Data Integrity and Network Security in Wireless LAN/3G Integrated Networks

Size: px
Start display at page:

Download "Data Integrity and Network Security in Wireless LAN/3G Integrated Networks"

Transcription

1 Data Integrity and Network Security in Wireless LAN/3G Integrated Networks International Workshop on Internet Security and Management 2004 Sendai, Japan, Jan. 29, 2004 Abbas Jamalipour a.jamalipour The University of Sydney Australia

2 Contents 1. Mobile Internet and the Wireless LAN 2. Integrated Network Architecture 3. Security Arrangements 4. Concluding Remarks 2

3 Mobile Internet and the Wireless LAN 1

4 Wireless local area networks! Wireless LAN is becoming increasingly popular! Mobile users typical demands of information access is characterized by heavy data files and applications; W-LAN can provide mobility and speed at the same time! In major structured hot spots such as airports and rail stations, the mobile radio infrastructure support of data communications seems to be inadequate and expensive! For office users, mobility, simple and low-cost network scalability, and high-speed access are advantageous factors! For home users, advantages of mobility without new wiring and at the same time high-speed access are the key issues " W-LAN provides network flexibility: No infrastructure (ad hoc), single-cell network (BSS), or cellular topology (ESS) " Use of unlicensed spectrum reduces the user s cost 4

5 Mobile Internet using W-LANW! Simple structure and cost-efficient equipment involved in W-LAN can easily extend the fixed Internet into the mobile environment! Mobility is supported but in a limited scale; more than that is neither logically feasible nor economically efficient! Data integrity, user and network security, and billing methods are not sufficiently supported by current standards! Can be done (as it is undergoing) but this will add the complexity and cost of the network, resulting in lighter image of original advantages of W-LAN! Traffic is loosely controlled through multiple access scheme; more traffic requires better traffic management and licensed spectrum, adding the cost and network complexity! Co-located W-LANs could interferer each other easily 5

6 Mobile Internet using cellular networks! 2.5G/3G cellular systems will provide some infrastructure for the mobile Internet service, but not necessarily sufficient! Cellular deployment timetable was not fast enough! Cellular data rate growth does not follow the rapid increase in new applications bandwidth demand! Cellular tariffs are not easily reducible! Cellular radio access will remain the limiting factor in competing speed with wired network! Compatibility and roaming issues between IP networks and cellular systems are not necessarily resolved within cellularonly implementations! Need for hybrid networks 6

7 Hybrid networks! To support new and existing mobile Internet applications! Horizontal communication among existing access technology! cellular, cordless, W-LAN, short-range connectivity, wired! On a common platform to complement services of each other! Connected through a common, flexible, seamless IP-based core network (questionable but promising)! An advanced media access technology that connects the core network to different access technologies! Global roaming and inter-working between different access technologies both horizontal (intra-system) and vertical (inter-system) handover! Seamless, transparent service negotiation including mobility, security, quality (data rate, delay, dropping probability, etc) 7

8 Vision of a hybrid network cdmaone Private IP Network cdma2000 Core Global Internet Wireless LAN GSM ADSL IP Core Network Inter-Network Access Technology cdma2000 Access Network Satellite Backbone DECT GPRS/UMTS Core UMTS Access Network PSTN/ISDN 8

9 Short- and long-term solutions! Long-term solutions! Merging IP and cellular networks at core and access sides! Reducing dissimilarities in management of the two systems! Improving radio access technology! Global interconnection of cellular and IP networks! Short-term solutions! Use of available infrastructures and try to accommodate simple systems within individual cellular networks! Push of IP-oriented applications into cellular services! Gradual decrease in traffic load from non-ip services! Blend all traffic data into one mixed-type! All, in order to be prepared for longer-term solutions 9

10 Integrated Network Architecture 2

11 Wireless LAN! W-LAN: The most accessible network to start with the short-term solutions! Much higher speed than 3G systems: Mbps and above compared with 300 Kbps 2 Mbps! Close relation with the legacy wired IP networks (basically an extension)! Use of unlicensed spectrum and low-cost equipments that may enable low end-user tariffs too! Already deployed in major hot-spots and is rapidly expanding; easily deployable anywhere! Potential integrating elements in its architecture with cellular 3G systems! Advantage of huge research work undergoing toward its standardization and regulation, access control, and security 11

12 W-LAN and 3GPP! 3GPP has already started the initiative for cellular- Wireless LAN internetworking architecture.! To be included in the 3GPP Release 6 specifications! Issues that need to be considered:! Integrating a highly-standardized system such as UMTS with a loosely standardized network; i.e. the W-LAN! Standardize the W-LAN network architecture or its radio interface? Maybe not; keep it undefined! Integrating a multi-service network such as UMTS with mainly IP-service network of W-LAN! Whether the W-LAN should be administrated by the UMTS operator or treated just as a foreign network! User data routing and access to available services! UMTS CN versus IP backbone 12

13 W-LAN architecture AAA interface AAA server/ proxy External IP networks interfaces Users database Billing IP backbone network DHCP HTTP server DNS IP interface Gateway NT LAN bus Access Router Layer 2 distribution network W-LAN Extended Service Set (ESS) Access Point 1 Access Point 2 Mobile Nodes Mobile Nodes 13

14 W-LAN general architecture! DHCP to facilitate the W-LAN terminal IP address! DNS to resolve Internet fully equipped domain name (FQDN) addresses into IP addresses! Gateway NT (network address and port translation) to external networks (Internet)! Using W-LAN private-space IP address and enabling services offered by external networks at the same time! HTTP server for local application-level services! Billing system for accounting! Access point: A layer 2 bridge between and the Ethernet! Security: using WEP, IEEE x/802.11i, RADIUS 14

15 User subscription! 3GPP! A heavily worked area for all subscriber s charging and billing systems using SIM/USIM smart cards! User database kept at home subscriber servers (HSS) for IP and other packet services over the packet-switched CN! Establishment of global roaming among 3G operators! Overall, not to compromise such a high-level of security just for a new interworking domain! Concluded that! The W-LAN needs to reuse the 3GPP subscription system! Equipping a W-LAN terminal with SIM/USIM! Making the AAA signaling a roaming case, where all subscription services will be provided by the 3GPP HSS 15

16 Authentication and authorization! 3GPP! Use of (U)SIM card for subscriber authentication for network access and for secret key agreement used for encryption and integrity protection! Use of a challenge and response algorithm for key management and authentication in GSM/GPRS; and an advanced version in UMTS! Wireless LAN integrated network! Utilizing the new IEEE i for authentication, access control and key agreement functions, especially the extensible authentication protocol (E) based on RADIUS! Use of E-SIM: mainly using SIM s key agreement algorithm! Use of E-AKA: encapsulation UMTS authentication and key agreement (AKA) within E 16

17 Integration options! Use of W-LAN as a Peer Network! Really an inclusion not integration! Connecting W-LAN and cellular systems independently to the IP core network! Tight Coupling! Accommodating W-LAN tightly inside cellular core network! Achieving virtual high-speed at the end-user level! Loose Coupling! Take advantage of both IP core network and cellular core network without getting virtual (imaginary) high-speed! Better option to get the two network really integrated! Obviously with adding more overall complexity V.K. Varma, S. Ramesh, K.D. Wong and J.A. Friedhoffer, Mobility management in integrated UMTS/WLAN networks, IEEE International Conference on Communications (ICC 03), vol. 2, pp , May. 17

18 Integration options MS Node B RNC MS Node B Iu-ps UMTS CN SGSN Tight Coupling HSS BG AAA GGSN/ HA AGW /HA b AAA /HLR b GW SGSN Peer Network MS MS Core IP Network b GW GSN Loose Coupling CN MS 18

19 Peer Network MS Node B RNC Node B I u-ps UMTS CN HSS AAA MS SGSN GGSN/ HA BG MS b AAA/ HLR GW AGW/ HA Core IP Network MS b GW CN! Operation by a same or different UMTS W-LAN operators! Use of Mobile IP for mobility management among peer networks! Inclusion of a HA functionality and a AAA server inside UMTS CN for supporting mobility among UMTS and non-umts networks! Multiple ESSs are connected via an access gateway to IP CN 19

20 Peer Network! Authentication to UMTS and other peer networks! To UMTS: through a HLR emulator (HLR ) in W-LAN! W-LAN: appearing as a foreign UMTS network! To other peer networks: through an AAA server and HA! Roaming from UMTS to W-LAN, MS! Associates with an access point! Performs AAA functions with the local AAA server which interacts with the AAA server in UMTS home! Obtains a CoA and sends a binding update! Interaction of HA with HSS in UMTS CN to update location! Similar procedure for roaming from W-LAN to UMTS 20

21 Tight coupling MS Node B RNC UMTS CN HSS AAA Node B I u -ps SGSN GGSN/ HA MS BG MS b GW SGSN Core IP Network CN! W-LAN emulates either a RNC or a SGSN (shown as SGSN )! W-LAN is deployed either by UMTS or an independent operator! Mobility between two networks means an inter-sgsn RA update! With the same GGSN, IP address will be assigned from the same pool: mobility results in no change in IP address! All signaling and data traffic and the user location are maintained by the home subscriber server (HSS) 21

22 Tight coupling! This coupling allows independent W-LAN operators! SGSN emulator meets the UMTS CN at G p interface! Simple architecture and procedure! Use of UMTS mobility management! To roam into a W-LAN high-speed network, an MS! Associates with an access point! Enters into an inter-sgsn routing area update with SGSN! Connects to the UMTS CN via SGSN! Moving within W-LAN ESS follows the W-LAN MM procedure! Signal strength, bandwidth measurement, etc may be used to select between the two networks when both are available 22

23 Loose coupling MS MS Node B Node B RNC I u-ps UMTS CN SGSN HSS BG AAA GGSN/ HA signaling MS b GW GSN data Core IP Network MS b GW CN! A master/slave architecture: UMTS: Master, W-LAN: Slave! Connection of several W-LAN ESSs via individual GWs to a combined SGSN/GGSN emulator (GSN )! Possible deployment of W-LAN by UMTS or independent operator: W-LAN is a visiting network to the UMTS CN 23

24 Loose coupling! Different routing areas for UMTS and W-LAN! Different sets of IP address domains! Simplifying GGSN in forwarding packets from GSN! Different handling of signaling and data traffics! Signaling goes to UMTS CN; directly (same operator) or indirectly (different operators)! Data traffic goes to IP core directly! Mobility management is more complex than in tight coupling as a user has a different IP address when roaming from one network to another 24

25 Loose coupling! While in UMTS! Performing Attach and PDP context activation! Following GPRS mobility management for moving around! Roaming to W-LAN! Associating with an access point! Acquiring an IP address from the W-LAN domain! Attaching to GSN similar to UMTS attach! Authentication with UMTS by GSN (via old SGSN)! Updating MS location and canceling it in HSS! Exchanging packets directly through IP core network! DNS or SIP could be used to identify the MS within the IP network; ongoing research! Similar procedure when roaming to UMTS 25

26 Other issues in W-LAN/3G W interworking! Mobility management! Roaming between W-LAN and cellular networks! Criteria for roaming! data rate, signal strength, traffic load, application, user preference, network preference, handheld device type,! Timing for roaming! Frequency for roaming! QoS guarantee issues after roaming! Device auto-detection and auto-configuration! Network administration! One administrator or more for! AAA! Billing! Customer care 26

27 Interworking scenarios! Only common billing and customer care! With no internetworking still this may be possible! To have same AAA functions as defined by 3GPP! This requires AAA procedures to be adopted in W-LAN too! To have UMTS-specific services in W-LAN! More internetworking is needed so that either a gateway to those service is emulated or they are accessed directly! Service continuity is maintained! We can restrict the type of services to be maintained continuously based on QoS availability (e.g. voice delay)! Seamless service across two networks! Access even to the UMTS circuit-switched services from the W-LAN 27

28 Security Arrangements 3

29 Security requirements! Requirements! The integrated system should not compromise 3G security! Use of UMTS authentication and key agreement (AKA)! AKA challenge-response procedure is network independent and may be run over other transport mechanisms! E.g., E-over-LAN supported by IEEE ! The home network in the integrated system should be always the 3GPP home! The serving network should support E-AKA! AAA node to handle transport of E! UMTS AKA relies on the terminal s smartcard! USIM application runs the UMTS AKA cryptographic algorithm! W-LAN terminal should be able to access USIM! Not necessarily have a smartcard reader; can be accessed via host system 29

30 Security elements! Authentication! No problem as the integrated network still uses UMTS AKA procedure! Confidentiality! Use of symmetric key encryption to protect disclosure of user and system data by passive attacks! Integrity! Use of (symmetric) keyed cryptographic checksum function to protect data modifications by active attacks! Functions are called message authentication codes (MAC); per message authentication 30

31 Security on the air! Assumptions: Access network supports confidentiality and integrity services over the air! Problem for W-LAN due to its weak WEP method! Use of new IEEE i specification! Use of interim solutions such as Wi-Fi protected access (WPA)! Based on Temporal Key Integrity Protocol (TKIP) of i! W-LAN access points must be also protected against dedicated attacks that aim to get access to session keys! Possible solution is to extend the W-LAN integrity and confidentiality services to the access server (similar to UMTS where data connections are protected between UE and RNC! To solve the problem of confidentiality and integrity services over the air, we must go beyond the usual link-layer security mechanisms (e.g., create an IPSec tunnel between UE and the network) 31

32 Security standards! Security architecture of the integrated system is directly modeled in the UMTS security architecture! UMTS access security: based on one-pass mutual entity authentication scheme between USIM and serving network! AKA procedure provides authentication and generation of 128-bit session keys for confidentiality and integrity protection! AKA procedure implementation! Cryptographic functions are implemented in USIM and HSS; depend only on HE operator! AKA successful outcome! The USIM and network will be mutually authenticated! They will get common key materials 32

33 UMTS AKA procedure! AKA procedure consists of two phases! Phase 1: Transfer of authentication vectors (AV) from home environment (HE) to the serving network (SN)! Not available in the interworking version of AKA; AKA is globally executed from the HE toward the USIM! Phase 2: Execution of AKA procedure by the SN User Serving Network (SN) Home Environment (HE) User Equipment (UE) Access Point () Radio Network Controller I u Interface Serving Network (SN) Home Subscriber Server (HSS) USIM MS Node B RNC SGSN/VLR HLR/AuC AV transport over M One-Pass Challenge/Response G. M. Koien and T. Haslestad, Security aspects of 3G-WLAN interworking, IEEE Communications Mag., pp , Nov. 33

34 Challenge/Response mechanism! If the AKA fails, either during challenge from network or response from USIM, a resynchronization procedure will be required USIM Challenge (RAND, AUTN) Network Valid AV presents Authenticate the network; if not ok proceed with failure Check sequence number in AUTN; if not ok resynchronize Compute response: RES Generate key material Response (RES) Failure (resync or MAC failure) Reject (cause) Verify (authenticate) USIM; if not ok proceed with reject 34

35 Security architecture (loose coupling)! Rather simple architecture using AAA and E! To execute UMTS AKA from 3G home domain toward W-LAN UE! AAA architecture, RADIUS and/or Diameter protocols are used to bridge 3GPP and W-LAN access networks! E-AKA allows execution of UMTS AKA over W-LAN Visited Network Home Network W-LAN access network UE Network access server 3GPP AAA proxy 3GPP AAA W r W r W x Home subscriber server Internet 35

36 Extensible authentication protocol (E)! A key element in security architecture of the integrated system! Provides a generic peer-to-peer based request-response transaction for authentication dialogs! Supports multiple authentication mechanisms! Does not provide authentication itself but supports existing authentication methods through specialized E methods! Using a negotiation sequence where the authenticator asks information on which authentication method to use! The main authentication method supported is E-AKA, but always a backend authentication server can help authenticator for unsupported authentication methods! Runs directly over link layer (no need for IP)! Has its own flow control mechanisms! Can remove duplicate messages! Can retransmits lost messages! Runs over different link layer protocols including the IEEE W-LAN link layer 36

37 Concluding Remarks 4

38 Concluding remarks! A hybrid W-LAN/cellular network takes the advantages of wide area coverage of the cellular systems and high-bandwidth and low-cost equipment of the W-LAN! The three integrated architectures look good, but is there any other option?! The three architectures use one of available mobility management techniques: GPRS/UMTS, W-LAN, MIP, SIP; are there any better option for MM in hybrid networks?! While authentication and authorization are handled through different combination of available methods (AAA, W-LAN, GPRS/UMTS, HLR, etc), are those techniques sufficient?! Radio access security! Network access security 38

39 Further reading! 3GPP, 3GPP System to Wireless Local Area Network (WLAN) Interworking; System Description, Tech. rep. 3GPP TS v1.10.0, May! 3GPP, Feasibility Study on 3GPP System to Wireless Local Area Network (WLAN) Interworking, Tech. rep. 3GPP TR v6.1.0, Dec. 2002! K. Ahmavaara, H. Haverinen, and R. Pichna, Interworking Architecture Between 3GPP and WLAN Systems, IEEE Communications Mag., pp , Nov.! A.K. Salkintzis, C. Fors, and R. Pazhyannur, WLAN-GPRS Integration for Next-generation Mobile Data Networks, IEEE Wireless Communications, vol. 9, no. 5, pp , Oct. 2002! A. Doufexi, E. Tameh, A. Nix and S. Armour, Hotspot Wireless LANs to Enhance the Performance of 3G and Beyond Cellular Networks, IEEE Communications Magazine, vol. 41, no. 7, pp , July! B. Sarikaya and T. Ozugur, Dormant Mode Operation Support for Roaming from WLAN to UMTS, IEEE International Conference on Communications (ICC '03), vol. 2, pp , May! Shiao-Li Tsao and Chin-Ching Lin, VGSN: A Gateway Approach to Interconnect UMTS/WLAN Networks, The 13 th IEEE Int. Symposium on Personal, Indoor and Mobile Radio Communications, vol. 1, pp , Sept. 2002! ETSI, Requirements and Architectures for Interworking Between HIPERLAN/3 and 3 rd Generation Cellular Systems, Tech. rep. ETSI TR v1.1.1, Aug. 2001! G. M. Koien and T. Haslestad, Security Aspects of 3G-WLAN Interworking, IEEE Communications Mag., pp , Nov. 39

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National

More information

Home Agent placement and assignment in WLAN with Cellular Networks

Home Agent placement and assignment in WLAN with Cellular Networks Home Agent placement and assignment in WLAN with Cellular Networks Selvakumar.R, Senior Lecturer, Department of Computer Science and Engineering V.M.K.V.Engineering College, Salem-636 308 Tamilnadu, India.

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Authentication and Security in IP based Multi Hop Networks

Authentication and Security in IP based Multi Hop Networks 7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security

More information

Security considerations for IMS access independence

Security considerations for IMS access independence 3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence

More information

WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS APOSTOLIS K. SALKINTZIS, CHAD FORS, AND RAJESH PAZHYANNUR, MOTOROLA

WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS APOSTOLIS K. SALKINTZIS, CHAD FORS, AND RAJESH PAZHYANNUR, MOTOROLA IP MULTIMEDIA IN N EXT-GENERATION MOBILE N ETWORKS: SERVICES, PROTOCOLS, AND T ECHNOLOGIES WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS OSTOLIS K. SALKINTZIS, CHAD FORS, AND RAJESH PAZHYANNUR,

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless

More information

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS Azita Laily Yusof, Mahamod Ismail, Norbahiah Misran Dept of Electrical, Electronic & System Engineering, Universiti Kebangsaan

More information

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur

More information

SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture Reem A. Hamada Faculty of Engineering / Electronics and Communication Department Zagazig University Zagazig, 44519,

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Reporte Técnico No. CCC-04-002 27 de febrero de 2004 Coordinación de Ciencias Computacionales

More information

Mobile@Home GSM services over wireless LAN

Mobile@Home GSM services over wireless LAN Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Evolutionary Trends towards Beyond 3G Mobile Networks

Evolutionary Trends towards Beyond 3G Mobile Networks Evolutionary Trends towards Beyond 3G Mobile Networks Cornel Pampu, Cornelia Kappler, Morten Schläger / SN MN PG NT MN 4 November 17th, 2006 The new company Nokia Siemens Networks is expected to start

More information

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

White Paper ON Dual Mode Phone (GSM & Wi-Fi) White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost

More information

Seamless Mobility over Broadband Wireless Networks

Seamless Mobility over Broadband Wireless Networks Seamless Mobility over Broadband Wireless Networks F. Steuer, M. Elkotob, S. Albayrak, H. Bryhni, T. Lunde Abstract A broadband wireless architecture with 802.11 (/WiFi) as a core coverage technology supported

More information

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre 1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

Synchronization Requirements in Cellular Networks over Ethernet

Synchronization Requirements in Cellular Networks over Ethernet Synchronization Requirements in Cellular Networks over Ethernet IEEE 802.3 TS Interim, May. 2009 J. Kevin Rhee 1, Kyusang Lee 2, and Seung-Hwan Kim 3 1 KAIST, 2 ACTUS Networks, and 3 ETRI, S. Korea Acknowledgment

More information

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects

More information

Mobility Management for All-IP Core Network

Mobility Management for All-IP Core Network Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6

More information

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated 3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07 Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements

More information

Mobile Services (ST 2010)

Mobile Services (ST 2010) Mobile Services (ST 2010) Chapter 2: Mobile Networks Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 2 Mobile Networks 2.1 Infrastructure

More information

An Architecture for Integrating UMTS and 802.11 WLAN Networks

An Architecture for Integrating UMTS and 802.11 WLAN Networks An Architecture for Integrating UMTS and 802.11 WLAN Networks Muhammad Jaseemuddin * Dept. of Electrical & Computer Engineering, Ryerson University, 350 Victoria Street, Toronto, ON M5B 2K3 Canada, Email:

More information

Advanced SIP Series: SIP and 3GPP

Advanced SIP Series: SIP and 3GPP Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia

More information

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a

More information

FMC (Fixed Mobile Convergence)

FMC (Fixed Mobile Convergence) FMC (Fixed Mobile Convergence) What About Security? Vancouver June 2008 Franck Veysset, Orange Labs Firstname.lastname at orange-ftgroup dot com Agenda Introduction - FMC? WIFI-SIP overview UMA overview

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

IP Multimedia System: general aspects and migration perspectives

IP Multimedia System: general aspects and migration perspectives IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms

More information

Mobile Networking Concepts and Protocols CNT 5517

Mobile Networking Concepts and Protocols CNT 5517 Mobile Networking Concepts and Protocols CNT 5517 Some slides are adapted from Dr. Dave Johnson Notes Dr. Sumi Helal, Ph.D. Professor Computer & Information Science & Engineering Department University

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

Private DNS for Mobile Operators

Private DNS for Mobile Operators Private for James Yu Senior Director - Strategic Technical Initiatives NeuStar, Inc. james.yu@neustar.biz +1-571-434-5572 (B) +1-703-622-5187 (M) Richard Xu Chief Architect Aicent, Inc richard.xu@aicent.com

More information

Views on Wireless Network Convergence

Views on Wireless Network Convergence Views on Wireless Network Convergence Yan PENG, Bin XIA, Meng LIANG Version 1.0 Agenda Motivations for Wireless Network Convergence Convergence Categories Issues on IP based Convergence A Possible Evolution

More information

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119

More information

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Mobile Devices Security: Evolving Threat Profile of Mobile Networks Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

PM ASSIGNMENT. Security in Mobile Telephony and Voice over IP

PM ASSIGNMENT. Security in Mobile Telephony and Voice over IP PM ASSIGNMENT Security in Mobile Telephony and Voice over IP Christian Wallin Christian.wallin.7513@student.uu.se Danlu Fu danlu.fu.6095@student.uu.se David Alfonso david.alfonso.5823@student.uu.se 1.

More information

Security Architecture Standardization and Services in UMTS

Security Architecture Standardization and Services in UMTS Security Architecture Standardization and Services in UMTS Christos Xenakis and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications University of Athens, 15784

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 This material is protected under all Copyright Laws as

More information

IMT-2000 Network Architecture

IMT-2000 Network Architecture IMT-2000 Network Architecture vtoshio Shimoe vtakamichi Sano (Manuscript received May 31, 2002) International Mobile Telecommunication-2000 (IMT-2000) is a third-generation mobile communication system.

More information

EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System

EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one

More information

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility

More information

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

GSM and UMTS security

GSM and UMTS security 2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages

More information

Operator-based Over-the-air M2M Wireless Sensor Network Security

Operator-based Over-the-air M2M Wireless Sensor Network Security Operator-based Over-the-air M2M Wireless Sensor Network Security Sachin Agarwal Christoph Peylo Deutsche Telekom A.G., Laboratories Ernst-Reuter-Platz 7 10587 Berlin DE Email: {sachin.agarwal, christoph.peylo}@telekom.de

More information

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile

More information

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless

More information

Nokia Siemens Networks Flexi Network Server

Nokia Siemens Networks Flexi Network Server Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted

More information

VERTICAL HANDOVER IN CELLULAR COMMUNICATION NETWORKS

VERTICAL HANDOVER IN CELLULAR COMMUNICATION NETWORKS VERTICAL HANDOVER IN CELLULAR COMMUNICATION NETWORKS Michael M. Gordon Department of Computer Science University of the Western Cape mgordon@uwc.ac.za and Johnson I. Agbinya Faculty of Engineering (Telecommunications

More information

3G/Wi-Fi Seamless Offload

3G/Wi-Fi Seamless Offload Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...

More information

3GPP TS 29.161 V6.3.0 (2007-12)

3GPP TS 29.161 V6.3.0 (2007-12) TS 29.161 V6.3.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the Public Land Mobile Network (PLMN)

More information

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:

More information

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India

More information

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

Load Balancing for Cellular/WLAN Integrated Networks

Load Balancing for Cellular/WLAN Integrated Networks Load Balancing for Cellular/WLAN Integrated Networks Wei Song, Weihua Zhuang, and Yu Cheng University of Waterloo, Canada, University of Toronto, Canada Abstract The interworking between the third-generation

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Demo 1. Network Path and Quality Validation in the Evolved Packet Core Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

464XLAT in mobile networks

464XLAT in mobile networks STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.

More information

Evolution of GSM in to 2.5G and 3G

Evolution of GSM in to 2.5G and 3G CMPE 477 Wireless and Mobile Networks Evolution of GSM in to 2.5G and 3G New Data Services for GSM CMPE 477 HSCSD GPRS 3G UMTS IMT2000 UMTS Architecture UTRAN Architecture Data services in GSM I Data transmission

More information

IMS Interconnect: Peering, Roaming and Security Part One

IMS Interconnect: Peering, Roaming and Security Part One T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish

More information

A SEAMLESS MOBILE VPN DATA SOLUTION FOR UMTS AND WLAN USERS

A SEAMLESS MOBILE VPN DATA SOLUTION FOR UMTS AND WLAN USERS A SEAMLESS MOBILE VPN DATA SOLUTION FOR AND USERS P M Feder, N Y Lee, S Martin-Leon Bell Laboratories - Mobility Solutions, Lucent Technologies Inc., USA, UK Abstract Mobile virtual private networks (MVPNs)

More information

Wireless Access of GSM

Wireless Access of GSM Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade

More information

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom IPv6 and 4G Christian Bonnet Michelle Wetterwald Institut Eurécom Agenda Introduction Architecture Mobile Terminal Function Elements Mobility scenarios QoS Multicasting Conclusion Introduction : 4G Attributes

More information

Wireless LAN Access Network Architecture for Mobile Operators

Wireless LAN Access Network Architecture for Mobile Operators WIRELESS LOCAL AREA AND HOME NETWORKS Wireless LAN Network Architecture for Mobile Operators Juha Ala-Laurila, Jouni Mikkonen, and Jyri Rinnemaa, Nokia Mobile Phones ABSTRACT The evolution of -based office

More information

2. Archtiecture overview related to support for use of a reverse http proxy

2. Archtiecture overview related to support for use of a reverse http proxy 3GPP TSG SA WG3#30 S3-030576 6-10 Okt 2003 Povoa de Varzim, Porugal Agenda Item: Source: Title: Document for: GBA Alcatel Comparison of different solutions for GBA and AP based AS: standard TLS versus

More information

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan

More information