Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net
IPv6 in the 3G network 2 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net IPv6 for mobile - why?? Address space problem Projected over 1 billion mobiles by 2005 Not enough IPv4 addresses especially in Asia Eg-. In China, there 100+ million handsets and far less IP addresses IPv6 addresses unique address / addresses Eliminate the use of NAT Overcome addressing / compatibility problems Operational advantages eg stateless autoconfiguration Mobile IPv6 more efficient, can be used in future 3 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net IPv6 Recap: New header format Ver. Time to Live Source Address Total Length Type of Service Hdr Len Identification Fragment Offset Flg Protocol Header Checksum Destination Address Options... Ver. Traffic Class Source Address (128 bits) Payload Length Next Header Hop Limit Destination Address (128 bits) Flow Label IPv6 Header IPv4Header 4 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Addresses increased 32 bits -> 128 bits Flow Label field added Time to Live -> Hop Limit Protocol -> Next Header Type of Service -> Traffic Class Fragmentation fields moved out of base header IP options moved out of base header Header Checksum eliminated Header Length field eliminated IPv6 Recap: Key changes in IPv6 header 5 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Text Representation of Addresses preferred form: 1080:0:FF:0:8:800:200C:417A
IPv4-embedded: 0:0:0:0:0:FFFF:13.1.68.3 or ::FFFF:13.1.68.3 6 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net General Format of Unicast Addresses interface ID global routing prefix subnet ID n bits m bits 128-n-m bits Hierarchical structure in global routing prefix and interface ID (ala CIDR) the interface ID is equivalent to the host field" in an IPv4 address if leading bits of address = 000, interface ID may be any width if leading bits of address 000, interface ID is 64 bits wide
7 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Configuring Interface IDs There are several options for configuring the interface ID of an address: DHCPv6 (configures whole address) Manual configuration (of interface ID or whole address) automatic derivation from 48-bit IEEE 802 address or 64-bit IEEE EUI-64 address pseudo-random generation Stateless autoconfiguration, when combined with high-order part of the address learned via Router Advertisements 8 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net IPv6 for 3G How? Extend GPRS / GTP to handle IPv6 addresses during PDP setup Methods to obtain IPv6 address Static Dynamic Stateless Stateful using DHCPv6 (for increased control)
9 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Dynamic Stateless Autoconfiguration MT BSS / UTRAN SGSN GGSN 1. Activate PDP Context Request (PDP type = IPv6, PDP Address = empty, ) 2. Create PDP Context request 3. Create PDP context response (PDP address = link local address, ..) 4. Activate PDP context accept MT extracts Interface-ID from the link local address 5. Router Solicitation 6. Router Advertisement (M flag = 0, Network Prefix) 7. Neighbor Solicitation 8. GGSN initiated PDP context modification procedure GGSN configured to advertise only one network prefix GGSN updates the SGSN and MT with the full IPv6 address 10 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Recommendations from the IETF IPv6 WG to 3GPP Uniqueness: Each prefix must not be assigned to more than one primary PDP context Allow 3GPP nodes to use multiple identifiers within those prefixes, including randomly generated identifiers Multiple prefixes may be assigned to each primary context Work in progress 11 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Types of Transition Mechanisms Dual Stacks IPv4/IPv6 coexistence on one device Tunnels For tunneling IPv6 across IPv4 clouds Later, for tunneling IPv4 across IPv6 clouds IPv6 <-> IPv6 and IPv4 <-> IPv4 Translators IPv6 <-> IPv4
12 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Transition Scenario Dual IPv4/IPv6 Stack Dual Stack v4/v6 host GGSN IPv4 / IPv6 PDP Context Native IPv4 Network IPv4 Host Native IPv6 Network IPv6 Host Dual Stack Router Separated approach simple and efficient Possible as mobile usually closed system environment GGSN is a dual stack device Could be native IP interconnects, and also IPv4 PE and IPv6 PE (6PE)) 13 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Tunnel and Transition Types (many!) Configured tunnels - Router to router Automatic tunnels Tunnel Brokers (RFC 3053) Server-based automatic tunneling 6to4 (RFC 3056) Router to router ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) Host to router, router to host, Maybe host to host 6over4 (RFC 2529) Host to router, router to host IPv64 For mixed IPv4/IPv6 environments DSTM (Dual Stack Transition Mechanism) IPv4 in IPv6 tunnels etc. 14 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Transition Scenario Tunneling Options RBS GGSN IPv6 Network IPv4 Network IPv4 Network IPv4 host IPv4 host v4/v6 Routers IPv4 PDP Context RBS GGSN IPv4 Network IPv6 Network IPv6 Network IPv6 host IPv6 host v6/v4 Routers IPv6 PDP Context Practical transition; within backbone constraints Diagrams - Gopinath Rao Sinniah, AIMST 15 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Network Address Translation - Protocol Translation (NAT-PT) IPv6 Network IPv4 Network v6host.6net.com 3ffe:3700:1100:1:210:a4ff:fea0:bc97 v4host.4net.org 204.127.202.4 NAT-PT DNS IPv4 Pool: 120.130.26/24 IPv6 prefix: 3ffe:3700:1100:2/64 Source = 3ffe:3700:1100:1:210:a4ff:fea0:bc97 Dest = 3ffe:3700:1100:2::204.127.202.4 Source = 120.130.26.10 Dest = 204.127.202.4 Source = 204.127.202.4 Dest = 120.130.26.10 Source = 3ffe:3700:1100:2::204.127.202.4 Dest = 3ffe:3700:1100:1:210:a4ff:fea0:bc97 Mapping Table
Inside Outside 3ffe:3700:1100:1:210:a4ff:fea0:bc97 120.130.26.10 Greater complexity Limited NAT/FW ALG support today Must be an interim step only 16 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net QoS in the Mobile 3G Network 17 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 3GPP Release 5 End-End QoS Framework T3.207 End-end QoS architecture: Complements 23.107 describes Quality of Service for the "GPRS Bearer Service (main developments in Rel4) Introduces a PDF Policy Decision Function (policy Server) to interwork between applications and IP bearer service (GGSN = Policy Enforcement Point). Also possible mapping between GPRS and IP bearer services. Allows use of either Diffserv or Intserv (or both!) 18 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net QoS requirements in UE and GGSN
Capability UE GGSN DiffServ Edge Function Optional Required RSVP/IntServ Optional Optional IP Policy Enforcement Point Optional Required (*) 19 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 4 QoS classes are defined in UMTS refer TS 23.107 Traffic class
Conversational class conversational RT
Streaming class streaming RT
Interactive class Interactive best effort
Background Background best effort
Fundamental characteristics
-Preserve time relation (variation) between information entities of the stream Conversational pattern (stringent and low delay ) -Preserve time relation (variation) between information entities of the stream
-Request response pattern
-Preserve payload content
-Destination is not expecting the data within a certain time -Preserve payload content
Example of the application
- Voice - VoIP, video calls
- Streaming video
- Web browsing - Machine polling
- Background download of emails, non realtime video downloads
23.107
20 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net UMTS bearer attributes defined for each bearer traffic class
Traffic class Conversational class Streaming class Interactive class Background class Maximum bitrate X X X X Delivery order X X X X Maximum SDU size X X X X SDU format information X X SDU error ratio X X X X Residual bit error ratio X X X X Delivery of erroneous SDUs X X X X Transfer delay X X Guaranteed bit rate X X Traffic handling priority X Allocation/Retention priority X X X X Source statistics descriptor X X Signalling indication X Note these map down into Radio Bearer QoS capabilities, which are similar in makeup 21 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Value ranges for UMTS Bearer Service Attributes
Traffic class Conversational class Streaming class Interactive class Background class Maximum bitrate (kbps) <= 16 000 (2) <= 16 000 (2) <= 16 000 - overhead (2) (3) <= 16 000 - overhead (2) (3) Delivery order Yes/No Yes/No Yes/No Yes/No Maximum SDU size (octets) <=1 500 or 1 502 (4) <=1 500 or 1 502 (4) <=1 500 or 1 502 (4) <=1 500 or 1 502 (4) SDU format information (5) (5) Delivery of erroneous SDUs Yes/No/- (6) Yes/No/- (6) Yes/No/- (6) Yes/No/- (6) Residual BER 5*10 -2 , 10 -2 , 5*10 -3 , 10 -3 , 10 -4 , 10 -5 , 10 -6
Transfer delay (ms) 100 maximum value 280 (8) maximum value
Guaranteed bit rate (kbps) <= 16 000 (2) <= 16 000 (2) Traffic handling priority 1,2,3 (9) Allocation/Retention priority 1,2,3 1,2,3 1,2,3 1,2,3 Source statistic descriptor Speech/unknown Speech/unknown Signalling Indication Yes/No (9) 22 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Mapping from R97/98 GPRS QoS attributes to Release 99 onwards Resulting R99 Attribute Derived from R97/98 Attribute Name Value Value Name Traffic class Interactive 1, 2, 3 Delay class Background 4 Traffic handling priority 1 1 Delay class 2 2 3 3 SDU error ratio 10 -6 1, 2 Reliability class 10 -4 3 10 -3 4, 5 Residual bit error ratio 10 -5 1, 2, 3, 4 Reliability class 4*10 -3 5 Delivery of erroneous SDUs 'no' 1, 2, 3, 4 Reliability class 'yes' 5 Maximum bitrate [kbps] 8 1 Peak throughput class 16 2 32 3 64 4 128 5 256 6 512 7 1024 8 2048 9 Allocation/Retention priority 1 1 Precedence class 2 2 3 3 Delivery order yes' yes' Reordering Required (Information in the SGSN and the GGSN PDP Contexts) 'no' 'no' Maximum SDU size 1 500 octets (Fixed value) 23 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net IP CoS Basics Key Functions W R R RED PLP=0 100% 100% PLP=1 Stream 100% IP Flow IP Precedence bits, DSCP Byte MPLS CoS bits Incoming Physical Interface Incoming Logical Interface Destination IP address Application (stateful) etc Priority Queuing Traffic Classification & Marking
Per-flow Rate Policing Congestion Avoidance S P 24 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Converged Network CoS Design In a voice / best effort network, three classes (at least) of service are necessary: IP network control traffic Low bandwidth requirements, not sensitive to latency, jitter Must not be starved Voice signaling and bearer traffic Highest latency and jitter requirements Best effort data traffic Whatever capacity is left More complex configurations may or may not be needed in other network designs (e.g. with VPN service) More classes = more complexity, no way around this.
25 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Real World Case Study Customer QoS allocations MPLS EXP Bits Forwarding Behaviour Traffic Type Hardware Queue Drop Probability 000 Best Effort IP Traffic (UMTS Best Effort Class) Queue 0 - 001 Assured Forwarding 12 Queue 2 High 010 Assured Forwarding 11 3G Signalling traffic UMTS Streaming Class Unified Messaging client Low 011 Expedited Forwarding 1 Queue 1 High 100 Expedited Forwarding 3G AAL2 traffic (UMTS Conversational Class) Low 101 Network Control 3 / Assured Forwarding 41 Queue 3 High 110 Network Control 1 / Assured Forwarding 21 Network Control UMTS Interactive Class Low 111 Network Control 2 / Assured Forwarding 31 High 26 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Queue implementation on network routers Hardware Queue Traffic Type WRR weighting Queue depth Queue 0 IP traffic 60% 60 % Queue 1 3G AAL2 traffic 25 % 10% Queue 2 3G Signalling traffic 10 % 10% Queue 3 Network Control 5 % 20% Real World Case Study Customer QoS allocations Expedited Forwardin g (strict priority for voice) 27 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net What is Diff-Serv TE ? Diff-Serv: scheduling/queuing behavior at each node depends on traffic type (indicated by DSCP/EXP setting ) - hop by hop QoS MPLS TE: use of constraints to control placement of LSPs. Typically, various traffic classes share the same LSP. Bandwidth reservations do not take account of the classes of traffic involved. MPLS Diff-Serv TE: Traffic divided into up to eight Class-Types. CSPF and RSVP take the Class-Type into account when computing path of LSP. Results in More granular bandwidth reservation. On each link in network, can have separate bandwidth constraints for each type of traffic E.g. limit the bandwidth taken by voice LSPs on a link to a maximum of 40%, data LSPs take the rest.
28 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Diff-Serv-aware MPLS Traffic Engineering Guaranteed bandwidth for MPLS Combines MPLS DiffServ and DiffServ TE Provides strict point to point QoS guarantees MPLS Diff-Serv + MPLS DS-TE Aggregated State (DS) Aggregate Admission Control (DS-TE) Aggregate Constraint-based Routing (DS-TE) MPLS Guaranteed Bandwidth No state Aggregated state Per-Flow state Best effort Diff-Serv RSVP v1 & Int-Serv CoS / QoS & Forwarding 29 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Components of DS-TE Three components: Per-class admission control RSVP extensions, IGP extensions Per-class input policing at the edge LSP Policing Per-class scheduling (one queue for all traffic of a given class) DiffServ Aggregated scheduling: a class queue carries many LSPs THE RESULT: Admission control + policing at the edge + dedicated queue = guaranteed bandwidth
29 Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 30 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Layer 2 Migration VC to MPLS QoS Mapping Queues CBR (10% bw) ->CT3 VBR rt (20% bw) ->CT2 VBR nrt (20% bw) ->CT1 ATM Control Traffic VPs CBR VBR rt (CLP0, CLP1) ABR/UBR (CLP0, CLP1) VBR nrt (CLP0, CLP1) ABR/UBR (50% bw) CT0 QoS Flows Based on EXP Bits POS Interface ATM Interface PE to PE E-LSPs (PSN Tunnel) Trunk VPN Label (Pseudo Wire) 31 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Looking into the future 3G Release 6 32 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 3G Release 6 PSTN Internet Corporate IP/AAL5 USIM NodeB BICC Circuit switched call control server
H.248 TDM ATM IP SIP IP Multimedia CSCF IMS enhancements for conversational UDP/IP or AAL2 Iu b Iu ps Iu cs RTP or AAL2 UMTS/GPRS - WLAN Interworking Definition in R6, implementation sooner TS 23.221 Multimedia Broadcast/Multicast Service (MBMS) conferencing etc Service charging enhancements 33 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Service based charging and control Convergence of service differentiation, service specific policies and charging policies IP flow-based charging Enable differentiated online and offline charging for the traffic flows belonging to different services (a.k.a. different service data flows) even if they use the same PDP Context. Dynamic policy control enhancements (also ties in with QoS) Enable service based local policy control over IP bearer resources to evolve separately from SIP services. Requirements: Ability to classify IP traffic into services based on content (stateful. Eg- URI) Ability to apply flexible charging rules and service based local policy control based on service classification Ability to enforce IP bearer policies for multiple services 34 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Service based charging and control Timescale: 3GPP Release 6 Early realization by some vendors at the GGSN
Traffic Plane Function Gx
Online Charging System*
Service Data Flow Based Credit Control
Based Charging Service Data Flow Rules Function CAMEL SCP Gy
Rx
AF Gq Policy Decision Function
Go 35 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 3G complimentary access technologies Access technologies that compliment a 3G FDD network by providing high-speed data services in hot-spot areas 802.11 based WLAN, HSDPA, TDD / portable broadband Requirements: Existing core networks to support connectivity to WLAN, TDD access networks Allow access to PS services (e.g. IMS) from WLAN access networks Ability to handle additional transport capacity as a result of higher bandwidth Timescale: 3GPP Release 6 for basic WLAN inter-working scenarios Realization of basic scenarios by many vendors HSDPA in 3GPP Release 5 36 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 3G complimentary access technologies
3GPP Home Network WLAN Access Network WLAN UE 3GPP AAA Server Packet Data Gateway HSS HLR CGw/ CCF OCS W o
Intranet / Internet 3GPP Visited Network 3GPP AAA Proxy CGw/CCF Wireless Access Gateway Wn Wf W s / W c
W n
W i
Wx S c e n a r i o
3
PS Service Network 37 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Agenda Mobile overview and the transition to 3G 2.5G data networks 3G - phases of deployment. Focus areas: Layer 2/MPLS migration IP RAN and transition techniques IP Multimedia subsystem and QoS Push to Talk example IPv6 WLAN integration options Case studies 38 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net High level Scenarios VPN / Network level integration Authentication / billing integration Web logon: SMS delivered password SIM integration 3GPP work ongoing (GRPS/WCDMA) Real time handover Mobile IP 39 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net VPN / Network Level integration eg- Leading Asian Wireless Operator Integration of VPN access for mobile corporate users regardless of access type Outsource remote access management from corporates, and aggregate users in a layer 3 VPN common point of subscriber management Network diagram: E Series (PE) & Tunnel Gateway M Series (P) WiFi User with native Windows Client IPSEC / L2TP (RFC 3193) 3G and PHS users MPLS Backbone LAC GGSN Native L2TP Mobile users mapped into corporate VPNs MPLS 40 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Authentication / Billing integration First approach: web login approach for WLAN Username and password login or/ One time password delivered by SMS/text message
Billing integration WLAN charges appear on normal mobile bill backend integration. Flat rate or time / usage based
Examples of this approach: Verizon Wireless, Telstra
41 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net GPRS/CDMA Example Telstra Corp. Australia Mobile centric service, launched in August 2003 Public WLAN access to the Internet and corporate VPNs Available in hotspot locations throughout Australia Target of 600 hotspot locations in 2004 International roaming through the Wireless Broadband Alliance Use of centralised control functions (E Series + SDX) The "Wireless Hotspot" service is expected to become our "workhorse" mobile data network, especially for corporate users, providing greater bandwidth in high traffic locations than our cellular GPRS and 1xRTT mobile networks. - Ted Pretty, Telstra Mobile Group Managing Director 42 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Mobile Operator focus Simple billing for Telstra mobile customers Time based billing; hourly rate
Login via a password delivered by SMS to a Telstra mobile Usage appears on customers normal mobile Bill
Lowered barriers to uptake No special WLAN subscription needed casual pay-per-user Captive portal logon using DHCP no client software required
Credit card payment option for non-Telstra post-paid mobile customers Inbound roaming also supported (eg with Wireless Broadband Alliance partners), can enable wholesale offering also 43 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net User opens up web browser and tries to go to Google Session directed to captive portal software (SDX) Choice to enter mobile phone number or username and password Mobile phone number entered How it works - Step One 44 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net One-time password sent via SMS to users mobile phone
Received password entered into portal page Step Two 45 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Upon successful authentication, captive portal is released and original web destination is loaded. Mini-logout window to facilitate signoff. Usage billed to users mobile phone bill once finished Step Three 46 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Authentication on WLAN using 802.1X and EAP on 802.11 - overview Ethernet Access Point RADIUS Server Ethernet EAPOW-Start EAP-Response/Identity Radius-Access-Challenge EAP-Response (credentials) Access blocked Association Radius-Access-Accept EAP-Request/Identity EAP-Request Radius-Access-Request Radius-Access-Request RADIUS EAPOW 802.11 802.11 Associate-Request EAP-Success Access allowed EAPOW-Key (WEP) 802.11 Associate-Response Source: Microsoft 47 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Internet MPLS VPN Premium Content Maintaining subscriber control when using 802.1x/EAP environment Transparent RADIUS relay concept 802.1x access points have Radius client, EAP messages encapsulated in Radius messages Host MAC address in the calling-station-attribute Radius relay (BRAS) uses @domain name to forward Radius request to an external EAP capable Radius proxy or server BRAS relay stores Host MAC address and awaits authorization data (VR to use, IP pool/address to use, filters, etc) DHCP request, based on the host MAC address, creates subscriber interface in proper context allocates IP address, assign default policies. SDX with no Web login Access point creates Radius authentication and accounting (stop)
802.1x AP Policy Control GRE, routed, DSL, FR,ATM, LL, MetroE Radius Relay IDAS 802.1x AP IDAS = Integrated DHCP Access Server 48 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net PWLAN and Mobile 3GPP standards org defined five scenarios for PWLAN integration with 3G From common authentication to seamless handover of voice service Specified 802.1x based authentication Part of 3GPP Release 6, specified in TS 23.234 But, real deployments are occurring well in advance of 3GPP R6so: GSM Association WLAN Task Force issued guidelines for pre Release 6 Wed based login initially transitioning to 3GPP release 6 spec A SIM located in WLAN cards will use authentication based on EAP/SIM Eg- Use of SIM dongle EAP to SS7 gateways will allow mobile HLR / HSSs to authenticate the WLAN card 49 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Authenticating against the GSM HLR Existing database with all mobile subscriber information Existing provisioning and customer care systems are used EAP/SIM can offer GSM equivalent authentication and encryption Gateway between RADIUS/IP and MAP/SS7 is required Eg Funk Software Steel Belted Radius/SS7 Gateway Ulticom Signalware SS7 software Sun server E1/T1 interface card An overview of the product is in this attachment: Major vendors Ericsson, Siemens, Nokia all have or are developing their own offer 50 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 802.1x EAP/SIM authentication from HLR Transparent RADIUS relay BRAS AC, (RADIUS Relay) Authenticator RADIUS/SS-7 GW HLR EAPoL RADIUS RADIUS Gr Interface DHCP Discover Client DHCP Request DHCP Offer DHCP Ack {address = End User address from GGSN} Client - Authentication Client IP Address Assignment GW HLR MAP SS7 51 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Tight integration proposed by 3GPP GGSN Access Controller, RADIUS Relay Authenticator RADIUS/SS-7 GW HLR EAPoL RADIUS RADIUS Gr Interface Create PDP Context {IP, transparent mode APN, IMSI/NSAPI, MSISDN, dynamic address requested} Create PDP Context Response {End User Address} DHCP Discover Client DHCP Request DHCP Offer DHCP Ack {address = End User address from GGSN} Lease expiration Delete PDP Context Request Client - Authentication Client IP Address Assignment GGSN HLR GPRS Tunneling Protocol 52 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Real time handover Many access types WLAN, 3G, GPRS Mobile IP could provide reasonable real-time macro roaming between cellular and WLAN access types (also alternates such as 802.16/WiMax) Supported for dual mode CPE/handsets Eg- Dual Mode NEC cellphone with WLAN as trialed in DoCoMo PDAs with WLAN and CDMA 1x/EVDO or GPRS/WCDMA Notebooks with cellular data or dual mode cards Off the shelf client software available today IPUnplugged, Birdstep Challenges- VoIP, WLAN automated logon (eg- 802.1x could solve this), applications/OS can handle address changes 53 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Overview of Mobile IPv4 (RFC2002) 1. MN discovers Foreign Agent (FA) 2. MN obtains COA (FA - Care Of Address) 3. MN registers with FA which relays registration to HA 4. HA tunnels packets from CN to MN through FA 5. FA forwards packets from MN to CN or reverse tunnels through HA (RFC3024) HA FA 1. and 2. 3. MN CN 5. 4. Internet 54 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Mobile IP Interworking with UMTS/GPRS Recommends use of FA Care Of Addresses (CoA), not collocated, to conserve IPv4 addresses Source: 3GPP 55 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Registration Process to GGSN FA 5. Activate PDP Context Accept (no PDP address) 4. Create PDP Context Response (no PDP address) 2. Activate PDP Context Request ( APN=MIPv4FA ) IPv4 - Registration UMTS/GPRS + MIP , FA care-of address TE MT Home Network SGSN GGSN/FA 3. Create PDP Context Request ( APN=MIPv4FA ) 6. Agent Advertisement 7. MIP Registration Request 9. MIP Registration Reply 10. MIP Registration Reply 1. AT Command (APN) 8. MIP Registration Request A. Select suitable GGSN 56 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Overview of Mobile IPv6 Removes need for external FA in future 3GPP systems 1. MN obtains IP address using stateless or stateful autoconfiguration 2. MN registers with HA 3. HA tunnels packets from CN to MN 4. MN sends packets directly to CN or via tunnel to HA Binding Update from MN to CN removes HA from path. HA 1. 2. MN CN 4. 3. Internet 57 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net 3G- Mobile Data Networks To Summarise Interworking different wireless access types is possible in many ways benefits to the end users Short term migration of FR and ATM over MPLS infrastructure can help cut network and operations costs Mobile networks are moving to IP both at network transport and application layer IP UTRAN option IP out to the base station site IP Multimedia subsystem native IP clients in devices Push To Talk is a wildcard; could accelerate IP requirements in the mobile network before 3G becomes widescale MPLS, QoS / DiffServ TE, IPv6 and transition techniques are key requirements in the new mobile carrier network! 58 Copyright 2003 Juniper Networks, Inc. CONFIDENTIAL www.juniper.net Thank you! My contact details: