Building Robust Signaling Networks

Size: px
Start display at page:

Download "Building Robust Signaling Networks"

Transcription

1 ericsson White paper Uen July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept of three protection lines provides operators with a robust and scalable network architecture beyond the capabilities of existing overload protection mechanisms at node level. Applying this concept enables mobile networks to handle the growth in signaling without unnecessary over-dimensioning, and ensures service delivery to consumers even in cases of heavy signaling load, node failures and malicious activities that lead to signaling storms.

2 Introduction Today s consumers increasingly expect high availability from communication and data services. In this environment, network failure scenarios can trigger a massive amount of signaling a signaling storm caused by automatic reconnection requests from multiple connected devices. Robust and scalable network solutions are therefore required to optimize operator revenue and maximize the consumer experience. This white paper discusses best practices, and provides recommendations for building highly scalable and robust signaling networks. A robust and distributed signaling network provided by the concept of three protection lines will be introduced as the recommended network architecture. This concept provides a scalable and robust signaling network beyond the capabilities of existing network protection mechanisms at node level. The principles presented in this paper are valid for Signaling System #7-based and Diameter-based signaling. However, the paper will focus solely on Diameter signaling, which is an important control protocol for LTE networks and IMS. BUILDING ROBUST SIGNALING NETWORKS INTRODUCTION 2

3 Challenges for the signaling network Current developments in telecommunication technologies and markets stress the importance of having flexible and robust congestion control mechanisms in order to maximize performance and service availability. The traditional approach of protecting individual nodes has been around since the introduction of GSM overload in the network is addressed with dedicated protection mechanisms in overloaded nodes. Standardization bodies promoted these protection mechanisms, which became widely adopted in the industry. These mechanisms served their purpose successfully, until they were confronted with an increased complexity of mobile networks and new usage scenarios not considered in earlier specifications. Nowadays, a constellation of different network access technologies, such as 2G, 3G, LTE, Wi-Fi and fixed, coexist to provide seamless access to voice and data services. The huge penetration of smartphones has dramatically increased data consumption and bandwidth requirements, and smartphone subscriptions will more than double from now until 2020 [1]. The emergence of the Internet of Things (IoT) means networks must simultaneously face up to new usage scenarios, which in some cases drastically increase signaling demands. In addition, these connected devices can be a source of signaling storms in cases of simultaneous connection requests after network disturbances. The continuous modernization of operator networks, with increasing centralization of resources in higher-capacity systems, implies that signaling storms have a bigger impact on the networks, as incidents on centralized resources are likely to affect a larger number of users. Affected users will perform reattempts, thereby initiating a snowball effect that could overload the signaling network multiple times. As Figure 1 summarizes, signaling networks therefore face significant challenges. As a result, operators are demanding new overload protection mechanisms to enable them to provide the generally accepted five nines, or even greater network availability. The journey that the industry has initiated toward cloud computing, with the transformation of the current network nodes into virtualized network functions (VNFs), seems at first glance to be a handy solution to cope with signaling storms in the network. The reality, however, is quite different, as this approach may generate an illusion of infinite resources and lead to underestimation of the importance of overload protection mechanisms. Scaleout mechanisms in the cloud will provide increased flexibility to handle steady growth, although these would not be fast enough to cope with sudden signaling peaks, which will escalate quicker than the network functions can cope with. WLAN 2G,3G, Fixed LTE Multiple access technologies Subscribers move instantly between access technologies Smartphone subscriptions The number of smartphone subscriptions is constantly increasing Increasing network complexity requires a higher amount of signaling P- CSCF SGSN MME PGW Figure 1: Challenges for the signaling network. Network complexity DSC Data traffic growth HSS OCS PCRF Growth in data traffic implies more signaling traffic Centralization of resources Node outages affect more subscribers Internet of Things More connected devices impose new traffic patterns upon the signaling network BUILDING ROBUST SIGNALING NETWORKS CHALLENGES FOR THE SIGNALING NETWORK 3

4 Under these circumstances, it is clear that the protection strategies that have been standardized and widely adopted in mobile networks are no longer sufficient. High-traffic peaks and network failure scenarios can result in massive signaling storms, leading to lengthy outages of network services. In its Annual Incident Reports 2012, ENISA (the European Union Agency for Network and Information Security) reports that there were 79 major telecom outages in 2012 [2]. System failures were the root cause of 75 percent of these incidents. Each overload-related incident affected an average of around 9.4 million user connections. One of the biggest effects of network outages and service degradation is the increase in the rate of subscriber churn. At the same time, operators spend USD 15 billion a year to overcome network outages and service degradations [3]. On average, operators spend 1.5 percent of their annual revenues on dealing with these issues. Some even estimate this figure to be as high as 5 percent. One strategy to mitigate overload problems is to over-dimension the network for the peak signaling load. This adds complexity and implies higher opex and capex, leading to an additional financial burden that puts an operator in a less competitive position. On the other hand, it seems to be a feasible strategy to cover up for signaling peaks that are two to three times above the average traffic load. But when a signaling storm occurs, the load can easily increase 10 times above the average, stretching the need for overdimensioning to unrealistic limits. In addition, over-dimensioning the network does not eliminate the risk of a reduction in the overall signaling capacity. A typical node behavior during overload is depicted in Figure 2. Up to the engineered capacity, the message throughput is in line with the offered traffic, and it still increases slightly when overload is reached. In cases of massive overload, however, the throughput drops heavily with a further increase in the offered load. Another strategy to address overload is to blindly reject signaling messages. The problem with this strategy is that the throughput of successful services delivered to the consumer is heavily reduced, even if only a small percentage of messages are rejected, as depicted in Figure 3. For instance, a successful VoLTE call requires the successful processing of roughly 20 signaling sequences. If only one message in this sequence is rejected, the call will be discarded. The recommended strategy is to aim for a robust and scalable network architecture. The chosen network architecture and protection mechanisms need to be capable of handling the growth in signaling without unnecessary overdimensioning, as well as ensuring service delivery to consumers during cases of heavy signaling load, node failures and malicious activities that lead to signaling storms. Processed throughput Engineered capacity Normal operation Overload Engineered capacity Figure 2: Processed throughput in relation to offered load. Success rate Consumer service delivery 100% Rejected consumer service delivery Increasing number of messages needed per service delivery Rejected signaling traffic 100% With standard node level overload control Figure 3: Success rate of the signaling traffic in relation to the consumer service delivery. Offered load 100% success rate of the signaling traffic refers to 100% success rate of the consumer service delivery A small reduction in signalling success rate leads to a huge reduction in consumer service delivery Success rate signaling traffic BUILDING ROBUST SIGNALING NETWORKS CHALLENGES FOR THE SIGNALING NETWORK 4

5 End-to-end strategy and principles to achieve robust signaling networks The objectives for a robust signaling network are: > > to reduce the network impact of smartphone and device signaling > > to maximize throughput in cases of overload > > fast recovery from overload and failure scenarios > > maintainability of the signaling network > > scalability of the signaling network. A robust and distributed signaling network should be based on the following end-to-end strategy and principles: > > careful network architecture to provide the basis for a robust and scalable signaling network. > > optimize the signaling traffic and minimize the amount of signaling to manage the network services > > a distributed and coordinated overload protection mechanism across several network elements to maximize the throughput in peak load scenarios. NETWORK ARCHITECTURE The signaling network architecture characteristics should be based on simplicity by using the right amount of infrastructure and features to get a manageable network entity. The signaling network should be divided into manageable smaller components. Modular network design enables operators to isolate problems within a module, while the rest of the network continues to function. This means fewer users are affected and the overall uptime of the network is increased. The basic mechanism to prevent physical failure of the transport plane is redundant components and more than one possible physical path to reach the destination client originating from the source client via the transport network. QoS can be used to prevent control-plane failure. Best performance is achieved in overload or failure situations when the overload protection is distributed across several network elements. Each network element on its own should be redundant. The availability of the network elements can be further enhanced when redundant node types are deployed in different geographical places. Scalability should be supported on node and network level with the aim of: > > managing the growth in signaling traffic efficiently > > being flexible to extend an established network configuration > > having a long-term strategy to resolve overload cases. OPTIMIZATION One aim of optimization is to minimize the signaling, and by this to reduce the network impact of smartphone and device signaling. Recommended ways to achieve this are: > > to reduce paging traffic by starting paging in last known location for non-time-critical traffic before the paging request is extended to other parts of the network > > to limit the effect of LTE idle timer decrease in the user equipment (UE) by only performing authentication at every 10th or 20th connection setup, due to the increased number of connection setup requests from the UE > > to drop or reject excess traffic from misbehaving UE > > to drop or reject traffic from malicious attacks. BUILDING ROBUST SIGNALING NETWORKS END-TO-END STRATEGY AND PRINCIPLES TO ACHIEVE ROBUST SIGNALING NETWORKS 5

6 A second aspect of optimization is to distribute the load evenly in the network. One recommendation is to build an appropriate structure with pooled network resources for easy capacity expansion and even load distribution. This allows for a much more efficient use of network resources. DISTRIBUTED AND COORDINATED OVERLOAD CONTROL Each network element should provide a working overload control mechanism to prevent its own resources from being overloaded. This is also an essential function for pooled resources, as there would otherwise be a risk that a peak in the signaling traffic could bring down one pooled device after the other. At network level, overload should be handled as closely to the overload source as possible to minimize recovery time. A propagation of the signaling peak in the network must be prevented at any cost in order to avoid a service outage on a larger scale. An example of a propagation of a signaling peak is described below. After a major network outage, which could be the result of a transport network or Mobility Management Entity (MME) failure, a large number of UEs will discover the network and try to re-attach again to it. This multitude of reattaches causes a signaling storm, which will affect large parts of the network. Typical signaling scenarios under such circumstances are: > > The MME completes the authentication process, updates the location in the Home Subscriber Server (HSS), and reestablishes the bearers. > > The serving gateway must also recreate the bearers. > > The packet data network gateway (PDN-GW) recreates the bearers and reestablishes sessions to, for example, the policy and charging rules function (PCRF). > > New full IMS registration is needed for VoLTE UE. > > The HSS needs to provide authentication information to the MME and register the location (additional transactions are needed for IMS registration for VoLTE subscribers). During overload, the signaling throughput can be optimized by intelligent traffic prioritization. Ways of achieving intelligent traffic prioritization are given below. > > Adding some application logic to the traffic management function of dedicated nodes in the network can enable the nodes to determine whether a signaling message belongs to a new subscriber transaction or an ongoing subscriber transaction. In cases of overload, the message triggering a new subscriber transaction will be rejected in favor of the message related to an ongoing subscriber transaction. This will optimize the throughput at the application level. > > Signaling traffic in overload situations can be prioritized based on importance, such as emergency calls and priority services, ahead of delay tolerant access, such as energy meters. > > An overload protection system should be adaptive to the current situation and allow higher throughput when the overload eases, and throttle more of the traffic as the overload gets worse. Using fixed rate throttling limits will not fulfill requirements for different situations. In some overload scenarios, the network can handle more traffic and in others much less. > > The throughput of the system under overload can be optimized by the concept of throughput elasticity, where the latency is allowed to increase. However, it is important that the maximum available latency budget is never exceeded on an end-to-end level. BUILDING ROBUST SIGNALING NETWORKS END-TO-END STRATEGY AND PRINCIPLES TO ACHIEVE ROBUST SIGNALING NETWORKS 6

7 Distributed signaling network robustness the concept of three protection lines The principles to achieve a robust signaling network are best represented in the network architecture depicted in Figure 4. A robust and distributed signaling network should follow the concept of three protection lines to protect the operator s service offering from being affected by a signaling storm. The first protection line comprises the components that act as entry points to the core network for smartphone and device signaling. Examples are the Serving GPRS Support Node Mobility Management Entity (SGSN-MME), the proxy call session control function (P-CSCF) and the PDN-GW. The second line of protection consists of the nodes providing routing capabilities for the signaling traffic. It is typically represented by a Diameter Signaling Controller (DSC) or a Signaling Transfer Point. The third line of protection is represented by the end systems hosting the application data and logic. User data management systems such as the HSS are assigned to this third line of protection. The three lines of protection provide: Minimize signaling traffic Optimize signaling Distribute load evenly Use network resources efficiently Distributed overload protection Scalable and maintainable network architecture > > distributed network architecture to allow for an end-to-end overload protection solution in distributed layers > > the ability to cover up failures, misconfiguration or misoperation evident in one protection line in the next, higher protection line > > maximized signaling throughput during overload conditions > > scalable and maintainable network architecture > > efficient use of network resources by distributing the signaling load evenly in the network > > optimized signaling procedures to minimize the signaling traffic. FIRST PROTECTION LINE The SGSN-MME being part of the Evolved Packet Core (EPC) is an example of the first line of protection. > > Representing the entry point to the core network, the EPC is closest to potential overload End-to-end overload protection solution 1 st line 2 nd line 3 rd line P- CSCF SGSN MME PGW DSC Scalability and maintainability Figure 4: Network picture of distributed signaling network robustness the concept of three protection lines. HSS OCS PCRF Backup always available Maximize throughput If one layer fails, another can take over Maximize throughput under overload conditions BUILDING ROBUST SIGNALING NETWORKS DISTRIBUTED SIGNALING NETWORK ROBUSTNESS THE CONCEPT OF THREE PROTECTION LINES 7

8 sources outside of the core network. The most efficient way to minimize the recovery time is to apply optimization and overload protection of the signaling traffic in the first protection line. > > Nodes in the EPC aim to optimize the signaling. One strategy is to perform smart and adaptive paging to minimize the number of paging requests. A second strategy is to limit excessive signaling from dedicated UE. > > Nodes in the EPC should have a proven overload protection function that shields the nodes from failure and ensures high throughput during extreme overload. This is achieved by proper prioritization of services and subscribers, and distinguishing between initial traffic for a subscriber and subsequent signaling. SECOND PROTECTION LINE An example of the second line of protection is the DSC hosting the function of a Diameter Agent as specified in RFC 6733 Diameter Base Protocol. > > A Diameter Agent simplifies the network architecture and reduces the number of connections that need to be maintained in the network. The DSC acts as a centralized signaling router in the network. > > The Diameter Agent itself should provide a proven overload protection mechanism and be able to process offered traffic that exceeds the dimensioned capacity of the node multiple times in cases where the first protection line cannot sufficiently limit a traffic peak. > > The Diameter Agent should provide load balancing capabilities toward other interfacing Diameter peers. This ensures optimal usage of network elements and reduces load peaks on dedicated Diameter servers such as the PCRF, the online charging system, and the HSS, which typically reside in the third protection line. > > The load balancing function should consider the varying capacity of the interfacing Diameter peers. > > The load balancing function could steer the preference for which Diameter peers are primarily used as the routing target, and by this opt for local servers over remote servers. > > Nevertheless, the load balancing function could be modified dynamically considering the actual traffic sent, which would actively reduce traffic peaks that would be otherwise sent to already overloaded diameter peers. > > The Diameter Agent should provide traffic shaping capabilities for interfacing Diameter servers or clients. This actively prevents the propagation of signaling storms in the network. > > By traffic shaping outgoing diameter traffic, the Diameter Agent prevents overloading interfacing servers. It thus offers further protection to peers against potential signaling bursts from nodes inside the network or from roaming partners. > > By traffic shaping incoming diameter traffic, the Diameter Agent prevents Diameter clients from abusively using network resources beyond operator-determined limits. One of the paramount examples is a restarting MME node that could flood the HSS servers, causing deterioration to the services of all other MME nodes. > > Typically, a Diameter Agent has very limited knowledge of the semantics of Diameter applications. To prioritize traffic in an intelligent way, the Diameter Agent could be configured with semantically relevant data, so that in congestion situations, messages of ongoing sessions can be treated with higher priority than messages related to new sessions. This adds the capability to perform application-aware traffic management in the Diameter Agent. > > The Diameter Agent is also in control of all Diameter interfaces in a network. An overload indication on one interface can lead to a reduction of traffic on another interface. In cases where a charging server becomes overloaded, the DSC can initiate throttling on initial attach messages. This reduces the number of new subscribers following the principle of addressing overload protection as close to the source of overload as possible. THIRD PROTECTION LINE User data management systems and, in particular, user databases sit at the end of the signaling chain. During a network overload scenario, user databases will therefore naturally be under pressure, likely becoming the first overloaded component in the network. On the other hand, user databases are the heart of telecommunications networks in the sense that they are vital to deliver consumer services, and a failure or degradation of the user database performance might compromise the complete network. In the user data management space, 3GPP standardized a BUILDING ROBUST SIGNALING NETWORKS DISTRIBUTED SIGNALING NETWORK ROBUSTNESS THE CONCEPT OF THREE PROTECTION LINES 8

9 data-layered architecture named User Data Convergence [4]. In this architecture, traditional network databases in the core network such as the home location register (HLR), the HSS, authentication, authorization and accounting (AAA), and the policy controller are split into Application Front Ends (AFEs), which handle the business logic, and a user data repository (UDR), which takes the role of the user database storing the user data. In order to minimize the severity and duration of overload incidents, user data management systems should: > > secure their availability and user data integrity at all times, no matter how severe the overload incident might be. For that purpose, overload protection functionalities are a must for both AFEs and UDRs. > > maximize end-to-end useful throughput during overload. Different complementary strategies can be applied, such as: > > ensuring throughput elasticity during overload with adequate latency tradeoff > > intelligent traffic throttling: cooperative load regulation in the user data management systems (Front End (FE) and UDR). As previously described in Figure 2, a system will typically experience throughput degradation with increasing levels of overload, and databases are not an exemption. User data management systems require a more intelligent throttling of excess traffic during overload to ensure that resources from the UDR are fully utilized to process useful end-to-end traffic. The cornerstone of this mechanism is the cooperation between the AFEs in the network, such as the HLR, the HSS, AAA and the UDR. The UDR should constantly monitor the resource utilization levels, such as the response time and length of the buffers. As soon as some of the resources reach their limit, the situation is reported back to the AFE as an overload indication. Based on the overload indication sent from the UDR, the AFEs should throttle the traffic according to the following principles: Processed throughput (MAP, diameter) Maximum throughput Engineered capacity Dimensioned capacity Normal operation Overload Engineered capacity > > The most important signaling messages are not throttled. > > Ongoing operations that involve several messages to the UDR are prioritized over new operations. Typically, a Mobile Application Part (MAP)/Diameter operation received in the AFE involves several messages sent to the UDR. The throttling level should be continuously adjusted based on a dynamic and real-time feedback loop. This ensures the UDR always performs to its maximum capacity and avoids the throughput degradation caused by devoting resources to rejecting the excess traffic. Figure 5 shows the expected behavior of a user data management system with cooperative load regulation between AFE, and a UDR with throughput elasticity during overload as compared with a standard system. With standard node level UDR overload control Figure 5: Overload performance behaviour of a user data management system (AFE+UDR) with cooperative load regulation. With AFE-UDR intelligent throttling Offered load (MAP, diameter) BUILDING ROBUST SIGNALING NETWORKS DISTRIBUTED SIGNALING NETWORK ROBUSTNESS THE CONCEPT OF THREE PROTECTION LINES 9

10 Conclusion Operators are confronted with increasing complexity in mobile networks. At the same time, signaling traffic is continuously increasing, driven by the growth of smartphone traffic and new usage scenarios presented by the IoT. The performance and availability of the signaling network are essential for service delivery to the customer. Existing overload protection mechanisms that only focus on dedicated overloaded nodes cannot prevent larger-scale outages. Any outages in the signaling network will lead to service interruptions, causing financial losses and increasing the risk of subscriber churn. A robust and distributed signaling network that follows the concept of three protection lines provides an end-to-end overload protection solution that fulfills the objectives of a robust signaling network. A robust and scalable network architecture, optimization of the signaling traffic, and a distributed and coordinated overload protection mechanism boosts the availability of the signaling network beyond today s measures. BUILDING ROBUST SIGNALING NETWORKS CONCLUSION 10

11 References [1] Ericsson, February 2015, Ericsson Mobility Report, Mobile World Congress Edition, available at: [2] ENISA (European Union Agency for Network and Information Security), August 2013, Annual Incident Reports 2012, available at: annual-incident-reports /annual-incident-reports-2012/at_download/fullreport [3] Heavy Reading, October 2013, Mobile Network Outages & Service Degradations: A Heavy Reading Survey Analysis, available at: code=&next_url=%2flist.asp%3fpage_type%3dall_reports [4] 3GPP TS , accessed June 2014, User Data Convergence (UDC); Technical realization and information flows; Stage 2, available at: BUILDING ROBUST SIGNALING NETWORKS REFERENCES 11

12 GLOSSARY AAA AFE DSC ENISA EPC FE HLR HSS IMS IOT MAP MME OCS PCRF P-CSCF PDN-GW SGSN Signaling Network UDR UE VNF authentication, authorization and accounting Application Front End Diameter Signaling Controller European Union Agency for Network and Information Security Evolved Packet Core Front End home location register Home Subscriber Server IP Multimedia Systems Internet of Things Mobile Application Part Mobility Management Entity Online Charging System policy and charging rules function proxy call session control function packet data network gateway Serving GPRS Support Node Part of a telecommunications network carrying signaling traffic user data repository user equipment virtualized network function 2015 Ericsson AB All rights reserved BUILDING ROBUST SIGNALING NETWORKS GLOSSARY 12

Evolved Packet Core features build resiliency and preference

Evolved Packet Core features build resiliency and preference High Availability is more than five nines Evolved Packet Core features build resiliency and preference The availability of mobile broadband service has become essential to daily life. Without their smartphones,

More information

Network functions virtualization and software management

Network functions virtualization and software management ericsson White paper Uen 284 23-3248 December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a

More information

SERVICE CONTINUITY. Ensuring voice service

SERVICE CONTINUITY. Ensuring voice service SERVICE CONTINUITY FOR TODAY S Voice over LTE SUBSCRIBERS Ensuring voice service with Single Radio Voice Call Continuity (SR-VCC) TECHNOLOGY White Paper Subscribers expectations for mobile data services

More information

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks BROADBAND UKRAINE: 12th June 2013, Kiev, Ukraine FOKUS Center for Next Generation Network Infrastructures (NGNI) Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile

More information

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ] [ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting

More information

464XLAT in mobile networks

464XLAT in mobile networks STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address

More information

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April

More information

Nokia Siemens Networks Flexi Network Gateway. Brochure

Nokia Siemens Networks Flexi Network Gateway. Brochure Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband

More information

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number

More information

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015 ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits

More information

APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK

APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK How operators can leverage ADCs to deploy scalable, virtualized networks and enable new business models Prepared by Signals Research

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit

NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit NFV & SDN World Practical Approaches to NFV Orchestration Deployment Terry McCabe CTO Mobile Business Unit May 2015 Mitel 2 2015 Mitel. Proprietary and Confidential. Mavenir 4G Customer Launches Mavenir

More information

Virtual CPE and Software Defined Networking

Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Demo 1. Network Path and Quality Validation in the Evolved Packet Core Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer

More information

UDC IN A BOX. A complete User Data Management Solution to meet different business needs

UDC IN A BOX. A complete User Data Management Solution to meet different business needs UDC IN A BOX A complete User Data Management Solution to meet different business needs Contents ENABLING CUSTOMER CENTRIC NETWORKS MORE THAN WHAT MEETS THE EYE CONCLUSION GLOSSARY FURTHER READING 2 4 6

More information

Business Case for Juniper Networks Virtualized Mobile Control Gateway

Business Case for Juniper Networks Virtualized Mobile Control Gateway Business Case for Juniper Networks Virtualized Mobile Control Gateway Executive Summary Mobile traffic growth is exploding in response to the worldwide uptake in smartphone sales. At the same time new

More information

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office

More information

4G Mobile Networks At Risk

4G Mobile Networks At Risk 07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis

More information

Securing the Interconnect Signaling Network Security

Securing the Interconnect Signaling Network Security Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has

More information

Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues

Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Diameter Interworking Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Table of Contents Introduction..................................... 3 Business

More information

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles

More information

Network Functions Virtualization (NFV) for Next Generation Networks (NGN)

Network Functions Virtualization (NFV) for Next Generation Networks (NGN) P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform

More information

Get the best performance from your LTE Network with MOBIPASS

Get the best performance from your LTE Network with MOBIPASS Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network

More information

An Oracle White Paper December 2013. The Time for Diameter Is Now: Why Service Providers Should Implement Diameter Today

An Oracle White Paper December 2013. The Time for Diameter Is Now: Why Service Providers Should Implement Diameter Today An Oracle White Paper December 2013 The Time for Diameter Is Now: Why Service Providers Should Implement Diameter Today Introduction There is little secret about how smartphones and tablets are affecting

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Approaching these challenges with the right tools and solutions is critical for mobile operators success on the evolution to LTE.

Approaching these challenges with the right tools and solutions is critical for mobile operators success on the evolution to LTE. A Smart Approach To Signalling Challenges On The Road To LTE Flavio Muscetra, Senior Product Manager Executive Summary Over the past few years we have witnessed a radical shift in the way customers use

More information

Session Border Controllers: Addressing Tomorrow s Requirements

Session Border Controllers: Addressing Tomorrow s Requirements White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction

More information

Supporting mobility in the RAN cloud

Supporting mobility in the RAN cloud Supporting mobility in the RAN cloud Michael Fitch BT 23 rd October 2012 Cloud basics On-Demand Self-Service A consumer can provision computing capabilities, such as server time and network storage, automatically

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless

More information

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical

More information

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com 1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

Krishan Sabnani Bell Labs. Converged Networks of the Future

Krishan Sabnani Bell Labs. Converged Networks of the Future Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation

More information

3G/Wi-Fi Seamless Offload

3G/Wi-Fi Seamless Offload Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...

More information

DATA-DRIVEN EFFICIENCY

DATA-DRIVEN EFFICIENCY DATA-DRIVEN EFFICIENCY Combining actionable information with market insights to work intelligently and reduce costs ACTIONABLE INTELLIGENCE Ericsson is driving the development of actionable intelligence

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

LTE Mobility Enhancements

LTE Mobility Enhancements Qualcomm Incorporated February 2010 Table of Contents [1] Introduction... 1 [2] LTE Release 8 Handover Procedures... 2 2.1 Backward Handover... 2 2.2 RLF Handover... 3 2.3 NAS Recovery... 5 [3] LTE Forward

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

LTE Performance and Analysis using Atoll Simulation

LTE Performance and Analysis using Atoll Simulation IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally

More information

Signaling is growing 50% faster than data traffic

Signaling is growing 50% faster than data traffic Signaling is growing 50% faster than data traffic To enable future-proof mobile broadband networks, Nokia Siemens Networks has designed its Evolved Packet Core to handle high signaling load. 2/8 Signaling

More information

Nokia Siemens Networks Flexi Network Server

Nokia Siemens Networks Flexi Network Server Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted

More information

Integrating Lawful Intercept into the Next Generation 4G LTE Network

Integrating Lawful Intercept into the Next Generation 4G LTE Network Integrating Lawful Intercept into the Next Generation 4G LTE Network All telecommunication providers that currently or plan to provide 4G LTE service to their customers must consider significant changes

More information

ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE

ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

Application Performance Management

Application Performance Management Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for

More information

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) kolee@etri.re.kr, hsong@etri.re.kr Abstract.

More information

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper > A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

The Need for Session Delivery Networks

The Need for Session Delivery Networks Executive Summary Service providers, enterprises and contact centers continue to build IP-based infrastructure to lower their operating costs and introduce new IP-enabled offerings such as VoIP, video-over-ip

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

White Paper Traffix Systems October 2011

White Paper Traffix Systems October 2011 White Paper Traffix Systems October 2011 Focus on the Control Plane for Optimal 4G Performance The Emerging Centrality of Signaling as a Business Enabler By Ben Volkow CEO Traffix Systems CONTACT: info@traffixsystems.com

More information

Advanced SIP Series: SIP and 3GPP

Advanced SIP Series: SIP and 3GPP Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,

More information

Convergent data center for future network

Convergent data center for future network Convergent data center for future network Xia zhen hua (Lawrence Hsia) Huawei Technologies xiazhenhua@huawei.com Abstract In this article, we will analyze current issues and new challenges on user profile,

More information

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C * VoLTE esrvcc VSRVCC Inter-domain Handover Technologies in LTE for Voice (VoLTE) and TV Phone A data communication service called Xi (Crossy) has started in LTE. In the future, voice and TV phone services

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical

More information

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration. IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab. How to deal with a thousand nodes: M2M communication over cellular networks A. Maeder NEC Laboratories Europe andreas.maeder@neclab.eu Outline Introduction to M2M communications The M2M use case landscape

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions

More information

A Proposed Model For QoS guarantee In IMSbased Video Conference services

A Proposed Model For QoS guarantee In IMSbased Video Conference services International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical

More information

White paper. Business Applications of Wide Area Ethernet

White paper. Business Applications of Wide Area Ethernet White paper Business Applications of Wide Area Ethernet 1 Introduction When enterprises use Ethernet as a wide area networking solution, they have the potential to realize significant gains in network

More information

Voice over IP is Transforming Business Communications

Voice over IP is Transforming Business Communications White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support

More information

ADVOSS SIP APPLICATION SERVERS

ADVOSS SIP APPLICATION SERVERS ADVOSS SIP APPLICATION SERVERS PRODUCT DATA SHEET COPYRIGHT ADVOSS.COM, 2007 2011 ALL RIGHTS RESERVED This document is property of AdvOSS Page 1 TABLE OF CONTENTS 1 AdvOSS SIP Application Servers... 3

More information

TO PACKET CORE. EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE

TO PACKET CORE. EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE The JOURNEY TO PACKET CORE Virtualization EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE TechNOLOGY White Paper In their efforts to become more competitive, mobile network operators (MNOs) have begun

More information

Dialogic BorderNet Session Border Controller Solutions

Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller

More information

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Spirent CLEAR Mobility. End-to-End Mobile Network Infrastructure Test and Lab Automation Solutions

Spirent CLEAR Mobility. End-to-End Mobile Network Infrastructure Test and Lab Automation Solutions End-to-End Infrastructure Test and Lab Automation Solutions End-to-End Infrastructure Test and Lab Automation Solutions Customer Experience Automating end-to-end user experience of data, voice and video

More information

Networking Technologies for 5G

Networking Technologies for 5G The Fifth Generation Mobile Communications Promotion Forum (5GMF) Networking Technologies for 5G Network Architecture Committee 5GMF AWG-18 Kyoto, Japan 9 Mar. 2015 1/32 Contents 1. Mission of the network

More information

Control Plane Orchestration: The Evolution of Service Innovation Attributes

Control Plane Orchestration: The Evolution of Service Innovation Attributes White Paper Control Plane Orchestration: The Evolution of Service Innovation Attributes Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.dialogic.com June 2014

More information

Uninterrupted Internet:

Uninterrupted Internet: Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover White Paper Page 1 Table of Contents Executive Summary... 3 Considering The Options: Upgrades, Redundancy and

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

Multi-protocol Label Switching

Multi-protocol Label Switching An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is

More information

Acme Packet Net-Net SIP Multimedia-Xpress

Acme Packet Net-Net SIP Multimedia-Xpress Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering

More information

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information