wireless networking trends - aalborg...

Post on 18-Apr-2020

3 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Page 1 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Wireless Networking Trends –Architectures, Protocols & optimizations for future networking scenarios

H. Fathi, J. Figueiras, F. Fitzek, T. Madsen, R. Olsen, P. Popovski, HP Schwefel

• Session 1 Network Evolution & Mobility Support (HPS)

• Session 2 Ad-hoc networking (TKM/FF)

• Session 3 Enabling technologies for ad-hoc NWs (TKM/FF)

• Session 4 Wireless Sensor Networks (PP)

• Session 5 Performance aspects & optimizations (HF/TKM)

• Session 6 Context-sensitive Networking (RLO/JF)

Note: Slide-set contains more material than covered in the lecture!

Page 2 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Wired / Wireless network Computer/Communication

Convergence is the key challenge

Page 3 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Antennas &

Propagation

Patrick Eggers

Center for Teleinfrastructure (CTIF)Director: Ramjee Prasad,

Co-directors: Ole Brun Madsen and Peter Koch

Cellular

Systems

Preben Mogensen

Digital

Com

munications

Bernard Fleury

RF Integrated

Systems and

Circuits

TorbenLarsen

Wireless

Netw

orks &

Embedded

Systems

RamjeePrasad

Speech and M

ultimedia

Com

munications

BørgeLindberg

Wireless

Perspective

BentDalum

Aalborg U

niversitySPA

CE C

enter

Jens F.D. Nielsen

Center for

Netw

ork Planning

Ole BrunMadsen

Wireless

Com

puting and Security

Henrik Larsen

Page 4 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

WING: Research projects (selection)Selected research projects with relevance for this course/course lecturers• Center for Network and Service Convergence – CNTK

– Danish Research Council, with local industry partners– Real-time service provisioning, traffic & performance modeling, network optimization– WING Researchers: Hanane Fathi, Tatiana K. Madsen

• Wireless Access Networks, Devices, and Applications – WANDA– Danish Research Council, with local industry partners– Localization & location-based network optimization– WING Researchers: Joao Figueiras

• My Adaptive Global NETwork – MAGNET– EU funded, with 36 European partners– Personal Networks, context-sensitive networking– WING Researchers: Rasmus Olsen (and more)

• HIghly DEpendable ip-based NETworks and Services – HIDENETS– EU funded, with 9 European partners– End-to-end dependability solutions for car-to-car communication with infrastructure service

accessAnd many more ...

Page 5 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Content1. Introduction/Motivation

• Cellular Concepts, Layering Models2. Cellular Network Evolution

• GSM, GPRS, UMTS: Architecture, air interface, and protocols

• IP connectivity and IP transport3. IP-based multimedia subsystem (IMS)

• Session Initiation Protocol (SIP)• IMS architecture• Cross-Layer Aspects: Quality of Service and

Security4. Mobility support mechanisms

• L2 mobility support, Network Layer (MIP)• Transport Layer Mobility, Session Layer

Mobility (SIP)• Intermediate (L3.5 solution): Host Identity

Protocol (HIP)• Mobility support on which layer?

5. Summary and outlook• Personal Area Networks and

Personal Networks• Heterogeneous access

networks

Page 6 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Intro: Cellular systems

• Geographic region subdivided in radio cells

• Base Station provides radio connectivity to Mobile Station within cell

• Handover to neighbouring base station when necessary

• Base Stations connected by some networking infrastructure

Page 7 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Extended layered communication model• Ultimate goal of (wireless)

service provisioning: user satisfaction

• Focus in this course: network aspects, i.e. Layers 2-5

Functionalities, that are difficult to assign to single layers:

• Mobility support• Quality of service support• Security (authentication, etc.)• Dependability/Resilience... More later in this session

L3: Network Layer: IP

L2: MAC/LLC

L4: Transport: TCP, UDP, RTP/UDP

Application

(L5) Session Control, e.g. SIP

Middleware

User Interface

User

L1: PHYS

User Environment

Netw

ork QoS

Application Q

oS

User perceived Q

oS

Page 8 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Wireless Communication Technologies

20 155

Indoor

Pedestrian

High SpeedVehicular

Rural

Mobility & Range

Personal Area

VehicularUrban

0.5 2

UMTS

GSM

DECT

Fixed urban

Total data rate per cell10

WLAN/ BRAN

B-PANWPANBluetooth

1000 Mb/s

Different Requirements on Wireless Communication:•Range, Mobility Support

•Throughput (interference/medium sharing), availability/reliability, QoS support

•Scalability/Number of Nodes

•Power consumption

•Cost, simplicity

•Voice / data support

•Security

Page 9 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Cellular systems: technologies & subscribers

0

200

400

600

800

1000

1200

1996 1997 1998 1999 2000 2001 2002 year

Subs

crib

ers

[mill

ion] GSM total

TDMA totalCDMA totalPDC totalAnalogue totalTotal wirelessPrediction (1998)

Page 10 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Content1. Introduction/Motivation

• Cellular Concepts, Layering Models2. Cellular Network Evolution

• GSM, GPRS, UMTS: Architecture, air interface, and protocols

• IP connectivity and IP transport3. IP-based multimedia subsystem (IMS)

• Session Initiation Protocol (SIP)• IMS architecture• Cross-Layer Aspects: Quality of Service and

Security4. Mobility support mechanisms

• L2 mobility support, Network Layer (MIP)• Transport Layer Mobility, Session Layer

Mobility (SIP)• Intermediate (L3.5 solution): Host Identity

Protocol (HIP)• Mobility support on which layer?

5. Summary and outlook• Personal Area Networks and

Personal Networks• Heterogeneous access

networks

Page 11 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GSM: Global System for Mobile Communication

• 2nd Generation of Mobile Telephony Networks• 1982: Groupe Spèciale Mobile (GSM) founded• 1987: First Standards defined• 1991: Global System for Mobile Communication,

Standardisation by ETSI (European Telecommunications Standardisation Institute) - First European Standard

• 1995: Fully in Operation

• Deployed in more than 184 countries in Asia, Africa, Europe, Australia, America)

• more than 747 million subscribers• more than 70% of all digital mobile phones use GSM• over 10 billion SMS per month in Germany, > 360 billion/year

worldwide

History:

Today:

Page 12 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GSM – Architecture

Components:• BTS: Base Transceiver Station• BSC: Base Station Controller• MSC: Mobile Switching Center• HLR/VLR: Home/Visitor Location

Register• AuC: Authentication Center• EIR: Equipment Identity Register• OMC: Operation and

Maintenance Center

Transmission: • Circuit switched transfer• Radio link capacity: 9.6 kb/s

(FDMA/TDMA)• Duration based charging

BSC

BSC

MS

BTS

BTS

BTS

MS

MS

MSC

HLR

VLR

OMC

EIR

AuC

O

Abis AUm

Radio Link

Base StationSubsystem

Network andSwitchung Subsystem

OperationSubsystem

Connection toISDN, PDNPSTN

Radio Subsystem (RSS)

Page 13 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GSM Services‘Traditional’ voice services

– voice telephonyprimary goal of GSM was to enable mobile telephony offering the traditional bandwidth of 3.1 kHz

– emergency numbercommon number throughout Europe (112); mandatory for all service providers; free of charge; connection with the highest priority (preemption of other connections possible)

– Multi-numberingseveral ISDN phone numbers per user possible

– voice mailbox (implemented in the fixed network supporting the mobile terminals)– Supplementary services, e.g.: identification, call forwarding, number suppression,

conferencing

‘Non-Voice’ Services (examples)• Fax Transmissions• electronic mail (MHS, Message Handling System, implemented in the fixed network)• Short Message Service (SMS)

alphanumeric data transmission to/from the mobile terminal using the signaling channel, thus allowing simultaneous use of basic services and SMS

Page 14 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

1 2 3 124

890 915Uplink Downlink

MHz 935 960

Kanäle:

200 kHz

Frequenzband derMobilstation

Frequenzband derBasisstation

GSM: Air Interface IFrequency Division Multiple Access (FDMA)• Separate up-link (MT BTS) and down-link (BTS MT) traffic

– Two 25MHZ bands • Distinguish 124 adjacent channels within each band

– Each channel 200kHz

Radio Network Planning:• Determine location of BTS• Determine number of TRX per BTS

– Multiple transceivers (TRX) per BTS (e.g. 1,4 ,or 12)simultaneous use of different FDMA channels

• Assign subsets of 124 channels to BTSs

Page 15 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

0 1 2 3 4 5 6 7

4,615 ms

data bits data bitstraining

57 26 57

time slot:

3 tail bits 3 tail bits1 togglebit

1 togglebit

burst 148 bit

time slot 156,25 bit

0,577 ms

GSM: Air Interface IITime Division Multiple

Access (TDMA)• Within each channel: sequence

of TDMA frames• TDMA frames subdivided into

8 time-slots

TDMA Frame

Page 16 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

1 2 3 4 5 6 7 8

higher GSM frame structures

935-960 MHz124 channels (200 kHz)downlink

890-915 MHz124 channels (200 kHz)uplink

frequ

ency

time

GSM TDMA frame

GSM time-slot (normal burst)

4.615 ms

546.5 µs577 µs

tail user data TrainingSguardspace S user data tail

guardspace

3 bits 57 bits 26 bits 57 bits1 1 3

GSM Air Interface: Combination of TDMA & FDMA

Page 17 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GSM: Logical Channels

Page 18 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Example: Mobile Terminated Call1. calling a GSM subscriber2. forwarding call to GMSC3. signal call setup to HLR4. 5. request MSRN from VLR6. forward responsible

MSC to GMSC7. forward call to current MSC8, 9. get current status of MS10, 11. paging of MS12, 13. MS answers14, 15. security checks16, 17. set up connection

PSTNcallingstation GMSC

HLR VLR

BSSBSSBSS

MSC

MS

1 2

3

45

6

7

8 9

10

11 12

1316

10 10

11 11 11

14 15

17

Page 19 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Example: Message flow between MS and BTS for Mobile Terminated Call

BTSMS

paging request

channel request

immediate assignment

paging responseauthentication request

authentication response

ciphering command

ciphering complete

setupcall confirmed

assignment command

assignment complete

alerting

connectconnect acknowledge

data/speech exchange

MTC

Page 20 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

0

200

400

600

800

1000

1200

1400

1600

1800

1995 2000 2005 2010

Subscriptions worldwide (millions)

Mobile InternetSubscribers

MobileSubscribersMobile

FixedMobile InternetFixed Internet

• The future Internet will mainly be accessed by mobile devices

Mobile Communication & Data Traffic

Page 21 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Data services in GSM• Data transmission standardized with only 9.6 kbit/s

– advanced coding allows 14,4 kbit/s– not enough for Internet and multimedia applications

• HSCSD (High-Speed Circuit Switched Data)– mainly software update– bundling of several time-slots to get higher

AIUR (Air Interface User Rate)(e.g., 57.6 kbit/s using 4 slots, 14.4 each)

– advantage: ready to use, constant quality, simple– disadvantage: channels blocked for voice transmission

AIUR [kbit/s] TCH/F4.8 TCH/F9.6 TCH/F14.44.8 19.6 2 1

14.4 3 119.2 4 228.8 3 238.4 443.2 357.6 4

Page 22 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GPRS: General Packet Radio Service

• Packet Switched Extension of GSM• 1996: new standard developed by ETSI• Components integrated in GSM architecture• Improvements:

– Packet-switched transmission– Higher transmission rates on radio link (multiple

time-slots)– Volume based charging ‚Always ON‘ mode

possible• Operation started in 2001 (Germany)

Page 23 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GPRS - Architecture

PDN

Other

PLMN

GSM GPRS

BTS

CCU

MSC

BSC

PCU

HLR GR

GGSN

Components

A Abis Gb Gp

Gs

Gn

G Gr

Gi

UmBSS

SGSN

MS

Components:• CCU: Channel Coding Unit• PCU: Packet Control Unit• SGSN: Serving GPRS Support Node • GGSN: Gateway GPRS Support Node• GR: GPRS Register

Transmission: • Packet Based Transmission• Radio link:

– Radio transmission identical to GSM– Different coding schemes (CS1-4)– Use of Multiple Time Slots – On-demand allocation of time-slots

• Volume Based Charging

Page 24 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GPRS: Channel Coding and Multiplexing

9,05 kbit/s

.....

Time Slot (MS-> BTS)

Coding Scheme 1

72.4.......171,2 kbit/s

9,05 kbit/s

13,4 kbit/s

9,05 kbit/s

1 2 8

13,4 kbit/s 13,4 kbit/s

15,6 kbit/s 15,6 kbit/s 15,6 kbit/s

.....

.....21,4 kbit/s .....21,4 kbit/s 21,4 kbit/s

9,05 kbit/s

3

Coding Scheme 2

Coding Scheme 3

Coding Scheme 4

.....

‚optimal‘ radio quality: no interference, etc.

Selection of Codingdepending on qualityof radio connection

Overall transmission rate

Page 25 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Example: Channel Assignment & Multiplexing

• 4 TRX 4 FDMA channels32 time slots

• 3 Signalling Channels– 1TS: FCCH, SCH, BCCH (PBCCH),

PAGCH, RACH (PRACH)– 2 TS: SDCCH

• 29 Tracffic Channels (TCH/PDTCH)– GSM calls only– GPRS calls only– Common channels

Page 26 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GPRS: Protocol Stack

• RLC: Radio Link Control– Acknowledged mode (reliable) or unacked

• LLC: Logical Link Control– Acknowledged mode (reliable) or unacked

• BSSGRP: BSS GPRS Protocol

• SNDCP: Sub-Network Dependent Convergence Protocol

• GTP: GPRS Tunneling Protocol– Mobility Support– GTP-C and GTP-U

Page 27 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Coding Schemes

• USF = Uplink State Flag– ‘owner’ of time-slot in next uplink TDMA frame– Allows multiplexing of up to 8 MS on one time-slot

• Block header contains Temporary Flow Identifier (TFI)– TFI and direction identifies Temporary Block Flow (TBF)

Page 28 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Enhanced Data rates for the GSM Evolution (EDGE)

Time Slot (MS-> BTS) Transmission Rate

48.......384 kbit/s

1 2 8

48 kbit/s ....48 kbit/s 48 kbit/s8 PSK

....New Modulation

Scheme

• Advantages– Increased Data Rate– No Modificatíons in Core Network (SGSN/GGSN) required

• Disadvantages– New Modulationscheme(8 PSK), not compatible to GSMK– HW Changes in the BTS required

Page 29 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Universal Mobile Telecommunication System (UMTS)• Currently standardized by 3rd Generation Partnership Project (3GPP),

see http://www.3GPP.org[North America: 3GPP2]

• So far, three releases: R’99, R4, R5

Modifications:• New methods & protocols on radio link increased access bandwidth• Coexistence of two domains in the core network

– Packets Switched (PS)– Circuit Switched (CS)

• New Services• IP Service Infrastructure: IP Based Multimedia Subsystems (IMS) (R5)

Page 30 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

User EquipmentDomain

User EquipmentDomain Access

NetworkDomain

AccessNetworkDomain

CoreNetworkDomain

CoreNetworkDomain

Service and ApplicationDomain

Service and ApplicationDomain

Charging/ Lawful Interception/ OAMCharging/ Lawful Interception/ OAM

Other Networks (IP/ ISDN)

Other Networks (IP/ ISDN)

• Radio Access Network– Node B (Base station)– Radio Network Controller (RNC)

• Mobile Core Network– Serving GPRS Support Node (SGSN)– Gateway GPRS Support Node (GGSN)– Mobile Switching Center (MSC)– Home/Visited Location Register (HLR/VLR)– Routers/Switches, DNS Server, DHCP Server,

Radius Server, NTP Server, Firewalls/VPN Gateways

• Application/Services• IP-Based Multimedia Subsystem (IMS)• Operation, Administration & Maintenance (OAM)• Charging Network • [Legal Interception]

UMTS Network Domains

Page 31 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS Radio Access Network (UTRAN): architecture

• W-CDMA (Wideband Code Division Multiple Access) on Radio Link

• transmission rate up to 2Mbit/s (see course ‚UMTS Evolution‘ for rather complex details)

Page 32 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Transport of IP packets

ApplicationServerGGSNTerminal SGSNUTRAN

GTP-UGTP-U

User IP (v4 or v6)

Radio Bearer

IP tackets are tunnelled through the UMTS network(GTP – GPRS tunneling protocol)

L1

RLC

PDCP

MAC

IPv4 or v6

Application

L1

RLC

PDCP

MAC

ATM

UDP/IPv4 or v6

GTP-U

AAL5

Relay

L1

UDP/IPv4 or v6

L2

GTP-U

IPv4 or v6

Iu-PSUu Gn Gi

ATM

UDP/IPv4 or v6

GTP-U

AAL5

L1

UDP/IPv4 or v6

GTP-U

L2

Relay

L1

L2

IPv4 or v6

[Source: 3GPP]

Page 33 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

IP Transport: Concepts• PDP contexts (Packet Data Protocol) activation

• done by UE before data transmission• specification of APN and traffic parameters• GGSN delivers IP address to UE• set-up of bearers and mobility contexts in SGSN and GGSN• activation of multiple PDP contexts possible

•Access Point Names (APN)• APNs identify external networks (logical Gi interfaces of GGSN)• At PDP context activation, the SGSN performs a DNS query to find out the GGSN(s) serving the APN requested by the terminal.• The DNS response contains a list of GGSN addresses from which the SGSN selects one address in a round-robin fashion (for this APN).

•Traffic Flow Templates (TFTs)• set of packet filters (source address, subnet mask, destination port range, source port range, SPI, TOS (IPv4), Traffic Class (v6), Flow Label (v6)• used by GGSN to assign IP packets from external networks to proper PDP context

• GPRS tunneling protocol (GTP)•For every UE, one GTP-C tunnel is established for signalling and a number of GTP-U tunnels, one per PDP context (i.e. session), are established for user traffic.

Page 34 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

GGSN

IP Transport: PDP Context & APNs

Terminal SGSNGGSN

PDP Context X2 (APN X, IP address X, QoS2)

PDP Context X1 (APN X, IP address X, QoS1)

ISP X

ISP Z

ISP Y

PDP Context Z (APN Z, IP address Z, QoS)

PDP Context Y (APN Y, IP address Y, QoS)

APN

YA

PN Z

APN

X

Same PDP (IP) address and APN

PDP Context selectionbased on TFT (downstream)

[Source: 3GPP]

Page 35 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS Data Transport: Bearer Hierarchy

TE MT UTRAN/GERAN

CN IuEDGENODE

CNGateway

TE/AS

End-to-End Service(IP Bearer Service)

TE/MT LocalBearer Service

UMTS BearerService

External BearerService

UMTS Bearer Service

Radio Access BearerService

CN BearerService

BackboneBearer Service

Iu BearerService

Radio BearerService

PhysicalRadio

Service

PhysicalBearer Service

Air Interface

3G GGSN3G SGSNRAN

User Equipment

Page 36 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS Bearer: Traffic Classes (Source TS23.107, V5.2.0)

UMTS Bearer: Selected Traffic/QoS Parameters• Maximum Bitrate (kb/s)• Guaranteed Bitrate (kb/s)• Source statistics descriptor (`speech´, `unknown´)

• Transfer delay (ms)• SDU error ratio• Maximum SDU size (bytes)

Page 37 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Message Flow: PDP Context Setup

Page 38 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

The ’full picture’ of the UMTS packet switched domain

G G SNSG SN

D HC P

R ADIU S

IM S D o m ain

H SS

H L R/AuC

RNC

Node B

Node B

N etw ork Services

SS7, G r

SS 7, G c

G RX Netw o rk

D N SG n-SEC

DN S G n-PRI

G n N etw ork

D N S E xt

B G

G i N etw ork

D M Z

D NSExt

E -m ail

HT T Pproxy

D N S NS

D N S IM S

P-C S C F

I/S -C S CF

MN O 1`s B ackbone

AS N etw o rk

M essages

FT P

V ideo

DN SAS

C orp. Network

VPN -G W Y

AS

B G

IDS

ID S

M N O 1`s N etw ork

B G

1 2 3 4 5 6 7 8 9 * 0 # U E1

BG

In ternetAS

M N O 3

UE3

M N O 2

UE2

IMS

Roaming Support: • UE attaches with SGSN in visited network• PDP context is set-up to GGSN in home network (via Gp interface, GRX network)

Page 39 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Content1. Introduction/Motivation

• Cellular Concepts, Layering Models2. Cellular Network Evolution

• GSM, GPRS, UMTS: Architecture, air interface, and protocols

• IP connectivity and IP transport3. IP-based multimedia subsystem (IMS)

• Session Initiation Protocol (SIP)• IMS architecture• Cross-Layer Aspects: Quality of Service and

Security4. Mobility support mechanisms

• L2 mobility support, Network Layer (MIP)• Transport Layer Mobility, Session Layer

Mobility (SIP)• Intermediate (L3.5 solution): Host Identity

Protocol (HIP)• Mobility support on which layer?

5. Summary and outlook• Personal Area Networks and

Personal Networks• Heterogeneous access

networks

Page 40 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

IP based Multimedia Subsystem (IMS)Additional domain in UMTS Rel. 5, based on Packet-switched domainEstablishment and Control of IP based multimedia calls based on SIP

Standardized interfaces to applicationsAuthentication and authorisation of service accessService based chargingQoS controlGlobal roaming and access to home services

Originally planned to be based on IPv6‘Network centric’ approach (as opposed to IETF SIP)In principle access independent (e.g. also WLAN access)No Network layer mobility support in IMS (mobility via SIP or in access networks)

Page 41 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Session Initiation Protocol -- SIPSIP: Application layer signalling protocol (RFC 3261)• Provides call control for multi-media services

• initiation, modification, and termination of sessions• terminal-type negotiation and selections• call holding, forwarding, forking, transfer • media type negotiation (also mid-call changes)

using Session Description Protocol (SDP)• Provides personal mobility support• Independent of transport protocols (TCP, UDP, SCTP,…)• ASCII format SIP headers• Separation of call signalling and data stream

Application types/examples:• Interactive Voice over IP (VoIP)• Multimedia conferences (multi-party, e.g. voice & video)• Instant messaging • Presence service• Support of location-based services

Page 42 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP – Basic messages

• Selected Requests (Methods)– INVITE: initiate call– ACK: confirm final response (after ‘invite’)– BYE: terminate call– CANCEL: cancel pending requests– OPTIONS: queries features supported by

other side– REGISTER: register with location service

• Responses– 1xx Intermediate results

e.g. 180 Ringing– 2xx Successful Responses

e.g. 200 OK– 3xx Redirections

e.g. 302 Moved Temporarily– 4xx Request Failures– 5xx Server Failures– 6xx Global Errors

Page 43 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP Addressing and header formatAddressing:• Addresses specified SIP URL, in the format: user@host. • Examples of SIP URLs:

• sip:hostname@vovida.org• sip:hostname@192.168.10.1• sip:14083831088@vovida.org

INVITE sip:5120@192.168.36.180 SIP/2.0Via: SIP/2.0/UDP 192.168.6.21:5060From: sip:5121@192.168.6.21To: <sip:5120@192.168.36.180>Call-ID: c2943000-e0563-2a1ce-2e323931@192.168.6.21CSeq: 100 INVITEExpires: 180User-Agent: Cisco IP Phone/ Rev. 1/ SIP enabledAccept: application/sdpContact: sip:5121@192.168.6.21:5060Content-Type: application/sdp

• Example: SIP Header

Page 44 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP: Architecture & Entities

• User agent: An application program which initiates SIP requests (User agent client) and also acts upon (accepts, rejects or re-directs) incoming SIP requests (User agent server)

• Location server provides SIP redirect or proxy servers information about a callee's possible location(s).

• Proxy server takes requests on behalf other user agents or servers and forwards them to the next hop.

• Redirect server accepts a SIP request, maps the address into zero or more new addresses and returns these addresses to the client. Unlike a proxy server, it does not initiate its own SIP request.

• Registrar is a server that accepts REGISTER requests. A registrar is typically co-located with a proxy or redirect server and may offer location services.

Redirect Server

Location Server

Registrar Server

User Agent Proxy ServerProxy Server User Agent

Page 45 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP Call Signalling: Example

302 (Moved Temporarily)

INVITE

200 (OK)200 (OK)

ACK

INVITE180 (Ringing)180 (Ringing)180 (Ringing)

200 (OK)ACKACK ACK

RTP MEDIA PATH

BYEBYE BYE200 (OK)200 (OK) 200 (OK)

Call Teardown

MediaPath

Call Setup

INVITELocation/Redirect ServerProxy Server Proxy Server User AgentUser Agent

INVITE

Page 46 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP: Separation of signalling and data

• Route of SIP messages (proxy chain) different than media stream route:

Potential Problems with Firewalls & NATs

Page 47 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP: additional topics

Not touched in this lecture, see IETF SIP WG:• Multitude of SIP extensions: new methods (e.g. instant messages)• SIP over NAT/FW• Authentication and security aspects• Support of location based services• Discovery of SIP entities (e.g. DNS SRV records)• Service Discovery (e.g. SLP)• Reliability aspects of SIP-based call control

Page 48 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP

IMS:Network Entities and Protocols

IM SubsystemApplicationsand

ServicesMultimedia

IPNetworks

CS Domain-or-

PSTN-or-

Legacy-or-

External

PS Domain

HSS

R-SGW

CSCF

CSCF

GGSN

MRF-CSCP

MGCF

MGW

SGSN

Cx

Sh

Sc

Gr

Mm

Mw

Mc

Gc

Mg

Gn

BGCF

T-SGW

BGCFMi

GoGm

SLF

Dx

AS

AlternativeAccess Networks

„Gi-Cloud“

PCF

OSA-SCS

IM-SSF

MRF-PMp

Sr

ISC

SIP

SIP

?

?

Diam

eter

H248

SIP

H248

COPS

TCP/IP/UDP/RTP/…

SIP

?

MAP

CAP SIP

SIP

Mj

SIP TCP UDP

HTTP Others

? ?

SIP

?

R-SGW

CAP

OSA

UEUTRAN

MT TEUu IuR

GERAN

Mr

SIP Mk

Page 49 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Network Entities

• CSCF (Call State/Service Control Function)• PDF (Policy Decision Function)• HSS (Home Subscriber Service)• SLF (Subscription Locator Function)• MRF (Multimedia Resource Function)• BGCF (Breakout Gateway Control Function)• MGCF (Median Gateway Control Function)• MGW (Media Gateway)• T-SGW (Transport Signaling Gateway)• R-SGW (Roaming Signaling Gateway)• AS (Application Server)• SCP (Service Content Provider)• IM-SSF (Service Switching Function)• OSA-SCS (Service Capability Server)

Additionally:- Charging Entities- Security Entities- Lawful Interception- Firewalls- DNS, DHCP, TRIP, …- QoS Entities- OAM and NM- …

Page 50 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

IMS: Important Network ElementsHSS : Home Subscriber ServiceDatabase for subscriber related information• Identification (SIP, Mail, E.164, Label, IMSI, ...)• Location management (P-CSCF, S-CSCF, IP address)• List of authorized services, List of subscribed services• Quintuplets for Security

Proxy Call State Control Function (P-CSCF)First contact point of an operator‘s network (for the mobile terminal)• Forwarding of SIP messages between terminal and core network• Generation of charging records• Translation of IDs other than SIP URIs into SIP URIs

(e.g. E.164 numbers)• Termination of confidentiality and integrity, Lawful interception• Authorisation of bearer resources and QoS management• Detection of emergency calls and selection of a emergency S-CSCF• Translation of SIP URIs for local services• SIP header compression

Page 51 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

IMS: Important Network Elements (cntd.)Interrogating Call State Control Function (I-CSCF)First contact point of an operator‘s network (for other operators)• Forwarding of SIP messages (proxy functionality)• Assignment of a S-CSCF

– during registration and during invite (for services for not registered subscribers)• Generation of charging records• Hiding of internal network configuration/capacity/topology

Serving Call State Control Function (S-CSCF)Performs session control and service triggering• Acts as a registrar according to RFC2543• May behave as a Proxy Server as defined in RFC2543, i.e. it accepts requests and services

them internally or forwards them on, possibly after translation.• May behave as a User Agent as defined in RFC2543, i.e. it may terminate and

independently generate SIP transactions.• Interaction with service platform(s), provides endpoints with service event related information • Authentication (based on quintuplets from HSS), Generation of charging records

Page 52 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Levels of Registration

UE xGSNVisited Network Home Network

UMSCSCFDHCP AS

HLR

Bearer Level

IM Subsystem

Application?

DHCP

CSCF HSS

Page 53 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Registration in a Roaming ScenarioHome Network of MS B

Network visited by MS B

MS B

P-CSCF-B

S-CSCF-B

2

1

Home Network of MS A

Network visited by MS A

MS A

P-CSCF-A

S-CSCF-A

REGI

STER

I-CSCF-A

HSS-A User Profile

1

2

4

5

REGI

STER

I-CSCF-A4

HSS-AUser Profile5

Page 54 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Routing of Mobile-To-Mobile CallsHome Network of MS A

Network visited by MS A

Home Network of MS B

Network visited by MS B

MS A MS B

P-CSCF-A

I-CSCF-B

P-CSCF-B

HSS-B

S-CSCF-A S-CSCF-B

REGI

STER

User Profile

1 2

345

6

7

INVI

TE

Call C

ontro

l

REGI

STER

I-CSCF-A

HSS-A User Profile

Page 55 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP in IMS• Mandatory existence of P-CSCF as first point of contact• Network initiated call release (e.g. due to missing coverage or administrative reasons)

– Proxies are able to send BYE• Network Control of Media Types

– P/S-CSCF checks the SDP in the SIP body– If SDP contains invalid parameters (e.g. not supported codecs), P/S-CSCF rejects the SIP

request by sending a 488 (“not acceptable here”) response that contains a SDP body indicating parameters that would be acceptable by the network

• Network Hiding (Encryption of Route and Via Headers)• Additional Signaling Information

– For example Cell-ID, Mobile Network/Country Code, Charging-IDs – Information transported P-header based solution

• Compression– SIP Compression is mandatory as radio interface is a scarce resource– Compression / decompression of SIP will be performed by the UE and the P-CSCF

• Authentication & Integrity protection– S-CSCF performs the Authentication using AKA – P-CSCF checks the integrity of messages received via the air interface via IPsec ESP

Page 56 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

QoS in IMS (linking SIP level and PDP contexts)

Page 57 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

QoS: Secondary PDP context

Source: 3GPP: TS 29.208

UE PDF SGSN GGSN

2. Activate PDP Req.

3. Create PDP Req.

9. Create PDP Res.

10. Activate PDP Acc.

4. COPS REQ

6. COPS DEC

8. COPS RPT

1. Mapping ofSDP parametersinto UMTS QoS

5. Process authorization

request

7. PolicyEnforcement

Page 58 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

QoS control – multiple levels• UMTS QoS --- PDP contexts• IP QoS (e.g., DiffServ)

– IP transport between SGSN & GGSN (Gn interface)– IP transport in external network (Gi interface)

• End-to-end SIP Signalling

Page 59 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Security: Overview of UMTS Mechanisms (R5)

• Mutual Authentication (UE--SGSN): UMTS AKA• Encryption on air interface (data and signalling, UE--RNC)• Integrity protection of signalling data on the air-interface• Network protection (secure topologies, firewalls, etc.) up to operator• Integrity protection and encryption of signalling traffic on external

interfaces (Gp, Gi) via IPsec tunnels (ESP)• Additional security mechanisms for IMS

– Authentication IMS AKA– Integrity Protection for SIP messages (UE—P-CSCF)

Page 60 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS Air interface: Integrity ProtectionCOUNT-I

MESSAGE

DIRECTION

FRESH

Integrity Function f9Integrity Key IK

Integrity Function f9 XMAC-I

SENDER(UE or RNC)

RECEIVER(UE or RNC)

Integrity Key IK

MAC-I

COUNT-I

MESSAGE

DIRECTION

FRESH

MESSAGE

MAC-IAir Interface

MAC-I = XMAC-I ?

Page 61 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS Air interface: EncryptionCOUNT-C

BEARER

DIRECTION

LENGTH

Ciphering function f8Cipher Key CK

KEYSTREAM BLOCK

COUNT-C

BEARER

DIRECTION

LENGTH

Ciphering function f8Cipher Key CK

KEYSTREAM BLOCK

PLAINTEXTBLOCK

PLAINTEXTBLOCK

CIPHERTEXTBLOCK

SENDER(UE or RNC)

RECEIVER(UE or RNC)

Air Interface

Page 62 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS authentication and key agreement -security properties

• Assurance of key freshness to the user

• Entity authentication of the network to the user

• Establishment of a 128 bit cipher key CK

• Establishment of a 128 bit integrity key IK

• Provision of a means to exchange authenticated information between Authentication Centre and USIM for management purposes

Page 63 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS Authentication and Key Agreement (AKA)

• Based on long-term pre-shared key K on USIM and in HLR/AuC • Authentication vector: Quintuplet (random number RAND, expected response

XRES=f2(K,RAND), cipher key CK, integrity key IK, authentication token AUTN) generated in HLR/AuC using a sequence number SQN, RAND, and K

• VLR/SGSN downloads authentication vectors from HLR/AuC during Attach

MS

User Authentication Request(RAND,AUTN)

User Authentication Response (Res)

VLR/SGSN

RES = XRES?

verify AUTNcompute RES

select CK IK Compute CK, IK

VLR / SGSN

Authentication Data Request

Authentication Data Response (AV 1..n)

store AV‘s

HLR/AuC

Page 64 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

UMTS AKA: Message flow during Attach

UE Node B RNC SGSN/VLR

HLR/ AuC

1. RRC Connection Request

2. RRC Connection Setup

3. RRC Connection Setup Complete

RRC Connection Setup

4. NAS: Attach Request

5. NAS: User Identity Request

6. NAS: User Identity Response

Start of GPRS Attach Procedure

7. MAP: Authentication Data Request

8. MAP: Authentication Data Response

9. Storage of Authentication Vectors

Distribution of Authentication Vectors

UE Node B RNCSGSN/VLR

HLR/AuC

10. Selection of the oldest AV

11. NAS: User Authentication Request

12. Verification of Authentication Token.

13. Compute RES

14. Store KSI

15. NAS: User Authentication Response

16. RES = XRES?

17. Compute Cipher and Integrity Key

18. Select Cipher and Integrity Key

Authentication and Key Establishment

19. Decide allowed Integrity & Encryption Algorithms

20. RANAP: Security Mode Command

21. Reset START value to zero

22. Select UIA and UEA

Security Mode Setup Procedure

continues at next page

UE Node B RNC SGSN /VLR

HLR/ AuC

23. Generate FRESH value

24. Start Integrity Protection

25. RRC: Security Mode Command

26. Check UE Security Capabilities

27. Verify Message Integrity

28. Start Integrity Protection

29. RRC: Security Mode Complete

30. Verify Integrity of the Message

31. RANAP: Security Mode Complete

32.Start Ciphering 32.Start Ciphering

Security Mode Setup Procedure

Continuation from previous page

Page 65 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

IM Core Network Subsystem

IMS Security Architecture

HSS

I-CSCF S-CSCF

Home / Serving Network

P-CSCF

Visited / Home Network

ISIM

UA

UE

Mutualauthentication

IMS AKA

IPSec:IntegrityProtection

IPSec: Confidentiality and Integrity Protection

IPSec: Confidentiality and Integrity Protection

Page 66 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Security features for the IMS• Mutual authentication and key agreement between UE

and home network

• Integrity protection between UE and first-hop SIP proxy (P-CSCF)(in later UMTS releases confidentiality protection is likely to be provided in addition)

• IPsec tunnels between IMS network nodes (core network signalling security)

Page 67 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

IMS authentication message flow (simplified)

SIP Register

Visited Network Home Network

P-CSCF

Register

UE I-CSCF HSS S-CSCF

Register

401 Unauthorised RAND||AUTN

Cx-AuthDataReq

Register RES

Cx-AuthDataResp RAND||AUTN||XRES||IK||CK

401 Unauthorised RAND||AUTN||IK(||CK)

Register RES

401 Unauthorised RAND||AUTN||IK||CK

Authentication

Register RES

OK OK OK

Authentication

Page 68 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Content1. Introduction/Motivation

• Cellular Concepts, Layering Models2. Cellular Network Evolution

• GSM, GPRS, UMTS: Architecture, air interface, and protocols

• IP connectivity and IP transport3. IP-based multimedia subsystem (IMS)

• Session Initiation Protocol (SIP)• IMS architecture• Cross-Layer Aspects: Quality of Service and

Security4. Mobility support mechanisms

• L2 mobility support, Network Layer (MIP)• Transport Layer Mobility, Session Layer

Mobility (SIP)• Intermediate (L3.5 solution): Host Identity

Protocol (HIP)• Mobility support on which layer?

5. Summary and outlook• Personal Area Networks and

Personal Networks• Heterogeneous access

networks

Page 69 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Background: Mobility types

Assumption in this lecture: Infrastructure networks (only first hop wireless)

Different Levels of Mobility:• Pico (e.g. within same radio cell)• Micro (e.g. within same subnet)• Macro (e.g. across subnets but within same administrative domain)• Global (e.g. across different administrative domains)

D Internet

GPRS

NetworkCellular access(GPRS)

RouterSwitchWLAN AP

WLAN AP

WLAN AP

WLAN AP

Router

Router

Router

Router

’Alternative’ classification:

• vertical mobility: changing access technology

Mobile Host

Page 70 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Background II: Handover & more mobility typesHand-over classification:• Mobile initiated or network-initiated• Backward or forward• mobile controlled or network controlled• Mobile-assisted or network assisted or unassisted• Proactive or reactive• Make-before-break or break-before make• Soft or hard• fast (without ‚noticable‘ delay)• smooth (no loss of data) • seamless = fast + smooth

More mobility types ...• Host Mobility • User Mobility • Application Mobility• Network Mobility

... and related identifiers• IP address, hostname (DNS)• User-name (e.g. SIP URL)• ---• address prefix / subnetmask

Page 71 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Link-Layer Hand-over: Measurements 802.11b

Scenario• Hard Handover in 802.11b• Both APs use same SSID • HO initiated by pulling cable

from AP1 (’Istanbul’)

Source: Master Thesis, Rui Martins

Page 72 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Measurements II: Hard Hand-over

Page 73 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Measurements III: Soft Hand-over Scenario

Page 74 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Measurements IV: Soft Handover Results

Page 75 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Problem: IP address identifies host as well as topological locationReason: IP Routing:

– Routes selected based on IP destination address– network prefix (e.g. 129.13.42) determines physical subnet– change of physical subnet change of IP address to have a topological correct address

• Solution? Host-based routing: Specific routes to each host– Handover change of all routing table entries in each (!) router– Scalability & performance problem

• Solution? Obtain new IP-address at hand-over– Problem: how to identify host after handover? DNS update performance/scalability problem– Higher protocol layers (TCP/UDP/application) need to ‘handle’ changing IP address

Development of mobile IP

Mobile IP Motivation: Host mobility & Routing

Subnet A

Subnet BIP networkMobile Node

Page 76 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Mobile IP: Principles & Terminology

Underlying Approach: separate host identifier and location identifier maintain multiple IP addresses for mobile host

Terminology:• Mobile Node (MN) with fixed IP address IP1 (home address)• Home Network: subnet that contains IP1 • Home Agent (HA): node in home network, responsible for packet forwarding to MN• Visited Network: new subnet after roaming / handover• Care-of Address (CoA): temporary IP address within visited network• Foreign Agent (FA): node in visited network, responsible for packet forwarding to CoA

Home network

Visited network

IP networkMobile Node

Home Address IP1

HA

FA Home Address IP1

Care of Address: CoA1Correspondent Node

Page 77 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Home Network

Mobile IP: Tunneling &Triangle Routing

CN sends packets to the MN using its Home Address IP1 HA tunnels them to FA, using CoA1; FA forwards them to MNMN sends packets back to the CN using IP2 (without any tunneling)Home Agent needs to contain mapping of care-of address to home address (location register)

Mobile NodeIP1, CoA1

Home Agent Subnet

Correspondent Node (CN)IP2

Visited Network

FA

←IP1

CoA1→

IP2 →

Source: Mobile IPv4 illustrated

Page 78 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Mobile IP: TunnelingDefault encapsulation:

• IP-within-IP (RFC2003)

Other Approaches:

• Minimal encapsulation (RFC2004)

• Generic Routing Encapsulation (GRE) (RFC1702)

IP-within-IP encapsulation

Page 79 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Mobile IP: Agent Discovery & Registration

• Mobile Node finds out about FA through Agent Advertisements– FAs broadcast Advertisements in periodic intervals– Advertisements can be triggered by an Agent Solicitation from the MN

• Care of Address of the MN is determined, either– Dynamically, e.g. using Dynamic Host Configuration Protocol (DHCP)– Or: use IP address of FA as CoA

• MN registers at FA and HA: Registration Request & Reply– MN signals COA to the HA via the FA– HA acknowledges via FA to MN

• Registration with old FA simply expires (limited life-time, soft-state)

FAHA MN

[Agent Solicitation] (opt.)Agent Advertisement

Registration Request

Registration Reply Time

Obtain c/o address

Page 80 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

type = 16R: registration requiredB: busy, no more registrationsH: home agentF: foreign agentM: minimal encapsulationG: GRE encapsulationr: =0, ignored (former Van Jacobson compression)T: FA supports reverse tunnelingreserved: =0, ignored

MIP messages:Agent advertisement

preference level 1router address 1

#addressestype

addr. size lifetimechecksum

COA 1COA 2

type = 16 sequence numberlength

0 7 8 15 16 312423code

preference level 2router address 2

. . .

registration lifetime

. . .

R B H F M G r reservedT

Procedure:

• HA and FA periodically broadcast advertisement messages into their subnets

• MN listens to these messages and detects, if it is in the home or a (new?) foreign network

• when new foreign network: MN reads a COA from the advertisement (opt.)

ICMP Router Discovery extension:

Page 81 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

MIP messages: registration request & reply

home agenthome address

type = 1 lifetime0 7 8 15 16 312423

T x

identification

COA

extensions . . .

S B D MG rS: simultaneous bindingsB: broadcast datagramsD: decapsulation by MNM mininal encapsulationG: GRE encapsulationr: =0, ignoredT: reverse tunneling requestedx: =0, ignored

Registration Request (via UDP)

home agenthome address

type = 3 lifetime0 7 8 15 16 31

code

identification

extensions . . .

Registration Reply (UDP)

Example codes:registration successful• 0 registration accepted• 1 registration accepted, but simultaneous mobility bindings unsupportedregistration denied by FA•65 administratively prohibited•66 insufficient resources•67 mobile node failed authentication

•68 home agent failed authentication•69 requested Lifetime too longregistration denied by HA•129 administratively prohibited•131 mobile node failed authentication•133 registration Identification mismatch•135 too many simultaneous mobility bindings

Page 82 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Transport Layer ProtocolsGoal: data transfer between application (processes) in end-systems

• support of multiplexing/de-multiplexing e.g. socket API

data stream/connection identified by:two IP addresses, protocol number, two port numbers

Page 83 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Overview: Transport Protocols

• User Datagram Protocol UDP (RFC 768)– Connectionless– Unreliable– No flow/congestion control

• Transmission Control Protocol TCP (RFC 793, 1122, 1323, 2018, 2581)– Connection-oriented (full duplex)– Reliable, in-order byte-stream delivery– Flow/congestion control

• Stream Control Transport Protocol SCTP (see later)• Real-Time Transport Protocol RTP

– Uses UDP– Provides: Time-stamps, sequence numbers– Supports: codecs, codec translation, mixing of multi-media streams

Page 84 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Streaming Control Transmission Protocol (SCTP)

• Defined in RFC2960 (see also RFC 3257, 3286)• Purpose initially: Signalling Transport• Features

– Reliable, full-duplex unicast transport (performs retransmissions)– TCP-friendly flow control (+ many other features of TCP)– Multi-streaming, in sequence delivery within streams

Avoid head of line blocking (performance issue)– Multi-homing: hosts with multiple IP addresses, path monitoring (heart-beat mechanism),

transparent failover to secondary paths• Useful for provisioning of network reliability

Host A Host BIPa1

IPa2 IPb2

IPb1

Separate Networks

SCTP Association

Page 85 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Transport Layer Handover in SCTP

1. MN communicates with CN via established SCTP association (From IP1 to IP CN)

2. When MN comes in Range of AP B• MN obtains new IP address IP2• MN adds IP2 to the existing SCTP association

Address configuration Change (ASCONF) Chunk

3. When connection should be transferred to new AP B• MN sets primary address to IP2• MN deletes old IP1 from SCTP association (ASCONF

chunk)

IP1

IP 2

Correspondent Node

AP A

AP B

Page 86 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SCTP Mobility support: Discussion• SCTP Handover transparent for network

– No additional network infrastructure needed– Possible use-case: switch to peer-to-peer mode without network support

• avoids tunneling and tri-angular routing

• Endpoints need to support SCTP (with dynamic control of IP addresses)• Signalling to every correspondent node necessary (for every established SCTP

association) for high number of parallel connections, large signalling volume over air interface

• Dynamic Naming Service for connection set-up from CN required (to establish the initial SCTP association)– Dynamic DNS– Other location mechanisms (e.g. based on SIP URLs)

• Only usable for traffic without real-time requirements (due to SCTP flow/congestion control)– but similar approaches, e.g. for RTP, possible

• Simultaneous Handover (Mobile Node and Correspondent Node) can lead to loss of connection

Page 87 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

SIP: Mobility support

User/Session/Application Mobility (change of terminal)

• Registration via SIP ‘REGISTER’• Initial connection set-up between MN1 and CN

through ‘INVITE’• mid-session mobility (application mobility): call

transfer, SIP method ‘REFER’ (RFC3515) • Application state could be contained in the message body

(‘proprietary’ extension)

Host Mobility (change of IP address)• Pre-call: re-register, routing of ‘INVITE’ based on SIP-

URL• mid-call: re-invite

MN1

MN2

MN2

MN1

CN

Page 88 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Host Identity Protocol (HIP)• IETF drafts, see http://www.ietf.org/html.charters/hip-charter.html• Underlying ideas for mobility support

– Separate host identifier (HI, ‘name’) and locator (‘IP address’)– Dynamic name service or rendezvous server for pre-session mobility– Update of mapping of host identifier locator at handovers– Mechanism works between transport

and network layer• In combination with security

– Host Identity Name space based on public keys

– Hash of HI 128bit Host Identity Tag attached to packets

– 4-packet basic exchange (cookies, Diffie-Hellman Key Exchange)

Page 89 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Host Identity / Host identifier

• Host Identity in HIP is a public asymmetric key pair.– RSA– DSA– Possible others

• Host Identifier (HI) is the public key which is used to refer the Host Identity.– Statically globally unique.– Used for host authentication.– Variable length (Depending on cryptographic algorithm).

• Host Identity Tag (HIT)– is a fixed length (128 or 64 bit) representation of a Host Identifier– Can be used as IPv6 address– Goal: low collision probability

Page 90 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

HIP Base exchange

• Beginning of a HIP connection• Consists of a 4-way handshake.• Involves :

– Host authentication– IPsec encryption key exchange

(Diffie-Hellman)– DoS prevention via first handshake

• After Base exchange: only ‘normal’ IPsec packets

• Mobility support via ‘re-direction of Ipsec associations’

Page 91 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Cross-layer aspects of mobility support• Mobility support is not only about connectivity

– Inter-linked with security (authentication, access control/filtering)– Inter-linked with QoS support– Inter-linked with service control

• Example IMS scenario– SIP level (P-CSCF) has responsibility

for service-control, QoS control and access control/filter configuration

– Mobility support mechanisms must not be transparent to SIP levelcross-layer approaches required if lower-layer mobility mechanisms deployed

Page 92 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Summary1. Introduction/Motivation

• Cellular Concepts, Layering Models2. Cellular Network Evolution

• GSM, GPRS, UMTS: Architecture, air interface, and protocols

• IP connectivity and IP transport3. IP-based multimedia subsystem (IMS)

• Session Initiation Protocol (SIP)• IMS architecture• Cross-Layer Aspects: Quality of Service and

Security4. Mobility support mechanisms

• L2 mobility support, Network Layer (MIP)• Transport Layer Mobility, Session Layer

Mobility (SIP)• Intermediate (L3.5 solution): Host Identity

Protocol (HIP)• Mobility support on which layer?

5. Summary and outlook• Personal Area Networks and

Personal Networks• Heterogeneous access

networks

Page 93 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

References• C. Perkins: ’Mobile IP: Design Principles and Practices.’ Addison-Wesley, 1998. • IETF Working groups (see also for RFCs and drafts):

– Mobile IP: http://www.ietf.org/html.charters/mobileip-charter.html– IPsec: http://www.ietf.org/html.charters/ipsec-charter.html– IPv6: http://www.ietf.org/html.charters/ipv6-charter.html– Others: nemo, mip4, dhcp, seamoby

• J. Schiller: ’Mobile Communications’. Addison-Wesley, 2000.• A. Festag, ‘Mobile Internet II, Overview of current mobility approaches’ (lecture material). TU Berlin,

2002.• Seok Joo Koh, ‘mSCTP: Use of SCTP for IP Mobility Support’, Presentation, IT Forum, Korea, 2003• H. Schulzrinne, E. Wedlund, ‘Application-Layer Mobility Using SIP’. Mobile Computing and

Communications Review, Vol. 1, No. 2 • K. Boman, G. Horn, P. Howard, V. Niemi: “UMTS security“, IEE Electronics & Communication

Engineering Journal (ECEJ), special issue on 'Security for telecommunications‘ (2002)• G. Horn, D. Kröselberg,K. Müller: “Security for IP multimedia services in the 3GPP third generation

mobile system”, Proceedings of INC 2002, Third International Network Conference, Plymouth, July 2002.

3GPP specifications can be found under http://www.3gpp.org/.• 3GPP TS 33.102: ‘Security architecture’

Page 94 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Acknowledgements• Lecture notes: Mobile Communciations, Jochen Schiller,

www.jochenschiller.de• Tutorial: IP Technology in 3rd Generation mobile networks,

Siemens AG (J. Kross, L. Smith, H. Schwefel)• Tutorial: Voice over IP Protocols – An Overview, www.vovida.org• Various 3GPP slide-sets• Siemens ICM N PG U SE and Siemens CT IC 3

• Student work AAU– Rui Martins (Master Thesis)– Lars Roost, Per Toft, Gustav Haraldson (Semester project)

• Lecture notes: Wireless communication protocols (R. Prasad, TKM)

Page 95 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

PAN

CAN

BBT

BT

BT

BT

You

Br

VD

aT

VD

aT

YouYouMe

aT

B aTBr

BRo/Br

aT

B aTBr

BThird Party

Ro/Br

aT

Br : BridgeRo : Router

Network Architectures beyond cellular networks

Personal Area Networks (PANs)• Devices attached to or in vicinity of person

group mobility models• Wireless communication

• Between devices within PAN• To infrastructure networks• Between two PANs

Wireless multi-hop communication

Impact of wireless multi-hop• Mutual interference• MAC protocol deficiencies• Need for modified routing (ad-hoc domain)

[see http:/www.imec.be/pacwoman]

Page 96 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Personal Networks– Logical networks, defined by appropriate security associations– Potential huge geographical/topological span– Consisting of ad-hoc and infrastructure networks– User centric (PAN as central entity)

Core PAN

Home network

Corporatenetwork

Interconnecting structure(Internet, UMTS, WLAN, Ad Hoc, etc.)

Vehicular area network

PAN

Smart building

Personal Network Remote personal devices

Local foreign devices

Remote foreign devices

Extensions of the PAN concept

[see http:/www.ist-magnet.org/]

Page 97 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Health Scenario

Patient’s PAN

Home Network

Hospital Network

InternetHome Agent

AN

AN

AN

Private Network

AN - Active Node (Active Router + Server)

HospitalServices

PatientRecords

Doctor’s PAN

Patient moves home Patient’s PAN

Content server- entertainment- insurance company- etc.

Recoveringpatient at home

Page 98 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Outlook: Future wireless networksServices andapplications

IP based core network

IMT-2000UMTS

WLANtype

cellularGSM

short rangeconnectivity

WirelinexDSL

otherentities

DABDVB

New radiointerface

Properties of future networks (‘4G’):• Heterogeneous access

technologies – 802.11, Bluetooth, cellular, etc.

• IP-based core network– Mobility support on IP layer

(complemented by higher-layer methods)• Mobile IP one major candidate

• wireless multi-hop connections• Personalization (Personal Area Networks,

Personal Networks)• Reconfigurability (Software Defined Radio)• Context Sensitivity

Page 99 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Comparison of technologiesUTRA 802.11

a b g Bluetooth 802.15.1 .3 .4

Standard Availability

1999 2001 1999 2003 1999 2002 (2004) (2004)

Frequency Band /

Licences

2GHzYes

5 GHz 2.4GHz 2.4GHzNo No No

2.4 GHzNo

2.4 2.4 2.4/.915/.868No No No

Cell Radius 30 m – 20 km 50 - 300 m 0,1 - 10 m 10m...100m

Modulation W/TD-CDMA OFDM DSSS DSSS FHSS FHSS FHSS DSSS

MAC Mechanism

Polling CSMA/CA & Polling Polling Polling Poll. CSMA/CA

MobilitySupport

High (Soft handover)

Limited (802.11f) Limited Limited

QoS Support Reservation Polling (PCF) & Priorities (802.11e, HCF)

SCO SCO enhanced Prio.

Security Encryption (data), Integrity

(Signalling)Encryption and Integrity

(WEP, 11i, 11x)

3 levels: no, link level,

service level

3 levels

Hyperlan1 2

1998 2000

5GHz 5GHzNo No

50 - 300 m

GMSK OFDM

Polling

Limited

Scheduling by AP

56\168 DES Encrypt.

(Data+Sgn)

Data Rates(50-60m dist.)

Max. 2 Mbit/s 54Mb/s 11Mb/s 54Mb/s6Mb/s 2Mb/s 2Mb/s

0.72Mb/s0

20Mb/s 55Mb/s 0.25Mb/s20Mb/s 54Mb/s

NO Yes (but throughput degradation)

Yes (Scatternets)

Yes (Scatternets)Support of multi-hop

dynamic Sleep mode Sleep Mode Sleep ModeSleep ModePower Management

Yes (but throughput degradation)

Page 100 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

Wireless Networking Trends –Architectures, Protocols & optimizations for future networking scenarios

H. Fathi, J. Figueiras, F. Fitzek, T. Madsen, R. Olsen, P. Popovski, HP Schwefel

• Session 1 Network Evolution & Mobility Support (HPS)

• Session 2 Ad-hoc networking (TKM/FF)

• Session 3 Enabling technologies for ad-hoc NWs (TKM/FF)

• Session 4 Wireless Sensor Networks (PP)

• Session 5 Performance aspects & optimizations (HF/TKM)

• Session 6 Context-sensitive Networking (RLO/JF)

Page 101 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

International Wireless Summit

WSPW Wireless Science Park Workshop

GWSW Global Wireless Start-up Promotion Workshop

TRCW Triangular Research Cooperation Workshop

IE Industrial Exhibition

WPMC International Symposium on Wireless Personal Multimedia Communications

SW Strategy Workshop

WSP Wireless Science Parks

Page 102 Hans Peter SchwefelLife-long learning, Aalborg University, Aug. 2005

8th International Symposium on Wireless Personal Multimedia Communications

September 18-22, 2005 Aalborg Congress & Culture Centre, Denmark

Since 1998 WPMC has become a successful symposium and is now an annual event which has been held in Europe, Asia and USA.

The 8th symposium will address the open challenges to realize

ubiquitous wireless networks seen from a human point of view.

More information www.iws2005.org

top related