Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca



Similar documents
SAE and Evolved Packet Core

Diameter in the Evolved Packet Core

Network-Based Mobility Management in the Evolved 3GPP Core Network

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

3GPP System Architecture Evolution. ATIS LTE Conference January 26, GPP TSG SA Chairman Stephen Hayes

Interworking Wi-Fi and Mobile Networks The Choice of Mobility Solutions

Evolution of the 3GPP Network Architecture, (the Evolved Packet Core)

LTE Overview October 6, 2011

Evolutionary Trends towards Beyond 3G Mobile Networks

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

ETSI TS V8.9.0 ( )

Emerging Standards for Mobility Management in Next-Generation All-IP Networks

Mobility Management for All-IP Core Network

3GPP Long-Term Evolution / System Architecture Evolution Overview

UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE)

IP Multimedia System: general aspects and migration perspectives

4G Mobile Networks At Risk

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Advisor:Whai-En Chen Speaker:Meng-Hsuan Lin

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks

Security in the Evolved Packet System

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

ehrpd Mike Keeley Market Segment Director

LTE Performance and Analysis using Atoll Simulation

Overview of the Evolved packet core network

SOFTWARE-DEFINED NETWORKING IN HETEROGENEOUS RADIO ACCESS NETWORKS

3G/Wi-Fi Seamless Offload

The LTE Network Architecture

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Inter Technology Load Balancing Algorithm for Evolved Packet System

Implementing LTE International Data Roaming

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Executive Summary Introduction Drivers for Wi-Fi Recent Wi-Fi Enablers Evolving Standards...

Delivery of Voice and Text Messages over LTE

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Network Virtualization Mist to MUST

Standardization on Mobility Management Architectures and Protocols for All-IP Mobile Networks

Cellular-Wi-Fi Integration

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

LTE CDMA Interworking

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University

Evolution from 3G to LTE

MOBILE VIDEO WITH MOBILE IPv6

Kamakshi Sridhar, PhD Distinguished Member of Technical Staff Director Wireless CTO organization

Policies to enable serving untrusted services on alternative (non-3gpp) and untrusted access networks in EPS

IP Flow Mobility: Smart Traffic Offload for Future Wireless Networks

GSM services over wireless LAN

spirent ondemand 3G/4G Wireless Edition

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

A Design of Network-based Flow Mobility based on Proxy Mobile IPv6

Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment

Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver.

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Introduction to Evolved Packet Core

IP in UPMT Networking - Compare and Contrast

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Nokia Siemens Networks Flexi Network Server

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Distributed Mobility Management: a Standards Landscape

The future of mobile networking. David Kessens

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

ETSI TS V8.0.0 ( ) Technical Specification

Contents. Continuity of services and mobility

Architecture Overview NCHU CSE LTE - 1

Nokia Siemens Networks Flexi Network Gateway. Brochure

distributed and dynamic mobility management

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

3GPP SAE/LTE Security

Advanced SIP Series: SIP and 3GPP Operations

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

Protocol Signaling Procedures in LTE

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Network Mobility Support Scheme on PMIPv6 Networks

EETS 8316 Wireless Networks Fall 2013

LTE Perspective. Ericsson Inc. Sridhar vadlamudi LTE HEAD, India

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

INTERNATIONAL TELECOMMUNICATION UNION

Mobility Management for IP-based Mobile Networks

464XLAT in mobile networks

Cisco ASR 5000 Series Mobility Management Entity Administration Guide

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

WLAN Traffic Offload in LTE

TR-203 Interworking between Next Generation Fixed and 3GPP Wireless Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Comparison of LTE and WiMAX on the Basis of Qualities

MASTER THESIS. Luca Valtulina

EVERYTHING YOU EVER WANTED TO KNOW ABOUT LTE

Virtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA

How To Understand The Gsm And Mts Mobile Network Evolution

U.S. Patent Appl. No. 13/ filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

Upcoming Enhancements to LTE: R9 R10 R11!

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Transcription:

Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca

Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects LTE (Long Term Evolution): new radio access (E-UTRAN) Main system characteristics support for packet services only OFDM radio technology peak throughput per user : 100 Mbps DL and 50 Mbps UL (with a 20 MHz channel width) multi-access core network: GERAN, UTRAN, E-UTRAN and non-3gpp Specifications to be completed by 2008 2

Logical architecture: non roaming Legacy Networks UTRAN GERAN 2G/3G SGSN HSS S3 S6a S1 (CP) MME S4 S7 PCRF Rx+ E-UTRAN enb enb X2 S10 S1 (UP) S11 Serving Gateway S5 S5 Gateway SGi S2b Operator IP services (e.g. IMS, PSS,..) enb: MME: evolved Node B Mobility Management Entity (similar to the control part of the SGSN) : access gateway towards Packet Data Networks (similar to the GGSN) Trusted IP access S2a epdg Untrusted IP access SGi: interface towards Internet/Intranet (equivalent to Gi interface in GPRS) 3

Interworking with accesses (I) SAE supports both host-based and network-based mobility management solutions Dual-Stack MIPv6 (host-based) Proxy MIPv6 and MIPv4 in Foreign Agent mode (network-based) works as MIP/PMIP Home Agent when connected to a 3GPP access the UE can be assumed to be at home in MIP sense mobility within 3GPP accesses (E-UTRAN, UTRAN and GERAN) is managed in a network-based fashion using 3GPP-specific protocols service continuity is guaranteed in case the UE moves from a 3GPP access to a access (or vice versa) the UE communicates using the same IP address independently of the access network it is attached to 4

Interworking with accesses (II) SAE distinguishes between trusted and untrusted non 3GPP accesses It is up to the operator to decide if a access is trusted or untrusted the decision is not based just on the access network technology but may depend also on business considerations Interworking with an untrusted access is performed via an evolved PDG (epdg) the epdg is similar to a VPN concentrator the UE has to establish an IPsec tunnel with the epdg to access operator s services the epdg may implement IP mobility protocols (e.g. PMIPv6) 5

Interworking with accesses (III) Interworking with a trusted access is performed using a more lightweight procedure the UE does not need to establish an IPsec tunnel with the epdg in advance MIP or PMIP protocols can be used directly between the access network and the SAE core network the access gateway (e.g. ASN in case of mobile WiMAX) can run PMIPv6 6

Interworking with accesses (IV) 2G/3G SGSN HSS S3 S6a S1 (CP) MME S4 S7 PCRF Rx+ Wx* E-UTRAN S10 S11 S1 (UP) Serving Gateway HA Gateway SGi Operator IP services (e.g. IMS, PSS,..) S2b S6c S2c S2a epdg Wm* 3GPP AAA Server Trusted/untrusted (host-based) Trusted non 3GPP IP access (network-based) Untrusted non 3GPP IP access (network-based) Wa* Ta* UE 7

Protocols on interfaces The protocols that have been selected for mobility between 3GPP and accesses are S2a reference point (trusted accesses): Proxy Mobile IPv6 and Mobile IPv4 in Foreign Agent mode Mobile IPv4 in FA mode was requested by CDMA2000 operators (e.g. Verizon), that want to re-use their already deployed Mobile IPv4 infrastructure S2b reference point (untrusted accesses): Proxy Mobile IPv6 with dual-stack extensions S2c reference point (host-based mobility on trusted/untrusted accesses): Dual-Stack Mobile IPv6 (DSMIPv6) the usage of Mobile IPv4 in co-located mode is still under consideration 8

Interworking scenarios: non roaming S1u, S4, S11 3GPP Serving access S5 SGi S1u, S4, S11 3GPP Serving access S5 SGi Proxy Mobile IPv6 or MIPv4 in FA mode Dual-Stack Mobile IPv6 S2a S2b S2c S2c Network-based Mobility epdg Host-based Mobility epdg Trusted Untrusted Trusted Untrusted UE UE 9

Interworking scenarios: roaming (I) S1u, S4, S11 3GPP Serving access S5 SGi S1u, S4, S11 3GPP Serving access S5 SGi HPLMN Proxy Mobile IPv6 S8b HPLMN GTP or Proxy Mobile IPv6 S8a/b VPLMN 3GPP access S1u, S4, S11 Serving VPLMN 3GPP access S1u, S4, S11 Serving S2a PMIPv6 or MIPv4 in FA mode S2b Proxy Mobile IPv6 S2a S2b epdg epdg Trusted Untrusted Network-based Mobility Trusted Untrusted UE UE 10

Interworking scenarios: roaming (II) S1u, S4, S11 3GPP Serving access S5 SGi HPLMN GTP or Proxy Mobile IPv6 S8a/b VPLMN 3GPP access S1u, S4, S11 Serving S2c S2c Dual-Stack Mobile IPv6 epdg Host-based Mobility Trusted UE Untrusted 11

Interworking scenarios: roaming (III) S1u, S4, S11 3GPP Serving access HPLMN VPLMN Host-based Mobility 3GPP access S5 Proxy Mobile IPv6 S1u, S4, S11 S2c Trusted UE Serving SGi S8b S2c epdg Untrusted This scenario has not been officially accepted yet the Serving works as a local mobility anchor and runs PMIPv6 with the the home address is provided by the (i.e. the real HA) data traffic is anchored on the the Serving handles local mobility through DSMIPv6 the visited operator can use the Serving to enforce policies (e.g. charging) not clear how to handle Serving relocation when the UE moves across VPLMNs 12

PMIPv6/MIPv6: summary of usage scenarios Access (S2a/b) SGi (S2c) PMIPv6 SGi Roaming and non roaming DSMIPv6 Non 3GPP Accesses Cascade of PMIPv6 tunnels Access (S2a/b) Serving (S8b) SGi PMIPv6 PMIPv6 Roaming (S2c) Serving (S8b) SGi DSMIPv6 PMIPv6 Cascade of DSMIPv6 and PMIPv6 tunnels 13

Roaming with or without local anchor Option A: no local anchor HPLMN has to interface via PMIPv6 with all As in VPLMN complicates the establishment and maintenance of roaming agreements Option B: local anchor in HPLMN needs to interface via PMIPv6 just with the anchor point in VPLMN simplifies the establishment of roaming agreements the visited operator can exploit the local anchor to enforce policies on UE s data traffic A No local anchor PMIPv6 (S2a) HPLMN B Local anchor PMIPv6 (S8b) HPLMN VPLMN Non 3GPP As Non 3GPP As PMIPv6 (S2a) Serving VPLMN BSs BSs 14

Attach over S2a: trusted access (I) 15

Attach over S2a: trusted access (II) Step by step description of the procedure 1. The initial Non-3GPP access specific L2 procedures are performed 2. The EAP authentication procedure for network access is performed involving the UE, trusted non-3gpp IP Access and the 3GPP AAA Server. In the roaming case, there may be several AAA proxies involved. The information is returned as part of the reply from the 3GPP AAA Server to the MAG in the trusted non-3gpp access 3. After successful authentication and authorization, the L3 attach procedure is triggered 4. MAG function of Trusted Non-3GPP IP Access sends Proxy Binding Update message to 5. The selected informs the 3GPP AAA Server of its address 16

Attach over S2a: trusted access (III) Step by step description of the procedure (cont ed) 6. The processes the proxy binding update and creates a binding cache entry for the UE. The allocates IP address for the UE. The then sends a proxy binding acknowledgement to the MAG function in Trusted Non-3GPP IP Access, including the IP address(es) allocated for the UE 7. The PMIPv6 tunnel is set up between the Trusted Non-3GPP IP Access and the 8. L3 attach procedure is completed. IP connectivity between the UE and the is set for uplink and downlink directions 17

Attach over S2b: untrusted access UE epdg HSS/ AAA 1 IKEv2 authentication and tunnel setup Authentication and Authorization 2 Proxy BU (MN-ID, IP addr Req) 3 Update Address 4 Proxy Binding Ack (IP addr) 5 IPsec tunnel setup completion 6 IKEv2 (IP Address Configuration) 7 IPsec Tunnel PMIP Tunnel 18

Attach over S2b/S8b: cascade of tunnels (I) UE epdg Serving 3GPP AAA Proxy HSS/ AAA 1 IKE_AUTH Authentication Authentication and Authorization Authentication and Authorization 2 Proxy BU ( MN-ID, IP Addr Request ) 3 Proxy BU ( MN-ID, IP Addr Req) 4 Update Address 5 Proxy Binding Ack (IP Addr 6 Proxy Binding Ack IP Addr) 7 IPsec tunnel setup completion 8 IKEv2 (IP Address Configuration) 9 IPsec Tunnel PMIP Tunnel PMIP Tunnel 19

Attach over S2b/S8b: cascade of tunnels (II) Step by step description of the procedure 1. The IKEv2 tunnel establishment procedure is started by the UE. The epdg IP address to which the UE needs to form IPsec tunnel is discovered via DNS query. The information is returned as part of the reply from the 3GPP AAA Proxy to the epdg. This may entail an additional name resolution step, issuing a request to a DNS Server 2. The epdg sends the PBU message to the Serving 3. The visited Serving processes the proxy binding update and creates a binding cache entry for the UE. Then the visited Serving sends the PBU message to the using its own address as the MAG address. Note that the binding cache entry on the Serving does not yet have the UE s IP address information. This information will be added to the binding cache entry after step 4 20

Attach over S2b/S8b: cascade of tunnels (III) Step by step description of the procedure (cont ed) 4. The selected informs the 3GPP AAA Server of its address 5. The processes the proxy binding update and creates a binding cache entry for the UE. The allocates an IP address for the UE. The then sends a proxy binding ack to the Serving, including the IP address allocated for the UE. Once the Serving processes the proxy Binding Ack, it stores the UE s IP address information in the binding cache entry 6. After the Proxy BU/Proxy BAck is successful, there is a PMIPv6 tunnel setup between the Serving and the 7. The epdg continues with the IKE_AUTH exchange 21

Attach over S2b/S8b: cascade of tunnels (IV) Step by step description of the procedure (cont ed) 8. The epdg sends the final IKEv2 message with the IP address in IKEv2 Configuration payloads. The IP address sent in the IKEv2 configuration payload is the same address that the epdg received in the Proxy Binding Ack message 9. IP connectivity from the UE to the is now setup any packet in the uplink direction is tunneled to the epdg by the UE using the IPSec tunnel. The epdg then tunnels the packet to the visited Serving. The visited Serving then tunnels the packet to the. From the normal IP based routing takes place In the downlink direction, the packet for UE (HoA) arrives at the. The tunnels the packet based on the binding cache entry to the visited Serving. The visited Serving tunnels the packet based on the binding cache entry to the epdg. The epdg then tunnels the packet to the UE via proper IPsec tunnel 22

PMIPv6: an example scenario (I) UE E-UTRAN Data packets Serving Gateway HA Gateway Operator IP services (e.g. IMS, PSS,..) PBA S2b MAG PBU S2a epdg MAG Trusted non 3GPP access A Untrusted non 3GPP IP access 23

PMIPv6: an example scenario (II) E-UTRAN Serving Gateway HA Gateway Data packets Operator IP services (e.g. IMS, PSS,..) PMIP tunnel S2a S2b MAG epdg MAG Trusted non 3GPP access A Untrusted non 3GPP IP access Data packets UE 24

PMIPv6 in 3GPP vs. PMIPv6 in IETF The PMIPv6 usage scenarios foreseen for 3GPP SAE/LTE present some differences with respect to those in the scope of the IETF MIP6 WG PMIPv6 is used for inter-system handovers (i.e. handovers between 3GPP and accesses) PMIPv6 is used as a global mobility protocol PMIPv6 may be used in roaming scenarios, which means that the HA and the Proxy Mobility Agent may be located in different administrative domains in the roaming case there is the possibility to have a cascade of PMIPv6 tunnels (A Serving, Serving ) in this way there is a local anchor point in the visited domain, that can be used by the visited operator to enforce policies on UE s traffic the local anchor also simplifies the establishment of roaming agreements 25

Conclusions IETF protocols will be extensively used for 3GPP-non-3GPP mobility in UMTS Rel8 PMIPv6, DSMIPv6 and MIPv4 in FA mode Some open issues still need to be resolved/clarified mobility mode selection (PMIPv6, DSMIPv6 and MIPv4 in FA mode) multihoming (i.e. multiple interface) management simultaneous usage of multiple access technologies for load-sharing or performance optimization combined usage of PMIPv6 and DSMIPv6 in case the UE moves into an access network that does not support any mobility feature (e.g. domestic/public WiFi access) handover optimizations for tight interworking with mobile WiMAX and/or CDMA2000 26