Securing Next Generation Mobile Networks
|
|
- Myron Ball
- 8 years ago
- Views:
Transcription
1 White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile access paradigms, examines the security challenges, and outlines the technical requirements for a new generation of security gateways. CONTENTS Executive Summary pg. 2 Growing Mobile Demand pg. 2 Expanding Mobile Network Capacity pg. 2 Securing Mobile Network Backhaul pg. 3 Network Security Technology Requirements pg. 3 Lte Security Gateway Solution pg. 4 Conclusion pg. 5 Glossary pg. 6 References pg. 6
2 2 Executive Summary Exploding data traffic on mobile networks is creating congestion and putting unprecedented pressure on network operators to meet nearly insatiable data demand. Most major worldwide mobile operators have announced plans to migrate their networks to Long Term Evolution (LTE), an all-ip network that will increase broadband capacity to support up to ten times higher data rates and enable an abundance of new mobile applications. In the near term, many operators are also considering alternative wireless offload solutions which route both voice and data traffic over the public Internet to relieve network congestion and improve coverage. In both situations, operators are exposed to inherent security threats and challenges familiar to enterprise IP networks. As cyber crime becomes more sophisticated and profitable, these attacks are occurring more frequently and with more severity and complexity. Mobile networks will have similar security requirements to enterprises, but on a much larger scale. This white paper will examine potential security challenges in both LTE infrastructure and wireless offload deployments, introduce the relevant 3GPP standards, and present solutions based on an LTE security gateway, or LTE. Growing Mobile Demand The increase in demand for mobile bandwidth is undeniable. Nokia Siemens Networks reported that in 2008, their customers saw an increase in High Speed Packet Access (HSPA) data traffic of 5.7 times the previous year, and eleven customers saw a ten-fold increase. So we re seeing a significant amount of stress on the network, said Patrick Donegan, Senior Analyst, Heavy Reading. 1 According to Cisco, mobile data traffic will double every year through 2014, increasing approximately 40 times over the next five years (Figure 1). By 2014, seventeen percent of this data will be transmitted over the Internet, much of which will need to be secured. IP has become the de facto transport, not only for user traffic, but also for control within network infrastructure. Security threats resulting from untrusted network endpoints, shared facilities, and disgruntled employees are magnified in an all-ip environment. Expanding Mobile Network Capacity In recent years, the convergence of telecom and IP networking, have driven new standards, technologies and platforms. Persistent growth of bandwidth hungry services and applications has driven the development of LTE, which supplies the bandwidth needed for these applications, while lowering operating costs and simplifying network management. LTE delivers four times more downlink bandwidth and eight times more uplink bandwidth than its predecessor, HSPA. It also provides better cell performance, lower latency and higher Quality of Service (QoS), while supporting more users at a lower cost per byte. LTE will take many years to rollout and become pervasive, however, and existing cellular networks are already becoming tapped out. With smartphones and other wireless devices becoming increasingly popular, some operators are looking for near term wireless offload and coverage solutions. A new study from ABI Research reports that CONSUMER INTERT TRAFFIC PETABYTES PER MONTH Mobile VoIP Mobile Gaming Mobile P2P Mobile Web/Data Mobile Video YEAR Figure 1. Cisco Global Mobile Data Traffic Forecast (Source: Cisco, ) 4% 5% 8% 17% 66%
3 3 about sixteen percent of data traffic is diverted from mobile networks today and is expected to increase to forty-eight percent by Cisco estimates that by 2014, twenty-three percent of U.S. smartphone traffic could be offloaded through the public Internet, using wireless LANs and femtocells. Even higher percentages are forecasted for Western Europe and Russia. Wireless offload relieves pressure on 3G access networks, but introduces the need for security gateways. Securing Mobile Network Backhaul Both LTE access and 3G wireless offload present new security challenges not encountered in traditional mobile network backhaul, the infrastructure for connecting cell sites to the core network. Historically, backhaul employed dedicated T1 and unshared facilities between macro cellsites and the core network base stations. LTE phases out TDM connected cell sites in favor of Ethernet and IP connections, and for both cost and bandwidth reasons, LTE backhaul may leverage commercial broadband links. LTE networks have more small and distributed cell sites, which are difficult and costly to physically protect against criminal activity. Operators are also increasingly sharing cell sites to get around government limitations and use the best locations. The LTE architecture pushes more mobility function out to the cell sites, enabling hackers to disrupt subscribers and penetrate new data applications. And the flat LTE topology provides a direct route from cell sites to the network core, creating the possibility for Denial-of-Service (DoS) attacks and interception of user communications. All these factors drive new security requirements in LTE. The security exposures in wireless offload applications are more obvious. WiFi access points and femtocells are connected over the public Internet and expose the core network to the full range of Internet attacks, including address spoofing, identity theft, man-in-themiddle, and DoS. In addition to securing the wireless segment of a connection with appropriate wireless security like WPA, mobile devices require end-to-end security to the core network, and network gateways must be appropriately firewalled to protect the core network. The security topology for LTE Access and Wireless Offload networks is shown in Figure 3. Dual Mode Handset WiFi Access Point Figure 2. Wireless Offload 4G 3G 2G 3G LTE enodeb WiFi Access Point Femtocell Backhaul Network or Public Internet Standard 3G/4G Handset Network Security Technology Requirements A security gateway is required to secure the connections between network elements over an untrusted communications link. The link may be untrusted because the elements are owned by different operators and therefore reside in different security domains (Za interface), or because the elements are owned by the same operator in the same security domain but are connected in a way that may lead to security breaches because the interfaces are not protected (e.g. no use of between internal elements). The elements may be part of the LTE backhaul network, like cell sites (enodebs), or part of the enhanced packet core, like Serving and Packet Gateways (S-GWY, P-GWY). Wu UMA-Enabled Femtocell Up S1 Wu Up lub Firewall and Tunneling Technology Wireless Data Offload Public Internet (Untrusted) 3G Core Network (Trusted) LTE Serving Gateway (SGW) I-WLAN Terminating Gateway (TTG) Femtocell Gateway Figure 3. Securing LTE Access and Wireless Offload Networks To Packet Network Voice/Data
4 4 The requirements for providing a secure connection between LTE network elements are specified in the 3GPP Network Domain Security (NDS) standard. The primary requirement is to use Internet Protocol Security (IPsec), as shown in Figure 4. With IPsec, data is passed between the network elements in secure tunnels using a protocol called Encapsulating Security Payload (ESP) which includes subscriber authentication, content integrity and data encryption. These tunnels are set up using a protocol called Internet Key Exchange (IKE), which enables the elements to identify each other in a trusted manner called a Security Association (SA). A-1 A-2 Security Domain A A Figure 4. Securing LTE Networks Za Security Domain B B IKE Connection ESP Security Association B-1 B-2 The requirements for providing a secure connection between a mobile device or femtocell in a wireless offload application share similarities to the NDS scenario. An IPsec tunnel is established between the mobile device or femtocell using IKE; bidirectional security associations are established; and encrypted ESP data is transmitted (Figure 5). Lte Security Gateway Solution An LTE Security Gateway, or LTE, must meet the technology requirements for both LTE and its wireless offload applications predecessors. It should provide very high performance IPsec tunneling and stateful firewall protection and be cost effective for a telecom equipment manufacturer to deploy in an operator network. An LTE should adhere to the 3GPP P-G standards and provide high performance IPsec capability, with carrier-grade reliability and scalability for telecom networks. This requires supporting key IETF RFCs for ESP, IKE and Certificate Management Protocol (CMP) as required by 3GPP LTE specifications and Ideally, an LTE will process at least multi- Gbps of encrypted IPsec traffic and scale to much higher IPsec throughput to support massive amounts of IP data from many LTE cell sites. Additionally, in wireless offload applications, a security gateway should secure large numbers of WiFi connected mobile devices and femtocells and support various Data Offload 3G HSS/ HLR Internet SGSN: Service GPRS Support Node AAA Wu or Up Figure 5. Securing Wireless Offload Applications authentication schemes appropriate for each device, e.g. reuse of SIM card in mobile devices, support for both femtocell smart-card and certificate based schemes, and back-end RADIUS support. Wireless offload applications such as I-WLAN and Home NodeB femtocells also require associating the user s IPsec tunnel with the GTP connection to the packet core. Another important LTE feature is a stateful firewall, which can process several million concurrent IP flows, with pre-defined and custom filters, consistency checks and DoS prevention mechanisms. This requires 10G Ethernet ports and firewall services performed at line rate. In addition to network security, an LTE should ideally feature static and dynamic Network Address Translation (NAT), Virtual Routing (VLAN), DHCP services and traffic management. Wm GGSN: Gateway GPRS Support Node Gn
5 5 Because security technology is complex and engineers with relevant experience are scarce and expensive, most telecom equipment manufacturers would prefer to buy a complete LTE solution which they can easily and cost effectively integrate into the LTE network elements in their portfolio. Like other telecom equipment, the LTE should have a fault tolerant configuration option and meet carrier requirements for high availability and serviceability. Many equipment manufacturers have adopted the open, carrier grade Advanced Telecom Computing Architecture (ATCA) and would benefit from a blade solution that could be readily integrated in spare slots of existing network elements, as well as offered as a standalone solution. Conclusion The explosion of mobile data applications has begun, and worldwide mobile operators are planning to migrate their networks to LTE. The new LTE networks will increase broadband capacity to support higher data rates, simplify network management, and lower transport costs. Whether operators choose to move directly to LTE or enhance their current generation networks with wireless offload applications, they must address the security issues associated with an all-ip network. The financial risk and reputation impact associated with any security breach in the early stages of a network rollout are too big to ignore. The 3GPP standards, including NDS, specify ways to secure user data and protect network elements, but leave many implementation decisions up to the operators. Network security is a major hurdle for LTE equipment vendors because the scope of potential breaches is large, the technology is complex, and engineers with relevant security expertise are scarce and expensive. The best solution is a turnkey security gateway that is flexible and scalable and can be cost effectively integrated to make new network rollouts secure from the outset. Glossary The following Glossary is in the order of the acronyms appearing in the paper. 3GPP: 3rd Generation Partnership Project ATCA: Advanced Telecom Computing Architecture CMP: Certificate Management Protocol DoS: Denial-of-Service enodeb: enhanced nodeb, LTE radio at a cellsite ESP: Encapsulating Security Payload HSPA: High Speed Packet Access IETF: Internet Engineering Task Force IKE: Internet Key Exchange IP: Internet Protocol IPsec: Internet Protocol Security I-WLAN: Interworking-Wireless Local Area Network LTE: Long Term Evolution (one flavor of 4G) NAT: Network Address Translation NDS: Network Domain Security P-GWY: Packet Gateway QoS: Quality of Service S1-U: User-plane (mobile) traffic between & LTE enodeb (cellsites) & Serving-Gateway (S-GWY) packet core elements SA: Security Association : Security Gateway S-GWY: Serving Gateway T1: Data Circuit Running at Mbit/s Line Rate TDM: Time Division Multiplexed WPA: Wireless Protected Access
6 6 References 1 Source: doc_id= Source: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, from February 9, 2010 found at US/solutions/collateral/ns341/ns525/ns537/ns705/ ns827/white_paper_c html. 3 network-acceleration/articles/95417-wifi-femtocellothers-help-mobile-data-offloading-research.htm. Corporate Headquarters 5435 Dawson Creek Drive Hillsboro, OR USA Fax Toll-Free: info@radisys.com 2011 Radisys Corporation. Radisys, Trillium, Continuous Computing and Convedia are registered trademarks of Radisys Corporation. *All other trademarks are the properties of their respective owners. October 2010
Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure
Oracle s Secure HetNet Backhaul Solution A Solution Based on Oracle s Network Session Delivery and Control Infrastructure HetNets are a gradual evolution of cellular topology, not a distinct network unto
More informationCisco Wireless Security Gateway R2
Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network
More informationWhy Is DPI Essential for Wireless Networks?
White Paper Why Is DPI Essential for Wireless Networks? By: Manish Singh, CTO Overview The biggest challenge network operators continue to face is how to keep up with seemingly insatiable demand for mobile
More informationThe LTE Challenge. for the Small-to- Midsize Mobile Network Operator
The LTE Challenge for the Small-to- Midsize Mobile Network Operator The next mobile generation is not just for Tier 1 carriers. How to tap into the business opportunities of LTE in Tier 2 and Tier 3 markets
More information1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7
Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview
More informationHow To Choose Radisys
ENABLING WIRELESS Infrastructure Solutions Radisys Your Trusted Partner As the world s networks evolve from 3G to 4G LTE and beyond, the wireless industry is accelerating into a period of unprecedented
More informationLethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well
White Paper Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well By: Manish Singh, CTO Overview The introduction of flat rate all-you-can-eat data plans was, if not the most important, a very
More information3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationImplementing ATCA Serving Gateways for LTE Networks
White Paper February 2010 Implementing ATCA Serving Gateways for LTE Networks By Karl Wale, Director of PLM and Sridharan Natarajan, Lead Engineer The ever-increasing demand for wireless broadband by mobile
More informationUse of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
More informationNokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
More informationSecurity Executive Summary. Securing LTE Radio Access Networks Effectively
Security Executive Summary Securing LTE Radio Access Networks Effectively LTE networks require a dedicated security solution As an all-ip technology, LTE brings new capabilities to improve the customer
More informationWi-Fi integration with cellular networks enhances the customer experience. White paper
Wi-Fi integration with cellular networks enhances the customer experience White paper Executive summary Contents Executive Summary 2 Mobile data services fuel 3 the traffic tornado Wi-Fi integration offers
More information10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
More informationPractical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
More informationSecurity Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
More informationALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS
QUICK LOOK ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS The Cisco RAN Optimization solution offers alternative radio access network (RAN) backhaul transport and data offload
More informationSubtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1
Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5
More informationHow to Ready your Mobile Backhaul
How to Ready your Mobile Backhaul Network for LTE LTE has outperformed service provider expectations, driven by end-user demand. That s a huge opportunity for operators if they commit to re-architecting
More informationLucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
More informationLTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationManaged 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service
Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless
More informationSecured VPN Models for LTE Backhaul Networks
Secured VPN Models for LTE Backhaul Networks Madhusanka Liyanage, Andrei Gurtov Centre for Wireless Communications University of Oulu, P.O. Box 45, FI-914 Oulu, Finland Email: [madhusanka, gurtov]@ee.oulu.fi
More informationThe Security Vulnerabilities of LTE: Opportunity & Risks for Operators
White Paper The Security Vulnerabilities of LTE: Opportunity & Risks for Operators A Heavy Reading Executive Overview Prepared by Patrick Donegan Senior Analyst, Heavy Reading www.heavyreading.com on behalf
More informationGPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
More informationSpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
More informationTechnical white paper. Enabling mobile broadband growth Evolved Packet Core
Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective
More informationWhite paper. Mobile broadband with HSPA and LTE capacity and cost aspects
White paper Mobile broadband with HSPA and LTE capacity and cost aspects Contents 3 Radio capacity of mobile broadband 7 The cost of mobile broadband capacity 10 Summary 11 Abbreviations The latest generation
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationIPV6 IN MOBILE NETWORKS
IPV6 IN MOBILE NETWORKS APNIC37 - TUTORIAL PRESENTATION TUESDAY 25/02/2014 TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 Sunny Yeung Senior Technology Specialist Telstra Wireless Data Engineering AGENDA 1. Why
More informationSingle Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS
White Paper Single Radio Voice Call Continuity (SRVCC) with LTE By: Shwetha Vittal, Lead Engineer Overview Long Term Evolution (LTE) is heralded as the next big thing for mobile networks. It brings in
More informationNokia Siemens Networks Flexi Network Gateway. Brochure
Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband
More informationMobile Network Security
A key component of Ericsson s Evolved IP Network solution Technology paper This document outlines the need for effective network security in response to increasing perceived threats, recent publicized
More informationOperator s Dilemma. How to take advantage of the growing mobile Internet. Notava uaxes White Paper. Dr. Risto Suoranta, CTO, Notava
Operator s Dilemma How to take advantage of the growing mobile Internet Notava uaxes White Paper Dr. Risto Suoranta, CTO, Notava Antti Lappeteläinen, uaxes product m anager, Notava. May 2010 V1.0 Executive
More informationHIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,
More informationAn Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
More informationU.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD
U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless
More informationDiameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
More informationVerizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions
Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport
More informationNokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi
Nokia Networks Voice over Wi-Fi White paper Nokia Networks white paper Voice over Wi-Fi Contents 1 Why consider VoWiFi? 3 2 User experience requirements 4 3 Mobile operator vs. OTT services 5 4 VoWiFi
More informationUsing DPI to Increase ARPU Despite Flat-Rate Plans
White Paper Using DPI to Increase ARPU Despite Flat-Rate Plans By: Todd Mersch, Director of Product Line Management Overview It is undeniable that the primary source of revenue growth for mobile operators
More informationEfficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationCisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
More informationRadisys Integrated Conferencing Solution Improves Economics and Flexibility in Next- Generation Architecture
Radisys Integrated Conferencing Solution Improves Economics and Flexibility in Next- Generation Architecture Case Study Industry/Market Hosted Conferencing Services in Asia Pacific. The Challenge Reduce
More informationNetwork Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07
Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements
More informationBringing Mobile Broadband to Rural Areas. Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks
Bringing Mobile Broadband to Rural Areas Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks Agenda Drivers in Mobile Broadband Why LTE? Market Status, Networks and Devices Implementation
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationWHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
More informationFMC (Fixed Mobile Convergence)
FMC (Fixed Mobile Convergence) What About Security? Vancouver June 2008 Franck Veysset, Orange Labs Firstname.lastname at orange-ftgroup dot com Agenda Introduction - FMC? WIFI-SIP overview UMA overview
More informationGSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
More informationA compelling Multiservice IP Backbone use case
Nokia Networks The Mobile Packet Backbone Network A compelling Multiservice IP Backbone use case Nokia Networks white paper The Mobile Packet Backbone Network Executive summary The mobile communications
More informationHow to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
More informationGPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
More information4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
More informationMultimedia Conferencing Solutions
Multimedia Solutions Fixed users are migrating to... Mobile Audio users are migrating to... Video CSPs are migrating to... Radisys ECONOMICAL FLEXIBLE RELIABLE DIFFERENTIATED INTEGRATED SCALABLE The conferencing
More informationOptimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan
More informationA Uni ed Wireless Strategy for Cable Operators
Cable operators (MSOs) are leveraging the use of unlicensed Wi-Fi spectrum to enable reliable and persistent wireless access for their customers. This involves integrating Wi-Fi capabilities into the cable
More informationALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE
ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports
More informationLTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
More informationSimplified network architecture delivers superior mobile broadband
White paper Simplified network architecture delivers superior mobile broadband Profitable wireless broadband with Internet-HSPA Contents 3 Executive Summary 4 Mobile data traffic is growing strongly 5
More informationApplication Note License-Exempt Gigabit Ethernet Microwave Radio Applications
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services
More informationRIDE-IT System Overview
RIDE-IT System Overview 2 BROADBAND BUS ROUTER Dragontech Systems www.dragontech.hk Demands on Operator Enabling with Broadband Connectivity 3 SAFETY CUSTOMER SERVICE BUS OPERATIONS IT EFFICIENCY On-Board
More informationRouting Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationHSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011
HSPA, LTE and beyond The online multimedia world made possible by mobile broadband has changed people s perceptions of data speeds and network service quality. Regardless of where they are, consumers no
More informationVirtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA
Virtualization techniques for redesigning mobile backhaul networks: challenges and issues Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA MobiArch 2015 September 7, 2015 Outline 1 2 3 Introduction Convergent
More informationSession Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
More informationWireless & Mobile. Working Group
Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...
More informationTraffic. Data Dominant. Time. Figure 1. Wireless network traffic timescale
TESTING LIFECYCLE OF A MOBILE BACKHAUL NETWORK By Bruno Giguère, Member of Technical Staff, Transport and Datacom Business Unit In wireless network technology, mobile backhaul services are used to transport
More informationA Business Case for Scaling the Next-Generation Network with the Cisco ASR 9000 System: Now with Converged Services. Key Takeaways.
A Business Case for Scaling the Next-Generation Network with the Cisco ASR 9000 System: Now with Converged Services Executive Summary In a previous whitepaper ACG Research described the business case for
More informationBusiness Case for S/Gi Network Simplification
Business Case for S/Gi Network Simplification Executive Summary Mobile broadband traffic growth is driving large cost increases but revenue is failing to keep pace. Service providers, consequently, are
More informationDeploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series
Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying
More informationSignaling is growing 50% faster than data traffic
Signaling is growing 50% faster than data traffic To enable future-proof mobile broadband networks, Nokia Siemens Networks has designed its Evolved Packet Core to handle high signaling load. 2/8 Signaling
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationColt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN
More informationClavister Small Cell Site Security Solution
clavister SolutionSeries Clavister Small Cell Site Security Distributed operator environment Clavister small cell site security solution SOLUTION AT-A-GLANCE Clavister Small Cell Security Gateway offers
More informationSATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA
SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA Introduction Mobile operators in emerging markets are under pressure to extend their services in rural areas. Either their markets are becoming mature,
More informationEnterprise Connectivity over Mobile Broadband
NSN White paper October 2013 Enterprise Connectivity over Mobile Broadband Enabling Carrier Ethernet over LTE Networks CONTENTS Executive Summary 2 Market Trends 3 Target Customers 6 Proposed Solution
More informationMobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca
Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects
More informationEudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to
More informationHow To Make A Secure Ip Based Service Available To A Network (Ip) From A Cell Phone Or Ip) From An Ip Device (Ipv) Or Ipv (Ips) From The Cell Phone (Ipa) Or From A P
Solutions White Paper Delivering Secure IP-Based Services Jasomi Uses Intel Technology and AdvancedTCA for Its High-End Carrier and IMS Session Border Controller Table of Contents Business Challenge...
More informationRethinking the Small Cell Business Model
CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1
More informationIntel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
More informationLTE Security How Good Is It?
LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology
More informationTop 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment
White Paper Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment As 1800 MHz has emerged as the main band for Long-Term Evolution (LTE) network deployments (LTE1800), LTE is going
More informationGigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
More informationMNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction
MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction Wireless communications have evolved rapidly since the emergence of 2G networks. 4G technology (also called LTE), enables to answer the new data market
More informationMobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
More informationSecurity MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.
Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for
More informationSoftware-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters
Software-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters Present-day carrier network operators are faced with the challenge
More informationCellular Backhaul: Extending the Edge of the Network November 2008
Cellular Backhaul: Extending the Edge of the Network November 2008-0 - Introduction The global demand for voice and data services delivered over cellular networks continues to grow as new markets open
More informationHow QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled
NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More informationConnecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
More informationWHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
More information