Interoperability Standards - Cognitive Radio Technologies

Download Report

Transcript Interoperability Standards - Cognitive Radio Technologies

Interoperability Standards
802.21, UMA/GAN 802.11u
Industry Standards
Interoperability Overview
•
•
•
•
•
Motivation
802.21
GAN/UMA
802.11u
Industry Standards
Different Networks Available in
Different Areas
Zone 1
Operating on
3G WWAN
Zone 2 3G WWAN
Wakeup Wi-Fi
Wi-Fi Link Going Down.
Connect to
Wi-Fi
Continue
session on Wi-Fi
Airport
Zone 6
Radio State
3G WWAN
Continue session
on 3G WWAN
Home
Battery level low
Shutdown WiMAX
Switch to 3G WWAN
Operator initiated switch to WiMAX
Continue session on WiMAX
Shutdown Wi-Fi
Zone 7
Plug into power jack
Wakeup Wi-Fi
Continue over Wi-Fi
Zone 5
Zone 4
Zone 3
WiMAX
Zone 8
WiMAX
Wi-Fi
WiMAX
GPS
Zone 9
IEEE 802.21, SIP, VCC, IMS, for Network Selection and Service
VCC, SIP,
for
Call
Continuity
WWAN

Wi-Fi)
802.21,
SIP,IMS
IMS
IEEE
for
802.21
Service
forContinuity
Network (3G
Discovery
(Wi-Fi
WiMAX)
Continuity across multiple radios (3G WWAN  Wi-Fi  WiMAX)
V. Gupta, “IEEE 802.21 MEDIA INDEPENDENT HANDOVER,” IEEE 802.21
session #15 July 17, 2006
Operators Approaches
I, Niva, “UMA – “Unlicensed Mobile Access” on the way to VoIP” Wireless Cities
Conference06
Mobile Operators
Cable & Fixed
Operators ,
MVNOs
Fixed & Mobile
Operators
Operator with smaller customer base may have following view:
 Any WLAN access point can be allowed for VHO.
 Allowing access anywhere will attract more customers.
While operator with already large customer base may think:
 Allow only WLAN APs at customers’ homes for VHO access, to
ensure that cellular revenues are also maintained.
 Reason could be that access pricing is defined lower than in cellular.
Similar views may exist as mentioned for mobile operators
The opinion depends on whether VHO is used for attracting
new customers or for defending the old customer base.
Here the view may depend on whether target is to have different
or the same service portfolio for old fixed and mobile
customers
 Thus several opinions probably exist.
Operators may have different views on where the WLAN APs are allowed to be used for UMA access
Handover Standards
VCC
802.11r
802.16e
I-WLAN
SAE-LTE
IEEE
802.21
3GPP/2
Inter-working &
Handover Signaling
MIP
NETLMM
DNA
SIP
Horizontal
Handovers
FMIP
HIP MIPSHOP
IETF
IEEE
IP Mobility &
Handover Signaling
802.21
Media Independent Handover
(MIH)
802.21 Motivation
•
Incorrect Network Selection
Internet
– Ability of a device to choose it’s connection
was hopeless. You could often connect at
L2, but not at the network layer. The PC
would often connect to the wrong one of
many available APs, based on signal
strength criteria alone.
•
802.16
802.11
802.3
Headed out of
the building
Undocked &
walking
around
My Desk
Increasing number of interfaces on devices
– Problem could extend to cover multiple
interfaces.
•
Various fast handover mechanisms in IETF
– MIPv4, FMIPv6
•
IETF anticipated L2 constructs in
standardized form
– Triggers, events, hints etc, but 802 was not
providing them in a standard form or a
media independent form
i
p
i
p
i
Jan
2003
March
2003
May
2003
July
2003
Sept
2003
CFI.
First
Meeting of
ECSG
802
Handover
Tutorial
802
Handover
ECSG
Formed by
SEC
p
Nov
2003
PAR & 5C
i
p
Jan
2004
Mar
2004
Initial WG
Meeting
Submission
EC PAR
Approval
http://www.ieee802.org/802_tutorials/july06/802 21IEEE-Tutorial.ppt
802.21: Key Services
Applications (VoIP/RTP)
Link Layer
Triggers
Handover
Connection
Management
State Change
Handover Management Predictive
Network
Mobility Management
ProtocolsInitiated
IETF
Policy
Smart
Triggers
Handover
Messages
Information
Service
IEEE 802.21
802.21 MIH Function
Handover Commands
L2 Triggers
and Events
WLAN
Network Information
Available Networks
Neighbor Maps
Network Services
Client Initiated
Network Initiated
Vertical Handovers
Handover
Messages
Information
Service
Cellular
WMAN
Protocol and Device Hardware
802.21 uses multiple services to Optimize
Vertical Handovers
http://www.ieee802.org/802_tutorials/july06/802 21-IEEE-Tutorial.ppt
Media specific Amendments
•MIH Protocol (MAC independent messages) defined in
802.21
•Container for MIH messages for 802.11 defined in 802.11u
•Container for MIH messages for 802.16 defined in 802.16g
•Working with 3GPP-SAE for 3GPP specific changes
•Transport for MIH Protocol defined in IETF (MIPSHOP)
Media specific changes closely follow base protocol
http://www.ieee802.org/802_tutorials/july06/802 21-IEEE-Tutorial.ppt
802.21 Overview
Media Independent Information Service
802.21
Information
Server
Global Network Map
WLAN
•List of Available Networks
WWAN
- 802.11/16/22, GSM, UMTS
•Link Layer Information
- Neighbor Maps
•Higher Layer Services
WMAN
- ISP, MMS, ….
Network
Network
Type
Network
Type
Type
GSM
SSID/
SSID/
Cell
ID
SSID/
Cell ID
Cell
ID
13989
GSM
GSM
802.11n
802.11b
13989
13989
Enterpris
Intel
e
802.16e
NA
BSSID
BSSID
BSSID
Operator
Operator
Operator
Security
Security
Security
N/A
N/A
N/A
00:00:…
00:00:…
Oper-1
AT&T
AT&T
Oper-2
Intel
NA
NA
NA
.11i
.11i
EAP
NW
Type
NW
Channel
Channel
Channel
NA
1900
NA
1900
NA
1900
EAP6
EAP6
PEAP
PEAP
NA
Oper-3
PKM
EAP11
PEAP
http://www.ieee802.org/802_tutorials/july06/802
21-IEEE-Tutorial.ppt
QoS
QoS
QoS
N/A
N/A
N/A
.11e
.11e
Yes
Physical
Physical
Layer
Physical
Layer
Layer
N/A
Data Rate
Data Rate
Data Rate
N/A
N/A
OFDM
OFDM
9.6 Kbps
9.6 kbps
9.6 Mbps
kbps
100
11 Mbps
OFDM
40 Mbps
Types of Handover Based on
Control Model
•Terminal Controlled
• Terminal makes use of some MIH services
•Terminal Initiated, Network Assisted
• Terminal makes use of MIH Information Service
•Network Initiated and Network Controlled
• Network makes use of MIH Event and Command Service, plus Information Service
knowledge, to decide if handover is needed/desired, to decide the target, and to
command the terminal to handover
http://www.ieee802.org/802_tutorials/july06/802 21-IEEE-Tutorial.ppt
UMA
UMA Overview
• UMA allows to access the
mobile voice and data
services of the cellular
network over a Wireless LAN
• Subscribers are enabled to
roam and handover between
cellular networks and
wireless networks
http://www.umatoday.com
UMA Architecture
• Mobile devices access the Core Network through Unlicensed Mobile
Access Network (UMAN).
• UMAN has 3 major entities
– Unlicensed wireless network
– IP access network
– UMA Network controller (UNC)
• UNC authorizes and authenticates the Mobile devices for accessing
the Core Network
UMA Security
• Authentication
– Authenticate MS with UNC to make secure
tunnel
– Based GSM or UMTS credentials
– Protocol of authentication is IKEv2
– GSM : EAP-SIM or UMTS : EAP-AKA
– Mutual Authentication of MS and Mobile
Network
– Session Key Generation – IK and CK
802.11u
Interworking with External
Networks
802.11u
• Standard out in 2009
• Specifically addresses handoffs where user not
preauthorized (generally because from another
network)
• Major Topics
–
–
–
–
Network Selection
Emergency Call support
Authorization from Subscriber Network,
Media Independent Handover Support
• Supporting information and control messages of 802.21
Network Selection
•
•
•
STA (clients) need to know the roaming suitability before
authenticating/associating (in state-1) with the AP
Roaming information of various hotspots is not scalable to be configured on
the client
Roaming information includes
– Is this WLAN suitable for roaming?
– What is the SSID that client to connect?
•
Who provides this information?
– The home network (called SSPN in TGu terminology) or
– A trusted source that has this roaming information
•
•
•
But could the home SSPN be located far away?
How is the query routed/switched to the destination?
What are the query semantics used?
E-911 call
•
•
Intended to provide normal service on unlicensed
network
Support e911 STA calls without authentication
credentials
–
–
–
•
Public User Credentials
–
–
–
–
–
•
Access control limited to only e911 calls
Authorized STA is straightforward
Location information not available, but may be available in
task group v
Allow WPA capable SSID to support e911 calls
A well known public user id (NAI) is used for dummy
authentication
AAA server downloads restricted e911 policy to AP to
restrict traffic
Draft standard does not discuss security keys for
encryption
EBR in QoS Setup
Open Auth SSID
–
–
–
Special SSID without any security support is configured
for emergency
Simple MAC level solution, with no AAA involvement =>
Applicable for certain situations
Open auth association but AP may configure this SSID to
only use a certain VLAN destined for emergency use only
EBR in QoS Setup
Other Handoff/Interoperability
Standards
VCC
•
Status
– Initiated within 3GPP in June 2005
– 2006 through requirements, has only fully completed the requirements stage,
•
Different technologies agree to virtual channel
– Joint control impossible
•
Some argue inferior to UMA
– http://www.kineto.com/products/downloads/kineto_wp_UMA_VCC_2007.pdf
•
Some argue better than UMA
– http://www-hk.huawei.com/publications/view.do?id=1480&cid=2622&pid=127
Other Cellular + WiFi
•
Seamless Converged Communication Across
Network (SCCAN)
–
–
•
Mobile Integrated Go-to-Market Network IP
Telephony Experience (Mobile IGNITE)
–
–
•
Mobile IGNITE
Vendor driven solution
http://www.bridgeportnetworks.com/partners/mobileignite.html
Wireless Wireline Convergence Working Group
–
–
•
Motorola, Proxim, Avaya – Enterprise solutions
http://www.sccan.org/
Alcatel, Cisco (International Packet
Communications Consortium)
http://www.packetcomm.org/index.shtml
Bottom line
–
–
Even for standard convergence type activities
there’s many different emerging standards.
Need for special radios to navigate standards?
http://www.spectralink.com/products/image
s/NL-01.gif
Interoperability Summary
• Proliferation of standards +
lack of silver bullet standard
means that optimal access
technology will vary
• Supporting growth in use of
VoIP will make networks less
dependent on particular
access technologies
• Biggest issues are:
– Getting industries to agree
(Herding cats)
– Managing security across
heterogeneous networks
– Harmonizing handoff routines
• 802.21 is the standard that ties
together the vertical handoff
standards
Rapid growth ?
Mobile voice traffic
Fixed voice traffic
VoIP traffic
-92 -93 -94 -95 -96 -97 -98 -99 -00 -01 -02 -03 -04 -05 -06 -07 -08
e e
e e
Source: Nokia 13.6.2005
Technology used to terminate the call
• More information
–Talk tonight (Oct 4) in Charlottesville
on 802.21
–6:00 PM: Social hour - Pizza & soda
sponsored by Tyco Electronics
–7:00 PM: Speaker Vivek Gupta - Intel
Corporation
–Where: University of Virginia, Olsson
Hall, Room 120