This whitepaper provides an overview of WLAN offload in LTE networks. It describes the integration of WLAN access methods into 3GPP networks, as well as IP mobility solutions like IP Flow Mobility (IFOM). The paper also covers network discovery and selection functions, including the Access Network Discovery and Selection Function (ANDSF) and the Access Network Query Protocol (ANQP).
BIEL has successfully launched an LTE network in Bangladesh, becoming one of the first to deploy a large-scale WiMAX network in 2007. It now covers major areas of Dhaka with LTE. LTE uses improved radio interfaces and core networks compared to previous technologies to increase network capacity and speed. LTE can provide download speeds up to 100Mbps and upload speeds up to 50Mbps. BIEL complied with all requirements to obtain a license allowing them to provide LTE services in Bangladesh.
The document provides an overview of Huawei's LTE security solution, which includes security measures across wireless, transport, equipment, and operations management (OM) planes. The solution features complete security across all network planes, certificate-based transport security, automatic secure deployment of eNodeBs, comprehensive auditing, and support for IPv6 environments. Wireless security uses integrity protection and encryption with various encryption algorithms. Keys are separately generated by UEs and eNodeBs to ensure security.
The document discusses Wi-Fi technology, including its use of radio waves to connect devices to wireless access points and the internet. It describes how users connect to open Wi-Fi networks in public places like airports and cafes. It also discusses security measures for Wi-Fi like WEP, WPA, and WPA2 encryption, and notes that while Wi-Fi is convenient, it is more vulnerable to attacks than wired connections.
U.S. Wireless Overview & Outlook Presentation (V02C)
The latest version (V02C) of my overview of wireless spectrum, technologies and opportunities in just 20 slides. Tried to capture all of today's wireless essentials in this brief briefing. Enjoy!
Long Term Evolution (LTE) is the next generation of mobile broadband technology that provides higher data rates and network throughput compared to 3G. LTE networks use OFDM and SC-FDMA for downlink and uplink, respectively, along with MIMO and an all-IP architecture to improve performance. The network elements include eNBs, SGWs, PDN GWs and MMEs. For operators, LTE provides an opportunity to increase ARPU through new applications and services while decreasing CCPU through an all-IP infrastructure. Mass deployment of LTE is expected to begin around 2012, with LTE Advanced enabling data rates up to 1 Gbps.
The white paper discusses deploying multi-access edge computing (MEC) in 4G networks and the evolution towards 5G. It describes several scenarios for deploying MEC in 4G, including placing the MEC platform at the base station (bump in the wire), distributing elements of the evolved packet core, and separating control and user planes. Key challenges addressed include session management, mobility, security, charging, and identifying subscribers. The paper also discusses how deploying MEC in 4G can help drive adoption of 5G by establishing an edge cloud infrastructure and leveraging cloud technologies for a smooth evolution.
Operators strategy for supporting the ‘Mobile Data Explosion’
The document discusses strategies that mobile operators can use to support increasing mobile data usage. It outlines several approaches operators are taking, including deploying small cells to increase network capacity, leveraging WiFi networks to offload traffic, and using new 3GPP standards and technologies like carrier aggregation and dynamic spectrum management. The document also provides a case study of how one US operator has evolved its network from 1947 to the present day to support growing demand.
- The document discusses TM Forum's work on 5G network slicing, including requirements, use cases, and business models.
- It describes two deployment scenarios: a single slice provider model with one provider spanning access, backhaul, and core networks; and a multi-slice provider model with the end-to-end slice spanning multiple providers.
- The key aspects covered are the network slice lifecycle including creation, operations, modification, and termination as well as the roles of 5G OSS/BSS, orchestration, and assurance functions.
More than a decade ago, Cisco introduced wireless solutions that addressed challenges associated with address mobility, seamless authentication and comprehensive backend accounting.
In the last few years, the industry has transformed to offer an immense range of Smart Devices. This unprecedented growth in mobile traffic demands a change to scale to the new reality of any–to-any connectivity. This is a technical deep dive presentation on BNG Deployments and Mobile Offload techniques
This document discusses small cells and Wi-Fi integration into the Evolved Packet Core (EPC) network. It provides an introduction to small cells and their need due to increasing data usage. It describes heterogeneous networks (HetNets) which incorporate small cells and different radio access technologies. The document outlines the EPC network architecture and components. It then discusses small cells in more detail including their standardization, logical architecture, and LTE deployment options. The document covers Wi-Fi including standards, integration into EPC using various methods, and the Hotspot 2.0 specification. It discusses seamless connectivity between 3GPP and non-3GPP networks and provides a conclusion on the roles of small cells and Wi-Fi
The key security elements for 4G include key security for authentication between network components, authorization using authentication vectors, and key management for key establishment and distribution. However, 4G networks are susceptible to interference, jamming, location tracking, bandwidth theft, and denial of service attacks due to their open and standardized nature. Proper security mechanisms must be implemented to protect users and critical network infrastructure.
This document discusses ways that LTE can help boost average revenue per user (ARPU) for mobile network operators. It suggests that LTE enables faster speeds and more reliable mobile broadband, allowing for new applications that can drive additional revenue. These include real-time apps, location-based services, mobile health apps, high definition content, and quality of service features that users may pay premiums for. Network sharing and fixed-mobile convergence are also discussed as ways to reduce costs and increase customer loyalty. However, the document notes that simply focusing on ARPU may not be the best approach, and that factors like passive data devices could impact ARPU metrics.
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
The Long Term Evolution (LTE) is the latest step in an advancing series of mobile telecommunications systems.
In this paper, authors show interest on the link budgeting the information presented here will help readers understand how the budgeting will be done in LTE. This paper provides
dimensioning of LTE for particular city.
This will provides the number of cell count. Here we tell about a GUI MATLAB System for calculation of no. of resources required to provide services in particular area with optimum cost and better quality.
This document discusses the intersection of 5G networks and open reference platforms. Open reference platforms using disaggregated RAN architectures and open interfaces can offer new user experiences through edge computing and adaptive analytics. Challenges include developing principles for graph abstraction of radio networks and understanding service layers and multi-tenancy in open and democratized architectures. Open source communities and standards bodies are collaborating on initiatives like O-RAN and ONAP to define open interfaces and platforms that enable a more programmable radio access network.
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Most operators plan to deploy 5G by relying on previous-generation 4G LTE networks with Non-Standalone architecture. The problem is that this approach will leave 5G subscribers with all the security issues of previous-generation networks.
Learn how to safely and systematically bring mobile networks up to 5G. In this webinar, Pavel Novikov, Head of the Telecom Security Research Team, discusses:
- Which new risks will appear with 5G deployment
- Why the 5G security architecture by itself is not enough to keep networks safe
- Why any 5G-only security efforts will be pointless
- How to protect 5G networks
This document discusses wireless network design considerations for deploying Cisco's Unified Wireless Network (UWN) architecture. It covers topics such as wireless technologies, wireless network topologies, wireless network components, wireless LAN controllers, autonomous and lightweight access points, wireless security, site survey processes, and controller redundancy designs. The goal is to introduce the Cisco UWN architecture and discuss principles for designing wireless networks using lightweight access points and wireless LAN controllers.
The document summarizes the IEEE 802.11 wireless local area network (WLAN) technology standard. It discusses the history and development of IEEE 802.11. It describes the key components of IEEE 802.11 including the physical layer specifications of 802.11a/b/g/n and the medium access control techniques like distributed coordination function. It also discusses newer amendments for quality of service, security, and mesh networking and upcoming standards like 802.11ac that aim to increase throughput. The document provides an overview of the IEEE 802.11 WLAN standard and its extensions over time to support higher data rates and new applications.
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...
Cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network
operators in how to extract the most value from their deployments while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the “conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking
(SDN). In this paper, we will attempt to explore some existing options within the LTE standard to address traffic challenges. We then survey some SDN-enabled alternatives and comment on their merits and drawbacks.
The document compares LTE and WiMAX technologies. It discusses their evolution from earlier standards to 4G versions (LTE-Advanced and WiMAX 2.0). While technically similar, some key differences that gave LTE an advantage included LTE's shorter frame duration which enabled lower latency, as well as its earlier standardization and broader operator support. Looking forward, WiMAX plans to integrate with LTE in a heterogeneous network approach, as LTE has become the dominant 4G standard.
WiFi offloading is becoming one of the key enablers to help the network operators dealing with the exponentially growing demand of mobile data. The idea of using WiFi to offload data traffic from cellular network has proposed for many years. However, the interoperability issue between the two networks needs to be enhanced so that WiFi can efficiently supplement for the cellular network in case of congestion or outage. In this paper, we propose a novel network roaming and selection scheme based on 3GPP TS 24.312 and IEEE 802.11k, u standards to enhance cellular and WiFi interworking. The proposed scheme is aimed at enhancing the network roaming and selection so that WiFi network can serve as a supplement and backup access network for the cellular not only for congestion control but also in case of unexpected network failure event. We also model and evaluate the proposed scheme in a typical HetNet with interworking WiFi access points and cellular base stations. The simulation result shows that our proposed scheme quickly detects unexpected network failure event and assists active UEs to perform handoff to preferable alternative point of access. As a result, service disruption is substantially reduced and quality of experience (downlink/uplink’s throughput) is improved. Therefore, our proposed scheme can be used for a more reliable HetNet in terms of congestion control and disruption tolerance.
This document provides an overview of the Mobile WiMAX IEEE 802.16m standard. It discusses key enhancements in Mobile WiMAX including improved non-line-of-sight coverage through advanced antenna diversity schemes and hybrid automatic repeat request. It also covers adaptive antenna systems and multiple-input multiple-output technologies to improve coverage. The document focuses on physical layer specifications for 802.16m including flexibility to support heterogeneous users and extending the use of multiple-input multiple-output transmission. It also discusses resource allocation, multi-cell multiple-input multiple-output, and interoperability with legacy WiMAX and other wireless technologies.
Cellular networks are overloaded by mobile data traffic because of fast growth of mobile broadband services and the widespread use of smart phones. Application of smartphone, laptops internet etc. are increasing day by day. All this is causing congestion problem. Data revenue problem is a major problem for the network operators. One of the solutions to alleviate this problem is the offloading of mobile data traffic from the cellular access technology to the Wi-Fi access network. Wi-Fi access point is widely deployed by customers or by the operators so can be easily used for offloading technique. This paper reviews the models and architecture of offloading in between LTE network and Wi-Fi access network. Limitations of using Wi-Fi as alternative access network is also discussed in this paper and brief of ANDSF is provided in the paper.
This document compares the next-generation mobile broadband technologies LTE and WiMAX. It describes their quality of service (QoS) structures and how they are designed to support current and future QoS needs to sustain various application requirements. The document provides details on LTE and WiMAX standards, architectures, and QoS support through different bearer types and service flows.
LTE is designed with strong cryptographic techniques, mutual authentication between LTE network elements with security mechanisms built into its architecture.
With the emergence of the open, all IP based, distributed architecture of LTE, attackers can target mobile devices and networks with spam, eavesdropping, malware, IP-spoofing, data and service theft, DDoS attacks and numerous other variants of cyber-attacks and crimes.
The document discusses the Evolved Packet Core (EPC) architecture, which is an all-IP core network designed to support LTE, 3G, 2G, and non-3GPP wireless technologies using a common IP infrastructure. The key elements of EPC include the Serving Gateway (SGW), Packet Data Network Gateway (PGW), Mobility Management Entity (MME), Home Subscriber Server (HSS), and Policy and Charging Rules Function (PCRF). EPC enables an end-to-end IP experience with flat architecture, simplified signaling, and improved support for new services and business models compared to previous 3G core networks.
CNCF TUG (Telecom User Group) Ike Alisson 5G New Service Capabilities Rev pa10Ike Alisson
5G New Service Capabilities (with an overview on the synergy between 5G CN and RAN (O-RAN Specifications) via CUPS and some of the Enhancements for URLLC UCs enhancements
BIEL has successfully launched an LTE network in Bangladesh, becoming one of the first to deploy a large-scale WiMAX network in 2007. It now covers major areas of Dhaka with LTE. LTE uses improved radio interfaces and core networks compared to previous technologies to increase network capacity and speed. LTE can provide download speeds up to 100Mbps and upload speeds up to 50Mbps. BIEL complied with all requirements to obtain a license allowing them to provide LTE services in Bangladesh.
The document provides an overview of Huawei's LTE security solution, which includes security measures across wireless, transport, equipment, and operations management (OM) planes. The solution features complete security across all network planes, certificate-based transport security, automatic secure deployment of eNodeBs, comprehensive auditing, and support for IPv6 environments. Wireless security uses integrity protection and encryption with various encryption algorithms. Keys are separately generated by UEs and eNodeBs to ensure security.
Carrier grade wi fi integration architectureSatish Chavan
The document discusses Wi-Fi technology, including its use of radio waves to connect devices to wireless access points and the internet. It describes how users connect to open Wi-Fi networks in public places like airports and cafes. It also discusses security measures for Wi-Fi like WEP, WPA, and WPA2 encryption, and notes that while Wi-Fi is convenient, it is more vulnerable to attacks than wired connections.
U.S. Wireless Overview & Outlook Presentation (V02C)Mark Goldstein
The latest version (V02C) of my overview of wireless spectrum, technologies and opportunities in just 20 slides. Tried to capture all of today's wireless essentials in this brief briefing. Enjoy!
Long Term Evolution (LTE) is the next generation of mobile broadband technology that provides higher data rates and network throughput compared to 3G. LTE networks use OFDM and SC-FDMA for downlink and uplink, respectively, along with MIMO and an all-IP architecture to improve performance. The network elements include eNBs, SGWs, PDN GWs and MMEs. For operators, LTE provides an opportunity to increase ARPU through new applications and services while decreasing CCPU through an all-IP infrastructure. Mass deployment of LTE is expected to begin around 2012, with LTE Advanced enabling data rates up to 1 Gbps.
Etsi wp24 mec_deployment_in_4_g_5g_finalSaurabh Verma
The white paper discusses deploying multi-access edge computing (MEC) in 4G networks and the evolution towards 5G. It describes several scenarios for deploying MEC in 4G, including placing the MEC platform at the base station (bump in the wire), distributing elements of the evolved packet core, and separating control and user planes. Key challenges addressed include session management, mobility, security, charging, and identifying subscribers. The paper also discusses how deploying MEC in 4G can help drive adoption of 5G by establishing an edge cloud infrastructure and leveraging cloud technologies for a smooth evolution.
Operators strategy for supporting the ‘Mobile Data Explosion’eXplanoTech
The document discusses strategies that mobile operators can use to support increasing mobile data usage. It outlines several approaches operators are taking, including deploying small cells to increase network capacity, leveraging WiFi networks to offload traffic, and using new 3GPP standards and technologies like carrier aggregation and dynamic spectrum management. The document also provides a case study of how one US operator has evolved its network from 1947 to the present day to support growing demand.
5G slicing and management tmf contribution Saurabh Verma
- The document discusses TM Forum's work on 5G network slicing, including requirements, use cases, and business models.
- It describes two deployment scenarios: a single slice provider model with one provider spanning access, backhaul, and core networks; and a multi-slice provider model with the end-to-end slice spanning multiple providers.
- The key aspects covered are the network slice lifecycle including creation, operations, modification, and termination as well as the roles of 5G OSS/BSS, orchestration, and assurance functions.
More than a decade ago, Cisco introduced wireless solutions that addressed challenges associated with address mobility, seamless authentication and comprehensive backend accounting.
In the last few years, the industry has transformed to offer an immense range of Smart Devices. This unprecedented growth in mobile traffic demands a change to scale to the new reality of any–to-any connectivity. This is a technical deep dive presentation on BNG Deployments and Mobile Offload techniques
This document discusses small cells and Wi-Fi integration into the Evolved Packet Core (EPC) network. It provides an introduction to small cells and their need due to increasing data usage. It describes heterogeneous networks (HetNets) which incorporate small cells and different radio access technologies. The document outlines the EPC network architecture and components. It then discusses small cells in more detail including their standardization, logical architecture, and LTE deployment options. The document covers Wi-Fi including standards, integration into EPC using various methods, and the Hotspot 2.0 specification. It discusses seamless connectivity between 3GPP and non-3GPP networks and provides a conclusion on the roles of small cells and Wi-Fi
The key security elements for 4G include key security for authentication between network components, authorization using authentication vectors, and key management for key establishment and distribution. However, 4G networks are susceptible to interference, jamming, location tracking, bandwidth theft, and denial of service attacks due to their open and standardized nature. Proper security mechanisms must be implemented to protect users and critical network infrastructure.
This document discusses ways that LTE can help boost average revenue per user (ARPU) for mobile network operators. It suggests that LTE enables faster speeds and more reliable mobile broadband, allowing for new applications that can drive additional revenue. These include real-time apps, location-based services, mobile health apps, high definition content, and quality of service features that users may pay premiums for. Network sharing and fixed-mobile convergence are also discussed as ways to reduce costs and increase customer loyalty. However, the document notes that simply focusing on ARPU may not be the best approach, and that factors like passive data devices could impact ARPU metrics.
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencySukhvinder Singh Malik
The Long Term Evolution (LTE) is the latest step in an advancing series of mobile telecommunications systems.
In this paper, authors show interest on the link budgeting the information presented here will help readers understand how the budgeting will be done in LTE. This paper provides
dimensioning of LTE for particular city.
This will provides the number of cell count. Here we tell about a GUI MATLAB System for calculation of no. of resources required to provide services in particular area with optimum cost and better quality.
This document discusses the intersection of 5G networks and open reference platforms. Open reference platforms using disaggregated RAN architectures and open interfaces can offer new user experiences through edge computing and adaptive analytics. Challenges include developing principles for graph abstraction of radio networks and understanding service layers and multi-tenancy in open and democratized architectures. Open source communities and standards bodies are collaborating on initiatives like O-RAN and ONAP to define open interfaces and platforms that enable a more programmable radio access network.
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20PositiveTechnologies
Most operators plan to deploy 5G by relying on previous-generation 4G LTE networks with Non-Standalone architecture. The problem is that this approach will leave 5G subscribers with all the security issues of previous-generation networks.
Learn how to safely and systematically bring mobile networks up to 5G. In this webinar, Pavel Novikov, Head of the Telecom Security Research Team, discusses:
- Which new risks will appear with 5G deployment
- Why the 5G security architecture by itself is not enough to keep networks safe
- Why any 5G-only security efforts will be pointless
- How to protect 5G networks
This document discusses wireless network design considerations for deploying Cisco's Unified Wireless Network (UWN) architecture. It covers topics such as wireless technologies, wireless network topologies, wireless network components, wireless LAN controllers, autonomous and lightweight access points, wireless security, site survey processes, and controller redundancy designs. The goal is to introduce the Cisco UWN architecture and discuss principles for designing wireless networks using lightweight access points and wireless LAN controllers.
The document summarizes the IEEE 802.11 wireless local area network (WLAN) technology standard. It discusses the history and development of IEEE 802.11. It describes the key components of IEEE 802.11 including the physical layer specifications of 802.11a/b/g/n and the medium access control techniques like distributed coordination function. It also discusses newer amendments for quality of service, security, and mesh networking and upcoming standards like 802.11ac that aim to increase throughput. The document provides an overview of the IEEE 802.11 WLAN standard and its extensions over time to support higher data rates and new applications.
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...IJCNCJournal
Cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network
operators in how to extract the most value from their deployments while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the “conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking
(SDN). In this paper, we will attempt to explore some existing options within the LTE standard to address traffic challenges. We then survey some SDN-enabled alternatives and comment on their merits and drawbacks.
The document compares LTE and WiMAX technologies. It discusses their evolution from earlier standards to 4G versions (LTE-Advanced and WiMAX 2.0). While technically similar, some key differences that gave LTE an advantage included LTE's shorter frame duration which enabled lower latency, as well as its earlier standardization and broader operator support. Looking forward, WiMAX plans to integrate with LTE in a heterogeneous network approach, as LTE has become the dominant 4G standard.
A proposal to enhance cellular and wifiIJCNCJournal
WiFi offloading is becoming one of the key enablers to help the network operators dealing with the exponentially growing demand of mobile data. The idea of using WiFi to offload data traffic from cellular network has proposed for many years. However, the interoperability issue between the two networks needs to be enhanced so that WiFi can efficiently supplement for the cellular network in case of congestion or outage. In this paper, we propose a novel network roaming and selection scheme based on 3GPP TS 24.312 and IEEE 802.11k, u standards to enhance cellular and WiFi interworking. The proposed scheme is aimed at enhancing the network roaming and selection so that WiFi network can serve as a supplement and backup access network for the cellular not only for congestion control but also in case of unexpected network failure event. We also model and evaluate the proposed scheme in a typical HetNet with interworking WiFi access points and cellular base stations. The simulation result shows that our proposed scheme quickly detects unexpected network failure event and assists active UEs to perform handoff to preferable alternative point of access. As a result, service disruption is substantially reduced and quality of experience (downlink/uplink’s throughput) is improved. Therefore, our proposed scheme can be used for a more reliable HetNet in terms of congestion control and disruption tolerance.
This document provides an overview of the Mobile WiMAX IEEE 802.16m standard. It discusses key enhancements in Mobile WiMAX including improved non-line-of-sight coverage through advanced antenna diversity schemes and hybrid automatic repeat request. It also covers adaptive antenna systems and multiple-input multiple-output technologies to improve coverage. The document focuses on physical layer specifications for 802.16m including flexibility to support heterogeneous users and extending the use of multiple-input multiple-output transmission. It also discusses resource allocation, multi-cell multiple-input multiple-output, and interoperability with legacy WiMAX and other wireless technologies.
Cellular networks are overloaded by mobile data traffic because of fast growth of mobile broadband services and the widespread use of smart phones. Application of smartphone, laptops internet etc. are increasing day by day. All this is causing congestion problem. Data revenue problem is a major problem for the network operators. One of the solutions to alleviate this problem is the offloading of mobile data traffic from the cellular access technology to the Wi-Fi access network. Wi-Fi access point is widely deployed by customers or by the operators so can be easily used for offloading technique. This paper reviews the models and architecture of offloading in between LTE network and Wi-Fi access network. Limitations of using Wi-Fi as alternative access network is also discussed in this paper and brief of ANDSF is provided in the paper.
This document compares the next-generation mobile broadband technologies LTE and WiMAX. It describes their quality of service (QoS) structures and how they are designed to support current and future QoS needs to sustain various application requirements. The document provides details on LTE and WiMAX standards, architectures, and QoS support through different bearer types and service flows.
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
The document provides an overview of 802.11ac and how it compares to previous wireless standards like 802.11n. Some key points:
- 802.11ac aims to deliver significantly higher performance than 802.11n by utilizing wider channel bandwidths up to 160MHz, more efficient modulation up to 256QAM, improved beamforming, and multi-user MIMO to transmit to multiple devices simultaneously.
- While 802.11ac will triple throughput over 802.11n, reaching speeds over 1Gbps, this still may not provide enough bandwidth when shared between multiple users to fully replace wired networks.
- 802.11ac maintains backward compatibility with 802.11
This document analyzes the performance of routing algorithms for an integrated Wi-Fi/WiMAX heterogeneous network. It begins with an introduction describing the need for such integrated networks to provide uninterrupted wireless service. It then provides overviews of the Wi-Fi (IEEE 802.11n) and WiMAX (IEEE 802.16e) technologies that would be integrated. Several routing algorithms are described, including Bellman-Ford, AODV, DYMO, OLSRv2, RIP, and OSPFv2. The document then discusses how to statistically analyze the performance of the integrated network using these various routing algorithms, focusing on metrics like throughput, packet loss probability, and distortion. The analysis will
This document summarizes a seminar report on 4G cellular networks using WiMAX technology. The report discusses WiMAX network architectures, standards, features and modulation schemes. It analyzes WiMAX network performance by simulating handovers between WiMAX, UMTS and WiFi networks. The simulation results show that a WiMAX-WiMAX environment provides significantly higher throughput, lower end-to-end delay and jitter compared to heterogeneous handovers between different network types.
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...IJECEIAES
IEEE 802.11ac based wireless local area network (WLAN) is emerging WiFi standard at 5 GHz, it is new gigabit-per-second standard providing premium services. IEEE 802.11ac accomplishes its crude speed increment by pushing on three distinct measurements firstly is more channel holding, expanded from a maximum of 80 MHz up to 160 MHz modes. Secondly, the denser modulation, now using 256-QAM, it has the ability to increase the data rates up to 7 Gbps using an 8×8 multiple input multiple output (MIMO). Finally, it provides high resolution for both narrow and medium bandwidth channels. This work presents a study to improve the performance of IEEE 802.11ac based WLAN system.
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
This document summarizes a research paper that analyzed the throughput of the IEEE 802.11ac wireless network standard under different security protocols. The research was conducted using a test bed that consisted of a client, server, and access point connected via CAT5e cable. Experiments were run to measure throughput with no security, and with WEP, WPA, and WPA2 security enabled. The results showed that throughput was highest with no security and decreased under the different security protocols.
A FUTURE MOBILE PACKET CORE NETWORK BASED ON IP-IN-IP PROTOCOLIJCNCJournal
The current Evolved Packet Core (EPC) 4th generation (4G) mobile network architecture features complicated control plane protocols and requires expensive equipment. Data delivery in the mobile packet core is performed based on a centralized mobility anchor between eNode B (eNB) elements and the network gateways. The mobility anchor is performed based on General Packet Radio Service tunnelling protocol (GTP), which has numerous drawbacks, including high tunnelling overhead and suboptimal routing between mobile devices on the same network. To address these challenges, here we describe new mobile core architecture for future mobile networks. The proposed scheme is based on IP encapsulated within IP (IP-in-IP) for mobility management and data delivery. In this scheme, the core network functions via layer 3 switching (L3S), and data delivery is implemented based on IP-in-IP routing, thus eliminating the GTP tunnelling protocol. For handover between eNB elements located near to one another, we propose the creation of a tunnel that maintains data delivery to mobile devices until the new eNB element updates the route with the gateway, which prevents data packet loss during handover. For this, we propose Generic Routing Encapsulation (GRE) tunnelling protocol. We describe the results of numerical analyses and simulation results showing that the proposed network core architecture provides superior performance compared with the current 4G architecture in terms of handover delay, tunnelling overhead and total transmission delay.
Introduction Videos about LTE AP Pro
Overview on LTE and 4.5 G Evolution Around the World
LTE Advance Pro: Enhancements
LTE Advance Pro: New Use Cases
Case Study: Turkey’s Mobile Operators Evolution towards 4.5 G
Summary of LTE Advance Pro
MATLAB Simulation: 2D Beamforming algorithms (LMS, NLMS RLS and CM)
References
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricIRJET Journal
This document presents a comparative analysis of the maximum throughput performance of 802.11b and 802.11g wireless networks. It describes the theoretical formulas used to calculate throughput and compares them to experimental throughput values obtained using the iperf tool. The results show that the theoretical throughput is higher than experimental throughput for both 802.11b and 802.11g networks, and that 802.11g has a comparatively greater throughput than 802.11b. Formulas for calculating theoretical throughput are provided for each network standard.
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...pijans
The escalating demand for swift and dependable wireless internet access has spurred the development of
various protocols within 802.11 WLANs. Among them, the 802.11ac protocols have gained widespread
acceptance over the past few years, offering enhanced data transfer rates compared to the 802.11n
standard. However, the persistent congestion of wireless IoT devices, particularly in densely populated
areas, remains a significant challenge. To tackle this issue, IEEE 802.11 has advanced IEEE 802.11ax as
the successor to 802.11ac, introducing critical enhancements at the PHY/MAC layers to improve
throughput in dense scenarios. Additionally, modelling and simulating these protocols are vital for WLAN
researchers and designers to anticipate link characteristics effectively, fostering high-performance WLAN
design. The need for such tools led to the creation of diverse network simulation programs, and NS-2 is
widely accepted as an open-source program that has achieved remarkable success in research. In this
paper, we focus on various connection properties of 802.11ax WLANs through NS-3 simulations, including
MCSs, bonded channels, GI, data encoding, antennas, data rates, link distance, Tx/Rx power, gain, and
payload size. We also compare their performance against 802.11ac, which demonstrates that NS-3
accurately supports most 802.11ax capabilities and outperforms 802.11ac in various scenarios.
This paper presents a comparative study of IEEE 802.11 a/b/g/n wireless LAN standards in an ELearning classroom network using adhoc networks as communication support. The evaluation is performed through a series of scenarios schematizing communication between students and practitioners in an educational context. The first objective is to plan the physical layer via the choice of the suitable transmission standard that satisfy the implementation specifications. Given the real-time traffic considered, a good traffic transmission must be ensured.
LTE-Advanced is an evolution of LTE that aims to meet or exceed the requirements for 4G networks set by the ITU. It is being developed by 3GPP and will utilize wider bandwidths through carrier aggregation and advanced antenna technologies to achieve higher data rates and spectral efficiency than LTE. The specifications are targeted to be frozen by March 2011, with the first deployments expected in the years following completion of LTE specifications and testing.
BBA Colleges in Gurgaon 2023_ Ranking, Fees, Placements.pdfPraveen Kumar
This document provides information about BBA colleges in Gurgaon, India. It mentions that there are around 35 colleges in Gurgaon that offer BBA programs, with 20 being private institutes and 7 public institutes. Amity University is ranked as the top private BBA college in Gurgaon. Great Lakes Institute of Management is ranked as the best BBA college in Gurgaon according to the NIRF 2023 ranking, placing 62nd among BBA colleges in India. It then provides details on some of the top BBA colleges in Gurgaon, including BML Munjal University, Amity University, IILM University, and KR Mangalam University.
The document discusses various LTE measurement techniques including:
1. Preamble detection, transport BLER, timing advance, RSSI, SINR, CSI which are measurements performed by the eNB.
2. RSRP, RSRQ which are measurements performed by the UE to aid in cell selection and reselection.
3. Timing advance which involves the eNB measuring the timing of uplink transmissions from the UE and sending a timing advance command to adjust the UE's timing.
Recent Advances in Wireless Small Cell Networks
This document provides an overview of small cell networks and associated challenges. It discusses:
1) The need for small cell networks to address exponentially increasing mobile data demand. Mobile traffic is expected to grow 1000x by 2020 due to more devices, higher data rates, and video.
2) Characteristics of small cell networks including heterogeneous deployment of different types of small cells (e.g. femtocells, picocells), various access policies, and backhaul challenges.
3) Key challenges for small cell networks including interference management, mobility management, self-organization, energy efficiency, and integration with existing cellular networks. Modeling and analysis of small cell networks is important
4.5G: Integration of LTE and Wi-Fi networksPraveen Kumar
This document discusses the integration of LTE and Wi-Fi networks. It describes how 3GPP and Wi-Fi standards have become more interoperable, allowing cellular devices to take advantage of Wi-Fi networks. The Access Network Discovery and Selection Function (ANDSF) plays a key role in allowing user equipment to discover and select Wi-Fi networks based on network policies. Seamless integration of Wi-Fi and LTE is important for offloading data traffic from cellular networks to Wi-Fi networks, which can help improve network capacity and performance.
LTE: Changing the Face of NewsgatheringPraveen Kumar
Richard Pattison discusses how LTE technology is revolutionizing Sky News' newsgathering capabilities. Previously reliant on expensive satellite trucks, Sky News can now use smaller, cheaper cellular bonding devices and smartphones to transmit live video over 4G networks. Key developments include testing early 4G networks in 2012-2013, securing large data plans from mobile providers, and deploying Aviwest cellular bonding devices which provide stable, high quality live streams. Sky News now has 24 cellular devices matching the number of satellite trucks, demonstrating how LTE has transformed their newsgathering abilities.
The document discusses network sharing opportunities in LTE mobile networks. It describes how network sharing can help reduce costs for mobile service providers facing increasing data traffic and changing revenue models. The standards allow for two types of network sharing - national roaming, where one operator's customers access another's network, and eUTRAN sharing, where operators share active network elements like base stations. eUTRAN sharing has two approaches defined in 3GPP - Multi-Operator Core Network (MOCN), where the shared network connects to separate core networks, and Gateway Core Network (GWCN), where the shared MME is also shared. Customer cases illustrate how different sharing models may apply depending on the market situation and operators' objectives.
Difference in Rrc procedures lte and 3GPraveen Kumar
- RRC in LTE has only two states - RRC_IDLE and RRC_CONNECTED, compared to five states in 3G. This simplifies RRC state handling and RRM algorithms.
- Signaling radio bearers are simplified to SRB0, SRB1, and SRB2 (still being finalized) compared to four SRBs in 3G.
- RRC procedures and messages are simplified in LTE compared to 3G. This reduces signaling overhead and complexity.
LTE-Advanced Enhancements and Future Radio Access Toward 2020Praveen Kumar
1) The document discusses enhancements to LTE and future radio access technologies being studied by NTT DOCOMO for release 12 and beyond.
2) Key areas of study include small cell enhancements, 3D and full dimension MIMO, interference cancellation techniques, device-to-device communications, and dynamic TDD.
3) Looking further to 2020 and beyond, requirements for future radio access include supporting 1000x capacity increases, low latency applications, and connectivity for billions of devices. Evolution paths may include further LTE enhancements as well as new radio access technologies utilizing new spectrum allocations.
This document discusses self-optimizing networks (SON) and the benefits of SON in LTE networks. It provides an overview of the 3GPP standardization timeline for SON, describing enhancements to SON features over LTE Releases 8 through 11. Key SON features covered include automatic neighbor relations, physical cell identifier planning, load balancing, mobility robustness optimization, interference coordination, energy savings, and coverage/capacity optimization. The document also examines multi-vendor SON architecture alternatives and the role of SON in deploying multi-vendor heterogeneous networks.
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and enhanced broadcast services.
This document summarizes the physical layer design of LTE Release 8 and enhancements for LTE-Advanced. It describes the downlink and uplink multiple access schemes, reference signals, control signaling, data transmission procedures, UE categories, and support for frequency division duplex and time division duplex operation. The document provides an overview of the 3GPP release timeline and the specifications that define the LTE physical layer.
This document discusses advanced topics in LTE including MIMO modes, codebook-based precoding, closed loop operation, CQI reporting modes, and using antenna port 5 techniques. It provides details on codebook-based spatial multiplexing, CQI reporting tables, adaptive coding and modulation, MIMO channel estimation, and MIMO transmission modes in LTE. It aims to outline these advanced LTE techniques and their operation.
This document outlines an agenda for a presentation on LTE basics and advanced topics. The presentation will cover LTE fundamentals including frame structures, reference signals, physical channels, signal processing architecture, and UE categories. It will then discuss advanced LTE topics such as MIMO modes, precoding techniques, CQI reporting, and LTE-Advanced developments. Diagrams and explanations are provided on key aspects of the LTE physical layer such as OFDMA transmission schemes, frame formats, reference signal patterns, and the transmitter and receiver processing chains.
The document discusses LTE medium access control layer concepts. It describes dynamic and semi-persistent scheduling used by the eNB to allocate downlink and uplink radio resources to UEs. Semi-persistent scheduling is used for periodic traffic like VoIP to reduce signaling overhead compared to dynamic scheduling. It also discusses buffer status reporting where UEs indicate how much data they have to transmit, and scheduling requests where UEs request uplink resources from the eNB.
This document discusses beamforming and the eight transmission modes in LTE Release 9. It begins with introductions to MIMO technology and beamforming basics. It then explains the eight transmission modes, including single transmit antenna mode, transmit diversity, open and closed loop spatial multiplexing, multi-user MIMO, and two beamforming modes that use UE-specific reference signals. Key aspects of LTE such as physical channels and the reference signal structure are also summarized.
Mimo and smart antennas july 2013 finalPraveen Kumar
The document discusses MIMO techniques and antenna configurations used in LTE networks. It describes how LTE supports 1-8 transmit antennas at the base station and 2-8 receive antennas at the UE. The most common configuration is 4x2 MIMO where the base station uses 4 transmit antennas and the UE uses 2 receive antennas. MIMO can increase peak data rates through spatial multiplexing but works best for users with high SINR close to the base station. Open loop MIMO is used for high mobility while closed loop MIMO relies on channel feedback for better performance but only works well in low mobility environments.
The document summarizes new technology components introduced in 3GPP Release 11 for LTE-Advanced, including:
1. Enhancements to LTE carrier aggregation, such as support for multiple timing advances to allow aggregation of carriers with different propagation delays, and specifications for non-contiguous intra-band carrier aggregation.
2. Introduction of Coordinated Multi-Point operation (CoMP) which coordinates transmission from multiple spatially separated nodes.
3. Specification of the Enhanced Physical Downlink Control Channel (E-PDCCH) to meet demands for increased downlink control channel capacity.
4. Additional improvements like further enhanced inter-cell interference coordination, network positioning functionality, MBMS
The document describes the signaling flow and messages exchanged between the various network entities during the LTE attach procedure and default bearer activation for a UE. It provides details on the S1AP, S6a, S11 and NAS messages with information elements like IMSI, GUTI, QoS parameters, GTP tunneling endpoints etc. exchanged at each step of the procedure to establish the default data path for a UE attaching to the network.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Are you interested in learning about creating an attractive website? Here it is! Take part in the challenge that will broaden your knowledge about creating cool websites! Don't miss this opportunity, only in "Redesign Challenge"!
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
How to Avoid Learning the Linux-Kernel Memory ModelScyllaDB
The Linux-kernel memory model (LKMM) is a powerful tool for developing highly concurrent Linux-kernel code, but it also has a steep learning curve. Wouldn't it be great to get most of LKMM's benefits without the learning curve?
This talk will describe how to do exactly that by using the standard Linux-kernel APIs (locking, reference counting, RCU) along with a simple rules of thumb, thus gaining most of LKMM's power with less learning. And the full LKMM is always there when you need it!
How Netflix Builds High Performance Applications at Global ScaleScyllaDB
We all want to build applications that are blazingly fast. We also want to scale them to users all over the world. Can the two happen together? Can users in the slowest of environments also get a fast experience? Learn how we do this at Netflix: how we understand every user's needs and preferences and build high performance applications that work for every user, every time.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
MYIR Product Brochure - A Global Provider of Embedded SOMs & SolutionsLinda Zhang
This brochure gives introduction of MYIR Electronics company and MYIR's products and services.
MYIR Electronics Limited (MYIR for short), established in 2011, is a global provider of embedded System-On-Modules (SOMs) and
comprehensive solutions based on various architectures such as ARM, FPGA, RISC-V, and AI. We cater to customers' needs for large-scale production, offering customized design, industry-specific application solutions, and one-stop OEM services.
MYIR, recognized as a national high-tech enterprise, is also listed among the "Specialized
and Special new" Enterprises in Shenzhen, China. Our core belief is that "Our success stems from our customers' success" and embraces the philosophy
of "Make Your Idea Real, then My Idea Realizing!"
1. WLAN Traffic Offload in LTE
White Paper
This whitepaper provides an overview of the WLAN
offload in LTE as standardized by 3GPP, as well as
the enhancements for Wi-Fi standardized by IEEE
and the Wi-Fi Alliance. It also describes access
methods in the joint network, treats the security, and
describes IP mobility. In addition network discovery
and selection are explained.
A.Schumacher/J.Schlienz
11/21/2012-1MA214_0e
WhitePaper
2. Table of Contents
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 2
Table of Contents
1 Introduction......................................................................................... 3
2 Architecture of WLAN Networks ....................................................... 4
2.1 Physical Layer (PHY)...................................................................................................5
2.2 Medium Access Control (MAC) ..................................................................................5
2.3 Network Architecture ..................................................................................................6
2.4 IEEE 802.11u.................................................................................................................7
2.5 Security.........................................................................................................................8
2.5.1 Data Encryption over the WLAN Air Interface ...............................................................8
2.5.2 Secure Authentication....................................................................................................9
2.6 Wi-Fi Alliance .............................................................................................................10
2.6.1 Hotspot 2.0 / Passpoint................................................................................................11
3 WLAN Access to the 3GPP Network ............................................... 12
3.1 Non-Trusted Access..................................................................................................12
3.2 Trusted Access ..........................................................................................................13
4 IP Mobility.......................................................................................... 14
4.1 Client Based IP Mobility ............................................................................................14
4.1.1 IP Flow Mobility (IFOM) ...............................................................................................16
4.2 Network Based IP Mobility........................................................................................17
4.2.1 Proxy Mobile IP Version 6 (PMIPv6) ...........................................................................17
4.2.2 GPRS Tunneling Protocol (GTP).................................................................................19
4.3 Realization in the EPC...............................................................................................19
5 Network Discovery and Selection ................................................... 21
5.1 Access Network Discovery and Selection Function..............................................21
5.1.1 Architecture..................................................................................................................21
5.1.2 Information Exchange Procedure ................................................................................22
5.1.3 Communication............................................................................................................22
5.1.4 Nodes...........................................................................................................................23
5.2 Access Network Query Protocol (ANQP) ................................................................24
5.2.1 Generic Advertisement Service (GAS) ........................................................................25
5.2.2 ANQP Information Elements........................................................................................26
5.2.3 Example ANQP Procedure ..........................................................................................27
6 Summary ........................................................................................... 28
3. Introduction
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 3
1 Introduction
Due to the strong increasing number of smart phones in the mobile market there is a
tremendous growth for mobile data traffic. According to a forecast from Cisco [1], this
traffic will grow from about 2 Exabyte per month in 2012 to more than 10 Exabyte per
month in 2016, leading to a possible bottleneck in the mobile networks. In order to
cope with this amount of traffic, operators are therefore under pressure to find pertinent
solutions with reasonable costs.
One way is the optimization on the mobile network itself. In the 3rd Generation
Partnership Project (3GPP) there are plenty of work items to improve the spectral
efficiency and to improve the network architecture, for example with the introduction of
Heterogeneous Networks, either with or without carrier aggregation. Of course, also
the extension of the available frequencies is a permanent topic, allowing higher peak
data rates and denser networks with reduced interferences in the cell edge.
Another way to improve data throughput is to include additional access technologies
which already exist. WLAN is a promising candidate for this kind of solution, because
there is a huge amount of networks already rolled out worldwide and the end devices
are very price competitive. In addition, WLAN is optimized for in-building usage and is
therefore best suited for a data offloading solution, because according to statistics from
Ericsson [2], about 70% of the mobile data are created indoors.
WLAN is already integrated in most of the current smartphones. However, in most
devices in the market today, WLAN and 3GPP technologies may be regarded as two
separate devices in one box: Specific IP flows are routed over the WLAN access
without traversing the 3GPP nodes. A first architecture for the integration of WLAN
networks in 3GPP was defined from Release 6 on, the Interworking WLAN (I-WLAN)
[3][4]. This architecture describes the interfaces between the networks, the data and
control paths, and the protocols for the access and authentication. In the 3GPP
Evolved Packet Core (EPC), this connection was defined from the very beginning, with
two options denoting the trust relationship of a cellular network operator to the WLAN
network [5].
In addition to the architecture there is the question how the data-offload is realized. Up
to Release 9, the only way to offload data is using the WLAN as a foreign network with
a handover on the IP level. Consequently, either the 3GPP network or the WLAN may
be used for data exchange, but not both simultaneously. This is now changed from
Release 10 on. In the IP Flow Mobility (IFOM) approach selected IP flows may be
routed over the EPC connection, while others are routed over WLAN, depending e.g.
on the availability and QoS requirements. Often only the IFOM capability is the feature
which is called WLAN offload [6].
In this whitepaper the IFOM technology for the EPC is discussed. We start in chapter 2
with a short summary of the WLAN networks and explain in chapter 3 its integration
into an EPC network. In chapter 4 the IP mobility is described showing the path to
IFOM. In chapter 5 details about the network selection principles and operator policies
are described. Finally, a short summary and outlook is provided in chapter 6.
4. Architecture of WLAN Networks
Physical Layer (PHY)
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 4
2 Architecture of WLAN Networks
Wireless Local Area Network (WLAN) also commonly known as Wi-Fi is a wireless
data communication system. It is widely used e.g. in corporate enterprises, offices,
airports, stores, cafes/restaurants, and at home. Many portable computers (notebooks,
tablets) and basically all smartphones are equipped with WLAN. The underlying
technology is standardized by the Institute of Electrical and Electronics Engineers
(IEEE) and the current specification is IEEE 802.11-2012, published in March 2012 [7].
It defines the physical layer (PHY) and medium access control (MAC).
For evolving the standard, IEEE forms task groups and enumerates them with letters.
Their output is then an amendment to the base 802.11 standard. Since 1999 there are
18 amendments that were incorporated into a new revision of the whole 802.11
standard.
IEEE Std 802.11-2007 revision
IEEE Std 802.11a™-1999 High Speed Physical Layer in the 5GHz Band
IEEE Std 802.11b™-1999 Higher-Speed Physical Layer Extension in the 2.4 GHz Band
IEEE Std 802.11d™-2001 Specification for Operation in Additional Regulatory Domains
IEEE Std 802.11g™-2003 Further Higher Data Rate Extension in the 2.4 GHz Band
IEEE Std 802.11h™-2003 Spectrum and Transmit Power Management Extensions in the 5 GHz Band
in Europe
IEEE Std 802.11i™-2004 MAC Security Enhancements
IEEE Std 802.11j™-2004 4.9 GHz - 5 GHz Operation in Japan
IEEE Std 802.11e™-2005 MAC Enhancements for Quality of Service
IEEE Std 802.11-2012 revision
IEEE Std 802.11k™-2008 Radio Resource Measurement of Wireless LANs
IEEE Std 802.11r™-2008 Fast Basic Service Set (BSS) Transition
IEEE Std 802.11y™-2008 3650–3700 MHz Operation in USA
IEEE Std 802.11w™-2009 Protected Management Frames
IEEE Std 802.11n™-2009 Enhancements for Higher Throughput
IEEE Std 802.11p™-2010 Wireless Access in Vehicular Environments
IEEE Std 802.11z™-2010 Extensions to Direct-Link Setup (DLS)
IEEE Std 802.11v™-2011 IEEE 802.11 Wireless Network Management
IEEE Std 802.11u™-2011 Interworking with External Networks
IEEE Std 802.11s™-2011 Mesh Networking
5. Architecture of WLAN Networks
Physical Layer (PHY)
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 5
2.1 Physical Layer (PHY)
Several different implementations for operation in the 2.4 GHz ISM
1
band or the 5 GHz
U-NII
2
and ISM bands are specified and used today [7]:
WLAN PHY Standards
PHY Frequency
Band
Channel
Bandwidth
Modulation Transmission
Technology
Max. Data Rate
802.11a
(OFDM)
5 GHz 20 MHz OFDM SISO 54 Mb/s
802.11b
(HR/DSSS)
2.4 GHz 22 MHz DSSS/CCK SISO 11 Mb/s
802.11g (ERP) 2.4 GHz 22 MHz DSSS/CCK,
OFDM
SISO 54 Mb/s
802.11n (HT) 2.4 / 5 GHz 20, 40 MHz OFDM SISO, SU-MIMO 600 Mb/s
802.11ac (VHT) 5 GHz 20, 40, 80,
80+80, 160 MHz
OFDM SISO, SU-
MIMO, MU-
MIMO
6.933 Gb/s
The amendment 802.11ac (Very High Throughput) allows data rates of several Gb/s.
Completion and release of this amendment is anticipated for beginning of 2013.
2.2 Medium Access Control (MAC)
The physical medium access is controlled by the protocol named Carrier Sense
Multiple Access with Collision Avoidance (CSMA/CA). This also implies that the MAC
has to acknowledge correctly received data packets. Further functionality includes the
data fragmentation and reassembly, data security, authentication/de-authentication,
association/disassociation, and the periodical transmission of beacon frames.
Additional functions for transmit power control, Quality-of-Service (QoS) traffic
scheduling, and radio measurements are also incorporated into the MAC layer.
There are three frame types for communication on MAC-level:
ı Management Frames
beacon, probe request/response, association request/response, re-association
request/response, authentication, de-authentication, disassociation,
announcement traffic indication message (ATIM), action.
ı Control Frames
acknowledge (ACK), block ACK request, block ACK, request to send (RTS), clear
to send (CTS), power save (PS) poll.
ı Data Frames
data, null (no data), several for contention free (CF) and QoS prioritized
communication.
1
Industrial, Scientific, and Medical band: 2.400 - 2.500 GHz, 5.725 - 5.875 GHz
2
Unlicensed National Information Infrastructure band: 5.150 - 5.350 GHz and 5.470 - 5.825 GHz
6. Architecture of WLAN Networks
Network Architecture
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 6
2.3 Network Architecture
The IEEE 802.11 architecture consists of several components. Every addressable
device with WLAN functionality is a Station (STA). There are special STA entities that
have additional functionality and are connected to a Distribution System (DS). Such an
entity is named Access Point (AP). See Figure 2-1 for an illustration.
An AP with one or several connected STAs forms a Basic Service Set (BSS). The BSS
is the basic building block of a WLAN and corresponds to a cell in e.g. LTE. The STAs
that are member of a certain BSS are not static. I.e. a device (e.g. STA 3) could move
away from its associated AP 1 and/or come closer to the neighboring AP 2 and
associate with it, thus becoming a member of BSS 2.
Several APs can be connected together with the DS. This allows e.g. STA 1 in BSS 1
to communicate with STA 6 in BSS 2. Such a group of elements is then called
Extended Service Set (ESS).
There is another basic type of connection, namely when STAs directly connect with
each other and no AP is involved. Such a network is an Independent Basic Service Set
(IBSS) or also known as ad-hoc network. This network topology is possible, because in
WLAN the communication is symmetrical on the physical layer, i.e. there is no
distinction between uplink (UL) and downlink (DL).
Hotspots always consist of an AP and usually are connected to a router and the
Internet, therefore they are a BSS or in case of a larger venue, an ESS.
Distribution System (DS)
Basic Service Set (BSS) 1
Basic Service Set (BSS) 2
Independent Basic Service Set (IBSS)
Extended Service Set (ESS)
AP 1
STA 1
AP 2
STA 2
STA 3
STA 4
STA 5
STA 6
STA 7
STA 8
STA 9
AS
Figure 2-1: Components of the WLAN Architecture
The standard 802.11-2012 also defines the Robust Security Network Association
(RSNA) as part of the architecture. It was added through the 802.11i amendment and
improves the security with the following features:
7. Architecture of WLAN Networks
IEEE 802.11u
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 7
ı Enhanced authentication mechanisms for STAs
ı Key management algorithms
ı Cryptographic key establishment
ı Enhanced data cryptographic encapsulation mechanisms
ı Fast basic service set (BSS) transition (FT) mechanism
ı Enhanced cryptographic encapsulation mechanisms for robust management
frames
In order to use these features, external components may be necessary. One is an
IEEE 802.1X port access entity (PAE) implemented in every STA. Another is the
Authentication Server (AS) that can authenticate elements of an RSNA and also uses
IEEE 802.1X.
2.4 IEEE 802.11u
The IEEE 802.11u [8] is an amendment to the 802.11 standard and is titled
“Interworking with External Networks”. It was published in February 2011 and was
incorporated into the 802.11-2012 specification version. According to [7] the
amendment “defines functions and procedures aiding network discovery and selection
by STAs, information transfer from external networks using QoS mapping, and a
general mechanism for the provision of emergency services.”
The main extensions to the MAC layer are: the Generic Advertisement Service (GAS)
that enables a communication of a STA with an AP before an actual association;
additional information elements (IEs) for the Beacon frame and other management
frame types; a QoS mapping of external QoS control parameters to the QoS
parameters of 802.11; a MAC Service Data Unit (MSDU) rate limiting function to
enforce the resource utilization limit if indicated by the destination STA; support of
emergency services, i.e. allow a STA without proper security credentials to still place
an emergency call.
There are no changes to the PHY layer and therefore the same hardware can be used.
Hotspot
Operator
Internet
Network
Operator A
Network
Operator B
AAA
AAA
SSID: AnySSID
BSSID: 00:fe:dc:ba:00:00
HESSID: 00:fe:dc:ba:00:00
SSID: AnySSID
BSSID: 00:fe:dc:ba:00:01
HESSID: 00:fe:dc:ba:00:00
SSID: AnySSID
BSSID: 00:fe:dc:ba:00:02
HESSID: 00:fe:dc:ba:00:00
SSID: AnySSID
BSSID: 00:fe:dc:ba:00:03
HESSID: 00:fe:dc:ba:00:00
SSID: AnySSID
BSSID: 00:fe:dc:ba:00:04
HESSID: 00:fe:dc:ba:00:00
Figure 2-2: Several 802.11u APs forming a homogeneous ESS
Venues where WLAN access is provided often have several APs linked together in an
ESS, what is also called a Homogeneous ESS. 802.11u adds the Interworking IE that
also contains a Homogeneous ESS identifier (HESSID) that allows the STAs to identify
8. Architecture of WLAN Networks
Security
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 8
which APs belong to the same ESS. An example is shown in Figure 2-2 where all the
APs indicate that they belong together by using the BSS identifier (BSSID) of one of
them as HESSID.
2.5 Security
In WLAN, authentication and data encryption is integrated together. For authentication
there are two methods, open system authentication and secure authentication. The
open system authentication which is part of Wired Equivalent Privacy (WEP) does not
require credentials to access a network. Therefore, no authentication is done and any
STA can connect. WEP keys may be used for data encryption, but this method does
not provide security anymore. Since 2006 all new Wi-Fi devices have to provide Wi-Fi
Protected Access 2 (WPA2) for secure authentication and data encryption.
It is also possible to use another authentication method with the help of the Extensible
Authentication Protocol (EAP) and WPA2 provides the data encryption.
2.5.1 Data Encryption over the WLAN Air Interface
The Wired Equivalent Privacy (WEP) protocol was the first security feature introduced
for WLAN for both authentication and data encryption. It relies on a four step
challenge-response handshake. Technically, it requires the knowledge of a shared key
(40, later 104 bits) that is used for an RC4 symmetric encryption. However, with
today’s available processing power and certain software tools, it is possible to decipher
the shared key and thus cannot be regarded anymore as secure.
In order to improve the security, the Wi-Fi Protected Access (WPA) was introduced as
an interim solution. It offers two modes: Preshared Key (PSK) and Enterprise. WPA-
PSK wraps another layer around WEP adding three new elements: a Message
Integrity Code (MIC) that is a keyed hash value of the payload, a per packet key mixing
function using the Temporal Key Integrity Protocol (TKIP), resulting in an effective full
128-bit dynamic key, and a packet sequencing number also derived from the TKIP,
that is added into the MPDU before the legacy WEP encryption. The enterprise mode
uses an 802.1X based protocol and offers a higher security, because it does not rely
on a shared secret.
Today’s state of the art security is the Wi-Fi Protected Access 2 (WPA2), which is
specified in the 802.11i amendment, finally ratified in June 2004. It is based on a
128 bit Advanced Encryption Standard (AES) block cipher algorithm and uses the new
architecture called Robust Security Network (RSN). It is suitable for small home
networks (WPA2-Personal) as well as large corporate networks (WPA2-Enterprise). An
RSN Association (RSNA) consists of three entities: Supplicant e.g. a WLAN STA,
Authenticator e.g. a WLAN AP, and Authentication Server often a Remote
Authentication Dial-In User Service (RADIUS) server. How a WPA2 authentication
works is briefly shown in Figure 2-3.
9. Architecture of WLAN Networks
Security
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 9
Phase 1: Network and Security Capability Discovery
Phase 2: Authentication and Association
Signaling of supported security policies through Beacon or Probe Response
Phase 3: EAP/802.1X/RADIUS Authentication
Phase 4: 4-Way Handshake
Phase 5: Group Key 2-Way Handshake (for multicast traffic)
Phase 6: Secure Data Communication
Supplicant
(STA/UE)
Authenticator
(AP)
Authentication Server
(RADIUS)
Open system authentication request
Association request
Authentication response = success
Association response = success
Response identity
Request identity
Authentication according to the chosen EAP method
RADIUS Request identity
RADIUS Accept
EAP success
Master Key (MK)
MK transmission
Pairwise Master
Key (PMK)
Pairwise Master
Key (PMK)
for WPA2-Personal, PMK=PSK
from authenticator’s PMK derived PTK encrypted message
from supplicant’s PMK derived PTK encrypted message for verification
Group Transient
Key (GTK)
Send encrypted GTK
Acknowledgement for reception of GTK
Send encrypted GTK for derivation of GEK and GIK
Acknowledgement for reception of GTK
New random GTK
Encrypted data communication
Master Key (MK)
derive Pairwise
Temporary Key (PTK)
derive
PTK
Figure 2-3: WPA2 Authentication Procedure
For secure communication, data integrity and data confidentiality is provided with
Counter Mode Cipher-Block Chaining Message Authentication Code Protocol (CCMP)
and optionally with TKIP. CCMP utilizes the AES block cipher algorithm with 128 bit
key and block length. This encryption ensures certification by the Federal Information
Processing Standards (FIPS) for use in non-military government agencies.
Two additional features were also added with 802.11i, the key-caching and a pre-
authentication. Caching together with a session timeout allows a station to faster
reconnect if it returns to the same AP. Pre-authentication enables faster roaming
because APs can send authentication messages between them. For example, if
someone with a Wi-Fi device walks through an airport, he or she does not need to
authenticate to every AP, the network can handle that.
2.5.2 Secure Authentication
The Extensible Authentication Protocol (EAP) is defined in [9] and provides a simple
and generic framework for authentication in IP networks. It does not define the
10. Architecture of WLAN Networks
Wi-Fi Alliance
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 10
authentication itself. Currently, there are over 40 EAP methods defined such as EAP-
TLS, EAP-TTLS, EAP-SIM, and EAP-AKA.
User Equipment (UE) based on GSM or 3GPP standards have a (Universal)
Subscriber Identification Module (U)SIM with which they are authenticated with the
Mobile Network Operator (MNO). In order to prevent redundant provisioning and to
reuse the billing infrastructure, it is beneficial to use the UE’s authentication method
even at the Wi-Fi hotspot. Therefore, a hotspot AP should support EAP-SIM
(2G/GSM), EAP-AKA (3G/WCDMA), and EAP-AKA’ (4G/LTE).
Initial Auth. & Association
for access
EAP Req./Identity
EAP Resp./Identity
EAP Req./Challenge
EAP Success
EAP Resp./Identity
Exchange Auth. Vectors
EAP Req./Challenge
EAP Resp./Challenge
EAP Resp./Challenge
EAP Success
Vector Selection
Validation
HLR/HSS
Supplicant
(STA/UE)
Authenticator
(AP)
Authentication Server
(RADIUS)
Figure 2-4: EAP Authentication
An EAP authentication is exemplarily shown in Figure 2-4. A user’s UE that wants to
connect to an MNO’s Wi-Fi hotspot will use the EAP method for e.g. an EAP-AKA’
authentication. The UE sends its unique identity to the AP which communicates with a
RADIUS server. This server then checks with the MNO’s Home Subscriber Server
(HSS) if this UE is allowed to connect. Then, the RADIUS server does the mutual
authentication via the AP with the UE, and in the successful case, the RADIUS server
signals to the AP that the UE is authenticated and allowed to connect.
2.6 Wi-Fi Alliance
The Wi-Fi Alliance® is a global non-profit organization. Their goal is to promote and
market Wi-Fi worldwide, encourage manufacturers to adhere to the 802.11 technology
standards, and test and certify these products for interoperability. The term Wi-Fi
stands for Wireless Fidelity, analogous to high fidelity (Hi-Fi) for audio equipment.
In March 2000, the Wi-Fi CERTIFIED™ program was launched to provide a widely-
recognized designation of interoperability and quality. A product is only allowed to carry
the Wi-Fi CERTIFIED logo after it passes rigorous interoperability certification tests.
Users can then be sure that these products work with each other and deliver the best
user experience.
11. Architecture of WLAN Networks
Wi-Fi Alliance
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 11
Within the Wi-Fi Alliance there are task groups that define minimum feature
requirements and test specifications. The members of this industry association and the
task groups are mostly manufacturers devoted to wireless communication.
2.6.1 Hotspot 2.0 / Passpoint
In 2010 the Wi-Fi Alliance started a task group named “Hotspot 2.0”. The aim was to
define functions and services from the standards that fully support service provider
business objectives and improve the end-user hotspot experience. Using a hotspot
should be as simple and secure as using the cellular network.
As of June 2012, the Wi-Fi Alliance® is testing mobile devices and infrastructure
equipment for its Wi-Fi CERTIFIED Passpoint™ program. Passpoint mobile devices
can automatically discover and connect to Wi-Fi networks powered by Passpoint-
certified access points, delivering the true mobile broadband experience that users
want and supporting service provider business objectives. The specification behind
Passpoint was defined by service provider and equipment maker members of the Wi-Fi
Alliance to address critical business needs for mobile data, streamlined access and
subscriber loyalty. In addition to making it easy for end users to connect, hotspots
equipped with Passpoint-certified equipment automatically enable enterprise-grade
WPA2™ security. The Passpoint certification program is based on technology defined
in the Wi-Fi Alliance Hotspot 2.0 Specification; a planned update to the program will
add support for operator policy in network selection and capability for on-the-spot
provisioning of new accounts. [10]
12. WLAN Access to the 3GPP Network
Non-Trusted Access
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 12
3 WLAN Access to the 3GPP Network
There are two different ways for a WLAN network to connect to the EPC, either as a
non-trusted or as a trusted access. The name trusted means that there is a secure
communication between the WLAN network and the EPC for both authentication and
data protection. The trust relationship is the same for the complete network even if it
supports access to multiple Packet Data Networks (PDNs). In order to use the trusted
access, the EPC operator should have either control over the WLAN network or a
trusted relationship to its owner. Consequently the trust relationship is essentially a
business decision and is not related to the access network itself.
3.1 Non-Trusted Access
The network architecture of the non-trusted EPC access is shown in Figure 3-1. It is
the evolution of the WLAN access to the 3GPP UMTS in Release 6, called I-WLAN [3],
where the access to the 3GPP network was over the Packet Data Gateway (PDG)
network node to the GGSN, the 3G counterpart of the PDN GW.
The I-WLAN architecture was adapted to the EPC in Release 8 with an evolved PDG
(ePDG) connected to the PDN GW. The ePDG is under full control of the EPC network
operator and interfaces to the WLAN via the SWn interface. It is an enhancement of
the PDG adapted to the EPC with new functionalities defined, e.g. for IP mobility. Both,
network based and client based IP mobility architectures are supported which shows
up in using the S2b or S2c interface between the ePDG and the PDN GW,
respectively.
WLAN
Network
3GPP
LTE
EPC IMS
IP/IMS
PDN GW
Serving GWMME
PCRF
eNodeB
3GPP AAA
Server
ePDG
WLAN
AP
S11
S5
Rx+
S7
SGi
S1-US1-C
S6
SWx
SWm
SWn
SWa
ANDSF
S2b, S2c
HSS
WLAN
AP
Mobility /
Controller
Gateway
Sp
UE
IPsec
tunnel
Figure 3-1: WLAN network integrated into the EPC as an untrusted access (non-roaming
architecture)
For access authentication the WLAN gateway interacts with the EPC over the SWa
interface to the 3GPP Authentication, Authorization, and Accounting (AAA) server, or
to the 3GPP AAA Proxy in the roaming case.
13. WLAN Access to the 3GPP Network
Trusted Access
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 13
In order to get connection with the EPC, the UE has first to authenticate with the AAA
(Proxy) server. In a next step, a secure data tunnel (IPSec) between the UE and the
ePDG has to be established in order to set up a data path. Here, the ePDG acts as an
authenticator and gets the required AAA related parameters from the AAA server
(proxy) via the SWm interface. In this part, Internet Key Exchange Version 2 (IKEv2)
signaling between the UE and the ePDG is used. When client based mobility (see
chapter 4.1) is applied, an additional IPSec tunnel between the UE and the PDN GW
has to be established.
3.2 Trusted Access
The trusted WLAN access to the EPC is only defined from 3GPP Release 11 on. From
an architectural point of view, the main difference to the non-trusted access is the
missing ePDG. Instead, the non-3GPP network interacts directly with the EPC (Figure
3-2).
WLAN
Network
3GPP
LTE
EPC IMS
IP/IMS
PDN GW
Serving GWMME
PCRF
eNodeB
3GPP AAA
Server
WLAN
AP
S11
S5
Rx+
S7
SGi
S1-US1-C
S6
SWx
STa
ANDSF
S2a, S2c
HSS
WLAN
AP
Mobility /
Controller
Gateway
Sp
UE
Figure 3-2: WLAN network integrated into the EPC as a trusted access (non-roaming architecture)
The PDN GW is connected over the S2a or S2c interface, depending on the IP
mobility. Due to the trust relationship, there is no need to set up an additional IPSec
tunnel between the UE and the EPC network, apart from the one used in case of client
based IP mobility. Connection to the AAA server is done over the STa interface.
Whereas it is optional in the non-trusted architecture to require a 3GPP based
authentication, it is mandatory in the trusted one.
In both architectures, the trusted and the non-trusted, this authentication is
independent of the WLAN technology and is instead based on the EAP-AKA’ protocol.
Authentication is based on USIM credentials which are obtained by the 3GPP AAA
server over the SWx interface from the HSS, together with additional subscriber
information needed.
14. IP Mobility
Client Based IP Mobility
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 14
4 IP Mobility
IP mobility takes care of routing data packets to the intended receiver when moving to
a foreign network. A central point is to keep the IP address of a UE fixed so that there
is no need for layers above the IP layer to adapt to the network change. Consequently,
upper layer connections can continue without notification about the receiver’s mobility.
Generally, IP mobility support can be realized with two different approaches:
ı Client based IP mobility
ı Network based IP mobility
This distinction does not depend on the underlying Radio Access Technology (RAT); it
is completely realized in the IP protocol stack.
4.1 Client Based IP Mobility
In the client based mobility of IPv6 the UE carries the mobility extensions in its own IP
protocol stack. Central to this approach is to split the IP address into the home address
(HoA), which is the permanent IP address obtained from the home network, and the
care of address (CoA), which corresponds to a temporal IP address and is obtained
from the visited network.
The administration of these addresses is done in a Home Agent (HA) (Figure 4-1). As
long as the UE is in the home network, the HA routes the data packets directly to the
UE using the HoA. When the UE changes the network, it informs the HA with a Proxy
Binding Update (PBU) message about its new IP address, which is stored by the HA in
the binding cache. This is essentially a lookup table which is queried for each incoming
packet. If there is a CoA entry for this UE in the binding cache, the packet is instead
forwarded to its CoA. As an optimization it is also possible to route IP traffic between a
Correspondent Node (CN) and the UE directly, in this case a binding cache has
additionally to be established in the CN itself.
15. IP Mobility
Client Based IP Mobility
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 15
Home Network
HA
MN1
MN2
PrefA::/64
PrefH::/64
WLAN A
PrefB::/64
WLAN B
Dual Stack for Mobile IPv6 (IPv6-only case)
AR1 AR2
ID HoA CoA
MN1 PrefH::MN1 PrefA::MN1
MN2 PrefH::MN2 PrefB::MN2
Binding Cache:
HA: Home Agent
HoA: Home Address
CoA: Care-of Address
AR: Access Router
MN: Mobile Node
Figure 4-1: Client based mobility. The HA keeps the information about the client's location and routes
the incoming data packets to the client in the visited network.
In an extension [11] mixed networks with both, IPv4 and IPv6 are supported with the
Dual Stack Mobile IPv6 protocol (DSMIPv6). This is essential to integrate most existing
networks built on IPv4 into the new networks, which will be more and more equipped
with IPv6 technology. For a client based mobility EPC access with WLAN, DSMIPv6 is
mandatory.
With this approach it is possible to offload data traffic from an LTE network to the
WLAN connection. However, this works only for a complete offload, i.e. it is either
possible to communicate over the LTE connection or over the WLAN connection, but
not over both (Figure 4-2). The reason is that in this architecture the WLAN network is
considered as a foreign network, to which all the data packets are forwarded when
there is a corresponding entry in the binding cache of the HA.
EPC
UE
EPC
UE
non-seamless,
all flows
Handover
3GPP
Access
WLAN
Access
Internet Internet
3GPP
Access
WLAN
Access
VoIP Video Conf. Web FTP
Figure 4-2: Complete WLAN offload using IP mobility
16. IP Mobility
Client Based IP Mobility
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 16
4.1.1 IP Flow Mobility (IFOM)
For a more efficient WLAN data offload there is the requirement to send different data
flows to different CoAs. This is not possible in the current architecture, because there
is only support for one CoA in the binding cache. So, a new extension for the network
mobility has been designed (Figure 4-3)[12], called IFOM.
HA
MN
PrefA::/64
WLAN
PrefB::/64
LTE
AR1 AR2
Internet
CN1
CN2
CN3
HoA BID CoA
PrefH::MN BID1 PrefA::MN
PrefH::MN BID2 PrefB::MN
Binding Cache:
BID-PRI
5
15
FID-PRI FID Traffic Selector
10 srcAddr=CN1 BID1
20 srcAddr=CN3 BID2
Flow Bindings:
30
FID1
FID2
FID3
BIDs
TCP BID3
HA: Home Agent
CN: Correspondent Node
AR: Access Router
MN: Mobile Node
FID: Flow Identifier
BID: Binding Identification
-PRI: Priority
HoA: Home Address
CoA: Care-of Address
Mobility Extensions for MIPv6
Figure 4-3: IFOM Extension to the client based mobility. There are several entries in the binding
cache now possible, each one connected to a characterized traffic flow.
Central to this approach is a new table, the Flow Bindings. This is a table with one
entry for each flow, which is characterized in the Traffic Selector field by the source or
destination address, transport protocol or other fields in the IP and higher layer
headers[13]. Each flow points to one entry in the Binding Cache using the BID field,
which identifies one of several CoAs assigned to the UE. Both lists are ordered with
respect to the priorities (FID-PRI and BID-PRI), which are assigned to each mobile
separately. A lower number means a higher priority.
For each incoming data packet, its flow is identified with the highest priority matching
entry from the top of the Traffic Selector field. Using the corresponding BID, the CoA
and so the technology to be used is identified using the BID entry in the Binding
Cache. If either the data packet does not fit to any traffic selector or if the
corresponding entry in the Binding Cache does not exist, the CoA with the highest
priority is used.
In the example of Figure 4-3, two entries in the Binding Cache are defined for the UE
under consideration: BID1 to route the packets over the WLAN interface, and BID2 to
route them over LTE. Here, routing over WLAN has higher priority than routing over
LTE. If an incoming packet comes from CN1, it is routed over the WLAN interface, if it
comes from CN3, it is routed over LTE. Data packets sent with the TCP protocol and
neither from CN1 nor CN3 are also routed over WLAN, because they point to BID3
which is not defined (yet) in the Binding Cache and so uses the Binding Cache entry
with the highest priority. The same is also true for any other packets.
17. IP Mobility
Network Based IP Mobility
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 17
Using these IFOM extensions, the offloading of different data flows described in Figure
4-4 can be realized: Depending on the availability and quality of the access
technologies, different flows can be offloaded to WLAN while keeping the LTE
connection running. In this example, the (real time) video stream is kept on LTE, while
the VoIP, Web and FTP connections are offloaded to WLAN.
EPC
UE
EPC
UE
seamless,
individual flows
HandoverInternet Internet
3GPP
Access
WLAN
Access
3GPP
Access
WLAN
Access
VoIP Video Conf. Web FTP
Figure 4-4: WLAN Offloading of different data flows using IFOM
4.2 Network Based IP Mobility
A completely different approach to take care of the user mobility is the network based
mobility. Contrary to the client based IP mobility, the network takes all necessary steps
to route the data packets to the intended receiver. From this follows that there is no
need for the client to do any signaling on network change, this is all done by the
network itself. There are two approaches for the network based IP mobility, the
PMIPv6 and the GTP.
4.2.1 Proxy Mobile IP Version 6 (PMIPv6)
The Proxy Mobile IP protocol (PMIPv6) is specified by the IETF in [14]. Routing is
based on two additional entities, the local mobility anchor (LMA), which works in a
similar way as the HA in the client based mobility approach, and the mobile access
gateway (MAG), which implements the necessary mobility functions in the visited
network (Figure 4-5). When the UE changes the network, the MAG is contacted by the
new base station and informs the LMA about the change of location.
18. IP Mobility
Network Based IP Mobility
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 18
LMD: Local Mobility Domain
LMA: Local Mobility Anchor
MAG: Mobile Access Gateway
MN: Mobile Node
LMA
MN1
MN2
PrefA::/64
WLAN A
PrefB::/64
WLAN B
Proxy Mobile IPv6
MAG1
MAG2
LMD
IP Tunnels
ID Prefix MAG
MN1 Pref1::/64 MAG1
MN2 Pref2::/64 MAG2
Binding Cache:
Figure 4-5: PMIP: All location information necessary to forward data packets are administrated in the
network using the LMA and the MAGs.
Similar to the client based mobility this architecture has to be extended in order to
implement the IFOM capabilities [12]: Moving selected flows from one access
technology to another, and consequently, installing the required filters for flow routing.
The corresponding working group in the IETF [15] has not finalized this project yet,
however key concepts can already be read off.
In order to send and receive data packets from and to any of its interfaces, the IETF
has decided to adapt the logical interface (LIF) [12]. This is a software entity which
hides the physical interface to the IP layer (Figure 4-6). This means that the mobile IP
stack binds its sessions to the LIF and has not to worry about the access technology to
be used. So, for the UE there is only one single interface to the IP and its layers above.
Higher Layers
IP
LIF
WLAN LTE
HoA
Figure 4-6: Logical Interface (LIF) to connect the IP layer with the physical interfaces.
19. IP Mobility
Realization in the EPC
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 19
The LIF controls the flow mobility in the UE. It is part of the connection manager in the
operating system and has no impact on the IP stack. It represents a kind of virtual
interface which hides all flow mobility movements to the higher layers.
A second aspect to introduce flow mobility to PMIPv6 consists in providing signaling
extensions to the MAG. This is necessary because the MAG will only forward traffic
from and to a UE if the prefix has been delegated to the UE by this MAG. However, in
IP flow mobility, this delegation might have been done by a different MAG before the
flow handover. Signaling between the LMA and the target MAG solves this issue.
4.2.2 GPRS Tunneling Protocol (GTP)
The GTP was developed by the 3GPP in order to carry packet service in GSM, UMTS
and LTE networks and is used there on several interfaces. It was originally tailored for
3GPP networks only and can also be applied for access of different technologies. Like
PMIP it provides network based IP mobility with session continuity, so the network
takes care about changes in location or network access and does all the signaling so
that the UE can communicate with the same IP address.
In GTP, control and user plane are carried over UDP [16] (Figure 4-7).
L1
L2
IP
UDP
GTP-(U,C)
L1
L2
IP
UDP
GTP-(U,C)
Figure 4-7: Protocol stack of a GTP tunnel
Tunnels are created between entities of interest in the network. For the case of WLAN
offloading for example, data packets for a UE are first routed to the PDN-GW, and then
routed through this tunnel to the peer in the WLAN network. The IP address of the
PDN-GW remains the same, no matter to which peer the PDN-GW builds the GTP
tunnel. This way, the same IP address is assigned to the UE, no matter in which
network it is at the moment.
In contrast to PMIP, where a connection is based on a PDN and a UE, the GTP is
based on a bearer, so several tunnels may be used in a connection. In addition,
several bearers may be contained in a GTP tunnel and are then handled together. So,
for a complete characterization of a GTP tunnel, the Tunnel Endpoint Identifiers
(TEIDs) are needed in addition to their respective IP addresses in order to distinguish
different tunnels between the same nodes [17].
Finally, note that like in PMIPv6, also the GTP solutions would rely on the above
mentioned LIF concept [12]. It can be used there without any modifications.
4.3 Realization in the EPC
Network mobility is supported in the EPC with the approaches presented in the
preceding sections. Historically, 3GPP has developed and specified the network based
20. IP Mobility
Realization in the EPC
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 20
mobility protocol GTP. With LTE, also the PMIPv6 and the client based mobility
according to [11] were introduced as an alternative. Note that if the client based IP
Mobility is used, the interfaces S2c in Figure 3-1 and Figure 3-2 are used instead of
S2a and S2b, respectively.
The HA or LMA in the 3GPP EPC are located in the PDN-GW for both, the trusted and
the non-trusted access. This is in contrast to the location of the MAG: in the trusted
access it is located in the WLAN network, in the non-trusted access in the ePDG.
Consequently, the connection between the LMA and the MAG can always be regarded
as trusted, because the ePDG is under control of the EPC network operator.
Up to Release 9, the offload shown in Figure 4-2 was the only way to offload data from
the EPC to WLAN. For offload from 3G systems this feature is described in [18], and
for offload from EPC it is described in [5]. IFOM was introduced with Release 10 for the
client based mobility. It is still not available for the network based mobility, however, a
study item for Release 12 is ongoing resulting in a technical report [19].
21. Network Discovery and Selection
Access Network Discovery and Selection Function
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 21
5 Network Discovery and Selection
Cellular networks and Wi-Fi hotspots have different deployment scenarios. While a UE
is aware of neighboring cells, there is currently no similar mechanism for Wi-Fi where
the access is opportunistic. These networks also do not have control over the access
and protocol state of the other access network.
While the connection manager in the device can take care of discovery, prioritized
selection of certain networks, traffic prioritization, and user authentication, there is not
much consistency due to the proprietary solutions. This is where the two functions
described in this chapter assist and allow the mobile network operators to provision the
required policies.
5.1 Access Network Discovery and Selection Function
Many older wireless technologies are still maintained and new RATs are deployed in
addition to them. This creates dense wireless environments with RATs which may be
used to complement each other. Modern phones with multi-mode chipsets supporting
several RATs can benefit from the intelligent control and prioritization thereof. The
Access Network Discovery and Selection Function (ANDSF) allows the provisioning of
policies to the UE for intersystem mobility and routing, as well as access network
discovery. It offers a way for the network operators to dynamically control and define
preferences how, where, when, and for what service a device can use a certain RAT. It
can be used for both inter-technology as well as intra-technology access network
selection.
5.1.1 Architecture
The ANDSF server is an entity in the EPC and communicates with the client (UE) over
the S14 interface [5], which is realized above the IP level. Its role is to extend the
Public Land Mobile Network (PLMN) selection and reselection procedures as specified
in [20] and in [4], without influencing them. Figure 5-1 shows the architecture with the
Home-ANDSF in the Home PLMN. For the roaming scenario, there is a Visited-ANDSF
in the Visited PLMN, which takes precedence over the H-ANDSF. In any case, the
ANDSF should not influence the PLMN selection and reselection procedures as
specified in [20] and in [4].
22. Network Discovery and Selection
Access Network Discovery and Selection Function
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 22
S14
S14
H-ANDSF
UE V-ANDSF
3GPP IP Access or
Trusted/Untrusted
Non-3GPP IP
Access
VPLMN
HPLMN
Figure 5-1: ANDSF (Roaming) Architecture
5.1.2 Information Exchange Procedure
There are two options for the ANDSF to exchange information with the UE: The
ANDSF can push information, or the UE pulls it by querying the ANDSF server. If the
UE submits an ANDSF pull query, it also can include further information in its request
such as its location and the discovered radio access networks (RANs). Obviously, the
home operator has then to ensure that ANDSF complies with national privacy
requirements, because the location information is considered sensitive.
In both cases (push and pull), a secure connection, e.g. a PSK-TLS connection, is
required. If such a secure connection does not exist and the ANDSF wants to push
information to the UE, the server first sends an SMS with the information how the UE
shall establish it. The preferred method here is the Generic Bootstrapping Architecture
(GBA) Push Information defined in [21]. An alternative is the Open Mobile Alliance
(OMA) Device Management (DM) bootstrap mechanism (OMA-ERELD-DM-V1_2) for
the application layer authentication and an https tunnel for transport security.
The UE can request the information using a PSK-TLS secured connection based on
the GBA method specified in [22]. To establish such a connection it needs the ANDSF
server IP address. This can either be statically stored in the UE by the network
operator, or alternatively discovered with a DHCP query or by a DNS lookup with the
fully qualified domain name
3
of an ANDSF server as specified in the access control list
(ACL). In the roaming scenario, both the H-ANDSF and the V-ANDSF addresses need
to be known by the UE, refer to [23] for more detailed information.
5.1.3 Communication
The ANDSF information is communicated over the S14 interface using the OMA DM.
With this device management specification, configure a UE with the parameters
required by a particular network operator. These parameters are set with a Managed
Object (MO) which contains the nodes Policy, DiscoveryInformation, UE_Location,
ISRP, and Ext. Further interior nodes and leaves exist. The OMA DM is defined in
XML.
3
Andsf.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org
23. Network Discovery and Selection
Access Network Discovery and Selection Function
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 23
The logical structure of the ANDSF MO as specified in Rel. 10 to date is shown in
Figure 5-2. The interior nodes are explained below.
<X> Name ?
DiscoveryInformation ?
Ext ?
Policy ?
nodes and leaf objects
UE_Location ?
nodes and leaf objects
ISRP ? nodes and leaf objects
nodes and leaf objects
nodes and leaf objects
Figure 5-2: ANDSF MO Top Nodes
5.1.4 Nodes
Inter-System Mobility Policies (ISMPs) are provisioned with the policy node. It can
contain a set of policies that shall be prioritized and at any time only one policy shall be
active. Each policy contains rules for what access network it shall be valid, in which
area, and at what time. The Update Policy node defines if the UE should request an
update of the policies if there are no valid rules. An example of the policy node
according to the Rel. 10 specification is shown in Figure 5-3.
24. Network Discovery and Selection
Access Network Query Protocol (ANQP)
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 24
RulePriority
Policy ? <X> +
TimeStart ?
Roaming ?
UpdatePolicy ?
ValidityArea ?
PLMN
TAC ?
LAC ?
GERAN_CI ?
<X> +
AccessTechnology
AccessId ?
AccessNetworkPriorityPrioritizedAccess <X> +
3GPP_Location ?
Geo_Location ?
TimeOfDay ? <X> +
TimeStop ?
DateStart ?
DateStop ?
3GPP2_Location ? 1x ? <X> +
WiMAX_Location ?
WLAN_Location ?
HRPD ?
SID
NID ?
Base_ID ?
<X> + Sector_ID
<X> + NAP-ID
BS-ID
<X> +
SSID ?
BSSID
Netmask
Circular ? <X> + AnchorLatitude
AnchorLongitude
Radius
UTRAN_CI ?
EUTRA_CI ?
HESSID ?
PLMN
SecondaryAccessId ?
Figure 5-3: ANDSF MO Policy Node
If both policies (ISMP and ISRP) are available, in certain UEs the ISRP may take
precedence for the routing of IP traffic. Refer to the specification [23] for details.
With the Discovery Information Node a network operator can define what radio access
technologies are available at a certain location or in a certain area. The UE may use
this information as a guidance for network discovery and detection.
The Location Node acts as a placeholder for the current location of the UE. If the
position described in this node does not correspond to the real UE location, a trigger
event in the UE may be used to update and fill in all information regarding the
discovered access technologies.
If a UE is capable or configured for IFOM, Multiple-Access PDN Connectivity
(MAPCON), or non-seamless WLAN offload, it can use the Inter-System Routing
Policy (ISRP) rule. For each of these services, there is a container: „ForFlowBased“ for
IFOM, „ForServiceBased“ for MAPCON, and „ForNonSeamlessOffload“ for non-
seamless WLAN offload. Each of these containers can describe several flow
distribution rules, routing criteria with conditions on where and when a rule applies, and
the rule priority.
In order to allow vendor-specific policies and rules, an Ext Node has been defined.
There are no further interior nodes or leafes defined in the specification.
5.2 Access Network Query Protocol (ANQP)
Before associating with a hotspot AP it is often helpful to obtain more information first.
This allows an informed decision about which AP to associate with, and to query
25. Network Discovery and Selection
Access Network Query Protocol (ANQP)
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 25
multiple networks in parallel. A device can even discover information about other APs
that are not from the same provider but from one which has a roaming agreement.
5.2.1 Generic Advertisement Service (GAS)
In order to query information in an unassociated state, the IEEE 802.11u amendment
adds the generic advertisement service (GAS) to the 802.11 standard. It uses
individually addressed Public Action management frames that are already used for AP
to unassociated-station communications, and Intra-BSS communication. GAS provides
transparent layer 2 transport of information in generic containers. Available
advertisement protocols are ANQP, Media Independent Handover (MIH) Information
Service, MIH Command and Event Services Capability Discovery, and Emergency
Alert System (EAS).
Beacon
GAS Initial Request
GAS Initial Response
Authentication (WPA2 EAP) /
Association
Multiple BSSIDs, Interworking,
Advertisement Protocol, Roaming
Consortium, Emergency Alert Identifier
ANQP Query, elements see 802.11u
specification, Table 11-15
802.11u does not change anything from here
ANQP Info, elements see 802.11u
specification, Table 11-15
Query Request
Query Response
UE Hotspot 2.0
Advertisement
Server
GAS Comeback Request
GAS Comeback Response
Comebackdelay
Figure 5-4: GAS Message Sequence
An example of a GAS information exchange is depicted in Figure 5-4. When a device
detects the presence of the Interworking element in the beacon or probe response, it
knows the AP supports GAS. The device then sends a GAS Initial Request frame to
the AP, which may retrieve further information from an advertisement server. Within a
certain time, the AP has to reply to the device with the GAS Initial Response. If the
information exceeds the maximum data burst length (MMPDU length) and therefore
does not fit entirely in the GAS Initial Response, or if the query response from the
advertisement server arrives too late, the device shall send one or multiple GAS
Comeback Requests after a certain comeback delay to retrieve the (remaining)
information.
26. Network Discovery and Selection
Access Network Query Protocol (ANQP)
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 26
5.2.2 ANQP Information Elements
In order to exchange information in a standardized and secure way, the 802.11u
specification defines a list with ANQP elements for communicating information before
associating. The following table lists the available elements [7] with a short description.
The first two are used to query information and all but the first element are used to
indicate information in a response. While usually a device queries an AP and the AP
responds back to the device, the first four elements can also be used to exchange
information in any direction, even e.g. among APs.
ANQP Information Elements
Info Name Type Description
ANQP Capability list Q * List of information and capabilities that have been configured
or are available on a device or AP.
ANQP vendor-specific list Q, R * Can be used to query information not defined in the standard.
TDLS Capability Q, R * May be used to discover TDLS capabilities of another STA.
ANQP Query list R * List with Info IDs of ANQP Response elements.
IP Address Type Availability
information
R * Information about the availability and the type of IP address
that could be associated to the device after successful
authentication, e.g. IPv4, IPv6, public, port-restricted, NATed.
Venue Name information R One or several venue name fields with an UTF-8 formatted
string and a language code field.
Emergency Call Number
information
R List of emergency phone numbers that are used in the
geographical area.
Network Authentication Type
information
R Supported authentication methods e.g. set of EAP methods, or
http/https or DNS redirection, or if on-line enrollment is
supported.
Roaming Consortium list R List with service providers where the AP could successfully
authenticate a device with valid credentials.
NAI Realm list R List of NAIs of service providers accessible through this AP,
optionally with EAP methods to be used for authentication.
3GPP Cellular Network
information
R Cellular information such as country code and network code to
help a device selecting an AP to access 3GPP networks.
AP Geospatial Location R The AP’s geospatial location as a Location Configuration
Report.
AP Civic Location R A Location Civic Report.
The AP Location Public
Identifier URI
R URI where the device can retrieve more location information.
Domain Name list R One or more domain names of the AP and network operator.
Emergency Alert Identifier
URI
R URI for Emergency Alert System message retrieval.
Emergency NAI R NAI for devices that do not have valid credentials to
authenticate to the network but have the intention to do so.
Neighbor Report R List with reports about neighboring APs for the benefit of STAs
in a preassociated state.
Type:
Q ANQP Query
R ANQP Response
* May be transmitted/requested from both, an AP as well as a device
27. Network Discovery and Selection
Access Network Query Protocol (ANQP)
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 27
5.2.3 Example ANQP Procedure
A mobile device might detect one or several hotspot beacons. Using GAS it can query
each hotspot AP with the discovered SSID. From the responses the device can learn
the AP operator’s domain names and Network Access Identifier (NAI) realm lists. By
checking its stored credential list and their associated NAI realms, it can determine if it
can successfully authenticate with one of these networks. In case there is more than
one match, the operator policy for network selection is used. The device then
authenticates to that network using the credentials that are indicated in the ANQP NAI
Realm list.
For further examples and use cases, please refer to the Informative Annex V.2 of [7].
28. Summary
1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 28
6 Summary
WLAN-Offload offers a new way to extend the capacity and coverage of an LTE
network. WLAN networks are integrated to complement LTE networks and allow the
use of each technology's advantages according to the actual demand. For example the
WLAN is optimized for indoor and for crowded areas, whereas the LTE network is
designed for complete coverage in all areas. Depending on the trust relationship the
WLAN may be integrated as a trusted or a non-trusted access technology.
In the newest releases a paradigm change has occurred. Instead of a handover for the
complete connection, single traffic flows are routed over one access technology while
the remaining ones are routed over the other. This way the elaborated QoS feature in
LTE may be used for delay or jitter sensitive data flows like voice or video conferences,
whereas less time critical services may be routed over the cost-effective WLAN when
available. Corresponding handover procedures for the partial offload of certain flows
are controlled by the network operator to ensure best user experience.
In order to be accepted and provide the same ease of use as cellular technologies,
also the security features are automated almost completely. The authentication is done
using credentials of the USIM card and the same authentication validation as in LTE.
From this follows that in the ideal case the user does not perceive the offload and only
recognizes an enhanced data rate using the mobile services.
29. 1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 29
References
[1] "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update,
2011-2016." Cisco Systems Inc., Feb. 14, 2012.
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/whit
e_paper_c11-520862.pdf
[2] "Heterogeneous Networks: Meeting Mobile Broadband Expectations With
Maximum Efficiency," Ericsson AB, February 2012.
http://www.ericsson.com/res/docs/whitepapers/WP-Heterogeneous-Networks.pdf
[3] 3GPP TS 23.234 "3GPP system to Wireless Local Area Network (WLAN)
interworking; System description"
[4] 3GPP TS 24.234 "3GPP System to Wireless Local Area Network (WLAN)
interworking; WLAN User Equipment (WLAN UE) to network protocols; Stage 3"
[5] 3GPP TS 23.402 "Architecture enhancements for non-3GPP accesses"
[6] 3GPP TS 23.261 "IP flow mobility and seamless Wireless Local Area Network
(WLAN) offload; Stage 2"
[7] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications, IEEE Std 802.11™-2012, 29 March 2012
[8] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications, Amendment 9: Interworking with External Networks, IEEE Std
802.11u™-2011, 25 February 2011
[9] IETF RFC 3748 "Extensible Authentication Protocol (EAP)"
[10] Wi-Fi Alliance®, "Launch of Wi-Fi CERTIFIED Passpoint™ Enables a New Era in
Service Provider Wi-Fi®," AUSTIN, TX, June 26, 2012
[11] IETF RFC 5555 "Mobile IPv6 Support for Dual Stack Hosts and Routers"
[12] A. de la Oliva, C.H. Bernardos, M. Calderon: "IP Flow Mobility: Smart Traffic
Offload for Future Wireless Networks", IEEE Communications Magazine, Oct. 2011
[13] IETF RFC 6089 "Flow Bindings in Mobile IPv6 and Network Mobility (NEMO)
Basic Support"
[14] IETF RFC 5213 "Proxy Mobile IPv6"
[15] C. J. Bernardos: "Proxy Mobile IPv6 Extensions to Support Flow Mobility", IETF
draft, http://datatracker.ietf.org/wg/netext
[16] 3GPP TS 23.401 "General Packet Radio Service (GPRS) enhancements for
Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access"
[17] G. Punz: "Evolution of 3G Networks", Springer Wien New York, 2010.
[18] 3GPP TS 23.327 "Mobility between 3GPP-Wireless Local Area Network (WLAN)
interworking and 3GPP systems"
[19] 3GPP TS 23.861 "Network based IP flow mobility"
[20] 3GPP TS 23.122 "Non-Access-Stratum (NAS) functions related to Mobile Station
(MS) in idle mode"
[21] 3GPP TS 33.223 "Generic Authentication Architecture (GAA); Generic
Bootstrapping Architecture (GBA) Push function"
30. 1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 30
[22] 3GPP TS 33.222 "Generic Authentication Architecture (GAA); Access to network
application functions using Hypertext Transfer Protocol over Transport Layer Security
(HTTPS)"
[23] 3GPP TS 24.302 "Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP
access networks; Stage 3"
31. 1MA214_0e Rohde & Schwarz: WLAN Traffic Offload in LTE 31
Index
Access Network Discovery and Selection
Function (ANDSF) ...........................................21
Access Network Query Protocol (ANQP) .........24
Access Point (AP)..............................................6
Authentication Server (AS) ................................7
Authentication, Authorization, and Accounting
(AAA)...............................................................12
Basic Service Set (BSS)....................................6
Binding Cache.................................................14
BSS identifier (BSSID).......................................8
Care of Address (CoA) ....................................14
Client Based IP Mobility...................................14
Correspondent Node (CN)...............................14
Discovery Information Node.............................24
Distribution System (DS) ...................................6
Dual Stack Mobile IPv6 protocol (DSMIPv6) ....15
ESS identifier (HESSID) ....................................7
Evolved Packet Core (EPC)...............................3
Evolved PDG (ePDG)......................................12
Ext Node .........................................................24
Extended Service Set (ESS)..............................6
Extensible Authentication Protocol (EAP) ..........9
Flow Bindings..................................................16
Generic Advertisement Service (GAS).............25
GPRS Tunneling Protocol (GTP) .....................19
Home Address (HoA).......................................14
Home Agent (HA) ............................................14
Hotspot 2.0......................................................11
Independent Basic Service Set (IBSS)...............6
Institute of Electrical and Electronics Engineers
(IEEE)................................................................4
Inter-System Mobility Policy (ISMP).................23
Inter-System Routing Policy (ISRP) .................24
Interworking WLAN (I-WLAN)............................3
IP Flow Mobility (IFOM) ...................................16
IP mobility........................................................14
Local Mobility Anchor (LMA)............................ 17
Location Node................................................. 24
Logical Interface (LIF) ..................................... 18
Medium Access Control (MAC) ......................... 5
Mobile Access Gateway (MAG)....................... 17
Mobile Network Operator (MNO)..................... 10
Multiple-Access PDN Connectivity (MAPCON) 24
Network Based IP Mobility .............................. 17
Non-Trusted Access........................................ 12
Packet Data Gateway (PDG)........................... 12
Packet Data Network (PDN)............................ 12
Passpoint™..................................................... 11
Physical Layer (PHY) ........................................ 5
Proxy Binding Update (PBU)........................... 14
Proxy Mobile IP Version 6 (PMIPv6) ............... 17
Public Land Mobile Network (PLMN)............... 21
Quality-of-Service (QoS) ................................... 5
Radio Access Technology (RAT)..................... 14
Remote Authentication Dial-In User Service
(RADIUS).......................................................... 8
Robust Security Network Association (RSNA)... 6
Station (STA) .................................................... 6
Traffic Selector................................................ 16
Trusted Access ............................................... 13
Tunnel Endpoint Identifier (TEID) .................... 19
Universal Subscriber Identification Module
(USIM) ............................................................ 10
User Equipment (UE) ...................................... 10
Very High Throughput (VHT)
IEEE 802.11ac............................................... 5
Wi-Fi Alliance® ............................................... 10
Wi-Fi Protected Access (WPA).......................... 8
Wi-Fi Protected Access 2 (WPA2)..................... 8
Wired Equivalent Privacy (WEP) ....................... 8
Wireless Local Area Network (WLAN)............... 4
32. About Rohde & Schwarz
Rohde & Schwarz is an independent group of
companies specializing in electronics. It is a leading
supplier of solutions in the fields of test and
measurement, broadcasting, radiomonitoring and
radiolocation, as well as secure communications.
Established more than 75 years ago, Rohde &
Schwarz has a global presence and a dedicated
service network in over 70 countries. Company
headquarters are in Munich, Germany.
Regional contact
Europe, Africa, Middle East
+49 89 4129 12345
customersupport@rohde-schwarz.com
North America
1-888-TEST-RSA (1-888-837-8772)
customer.support@rsa.rohde-schwarz.com
Latin America
+1-410-910-7988
customersupport.la@rohde-schwarz.com
Asia/Pacific
+65 65 13 04 88
customersupport.asia@rohde-schwarz.com
China
+86-800-810-8228 /+86-400-650-5896
customersupport.china@rohde-schwarz.com
Environmental commitment
ı Energy-efficient products
ı Continuous improvement in environmental
sustainability
ı ISO 14001-certified environmental
management system
This white paper and the supplied programs may
only be used subject to the conditions of use set
forth in the download area of the Rohde & Schwarz
website.
R&S®
is a registered trademark of Rohde & Schwarz GmbH & Co.
KG; Trade names are trademarks of the owners.
Rohde & Schwarz GmbH & Co. KG
Mühldorfstraße 15 | D - 81671 München
Phone + 49 89 4129 - 0 | Fax + 49 89 4129 – 13777
www.rohde-schwarz.com