Project P810-PF Wireless ATM Access and Advanced Software Techniques for Mobile Networks Architecture Deliverable 4 Principles and Solutions for IP based Mobile Networks Suggested readers: Strategic Planners, Researchers and Consultants Involved in the Development of Advanced Mobile Networks. For full publication November 1999 EURESCOM PARTICIPANTS in Project P810-PF are: BT TELECOM ITALIA S.p.a. Deutsche Telekom AG France Télécom Koninklijke PTT Nederland N.V. Portugal Telecom S.A. This document contains material which is the copyright of certain EURESCOM PARTICIPANTS, and may not be reproduced or copied without permission. All PARTICIPANTS have agreed to full publication of this document. The commercial use of any information contained in this document may require a license from the proprietor of that information. Neither the PARTICIPANTS nor EURESCOM warrant that the information contained in the report is capable of use, or that use of the information is free from risk, and accept no liability for loss or damage suffered by any person using this information. This document has been approved by EURESCOM Board of Governors for distribution to all EURESCOM Shareholders. 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Preface This book will give you quite a wide impression of the techniques that are leading towards the future mobile networks. It also exploits some of the architectures that will form the basis of such evolution. This book aims to blend the traditional cellular networks with emerging IP techniques, following the success that experience both Internet - in terms of users - and cellular networks - in terms of users and revenues. A lot of activities in this area are ongoing; the book will provide you with a knowledge about basic principles and recommendations to face these topics and to understand the technical basis of the emerging solutions. Nevertheless, as you will realise browsing through the following pages, the technical overview and results presented here are addressing issues from a general point of view. Therefore, telecommunications operators will have to go more deeply into these issues, considering their existing network and their own national constraints as well as economic criteria, before making any choice concerning an implementation or a technology to be deployed. 1999 EURESCOM Participants in Project P810-PF page i (xiii) Principles and Solutions for IP based Mobile Networks Deliverable 4 Executive Summary This book is produced by the EURESCOM Project P810. P810 was investigating possible network architectures for future mobile networks with a thorough view on access and core network technologies. Starting from an ATM-centric view and expanding the work on a general IP-centric view on mobile networks, the project presents its final considerations in this book, which wants to provide the technical tools and the evolution vision required in order to drive the future of mobile networks on the IP/cellular network integration path. The evolution (and success) of IP is mainly driven by the vast number of available and upcoming applications and the ongoing integration of multiple applications under a single user interface (e.g. Web browsers), which makes it very attractive for service provision in mobile networks. IP usually assumes very little from the underlying transport platform and copes with heterogeneous underlying technologies. ATM now can be seen as one transport platform solution (with specific advantages) among others. P810 thus formulated its main goals as: To picture the vision of an IP and mobile telecommunication network blend and to provide guidance in how to apply IP solutions to a mobile communications network. The book organisation is presented in the following description. The IP and mobile telecommunication network blend This section provides the rationale of the emerging role of IP and some considerations on the evolution of Mobile networks. Some general scenarios for UMTS evolution are presented, starting from the incoming GPRS network. IP transport for the mobile user This section provides an overview of the GPRS functional architecture, treats Mobile IP as a basis for global mobility across different networks and provides an introduction to local mobility schemes in wireless LANs and to related IP micromobility topics. Real-Time services on IP networks This section discusses topics on how to provide real-time services in IP networks with a focus on queuing and resource reservation techniques as well as IETF proposals for differentiated and integrated services and IP tag-switching techniques. Furthermore, the problem of how to provide IP QoS with mobile terminals is addressed. Service provisioning in an IP based scenario In the first part this section gives an introduction and overview of the Wireless Application Protocol (WAP) and related topics. In the second place selected topics of IP-server based VHE provisioning are dealt with. Integration and interworking with the existing networks This section gives an overview of IP call control and session management techniques based on H.323 and SIP. Additionally, interworking and integration aspects for IP networks and Intelligent Networks (IN) are discussed. In this context the role of user and service profiles is dealt with. The final part of this section then goes into IP interworking with SS7 signalling and gives some details on IP routeing in cellular networks and protocol mapping. page ii (xiii) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Evolution of UMTS towards IP based solutions This conclusive section provides an overview of possible emerging architectures for mobile network based on IP solutions, taking into account GSM/GPRS, UTRAN and wireless LANs accesses. A basic description of the key elements is provided, taking into account networks as well as service features. 1999 EURESCOM Participants in Project P810-PF page iii (xiii) Principles and Solutions for IP based Mobile Networks Deliverable 4 List of Authors Sophie Aveline CNET France Telecom DMR/RMO 38-40 rue du Général Leclerc 92131 Issy-les-Moulineaux, France Guillaume du Roscoat CNET France Telecom DMR/RMO 38-40 rue du Général Leclerc 92131 Issy-les-Moulineaux, France Bernd Bochow GMD-FOKUS Kaiserin-Augusta-Allee 31 D-10589 Berlin, Germany Georg Neureiter T-Nova Deutsche Telekom Innovationsgesellschaft mbH Active Networks & Mobility (T34.3) Goslarer Ufer 35 D-10589 Berlin, Germany Guilhem Ensuque BT Advanced Communications Technology Centre Mobility Futures Unit, B55-131B Adastral Park, Martlesham Heath Ipswich IP5 3RE, United Kingdom Maria Pia Galante CSELT MB/SA Via Reiss Romoli, 274 10148 Torino, Italy Enrico Scarrone CSELT MB/SA Via Reiss Romoli, 274 10148 Torino, Italy page iv (xiii) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Table of Contents Preface ............................................................................................................................ i Executive Summary ....................................................................................................... ii List of Authors .............................................................................................................. iv Table of Contents ........................................................................................................... v Abbreviations and Acronyms ...................................................................................... vii 1 The IP and mobile telecommunication network blend........................................... 1 1.1 The vision .................................................................................................... 1 1.2 What will be UMTS? ................................................................................... 2 1.3 Evolving from GPRS ................................................................................... 3 2 IP transport for the mobile user .............................................................................. 5 2.1 General Packet Radio Service ...................................................................... 5 2.1.1 GPRS reference model .................................................................... 6 2.1.2 GPRS transmission protocol stacks ................................................ 7 2.1.3 Data packet routeing in GPRS ........................................................ 8 2.1.4 Basic procedures for GPRS........................................................... 10 2.1.5 Location Management in GPRS ................................................... 11 2.1.6 Evolution scenario of GPRS towards an IP-based UMTS ............ 12 2.2 Mobile IP for global roaming .................................................................... 15 2.2.1 Generalities ................................................................................... 15 2.2.2 Enhancements to Mobile IPv4 ...................................................... 19 2.2.3 Mobile IPv6 .................................................................................. 20 2.2.4 Mobile IP limitations and potential solutions ............................... 21 2.2.5 Possible use/role of Mobile IP for UMTS .................................... 23 2.3 Registration for mobile terminals considering an IP only based network ...................................................................................................... 27 2.3.1 Radio access authentication and MIP authentication .................... 27 2.3.2 UMTS registration with Mobile IPv4 ........................................... 28 2.3.3 UMTS registration with Mobile IPv6 ........................................... 32 2.3.4 Major constraints for Mobile IP in third generation mobile system ........................................................................................... 33 2.4 Wireless LANs and mobility ..................................................................... 34 2.4.1 Layer 2 mobility support in Wireless LANs ................................. 34 2.4.2 Layer 3 Local Mobility: ‘cellular IP’ ............................................ 38 3 Real-Time services on IP networks...................................................................... 45 3.1 Queuing techniques.................................................................................... 45 3.2 IntServ and RSVP ...................................................................................... 46 3.2.1 RSVP messages ............................................................................ 46 3.2.2 RSVP issues and limits ................................................................. 47 3.2.3 Towards a layered architecture ..................................................... 47 3.3 DiffServ ..................................................................................................... 47 3.4 ATM .......................................................................................................... 49 3.5 MPLS ......................................................................................................... 49 3.6 Complete architecture to manage QoS in IP networks .............................. 50 3.7 Guarantee of QoS with mobile terminals................................................... 50 3.7.1 Difficulties due to the mobility of IP terminals ............................ 50 3.7.2 Solutions for IP terminals ............................................................. 51 1999 EURESCOM Participants in Project P810-PF page v (xiii) Principles and Solutions for IP based Mobile Networks 3.7.3 Deliverable 4 Combining UMTS - IP .................................................................. 52 4 Service provisioning in an IP based scenario ....................................................... 53 4.1 Wireless Application Protocol: Internet applications for mobile users ...... 53 4.1.1 Why WAP? ................................................................................... 53 4.1.2 The WAP model ............................................................................ 54 4.1.3 The WAP architecture ................................................................... 55 4.2 Server-based VHE ...................................................................................... 57 4.2.1 IP-based VHE service provisioning .............................................. 58 5 Key elements for integration ................................................................................ 60 5.1 Call Control aspects ................................................................................... 60 5.1.1 Basic IP Call Management ............................................................ 60 5.1.2 H.323 call control .......................................................................... 62 5.1.3 SIP call control .............................................................................. 63 5.1.4 Gateway architecture ..................................................................... 65 5.1.5 IP call management in UMTS ....................................................... 66 5.2 Mobility Management integration/interworking ........................................ 68 5.2.1 Architectural Options .................................................................... 68 5.2.2 Architectural Proposals ................................................................. 70 5.3 Sharing user profiles................................................................................... 73 5.3.1 From service profiles to user profiles ............................................ 74 5.3.2 Subscriber profiles ......................................................................... 76 5.3.3 Subscriber profiles in a hybrid CO/CL environment..................... 76 5.4 IN integration/interworking........................................................................ 77 5.4.1 Network architecture ..................................................................... 77 5.4.2 CO/CL-interworking based on Intelligent Peripheral ................... 78 5.4.3 Service logic interworking ............................................................ 80 5.4.4 Mobile terminal access to IN services in the hybrid CO/CL scenario.......................................................................................... 82 5.4.5 IN service logic in the TIPHON environment ............................... 84 5.5 SS7 integration with IP networks ............................................................... 85 5.5.1 General information about IP routing protocols ............................ 86 5.5.2 Cellular networks: OSPF and BGP as signalling transport network .......................................................................................... 89 5.5.3 Protocol mapping .......................................................................... 92 5.5.4 SS7 on IP? ..................................................................................... 94 6 Evolution of UMTS towards IP based solutions .................................................. 95 6.1 Evolution scenarios .................................................................................... 95 6.2 Key networks components and features ..................................................... 98 References .................................................................................................................. 103 page vi (xiii) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Abbreviations and Acronyms 3G Third Generation 3G.IP 3G.IP focus group 3GPP Third Generation Partnership Project AAA Authorisation Authentication & Accounting AAL ATM Adaptation Layer AAL2 AAL type 2 ABR Area Border Router ADSL Asymmetric Digital Subscriber Line ARP Address Resolution Protocol AS Autonomous System ASBR Autonomous System Border Router ATM Asynchronous Transfer Mode BGP Border Gateway Protocol B-INAP Broadband-INAP B-ISDN Broadband Integrated Services Digital Network BRAN Broadband Radio Access Network BS Base Station BSC Base Station Controller BSS Base Station System BSSAP Base Station System Application Part BSSGP Base Station System GPRS Protocol BTS Base Transceiver Station CAC Call Admission Control CAMEL Customised Application for Mobile network Enhanced Logic CAP CAMEL Application Part CBT Core Based Tree CC/PP Composite Capability/Preference Profiles CDMA Code Division Multiple Access CL ConnectionLess CN Core Network CO Connection Oriented CoA Care-of-Address CORBA Common Object Request Broker Architecture CPU Central Processing Unit 1999 EURESCOM Participants in Project P810-PF page vii (xiii) Principles and Solutions for IP based Mobile Networks Deliverable 4 CS Capability Set CSCF Call State Control Function CSE CAMEL Service Environment DAB Digital Audio Broadcasting DHCP Dynamic Host Configuration Protocol DLC Digital Link Control DNS Domain Name Service DS Differentiated Service DSCP Differentiated Service Code Point DVMRP Distance Vector Multicast Routing Protocol EDGE Enhanced Data rate for the Gsm Evolution EGP Exterior Gateway Protocol ESP (IP) Encapsulating Security Payload ETSI European Telecommunications Standards Institute FA Foreign Agent FH Frequency Hopping FIFO First In First Out GGSN Gateway GPRS Support Node GPRS General Packet Radio Service GPS Generalised Processor Sharing GRE Generic Record Incapsulation GSM Global System for Mobile Communication GSN GPRS Support Node GSTN General Switched Telephone Network GTP GPRS Tunnelling Protocol HA Home Agent HAWAII Handoff-Aware Wireless Access Internet Infrastructure HDAA Home Domain Allocation Agency Hiperlan High Performance Radio Local Area Network HLR Home Location Register HTML HyperText Markup Language HTTP HyperText Transfer Protocol IAPP Inter Access Point Protocol ICMP Internet Control Message Protocol IEEE Institute for Electrical and Electronics Engineering IETF Internet Engineering Task Force page viii (xiii) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks IESG Internet Engineering Steering Group IGSN Internet GPRS Support Node IMSI International Mobile Subscriber Identity IMT International Mobile Telecommunication IN Intelligent Network INAP IN Application Protocol IP Internet Protocol IP Intelligent Peripheral IPCP Internet Protocol Control Protocol IPsec Internet Protocol Security ISDN Integrated Services Digital Network ISP Internet Service Provider ISUP ISDN-User Part ITU International Telecommunication Union IWF Interworking Function LAN Local Area Network LDAP Lightweight Directory Access Protocol LLC Logical Link Control LSP Label Switched Path LSR Label Switched Router MAC Media Access Control MAP Mobile Application Protocol MCU Multipoint Control Unit ME Mobile Equipment MExE Mobile Station Application Execution Environment MGCP Media Gateway Control Protocol MIP Mobile IP MM Mobility Management MMAC MultiMedia Access Control MN Mobile Node MOSPF Multicast Open Shortest Path First MPLS Multi Protocol Label Switching MS Mobile Station MSC Mobile Switching Centre MSISDN Mobile Station ISDN MT Mobile Terminal 1999 EURESCOM Participants in Project P810-PF page ix (xiii) Principles and Solutions for IP based Mobile Networks MTP2 Message Transfer Part layer 2 MTP3 Message Transfer Part layer 3 NA Network Architecture NAI Network Access Identifier NAS Network Access Server NAS Non Access Stratum NAT Network Address Translation NBAP Node B Application Protocol NO Network Operator NSAP Network Service Access Point NSS Network Sub System OSI Open Systems Interconnection OSPF Open Shortest Path Protocol PCS Personal Communication System PDA Personal Digital Assistant PDN Packet Data Network PDP Packet Data Protocol PDU Protocol Data Unit PGPS Packet GPS PHB Per Hop Behaviour PHS Personal Handyphone System PIM Protocol Independent Multicast PIR Project Internal Result PLMN Public Land Mobile Network PPP Point to Point Protocol PSTN Public Switched Telephone Network PTM Point To Multipoint PTP Point To Point QoS Quality of Service R Router RA Routing Area RAI Routing Area Identity RAN Radio Access Network RANAP Radio Access Network Application Part RARP Reverse Address Resolution Protocol RAS Registration, Admission and Status page x (xiii) Deliverable 4 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks RED Random Early Detection RIO RED In and Out RIP Routing Information Protocol RLC Radio Link Control RNC Radio Network Controller RNS Radio Network System RNS Radio Network Subsystem RNSAP Radio Network Subsystem Application Protocol RRC Radio Resource Control RSVP Resource reSerVation Protocol RTCP Real Time Control Protocol RTP Real Time Protocol SAP Service Access Point SAT SIM Application Toolkit SCCP Signalling Connection Control Part SCCP-SIM Signalling Connection Control Part - SIMulated SCF Signalling Control Function SCP Service Control Point SDF Service Data Function SGSN Serving GPRS Support Node SIM Subscriber Identity Module SIP Session Initiation Protocol SLA Service Level Agreement SLS Sequence Link Selection SMS Short Message Service SMTP Simple Mail Transfer Protocol SNDCP SubNetwork Dependent Convergence Protocol SoHo Small office Home office SPC Signalling Point Code SRF Specialised Resource Function SRNS Serving RNS SS7 Signalling System 7 SSF Service Switching Function SSP Service Switching Point SW Software T/TCP Transaction/Transmission Control Protocol 1999 EURESCOM Participants in Project P810-PF page xi (xiii) Principles and Solutions for IP based Mobile Networks Deliverable 4 TCAP Transaction Capabilities TCP Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TDMA Time Division Multiple Access TIPHON Telecommunications and Internet Protocol Harmonisation Over Networks TOS Type Of Service TPP Third Party Provider TSAP Transport layer Service Access Point UDP User Datagram Protocol UE User Equipment UMTS Universal Mobile Telecommunication System UPT Universal Personal Telephony URI Uniform Resource Identifier URL Uniform Resource Locator USIM User SIM USSD Unstructured Supplementary Service Data UTRAN UMTS Terrestrial Radio Access Network VASF Value Added Service Function VC Virtual Circuit VHE Virtual Home Environment VLR Visiting Location Register VoIP Voice over IP W3C World Wide Web Consortium WAE Wireless Application Environment WAN Wide Area Network WAP Wireless Application Protocol W-CDMA Wideband CDMA WDP Wireless Datagram Protocol WFQ Weighted Fair Queuing WIN Wireless IN W-LAN Wireless LAN WML Wireless Markup Language WRED Weighted RED WSP Wireless Session Protocol WTA Wireless Telephony Application page xii (xiii) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks WTAI Wireless Telephony Application Interface WTLS Wireless Transport Layer Security WTP Wireless Transaction Layer WWW World Wide Web 1999 EURESCOM Participants in Project P810-PF page xiii (xiii) Deliverable 4 1 Principles and Solutions for IP based Mobile Networks The IP and mobile telecommunication network blend It is now nearly certain that IP will be the dominant end-to-end protocol used by a tremendous number of available applications. Moreover, recent developments in IP technology may open up the possibility of efficient transport of real-time multimedia content. This book proposes an evolved architecture that blends the roles of a classic Mobile Operator and Internet Service Provider. In this framework, GPRS (as it is IP-based) could be taken as the starting point of an evolution enabling to bridge the gap between a most-likely GSM-evolved UMTS Release 99 network and the full-blown mobile multimedia vision for UMTS. The ultimate goal is to converge the developments in mobile technologies and IP technologies, taking the best of each. 1.1 The vision Two parallel trends nowadays exist: the explosion of Internet usage with fixed accesses and the explosion of the mobile market (mainly GSM in Europe). Next generation mobile networks aim to provide the possibility of high data rate access with mobile terminals, for example for Internet consultation. The new mobile system is called UMTS (Universal Mobile Telecommunication System) within standardisation bodies. In such a context, the non-exhaustive list below illustrates some examples of areas where convergence or adaptation between classic mobile communications and the IP world could emerge. IP in the end-to-end The Internet protocol suite is becoming a determining element for user data applications, often the only choice available. Emerging mobile systems as UMTS take into account Internet protocols at the user application and transport layers, whereas other emerging technologies as wireless IP or cellular IP extend the use of those protocols to provide mechanisms for mobility management, handover, … Global mobility IP mobility procedures (evolution of Mobile IP and micro-mobility schemes) may provide mobility across data networks and also inside wireless LANs. Classic mobility management schemes will continue to play a central role in the access part and will probably also rely on IP for the transport of signalling messages (UMTS Release 2000). A common server platform to handle transactions In the future, HTTP may incorporate IP call control (e.g. SIP, H.323) to provide the basis of the VHE. A common method for call and session management of multimedia calls and access to supplementary services will evolve from the already well known and broadly accepted Web services towards a unified and portable user interface. IP servers for Supplementary Services Multimedia session control architecture and call processing could provide IN-like services and interworking with classic intelligence. Then, evolving from the current IN architecture, IN services might rely to a greater extent on IP-based 1999 EURESCOM Participants in Project P810-PF page 1 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 servers and services, finally converging to a common service platform to provide all the required service capabilities for the VHE. Quality of Service in large-scale IP networks Since current IP networks are not yet well suited for real-time services, evolution of IP will include novel approaches to allow for service guarantees even in largescale networks. Where today’s IP networks have to be over-dimensioned to a fair amount in order to satisfy the demands of multimedia communications, future IP networks will provide multiple service categories (DiffServ and edge buffering/shaping) and resource reservation (IntServ and RSVP). Real-time GPRS in the access part In the evolution of GPRS towards UMTS, interactive mobile multimedia applications with guaranteed Quality of Service will be supported. In this context, the integration of IP services with guaranteed Quality of Service will make application development to become the major driving force for the success of mobile system provision. 1.2 What will be UMTS? Release 99 of UMTS will be essentially GSM Release 99 (that is with CAMEL and GPRS) with the addition of a UTRAN access network. UTRAN is based on WCDMA and AAL2 switching, the Core Network is an evolution of GSM/GPRS network: voice will be over the GSM core network and data mainly over the IP-based GPRS backbone. This will give higher capacity for the operator and possibly higher bit rates for the end user. However, we can see that this is a very watered-down version of the initial vision for UMTS. Notably, the VHE (common look & feel across networks and automatic customisation of services) will be almost non-existent for data services and very restricted for voice services (CAMEL); and the bit rates offered to the user will be well below the 2Mbps target that was first envisioned. Given the above context, the realisation of the full-blown UMTS vision with full VHE capability, multimedia content and high bit rates on demand seems difficult to achieve in an evolutionary fashion. At the same time, an innovative solution may be too radical a change to be adopted by existing GSM operators in the deployment timescales of UMTS as they would require too big an increment in investment on top of their newly acquired GPRS, CAMEL and UTRAN infrastructures. The other trend that has to be accounted for is the growing importance of IP as possibly sole end-to-end data transport protocol due to the success of applications such as web browsing and email. It seems therefore sensible to draw up a UMTS architecture based on IP and GPRS. This is also the approach followed inside focus groups like 3G.IP 1, that have heavily influenced the requirements for UMTS Release 2000 (R00). First, GPRS is attractive as a starting point for evolution towards UMTS since GSM operators are committed to it but new entrants are on a pal with established operators as the system has not been deployed yet. Second, GPRS is based on IP and is still evolving, offering an opportunity of convergence. Indeed, recent developments in the IETF tend to make possible to 1 It is not a case: some companies and people that have participated to and developed their knowledge in P810 are also deeply involved in 3G.IP. page 2 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks develop an entirely IP-based real-time mobile telephony and multimedia service. Convergence with GPRS should be sought after for acceptance in 3GPP as the UMTS Core Network standard for Release 2000. For high bit rate connectivity and private network coverage, the interworking of this IP/GPRS-based UMTS with wireless LANs (2.4 GHz and 5GHz: IEEE 802.11 and Hiperlan families) should be pursued. Another interesting trend is the emergence of industry standards, aside of the politically-approved standards, such as WAP for web content formatting on wireless links and Bluetooth for short range radio links in the SoHo or Home environment. 1.3 Evolving from GPRS As outlined above, GPRS constitutes an interesting starting point from which to evolve towards UMTS. Incremental evolutionary steps from the current GPRS architecture should enable to achieve the UMTS vision in the planned time scales and provide the opportunity of convergence with the evolution of IP services as standardised in the IETF so that the UMTS operator will blend the roles of ISP and classic GSM/Mobile operator. The following evolutionary steps are foreseen: Greater GPRS flexibility Implementing the optional interfaces between the GPRS nodes (SGSN and GGSN) and the VLR/MSC and HLR will significantly enhance GPRS flexibility. Then, CAMEL interaction with GPRS will allow early value-added services such as packet screening (equivalent to an individual firewall), fraud-control, operatorspecific services such as pre-pay… Support for real-time services Since the aim of this book is to investigate the possibility to have a single UMTS internetworking technology based on IP, real time interactive services such as telephony and videoconferencing will be provided by IP protocols. GPRS has been designed to make optimum use of the radio bandwidth using the characteristics of bursty data. Even with its ‘guaranteed QoS’ features, the support of real time, short delay, services will be unsuitable in GPRS’s current form. Indeed, GPRS currently guarantees only delays in the seconds range. For real-time services such as interactive voice or videoconferencing, end-to-end delay and delay variation have to be constrained in the 100 ms and 10 ms range respectively. In this context, the introduction of a UMTS access network will allow microdiversity functions enhancing handover procedures and delays. At this time, IP protocols do not adapt content of a transmission on the characteristics and variations of the transmission. Consequently, they need specific procedures related to the mobile access and core networks to provide QoS adaptation. Interworking with the PSTN Current analysis shows that IP telephony will not wipe out the standard telephony service overnight. and that bit transport costs are similar in the PSTN and IP domain. Thus, there will be a (growing) demand for seamless interworking between traditional telecommunications networks and IP-based multimedia communications based on IP call control. A framework for PSTN interworking is now emerging amongst IP vendors and standardised in the IETF (mmusic, iptel, 1999 EURESCOM Participants in Project P810-PF page 3 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 ipsg, pint… working groups); the ITU also has a framework, albeit less generic, based on the H.323 standard. Such standards could be successfully re-used in an evolved GPRS for interworking to the PSTN. In such a network composition the critical area of billing should include IP telephony and circuit switched telephony, as well as networks interworking (UMTS, GSM/GPRS, IP, PSTN). Support of Supplementary Services across networks - VHE The support of supplementary services is required in the IP domain to provide similar and additional features to the ones that exist in the GSM/PSTN domain. Service and gateway architectures based on the emerging Call Control Standards for IP Telephony have been proposed by ETSI (TIPHON) and ITU (SG16). Services have been proposed by vendors (e.g. Lucent proposes an Internet Call Forwarding based on SIP). Another interesting area is the effort by the new signalling transport Working Group in the IETF to standardise a Call Processing Syntax enabling users and system managers to implement service ‘scripts’ on proxy agents (SIP proxies or H.323 gatekeepers). The use of such advances in an IP-based UMTS should be investigated to the extent of providing the required service capabilities for VHE to get closer to the initial vision for UMTS. page 4 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 2 Principles and Solutions for IP based Mobile Networks IP transport for the mobile user The section provides an overview of the GPRS functional architecture and basic procedures, drawing special attention to newly introduced functional elements and their relationships with the existing GSM framework, and outlining a possible GPRS evolution path towards a UMTS IP-based Core Network. It then moves to global mobility scenarios based on Mobile IP. Assuming that IP will form the heart of connection-less multimedia communications in the fixed domain and customers will want to benefit from the same services in the mobile domain, mobility mechanisms that integrate easily with IP technologies are needed. A common network architecture model that is able to cope with the needs of future mobile users concentrating on a Mobile IP architecture suitable for UMTS is therefore introduced. Finally an in-depth discussion on methods and scenarios for common (or at least interoperable) mobility management mechanisms between IP-based 3G systems and wireless LANs is provided, since wireless LANs will form an essential complement to Third Generation mobile systems for high bandwidth connectivity. 2.1 General Packet Radio Service GPRS provides actual packet radio access for mobile GSM users and complements the current data services available through today’s GSM networks, such as circuitswitched data and Short Message Service. It will facilitate a variety of applications such as telemetry, Internet browsing, email and broadcast services ([1], [2], [3], [4]). Its main innovations are: It exploits packet switching to transfer both user data and related signalling . It reserves radio resources only when there is something to send/receive. It increases data transmission speed from 9.6 kbps up to a maximum of 150 kbps It offers a connection to standard data networks (such as IP, X.25), extending the Internet computing towards the mobile users. GPRS provides new radio multiple access mechanism which allows more MSs to share the same physical channel, assigning to each user from 1 to max. 8 timeslots inside the same TDMA frame. This is true for the uplink and downlink, separately, thus it permits asymmetric channel allocation. Moreover, the radio resources may be dynamically shared among voice and data services according to the current network load or operator’s choice. On each time slot four coding schemes and relative speeds (from 9.05 Kbit/s to 21.4 Kbit/s) apply [5]. Thus, the raw data rate would be of almost 200 kb/s, bound to decrease due to the overhead of error correcting codes. GPRS provides two basic bearer services: Point-to-Point (PTP) for applications over IP and X.25 and Point-to-Multipoint (PTM) for broadcast data transmissions. At subscription time the user can specify a set of properties, such as data throughput and some QoS parameters (e.g. priority, transmission delay, bit error rate), also according to the different related charge offers [3]. GPRS has been specified to support frequent transmissions of small amount of data and occasional large data batch. In contrast with current circuit-switched connections where users have dedicated connections during their entire call, whether or not they are sending data, with packet access, users will only pay for the amount of data they actually communicate, and not for the idle time. Then, users could be “virtually” 1999 EURESCOM Participants in Project P810-PF page 5 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 connected for hours at a time and only incur connect charges related to the traffic volume actually exchanged. 2.1.1 GPRS reference model The GPRS reference model is logically based on a GSM network, with the addition of support nodes, shown in Figure 1. Two types of GPRS Support Nodes (GSN) are defined: the Gateway GSN (GGSN) and the Serving GSN (SGSN), providing the functionality necessary to implement the GPRS service. Physically, the GSNs can be integrated with the MSCs or constitute a separate network element. In the same figure, the communication interfaces between GPRS and GSM entities are shown. In particular, the HLR content has to be modified to contain also new GPRS user data, such as the address of the SGSN currently responsible for the user, the type of Packet Data Protocol (e.g. IP or X.25), the address of the reference GGSN and the subscribed Quality of Service. In the GSM-GPRS networks, two IP backbone networks are defined: an intra-operator backbone, connecting the SGSN and the GGSN of the same operator (Gn interface) an interoperator backbone, connecting the SGSN and the GGSN of different operators (Gp interface, which is the Gn interface with the addition of proper security functions). The GGSN and the SGSN have corresponding functions in the Mobile IP concept as the Home Agent (HA) and the Foreign Agent (FA). The GGSN keeps traces of routeing information for mobile registered hosts, in order to be able to send the PDUs to the current MS attachment point (SGSN). To forward IP or X.25 packets between each other, the SGSN and the GGSN encapsulate these packets using a specialised protocol called GPRS Tunnelling Protocol (GTP), which is completely transparent and irrelevant to the user who experiences a simple wireless connection to a Packet Data Network (PDN). This is done to ensure security in the backbone network and to simplify the routeing mechanism and the delivery of data over the GPRS network. Also, this tunnelling technique relieves the GPRS network of understanding external PDN protocols and enables adding support for other data networks in the future with the minimum change in the GPRS standard. Below is provided an overview of the main network nodes is provided. GGSN The GGSN provides interaction with PDNs and it is connected to the SGSN via a backbone network, based on IP. The GGSN updates the location register using routeing information provided by the SGSN about the path to a MS, and routes the external PDN protocol packet encapsulated over the GPRS backbone to the SGSN currently serving the MS. It also extracts and forwards PDN packets to the appropriate data network and handles the billing of data traffic. SGSN The main functions of the SGSN are to detect new GPRS MSs in its service area, handle registration of the new MSs, send/receive data packets to/from the GPRS MS, and keep record of the location of MSs inside its service area (routeing areas). The SGSN executes also the security procedures and access control: to verify if a new MS is allowed to join the GPRS network, it interrogates a database (GPRS register) where page 6 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks the mapping between the mobile’s identity (IMSI) and the PDN address is stored. The SGSN is connected to the BSC through the Gb interface, using the Frame Relay technique. It provides the interface Gd towards the G-MSC that is connected to SMS Centre, to provide Short Messages transmission service through GPRS. SMS-GMSC SMS-IWMSC SMS-C MAP-H MAP-C Gd MSC/VLR HLR MAP-D Gs A Gb TE MT R Gc Gr BSS SGSN Gi Gn Um PDN GGSN TE Gf Gp EIR GGSN Other PLMN Signalling Interface Signalling and Data Transfer Interface Figure 1: Functional architecture 2.1.2 GPRS transmission protocol stacks The GPRS transmission protocol stacks are presented in the Figure 2 [4]. Application IP/ X.25 IP / X.25 SNDCP LLC LLC Relay RLC RLC MAC MAC GSM RF GSM RF GTP GTP LLC UDP / TCP UDP / TCP BSSGP BSSGP IP IP Frame Relay L1bis Frame Relay L1bis L2 L2 Um MS SNDCP L1 Gb BSS L1 Gn SGSN Gi GGSN Figure 2: GPRS protocol layering The transmission plane is organised in levels in order to transfer user information and the necessary control procedure (e.g. error corrections, flow control, …). 1999 EURESCOM Participants in Project P810-PF page 7 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 The independence of the transmission plane of the Network Subsystem from the concrete radio access network is provided by the Gb interface. Later on, a brief explanation of the GPRS protocols will be given. GTP: it realises the tunnelling of user and signalling data between the GSNs. SubNetwork Dependent Convergence Protocol (SNDCP): this transmission functionality maps network-level characteristics onto the characteristics of the underlying network. Logical Link Control (LLC): it provides a highly reliable ciphered logical link. LLC shall be independent of the underlying radio interface protocols in order to allow introduction of alternative GPRS radio solutions with minimum changes to the NSS. Relay: in the BSS, this function relays LLC PDUs between the Um and Gb interfaces. In the SGSN, this function relays PDP PDUs between the Gb and Gn interfaces. Base Station System GPRS Protocol (BSSGP): this protocol transports the routeing and QoS information between BSS and SGSN. The benefits of the described architecture are listed below: - the SGSN does not need to use the same protocol that the MS is using (at the application level); - only one protocol (IP) must be supported between the SGSN and the GGSN, and this protocol can be different from the one used by the MS. From the standpoint of the data network, the GPRS network is comparable to a subnetwork of the data network. For example, in the Internet, the GGSN acts like an IP router behind which the entire GPRS is hidden. A computer in the Internet then sees the GPRS as an IP subnetwork to which the messages are sent, as the GPRS network were a completely standard Internet implementation. 2.1.3 Data packet routeing in GPRS In Figure 3, three different routeing schemes are illustrated: mobile-originated (path 1), mobile-terminated message when the MS is in its Home Network (path 2), and mobile-terminated message when the MS has roamed to another GPRS operator’s network (path 3). In these examples, the operator’s GPRS network consists of multiple GSNs (with a gateway and serving functionality) and an intra-operator backbone network. With interworking capabilities, the GGSN can be connected to data networks and to an interoperator backbone network that connects the GPRS networks of different operators using one standard protocol. page 8 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Figure 3: Routeing of data packets Path 1 The MS sends a data packet to a PDN. The packet is encapsulated into a SNDCP unit that is sent, using the LLC protocol, over the air interface to the SGSN currently serving the MS. When the SGSN has received the packet error free, it encapsulates the PDU into the GPRS backbone packet that is sent to the GGSN handling the traffic from the MS to the data networks. The GGSN extracts the PDU and forwards the data to the appropriate data network. The GGSN that is used by an MS is determined during the registration phase of the MS [6]. Usually, the SGSN can select the GGSN by itself but, in same cases it is possible to force the outgoing traffic through a specific GGSN. The specific GGSN is defined in GPRS register. This method lets mobile users roam in a GPRS network that does not support the data protocol used by the MS. In this case, the outgoing traffic is also routed through the MS’s Home Network to a GGSN that can handle the data protocol used by the MS. Path 2 In the second example, a host in a data network is sending a PDU to an MS located in the Home GPRS network. The data packet is routed in the data network using the standard routeing mechanisms until the packet arrives at a GGSN. In the GGSN the address of the receiver is extracted and mapped to the current location of the MS. The PDU is first encapsulated into a backbone network packet and sent to the SGSN which is currently serving the MS. The SGSN removes the backbone network encapsulation, and the original PDU is encapsulated into the SNDCP data unit and sent to the MS using LLC protocol. When the MS receives the packet, it removes the LLC and SNDCP headers and forwards the PDU to the appropriate application. 1999 EURESCOM Participants in Project P810-PF page 9 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Path 3 This last example is almost the same as the previous one. However, here the MS has roamed into another GPRS network and the Home GPRS network must send the PDU over the interoperator backbone to the visited GPRS network. The visited GPRS network routes the packet further to the appropriate SGSN. 2.1.4 Basic procedures for GPRS To access the GPRS services, a user must notify his presence in the visited routeing area, executing the procedure of GPRS attach. This operation creates a logical link between the MS and the SGSN (with the assignment of a Temporarily Logical Link Identity), via which the MS can receive SMS, paging from SGSN, eventual RA updating, … During the attach procedure, user data are copied from the HLR to the SGSN. An MS has three states in the GPRS system: IDLE, STANDBY, and READY. The three-state model represents the nature of packet radio use better then the normal GSM two-state model (IDLE or READY) [4]. This information is held at MS and SGSN and it is denoted Mobility Management (MM) context. In the IDLE state, the MS does not have a logical GPRS context activated or any PDN address allocated. In this state, the MS can only receive multicast messages that can be received by any GPRS MS. Because the GPRS network infrastructure does not know the location of MS, it is not possible to send messages to the MS from external data networks. When the MS is switched on, the first procedure performed between the MS and the GPRS network is radio synchronisation. This procedure is carried like it is already specified in GSM. The MS monitors GPRS information transmitted on the broadcast control channels to find out the locations of GPRS channels. When the MS wants to enable the data network protocol (start using the GPRS service), it initiates a GPRS Attach procedure. The main objectives of this procedure are: to send the PDN address of the MS to the GPRS network infrastructure, report the current whereabouts of the MS, create entries for the assigned PDN address in the GGSN routeing table, initiate charging and statistical procedures. The MS is authenticated and ciphering parameters between the MS and the SGSN are exchanged. The registration is forwarded to the GGSN in which the location of the MS is updated. The GGSN may inform the previous SGSN to remove the MS from the previous registers. If the GPRS login procedure was successful, the MS enters the READY state, and then moves to the STANDBY state if the READY timer expires with no data transfer. Data could be transmitted between an MS and the GPRS network only when the MS is in the READY state. In the READY state the SGSN knows the cell location of the MS. In the STANDBY state, the location of the MS is only known to the accuracy of a Routeing Area, which can consist of one or more cells within a GSM location area. When the SGSN wants to send a packet to an MS that is in the STANDBY state, the MS must be paged. Because the SGSN knows the routeing area in which the MS is page 10 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks located, a packet paging message is sent. After receiving the paging, the MS gives its cell location to the SGSN to establish the READY state. The data transmission begins soon after packet paging through the channel indicated by the paging message. The purpose of the packet paging is to simplify the process of receiving packets. The MS has only to listen to the packet paging message instead of all the data packets in the downlink channels. When an MS has a packet to be transmitted, access to the uplink channel is needed. The uplink channel is shared by a number of MSs and is allocated by a BSS. The MS requests use of the channel in a packet random message. The transmission of the packet random access message follows Slotted Aloha procedures. The BSS allocates an unused channel to the MS and sends a packet access grant message in reply to the packet random access message. The description of the channel (one or multiple time slots) is included in the packet access grant message. The data is transmitted on the reserved channels. The MS may activate or deactivate PDP contexts while in READY state. Regardless if a radio resource is allocated to the user or not, the MM context remains in the READY state even when there is no data being communicated. The READY state is supervised by a timer. A Mobility Management context moves from READY state to STANDBY state when the READY timer expires. In order to move from READY state to IDLE state, the MS must perform the GPRS Detach procedure. The main reasons for the STANDBY state are to reduce the load in the GPRS network caused by cell-based routeing update messages and to serve the MS battery. When an MS is in the STANDBY state, there is no need to inform the SGSN of every cell change, but only of every routeing area change. The operator can define the size of the routeing area and, in this way, adjust the number of routeing update messages. 2.1.5 Location Management in GPRS The Location Management function provides: - mechanism for cell and PLMN selection, - mechanism for the network to know the Routeing Area for MSs in STANBY and READY states, - mechanism for the network to know the Cell Identity for MSs in READY state. The term “handover” is not suitable to indicate the passage of the MS, engaged in a data transfer, from one cell coverage area to another, like it happens in the GSMCircuit Switched connections case. “Cell update” or “Routeing Area Update” procedures are performed instead. This is mainly due to the packet nature of the information exchanged between the MS and the network in GPRS. In fact, a packet data transfer permits: - a frequent and dynamic radio resources re-assignment (made at the beginning of the transfer of a flow of Radio Blocks to/from an MS). - the acknowledged mode of operation of the LLC and the RLC-MAC layers (that allows to detect if packet losses have occurred and to force retransmission) User data can in general be transmitted during MM signalling procedures (attach, authentication, Routeing Area Update) if the terminal allows it, but it should be limited in order to minimise the need for retransmission between the MS and the SGSN. 1999 EURESCOM Participants in Project P810-PF page 11 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 The MS detects that a new cell has been entered by comparing the cell’s identity with the one stored in the MS Mobility Management context2. The MS detects that a new Routeing Area (RA) has been entered by periodically comparing the RAI stored in its MM context with that received from the new cell. When the MS camps on a new cell, either a Cell Update or a Routeing Area Update is required. 2.1.6 Evolution scenario of GPRS towards an IP-based UMTS The UMTS system will likely consist of a new Access Network (the UTRAN) connected to a Core Network based on the evolution of both the GSM and GPRS networks. Two different switching platforms are likely to be used to separately handle circuit switched and packet switched traffic. Whatever the destiny for the voice traffic, connectionless data traffic will probably rely on a GPRS-enhanced platform. Those operators that have strong interests in utilising IETF standards may find convenient to push the packet switched platform towards an IP-based core network using IP/mobile IP networking allowing GPRS backwards compatibility. In order to lead evolution of current 2nd generation mobile systems towards an IPbased UMTS architecture, some enhancements have to be carried out to the GPRS network. A possible implementation of the UMTS target architecture is represented in Figure 4 [2]. The SGSN and the GGSN node are combined into the IGSN (Internet GPRS Support Node) and adapted: to the Iu interface to UTRAN. to use Mobile IP, for handling inter IGSN mobility. Thus, in this scenario Mobile IP is used to handle only macromobility events, that is: - in the UMTS core network - between different types of systems (UMTS, LAN, …), and between GPRS PLMNs. An example of MS registration can help clarifying co-operation between GPRS and Mobile IP. Let’s suppose that the mobile terminal decides to access its home network. - It sends a registration request through the serving UTRAN to the IGSN - The IGSN contacts the HLR for an authentication procedure. - Once authenticated, the mobile terminal will ask for a Mobile IP CareOfAddress (CoA, see also section 0), that is a temporarily address assigned to the MS by the serving network (Mobile IP v.6) or an address of a Foreign Agent in the network that will forward incoming packets. - The mobile terminal informs its Home Agent to update the look up table of home addresses with the new CoA. 2 The Cell Selection and Reselection procedure belong to Radio Resource Functionality and not to Mobility Management functions. Since the MS cannot camp on more than one cell, a cell that supports GPRS service has to be chosen. The operation may be either MS or Network controlled. page 12 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks - The Home Agent could contact the HLR in order to verify whether the MS CoA is authorised to be registered (through the new Gh interface) - IGSN will produce charging records while the MS is connected and transmits data. If the MS is roaming in a visited network, the local IGSN will contact the HLR of its home network, via the international SS7 network or by tunnelling the MAP messages through the Internet or an inter PLMN IP based backbone network. Then, if authorised, it will be given a CoA by the visited network and will register it to its Home Agent, as explained above. Internet UTRAN IGSN IP Iu IP / MobileIP home network MAP HA HLR SMS AUC ... Data & Signaling Signaling Gh MAP IP IGSN Iu UTRAN Figure 4: Evolution scenario for UMTS At present, the evolutionary path that starts from near term GSM/GPRS and drives to a UMTS evolved architecture, like the one just presented, can be divided in three steps, all backwards compatible with networks and terminals that cannot handle Mobile IP. Stage 1 The first stage represents the minimum architectural requirement for an operator to support Mobile IP services (Figure 5). GPRS is still responsible for roaming within and between the PLMNs. Mobile IP is used : - for roaming between different kinds of systems (e.g. between UMTS and a LAN), and - optionally between different GPRS PLMNs,. A Foreign Agent needs to be associated to those GGSNs addressed by the MS that wants to use a Mobile IP service. In the PDP context activation with the GGSN/FA node, the MS must receive the associated CoA: this new address must be communicated to the Home Agent, to let it tunnel incoming packets to the current serving network. The FA will de-tunnel these packets and, together with GGSN, will map the MS home address to the PDP context. The MS keeps the same CoA for all the duration of the PDP context. 1999 EURESCOM Participants in Project P810-PF page 13 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 UTRAN Gp RNS HA GGSN GGSN SGSN SGSN CN Firewall Iur HA HA MAP RNS HLR etc. Gn Firewall GGSN FA SGSN RNS Internet R CN UTRAN Iu Figure 5: CN architecture with GPRS MM within and between GPRS PLMN, and Mobile IP MM between different types of systems and optionally between GPRS PLMN Stage 2 In a further step, SGSN and GGSN may be co-located into a unique node just to push the IP backbone network as close as possible to the access network (Figure 6). UTRAN Firewall RNS Gp FA SGSN+ GGSN Iur CN Gi HLR etc. SGSN+ GGSN FA R HA MAP RNS HA HA IP Gn R Internet R Firewall SGSN+ GGSN FA RNS UTRAN Iu R CN Figure 6: CN architecture with GPRS MM for active MS and Mobile IP MM for inter-SGSN handover. The SGSN and the GGSN are co-located The drawback of this configuration is that a highly mobile MS can perform a lot of inter-SGSN handovers during a long session, resulting in an inefficient routeing scheme, if the PDP context is performed with the same GGSN. A way to skip this inconvenient could be the following. When active, the MS would move from the old SGSN to the new SGSN, keeping the PDP context in the old GGSN as long as the session is open. Once in the idle state, the PDP context could be page 14 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks changed to the GGSN associated with the new SGSN, and a new CoA can be obtained. The GPRS interfaces, Gn and Gp, are still included to provide user roaming in those networks that do not support Mobile IP. Stage 3 The last evolution step foresees Mobile IP to handle, additionally, all intra-systems mobility, including handovers between IGSNs and handovers between two GPRS networks (Figure 7). UTRAN UTRAN HA Firewall RNS FA IGSN Iur CN IGSN FA R HA HA MAP IP RNS HLR etc. Internet R R Firewall IGSN FA RNS Iu R CN Figure 7: CN architecture with Mobile IP MM within the core network, between different types of systems and between GPRS PLMNs 2.2 Mobile IP for global roaming In the future, IP will form the heart of connectionless multimedia communications in the fixed domain and customers will want to benefit from the same services in the mobile domain. Therefore, we have to find mobility mechanisms that integrate easily with IP technologies. A mobility management mechanism is needed to enable roaming between heterogeneous mobile networks, in whose mobility is handled by specific mechanisms (e.g. GSM handover, UTRAN handover, BRAN handover, IAPP handover). This could be provided by Mobile IP. This is why Mobile IP protocol is presented as well as related issues and developments. 2.2.1 Generalities Mobile IP allows a mobile terminal to roam from network to network without any reconfiguration of IP address. More importantly, it also allows active sessions (web, file transfer, streaming, conferencing…) to be maintained when the terminal moves. In addition, the mobile terminal is always identified by a unique IP address which allows it to be contacted wherever it may be. 1999 EURESCOM Participants in Project P810-PF page 15 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 As explained in the previous section and [114], there is an opportunity of convergence between an evolved UMTS network based on GPRS and Mobile IP. GPRS could be complemented by using Mobile IP internally and global roaming between GPRS domains - and ultimately between UTRANs - could be provided using Mobile IP. Mobile IP would then become the sole roaming ‘protocol’ in the IP domain both within the operator’s backbone and externally. The basic form of Mobile IP as defined in RFC 2002 [7] is presented in the following paragraphs. 2.2.1.1 Terminology – Basic mobile IP assumptions A terminal with mobility capabilities is known as a mobile node (MN) or mobile host (MH), and any terminal or server communicating with it is known as a correspondent node (CN) or correspondent host (CH). Mobile IP assumes that the mobile node has a permanent IP address belonging to a subnetwork, called the home network, where it can be reached by standard internet routing protocol. Typically, the home network is the Ethernet segment subnetwork to which the MH is usually attached. Any other subnetwork in which the mobile host may roam is called the foreign network. In a foreign network, the mobile host temporarily acquires a new routable address, called the care-of-address (CoA). The mobility functions needed by the mobile node are administered at the network level (IP layer) by mobility agents: either by a Home Agent (HA) in the home network or by a Foreign Agent (FA) in the foreign network. Figure 8 illustrates a simple mobile environment whereby a mobile node moves from a home network to a foreign network (it is ‘unplugged’ and ‘re-plugged’ at the new location). Correspondent Node HOME NETWORK FOREIGN NETWORK Foreign Agent Home Agent INTERNET Mobile Node Figure 8: Mobile IP terminology page 16 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 2.2.1.2 Principles and Solutions for IP based Mobile Networks Overview of Mobile IP Mobile IP provides three mechanisms in order to enable host mobility: Discovery mechanism This enables the mobile node to know in which network it is located and to ‘discover’ the identity of the local mobility agent. The discovery mechanism works by having the agents (home and foreign) to send broadcast messages periodically on their local subnetworks. The broadcast message, called an advertisement, includes the IP address of the agent. From these advertisements, the mobile node can then deduce its network location, set its default gateway router accordingly, and acquire a CoA. Registration mechanism It enables the mobile node to register its CoA with the Home Agent, thus ‘telling’ it the new location. The mobile node will send to the home agent a registration request message containing the CoA, possibly through the foreign agent (if the mobile node is in its home network, no registration is required since normal Internet routing will enable to reach it there). Tunnelling mechanism It enables the delivery of packets from correspondent nodes to the mobile node when the latter is roaming in a foreign network. Once the home agent has accepted the registration, it caches the CoA of the mobile node. It will then be able to capture the packets destined for the mobile node and send them to the appropriate location. This is achieved by tunnelling the packets to the CoA, usually by doing an IP in IP encapsulation [8]. Encapsulation enables to decouple the application layer data flow from the network layer information, thus enabling to maintain active sessions with correspondent hosts even if the mobile node is moving across subnetworks. 2.2.1.3 Detailed operation in the Foreign Network Agent discovery, Care-of-Address Once the mobile node has detected that it has moved to a foreign network (either by receiving Foreign Agent advertisements or if the last HA advertisement has timedout), it needs to acquire a CoA. Mobile IP allows two mechanisms for the acquisition of a CoA: The mobile node can use a Foreign Agent’s IP address (given in the advertisements), in which case it is called a foreign Care-of-Address. The mobile node can alternatively acquire a CoA dynamically through a mechanism, such as Dynamic Host Configuration Protocol (DHCP), if the subnetwork is not served by a Foreign Agent. It is then a co-located care-of address. Registration with the Home Agent The mobile node will then attempt to register its CoA with the Home Agent. It can do so by sending a Registration Request message. This message is sent to the FA if the MN has a foreign CoA. The FA will then relay it to the Home Agent. Alternatively, in the case of a co-located CoA, the MN sends the registration request directly to the HA. Once the registration is successful after an optional authentication check, the mobile node and the Foreign Agent are notified about it by registration reply messages sent by 1999 EURESCOM Participants in Project P810-PF page 17 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 the Home Agent. The Home Agent will maintain a soft-state mobility binding which associates the mobile node’s original IP address (its home address) with its care-of address. The Foreign Agent will maintain a similar binding if a foreign care-of address is used. When the mobile node moves to another Foreign Network, it will need to register a new care-of address with the Home Agent. Incoming packets delivery: tunnelling After the registration with the Home Agent is completed, the Home Agent is able to relay packets to the mobile node through tunnelling (Figure 9): 1. A packet destined to the mobile node is routed to the home agent. 2. The Home Agent intercepts the incoming packet. 3. The Home Agent encapsulates the incoming packet in a ‘new’ IP packet, which is tunnelled to the CoA as maintained in the mobility binding. Several encapsulation techniques are allowed, but IP in IP encapsulation [8] must be supported by all implementations. 4. a) Foreign CoA case: The FA decapsulates the packet. It then identifies the destination Mobile Host (MH) in its binding table using the home address contained in the destination address field of the de-capsulated (original) packet. The packet is then sent ‘over the wire’ (local subnet) in a MAC frame The frame is received by the MN, which passes the datagram on to the appropriate application. 5. b) Co-located CoA case: The tunnel endpoint is the MN itself and no further delivery mechanism is needed other than the mobile node itself decapsulating the packet and passing on the datagram to the appropriate application as before. Correspondent Node FOREIGN NETWORK HOME NETWORK Home Agent <Home@, CoA> Mobility Binding Foreign Agent Mobile Node Figure 9: Mobile IP packet delivery mechanism when the Mobile Node is on a foreign network Outgoing packets forwarding page 18 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks In the opposite direction, the mobile node directly sends packets to correspondent nodes, using its home address as the datagrams’ source address. 2.2.2 Enhancements to Mobile IPv4 2.2.2.1 Route Optimisation In base Mobile IP, the triangular route followed by packets from the correspondent node to the mobile node in a foreign network may not follow an optimal path across the Internet. All incoming packets must first go to the Home Agent. The route optimisation feature [25] attempts to resolve this triangular routing problem by introducing additional IP functionality in the correspondent node, the home agent and the foreign agent. Route optimisation allows the correspondent node to cache the mobility binding of the mobile node, thus enabling it to send packets to the mobile node directly (Figure 10). When a mobile node moves to a foreign network, it will register with the Home Agent as mentioned for base mobile IP. Any subsequent datagram destined to the mobile node will be captured by the Home Agent. On noticing this, the Home Agent will then still tunnel the datagrams to the mobile node. In addition, it will also send a Binding Update message to the correspondent node in order to create or update the node’s mobility binding cache. The direct route will then be used by the correspondent node to tunnel packets to the mobile node. The route optimisation draft also provides additional extensions to allow the recovery of 'in flight' packets between the HA and a previous Foreign Agent by sending registration messages with the PFANE extension (Previous Foreign Agent Notification Extension). Correspondent Node <Home@, CoA> Mobility Binding Fir st da Bin d ing Up ets ck te Pa HOME NETWORK FOREIGN NETWORK First Packets Home Agent <Home@, CoA> Mobility Binding Foreign Agent Mobile Node Figure 10: Mobile IP Route Optimisation 2.2.2.2 Mobile IP and dial-up access While Mobile IP, as defined in RFC 2002 [8], provides robust support for host mobility across subnet boundaries, its support for roaming across administrative 1999 EURESCOM Participants in Project P810-PF page 19 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 domain boundaries does not conform to established practices amongst ISPs for PSTN dial-up access, which can be extended to dial-up access from circuit-switched 2G mobile networks. Some short-term ‘fixes’ have been specified: Interaction with PPP. RFC 2290 creates a new IP Control Protocol (IPCP) option to resolve the under-specification of the interaction between Mobile IP and PPP through IPCP. This enables the Network Access System (NAS) to correctly act as a Foreign Agent for the dialling-in Mobile Node. Interaction with RADIUS. In addition to the feature described above, [15] proposes a new RADIUS [16] attribute (‘Mobile-IP-Configuration’). Its use would be to allow the local RADIUS server to enforce Mobile IP Authorisation/Configuration and Accounting at the NAS after the Authentication Phase. The Mobile Node can then choose to use Mobile IP or not during IPCP negotiation. Standardised Identification. [17] defines the Mobile IP Network Access Identifier Extension, which enables to transmit a user's NAI [41] in a Mobile IP message. The NAI standardises the format of user and service provider identification material to facilitate AAA operations when roaming (e.g. interaction with a RADIUS Server in a visited ISP domain). This really provides personal mobility (user) on top of the terminal mobility provided by Mobile IP. This feature also enables direct interaction between Mobile IP entities and standard AAA servers when not in a dial-up access scenario (e.g. WLAN or GPRS access). In dial-up scenarios, the NAI extension enables to request dynamic home address allocation by the home agent. Stronger Authentication. The Mobile IP Challenge/Response Extension [18] mechanism is not specific to the dial-up scenario. However, since this mechanism provides a better protection against replay attacks than the authentication extensions initially proposed in RFC 2002, it is a good choice for roaming dial-up users who want to have Mobile-IP service. In the longer term, Mobile IP will have to evolve conform to the Roaming [19] and AAA [20] frameworks currently under specification at the IETF. 2.2.3 Mobile IPv6 IPv6 includes many features that are missing in the current IP version 4: Stateless Address Auto-configuration [13] Neighbour Discovery [14] IPv6 also attempts to drastically simplify the process of renumbering, which could be critical to the future 'routability' of the Internet [21], [22]. These features will help to streamline mobility support for better performance. 2.2.3.1 CoA acquisition in Mobile IPv6 Mobility Support in IPv6 [23], as proposed by the Mobile IP working group, follows the design for Mobile IPv4. It retains the ideas of a home network, home agent, and the use of encapsulation to deliver packets from the home network to the mobile node's current point of attachment. While discovery of a care-of address is still required, a mobile node can configure its own care-of address by using Stateless Address Auto-configuration [13] and Neighbour Discovery [14]. Thus, foreign agents page 20 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks are not required to support mobility in IPv6. IPv6-within-IPv6 tunnelling [24] is also already specified. 2.2.3.2 Route Optimisation in IPv6 IPv6 mobility borrows heavily from the route optimisation ideas specified for IPv4 [25] particularly the idea of delivering binding updates directly to correspondent nodes. When it knows the mobile node's current care-of address, a correspondent node can deliver packets directly to the mobile node's home address without any assistance from the home agent as is the case in IPv4. 2.2.3.3 Security One of the biggest differences between IPv6 and IPv4 is that all IPv6 nodes are expected to implement strong authentication and encryption features to improve Internet security. This affords a major simplification for IPv6 mobility support, since all authentication procedures can be assumed to exist when needed and do not have to be specified in the Mobile IPv6 protocol. Even with the security features in IPv6, however, the current working group draft for IPv6 mobility support specifies the use of authentication procedures as infrequently as possible. The reasons for this are twofold. First, good authentication comes at the cost of performance and so should be required only occasionally. Second, questions about the availability of Internet-wide key management are far from resolved at this time. 2.2.3.4 Source Routing In contrast to the way in which Route Optimisation is specified in IPv4, in IPv6 correspondent nodes do not tunnel packets to mobile nodes. Instead, they use IPv6 routing headers, which implement a variation of IPv4's source routing option. A number of early proposals for supporting mobility in IPv4 specified a similar use of source routing options ([29], [30]) but these were not performing well with IPv4. However, IPv6's more careful specification solves this problem. Consequently, correspondent nodes can use source-routing options in headers without penalty. This allows the mobile node to easily determine whether correspondent nodes do not have the right CoA. 2.2.4 Mobile IP limitations and potential solutions Mobile IP provides a basic framework for satisfying the requirements of in-session mobility without compromising the integrity of Internet routing in a simple and robust manner. In this section, the weaknesses of the basic Mobile IP concept is analysed when thinking about using it 'as is' in a public commercial environment, where IP and cellular networks are converged. The main issues are: 2.2.4.1 Security interworking Capacity overhead Handover latency Security issues Firewall traversal / ingress filtering 1999 EURESCOM Participants in Project P810-PF page 21 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Firewalls or Border Routers cause difficulty for Mobile IP because they block all classes of incoming packets that do not meet specified criteria. Specifically in the case of ingress filtering, they block those packets that appear to have a source address outside the network they belong to, as is the case with traffic from mobile nodes in a foreign network. Solutions to this problem in Mobile IPv4 typically involve 'reverse' tunnelling outgoing packets from the CoA to the Home Agent. The Tunnel Establishment Protocol [26] lays the foundations for achieving firewall traversal using compound tunnels. Mobile IPv6 also offers a solution in the home address destination option [23]. Authentication framework, Distribution of keys, trust relationships Mobile IP provides a basic authentication mechanism between the Home Agent, the Mobile Node and potentially the Foreign Agent. However, it does not address the issues of key distribution and trust relationships between these entities, which may be quite complex in the public environment where roaming between various administrative domains is possible, possibly internationally. Work is under way to address these issues and integrate Mobile IP more tightly with the emerging AAA infrastructure. Support of Private Addressing With privately-addressed corporate networks, it may happen that a FA is shared by multiple mobile nodes belonging to multiple corporate networks with overlapping address spaces. If two MNs belonging to these networks happen to share the same FA and happen to get from their corporate network the same IP address, the FA receiving packets from two different Home Agents for the same Home Address will not be able to resolve the address clash and how to forward the packets. 2.2.4.2 Capacity overhead Access Transmission Encapsulation and header overheads particularly impact the capacity requirements and performance of real-time services, since these require small packets to overcome delay variation and packetisation delays. This is particularly of importance in the radio access network where transmission capacity is expensive. With short packets, 20-bytes IP headers along with RTP/UDP headers and the duplication of information due to encapsulation prove to be an overkill on the capacity available to the user's multimedia data (compressed voice or video). Solutions to this involve header compression techniques ([36], [37] [38][39]) and the reduction of encapsulation overhead through e.g. Minimal Encapsulation [12]. Core/Signalling Transmission Unlike traditional mobility management procedures in mobile telephony networks, mobile IP does not define paging areas. Therefore, the MN must update the HA every time it changes location. This requires the exchange of signalling messages (registration request and reply) in the 'core' network. This is further worsened by the need to send Binding Updates across the network with route optimisation. page 22 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 2.2.4.3 Principles and Solutions for IP based Mobile Networks Handover Latency In Mobile IP, the Home Agent and Correspondent Nodes bindings are updated only after the MN has moved to its new location. It can therefore be considered as a hard forward handover scheme since there is a lag of time during which the data sent to the MN from the HA or CN can be lost or delayed. This latency is made up of several components: Association delay Movement Detection delay Traffic re-routing delay, made up of: HA binding updating delay CN binding updating delay 'In flight packets' re-routing delay. Potential solutions at the IP level involve minimising the need to send registration/update messages across the network, which incurs a big round-trip delay. The general idea is to take a hierarchical approach that separates global mobility provided by Mobile IP, from a local mobility management scheme such as those presented in section 0. 2.2.5 Possible use/role of Mobile IP for UMTS The scope of this section is to introduce a common network architecture model using Mobile IP [40] that is able to cope with the needs of future mobile users. 2.2.5.1 Network reference model The Figure 11 depicts the logical view of the proposed network architecture. Foreign Network IP based Core Network AAA+ Security Gateway DHCP Mobility Management (FA+) GSM, UMTS AAA+ Dial Up Location Tracking Location Tracking DNS Security Gateway Unified Authentication Directory Server Location Tracking Location Tracking DHCP Mobility Management (HA+) Wireline LAN (802.3) Wireless LAN (802.11) Access Network Home Network Figure 11: Network reference model The following sections describe the functionality of the components of the network reference model. 1999 EURESCOM Participants in Project P810-PF page 23 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Home Network The Home Network is very similar in concept to the home network defined in [7] and the home network defined in the wireless networks. Basically, the Home network is a combination of the two with some extensions. With regard to the relevant mobility related functions, the Home Network: Maintains the mobile user's subscription and associated subscriber profile. Provides mobility to subscribers on a 'larger' scale. It is responsible for maintaining the current location of the mobile user. Allocates mobile node IP addresses. Supports a 'unified' directory for subscriber profiles independent of the access network type. Stores policies and profiles associated with mobile users. Provides Authorisation functions associated with the mobile user. May provide the Authentication functions required to authenticate the mobile users. Supports Service Level Agreements (SLA) with all Foreign Networks it wants its users to roam in. Supports a policy that allows 'hiding' the user's location. This policy will mandate that the home be an anchor point for datagrams sent to it's users while they are roaming. Home Network Mobility Components Later on, some functions associated with the components of the Home network are described. Mobility Management (MM) Mobility management is comprised of two functions: mobile user location tracking and performing routing update functions for mobile nodes. These functions are very similar to what Home Agents do in Mobile IP [7] and what Home Location Registers do in wireless networks, with some enhancements. The location tracking function of the MM expects to receive a single mobile user registration message from the foreign networks that is independent of the access network used at the foreign network. This is true for all messages sent from the foreign networks to the home networks. The architecture supports the concept of a centralised location tracking function for the home network. However, the architecture does not preclude the idea of having a distributed location tracking function. AAA+ The protocol used to send messages between a foreign network and a home network is the AAA protocol, with extensions to support mobility management (hence AAA+). The single security association between the foreign and the home network can be used to alleviate the need for security associations between Mobile IP FA, HA components and dynamic session key establishment ([41] and [42]). It is suggested that the security framework be based on IPSec. page 24 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Authentication Server The authentication server is a combination of certificate authority, key management system, and digital signature verification server. The authentication server receives roaming mobile user authentication requests via the AAA+ and authenticates the user. Unified Directory The Unified Directory is the database that contains all the home user's subscriber profiles, network policies, and any other data that needs to be stored at the Home Network. The subscriber profiles in the directory are independent of the access network association. Access to data in the Unified Directory from other components within the network is via a single protocol, LDAP. DHCP In the Home Network, the DHCP server may be used to assign IP addresses to roaming mobile stations that do not have a permanently configured IP. DNS In the home network, Dynamic DNS is the protocol used to update DNS with a roaming user's mobile node allocated IP address. If the home network is responsible for allocating the IP address, DNS is updated by DHCP. If the foreign network is responsible for allocating the IP address, the home network mobility manager will update DNS. Security gateway The security gateway performs all the necessary 'firewall' functions. Foreign Network The Foreign Network is very similar in concept to the foreign network defined in Mobile IP [7] and the foreign network defined in the wireless networks. Basically, the Foreign Network is a combination of the two with some extensions. The Foreign Network is the serving area network for one or more access networks. It can support multiple Access Networks (AN), where each AN is associated with a different technology, e.g. one AN may be a CDMA RAN, another AN may be GSM RAN. Moreover, the Foreign Network: Provides mobility management for mobility within the access networks that it serves. Provides local services. Routes data to the mobile user via the access link that the mobile node is currently attached to. Routes data that is sent by the mobile user. Allocates IP address to be used by the mobile nodes if allowed by policy. Supports the establishment of Service Level Agreements (SLA) with all Home Networks that want to allow their users to roam within the foreign network. Supports user authentication to be provided after the user has registered. 1999 EURESCOM Participants in Project P810-PF page 25 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Foreign Network Mobility Components Here follows a brief description of some functions associated with the components of the Foreign Network. Mobility Management (MM) Foreign Network's mobility management is comprised to three functions: mobile user location tracking within the foreign network, handoffs between foreign networks and performing routing update functions for datagram delivery to the access network/mobile node. These functions are very similar to what Foreign Agents do in Mobile IP [7], with some enhancements. The location tracking function of the MM expects to receive the same formatted mobile user registration message from each of the heterogeneous access networks. The architecture supports the concept of a centralised location tracking function within for the foreign network. However, the architecture does not preclude the idea of having a distributed location tracking function. AAA+ (as in the Home Network) DHCP In the Foreign Network, the DHCP server may be used to 1. assign co-located care of addresses to private network mobile nodes and 2. if policies indicate, assign IP addresses to roaming mobile stations that do not have a permanently configured IP. Security Gateway The security gateway performs all the necessary 'firewall' functions. It supports ESP IPSec security associations with other network security gateways. 2.2.5.2 Access Network Mobile networks and access technologies allow a user to gain access to a Foreign Network. They can be of several types: 2.2.5.3 GSM mobile access networks (and their evolution to 3rd generation, UMTS) 802.11 wireless LAN access 802.3 wireline LAN access Dial-up network access … IP Network The IP network provides the routing of datagrams between Home Networks and Foreign Networks. The IP network can be the public Internet or a closed network. 2.2.5.4 Mobile Nodes It can be argued that all nodes in the future will be mobile, or at least have the potential to be mobile. Stationary nodes, generally called correspondent nodes in page 26 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Mobile IP [7], will only have to be equipped with the appropriate access specific interface card(s) and software that can perform the network registration functions. The mobile nodes should be equipped with the functions and interfaces to access the wireless or mobile networks. Mobile node software will need to determine when and which access networks are available and perform the appropriate registration functions. 2.3 Registration for mobile terminals considering an IP only based network This chapter focuses on the procedure to register a mobile which only accesses packet switched services combining two levels of mobility: mobility within the radio subsystem and mobility within the network subsystem. The circuit switched access is not taken into account. As IP based network, we consider the network architecture described in section 0 which is represented in Figure 5, Figure 6 and Figure 7. We will underline the roles of the different location registers involved: HLR, HA and FA. 2.3.1 Radio access authentication and MIP authentication At this stage of research in IETF, the common understanding is to keep Access Network authentication and IP-based authentication as separate things [44]. Indeed while the first one is related to fair radio resource sharing, the second one does more generally depend on agreements between visited and home network. Regarding the fact that the Radio Access is UTRAN, the Access Network authentication will be performed by VLR/HLR databases and MAP signalling . Two ways of proceeding can be drafted: 1. Access Network authentication is first performed. Subscriber information in HLR also contains IP-based authentication material that will be used by SGSN for authentication in the IP world. In this case, the UE does not perform itself IP authentication. IP-based authentication material means all the information that Mobile IP needs to perform authentication3. 2. Only the UE is aware of information to send to the IP network for authentication purpose. Two independent authentication procedures are then initiated from UE. In the following sections, we focus on the IP authentication for IP Mobility as the procedure (HLR, VLR) is not changed in the access network compared to GSM/GPRS procedures. 3 The binding in the HLR between MSISDN or IMSI and the IP address of the mobile terminal could be done with a NAI (Network Access Identifier) that allows to create an IP address from an IMSI [41]. For example, if the NAI is of the form user@realm, a table resident in the wireless access network or in the HLR may contain ranges of IMSI and corresponding realm. IMSI range Realm 214790 – 214799 abc_company.net 914680 – 972689 def_company.net 972700 – 972730 hij_company.net 1999 EURESCOM Participants in Project P810-PF page 27 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 As mobility is not handled the same way with versions 4 (RFC 2002 [7]) and 6 of the Internet Protocol, we will point out the differences between them. 2.3.2 UMTS registration with Mobile IPv4 With Mobile IPv4, a mobile terminal is always registered in a Foreign Agent. The temporary address assigned to the mobile terminal (i.e. CoA) is given by the FA. 2.3.2.1 Roles of the location registers Considering Figure 5, Figure 6, Figure 7, several location registers have been identified and this part underlines their specific roles. HLR Given the architecture of the second generation mobile network, we cannot avoid to have a HLR database. This database will have about the same roles as in GSM/GPRS networks, it could contain: - IMSI - MSISDN - Address of the IGSN currently responsible for the user (the IGSN associated to a FA) - HA address (if the HA is not attributed dynamically per connection) - Profiles for data communications - Security keys HA The HA contains permanent addressing information if it permanently registers Mobile User (in this case the HA should not be discovered dynamically). The HA contains the MSISDN of the mobile user (MSISDN which has been transformed into an IP address), the default algorithm MD5 and keys of 128 bits for authentication of the FA and the CoA of the mobile terminal (i.e. IP address of the FA). FA The FA associated to the IGSN contains the binding between the MSISDN, the home address, potentially the Home Agent address and the current location/address of the mobile terminal within the access network. 2.3.2.2 Interfaces A simplified picture of the network is drawn in Figure 12 showing the protocols at the interfaces. page 28 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Underlying Network MAP HLR VLR MAP MAP FA HA IGSN Radio Access Network AAA AAA HDAA Or AAA Figure 12: Signalling message between location database and servers 2.3.2.3 Registration procedure Option 1: Interworking between Radio Access authentication and IP authentication in the HLR The registration procedure can be the following when the mobile is under his home network: 1. Registration procedure, authentication process with the HLR via IGSN as for GPRS. 2. If registration to HLR is successful, the IGSN FA updates the HA with the CoA of the mobile terminal (i.e. the IP address of the IGSN). The HA may be dynamically attributed. 3. Authorisation and authentication process between FA and HA with AAA (Authentication – Authorisation – Accounting) protocols. 4. Registration ACK or NACK sent back to the mobile terminal using GPRS signalling. 1999 EURESCOM Participants in Project P810-PF page 29 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 UTRAN 1 2 RNS 3 Firewall FA 4 R IGSN Iur 3 MAP 1 RNS 1 HLR etc. HA 4 IP Internet R R Firewall IGSN RNS R FA CN Iu Figure 13: Registration procedure with UTRAN and Mobile IPv4 If the binding between the user address and the Home Agent address is not found in the HLR nor in the Foreign Agent, the Foreign Agent may proxy the registration request to the Home Agent via a HDAA [42] (Home Domain Allocation Agency) which will assign a Home Address within the Home Domain. The HDAA does not perform any processing on the Registration Request, but simply forwards the request along with the newly allocated IP address to a Home Agent within the network that is able to handle the request. With such a procedure, the Home Agent may be dynamically associated. Consequently, the authentication should be performed at the home network or home administrative domain where the user has his subscription for the IP part of the procedure, for instance through AAA functionality. The Mobile IP authentication will be performed between the HA and the FA. In order to insure security within the IP network between FA and HA, they are associated to AAA servers which allows Authentication, Authorisation and Accounting. Such servers can be based on DIAMETER [43]. To insure security transmission between HA and FA so that addresses cannot be identified while transmitted over the IP network, some IPSec protocol may be used. UE MM IGSN RNC LOCATION UPDATING REQUEST 1 SA MM MAP MAP ACCESS NETWORK AUTHENTICATED 1 MAP SEND AUTHENTICATION INFO 1 MAP SEND AUTHENTICATION INFO ACK * MIP MIP MM LOCATION UPDATING ACCEPT Home Network HLR MAP Access Network Authentication MAP Registration request [Care Of Address, NAI] 2 MIP 3 Mobile IP Authentication Registration request ack 3 4 MIP 4 MM *.MAP_SEND_AUTHENTIFICATION_INFO_ACK is to be meant as an upgraded MAP message containing IPbased authentication information (Home address, NAI, algorithms, keys…) Figure 14: More detailed messages flow for registration page 30 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Roaming in a visited access network will not change the previous procedure, except the fact that the authentication for the radio access network will need to interrogate the HLR from the VLR. Option 2: Full independence between Radio Access authentication and IP authentication Mobile IP authentication of UE can be directly triggered by mobile. In this case HLR does not need to be upgraded. The drawback is the existence of a second authentication procedure on the radio link. Figure 15 presents the messages flows in this case. UE MM MIP RNC IGSN LOCATION UPDATING REQUEST 1 Registration request 1 Encapsulated in RRC message MIP_Direct_Transfer FA MM MIP Encapsulated in RANAP message MIP_Direct_Transfer MAP ACCESS NETWORK AUTHENTICATED 1 MAP SEND AUTHENTICATION INFO 1 MAP SEND AUTHENTICATION INFO ACK * MIP MIP LOCATION UPDATING ACCEPT Registration request ack Encapsulated in RRC message MIP_Direct_Transfer Registration request [Care Of Address, NAI] MIP MAP MM Home Network HLR 2 MIP 3 MAP MAP Registration request ack 3 4 MIP 4 MM 4 MIP Encapsulated in RANAP message MIP_Direct_Transfer *.MAP_SEND_AUTHENTIFICATION_INFO_ACK is to be meant as NOT upgraded. No IP information is carried on it. Figure 15: Messages flows for registration if HLR is not upgraded. The two authentication procedures are totally independent Discussion on the benefits and drawbacks of the two options Conceptually these two approaches (MIP authentication from the UE or not) addresses two different concerns: First approach attempts to spare radio resources and pushes forward an integrated solution GSM-SS7/MIP. Second approach keeps the two domains independent and does not need HLR updates but introduces redundant procedures. To make a choice, several parameters play a role: If MIP information to be sent to Home Network is huge, it could be better to store it only in UE instead of adding heavy modification in HLR. If an all-IP Core Network appears to replace the SS7 solution, the two redundant procedures would only be a temporary stage. Second approach would allow soft introduction of Mobile IP in a UMTS network without modification in HLR. First approach could replace the first one if Mobile IP and MAP appear to coexist as a stable stage. 1999 EURESCOM Participants in Project P810-PF page 31 (109) Principles and Solutions for IP based Mobile Networks 2.3.2.4 Deliverable 4 If Mobile IP is only used for macro-mobility, MIP authentication is rarely performed. In this case procedure duplication may appear as marginal. Roaming in a different type of access network In the case of a different access network it is clear that Option 2 is still valid since Radio Access authentication is fully independent from IP authentication. If Option 1 is applied an interworking function must be implemented in the database that plays the role of the HLR to link Radio Access identification and IP authentication material. 2.3.3 UMTS registration with Mobile IPv6 The major difference of Mobile IPv6 compared to Mobile IPv4 is that the Foreign Agent functionality is no more used. Indeed, the CoA is directly obtained by the Mobile Station, which has Mobile IP capability. The Foreign Agent whose function was to manage the temporary addresses from the allocated CoA is no more involved in Mobile IP procedure. As far as UMTS is concerned, the UE is not really an IP node. When receiving IP packets, the IGSN forwards them towards RNC with special UMTS addressing and multiplexing. When the UE is associated a temporary IP address (e.g. conceptually equivalent to the SMTP address TMSI@subnetwork.domain.com), the IGSN has to map this address on a UTRAN Bearer. Consequently if the UE assigns itself this CoA, it will need to send it to IGSN so that it performs address resolution between IP and UTRAN. Moreover the IGSN will be the true termination point for this address since the actually used address to route packets after IGSN will be a UTRAN identifier. As a conclusion: 1. It seems to be much more profitable if CoA is allocated by IGSN (Radio resources would be wasted for no benefits otherwise) as in section 0. 2. On the other hand if Option 2 of section 0 is applied, radio resources are already used for MIP authentication. Therefore UE capability to define itself its own CoA may find some interest. IGSN does not need the Foreign Agent capability of CoA allocation – and then becomes much simpler – it just needs to forward the encapsulated MIP message to the Home Network. The two authentication procedures remain independent. page 32 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 UE MM MIP Principles and Solutions for IP based Mobile Networks RNC IGSN LOCATION UPDATING REQUEST Home Network MM Registration request (addressed to Home Agent/HAAA) [Care Of Address, NAI] Encapsulated in RRC and RANAP messages MIP_Direct_Transfer HLR MIP Store Care-Of-Address to perform correct routing MIP MIP Registration request (addressed to Home Agent/HAAA) [Care Of Address, NAI] MAP MAP AUTHENTICATION MIP MM MIP LOCATION UPDATING ACCEPT Registration request ack MAP SEND AUTHENTICATION INFO MAP SEND AUTHENTICATION INFO ACK MAP MAP Registration request ack MM MIP Figure 16: Messages flows in IPv6 with two procedures on the radio link 2.3.4 Major constraints for Mobile IP in third generation mobile system Considering Third Generation Mobile Systems, it is important to keep in mind the backward compatibility with the Second Generation Mobile Infrastructure. Mobile IP could provide a “macro-mobility” in the core network. This means that user mobility within access networks will be handled locally whereas mobility to establish connection within the core network to the ‘right’ entry point of the access network is managed by Mobile IP. This allows to be compatible with existing systems such as GPRS. Mobile IP will allow a way to manage mobility in the core network independently from the access network technology. Protocols within the Internet should provide encryption for Mobile IP signalling and for user traffic. Quality-of-service mechanisms are expected to enable widespread use of real-time services between stationary nodes, there will be a demand for using the same kind of services when being mobile. When network resources allow, there should be mechanisms to handle quality of service for mobile users, particularly in case of reverse tunnelling, route optimisation and handover. Authentication, Registration We may differentiate two phases for authentication: the initial phase (full authentication at initial registration or when a mobile node requests a new home agent), and subsequent authentication (performed at handover within the same administrative domain). 1999 EURESCOM Participants in Project P810-PF page 33 (109) MIP Principles and Solutions for IP based Mobile Networks Deliverable 4 The Mobile IP protocol specifies registrations to be performed at the home agent, and to be based on the home IP address of the mobile node. However, additional solutions and extensions to Mobile IP have introduced identification and authentication based on the Network Access Identifier (NAI). Basing the authentication on the IP address means that it is the host that is authenticated, while authentication based on the NAI results in authentication of the mobile user. The latter alternative would alleviate the connection between a specific user and a specific host, and provide a secure way for dynamic allocation of IP addresses. This is the reason why it will be possible to re-use the same types of identification as in second generation mobile systems. As seen previously, the full authentication should not be performed at the home agent, since the home agent may be dynamically allocated. Moreover, for reasons of subscription handling and charging, the full authentication should always be performed at the home domain or by the home operator, that is where the user has his subscription. 2.4 Wireless LANs and mobility The need for common, or at least interoperable, mobility management mechanisms between 3G systems and wireless LANs is becoming more acute as shortcomings in user connection bit rates become apparent in 3G systems. This paragraph presents here several mechanisms aimed at providing mobility on these radio LANs and stresses the importance and necessity of layer 3 (IP layer) mechanisms in order to enhance Mobile IP as well as to provide interworking and QoS guarantee support. 2.4.1 Layer 2 mobility support in Wireless LANs This section presents mobility mechanisms that have been designed to provide mobility on top of the Physical (Layer 1) and Medium Access Control (Layer 2) layers of radio LANs. However, these schemes make use of data frames and semantics on a 'per-hop' basis at the Logical Link Control layer (Layer 2 in the OSI architecture) and are transparent to the IP routing functions. 2.4.1.1 Proprietary layer 2 mobility schemes Some wireless LAN products provide ‘roaming’ capabilities. These encompass two mechanisms: radio and MAC-level de-association and re-association procedures (now standardised in e.g. IEEE 802.11 [75]) as well as ‘handover’ procedures that are usually initiated by the Mobile Station and relayed by the new Access Point (AP) to inform the old AP that it can release the resources previously used by the roaming MS. Such handover protocols use a proprietary interface to the SNAP/LLC service, alongside normal application data and network OS protocols. The problem with these roaming schemes is that they are proprietary. Mobile Stations can not therefore roam between access points from different vendors. page 34 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 2.4.1.2 Principles and Solutions for IP based Mobile Networks The Inter-Access Point Protocol (IAPP) Origin of IAPP The IAPP (Inter-Access Point Protocol) [77] is a specification that defines how access points from different vendors communicate with each other to support mobile stations roaming across cells. The IAPP specification builds on the baseline capabilities of the IEEE 802.11 standard. Where the IEEE 802.11 standard addresses the physical and media access control layers of the OSI reference model, the IAPP specification tackles higher-level OSI layers such as logical link control that facilitates inter-access point communications. Overview The IAPP specification describes methods of access point co-ordination in a wireless network and provides information necessary for the efficient handling of mobile clients. Figure 17 shows a wireless LAN system architecture in which stations are associated with a particular access point. A distribution system is used to extend the wireless coverage area, which is viewed as a single logical network. All stations can communicate with all other stations providing an appropriate Integration Service is present in the access points. For example, an integration service is needed for a wireless station to communicate with a server that is a node on the distribution system. Server Router Distribution System AP a STA a1 AP b STA a2 STA b1 Figure 17: IAPP topology The internals of the Distribution System are not defined by IEEE 802.11 and there is no exposed interface to the Distribution System. The integration between the distribution system and IEEE 802.11 networks is handled entirely in the access point and is transparent to the applications and network software running on both ends. The IAPP provides a mechanism by which access points can exchange information, which is used to enhance mobile client access to the distribution system. Figure 18 provides a pictorial view of the applicable protocol stack. 1999 EURESCOM Participants in Project P810-PF page 35 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Access Point Management IAPP handler UDP IP Other network (Hiperlan, MMAC…) IEEE 802.11 MAC MAC Management Interface Figure 18: IAPP protocol stack in the Access Point The IEEE 802.11 system supports mobility across coverage area limits (which are referred to as BSS boundaries). Stations may move from one BSS to another and maintain their higher-level network connections. This mobility is enabled through the use of IEEE 802.11 management frames and the Inter Access Point Protocol (IAPP) which is used to communicate on the distribution system (wired or wireless). The IAPP is implemented on top of UDP/IP so that it will work across router boundaries. The IAPP is an extension to existing management protocols. By specifying how access points will communicate with each other, the IAPP defines two major functionality: Roaming by mobile stations across BSS boundaries Methods to handle access point awareness Mobile station roaming The HANDOVER methods of the IAPP enable to: Inform the old AP that support for a mobile station has been assumed by another AP, allowing it to: Release the resources that were assigned to support the station Update its layer 2 filter table to appropriately forward frames destined for the mobile station Discard or forward buffered frames for the roaming mobile station This is achieved by a forward handover signalling protocol in which the new and old Access Points exchange addressing information. This is further explained below. Update filter tables of intermediate MAC bridges to appropriately forward frames destined for the mobile station. The handover procedure is tied into the IEEE 802.11 Reassociation procedure (or similar from a different wireless protocol); it is initiated when an access point receives a reassociation-request from a mobile station. Via the Reassociation-request message of 802.11, the mobile station provides the MAC address of the old AP. The new AP is required to translate this MAC address into the old AP's IP address. This can be accomplished by various mechanisms such as address resolution protocols (e.g. RARP) or configuration management. Building a page 36 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks translation table from ANNOUNCE messages is an option provided by the IAPP itself (see next sub-section). Figure 19 outlines the main steps and message exchanges of the IAPP Handover protocol. Mobile Station Old Access Point Distribution System (IP or Layer 2 fwd) New Access Point IEEE 802.11 Reassociation IAPP Handover re-association requests HANDOVER.request Retries or timeout re-association response HANDOVER.response Figure 19: IAPP HANDOVER protocol Access point awareness IAPP defines an ‘Announce’ protocol. The intention of this protocol is to: Inform the other access points that a new access point has become active and provide the new AP’s addressing and configuration information. Inform the other APs of the continued operation of a particular AP. Allow an AP to request addressing and configuration information from the other APs Allow APs to negotiate over configuration attributes The ANNOUNCE protocol PDUs are multicasted to other IAPP-compliant Access Points and carry Access Point information elements such as: MAC address, ANNOUNCE protocol advertisement interval, frame forwarding capabilities, handover timeout, MAC beacon period, PHY layer (e.g. FH or DS), PHY channel, … 2.4.1.3 Hiperlan 2 (BRAN) and MMAC mobility Mobility Functions are not addressed by BRAN or MMAC systems. The standardisation work done in these bodies will not address the layers above the MAC. 1999 EURESCOM Participants in Project P810-PF page 37 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 It is therefore possible to use IAPP as a mobility mechanism for BRAN or MMAC Access Points. Alternatively, Access Points could behave as IP routers with a wireless interface and implement Layer 3 mobility schemes as described in the next section. 2.4.2 Layer 3 Local Mobility: ‘cellular IP’ There is a number of reasons why it may be desirable to implement 'micro-mobility' functions at the IP layer: 2.4.2.1 Legacy wireless LANs roaming schemes are not interoperable IAPP only addresses mobility within a subnet Mobile IP has capacity and performance limitations It provides the opportunity to integrate mobility with other network-related frameworks: QoS, IPSec, multicast… Basic micro-mobility protocols Fast handover protocol This scheme proposed by Bell Laboratories and Berkeley University [80] makes a clever use of the gratuitous and proxy ARP features of the address resolution protocol to maintain the illusion that wireless hosts reside on a wired link. The handover protocol itself is a lightweight forward handover scheme that uses ICMP packets for signalling. It enables fast handover of IP traffic between base station routers. The most intelligent feature of this protocol is to re-use gratuitous ARP as a ‘location updating’ procedure for the local corresponding hosts and the gateway router(s). Multicast protocols for mobility This approach is similar to the virtual connection trees that were once proposed for wireless ATM [87]. However, IP has a whole suite of multicast routing protocols (MOSPF [82], DVMRP [81], PIM [83] and [84], CBT [85] and [86]) that make this approach more attractive for IP traffic rather than ATM traffic. The idea is that Mobile Hosts are ‘identified’ by a multicast group address. Other hosts wishing to communicate with the Mobile Host join this multicast group. Intermediate routers then ‘conspire’ (using one of the multicast routing protocols mentioned above) to form a multicast ‘tree’ between the Mobile Host and its correspondents. In these schemes, base stations are multicast routers (Figure 20). Mobile Host Correspondent Host Figure 20: Multicast mobility generic principle page 38 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks When it changes radio cell, the Mobile Host first establishes Layer 2 connectivity with the new base station. It then sends an ‘ICMP Membership report’ to ask the base station to join the multicast tree. The multicast routing protocol process in the base station then handles the protocol-dependent signalling to form the new branch. Multicast routing protocol ‘join’ messages only travel in the network up to the nearest on-tree router. Branches at old locations either timeout or are explicitly ‘pruned’. Micro-Mobility concepts The main features of these two basic schemes can be summarised as follows: 2.4.2.2 Host addresses have no topological significance within the 'mobile subnet'. Mobility-enabled nodes (base stations) do not perform IP routing but use PerHost Forwarding instead. Mobility signalling messages trigger the creation or deletion of Per-Host Forwarding entries in the IP routing table of mobility-enabled nodes. Host mobility is 'invisible' outside the 'mobile Subnet': datagrams destined to mobile hosts are routed normally down to the gateway. Mobility is restricted to the 'mobile subnet'. The schemes propose to handle inter'mobile subnet' mobility with Mobile IP. Cellular IP and HAWAII The next paragraphs present common features of other recent, more elaborate, micromobility schemes that build on these concepts: Cellular IP [91] and the HandoffAware Wireless Access Internet Infrastructure, or HAWAII [90]. Mobility-enabled stub Domain To achieve the desired de-coupling between macro-mobility and local, 'continuous' changes in the host's point(s) of attachment with the network, a two-level architecture is assumed. The top-level of the hierarchy is the Internet as we know it: a collection of interconnected packet-switched networks in which datagrams are forwarded according to routing tables (dynamically established and maintained by protocols such as RIP, OSPF, EIGRP…) that map the subnet part of the destination address in a packet's header to a router interface. At the bottom level (see Figure 21), a collection of interconnected mobility-enabled Nodes forms a stub Domain, in which all traffic has either been sourced in the Domain itself or will be sunk in it. At the edge of this stub mobility-enabled Domain are Nodes with (wireless) Layer 2 interfaces, also called Base Stations4, between which Mobile Hosts are free to roam. The mobility-enabled Domain connects to the higher level of the hierarchy through a unique Domain Ingress Node. Viewed from the higher-level Internet, the Domain is a 'flat' address space (subnet). All packets addressed to this subnet are routed to the Domain Ingress Node. 4 Here we assume that Base Stations implement IP routing. In fact, as far as the mobility scheme is concerned, mobile hosts communicate with neighbouring mobility-enabled IP nodes. Such a node may not necessarily be the device (base station) to which the mobile node is physically connected, but may be 'deeper' in the transmission network (e.g. data IWF). 1999 EURESCOM Participants in Project P810-PF page 39 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Figure 21: Mobility-enabled stub domain architecture and terminology Time-invariant topology of default routes The mobility Domain is configured so that a loop-free topology of directed routes exists at all times between all mobility-enabled nodes and the Domain Ingress Node. Once established, this topology doesn't change (except in case of link or node failure). Compared to host mobility patterns, this topology is invariant. The mechanism used to establish and maintain this topology is scheme-dependent. The following default traffic routing rules apply within the Domain to enforce stub operation and delivery to inactive Mobile Hosts: By default, any traffic originated in the Domain is propagated 'up' the topology towards the Domain Ingress Node (source routing or hop-by-hop). This is essential to mobility management. By default, any traffic originated outside the Domain (mobile terminated traffic) is propagated 'down' the topology from the Domain Ingress Node or discarded. The exact forwarding mechanism (broadcast, unicast, multiple unicasts, multicast - hop-by-hop or end-to-end) is scheme-dependent. This is essential to paging (explained later). The case of intra-Domain traffic (e.g. mobile-mobile traffic) handling is schemedependent. Note that a mobility-enabled Domain is an overlay to a standard IP network. However, the mobility-enabled Domain remains logically disjoint of the underlying IP network and stub operation is enforced. This is because the time-invariant topology of default routes is rooted at the Domain Ingress Node and exterior Internet routers route IP addresses for the Domain's space to the Domain Ingress Node. Note also that several Domains may be configured on the same 'physical' IP Network but they are still logically separate. Distributed Per-Host Forwarding page 40 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks All schemes are distributed: all Nodes within the Domain have forwarding tables that may contain Per-Host Forwarding Entries (PHFEs). A PHFE contains the one-hop reachability information for an individual Mobile Host: it is a mapping between a Mobile Host Identifier and one of the Nodes interfaces through which the Host can eventually be reached. These PHFEs override the default traffic forwarding rules stated in the previous paragraph. PHFEs are only used to forward data to Mobile Hosts, that is 'downlink' mobile terminated traffic only. Please note: Location-independent Mobile Host Identifiers are mapped to IP addresses from the Domain. In current schemes, this mapping is implicit (i.e. there is no Host ID/IP Address translation function) and permanent. Address assignment is scheme-dependent and also depends on how the scheme interworks with Mobile IP. PHFEs are maintained as soft-states (they have limited lifetimes). The refresh mechanism is scheme-dependent. Whether the co-existence of several PHFEs for a single Mobile Host within a Node is allowed is scheme-dependent. This may be desirable for 'soft' handover or advance branch setup to minimise the gap during handover. Hop-by-hop standard IP routing is used to forward 'uplink' traffic such as control messages (or mobile-originated user data if hop-by-hop forwarding is mandated). The time-invariant topology of default routes enables hop-by-hop 'uplink' packets to always travel up to the Domain Ingress Node if they are not discarded by an Intermediate Node. This ensures that location information is always forwarded to the Domain Ingress Node, which has a role similar to the Gateway MSC in GSM networks. End-to-end standard IP routing is used to forward other 'uplink' traffic. Therefore Mobile Originated (MO) user data does not necessarily have to go through the Domain Ingress Node. There can be multiple Internet gateways for MO user data. Per-Host Time-variant tree of routes Mobility Management is performed by maintaining a time-variant tree of routes from the Domain Ingress Node to the Mobile Host, for every Mobile Host currently in the Domain's coverage area. This tree is formed by the succession of PHFEs in the Domain's Nodes for that particular Mobile Host. Requirements: New PHFEs need to be created along the path from the BS up to the Domain Ingress Node when a Mobile Host first powers up in the coverage area of a BS that belongs to the Domain or when an already powered-up Mobile Host hands over to the Domain from e.g. another Domain, a fixed LAN, a BRAN access network, … Existing PHFEs need to be updated (or new ones created) when a Mobile Host enters the coverage area of a new base station or after a radio black-out. Existing PHFEs need to be periodically refreshed as long as the Mobile Host remains powered-on and is in the Domain's coverage area. 1999 EURESCOM Participants in Project P810-PF page 41 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Old PHFEs may need to be explicitly deleted after a handover if loss of packets is to be avoided. Mobility Management operations: The PHFE create/update/refresh functions are triggered in each Node by incoming 'uplink' traffic: either control messages or MO user data packets that propagate towards the Domain Ingress Node. Figure 22: HAWAII Per Host Forwarding Entries (PHFEs) update after handover and explicit delete of PHFEs pointing to the old Base Station [90] The PHFE explicit delete function requires to send control messages 'downlink' of the default topology and maybe also direct messages (e.g. between old and new BS Figure 22) using end-to-end standard IP routing. Interworking with Mobile IP It is assumed that the Domain Ingress Node acts as a Home Agent for the Mobile Hosts that are 'usually' in the Domain it serves. However, since it does not have linklayer connectivity with Mobile Hosts, it does not broadcast Agent Advertisements. The way by which nodes can tell whether they are in their home Domain or not is scheme-dependent. Other Mobile IP-related functions are also performed by 'edge' nodes (Mobile Host, Base Station, Domain Ingress Node): Mobility Agent Advertisement Registration Request Processing Home Agent binding refresh Decapsulation of tunnelled packets page 42 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks The repartition of Mobile IP functions between edge nodes is scheme-dependent. Depending on how these functions are distributed, Mobile Hosts will be identified in a Foreign Domain by either their Home Address (dynamically or statically assigned) or a co-located Care-of Address (see Figure 23). Figure 23: HAWAII Per Host Forwarding Entries (PHFEs) update after handover and explicit delete of PHFEs pointing to the old Base Station [90] Support of paging In public cellular wireless networks, paging trades off location tracking accuracy (and hence 'connection' delay) for a better utilisation of resources. In the context of mobility schemes, paging support achieves two goals: Paging minimises power consumption of terminals that do no transmit data (idle state) by allowing them to refresh/update their PHFEs in the Domain less frequently. Paging reduces signalling load and memory requirements incurred by the maintenance of PHFEs for idle Mobile Hosts in all nodes of the Domain. Requirements on micro-mobility schemes to support paging (from [90]and [91]): Some Nodes in the Domain may maintain a Paging Table in addition to the PHF table, (which we now call Routing Table). In any case, a Paging Table is maintained at the Domain Ingress Node. A State Machine (null, active, idle) has to be maintained in the Mobile Host and in Nodes that have Paging Tables. State determination and synchronisation within such Nodes can be achieved by comparing the soft-states of both Routing and Paging entries. Outline of paging operation: 1999 EURESCOM Participants in Project P810-PF page 43 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 In idle state, Mobile Hosts only send periodic Paging Update control messages. If paging is supported at Layer 2, Mobile Hosts also send Paging Updates when they cross paging area boundaries. Paging is initiated by a Node that receives traffic destined to a Mobile Host for which it has a paging entry but no routing entry. Incoming traffic is buffered at the Node until the paging procedure is completed. A Paging Request control message is broadcast 'downlink' of the time-invariant topology of default routes. Upon reception of the Paging Request, the Mobile Host switches to active state and sends a Paging Response or a Routing update that is propagated in the 'uplink' direction until it reaches the Node that initiated Paging. The Node stops buffering and forwards previously buffered traffic. page 44 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 3 Principles and Solutions for IP based Mobile Networks Real-Time services on IP networks Although the IP protocol has held centre stage since the development of the Internet, IP packet switching still cannot meet the requirements of number of services concerning QoS provisioning. Consequently, the real-time services provided by UMTS systems (voice, video, …) may not be reliable if the interconnection of UTRAN is realised through an all-IP backbone. The two main factors that strongly impact real-time requirements are: Transmission end-to-end delay Delay variation First of all, this chapter will show that these issues are directly related to bandwidth reservation and queues handling. Different approaches and solutions are shown: Latency problems are closely related to queuing techniques. These can be addressed by guaranteeing a certain amount of bandwidth. RSVP is a solution for bandwidth reservation BUT presents some drawbacks especially for large scale networks. Diffserv and MPLS can bring alternatives to these problems. The conclusion of this chapter will present a synthetic architecture that attempts to take into account the different constraints. 3.1 Queuing techniques The control of latency and delay variation strongly depends on the queuing techniques implemented in the nodes of the network. A packet arriving in a node is processed before it is put in a queue for retransmission purpose. This operation can vary according to the size of the packet and the state of congestion in the network. The currently used Best Effort algorithm in IP networks (simple FIFO queues) does not allow any preference for any packets (requiring a certain QoS or not). Some queuing techniques may allow to provide different kinds of QoS. These take two aspects into account: a) Ordering of packets in output queues and b) Packet loss management. a) Ordering techniques FIFO Class Based Queuing Simplest way of proceeding: all packets are treated with the same priority. Packets are put in different queues which are all FIFO. Each queue is affected a priority. Priorities can be handled by different scheduling algorithms among which is the Weighted Round Robin algorithm: each queue is assigned a ratio of time. (Weighted) Fair Queuing The idea is to allocate a given ratio of bandwidth to a service as soon as this service requests for resources. This could be applied if the bandwidth could be arbitrarily fragmented between services which is obviously not the case. GPS (Generalised Processor Sharing) is an ideal but unrealistic application of the concept. Therefore PGPS (Packet adapted version of GPS) is usually used instead. 1999 EURESCOM Participants in Project P810-PF page 45 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 b) Packet loss management Simple Overflow RED (Random early detection) and WRED (Weighted Random early detection) Packets are dropped when the queue overflows. Random Early Detection is a queue management scheme that drops packets randomly. Since packets are randomly selected, they are likely to belong to different flows. This will trigger the TCP flow control routines at different end hosts to reduce their send rates at different time. By doing so, RED can prevent the queue at the routers from overflowing, and therefore avoid the drop-tail behaviour of routers when their queues overflow. RED has been proved to be very useful and is now widely deployed. RIO (RED with If the traffic does not exceed the bit rate specified with the ISP, it is In and Out) considered as in profile. Otherwise, the excess packets are considered as out of profile and are put into the same queue as ‘in’ packets to avoid out of order delivery. RIO basically maintains two RED algorithms, one for in packets and one for out packets. There are two thresholds so that the ‘out’ packets are first dropped and if the second threshold is overcome the ‘in’ packets are also dropped. 3.2 IntServ and RSVP The Intserv framework specifies four components: the packet scheduler, the admission control routine, the classifier and the reservation setup protocol, usually RSVP. Applications requiring guaranteed service must set up the paths and reserve resources before transmitting their data. The admission control routines will decide whether a request for resources can be granted. Best Effort traffic can be sent immediately without any admission control or path setup. When a router receives a packet, the classifier will put the packet in a specific queue based on the classification result. The packet scheduler will then schedule the packet accordingly to meet its QoS requirements. RSVP is a signalling protocol that provides a simple way to allocate bandwidth. 3.2.1 RSVP messages The RSVP reservation mechanism is done in two steps by the mean of two messages. PATH Message and RESV Message: The PATH Message is sent by the transmitter to all recipients and contains characteristics of the stream – i.e. burst size, mean rate. The RESV Message is sent by the recipient(s). It configures the different routers to reserve the correct amount of bandwidth. The routing of the message is achieved through the path stored in the PATH message. A non RSVP router will just forward the messages transparently. If a message is lost one can wait up to 30 seconds before completing the procedure. To avoid such delay, one solution may be to use a special and high-priority queue in each node dedicated to this signalling (see also 0). page 46 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks 4 Transmitter 1 2 3 Receiver Receiver Flow of RESV message Network node Resources reservation Figure 24: Transmission of RESV Messages from the receivers to the transmitter in RSVP 3.2.2 RSVP issues and limits Some constraints have to be considered within RSVP: CPU limitations: Extracting information such as source/destination addresses and ports to sort incoming packets, process for reservation, heavy calculation (PGPS), etc., needs a rather high CPU capacity. Over-provisioning: The reserved bandwidth will most of the time induce a much lower delay that the guaranteed one (i.e. RIO) due to over dimensioning of the RSVP protocol. - This can be solved by setting RSVP parameters a bit less strictly. Soft State: Each router has to be configured by RSVP in a soft state in fact each time the PATH message is sent. The PATH messages are present during a connection to reroute the flows when the network is congested. This increases a lot the volume of signalling and prevents from installing a too large network of RSVP routers. 3.2.3 Towards a layered architecture The computing overhead at each hop is really a big matter and prevents from implementing RSVP as a general technique: this must be used when needed and avoided in large scale networks. But it is so far the only way to guarantee time delays and to leave in the same time all the unused capacity to lower quality services. As it is not realistic to have an IP backbone using RSVP routers, we can take advantage of the RSVP capability of ignoring non RSVP routers: indeed an interesting architecture could integrate low scale IP access networks implementing RSVP connected with each other by an over-dimensioned IP backbone implementing other solutions for real-time services. 3.3 DiffServ Differentiated services enhancements to the Internet protocol aim at enabling scalable service discrimination in the Internet without the need for per-flow state and signalling at every hop. In Differentiated Services, packets are classified and marked at the network ingress routers to create several packet classes. Packets in different classes receive different 1999 EURESCOM Participants in Project P810-PF page 47 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 services. It is a way for customer to request a specific performance level on a packet by packet basis, by marking the DS field of each packet with a specific value. Differentiated Service Field and forwarding treatment The DS field (structure in Figure 25) corresponds to the field of IP packet header in which the Differentiated Services class is encoded. It is the Type of Service (TOS) octet in the IPv4 header or the Traffic Class octet in the IPv6 header. 0 1 2 3 4 5 6 7 DSCP CU DSCP: Differentiated Service CodePoint CU: Currently Unused Figure 25: Structure of the DS Field Six bits of the DS field are used as a codepoint (DSCP) to select the Per Hop Behaviour (PHB: description of the forwarding treatment) a packet experiences at each node. The DSCP field allows to differentiate priorities among several flows, larger numerical value meaning higher priority. Class Selector Compliant PHBs can be realised by a variety of mechanisms, including strict priority queuing, weighted fair queuing (WFQ) as already mentioned in section 0. [48]. Service level agreements In order to receive Differentiated Services from its ISP, a customer must have a Service Level Agreement (SLA) with his ISP. A SLA basically specifies the service classes supported, and the amount of traffic allowed in each class. After being marked by customers according to the desired service, the ingress node of the ISP networks classifies, polices and possibly shapes the packets, depending on the agreed SLA. When a packet enters one domain from another domain, its DS field may be re-marked, as determined by the SLA between the two domains. Using different classification, policing, shaping rules and scheduling algorithm in the routers, many services can be provided, for example, 1) Premium Service for applications requiring low delay and low delay variation; 2) Assured Service for applications requiring reliable but not fixed delay bounds; 3) Olympic Service, which provides three tiers of services: Gold, Silver and Bronze, with decreasing quality; and 4) Best Effort Service, which is the same as today’s Internet service. Comparison of Diffserv with RSVP/Intserv There are only a limited number of service classes indicated by the DS field. The DS fields of packets of flows from different sources to different destinations may be marked identically. These packets will receive identical services inside the ISP networks. Since service is allocated in the granularity of a class, the amount of state information is proportional to the number of classes, not proportional to the number of flows. Differentiated Services therefore provide a scalable QoS solution to ISP networks. Sophisticated classification, authentication, marking, policing and shaping operations are only needed at boundary. ISP interior routers need only to implement Behaviour Aggregate (BA) classification and some simple scheduling algorithm. Therefore, Differentiated Services is easier to implement and deploy than Integrated Services. page 48 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks A drawback of Differentiated service protocol is that there is no guarantee concerning the end-to-end time delivery. It only concerns a priority management among the packets. As an RSVP/Diffserv solution might be a very valuable one, Section 0 is entirely dedicated to an example that brings both concepts together in the same framework. 3.4 ATM Another way to differentiate flows with different QoS is to multiplex IP packets on ATM Virtual Circuits (VC). Each VC is affected a class of service. Within a VC, Best Effort scheduling algorithm is applied. This is basically the same principle as Diffserv except the fact that ATM can guarantee QoS for one VC which cannot be the case for a Diffserv class. Everything happens as if the IP traffic uses different pipes in the network according to its service classes. The VCs are of course re-configurable according to the amount of traffic in different classes of service. It is worth noting that nothing is guaranteed for one application since congestion might happen within a class of service. 3.5 MPLS This technique is conceptually directly derived from the ATM concept described above. MPLS is a forwarding scheme. It evolved from Cisco’s Tag Switching. In the OSI seven-layer model, it is between Layer 2 and Layer 3. The network protocol can be IP or others. This is why it is called Multi-Protocol Label Switching. MPLS is a way to build Virtual Paths in all-IP networks. Such a Virtual Path is called LSP (Label Switch Path) and is set up between a series of MPLS capable routers, also called LSRs (Label Switched Routers). The reservation capability of ATM is not present in MPLS. A MPLS LSP can be considered as a tunnel. When a packet enters the start point of the tunnel, its path is completely determined. The packet will follow the tunnel and emerge at the other end. Benefits and limits, comparison with ATM Controlling the routeing allows to have a more optimised use of the network. For instance it is possible to reserve some parts of the network to real-time traffic and to send Best Effort streams on a more likely congested part. This is the most valuable point for our purpose. MPLS does not provide any priority driven techniques to insure better service for any given Class of Service. It should be associated with Diffserv to achieve such a purpose. It has less overhead than ATM. ATM would require each boundary switch to be an ATM switch and an address resolution protocol between IP and ATM addresses. It still keeps the connection-less flexibility feature (no need for systematic connection establishment procedures). 1999 EURESCOM Participants in Project P810-PF page 49 (109) Principles and Solutions for IP based Mobile Networks 3.6 Deliverable 4 Complete architecture to manage QoS in IP networks As presented before, RSVP is not scalable for large IP networks whereas Diffserv and MPLS are able to differentiate traffic with different QoS even in large IP networks. However Diffserv and MPLS are less reliable than RSVP as far as QoS is concerned because they only prioritise the traffic and they do not give any insurance on the delivery time of the traffic as RSVP does. Consequently, to guarantee QoS in IP networks, the use of RSVP is optimum in corporate networks whereas in transit networks Diffserv or MPLS is more adequate. To provide an acceptable alternative, Diffserv has to be associated with an overdimensioning of the network. The example of Figure 26 proposes a framework in which Diffserv capable networks provide aggregate QoS services, and they co-exist and interoperate with RSVP/Intserv capable hosts and stub networks, which use end-to-end signalling and RSVP. This example is presented with Diffserv but MPLS could have been deployed in the transit network. Tx Stub Network ER1 BR1 Transit Network BR2 Stub ER2 Network Figure 26: Example of Network Configuration Edge Routers (ER1, ER2) and Boundary Routers (BR1, BR2) are deployed at the interface between Differserv and Intserv networks. In this manner, it is possible to provide end-to-end QoS through a combination of networks that support RSVP style reservations and networks that support Diffserv style prioritisation. The successful arrival of RESV messages at the original sender indicates that admission control has succeeded both in the RSVP regions of the network and in the Diffserv regions of the network. 3.7 Guarantee of QoS with mobile terminals As seen before to provide a given level of QoS in fixed IP network is not so easy and IETF is still searching for appropriate solutions. 3.7.1 Difficulties due to the mobility of IP terminals This part aims at underlining the supplementary difficulties to guarantee a level of QoS in a network supporting the Mobile IP protocol and managing mobile terminals. The path of the connection between two mobile terminals is going to be modified by the move of one of them; the newly involved routers in this connection may not be able at that time to provide the same QoS and the process of reservation of the RSVP protocol for example has to be re-done between the two terminals. A service degradation may apply for the users. In the Diffserv case, if a user wants to change his service profile (Service Level Agreement) he has to notify his ISP. After notification, the network nodes have to page 50 (109) 1999 EURESCOM Participants in Project P810-PF Rx Deliverable 4 Principles and Solutions for IP based Mobile Networks be configured manually by a network operator within one or more ISP domains. This results in significant delays in the range of hours or even days. Therefore, Diffserv based on static service level agreements is not suited for dynamically changing communication requirements in the Internet. Highly dynamic environments and the static bandwidth allocation concept of Diffserv are contradictory. The goal should be to support dynamic service level renegotiations in order to allow appropriate response to the dynamics of mobile users. 3.7.2 Also with Diffserv, billing is based on SLAs which are either pre-configured or dynamically setup if a SLA negotiation protocol is used. In addition to the static SLA negotiations, additional billing and accounting procedures have to be provided for the case that a mobile node visits a foreign network and requests to use the SLAs of the foreign network. Currently, some protocols are under development to exchange QoS parameters between users and ISP as well as between ISPs. In general, the mobile node needs some mechanisms to indicate to an entity of the network that it desires a certain QoS. Solutions for IP terminals The adaptability of the mobile terminal to the characteristics of a network seems to be an important element in order to combine Mobile IP and Diffserv. This adaptability could be realised at several levels: optimisation of the route or not depending on the level of quality that is required for the requested service, with for example route optimisation for the services that are not too sensitive to the bandwidth variations, adaptation of a service when a handover occurs and when the new path is not able to support the same SLA as before the handover. Consequently, it seems that to combine Diffserv and Mobile IP, new protocols need to introduce some kind of signalling for Diffserv so that the mobile terminals are capable to indicate the requested type of service. This new signalling protocol could include some functions relative to billing. In order to define a service model, two classes of real-time applications have been identified: the tolerant services and the intolerant services in respect to packet delay variations. These two classes correspond to the following service classes respectively: predictive services and guarantee services. To provide a guarantee service to a mobile user, two alternatives are possible: this guarantee may depend on the location (i.e. since the user moves from one cell to another, there is no more guarantee) or his guarantee may be location independent (i.e. the mobile terminal has the same guaranteed QoS wherever he is, given a ‘mobility profile’). The ‘mobility profile’ is the set of locations (i.e. cells) in which the user may possibly go during a call. In such a case, bandwidth reservations shall be realised for each mobile terminal following all the paths in the network leading to cells in which he may go. Outside the area corresponding to his ‘mobility profile’, the quality of service is not guaranteed. Nevertheless this process wastes a lot of bandwidth and is not realistic in UMTS. The main goal of this scheme is that delay intolerant applications do not need to wait for re-negotiation of quality of service during a call (when handover happens). 1999 EURESCOM Participants in Project P810-PF page 51 (109) Principles and Solutions for IP based Mobile Networks 3.7.3 Deliverable 4 Combining UMTS - IP We have seen before the specific problems due to the mobility of terminals in the case of Mobile IP to provide guarantee on QoS, the same difficulties are found while combining an IP network or Mobile IP network with a UMTS network. To manage different QoS, it is proposed to distinguish the types of flows (Diffserv approach). This differentiation may be done on other criteria: types of users and types of access networks (if several are linked to the same IP network). Differentiation of users means that the subscription of a user will correspond to a priority level of Diffserv protocol. The main drawbacks of such a process are the fact that the priority level of a flow may not be changed and that all the flows from the same user (audio, data, …) are indicated with the same priority level in the network. When application classes are given different priority levels, drawbacks mainly are that same types of flows form different users have the same priority level (except if a priority order between types of services and users is introduced). Further audio and video flows are competing (in certain case audio flows should have priority over video flows, in other case the priority order should be reverse). As a conclusion, a combination of these two types of priority should be realised to be more coherent as far as quality of service is concerned for mobile applications. However these techniques do not solve a possible congestion problem in the network. To sum up those problems for QoS provisioning, it seems that the use of RSVP is optimum in corporate networks whereas in transit networks Diffserv or MPLS is more adequate. To provide an acceptable alternative, Diffserv has to be associated with a fine dimensioning of the network. However, to add mobility in IP networks also complicates the way to guarantee some traffic contract and at that time no satisfying solution has been found. page 52 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 4 Principles and Solutions for IP based Mobile Networks Service provisioning in an IP based scenario This section focuses on methods and scenarios for service access by mobile users in an IP-based UMTS scenario. In the first place it provides an introduction and architectural overview on the wireless application protocol (WAP) which is conceived as a means for optimising the data content to the characteristics of the user interface and screen size of the handsets. Then, we present a short introduction to wireless-IN services with special attention to possible scenarios for Virtual Home Environment Service (VHE) provisioning by IPbased servers within the CAMEL service environment. 4.1 Wireless Application Protocol: Internet applications for mobile users In today mobile communication market, the number of services provided by operators and service providers that use Short Message Service (SMS) and Unstructured Supplementary Service Data (USSD), is growing. Among these data services, Voice mail notification or Email send and receive may be mentioned. At the same time, the Internet explosion suggests that there is a potential for wide public acceptance of several types of data services that can be made available via standard communication products. With 3rd generation mobile networks, the convergence of these two network technologies is bound to occur. A new era is opening in which operators will use wireless data services as a competitive advantage to differentiate their networks from their competitors in a well-developed mobile communication market. Operator’s effort in the enhancement of wireless data service, as well as that of Internet service providers, will be both to enable new services, in a fast and flexible manner, and to make them easier to be used, allowing end users of mobile terminals intuitive and simple content interaction. WAP is conceived as a means to fulfil the basic needs of the operators and the mobile users, optimising the data content to the characteristics of the user interface and screen size of the handsets. The WAP Forum is a widely industry-supported organisation, and, as a de facto standardisation body, produces the application framework and network protocols for wireless device such as mobile telephones, pagers, and PDAs. 4.1.1 Why WAP? Internet technology has been developed for data networks of desktops and large computers, characterised by medium to high bandwidth. But when thinking to access Internet from mobile stations, some fundamental limitations have to be taken into account. In particular handheld devices have restricted power consumption, small displays, different input device (e.g. a phone keypad), etc; the wireless network has heavy bandwidth limitation, high bit error rates, sensible delays (for example the one due to interleaving). 1999 EURESCOM Participants in Project P810-PF page 53 (109) Principles and Solutions for IP based Mobile Networks 4.1.2 Deliverable 4 The WAP model WAP adopts a model that closely follows the WWW programming model, in the sense that its components have been adapted to the characteristics of a wireless environment and optimised for the use of mass-market handhold devices. Actually: WWW-standard URLs are used to identify WAP content on servers or local resources in a device (e.g. call control functions) Content and applications are specified in well-known standard formats derived from the WWW HTML or JavaScript Standard networking protocols are based on the WWW HTTP communication protocol5 A micro browser, suitable for handheld terminals, enables the communication of requests from the mobile device to the network web server. A user agent (that is a client-side in-device software) interprets network content referenced by the URL and displays it to the end-user. To access information on Internet servers from mobile stations, WAP utilises proxy technology, that is a sort of intermediary program acting as a “translator” between the clients and the servers that have no means of direct communication. In particular, proxy functionality is split in a: Protocol Gateway, which translates requests from the WAP protocol stack (see later) to the WWW protocol stack (HTTP and TCP/IP) Content Encoders and Decoders, which translate the WAP content into suitable formats to reduce the size of data over the air link and the computational energy required by the client device to process that data. A schematic representation of a WAP network is shown in Figure 27. Wireless Telephony Applications (WTA) support is also included in the figure. Mobile terminals cannot communicate directly with web servers, but have to submit their requests to the WAP proxy. In the example, the web server may: provide content in WWW standard format and in this case filter functionality (HTML filter) is required to translate it into a WAP format (Wireless Markup Language). provide content in WAP standard format directly to the WAP proxy. Web Server WML WAP Proxy WML HTML HTML Filter Wireless Network BinaryWML MS WTA Server Figure 27: An example of WAP network 5 Actually, WAP redefines HTTP and splits it between WSP and WTP. page 54 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks In every case the proxy encodes the responses from the web into the compact binary format understood by the client. 4.1.3 The WAP architecture The WAP architecture is designed in a layered stack as shown in Figure 28. A set of well-defined interfaces enables each of the architecture layers to be accessible by the upper layers or directly by external applications (e.g. electronic mail, calendar, phone book, electronic commerce) or services (e.g. white and yellow pages). The leftmost stack shows WWW architecture for comparison sake. The mapping should be meant only as indicative, because it is not possible to trace a one-to-one layer correspondence between the two protocol stacks. INTERNET HTML JavaScript WAP Application Layer (WAE) Other Services and Applications Session Layer (WSP) HTTP Transaction Layer (WTP) TLS - SSL Security Layer (WTLS) Transport Layer (WDP) TCP/IP, UDP/IP Bearers: GSM-SMS GSM-USSD GSM-GPRS Etc… Figure 28: WAP Architecture 4.1.3.1 WAE The Wireless Application Environment is an application framework based fundamentally on WWW technologies and philosophies, adapted and extended to support also Mobile Telephony services. WAE technologies offer a micro-browser environment, provided essentially with: WML, a lightweight language similar to HTML but optimised for use in mobile terminals WMLScript, a script language similar to JavaScript to give dynamism to WML pages WTA and WTAI, a collection of libraries and interfaces for call and feature control mechanisms at disposal of content programmers to develop advanced Mobile Telephony Services Standardised data formats for e.g. images, phone book records, calendar event, and business card… 1999 EURESCOM Participants in Project P810-PF page 55 (109) Principles and Solutions for IP based Mobile Networks 4.1.3.2 Deliverable 4 WSP The Wireless Session Protocol is currently suited for browsing applications, and it is optimised for narrow-band bearers with long latency. It provides WAE either connection-oriented or connectionless session services. It includes HTTP functionality extended with facility for long-lived session states, data push and session suspend/resume. 4.1.3.3 WTP The Wireless Transaction Protocol is necessary to reliably support browsing applications, which require request/response mechanisms (i.e. transactions). It relieves the upper protocols from re-transmissions requests or acknowledgments when datagram services are used, and improves efficiency for connection-oriented services. It is designed to efficiently operate in wireless datagram networks and for implementation in “thin” clients. 4.1.3.4 WTLS Based on the industry-standard TLS, the Wireless Transport Layer Security provides data integrity, privacy, authentication between two communicating applications. 4.1.3.5 WDP The Wireless Data Protocol represents the transport layer of the WAP stack and operates above the data capable bearer services supported by various networks, acting as a “convergence” layer between such data services and the rest of the protocol stack. This is accomplished by adapting the transport layer to the specific features of the underlying bearer (e.g. GSM SMS, GSM USSD, GSM GPRS). Since each transport mechanism offers different qualities of service (in terms of throughput, bit error rate and delays), the WDP has to compensate for or tolerate these varying levels. As an example, the WAP transmission plane suitable to work over a GSM-GPRS bearer is shown in Figure 29. The GPRS is one of the several possible instances of the wireless network, depicted in Figure 29 offering a transport service to the communications between a mobile client and the WAP proxy (or server). page 56 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks WAE WAE WSP WSP WTP WTP UDP UDP IP SubNetwork SubSubNetwork Network IP Tunnel Tunnel SubNetwork TCP/IP Or Other SubNetwork TCP/IP or other SubNetwork Physical Physical Physical Base Station SubSubNetwork Network GSM RF MS GSM RF Physical BSS Physical Physical SGSN GGSN WAP Proxy/Server Figure 29: WDP architecture The messages issued by the WAE user agent are sent to the WSP. According to the fact that the service is connection-oriented or not, it sends the packet to the WTP layer or directly to the WDP layer. In the GPRS case, the WDP consists of a UDP layer, indicating the WDP destination port addressed in the WAP proxy and WDP source port. The UDP operates above the IP layer running on the Mobile Station and providing a logical connection all through the GPRS network up to the GGSN. The Gateway then sends the WDP packets to the WAP proxy via a Tunnelling Protocol, which is the interface between the Gateway that supports the GPRS service and the WAP Proxy/Server. The subnetwork may be again TCP/IP, X.25 or any common networking technology chosen by the operator. 4.2 Server-based VHE Currently the VHE service requires either to access (at the home network) or download (to the visiting network) information or data describing the user service profile, service logic programs, specialised announcements and voice print patterns. VHE services are based on generic WIN (Wireless Intelligent Network) services. In GSM phase 2+ and UMTS, WIN services will be provided on top of the CAMEL (Customised Application of Mobile Enhanced Logic) platform, that defines protocols and service creation environments ([66], [67], [68], [69]). CAMEL summarises IN service logic components into the CAMEL Service Environment (CSE) and allows for service provisioning by third party providers (TPP). Figure 30 depicts the functional architecture to support WIN services based on CAMEL. Communication between Location registers, MSC and SCP at application level is covered by MAP [70]. Communication between SSF and SCF is covered by CAP [69]. Both rely on TCAP. VHE provisioning requires either temporary download of user service profiles from home network to visiting network (shadow home service), relaying SSF queries from the visiting network to the home network's SCF (relay home service), directly interfacing SSF in the visiting network with the home network's SCF (direct home 1999 EURESCOM Participants in Project P810-PF page 57 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 command) or interfacing call control functions of visiting and home network (actual home service). In an IP based architecture server based VHE refers to either provisioning of VHE services to IP based SIP or H.323 clients, or provisioning of IN services to VHE using IP-based servers. Providing IP-server based VHE to IP-based clients seems to be out of scope, since roaming between different IP-based access networks connected to an IP-based core network could be handled completely by Mobile IP. But, since Mobile IP still poses security threats to home network and visiting network, it is not yet widely accepted. Roaming between IP-based access networks inter-worked to an SS7 core network might be handled e.g. by the Diameter protocol suite [71]. Home Network HLR MAP SCF CAP MAP MAP CAP SSF VLR SSF Gateway MSC Anchor MSC Interrogating Network Visiting Network HLR: Home Location Register MSC: Mobile Switching Center VLR: Visitor Location Register SCF: Service Control Function SSF: Service Switching Function CAP: CAMEL Application Part MAP: Mobile Application P art Figure 30: Functional Architecture for CAMEL Support according to [66] 4.2.1 IP-based VHE service provisioning The direct way to implement an IP-based VHE server is to act as a third party provider (TPP) and to provide the functionality of a service node to the CSE. Enhanced user/service interaction then might be implemented to the TPP e.g. as a web server. In this scenario a VHE server is able to execute service logic programs. Alternatively a VHE server might be used to download service profiles only. But service logic programs and user data might become quite large (e.g. 4000 SIBs rsp. 200 Mbytes of compiled code for an IN video conferencing service) and demand for a common execution environment. Although a common execution environment for service logic programs probably will be available (e.g. by executing Java byte code), the mere amount of data for downloading currently will have a severe impact on the overall network performance and will rise the post-selection delay to an unacceptable level. In the scenario depicted by Figure 31, SS7 signalling transport relies on IP. In the IETF several draft proposals currently are dealing with IP/SS7 interworking that focus on the provision of IP services to support TCAP over IP (e.g. [72][74]). Simply speaking, the services provided by MTP3 will be mapped onto IP. Another point is the addressing of SS7 entities by IP which is treated by e.g. [73]. page 58 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks In the UMTS domain, the signalling gateway should be co-located to the GGSN for performance reasons. Alternatively it is possible to co-locate the gateway to the SGSN and to use GTP for tunnelling TCAP over IP or physically co-locate the gateway to the MSC as a dedicated functional entity. In the TPP domain, signalling gateway and SCF should be co-located or, for performance reasons, might be integrated into one functional entity talking CAP over TCAP over IP to an IP-enabled SSF. Finally, in an IP-based VHE server environment a high level of security (in terms of authorisation, authentication and encryption) is mandatory, since dynamically downloading or enabling access to new services will also dynamically reconfigure the SSF by generating and deleting service trigger conditions. MSC BSSAP SGSN GTP GGSN IP GGSN+ SSF TCAP Signalling Gateway CAP IP-based Core Network TCAP over IP TPP Signalling Gateway SCP TCAP SCP Figure 31: Sample architecture for an IP based VHE Server 1999 EURESCOM Participants in Project P810-PF page 59 (109) Principles and Solutions for IP based Mobile Networks 5 Deliverable 4 Key elements for integration A number of key elements have been identified as critical for the integration of IP networks and traditional mobile telecommunication networks as well as for the harmonisation of communication protocols used in both worlds. In detail these are: Call Control; Mobility Management; Subscriber profiles; IN services; Signalling transport. The following sections will treat those key elements in some detail in order to give a clear view on requirements, available solutions and critical issues on the integration of connection oriented and connectionless portions of future mobile telecommunication networks. 5.1 Call Control aspects In the evolution towards UMTS, call control and session management for basic voice calls and PDP context establishment will be based on principles known from GSM. Nevertheless, multimedia services in UMTS will require additions that allow call handling using elements from H.323 or related standards [93], [94], [95]. Current proposals aim to run a call control and session management protocol for multimedia calls transparently via a PDP context established using GSM session management in order to allow transparent handover and roaming between GSM and UMTS, provided that GSM is capable of supporting the ongoing media service. For this purpose, it is envisaged to use IP call control based on H.323 and related protocols and probably IETF SIP and related protocols although the latter is not yet widely accepted. Evolving from the internet telephony and the video over LAN section currently the IETF RFC2543 for SIP (Session Initiation Protocol) and the ITU-T "umbrella" standard H.323 are providing a framework for audio, video and data communications over IP-based networks. IP call control is provided as a component function within. Compared to H.323, SIP is a fairly new proposal that claims to be easier for implementation and to provide faster connection set-up. On the other hand H.323 claims to be a more mature standard and becomes now widely accepted by the communications equipment industry. Additionally version 2 of H.323 provides fast connection set-up procedures. 5.1.1 Basic IP Call Management IP call management basically has to implement servers or gateways function based services for each of the listed topics. Call Control This includes application level signalling for call establishment (point-to-point and multipoint calls using unicast and/or multicast transport of media stream data), for authentication, for authorisation and admission control, for address page 60 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks resolution, for user mobility support and for call forwarding/call distribution as well as for end-system capability exchange. Related topics are the specification of addressable entities and signalling transport requirements (assured/unassured or multicast) as well as server requirements (stateless or stateful) and security (e.g. encryption of signalling messages or media streams). Call Control services This includes registration and location services for users and end-systems as well as redirection and proxy servers, alias resolution services and servers for multipoint conference establishment and/or call centre applications. In a wider sense, multipoint conference management (e.g. distribution of invitations, joining of conferences) and management of external multipoint control units (MCU) are services to IP call control. Additionally, interworking with non-IP based networks like N-ISDN, B-ISDN or GSTN requires signalling gateways and the management of media stream gateways. Interworking with location services of end-system mobility enabled transport networks is mandatory especially when roaming between different access networks. Resource control Due to its best effort nature, resource control and QoS provisioning in the context of IP relies on proper interfacing with the underlying transport layer. For this purpose, e.g. RSVP [47] provides a way of signalling resource requirements and policy parameters and gives an abstract description of transport layer management interfacing. Additionally, bandwidth management (e.g. on behalf of clients without resource management facilities and in conjunction with admission control) and management of multipoint control units are possible resource control server functions. Media stream control This includes media stream synchronisation, type conversion and encryption as well as merging and distributing media streams in multipoint conference calls (e.g. by dedicated media processors). Billing/Charging Since charging strategies for packet based and circuit switched networks are quite different and due to increased service resource requirements for multimedia calls within packet based networks, dedicated servers might be required to support resource reservation requests and/or interworking with circuit switched networks. Mobility support To support personal mobility, either passive methods (e.g. sending registration requests to a location server) or active methods (e.g. location detection by active badge systems) might be used. This results in call redirection or forwarding to certain end systems, or trying several possible user locations. Mobility also might be provided either by Mobile IP or by location management facilities of an underlying end system mobility enabled transport network. 1999 EURESCOM Participants in Project P810-PF page 61 (109) Principles and Solutions for IP based Mobile Networks 5.1.2 Deliverable 4 H.323 call control In its revision 2, the H.323 recommendation for packet-based multimedia communications provides a framework for audio, video and data communications across IP-based networks [54]. It relies on several accompanying recommendations such as H.225.0 [61] (call signalling and media stream packetisation), H.245 [55] (control protocol and format negotiation), H.450.x [62][63][64] (supplementary services) and H.332 [65] (support of panel-style conferences). H.323 signalling is based on Q.931 [56]. H.323 messages are encoded using ASN.1 PER. H.323 requires reliable transport using TCP for control information except for registration, admission and status messaging (RAS) that requires UDP. Media stream and related control information (RTCP and RSVP) transport relies on RTP [57] respectively UDP. Interworking is specified in several accompanying recommendations (e.g. H.246) with N-ISDN (H.320 and H.322) terminals, GSTN (H.324) Terminals and B-ISDN (H.310 and H.321) terminals to be implemented by a signalling and media stream conversion gateway. Media stream encryption is optional to H.323 and follows recommendation H.235. H.323 introduces the gatekeeper as an optional network management entity to provide call control services to an H.323 zone (a zone is defined by its managing gatekeeper). The gatekeeper is responsible for address translation (alias addresses to transport addresses), user registration, admission control, bandwidth control and zone management via RAS channel signalling. A gatekeeper may also provide services like call management, bandwidth management, call authorisation and directory services. An H.323 network may consist of none, one or more connected gatekeeper entities. The inter-gatekeeper protocol is not specified. To connect an H.323 network to the outside world, a gateway has to provide translation functions for signalling and media streams. In this case a gatekeeper is mandatory since it is responsible for translating incoming call addresses to network addresses. H.323 addresses are either H.323 entity network addresses (e.g. hostnames or IP addresses), connection endpoint addresses (TSAP, e.g. port numbers) or aliases. The network and TSAP address formats are specific to the underlying network architecture. Alias addresses might be e.g. E.164 addresses (optionally including zone specific access codes), e-mail addresses or more general alphanumeric strings representing names (H.323 Ids). H.323 alias addresses are unique within a zone and may reference a host, a conference or a user. Optionally location services and proxy servers are provided by a gatekeeper. That is, a gatekeeper might perform call routing and connection setup on behalf of its clients to achieve call screening or to locate a user by successively trying to connect to different endpoints. One of the deficiencies of H.323 - its complex and rather slow connection setup procedure - has been addressed by the fast connect procedure introduced in version 2 of the recommendation. This allows clients to start media stream transmissions immediately after the call setup phase shown in Figure 32 or even overlap the setup with media stream delivery. page 62 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Caller Gatekeeper Callee ARQ (RAS) Authentication ACF/ARJ TCP SYN * TCP SYN ACK ACK Setup (H.225) Call Proceeding ARQ (RAS) ACF/ARJ Alerting Connect Call Setup Authentication SYN ** SYN ACK ACK Termcap set (TCS)/master-slave Capability Exchange TCS/master-slave/TCSack/MSack TCSack/MSack/Open logical channel (OLC) OLC OLCack OLCack Media Stream Establishment RTP Session * ** Starting TCP session for H.225 Media Stream Connection Setup Starting TCP session for H.245 Control Protocol Connection Setup Figure 32: Sample H.323 connection set-up (simplified RAS signalling ) According to H.323, a gateway has to reflect the characteristics both of a circuit switched terminal and of a packet based H.323 network endpoint in an H.323 network, in a transparent fashion. This includes the conversion of signalling information as well as the transcoding of media stream format. Simply speaking, an H.323 terminal appears as a native ISDN, B-ISDN or PSTN terminal to the interworked network. Depending on the architecture and capabilities of the gateway conversion function, the H.323 terminal might access available network functions (e.g. IN) either directly or through the help of a gatekeeper/proxy. H.323 does not specify gateway or routing functions that do not use H-series protocols, which means that interworking functions to different protocols (e.g. to access SIP servers) are not considered to be H.323 gateways. Architectural details of H.323 gateways are vendor specific and might include conversion functions or use protocols that are not covered by the standard, e.g. RSVP [47]. 5.1.3 SIP call control SIP generates HTTP-like text based messages of variable length [49]. SIP messages are either a request from a client to a server or a response from a server to a client. The protocol does not require assured message transfer and thus can be used atop UDP or TCP. Parallel requests are supported (sending multiple requests without waiting for individual responses) and multiple SIP transactions can be carried in a single datagram. SIP servers are usually stateless. 1999 EURESCOM Participants in Project P810-PF page 63 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 SIP addresses are called SIP URLs and may contain components like (or similar to) email addresses, host names/numeric IP addresses or proxy/gateway addresses and thus may reference either persons, locations or services. A SIP URL and session description might be embedded into a web page. Clicking on that link might trigger the invitation for a conference referenced by this link. A SIP URL might also include a phone number and a gateway address or name to reference a user via an internet telephony gateway to the PSTN [53] or address a user agent server. Due to its text based messaging, protocol extensions are introduced by defining new keywords (request/response headers) as e.g. done by [50] to request the called to setup a multi-party call. User data, i.e. multimedia data streams, then are handled by an appropriate RTP session. In this case SIP relies on RSVP [47] (resource reservation), RTP [57] (realtime transport), RTSP [58] (real-time streaming media control), SAP [59] (session announcement) and SDP [60] (session description) for multimedia session establishment. SIP supports media encryption using SDP and caller and called authentication using HTTP mechanisms. SIP location services are invoked from a proxy or redirect server whenever information about the possible location of a user is required. A request to a location server might return one or more user addresses, or none if a user could not be located. This may include a query to the domain name services (DNS) to resolve the hostname portion of a SIP URL. Depending on the type of connection request (invitation), a list of user addresses then might be interpreted to set-up a connection to the first address, to the first available address or to all addresses of the list. A proxy server acts both as a server and a client to either internally process the request or to perform requests on behalf of the client, e.g. after address translation. A redirect server responds to a client request by providing one or more addresses to the client, e.g. to redirect a call to a new location if the user moved to a different host or location (Figure 33). Obtaining information about the location of a user might be either active, e.g. using an active badge system for individuals, or passive by a registar accepting registration requests from the user. A registrar is often co-located with a proxy or redirect server. SIP interaction with location services is not specified. In this context SIP location services might be implemented by a gateway to GSM/UMTS location registers. For address resolution SIP uses services from the underlying IP network (e.g. ARP). Interworking between SIP and PSTN or ISDN is proposed to be provided by dedicated SS7 signalling and media gateways [52][53]. The IETF currently is working on a specification to allow the termination of native SS7/ISDN or in-band (e.g. DTMF) signalling at the gateway, but work is in a quite early stage. It is assumed that interworking with e.g. Q.931 is straightforward. page 64 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Host (Redirect Server) Caller INVITE name@host Location Service Caller INVITE name@host location request Location Service Host ( Proxy Server) location request name1@host1 302 Moved name1@host1 name1@host1 Called INVITE name1@host1 ACK Called INVITE name1@host1 200 OK 200 OK 200 OK ACK ACK RTP Session ACK RTP Session Figure 33: Sample SIP connection set-up using Redirect and Proxy Servers 5.1.4 Gateway architecture The ETSI Project TIPHON (Telecommunications and Internet Protocol Harmonisation Over Networks) specifies interoperability mechanisms to enable multimedia communications between circuit switched networks and IP based networks. The TIPHON gateway is composed of a signalling gateway, a media gateway and a media gateway controller. One or more of these can be co-located and may also be combined with gatekeepers or with other gateways. Gatekeeper D Gatekeeper F C Media Gateway Controller A Back End G J Signalling Gateway E.b Sw itched Circuit Network N B Terminal Media Gateway E.a TIPHON Gate way Figure 34: ETSI TIPHON Gateway Architecture The Signalling Gateway provides the signalling mediation function between IP and the circuit switched domain. It may support e.g. H.323 in the IP domain and channel associated or non-channel associated signalling in the circuit switched domain. The Media Gateway provides the media mapping and/or transcoding functions. It maps (e.g. tandem free operation) or transcodes the media in the IP domain (e.g. media transported over RTP/UDP/IP) and media in the circuit switched domain (e.g. PCM encoded voice, GSM, etc.). The Media Gateway Controller is located between the Media Gateway, the Signalling Gateway and the Gatekeeper. It provides the call processing (call handling) 1999 EURESCOM Participants in Project P810-PF page 65 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 function for the Gateway: it receives signalling information from the circuit switched network and IP signalling from the Gatekeeper and controls the Media Gateways. The ITU-T H.323 Gateway functional decomposition is shown in Figure 35. Sw itched Circuit Network Signalling Signalling Gateway H.323 Signalling Gateway Controller RAS Signalling H.225 Signalling H.245 Signalling B High La yer Resource Control Gateway Control Logic SCN Signalling C SCN Sig. T ransport D A Low Layer Resource Control Packet Netw ork Media Termination Media Gateway Sw itched Circuit Netw ork Figure 35: ITU-T H.323 (SG16) gateway functional decomposition The Media Termination function terminates media streams in the packet and circuit switched domains and provides the required conversion functions. The Gateway Controller relies on the interface A protocol to create, modify and delete Media Gateway connections. Signalling interworking between the packet domain and the circuit switched domain is performed by the Gateway Control Logic component. The interface B protocol supports packet signalling transport and interworking between H.323 (i.e. H.225, H.225 RAS and H.245 protocols) and the Gateway Control Logic. Interface C describes the ISDN type call control function between the circuit switched domain and the Gateway Control Logic whereas interface D protocol conveys nonchannel associated circuit switched signalling . This decomposition preserves SS7 code points and allows the SS7 switch to serve multiple decomposed Gateway Controllers. The Signalling Gateway consists of the Signalling Transport termination to handle channel associated signalling, such as the ISDN PRI D channel. The Signalling termination supports interfacing with SS7 signalling transfer points. Resource control consists of a high level and a low level portion. High Layer Resource Control handles resources in the Gateway Controller. Low Layer Resource Control handles resources in a media gateway device. 5.1.5 IP call management in UMTS At the current status of discussion in 3GPP, call management of multimedia calls in UMTS R00 might be based on IP call control and session management probably using H.323. This scenario requires special provisions for roaming users regarding the role page 66 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks of gatekeepers. Figure 36 depicts the scenario for a mobile multimedia call between two H.323 users. H.323 Client A BS RNC SGSN Sitekeeper RNC User Gatekeeper NAT/ALG BE Operator C Domain BS H.323 Gateway GGSN SGSN H.323 Gateway GGSN Sitekeeper Operator A Domain (Client A' s Home Netw ork) User Gatekeeper NAT/ALG BE H.323 Client B BS RNC SGSN Operator B Domain (Client B' s Home Netw ork) H.323 Gateway GGSN Sitekeeper Telecom IP Interconnection backbone User Gatekeeper NAT/ALG BE Figure 36: Sample H.323 roaming scenario in UMTS In this example, Client A is roaming from its home network (Operator A) to Operator C and Client B is staying at its home network. All operators are assumed to provide gateways to the circuit switched domain (H.323 Gateway) and connect to the IP domain via some type of NAT (Network Address Translation)/ALG (Application Layer Gateway)/BE (Border Element) entity. In a first step Client A and Client B have to perform a PDP context activation involving MT, SGSN and GGSN. As one result a best-effort radio access bearer will be established between MS and SGSN to be used for identification and registration of the User Gatekeeper. The clients next identify their respective gatekeepers and register using H.225 RAS control signalling. Requests and replies from/to Client A are forwarded via the Operator C domain Site Keeper to A's home network User Gatekeeper. During H.323 call set up clients establish a new PDP context requesting real-time radio access bearers in order to decrease transmission delay for H.323 control signalling and for media streams. Clients then set-up the H.323 call according to Figure 32 starting with a Q.931 Setup message send to their User Gatekeepers. Client A messages are forwarded by the visited Site Keeper, whereas Client B messages are sent to Client A's User Gatekeeper which in turn forwards them to the visited Sitekeeper and then to Client A MT. In order to establish media streams between Client A and Client B, one or more RTP "connections" are established between both of them. The required location and routing information is provided by the corresponding User Gatekeepers. 1999 EURESCOM Participants in Project P810-PF page 67 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 If Client A wants to set-up a call to the circuit switched domain via a H.323 gateway, call processing is performed much the same way, except that the H.323 gateway of the visited network is used. For this purpose, the visited Site Keeper performs message forwarding between Client A and its home network User Gatekeeper and, respectively, between the User Gatekeeper and the visited network H.323 Gateway. It should be noted that this general scenario could be easily mapped with the last proposals for 3GPP Release 2000 all IP based solution [124]. In that solution Site Keeper, User Gatekeeper and H.323 Gateway functions are combined into a single network element called CSCF (Call State Control Function). 5.2 Mobility Management integration/interworking This chapter proposes a way to provide an integrated mobility management mechanism in the IP domain and review possible solutions. In our contribution, the term 'Mobility Management' (MM) covers mainly two functions: Registration, The process by which a user accesses a service through a terminal and a communications infrastructure. This may entail the allocation of an address used by the infrastructure to establish communications to the user, to check subscription rights, … Location management. In a general manner, in fixed networks for instance, addresses serve as both Locators (routing indication) and Identifiers (user indication). In mobile networks such as UMTS/IMT-2000, personal and terminal mobility require to separate these two roles in different semantics and to maintain a dynamic mapping between them (e.g. in GSM mapping between IMSI and Roaming Number). This is the role of the location management mechanism. There have been detailed studies of this problem for IPv6 - see [28] for details. Both of these functions require to authenticate the user to avoid impersonations (communications routed towards a non-intended recipient) or fraudulent usage (access to the infrastructure by a non-authorised user). 5.2.1 Architectural Options Several architectural frameworks are being proposed both in the mobile and IP worlds, that could be used to fulfil the Registration/Location Management/Authentication functions: Application-specific schemes for web access; media streaming, VoIP, … Mechanisms for current fixed and mobile networks, ISP dial-up… 'Out-of-band' Authentication Authorisation and Accounting in the IP domain Mobile-IP 'end-to-end' In the next paragraphs, these different approaches are detailed and illustrated by some examples. 5.2.1.1 Application-specific mechanisms The 'Mobility Management' model currently in use in the Internet community relies on application-level mechanisms to achieve host/server location transparency and resolve page 68 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks the Identifier/Locator dilemma posed by 'overloaded' IP addresses. In IPv4 and v6, it has been chosen to use 'overloaded' addresses (i.e. that are both locators and identifiers) in order to preserve the scalability of existing and future IP routing mechanisms [28]. Application-specific MM mechanisms include: 5.2.1.2 DNS [116] with the possibility of dynamic updates [118] to enable the resolution of host names that acquire IP addresses dynamically through DHCP [119], potentially through different service providers. Web (HTTP)-based applications often use ad-hoc or proprietary authentication mechanisms to allow access to certain services e.g. 'secured' web pages or extranets, free email services … SIP [49] provides the ability to query a 'Location Service' (not defined by SIP) as part of a multimedia session setup procedure (e.g. for VoIP). This Location Service enables to map a user 'name' to its current point of attachment to an IP network. SIP also provides a 'REGISTER' method to allow users to update the Location Service with e.g. their current IP address. Current network schemes Some Layer 2 mechanisms are in existence that enable roaming. Roaming can be defined as 'the ability to use any one of multiple Services, while maintaining a formal, customer-vendor relationship with only one Service Provider' (definition loosely adapted from [25]). Such mechanisms include: UPT for IN-enabled fixed networks MAP for GSM networks PPP and RADIUS [16] for Internet Service Provider (ISP) dial-up… However, in the context of UMTS, we require a global roaming capability. This requires either to: Perform interworking between the various mechanisms. Repeat Mobility Management (MM) procedures that perform the same function several times with the different infrastructures. For instance, in the case of GSM Internet dial-up access, authentication is first performed with the HLR when powering the handset and later when accessing the ISP's NAS with PPP and maybe RADIUS. Clearly, while it is possible that in the short term separate MM infrastructures will coexist, the longer-term goal is an integrated framework that alleviates the need for interworking or functional duplication. 5.2.1.3 'Out-of-band' AAA infrastructure In the IETF roaming groups (roamops) [25] and AAA [20] working groups, two approaches to a standard 'Roaming' infrastructure are being proposed. The two proposals share similar concepts: they specify application-level protocols between IP hosts and an 'infrastructure' of servers and proxies that perform NAS configuration and mediate between ISPs to exchange subscriber data such as 1999 EURESCOM Participants in Project P810-PF page 69 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 authentication parameters (algorithms, passwords…), service profiles (e.g. user wants to be connected to ISP1 between 08.00 and 18.00 and to ISP2 outside these hours)… However, roamops target specific requirements for roaming between ISPs; whereas AAA has the much broader scope to enable 'policy' implementation in IP networks. Such policies include roaming and authentication but also cover diverse topics such as QoS… Recently the IESG, a supervisory board for IP standards, has ruled that roamops should stop specifying its own AAA protocol (DIAMETER [71]) and adopt the solution currently being specified in the AAA IETF working group. However, many players believe that the AAA protocol will not be available in the next 2 to 3 years. It is therefore likely that roamops will carry on with DIAMETER while putting its requirements to AAA. 5.2.1.4 Base Mobile IP and Mobile IP 'end-to-end' Lastly, Mobile IP provides in-session mobility to IP hosts and is on its way to become an IETF standard. However, in its basic form, Mobile IP does not cope efficiently and securely with mobility between administrative domains, a key requirement for IMT-2000. The main thrust of recent work in the IETF Mobile IP working group is trying to address this issue of robust interworking between Mobile IP's procedures and other frameworks such as AAA [20], roamops [25] or cellular networks. With the Tunnel Establishment Protocol (TEP [27]), the possibility of splitting the various functions of base Mobile IP mobility agents between arbitrary numbers of Surrogate Agents is opened up. Such Surrogate Agents could act as 'flexibility points' for the Mobile-IP tunnel setup procedure/ registration update at which integration with other frameworks can happen, transparently to the Mobile IP clients. This is what we call 'end-to-end' Mobile IP, because here Mobile IP carries all the information needed by the other infrastructures (e.g. AAA or cellular) in extensions to Base M-IP messages. The Mobile Host is not involved since it is Surrogate Agents and not Mobile Nodes who perform the necessary interactions. A series of Internet Drafts have exploited this idea to serve specific requirements: Dynamic Home Address Allocation [42], THEMA, Regional Tunnel Management [45], … For instance, using TEP and Mobile IP DIAMETER extensions [46], Surrogate Agents can check AAA policy before allowing the tunnel setup across provider networks' boundaries. 5.2.2 Architectural Proposals This paragraph presents several ways in which the architectural frameworks from the previous section could be integrated to fulfil the global roaming requirement of IMT2000. 5.2.2.1 Cellular networks and AAA Since both cellular networks and IP networks maintain user authentication mechanisms, there is an opportunity to integrate the two functions for both types of services given that with IMT-2000/UMTS mobile internet access will proliferate. page 70 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks The issue here is what route should this integration take? Two possibilities exist: 1. Use the cellular HLR/AuC (or equivalent functions) as 'back-end' policy databases for AAA servers (be they RADIUS, DIAMETER or future AAA protocol…). 2. Directly interface the HLR/AuC with AAA proxies. In effect, this case strips out the AAA server of the IP network and uses the cellular functions as a replacement. This may however require more extensive modifications to the HLR or a new IWF to mediate between the SS7 interface of the HLR and the IP interface of AAA proxies. VLR SS7 networks HLR / AuC HLR / AuC Possible integration using IT (CORBA, DCOM…) Cellular Infrastructure Policy Database / subscribers profiles AAA server 1 Policy Database / subscribers profiles Policy Database AAA proxy AAA broker AAA proxy AAA server 2 AAA Infrastructure Location Service Location Service SIP Proxy FA SA Visited ISP Network Access Device: PSTN NAS, MSC IWF, SGSN, IGSN... Applications Servers e.g. session control (SIP) SIP Proxy SA Backbone Provider HA Home ISP DHCP 1 DHCP 2 Figure 37: Cellular networks and AAA integration options. Full lines represent option 1 and dotted lines represent option 2 5.2.2.2 Cellular networks and Mobile IP 'end-to-end' With Mobile IP, there is the opportunity to integrate fully Mobility Management between cellular and IP networks (Figure 38). A 3GPP feasibility study describes deployment scenarios for Mobile IP within GPRS/UMTS [2]. TIA TR45.6, the US standardisation body for IMT-2000 also proposes to integrate Mobile IP in CDMA2000 networks. With the current Mobile IP and AAA integration proposals (see previous section), there is the opportunity to fully integrate the cellular and IP infrastructures. 1999 EURESCOM Participants in Project P810-PF page 71 (109) Principles and Solutions for IP based Mobile Networks VLR SS7 networks HLR / AuC Deliverable 4 HLR / AuC Possible integration using IT (CORBA, DCOM…) Cellular Infrastructure Policy Database / subscribers profiles AAA server 1 Policy Database / subscribers profiles Policy Database AAA proxy AAA broker AAA proxy AAA server 2 AAA Infrastructure Location Service Location Service SIP Proxy FA SA Visited ISP HA Network Access Device: •PSTN NAS •MSC IWF •SGSN •IGSN... Applications Servers e.g. session control (SIP) SIP Proxy SA Backbone Provider HA Home ISP DHCP 1 DHCP 2 Figure 38: Possible integration of Mobile IP 'end-to-end' and cellular mobility management 5.2.2.3 Cellular networks, base Mobile IP and application-specific mechanisms The problem with the previous scenario depicted in Figure 38 is that it is derived from the basic Mobile IP scheme, in which whenever a Mobile Host changes FA in a visited network, the 'home' HA needs to be updated. Here it is proposed an original architecture in which the need to update a remote HA is alleviated by the introduction of an application-layer mechanism such as SIP's Location Service (Figure 39). Moreover this adds Personal Mobility on top of the Terminal Mobility provided by base Mobile IP. It proposes that in each provider domain in-session mobility is controlled by a 'local' HA, that updates an application-level Location Database e.g. through the use of a 'REGISTER' method sent to a SIP proxy. Other Authentication and Authorisation functions would be performed as normal AAA operations. With this scheme, M-IP tunnelling across provider networks' boundaries would only be needed only when a Mobile Host has a running session (e.g. VoIP call) when it changes network. After the session ends, the MH would acquire a local IP address, register it with the local HA, which would in turn update the 'home' SIP proxy. The introduction of this extra session control layer between the network and 'policy' infrastructure using SIP is similar to the Packet Cable proposals for IP Telephony [51]. page 72 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks VLR SS7 networks HLR / AuC HLR / AuC Possible integration using IT (CORBA, DCOM…) Cellular Infrastructure Policy Database / subscribers profiles AAA server 1 Policy Database / subscribers profiles Policy Database AAA proxy AAA broker AAA proxy AAA server 2 AAA Infrastructure Location Service Location Service SIP Proxy Applications Servers e.g. session control (SIP) SIP Proxy HA FA SA Visited ISP SA Backbone Provider Network Access Device: •PSTN NAS •MSC IWF •SGSN •IGSN... HA Home ISP DHCP 2 Figure 39: Using a session control layer, the need for long distance MIP tunnelling can be alleviated, with the addition of personal mobility features 5.3 Sharing user profiles Global Multimedia Mobility to be offered by 3rd generation mobile networks or future fixed/mobile integrated networks consists of the following mobility types [96]: Terminal mobility. It is the ability of a wireless terminal to access telecommunication services from several locations, even while moving, and the capacity of the network to identify, locate and track that terminal. Personal mobility. It is the ability of a user to access telecommunication services on any terminal (wireless or wired) on the basis of a personal number and the capacity of the network to provide those services according to the user's service profile. Personal mobility involves the network capability to locate the terminal associated with the user for the purpose of addressing, routing and charging the user's calls. Service mobility. It refers to the network capability to provide personalised services to the user at any user designated terminal/location and to identify the user at any access location, by supporting terminal and personal mobility. The exact services the user can invoke depend on the capabilities of the terminal at that location and on the network serving the terminal. A major characteristic of service mobility is the provision of personal service customisation capability, resulting in personalised user services: personal service customisation enables the user to define service parameters and user-specific service execution i.e. modes of service adaptation to different communication media, user location, available terminals, interfaces for service presentation and interaction, and the state of terminals. 1999 EURESCOM Participants in Project P810-PF page 73 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Service profiles provide service specific personalisation information, i.e. parameters set at the time of service subscription (e.g. default diversion numbers related to time of day), and parameters subject to service and/or user modification (e.g. data transfer capabilities). The support of customised services necessitates the extension of service profiles to user profiles. A user profile is stored for each user containing personal information for user-specific execution of user services, e.g. with respect to dedicated terminal capabilities. In the UMTS/IMT-2000 context, personal service environment portability across network boundaries and between terminals defines the concept of the Virtual Home Environment [97] VHE will be created by a combination of capabilities located in the service provider, network operators and terminal equipment. Applications/Clients Client 2 ...... Client n Application Interface Service Capability Features Service Capabilities MExE and SAT APIs HLR CSE MExE GSM/GPRS/UMTS Protocols SAT Server CAP/MAP MS Functionality, Standardized Services Terminal View GSM/GPRS/UMTS Protocols Network Figure 40: Possible VHE service framework The VHE platform most likely will be based on wireless IN service capabilities in the 3G mobile access network (e.g. CAMEL stage2+ [98]) and on IN CS 3.1+ [99] capabilities in future integrated core networks. The service execution environment in the mobile equipment will be based on MExE [100] [101] and SAT [102]. Services might be provided either by the home environment (which is responsible for the overall provision of services to users), by the serving network or by third party service providers. Hence, user profiles contain references to distributed information and thus can be seen as distributed profiles. User profiles will be stored in a secure way in the terminal (ME or SIM) and will be managed by the ME and the network. To allow modification of user profile content by the service or service provider, user profiles will be duplicated in and/or uploaded to the service environment and updated in or downloaded to the mobile terminal. 5.3.1 From service profiles to user profiles According to [97] each uniquely identifiable user profile consists of a single and unique combination of a user interface profile and a user services profile. A user may define one or more user interface profiles e.g. to match the capabilities of different terminals, and many user services profiles to identify selected services and service parameters. A User Interface Profile consists of (e.g.): menu settings (menu items shown, menu structure, placement of icons, ...) page 74 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks terminal settings (ringing tone and volume, font type and size, screen and text colour, language, content types and sizes accepted, ...) network related preferences (language used for announcements, ...). A User Services Profile consists of (e.g.): a list of services subscribed to and references to service preferences for each of those services if applicable service status. User profiles are selected and activated on a per call basis. That is, a user might establish multiple calls, each associated with a different profile simultaneously for a single terminal. For incoming calls, the user profile is selected by the user address [103]. User Profile 1 A Service Profile User Profile 2 C Service Profile Services Virtual Home En vironment Customized, Portable Ser vices: Customized as Ser vice Profi les D Service Profile A A Service Profile B Service Profile E Service Profile C D E MExE SAT Server B Home Environment & 3rd P arty Services: Built by Netw ork Oper ator or 3rd Party Application Interf ace Service Capability Features Service Capabilities HLR CSE GSM/GPRS/UMTS Protocols CAP/MAP Serving Network Service Capability F eatures: Built by Netw ork Oper ator Service Capabilities: Pre-set by Standards Network Figure 41: User customised, portable services in the VHE The MExE functional description [101] gives a more detailed impression on which elements are likely to be summarised in the user profile, although MExE does not clearly distinguish between the roles of user interface profile and user services profile. Prior to the invocation of any service specified in the selected user profile, service profiles have to be checked for compatibility with terminal capabilities and service features. This might also require uploading to the network, modification by the network, and downloading of modified profiles to the terminal. Presumably this process requires some type of user interaction or confirmation. For this purpose, the UMTS/VHE non-framework service capability feature "Terminal Capabilities" provides a way to retrieve the terminal capabilities from the information stored in the ME and the USIM using the standardised API. This information can be considered part of the user profile. 1999 EURESCOM Participants in Project P810-PF page 75 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 The underlying service capability will be provided by the capability and content negotiation support of MExE [101]. MExE capability negotiation relies on the exchange of HTTP [106] or WSP [107] messages. On top of these (or better as an extension) the W3C CC/PP (Composite Capability/Preference Profiles) exchange protocol [108] is used to describe a user agent profile (UAprof) using the Resource Description Framework (RDF) specified by the W3C [109] and the WAP forum UAPROF WG [110]. MExE content negotiation aims to find the best possible presentation of content with respect to user preferences and terminal capabilities. It relies on the existing content negotiation capabilities already found in HTTP or WSP. It is not clear at the moment, how changes in terminal capabilities during the lifetime of a call (e.g. when removing a handheld from its docking station with its keyboard, mouse and monitor) are reflected to the handling of user profiles. Although MExE supports unsolicited notification of a terminal capability change, UMTS/VHE requires the selection of a profile to take place prior to call set-up. 5.3.2 Subscriber profiles Previous sections dealt with the users view of service profiles. From the network side, additional information is required to fully describe service capability features. In IMT2000 this information is referenced as the subscriber profile [105]. A subscriber has a contractual relationship with a service provider and may also be a user, but a user does not need to be a subscriber. Users that are not subscribers may be able to modify service parameters and profiles but are not able to subscribe to services. Subscribers may authorise further users to access services. Subscriber profiles include ([104], [105]): references to, or a local copy of items found in the repository providing the user profile (e.g. terminal capabilities, service profiles, ...), standardised billing and charging user profiles, security and authentication data, and service trigger profiles (e.g. trigger conditions, trigger information, ...). To support service transportability, information contained in the subscriber profiles is downloaded from the home environment to the visited network. This allows for dynamic arming of triggers in order to reduce the signalling load between visited network and home environment. Management of subscriber profiles (and databases) is considered to be a network capability related to roaming and service portability. The management of user profiles, as discussed in the previous section, is a subset of this functionality. The (optional) service features "Service Profile Modification" and "Service Profile Interrogation" allow the user to modify respectively to make requests about some of the parameters of the service subscription. 5.3.3 Subscriber profiles in a hybrid CO/CL environment As can be seen from the previous sections and from [105], service provisioning is strongly based on IN functionality. Thus, the support of a distributed subscriber/user page 76 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks profile in a hybrid CO/CL environment mainly involves IN interworking issues with the connectionless CN as discussed in section 0. In IN CS2 the Intelligent Access Function (IAF) provides access to non-IN structured network entities, such as IP-based servers. Thus the IAF implements the IWF between CO and CL domain of Figure 45. For example, an IAF is required to facilitate the access to user profile components stored in the MExE service environment (e.g. terminal capabilities). 5.4 IN integration/interworking In the first place, this section discusses options and possible interworking scenarios for an IN service logic, located in the connection oriented part of an hybrid CO/CL network architecture, and IP based servers and services located in the connection-less portions, probably sharing the same transport network. In this context, CO/CLinterworking mainly is assumed to provide additional opportunities for enhancement of existing IN services or for providing new services. From the users side of view, those enhanced or new services might include, for example: to use TCP/IP-based or WAP based HTML, Java and/or Web access to perform user-to-IN service interaction, or to provide Internet access to MTs without TCP/IP support, ranging from e-mail to SMS up to Web content to speech or fax transcoding (e.g. [111]). From the operators' side of view this might include: to enable Third-party provider (TPP) service provisioning using IP-based servers, as already discussed in section 0, to share resources (e.g. transcoding units) between the CL/IP domain and the CO/IN domain. Additionally, simultaneous access methods from a terminal located in the mobile domain to IN services and IP-based servers located in the CO respectively CL parts are addressed. 5.4.1 Network architecture For discussion of Interworking scenarios and access methods, a hybrid network architecture as depicted in Figure 42 is assumed. 1999 EURESCOM Participants in Project P810-PF page 77 (109) Principles and Solutions for IP based Mobile Networks Server MT BSS Server Operator Backbone SGSN Server GGSN IWU Radio Access Connection Less Inter net Firewall IN Service Environment IP MSC/ SSP Mobile Domain Firewall Server IWU CSE SCP Deliverable 4 SCP GMSC Access Network IP LE/ SSP Connection Oriented Core Network Figure 42: Assumed CO/CL hybrid network architecture Regarding the Mobile Domain and the Radio Access, no special assumptions are made. The following discussion seems to be valid for any type of radio access network that interoperates with the type of mobile operators network under consideration. The Access Network is assumed to provide a packet service based on IP, e.g. GPRS in the context of GSM/UMTS. In the connection oriented part, WIN services are provided by the CAMEL Service Environment (CSE). The Core Network is assumed to provide IN services based on INAP respectively BINAP. Connections to the internet are assumed to be provided via firewalls or interworking units with appropriate security functions. For further discussion, it is assumed that direct interoperateability of WIN (based on CAMEL/CAP) and IN in the CN (based on INAP) will not be available in the short or medium term, also due to differing capability sets. 5.4.2 CO/CL-interworking based on Intelligent Peripheral Figure 43 emphasises three different cases of interworking using an intelligent peripheral node as an interworking unit to the CL network: page 78 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Server Server Operator Backbone SGSN Server GGSN 1 MT BSS IN Service Environment IP MSC/ SSP Radio Access 3 Firewall IWU CSE Mobile Domain Connection Less Inter net 2 IWU SCP Firewall Server SCP GMSC Access Network IP LE/ SSP Connection Oriented Core Network Figure 43: Intelligent Peripheral based interworking scenario is the intra-operator scenario, where the IP interfaces the service logic to IP-based servers connected to the same operators connectionless backbone in order to provide e.g. gateway services like an SMS or fax interface to e-mail services. provides access to WAN servers e.g. for Web access using transcoding units (e.g. text-to-speech), IP-telephony or intra-/interoperator connections via the global internet. is addressed only for the sake of completeness. Since the IP must not assume special functions for the addressed IP-server, this case covers the same functionality as for case . A fourth case, where the CN IP accesses a server connected to a mobile operators backbone is omitted since it has significance only in the context of fixed/mobile convergence. An Intelligent Peripheral (IP) might take the role of a specialised resource function (SRF) and service data function (SDF) to the IN service logic. It might also execute part of the service logic, which does not conform to the standards, but nevertheless might become necessary in order to implement complex services or to interact with IP-based servers. In the latter case, the IP takes the role of an interworking function i.e., it acts as a server to the service logic and as a client to the IP-based server. Usually, the Intelligent Peripheral is active only for the time the service logic needs to process (i.e. establish) the call. In special cases, e.g. for complex services, the user might need to modify the call or to directly control functions of the IP and co-located interworking functions during the whole lifetime of the call. In this case the service logic partly executes on the IP service node in order to free scarce SCP resources. Interaction with the service usually takes place by in-band signalling. Additionally, IN CS2 enables call associated and non-associated out-of-band signalling by its user to IN service interaction feature (USI). The USI capability is an end-to-end application protocol restricted to short messages and low bandwidth signalling . Thus it is not suitable for extensive interaction with the service, but might be used to invoke a dedicated resource interface function and to establish a control connection to the IP 1999 EURESCOM Participants in Project P810-PF page 79 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 service node. It might also be used to download the code for the resource interface function to the terminal, which enables the service to adapt to the terminal capabilities. Figure 44 shows an example for user interaction with the service logic for these cases. SCP Service Logic USI Server Signalling LE/MSC MT USI RIF IP SSP Control USI SDF SRF IWF Backbone Application Data IWF Figure 44: User/Service interaction example Currently the USI capability is not available for CAMEL stage 2, since CAP [69] is an extension to IN CS1 and maps its InitialDPArg BearerCapability parameter for compatibility reasons to the ISUP [112] User Service Information field used for USI in INAP. 5.4.3 Service logic interworking The interworking scenarios depicted in Figure 45 are based on the assumption that tunneling TCAP messages through IP is supported. In this case part of the service environment is relocated to IP-based servers in the connection-less domain. Encapsulation of TCAP messages into TCP/IP packets must be performed by a dedicated interworking unit. These scenarios resemble those discussed in the previous section, if the Intelligent Peripheral is migrated to the connectionless domain. Thus, this is a more evolved scenario compared to the interworking based an intelligent peripherals. IN CS2 introduced an Intelligent Access Function as a special case of a dedicated interworking unit. The IAF network entity resides in the non-IN (here CL respectively IP) network. It provides access to and from the SCF of the IN-structured network and maps the information between the internal and external representation. Clearly it is also possible to move the service logic completely to the connectionless domain. Although this might be suitable in selected scenarios (e.g. if the network infrastructure relies on VoIP only), it is a bad idea to replace a well established and robust IN infrastructure without a good reason. Nevertheless it seems reasonable to migrate a certain set of services (including the service logic) to the connectionless domain. In the first place, this can increase the scalability where a single SCP per service becomes a bottleneck for a complex service (such as a video conference). In the page 80 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks connectionless domain the service request simply might reference an IP-based server farm e.g. via IPv6 anycast. Another reason might be that the requested service is implemented completely in the connectionless domain such as an e-mail or Web interface. Server Server Operator Backbone SGSN Server GGSN 1 MT BSS 2 Firewall 3 IWU Firewall IWU IN Service Environment SCP IP MSC/ SSP Radio Access Connection Less Inter net CSE Mobile Domain Server SCP IP LE/ SSP GMSC Access Network Connection Oriented Core Network Figure 45: Service logic interworking scenario In Figure 45, again is the intra-operator scenario for providing e.g. gateway services. e.g. provides access to IP-based TPPs outside the mobile operators network. Clearly, security issues like authentication and encryption are of utmost importance when opening the SSF-SCP, SCP-SDF or SCP-SRF interface to the global internet. Regarding security issues, for scenario the same holds as said before in the context of scenario . As a special case, the mobile network WIN service logic and the CN IN service might reference the same IP-based server in the connection-less core. This can be seen as a way for sharing resources and to overcome interoperateability restrictions, thus being a (limited) evolution path towards fixed/mobile convergence. Figure 46 shows a possible IP-based server architecture for IN interworking, assuming that the service logic has been moved to the connectionless domain. SSF-SCF BCSM SSF IP-IWF TCAP over IP SSF-SCF IP-IWF SCF* IP Application Layer Protocol Scatter Gather Service Logic CCF BCSM SSP IWU Connection Oriented Server Connection Less Figure 46: Simple IP-based server architecture for IN interworking 1999 EURESCOM Participants in Project P810-PF page 81 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Here the SSP exports its SSF-SCF interface to the connectionless domain using an interworking function to TCAP over IP. The core of an interworking unit to IP-based servers is a minimum functionality SCF*. It provides a minimum service logic needed to implement the basic call state model (BCSM) for originating and terminating side and interworks to the connectionless domain using a service dependent application layer protocol. Optionally a scatter/gather unit distributes service requests to one out of many servers that executes the main part of the service logic. 5.4.4 Mobile terminal access to IN services in the hybrid CO/CL scenario In a CO/CL hybrid scenario where (part of) the service logic is provided within the connectionless domain, service invocation might be handled within the connectionoriented domain and user to IN service interaction might be handled within the connection-less domain. This allows to provide a type of unified user interface to the service, based on "standard" applications like Web-browsers rather than servicespecific interfaces based on e.g. a resource interface function (with a proprietary programming interface). A typical scenario could be: 1. user at MT dials service number; 2. service triggered and service logic invoked on IP-based server; 3. service logic translates calling party number (e.g. IMSI) to IP address; 4. server sends UDP or HTTP packets to IP address and wellfined port number; a) server on MT invokes user/browser interface (if required); b) custom user interface downloaded (if applicable); 5. user interface activated and user dialogue started. Clearly this is a "best-case" scenario which requires some type of "high-end" equipment at the MT e.g., a multi-tasking/threading operating system, multiple concurrent protocol stacks and a certain degree of terminal re-configurability (Figure 47). Connection Less User Application Server/ Dispatcher Custom User Interface MT Common User Interface Packet Data SGSN Operator Backbone Server Data IWU Fax Voice MSC/ SSP SCP Connection Oriented Figure 47: Basic MT service access/interaction scenarios: fully featured MT It is a challenging task to provide service access or interaction in a manner described above also for MTs with more restricted terminal capabilities. Usually, mobile terminals are designed with a focus on size and energy efficiency, thus providing less page 82 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks processing power, storage capabilities and display/input device capabilities. E.g. in [113] some approaches for delivering graphics capabilities or Web content to thin clients are discussed on a basis of functional partitioning between wireless terminals and network infrastructure and data-specific transformation/translation. Applied to the scenario described above, if the terminal capability records in the servers data base states that the addressed terminal does not provide packet service capabilities, the service logic might establish a connection between the calling endsystem and a proxy located in the connectionless domain. The proxy then provides and controls a gateway function to the CO domain in order to perform protocol translation if the terminal has data capabilities (e.g. PPP or WAP) or content translation (e.g. text to speech) if the terminal only has voice capabilities (Figure 48). Connection Less User Application Custom User Interface Proxy Data MT Common User Interface Server (Media) Gateway IWU Data-Specific Transformer Fax Common User Interface Operator Backbone Voice MSC/ SSP MT SCP Connection Oriented Voice Figure 48: Basic MT service access/interaction scenarios: Voice&Data/Fax MTs In any case the service logic provides the same user interface to the client. User interface design thus must take into account the effects of content translation on the presentation and intelligibility of interface elements. Most likely this will require a standardisation of design guidelines. It is an interesting open issue, how an IN service can be activated from the connectionless domain if the service logic is distributed to CO and CL domains. This has some importance for MTs providing packet data service only as can be seen in the scenario depicted in Figure 49. User Application Server/ Dispatcher Packet Data Custom User Interface Common User Interface Connection Less SGSN Operator Backbone Server (Media) Gateway IWU VoIP Proxy MT MSC/ SSP SCP Connection Oriented Figure 49: Basic MT service access/interaction scenarios: Packet Data only MT 1999 EURESCOM Participants in Project P810-PF page 83 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 If IP call control and/or VoIP support is enabled in the MT and in the network, a proxy can initiate a call setup in the CO domain. If this feature is not available, there has to be some means for the IP-based server to send a trigger condition backwards to the SSF. Probably, for certain services the SCP-initiated call setup feature might be able to provide a workaround for this problem. 5.4.5 IN service logic in the TIPHON environment As discussed earlier in this section, interworking of IN and IP service logic can be achieved by the means of gateways respectively interworking functions (refer to case 1 of Figure 45). Several options are currently discussed within ETSI and ITU-T. Figure 50 gives a practical approach assuming a TIPHON gateway. In this scenario a gatekeeper provides access to the IN service logic using an INAP to H.323 gateway. Thus, IN services might be considered as backend services to the gatekeeper as discussed in TIPHON phase 2. G Gatekeeper C SCF F Media Gateway Controller A H.323/INAP Gateway E.b Signalling Gateway J SSF N CCF B Media Gateway Terminal E.a Terminal TIPHON Gate way SSP Figure 50: Sample interworking of IP and IN service logic From an IN point of view the exact location of service logic in an IP network is implementation dependent. In a H.323 scenario, service logic often will be accessible via the gatekeeper function as depicted in Figure 51. VASF VASF VASF VASF CA CA D URF H.225 H.245 Gatekeeper A RAS B Terminal URF Gatekeeper C TIPHON Gateway E CA URF VASF RAS Call Agent User Registration Function Value Added Ser vice Function Registration, Admission and Status Figure 51: TIPHON architecture service support page 84 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks The Call Agent component of a gatekeeper implements call control and access to a Value Added Service Function (VASF). The VASF might be co-located to the gatekeeper or connected via an external interface. Special attention has to be paid to service interaction with the user. If the service logic is located in the CO domain, the H.323 terminal needs to access the H.323/INAP gateway via a dedicated service node in the CL/IP domain which has to be assigned and authorised by the gatekeeper. If the service logic is located in the CL/IP domain, the gatekeeper is responsible for providing access to the service. In order to collect auxiliary information, the service logic signals with the gatekeeper Call Agent function only. Alternatively, the gatekeeper might authorise the requesting terminal to contact directly some service node (e.g. a proxy) which allows user interaction to take place during the whole lifetime of the session. This basically can be presented to the user as a regular (secure) web-server access. The latter case also applies if the gatekeeper (or an attached function) emulates an SCF and relies on entities (e.g. SDF or SRF) located in the CO domain. 5.5 SS7 integration with IP networks In the context of the integration of CO/CL networks, taking into account that the basic signalling SS7 application protocols paradigms should basically still applies in the context of MAP, CAMEL, INAP, ISUP etc…, one of the basic consideration is that, from the point of view of transport SS7 looks as a datagram network. De facto a SS7 network is a packet network specialised for the transport of signalling information, with ad-hoc addressing (global title translation, for example) and reliability characteristics. In a world that mixes a CO network like the AAL2 one with CL ones like an IP/AAL5 one, and requires an high quantity of signalling application communications between them (GPRS requires communication with HLR), it looks quite logical to verify if the deployment of a SS7 network is required. I S U P MAP CM MM T CAP I S U P MAP BSSMAP T CAP SCCP SCCP SCCP MT P MT P BSC BSSMAP TCAP SCCP - SIM - CO SCCP - SIM -CL MT P MTP - SIM SCCP BSSMAP A MAP ISUP IP ATM MT P C/D MSC/VLR HLR PSTN Figure 52: SS7 adaptation This section therefore makes some consideration about the feasibility of the transport of the SS#7 application protocols over IP. In the context of radio-mobile systems the case of the transport of BSSMAP and TCAP is considered, i.e. the provision of a SCCP simulated interface (SCCP-SIM), capable to provide both SCCP CO an CL services (Figure 52). This case could be extended to all the other protocols making use of SCCP, such as, in the case of UMTS, RNSAP and RANAP. 1999 EURESCOM Participants in Project P810-PF page 85 (109) Principles and Solutions for IP based Mobile Networks 5.5.1 Deliverable 4 General information about IP routing protocols One first consideration is that in general the IP routing protocols are extremely fast to resolve failure problems. What is still to be demonstrated is the possibility to emulate SS7 routing capabilities. As starting point some basic definitions and considerations on the most common routing protocols are provided. Internal routing: When the destination of the packet is on the same network External routing: When the destination of the packet is on a different network Address resolution: data link mapping of the IP address into a MAC address Static resolution: The routing is set by hand by the network managers, i.e. when new machines are introduced as well when some machine break, the routing tables should be updated. Dynamic resolution: it makes uses of routing protocols, in order to have a continuos dynamic update of the routing tables reflecting the current status of the network. ARP is the traditional protocol for routing within a subnet. In the case of a broadcast transport as Ethernet the mechanism is based on a broadcast request followed by unicast answers. For the external routing the host should address the router closest to the destination, for this reason the routers advertise their presence with broadcast messages sent every 7 minutes (but the hosts could stimulate the process by means of an opportune message). A router could indicate to a host the fact that there is another router closer to the destination by means of a redirection message. All these mechanisms were developed originally on network of limited dimensions, belonging to IP network used during the ‘70ies. Associated with the diffusion of IP networks , while the concept of Autonomous Systems (AS) as networks belonging to different administrations was emerging, new routing protocols were considered as described in the following sections page 86 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 5.5.1.1 Principles and Solutions for IP based Mobile Networks Interior gateway protocol: routing inside the same AS RIP [115] is a protocol between routers belonging to the same AS; it foreseen a continuos exchange of the routing information (every 30 seconds) about reachable nodes, associated with a cost function which represents the number of hops. Host refers to a default router, after that the path is optimised using the traditional redirection messages. The mechanism of generating and updating of the routing tables is in general convergent in a quick way, but in some cases of failures (when the network becomes separated in two non connected subnets), the algorithm could not converge. In order to avoid it, a limitation in the number of hops (15) is set, making this protocol non scalable for the use in large networks. Moreover the simple cost function based on hops count does not allow advanced routing based on traffic or load sharing. OSPF [117] is a link state protocol developed by the IETF used to find the routing table in the AS. It is based on the “distributed map” concepts: all nodes maintain a ‘view’ of the network topology, which is regularly updated by a flooding protocol. In other terms every router has a database which describes the network structure (Figure 53). This database is used to compute the shortest path between one source node and the other nodes in the network by means of Dijkstra algorithm or Shortest Path First (SPF). Its complexity compared to that of RIP is: N= Nodes ; M = Link ; 1 B A 4b 3 D 6 OSPF: o(M*log M) ; 2 C 5 E FROM A A B B B C C D D E E E RIP : o(N*M) TO LINK DISTANCE B 1 1 D 3 1 A 1 1 C 2 1 E 4 1 B 2 1 E 5 1 A 3 1 E 6 1 B 4 1 C 5 1 D 6 1 Figure 53: OSPF network topology rappresentation To every link is possible to associate different metrics, which are used to apply the “shortest path” algorithm and achieve different routeing tables. D (Delay) T (Throughput) R (Reliability) C (Cost) If exist equal cost paths, they can be used to perform load sharing of traffic. The protocol itself is heavily influenced by the dimension of the network (database dimension, SPF algorithm, length of protocol messages). For this reason OSPF allows the division of an AS in independent areas, each one is independent from the other in terms of routing information and topology (Figure 54). The Dijkstra algorithm is applied in each area and then through Area Border Router (ABR) routing tables are exchanged. 1999 EURESCOM Participants in Project P810-PF page 87 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Figure 54: Sample of network division in OSPF areas Area Border Router (ABR) : AB2, AB4, BC1, BC3 Autonomous System Boundary Router (ASBR) : BB0, BB1 ASBRs are necessary to communicate local routing table to each others Autonomous Systems. 5.5.1.2 Exterior gateway protocol: routing between ASs EGP [123], Exterior Gateway Protocol, is based on the exchange of reachability information with the addition of mechanism of polling for the support of continuity check. The main limit is that it foresees a tree structure of the ASs and it does not allows loops. It is suitable for a structure based on the presence of core network with attached ASs, such as the one depicted in the following Figure 55: AS3 AS4 AS1 AS2 Core Network AS5 AS7 AS8 AS6 Figure 55: EGP network model for routing BGP [122]. The modern Internet is built from the meshed interconnection of backbones. EGP does not support this kind of topology, and IETF has had to develop another protocol: Border Gateway Protocol. BGP is a protocol for the routing between routers belonging to different ASs. BGP does not constrain the deployment architecture, because it enables loops prevention in complex topologies (Figure 56). BGP is more efficient than EGP, because after the initial exchange, the routers memorise the paths provided by their partners. This information will not be repeated, and the routers will send updates only for the paths that change (EGP exchanges every time the full routing table). page 88 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks AS2 AS7 AS3 AS1 AS6 AS4 AS5 Figure 56: BGP network model for routing 5.5.2 Cellular networks: OSPF and BGP as signalling transport network The RIP and EGP schemes normally don't fit with the traditional deployments of the cellular networks. BGP and OSPF [120] are more suitable for the replacement of SS7. Starting from a classical mobile signalling network deployment with four transit nodes (South 2 and North 2 are also gateway for international traffic towards other networks), it is showed by means of an example, the applicability of OSPF and BGP to support equivalent SS7 capabilities. Let start showing how OSPF and BGP could be used in this context [121]. The reference signalling architecture used in this example is shown in Figure 57. It is derived from a quite common deployment architecture use in first GSM years. HLR TR North1 TR South1 MSC/VLR North Area MSC/VLR South Area TR North2 TR South2 Figure 57: Signalling network reference architecture 5.5.2.1 Internal routing protocol OSPF The entire PLMN will be an AS on which OSPF runs. The use of OSPF allows multiple functions suitable to support equivalent SS#7 capabilities: Quick convergence: (M log M)OSPF (N*M)RIP 1999 EURESCOM Participants in Project P810-PF page 89 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Multiple metrics. D(delay), T(throughput), R(reliability), C (Cost). See below how they can be used. Multiple paths. Are necessary to make load-sharing and achieve a fault-tolerance network. Large number of nodes (RIP max 15 hops). The AS can be divided in three OSPF areas (Figure 58): HLR OSPF AREA 1 ABR1 North1 ABR2 South1 OSPF AREA 2 MSC/VLR South Area MSC/VLR North Area ASBR1 North2 ASBR2 South2 OSPF AREA 0 BACKBONE Figure 58: OSPF Areas The subdivision into areas allows the reduction of the routing traffic and load; every area acts as an independent area from the routing point of view Faster OSPF algorithm Area Border Router (ABR): TR Autonomous System Boundary Router (ASBR): TR/North2, TR/South2 The basic point required to obtain equivalent routing functions to SS7 is to assign the metrics appropriately. In fact, signalling national traffic is routed using routes that are different from those which are used for international traffic. To satisfy this requirements, two different metrics are assigned to each link: R for national traffic, and C for international traffic (Figure 59, Figure 60). page 90 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks HLR 1(R ) ABR1 North1 (a1) 1(R ) 1(R ) MSC/VLR North Area 1(R ) ABR2 South1 1(R ) 1(R ) 3(R ) (a) 1(R ) 1(R ) MSC/VLR South Area 3(R ) ASBR1 North2 ASBR2 South2 1(R ) 1(R ) Figure 59: National traffic cost metric HLR 1(C ) ABR1 North1 2(C ) 1(C ) MSC/VLR North Area 1(C ) ABR2 South1 1(C ) 1(C ) MSC/VLR South Area 1(C ) (b) 1(C ) 2(C ) 2(C ) ASBR1 North2 1(C ) ASBR2 South2 2(C ) Figure 60: International traffic cost metric In this way two routing tables are computed, one for each metric. The metric that has to be applied to route a packet could be determined by the value of the ToS field in the IP header: to route national traffic ToS field of an IP packet will be set to R bit, and to C bit for international traffic. Please note however that such a use of the Type of Service header field does not comply with standard IETF specifications and is only used here as an example of what could be achieved with an IP routing protocol that enables to compute routing tables for different classes of traffic. The topic of such QoS-oriented routing protocols is a vast area out of the scope of the present document. Standard values of the ToS field are currently being specified as part of the Diffserv framework for QoS on IP networks. For instance, the entry for the North Area – ASBR2 South link in the pictures above, so that load-sharing and fault-tolerance are achieved, would look like: 1999 EURESCOM Participants in Project P810-PF page 91 (109) Principles and Solutions for IP based Mobile Networks From To MSC/VLR North ASBR2 South2 Cost R 2 Deliverable 4 Next Hop link (a) or link (a1) Cost C 1 Next Hop link (b) Table 1: Routing tables for metric R and C In this way national traffic is routed through (a) and (a1) links, whereas international traffic is routed through (b). Multiple choices for national traffic allow load-sharing and fault-tolerance. 5.5.2.2 Protocol BGP BGP is supposed to be deployed with ASBR1 and ASBR2. Each autonomous system transmits its routing table to the other PLMN (Figure 61). In this way each one knows the network that can be reached by the ASBR. Moreover the ASBR could not enable the neighbour ASBR to flood its routing information. It may depends on agreements between operators. P LM N 1 ASBR P LM N 3 ASBR ASBR ASBR B G P Border Gateway Protocol ASBR ASBR P LM N 2 Figure 61: BGP routeing relations 5.5.2.3 Address translation: DNS (Global Title translation and IP address mapping) The upper levels make use of SS7, E164 and E212 addresses, while the lower levels make use of IP addresses. This problem could be easily solved with a direct mapping of E164 and E212 addresses into IP addresses by means of DNSs interoperator interrogable, while the Signalling Point Code (SPC) could be mapped by means of an operator private DNS, this because SPC are valid locally only, instead E164 and E212 are valid at international level. This is the basic also to allow the address translation required for Global Title translations 5.5.3 Protocol mapping The following lists make a comparison of MTP2 , MTP3 and SCCP major functionality and about how they could be supported in an IP environment. Underlined functions are supported. MTP2 and MTP3 MTP 2 delimitation and alignment of the signal units page 92 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks error revealing error correction error rate control on the signalling links (provided by means of OSPF) MTP 3 Signalling messages Routing (automatically provided by IP routing) Discrimination. (automatically provided by IP routing) Distribution (SI Service Indicator), provided by means of TCP ports Signalling network management Signalling traffic management (provided by means of OSPF) Signalling paths management (provided by means of OSPF) Signalling links management (provided by means of OSPF) In general, some functions are not present in IP or are provided in different ways. Basically, IP and OSPF/BGP are capable to support the major set of MTP2 and MTP3 functionality. The other functions are provided by lower layers or are meaningless in an IP environment. SCCP SCCP provides four 4 classes of service class 0 - Basic connectionless class 1 - Sequenced connectionless class 2 - Basic connection oriented class 3 - Flow control connection-oriented class Generally, only class 0 and sometimes class 1 are used in the classical mobile networks, class 3 and 4 are more used by Intelligent Networks. It must be noted that the sequence control is based on the following principle, which is quite rough, as showed by the following SCCP primitive: N-UNITDATArequest/indication(Called Address, Calling Address, Sequenced Control, User Data) Sequenced Control = 0 => Class 0, SLS is incremented module n every service request Sequenced Control = 1 => Class 1, SLS is fixed for every called address Class 1 does not perform a real load sharing because all traffic from a source to a destination is send on the same links. This is necessary to deliver packet in sequence. OSPF allow a real load sharing based on traffic independently from the called address, and therefore automatically adjusted dynamically. This is possible because the class 4 protocols used are connection oriented and perform resequencing of packets. Basic functions for these classes are provided in an IP environment, but the need for the provision of an SCCP interface force to implement an adaptation layer. The basic processing for this adaptation layer is to map the SCCP primitives into the opportune calls to IP protocols. 1999 EURESCOM Participants in Project P810-PF page 93 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Mapping for SCCP classes Three protocol stacks are implemented (Figure 62), two of which provide a connectionless interface (SCCP-SIM-CL) and the other one a connection oriented interface (SCCP-SIM-CO). TCAP TCAP TCAP SCCP-SIM-CL SCCP-SIM-CL SCCP-SIM-CO TCP T/TCP TCP IP IP IP ATM ATM ATM Figure 62: Alternative solutions and adaptation layers The connectionless interface could be implemented by using UDP protocols, but even if it is a connectionless protocol the services offered by SCCP connectionless interface are not so primitive as those of UDP. So the adaptation layer can be based on TCP or T/TCP and considering that the performance of T/TCP are extremely close to the one of UDP in terms of delay, it is suggested to use T/TCP which allow a common solution. It should be noted that the implementation of the mentioned layers is really quite simple (a little bit more complicated for the connection oriented service due to a more extensive instance mapping between the upper SCCP interface and T/TCP). 5.5.4 SS7 on IP? The most important consequence of the previous discussion is that the present IP protocols are perfectly suitable for the implementation of a signalling network equivalent to the SS#7 network in terms of functionality and performance. Condition for this implementation is the use of an IP network dedicated to the signalling (logically separated from the user plane traffic) and, in the case of re-use of the upper layer of SS7, an implementation of an adaptation layer to provide an SCCP interface is required. The use of dynamic routing protocols (as OSPF and BGP, which are really performant), in addition with reliable routers (such as the last generations of backbone ones) allow to provide a reliability in line with the telecommunication network standard requirements. Under that condition, the applicability of IP for the transport of the SS7 signalling application protocol is required. For completeness, it should be noted that another more complicated approach is presently under development in IETF (SIGTRAN). This approach foresees the development of more dedicated protocol adaptations and extensions. The above considerations allow to transport traditional telecommunication signalling over IP independently from the results of the works in IETF and the time when these results will be finalised. page 94 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 6 Principles and Solutions for IP based Mobile Networks Evolution of UMTS towards IP based solutions The study of the evolution of mobile networks, taking into account the more and more widespread IP technology and its immaturity in most of the relevant telecommunication fields (scalability, QoS, Mobility management…), has underlined the fact that, at the end of 1999, it is very difficult to anticipate the future mobile network architecture into details for the coming 3 to 10 years. As a consequence, in the next section we have chosen to sum up the evolution trends concerning the architecture of mobile networks considering the increasing role of the packet domain. The components of such a network are detailed in section 0. This conclusion should not be read as a solution for the evolution of mobile networks, but as some trends and components that are today envisaged. 6.1 Evolution scenarios Starting from current or very short term architecture, Figure 63 provides an overview of the network architecture able to offer IP services with mobile access. This can be realised through GSM/GPRS and corporate wireless LANs. PSTN Operator (Telco) IN SCP SS7 STP STP STP STP IN DB (SDF) STP Internet Service Provider Customer TX NAS TX Servers: DNS, WWW, email, Radius…. PSTN Corporate Network LAN backbone G-MSC Wireless LAN VLR BTS BSC MSC CSE GSM BSS HLR GPRS GSM Operator IP over WAN Servers GGSN SGSN LAN backbone Big ISPs Telcos Bandwidth resellers ... Figure 63: Current architecture for IP services and mobile access through GSM/GPRS and Wireless LAN In Figure 63, Figure 64 and Figure 65, Blue clouds represent packet networks, Straight lines represent circuit-switched connections. (in principle PSTN could also be included), Orange objects represent intelligence functions associated with PSTN or GSM communication networks (SS7, IN databases, HLR, CAMEL, …), 1999 EURESCOM Participants in Project P810-PF page 95 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Blue objects represent IP entities (routers, servers, packet routing network, …), Green objects represent Mobile IP agents and modified routers for local mobility, Pink objects represent value-added services such as format translation/adaptation, and GPRS* refers to an evolved form of the currently envisioned GPRS towards UMTS functionality. Starting with GSM and GPRS-based core networks, the operators will have the possibility to improve their service offering. Furthermore, UMTS will give them enlarged radio spectrum and increased capacity, so as to meet growing customer demand, with which current saturated GSM networks cannot cope efficiently, as well as support the novel high-bandwidth services provided by the evolving core networks. Allowing mobility and higher bit rates, UMTS stays in line with GSM and GPRS as it will use GSM/GPRS enhanced databases and enhanced core network equipment (MSC, SGSN and GGSN). Allowing mobility and higher bit rates, UMTS Release 99 stays in line with GSM and GPRS as it will use GSM/GPRS enhanced databases and enhanced core network equipment (MSC, SGSN and GGSN). Figure 64 introduces the UMTS access network (UTRAN) which will be linked through RNC to the circuit switched domain (MSC) and to the packet switched domain (SGSN). Two different SGSN are shown in order to highlight that an operator may choose either to upgrade its 2G equipment or to introduce 3G equipment (differentiated with * symbol). At the bottom of this figure, a Wireless LAN access has been introduced, which corresponds for example to the Broadband Radio Access Network technology. This access could be supported by UMTS core network equipment. During the same period of time, some fixed network technologies will emerge with Voice over IP gateways, gatekeeper and signalling gateways so that an IP telephony node can 'talk' to PSTN and SS7 nodes, with security servers, with IP mobility servers, PSTN Operator (Telco) IN SCP SS7 STP STP STP STP IN DB (SDF) STP Internet Service Provider Customer TX TX NAS Signalling Gateway Call Agent or H.323 gatekeeper SIP proxy, Dynamic DNS, Diameter …. WWW, email …. PSTN IP backbone HA/FA PIG or Media Gateway VLR BTS BSC MSC CSE HLR GSM Operator GPRS UMTS Operator Base Wireless LAN Station cells Routers HA/FA G-MSC GSM BSS Profiles DB IP over WAN Servers GGSN SGSN IP backbone Node B UMTS CN = GPRS* RNC UTRAN SGSN* GGSN* Big ISPs Telcos Bandwidth resellers ... Wireless LANs BRAN Figure 64: Evolved Architecture with the introduction of UMTS and new IP fixed network technologies page 96 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Central to the operation of mobile networks are the functions of mobility management that enable the correct establishment of communications to/from users. Mobility management functions cross many 'layers' of a wireless network: radio access, security, quality of service management, usage policing, data routing, … Today's network evolution let us make a guess at a possible future converged architecture incorporating the functions of both a mobile operator and an ISP. Figure 65 provides a conceptual overview of a possible future network architecture in few years, taking into account the trends we have identified. The next paragraphs expand on the assumed technological steps. Operator’s Server Farm (may be mirrored at various locations) Signalling IN SCP Gateway SS7 PSTN HLR CSE WAP Server SIP proxy, Dynamic Call Agent DNS, Diameter, Transcoding or H.323 HA/FA Text-to-Speech... WWW, email... gatekeeper STP Profiles DB: •policies (Security, QoS…) •subscriber profiles •billing records NAS BTS Media Gateway BSC GSM BSS Operator’s IP backbone SGSN Node B Node B supports •QoS for rt services •multicast •AAA RNC provides •Fixed IP •VoIP •GPRS •UMTS=GPRS* GGSN IP WAN UTRAN IGSN Border Router + Firewall Wireless LAN cells Wireless LAN cells Figure 65: Converged architecture merging the functions of ISP and mobile operator Such possible network architecture evolves from current IP networks formed by routers interconnected by any transmission technologies. Core nodes support mechanisms providing grades of quality of service (e.g. using diffserv), confidentiality of information transfers (e.g. using IPSec) and efficient support for reliable unicast and multicast packet communications between any set of edge routers (dynamic routing protocols: OSPF, EGP). Edge routers enable access to/from any combination of Layer 2 technologies, be it dial-up from connection-oriented legacy networks (PSTN, ISDN, GSM…), direct connectionless access from legacy infrastructure (LANs) or newer technologies (ADSL, GPRS, UTRAN, Wireless LANs, BRAN/Hiperlan 2, broadcast networks: DAB, satellite…). Edge routers may incorporate transcoding devices to fit the specific Layer 2 data format into IP packets (e.g. modems at a NAS or a Media Gateway). Traffic measurement capabilities for individual user 'flows' may be incorporated at edge nodes to police usage. 1999 EURESCOM Participants in Project P810-PF page 97 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Mobility Management is implemented at the network layer, so that future IP-based mobility procedures can take advantage of other network-layer facilities such as multicast, QoS guarantees support, security, … Mobile IP provides a user ID to network address translation capability that enables global roaming. Its Home Agents / Foreign Agents can be viewed as ‘tunnel servers’ that encapsulate and despatch datagrams to roaming users. With the high-density of highly-mobile users that will characterise future high-speed pico-cellular networks, Mobile IP needs however to be complemented by more distributed mechanisms providing real-time mobility across a network domain, such as GSM or UMTS in wide-area cellular networks, or the emerging IP micro-mobility schemes for 'Fourth Generation (4G)' high-speed picocellular networks. Functions above the network layer are typically implemented in servers, whose physical location is arbitrary and can be distributed in server 'farms' using distributed computing technologies such as DCOM, CORBA, … or client-proxy(ies)-server protocols that can provide the required location transparency. Such distribution of network functionalities using IT will enable to meet customer demand in a scalable fashion. Servers provide the network 'intelligence' and application-specific functionality: 6.2 Interworking with voice networks: SS7 nodes can be upgraded with IP interfaces so that they can 'talk' to signalling gateways and call control servers (SIP Proxies or H.323 Gatekeepers) IN interworking: IP interconnection between SS7 'routers' (STPs) or IN SCPs (or CAMEL service nodes) and VoIP call control servers allows to share common subscriber information in databases and to provide legacy services extension of IN interworking: e.g. to provide IP-based UPT (personal mobility) through a combination of name resolution servers such as DNS or LDAP, and call-control servers (SIP, H.323) Service interaction: web servers provide a front-end to subscriber and policy databases so that users can change their service profile in a user-friendly manner Content dynamic adaptation/filtering: because multiple access technologies with different transfer capabilities coexist, there is a need to provide 'on-the-fly' content adaptation. Interaction may be needed with subscriber policy stores to check QoS requirements, formatting preferences, terminal capabilities… This can be today achieved by e.g. WAP servers or web proxies that dynamically strip out graphics, compress media streams… Legacy internet services: email, web, media streaming on demand… Key networks components and features As seen in the previous section, this network evolution focused on a core network architecture based on IP. It assumed IP to act as the ‘glue’ to provide global connectivity, mobility between networks, and a common platform for service provisioning for different types of access networks. For their importance in the near to medium term evolution of global mobile telecommunications, three types of access networks have been selected as representative: GSM/GPRS, UMTS, and wireless LANs. GSM GPRS represents the convergence between the worlds of mobile networks and packet data networks. Main applications will be messaging (e.g. SMS) and bursty data page 98 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks up to approximately 150kb/s. Field trials will take place in 1999 and deployment is expected to start in 2000. GPRS shares resources with the existing GSM circuit-switched network, but also requires modifications and heavy investments to the network architecture: implementation of a new type of service nodes and physical link connections to all involved BSCs, software modifications to the access segment and to the HLR and related databases. It will enable traffic-volume-based charging to mobile data applications. Additionally it puts the mobile network operator into the role of an Internet Service Provider. As an ISP the operator offers additional services like DNS registration, Email and Web-hosting, and as a transport resource provider he offers an access service to other ISP's subscribers or corporate clients. Although GPRS stage 2 offers multiple QoS classes (delay and packet loss constraints), it does not offer real-time services, since the required QoS classes are not defined as well as the mechanism to support them. Wireless LANs could form a complement to third generation mobile systems for high bandwidth connectivity in the range of 10 Mbit/s and above. WLANs usually operate in the rural or business environment with comparably small area coverage and, opposing to GSM/UMTS, are usually unmanaged or operated on a corporate basis. Emerging standards like HIPERLAN and IEEE 802.11 currently cover physical layer and DLC layer aspects only. Communication between access points, which is essential for implementing local mobility schemes, is not covered by the standards and is left to the distribution system, i.e. the WLAN backbone segment. As a complement to 3G mobile systems, WLANs could need a common or at least interoperable scheme for mobility management. Local mobility in WLANs currently is provided by proprietary roaming schemes or by the upcoming Inter-Access Point Protocol (IAPP). To interoperate with an IP-based core network, without falling back to a Mobile IP solution that would introduce an unwanted amount of transport overhead and server requirements to the local area, several approaches for ‘layer 3 micromobility’ have been made. These are covered by the term ‘cellular-IP’ and are based on IP multicast or new protocols (such as HAWAII, Cellular IP or MANET…). Such micro-mobility schemes create dynamic 'tree' topologies using per-host forwarding entries (as opposed to standard aggregatable IP routes) to connect mobile hosts to a 'standard' IP core networks via 'stub' IP access networks made up of mobileaware routers. Global roaming between different types of mobile networks, such as UMTS and Wireless LAN, is assumed to be provided by Mobile IP based on IPv4 or IPv6 in this book. Since GPRS is a standard specifically conceived for mobile networks, integration with fixed IP network and Mobile IP is not seamless on the first hand. Thus, this book reviews some proposals on Mobile IP and GPRS integration based on modifications to the GPRS support nodes. Whereas GPRS handles the micro-mobility, Mobile IP handles the macro-mobility in order to provide seamless global roaming between networks. These proposals integrate SGSN and GGSN into a single Internet-GSN logically belonging to the access network and allow the mobile terminal to implement Mobile IP. For backward compatibility, control procedures are inherited from GPRS. This is seen as a possible evolution path to support Mobile IP in the UMTS core network. 1999 EURESCOM Participants in Project P810-PF page 99 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 Both SS7-based mobile networks and IP networks provide functions to handle Mobility Management (MM). The two main procedures covered by MM are Registration and Location tracking/updating. Both of these procedures must include a user authentication phase. Solutions that attempt to integrate the way these functions are performed across SS7/connection-oriented and IP networks incorporate the SS7 procedures and entities (such as MAP and the HLR) with emerging network (and application) level frameworks for IP networks such as Roaming (roamops), AAA or Mobile IP. The addition of a session control 'layer' mediating between the network mobility mechanisms and the AAA infrastructure would enable personal mobility and alleviate some of the limitations of Mobile IP. Such a session control mechanism could be SIP. All these mechanisms require 'policy'/user profiles databases that could be integrated with the HLR/AuC using IT such as DCOM, CORBA… A special topic covers mobile terminal registration in the IP/GPRS/UMTS context. Two different ways of performing registration, distinctively consisting of the authentication and location registration, in a UMTS/Mobile IP world are presented. These proposals assume a network composed of the access network with UTRAN technology and a core network built on both UMTS and Mobile IP Mobility Management. The node between access network and core network is an IGSN able to interrogate the HLR and coupled with the Mobile IP Foreign Agent. These two procedures could be considered as the key elements for building up the new registration process with ‘classical’ mobile networks and Mobile IP. Preference towards one approach or the other may strongly depend on the kind of evolution from UMTS initial release to future versions the operators would envisage. Open issues are: how to solve the trade-off problem between radio resource optimisation and infrastructure separation of IP and UTRAN given the demand for a smooth and realistic evolution, the exact layout of information to store in the HLR for Mobile IP authentication support, and the frequency of different authentication procedures (especially Mobile IP authentication). Besides mobility support, and since UMTS networks will provide real-time services, the interconnection of different types of access networks using an IP-based core network requests IP to be able to provide reliable real-time services too. Integrated services provide best-effort, predictive or guaranteed QoS (controlled-load and guaranteed services) based on resource reservation using RSVP signalling for bandwidth allocation and packet scheduling at every network hop. However, the computing overhead at each hop is really a big matter and prevents from implementing RSVP as a general technique: it must be avoided in large scale networks, but it is so far the only way to guarantee time delays and to leave in the same time all the unused capacity to lower quality services. Differentiated services enable scalable service discrimination based on the Type of Service field in the IPv4 header and respectively the Traffic Class field in the IPv6 header without the need for a per-flow state and signalling at every hop. Additional problems arise if IP real-time services are to be supported in conjunction with terminal mobility. When a terminal moves, the communication path and nodes involved in the path usually will change too, e.g. when roaming between different access networks (WLAN–UMTS, GSM-UMTS, ...), where a re-establishment of page 100 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks Mobile IP tunnels take place. Consequently, integrated as well as differentiated services computation has to be performed again. Concerning service provisioning, an IP-based network architecture could open up the opportunity for bringing a broad range of new services from an existing infrastructure to mobile users. However, this would require the adaptation of service capabilities and content to the restricted capabilities of portable terminals (in terms of computing power, output and input capabilities (e.g. screen size & colors, audio codecs, small keypads, voice activation features…). For this purpose WAP defines a suite of wireless protocols optimised for the mobile environment and able to work across different wireless (mainly datagram) network technologies. Hand-held terminals need to provide a micro-browser that uses protocols and languages inherited from HTTP and HTML. A gateway functionality converts protocols, languages and content to enable access to WAP servers, or more generally to all Web servers in the Internet world. However, WAP can only be seen as a medium-term 'fix' that will need to evolve so that service provision is unified across both fixed and mobile IP networks. This evolution must incorporate more and more standard IP-compliant procedures in the very wireless-carrier-specific WAP protocols. In order to merge the features and services of data networks with those of voice networks, a Wireless Telephony Application framework has been introduced. WTA is a tool for building telephony applications, designed for network operators and equipment vendors. It enables real-time processing of telephony events to the end-user while browsing. Additional integration with the telephony network is for further consideration. Future mobile terminals or WLAN multi-mode terminals might support packet based access only and might rely on access network services and facilities to interoperate with circuit-switched networks. Thus, there might be a certain demand for IP call control and media transcoding at the end-system and in the network in order to provide telephony applications to packet based mobile terminals for instance. Originally introduced to support call control for IP telephony and to address interworking issues with connection oriented networks as PSTN and (B-)ISDN, IP call control now evolves along two different paths: H.323 (ITU) and SIP (IETF). Initially not designed for interworking, both of them might share single components like signalling gateways or media stream gateways to a certain degree. Both of them provide a set of functions for name translation, lookup, routeing, logging, access control and firewalling. An IP-based architecture might also be used as a common (integrated) platform for service provisioning to different types of access networks and end-systems. This allows for a unified service presentation and user interaction for example by WML based Web access, as well as the support of user profiles which will be adapted to the situation of the user (location, end-system in use, subscription, preferences, …). In this context, one way to provide the UMTS Virtual Home Environment could be based on Intelligent Network services. The main challenges will be to provide access to IN services for IP based clients, and to provide an interface between IP based server belonging to third party providers and the VHE service logic. On the client side, access to the service logic requires a signalling gateway that has to reflect the characteristics of an end-system to the service switch (or MSC) for an IP based client. This can be provided to both H.323 and SIP clients. Thus access to IN services and IP servers is achieved separately and it is up to the user application to present both in an integrated view. 1999 EURESCOM Participants in Project P810-PF page 101 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 In the CAMEL Service Environment, a Third Party Service Provider gains access to the service switching function through a managed interface. IP based servers allow to present access to the same service by either using IP access through a web page and IN access through the service control function interface. Additionally an IP based server farm might provide a higher degree of scalability. Providing services to the CSE based on IP servers requires interworking with the service logic. This mainly seems to be a problem of tunnelling TCAP respectively SCCP messages through IP which is not only a matter of protocol message encapsulation but also demands for assured transfer, in sequence delivery and low delay transport to be provided by the IP segment in order to avoid an unacceptable increase in service activation delay. It has also impact on security and requires authentication, authorisation and encryption of messages to avoid obstruction of the SSF. On the operators side, the support of IP server based service provisioning requires the implementation of an IP-enabled SSF. In an IP based scenario, operators service creation (and management) might be performed in the conventional way using the appropriate service creation environment. VHE service customising and service profile creation (and management) can be performed by the operator or mobile user, for example via a web interface to the VHE server. page 102 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks References [1] CSELT, “Tecniche di trasporto per sistemi mobili di terza generazione”, Internal Report 1997 [2] DTR/SMG-0323XXU Draft Technical Report, “Combined GSM and Mobile IP Mobility Handling in UMTS IP CN”, version 0.3.0, 14/01/1999 [3] GSM 02.60 Technical Specification “Digital Cellular Telecommunications System (Phase 2+); General Packet Radio Service (GPRS); Service Description; Stage 1”, version 6.1.0, Release 1997 [4] GSM 03.60 Technical Specification “Digital Cellular Telecommunication System (Phase2+); General Packet Radio Service (GPRS); Service Description; Stage 2”, version 6.1.1, Release 1997 [5] GSM 03.64 Technical Specification, “Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); Overall description of the GPRS radio interface; Stage 2”, version 6.0.1, Release 1997 [6] Nokia Magazine Papers, “Packet Radio Service for the GSM Network”, 1997, URL: http://www.forum.nokia.com/nf/magazine/papers [7] C. Perkins, ed., "IP Mobility Support", IETF RFC 2002, Oct. 1996 [8] C. Perkins, "IP Encapsulation Within IP", IETF RFC 2003, May 1996 [9] J. Postel, “Internet Control Message Protocol”, IETF RFC 792, 1981 [10] S.E. Deering, ed., "ICMP Router Discovery Messages", IETF RFC 1256, Sept. 1991 [11] S. Hanks, T. Li, D. Farinacci and P. Traina, "Generic Record Encapsulation (GRE)", IETF RFC 1701, October 1994 [12] C. Perkins, "Minimal Encapsulation Within IP", IETF RFC 2004, Oct. 1996 [13] S. Thomson and T. Narten, "IPv6 Stateless Address Auto-configuration", IETF RFC 2462, December 1998 [14] T. Narten, E. Nordmark, and W. Simpson, "Neighbour Discovery for IP Version 6 (IPv6)", IETF RFC 2461, December 1998 [15] B. Aboba, “Support for Mobile IP in RADIUS”, Work in Progress (draft-ietfradius-mobileip-00), April 1998 [16] Rigney, C., Rubens, A., Simpson, W. and S. Willens, "Remote Authentication Dial In User Service (RADIUS)", RFC 2138, April 1997 [17] Pat R. Calhoun, Charles E. Perkins, “Mobile IP Network Access Identifier Extension”, Work in Progress (draft-ietf-mobileip-mn-nai-03), June 1999 [18] Charles E. Perkins, Pat R. Calhoun, “Mobile IP Challenge/Response Extensions”, Work in Progress (draft-ietf-mobileip-challenge-02), May 1999 [19] B. Aboba, G. Zorn, “Criteria for Evaluating Roaming Protocols”, IETF RFC 2477, January 1999. [20] J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, M. Holdrege, D. Spence, “AAA Authorization Architecture and Requirements”, Work in Progress (draft-ietf-aaa-authorization-reqs-00), June 1999. 1999 EURESCOM Participants in Project P810-PF page 103 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 [21] I. Castineyra, J. Chiappa, and M. Steenstrup, "The Nimrod Routeing Architecture", IETF RFC 1992, Aug. 1996 [22] M. Crawford, "Router Renumbering for IPv6", Work in Progress (draft-ietfipngwg-router-renum-08.txt), February 1999 [23] D. B. Johnson, C. Perkins, "Mobility Support in IPv6", Work in Progress (draftietf-mobileip-ipv6-07.txt), November 1998 [24] A. Conta and S. Deering, "Generic Packet Tunnelling in IPv6 specification", IETF RFC 2473, December 1998 [25] B. Aboba, G. Zorn, “Criteria for Evaluating Roaming Protocols”, IETF RFC 2477, January 1999 [26] C. Perkins and D. B. Johnson, "Route Optimisation in Mobile IP", Work in Progress (draft-ietf-mobileip-optim-08), 25 February 1999 [27] Pat Calhoun, Gabriel Montenegro, Charles Perkins, “Tunnel Establishment Protocol”, Work in Progress (draft-ietf-mobileip-calhoun-tep-01), March 1998. [28] M. Crawford et al., “Separating Identifiers and Locators in Addresses: An Analysis of the GSE proposal for IPv6”, Work in Progress (draft-ietf-ipngwgesd-analysis-04), February 1999 [29] C. Perkins and P. Bhagwat, "A Mobile Networking System Based on Internet Protocol (IP)", Proc. USENIX Symposium on Mobile and LocationIndependent Computing, Aug. 1993, USENIX Assoc., pp. 69-82 [30] D.B. Johnson, "Scalable and Robust Internetwork Routeing for Mobile Hosts", Proc. 14th Intl. Conf. Distributed Computing Systems, June 1994, pp. 2-11 [31] V. Gupta and S. Glass, "Firewall Traversal for Mobile IP: Guidelines for Firewalls and Mobile IP Entities", draft-ietf-mobileip-firewall-trav-00 (expired), Mar. 1997 [32] J. Zao et al., "A Public-Key Based Secure Mobile IP," Proc. ACM Mobicom 97, ACM, New York, Oct. 1997, pp. 173-184 [33] P. Ferguson and D. Senie, "Ingress Filtering in the Internet", Work in Progress (draft-ferguson-ingress-filtering), Oct. 1997 [34] G. Montenegro, “Reverse Tunnelling for Mobile IP”, RFC 2344, May 1998 [35] C. Bormann, "Providing integrated services over low bit rate links", Work in Progress (draft-ietf-issll-isslow-04), August 1998 [36] V. Jacobson, "Compressing TCP/IP headers", IETF RFC 1144, February 1990 [37] M. Degermark, B. Nordgren, S. Pink, "IP Header Compression", IETF RFC 2507, February 1999 [38] S. Casner, V. Jacobson, "Compressing IP/UDP/RTP Headers for Low-Speed Serial Links", Work in Progress (draft-ietf-avt-crtp-04.txt), November 1997 [39] M. Engan, S. Casner, C. Bormann, "IP Header Compression over PPP", Work in Progress (draft-engan-ip-compress-02.txt), December 1997 [40] C. Becker, B. Patil, E. Qaddoura, “IP Mobility Architecture Framework”, (draft-ietf-mobileip-ipm-arch-00.txt), September 1999 [41] B. Aboba, M. Beadles, "The Network Access Identifier" RFC 2486, January 1999 page 104 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks [42] P. Calhoun, C. Perkins, "Mobile IP Dynamic Home Address Allocation Extension", draft-ietf-mobileip-home-addr-alloc-00.txt, November 1998 [43] P. Calhoun, C. Perkins, “Diameter Mobile IP Extensions”, Work in Progress, IETF draft, , Sun Laboratories, November 1998 [44] Tom Hiller, Lucent Technologies, Charles Lo, Airtouch Communication, “3G Wireless Data Provider Architecture Using Mobile IP and AAA”, Work in Progress, IETF draft, March 1999 [45] Pat R. Calhoun, Gabriel Montenegro, Charles E. Perkins, “Mobile IP Regionalized Tunnel Management”, Work in Progress, (draft-ietf-mobileip-regtunnel-00), November 1998. [46] “Diameter Mobile IP Extensions”, IETF draft, work in progress, P. Calhoun, C. Perkins, Sun Laboratories, November 1998 [47] Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification, IETF RFC 2205, September 1997 [48] A Framework for Use of RSVP with Diffserv Networks, Work in Progress (draft-ietf-diffserv-rsvp-01.txt), November 1999 [49] M.Handley, H.Schulzrinne, E.Schuler, J.Rosenberg, "SIP: Session Initiation Protocol", IETF RFC 2543, March 1999 [50] Schulzrinne, Rosenberg, "SIP Call Control Services", Work in Progress (draftietf-mmusic-sip-cc-00.txt), August 1998 [51] W. Marshall et al., "Architectural Considerations for Providing Carrier Class Telephony Services Utilizing SIP-based Distributed Call Control Mechanisms", Work in Progress (draft-dcsgroup-mmusic-arch-00), June 1999. [52] Greene et. al., "SS7-Internet Interworking - Architectural Framework", Work in Progress (draft-greene-ss7-arch-frame-00.txt), July 1998 [53] S. Donovan, M. Cannon, "A Functional Description of a SIP-PSTN Gateway", IETF (draft-donovan-sip-gw-client-00.txt), November 1998 [54] ITU-T, "ITU-T Recommendation H.323: communications systems", February 1998 Packet-based multimedia [55] ITU-T, "ITU-T Recommendation H.245: Control protocol for multimedia communication", February 1998 [56] ITU-T, "ITU-T Recommendation Q.931: ISDN user-network interface layer 3 specification for basic call control", May 1998 [57] H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", IETF RFC 1889, January 1996 [58] H. Schulzrinne, A. Rao, R. Lanphier, "Real Time Streaming Protocol (RTSP)", IETF RFC 2326, April 1998 [59] M. P. Maher, C. Perkins, "Session Announcement Protocol: Version 2", Work in Progress (draft-ietf-mmusic-sap-v2-00.txt), November 1998 [60] M. Handley, V. Jacobson, "SDP: Session Description Protocol", IETF RFC 2327, April 1998 [61] ITU-T, "ITU-T Recommendation H.225.0: Call signalling protocols and media stream packetization for packet based", February 1998 1999 EURESCOM Participants in Project P810-PF page 105 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 [62] ITU-T, "ITU-T Recommendation H.450.1: Generic functional protocol for the support of supplementary services in H.323", February 1998 [63] ITU-T, "ITU-T Recommendation H.450.2: Call transfer supplementary service for H.323", February 1998 [64] ITU-T, "ITU-T Recommendation H.450.3: Call diversion supplementary service for H.323", February 1998 [65] ITU-T, "ITU-T Draft Recommendation H.332: H.323 extended for looselycoupled conferences" [66] GSM 03.78 TS "Digital cellular telecommunications system (Phase 2+); Customised Applications for Mobile network Enhanced Logic (CAMEL); Stage 2", version 5.3.2, November 1997 [67] GSM 02.78 TS, "Digital cellular telecommunications system (Phase 2+); Customised Applications for Mobile network Enhanced Logic (CAMEL); Service definition, Stage 1", version 5.4.0, January 1998 [68] ETSI, "Draft EN 301 152-1: Intelligent Network (IN); IN Capability Set 1 (CS1) extension; Intelligent Network Application Protocol (INAP); Customised Applications for Mobile network Enhanced Logic (CAMEL); Part 1: Protocol specification", January 1998 [69] GSM 09.78, TS "Digital cellular telecommunications system (Phase 2+); Customised Applications for Mobile network Enhanced Logic (CAMEL); CAMEL Application Part (CAP) specification", version 5.3.0, January 1998 [70] GSM 09.02 ,TS, "Draft EN 300 974: Digital cellular telecommunications system (Phase 2+); Mobile Application Part (MAP) specification", version 6.1.0 Release 1997, July 1998 [71] P. R. Calhoun, G. Zorn, P. Pan, "DIAMETER Framework Document", Work in Progress, (draft-calhoun-diameter-framework-02.txt), December 1998 [72] W. Bressler, "SS7 Level Two over IP", Work in Progress (draft-bresslersigtran-ipss7l2-00.txt), January 1999 [73] L. Coene, "Internet and SS7 addressing", (draft-coene-ss7-IP-addr-00.txt), January 1999 [74] N. Glaude, T. Blain, R. Cable, "SS7 to IP Signalling Gateway Transport Architecture", (draft-glaude-ss7-gw-00.txt), November 1998 [75] IEEE "Wireless LAN Medium Access Control and Physical Layer Specifications", IEEE Std 802.11-1997, November 1997 [76] A. Claessen, L. Monteban and H. Moelard (AT&T GIS), “The AT&T GIS Wavelan air interface and protocol stack”, Proc. of Wireless Networks ‘Catching the mobile future’, 18-23 Sept. 1994, IOS Press, pp. 1442-6 vol.4 [77] H. Moelard (Lucent), M. Trompower (Aironet), “Inter Access Point Protocol Wireless Networking Distribution System Communication”, Work in Progress (draft-trompower-iapp-00), March 1998 [78] C. Castellucia, “A hierarchical Mobile IPv6 proposal”, INRIA technical report TR-0226, November 1998 [79] C. Perkins, "Mobile IP Local Registration with Hierarchical Foreign Agents", Work in Progress (draft-perkins-mobileip-hierfa-00), February 1996 page 106 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks [80] R. Caceres and V. N. Padmanabhan, "Fast and scalable handoffs for wireless internetworks", Proc. of ACM MobiCom '96, November 1996 [81] D. Waitzman, C. Partridge, S.E. Deering, “Distance Vector Multicast Routeing Protocol (DVMRP)”, IETF RFC 1075, November 1988 [82] J. Moy, “Multicast Extensions to OSPF (MOSPF)”, IETF RFC 1584, March 1994. [83] Stephen Deering (Cisco) et al., “Protocol Independent Multicast Version 2 Dense Mode Specification”, Work in Progress (draft-ietf-pim-v2-dm-03.txt), June 1999 [84] D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, L. Wei, “Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification”, IETF RFC 2362, June 1998 [85] A. Ballardie, “Core Based Trees (CBT) Multicast Routeing Architecture”, IETF RFC 2201, September 1997 [86] A. Ballardie, “Core Based Trees (CBT version 2) Multicast Routeing – Protocol Specification”, IETF RFC 2189, September 1997 [87] A. Acampora, “An architecture and methodology for mobile-executed handoff in cellular ATM networks”, IEEE JSAC, vol. 12 no. 8, Oct. 1994, pp. 1365-75 [88] S. Seshan, H. Balakrishnan, R. H. Katz, “Handoff in Cellular Wireless Networks: the Daedalus Implementation and experience”, ACM/Baltzer Journal on Wireless Networks, 1995 [89] A. Mihailovic, M. Shabeer, H. Aghvami, “Sparse mode multicast as a mobility solution for internet campus networks”, paper submitted to PIMRC’99 [90] R. Ramjee, T. La Porta, S. Thuel and K. Varadhan, “IP micro-mobility support using HAWAII”, Work in Progress (draft-ramjee-micro-mobility-hawaii-00), February 1999. [91] A. Valko (Ericsson/CU), A. Campbell, J. Gomez, “Cellular IP”, Work in Progress (draft-valko-cellularip-00), November 1998 [92] C. Castellucia, “Towards a Unified Hierarchical Mobility Management Framework”, Work in Progress (draft-castellucia-uhmm-framework-00), June 1999 [93] Ericsson, "H.323 Roaming Scenarios in UMTS", 3GPP temporary document S2-361, May 1999 [94] Ericsson, Nokia et. al., "Call Control and Session Management for Multimedia Services", 3GPP temporary document S2-99191, April 1999 [95] ETSI, "Evolution of the GSM platform towards UMTS; UMTS 23.20 version 1.6.1", 3GPP DTR/SMG-032320U V.1.6.1 July 1999 [96] EURESCOM P919, Services",June 1999 "PIR 2.1: Identified Integrated Fixed/Mobile [97] 3GPP TS 22.121 "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service Aspects; The Virtual Home Environment", version 3.0.0, June 1999 1999 EURESCOM Participants in Project P810-PF page 107 (109) Principles and Solutions for IP based Mobile Networks Deliverable 4 [98] 3GPP TS 23.078, "3rd Generation Partnership Project; Technical Specification Group Core Network; Customised Applications for Mobile network Enhanced Logic (CAMEL) Phase 2 - Stage 2", version 3.0.0, May 1999 [99] ITU-T, "Draft Recommendation Q.1231; Introduction to Intelligent Network Capability Set-3.1", May1998 [100] GSM 02.57 "Digital cellular telecommunications system (Phase 2+); Mobile Station Application Execution Environment (MExE); Service Description; Stage 1", version 7.0.0, Release 1998, March 1998 [101] GSM 03.57, "Digital cellular telecommunications system (Phase 2+); Mobile Station Application Execution Environment (MExE); Functional Description; Stage 2", version 1.7.1, April 1999 [102] GSM 11.14 "Digital cellular telecommunications system (Phase 2+); Specification of the SIM application toolkit for the Subscriber Identity Module Mobile Equipment (SIM - ME) interface ", version 5.9.0, Release 1996, November 1998 [103] 3GPP TS 22.101 "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects Service aspects; Service principles", version 3.6.0, June 1999 [104] ITU-T, "Recommendation Q.1701; Framework for IMT-2000 Networks", June 1998 [105] ITU-T, "Draft New Recommendation Q.1711, Network Functional Model for IMT-2000", June 1998 [106] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1l", IETF RFC 2068, January 1997 [107] WAP Forum, "Wireless Session Protocol Specification", WAP Forum, April 1998, URL: http://www.wapforum.org/what/technical.htm [108] W3C, "CC/PP exchange protocol based on HTTP Extension Framework", W3C Note 24 June 1999, URL: http://www.w3.org/TR/NOTE-CCPPexchange [109] W3C, "Composite Capability/Preference Profiles (CC/PP): A user side framework for content negotiation", W3C NOTE 30 November 1998, URL: http://www.w3.org/TR/NOTE-CCPP/ [110] URL: http://www.wapforum.org/what/docs/WAP-W3C-white-paper_v1.2.html [111] M.C.Chan, T.Y.C.Woo, "Next-Generation Wireless Data Services: Architecture and Experience", IEEE Personal Communications, February 1999 [112] ITU-T, "ITU-T Recommendation Q.761 - Signalling System No. 7 - ISDN User Part functional description", September 1997 [113] P.Lettieri, M.B.Srivastava, "Advances in Wireless Terminals", IEEE Personal Communications, February 1999 [114] EURESCOM P810, T4, PIR4.2 "IP architecture scenario", 1999 [115] G. Melkin, “RIP version 2”, IETF RFC1388 [116] P. Mockapetris, "Domain Names - concepts and facilities", IETF RFC 1034, November 1987. [117] J. Moy, “OSPF version 2”, IETF RFC1583 page 108 (109) 1999 EURESCOM Participants in Project P810-PF Deliverable 4 Principles and Solutions for IP based Mobile Networks [118] P. Vixie, editor, "Dynamic Updates in the Domain Name System (DNS UPDATE)", IETF RFC 2136, April 1997. [119] Droms, R., "Dynamic Host Configuration Protocol", IETF RFC 2131, March 1997. [120] K. Varadan, “BGP/OSPF interaction”, IETF RFC1043 [121] A. Artale, “Migrazione della segnalazione dei sistemi radiomobili di seconda e terza generazione su IP”, CSELT/University of PISA, July 1999 [122] K. Loughld, Cisco Systems, “Border Gateway Protocol”, IETF RFC1267 [123] E. C. Rosen, “Exterior Gateway Protocol”, IETF RFC888 [124] 3GPP R2000 Adhoc-group, “Architecture for an All IP network”, draft 0.1.4, September 1999 1999 EURESCOM Participants in Project P810-PF page 109 (109)