway Figure 3. Securing LTE Access and Wireless Offload Networks To Packet Network Voice/Data

4 4 The requirements for providing a secure connection between LTE network elements are specified in the 3GPP Network Domain Security (NDS) standard. The primary requirement is to use Internet Protocol Security (IPsec), as shown in Figure 4. With IPsec, data is passed between the network elements in secure tunnels using a protocol called Encapsulating Security Payload (ESP) which includes subscriber authentication, content integrity and data encryption. These tunnels are set up using a protocol called Internet Key Exchange (IKE), which enables the elements to identify each other in a trusted manner called a Security Association (SA). A-1 A-2 Security Domain A A Figure 4. Securing LTE Networks Za Security Domain B B IKE Connection ESP Security Association B-1 B-2 The requirements for providing a secure connection between a mobile device or femtocell in a wireless offload application share similarities to the NDS scenario. An IPsec tunnel is established between the mobile device or femtocell using IKE; bidirectional security associations are established; and encrypted ESP data is transmitted (Figure 5). Lte Security Gateway Solution An LTE Security Gateway, or LTE, must meet the technology requirements for both LTE and its wireless offload applications predecessors. It should provide very high performance IPsec tunneling and stateful firewall protection and be cost effective for a telecom equipment manufacturer to deploy in an operator network. An LTE should adhere to the 3GPP P-G standards and provide high performance IPsec capability, with carrier-grade reliability and scalability for telecom networks. This requires supporting key IETF RFCs for ESP, IKE and Certificate Management Protocol (CMP) as required by 3GPP LTE specifications and Ideally, an LTE will process at least multi- Gbps of encrypted IPsec traffic and scale to much higher IPsec throughput to support massive amounts of IP data from many LTE cell sites. Additionally, in wireless offload applications, a security gateway should secure large numbers of WiFi connected mobile devices and femtocells and support various Data Offload 3G HSS/ HLR Internet SGSN: Service GPRS Support Node AAA Wu or Up Figure 5. Securing Wireless Offload Applications authentication schemes appropriate for each device, e.g. reuse of SIM card in mobile devices, support for both femtocell smart-card and certificate based schemes, and back-end RADIUS support. Wireless offload applications such as I-WLAN and Home NodeB femtocells also require associating the user s IPsec tunnel with the GTP connection to the packet core. Another important LTE feature is a stateful firewall, which can process several million concurrent IP flows, with pre-defined and custom filters, consistency checks and DoS prevention mechanisms. This requires 10G Ethernet ports and firewall services performed at line rate. In addition to network security, an LTE should ideally feature static and dynamic Network Address Translation (NAT), Virtual Routing (VLAN), DHCP services and traffic management. Wm GGSN: Gateway GPRS Support Node Gn

5 5 Because security technology is complex and engineers with relevant experience are scarce and expensive, most telecom equipment manufacturers would prefer to buy a complete LTE solution which they can easily and cost effectively integrate into the LTE network elements in their portfolio. Like other telecom equipment, the LTE should have a fault tolerant configuration option and meet carrier requirements for high availability and serviceability. Many equipment manufacturers have adopted the open, carrier grade Advanced Telecom Computing Architecture (ATCA) and would benefit from a blade solution that could be readily integrated in spare slots of existing network elements, as well as offered as a standalone solution. Conclusion The explosion of mobile data applications has begun, and worldwide mobile operators are planning to migrate their networks to LTE. The new LTE networks will increase broadband capacity to support higher data rates, simplify network management, and lower transport costs. Whether operators choose to move directly to LTE or enhance their current generation networks with wireless offload applications, they must address the security issues associated with an all-ip network. The financial risk and reputation impact associated with any security breach in the early stages of a network rollout are too big to ignore. The 3GPP standards, including NDS, specify ways to secure user data and protect network elements, but leave many implementation decisions up to the operators. Network security is a major hurdle for LTE equipment vendors because the scope of potential breaches is large, the technology is complex, and engineers with relevant security expertise are scarce and expensive. The best solution is a turnkey security gateway that is flexible and scalable and can be cost effectively integrated to make new network rollouts secure from the outset. Glossary The following Glossary is in the order of the acronyms appearing in the paper. 3GPP: 3rd Generation Partnership Project ATCA: Advanced Telecom Computing Architecture CMP: Certificate Management Protocol DoS: Denial-of-Service enodeb: enhanced nodeb, LTE radio at a cellsite ESP: Encapsulating Security Payload HSPA: High Speed Packet Access IETF: Internet Engineering Task Force IKE: Internet Key Exchange IP: Internet Protocol IPsec: Internet Protocol Security I-WLAN: Interworking-Wireless Local Area Network LTE: Long Term Evolution (one flavor of 4G) NAT: Network Address Translation NDS: Network Domain Security P-GWY: Packet Gateway QoS: Quality of Service S1-U: User-plane (mobile) traffic between & LTE enodeb (cellsites) & Serving-Gateway (S-GWY) packet core elements SA: Security Association : Security Gateway S-GWY: Serving Gateway T1: Data Circuit Running at Mbit/s Line Rate TDM: Time Division Multiplexed WPA: Wireless Protected Access

6 6 References 1 Source: doc_id= Source: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, from February 9, 2010 found at US/solutions/collateral/ns341/ns525/ns537/ns705/ ns827/white_paper_c html. 3 network-acceleration/articles/95417-wifi-femtocellothers-help-mobile-data-offloading-research.htm. Corporate Headquarters 5435 Dawson Creek Drive Hillsboro, OR USA Fax Toll-Free: info@radisys.com 2011 Radisys Corporation. Radisys, Trillium, Continuous Computing and Convedia are registered trademarks of Radisys Corporation. *All other trademarks are the properties of their respective owners. October 2010

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure Oracle s Secure HetNet Backhaul Solution A Solution Based on Oracle s Network Session Delivery and Control Infrastructure HetNets are a gradual evolution of cellular topology, not a distinct network unto

More information

Cisco Wireless Security Gateway R2

Cisco Wireless Security Gateway R2 Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network

More information

Why Is DPI Essential for Wireless Networks?

Why Is DPI Essential for Wireless Networks? White Paper Why Is DPI Essential for Wireless Networks? By: Manish Singh, CTO Overview The biggest challenge network operators continue to face is how to keep up with seemingly insatiable demand for mobile

More information

The LTE Challenge. for the Small-to- Midsize Mobile Network Operator

The LTE Challenge. for the Small-to- Midsize Mobile Network Operator The LTE Challenge for the Small-to- Midsize Mobile Network Operator The next mobile generation is not just for Tier 1 carriers. How to tap into the business opportunities of LTE in Tier 2 and Tier 3 markets

More information

1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7

1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview

More information

How To Choose Radisys

How To Choose Radisys ENABLING WIRELESS Infrastructure Solutions Radisys Your Trusted Partner As the world s networks evolve from 3G to 4G LTE and beyond, the wireless industry is accelerating into a period of unprecedented

More information

Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well

Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well White Paper Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well By: Manish Singh, CTO Overview The introduction of flat rate all-you-can-eat data plans was, if not the most important, a very

More information

3G/Wi-Fi Seamless Offload

3G/Wi-Fi Seamless Offload Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...

More information

Implementing ATCA Serving Gateways for LTE Networks

Implementing ATCA Serving Gateways for LTE Networks White Paper February 2010 Implementing ATCA Serving Gateways for LTE Networks By Karl Wale, Director of PLM and Sridharan Natarajan, Lead Engineer The ever-increasing demand for wireless broadband by mobile

More information

Use of MPLS in Mobile Backhaul Networks

Use of MPLS in Mobile Backhaul Networks Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile

More information

Nokia Siemens Networks Flexi Network Server

Nokia Siemens Networks Flexi Network Server Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted

More information

Security Executive Summary. Securing LTE Radio Access Networks Effectively

Security Executive Summary. Securing LTE Radio Access Networks Effectively Security Executive Summary Securing LTE Radio Access Networks Effectively LTE networks require a dedicated security solution As an all-ip technology, LTE brings new capabilities to improve the customer

More information

Wi-Fi integration with cellular networks enhances the customer experience. White paper

Wi-Fi integration with cellular networks enhances the customer experience. White paper Wi-Fi integration with cellular networks enhances the customer experience White paper Executive summary Contents Executive Summary 2 Mobile data services fuel 3 the traffic tornado Wi-Fi integration offers

More information

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ] [ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting

More information

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions

More information

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012

More information

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS QUICK LOOK ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS The Cisco RAN Optimization solution offers alternative radio access network (RAN) backhaul transport and data offload

More information

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1 Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5

More information

How to Ready your Mobile Backhaul

How to Ready your Mobile Backhaul How to Ready your Mobile Backhaul Network for LTE LTE has outperformed service provider expectations, driven by end-user demand. That s a huge opportunity for operators if they commit to re-architecting

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless

More information

Secured VPN Models for LTE Backhaul Networks

Secured VPN Models for LTE Backhaul Networks Secured VPN Models for LTE Backhaul Networks Madhusanka Liyanage, Andrei Gurtov Centre for Wireless Communications University of Oulu, P.O. Box 45, FI-914 Oulu, Finland Email: [madhusanka, gurtov]@ee.oulu.fi

More information

The Security Vulnerabilities of LTE: Opportunity & Risks for Operators

The Security Vulnerabilities of LTE: Opportunity & Risks for Operators White Paper The Security Vulnerabilities of LTE: Opportunity & Risks for Operators A Heavy Reading Executive Overview Prepared by Patrick Donegan Senior Analyst, Heavy Reading www.heavyreading.com on behalf

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

SpiderCloud E-RAN Security Overview

SpiderCloud E-RAN Security Overview SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5

More information

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Technical white paper. Enabling mobile broadband growth Evolved Packet Core Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective

More information

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects White paper Mobile broadband with HSPA and LTE capacity and cost aspects Contents 3 Radio capacity of mobile broadband 7 The cost of mobile broadband capacity 10 Summary 11 Abbreviations The latest generation

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

IPV6 IN MOBILE NETWORKS

IPV6 IN MOBILE NETWORKS IPV6 IN MOBILE NETWORKS APNIC37 - TUTORIAL PRESENTATION TUESDAY 25/02/2014 TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 Sunny Yeung Senior Technology Specialist Telstra Wireless Data Engineering AGENDA 1. Why

More information

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS White Paper Single Radio Voice Call Continuity (SRVCC) with LTE By: Shwetha Vittal, Lead Engineer Overview Long Term Evolution (LTE) is heralded as the next big thing for mobile networks. It brings in

More information

Nokia Siemens Networks Flexi Network Gateway. Brochure

Nokia Siemens Networks Flexi Network Gateway. Brochure Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband

More information

Mobile Network Security

Mobile Network Security A key component of Ericsson s Evolved IP Network solution Technology paper This document outlines the need for effective network security in response to increasing perceived threats, recent publicized

More information

Operator s Dilemma. How to take advantage of the growing mobile Internet. Notava uaxes White Paper. Dr. Risto Suoranta, CTO, Notava

Operator s Dilemma. How to take advantage of the growing mobile Internet. Notava uaxes White Paper. Dr. Risto Suoranta, CTO, Notava Operator s Dilemma How to take advantage of the growing mobile Internet Notava uaxes White Paper Dr. Risto Suoranta, CTO, Notava Antti Lappeteläinen, uaxes product m anager, Notava. May 2010 V1.0 Executive

More information

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport

More information

Nokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi

Nokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi Nokia Networks Voice over Wi-Fi White paper Nokia Networks white paper Voice over Wi-Fi Contents 1 Why consider VoWiFi? 3 2 User experience requirements 4 3 Mobile operator vs. OTT services 5 4 VoWiFi

More information

Using DPI to Increase ARPU Despite Flat-Rate Plans

Using DPI to Increase ARPU Despite Flat-Rate Plans White Paper Using DPI to Increase ARPU Despite Flat-Rate Plans By: Todd Mersch, Director of Product Line Management Overview It is undeniable that the primary source of revenue growth for mobile operators

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Radisys Integrated Conferencing Solution Improves Economics and Flexibility in Next- Generation Architecture

Radisys Integrated Conferencing Solution Improves Economics and Flexibility in Next- Generation Architecture Radisys Integrated Conferencing Solution Improves Economics and Flexibility in Next- Generation Architecture Case Study Industry/Market Hosted Conferencing Services in Asia Pacific. The Challenge Reduce

More information

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07 Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements

More information

Bringing Mobile Broadband to Rural Areas. Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks

Bringing Mobile Broadband to Rural Areas. Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks Bringing Mobile Broadband to Rural Areas Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks Agenda Drivers in Mobile Broadband Why LTE? Market Status, Networks and Devices Implementation

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...

More information

FMC (Fixed Mobile Convergence)

FMC (Fixed Mobile Convergence) FMC (Fixed Mobile Convergence) What About Security? Vancouver June 2008 Franck Veysset, Orange Labs Firstname.lastname at orange-ftgroup dot com Agenda Introduction - FMC? WIFI-SIP overview UMA overview

More information

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM v. CDMA: Technical Comparison of M2M Technologies GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple

More information

A compelling Multiservice IP Backbone use case

A compelling Multiservice IP Backbone use case Nokia Networks The Mobile Packet Backbone Network A compelling Multiservice IP Backbone use case Nokia Networks white paper The Mobile Packet Backbone Network Executive summary The mobile communications

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

4G Mobile Networks At Risk

4G Mobile Networks At Risk 07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis

More information

Multimedia Conferencing Solutions

Multimedia Conferencing Solutions Multimedia Solutions Fixed users are migrating to... Mobile Audio users are migrating to... Video CSPs are migrating to... Radisys ECONOMICAL FLEXIBLE RELIABLE DIFFERENTIATED INTEGRATED SCALABLE The conferencing

More information

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan

More information

A Uni ed Wireless Strategy for Cable Operators

A Uni ed Wireless Strategy for Cable Operators Cable operators (MSOs) are leveraging the use of unlicensed Wi-Fi spectrum to enable reliable and persistent wireless access for their customers. This involves integrating Wi-Fi capabilities into the cable

More information

ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE

ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports

More information

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols

More information

Simplified network architecture delivers superior mobile broadband

Simplified network architecture delivers superior mobile broadband White paper Simplified network architecture delivers superior mobile broadband Profitable wireless broadband with Internet-HSPA Contents 3 Executive Summary 4 Mobile data traffic is growing strongly 5

More information

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services

More information

RIDE-IT System Overview

RIDE-IT System Overview RIDE-IT System Overview 2 BROADBAND BUS ROUTER Dragontech Systems www.dragontech.hk Demands on Operator Enabling with Broadband Connectivity 3 SAFETY CUSTOMER SERVICE BUS OPERATIONS IT EFFICIENCY On-Board

More information

Routing Security Server failure detection and recovery Protocol support Redundancy

Routing Security Server failure detection and recovery Protocol support Redundancy Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011 HSPA, LTE and beyond The online multimedia world made possible by mobile broadband has changed people s perceptions of data speeds and network service quality. Regardless of where they are, consumers no

More information

Virtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA

Virtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA Virtualization techniques for redesigning mobile backhaul networks: challenges and issues Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA MobiArch 2015 September 7, 2015 Outline 1 2 3 Introduction Convergent

More information

Session Border Controllers: Addressing Tomorrow s Requirements

Session Border Controllers: Addressing Tomorrow s Requirements White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction

More information

Wireless & Mobile. Working Group

Wireless & Mobile. Working Group Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...

More information

Traffic. Data Dominant. Time. Figure 1. Wireless network traffic timescale

Traffic. Data Dominant. Time. Figure 1. Wireless network traffic timescale TESTING LIFECYCLE OF A MOBILE BACKHAUL NETWORK By Bruno Giguère, Member of Technical Staff, Transport and Datacom Business Unit In wireless network technology, mobile backhaul services are used to transport

More information

A Business Case for Scaling the Next-Generation Network with the Cisco ASR 9000 System: Now with Converged Services. Key Takeaways.

A Business Case for Scaling the Next-Generation Network with the Cisco ASR 9000 System: Now with Converged Services. Key Takeaways. A Business Case for Scaling the Next-Generation Network with the Cisco ASR 9000 System: Now with Converged Services Executive Summary In a previous whitepaper ACG Research described the business case for

More information

Business Case for S/Gi Network Simplification

Business Case for S/Gi Network Simplification Business Case for S/Gi Network Simplification Executive Summary Mobile broadband traffic growth is driving large cost increases but revenue is failing to keep pace. Service providers, consequently, are

More information

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying

More information

Signaling is growing 50% faster than data traffic

Signaling is growing 50% faster than data traffic Signaling is growing 50% faster than data traffic To enable future-proof mobile broadband networks, Nokia Siemens Networks has designed its Evolved Packet Core to handle high signaling load. 2/8 Signaling

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Clavister Small Cell Site Security Solution

Clavister Small Cell Site Security Solution clavister SolutionSeries Clavister Small Cell Site Security Distributed operator environment Clavister small cell site security solution SOLUTION AT-A-GLANCE Clavister Small Cell Security Gateway offers

More information

SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA

SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA Introduction Mobile operators in emerging markets are under pressure to extend their services in rural areas. Either their markets are becoming mature,

More information

Enterprise Connectivity over Mobile Broadband

Enterprise Connectivity over Mobile Broadband NSN White paper October 2013 Enterprise Connectivity over Mobile Broadband Enabling Carrier Ethernet over LTE Networks CONTENTS Executive Summary 2 Market Trends 3 Target Customers 6 Proposed Solution

More information

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects

More information

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD. HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to

More information

How To Make A Secure Ip Based Service Available To A Network (Ip) From A Cell Phone Or Ip) From An Ip Device (Ipv) Or Ipv (Ips) From The Cell Phone (Ipa) Or From A P

How To Make A Secure Ip Based Service Available To A Network (Ip) From A Cell Phone Or Ip) From An Ip Device (Ipv) Or Ipv (Ips) From The Cell Phone (Ipa) Or From A P Solutions White Paper Delivering Secure IP-Based Services Jasomi Uses Intel Technology and AdvancedTCA for Its High-End Carrier and IMS Session Border Controller Table of Contents Business Challenge...

More information

Rethinking the Small Cell Business Model

Rethinking the Small Cell Business Model CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1

More information

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network

More information

LTE Security How Good Is It?

LTE Security How Good Is It? LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology

More information

Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment

Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment White Paper Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment As 1800 MHz has emerged as the main band for Long-Term Evolution (LTE) network deployments (LTE1800), LTE is going

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction

MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction Wireless communications have evolved rapidly since the emergence of 2G networks. 4G technology (also called LTE), enables to answer the new data market

More information

Mobile@Home GSM services over wireless LAN

Mobile@Home GSM services over wireless LAN Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.

More information

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved. Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for

More information

Software-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters

Software-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters Software-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters Present-day carrier network operators are faced with the challenge

More information

Cellular Backhaul: Extending the Edge of the Network November 2008

Cellular Backhaul: Extending the Edge of the Network November 2008 Cellular Backhaul: Extending the Edge of the Network November 2008-0 - Introduction The global demand for voice and data services delivered over cellular networks continues to grow as new markets open

More information

How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled

How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information