Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.

Similar presentations


Presentation on theme: "Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef."— Presentation transcript:

1 Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef

2 Contents Introduction History How it works Security Advantages & Disadvantages Service Deployment

3 UMA History Development of UMA inspired by the rapid deployment of broadband and wireless LANs within homes. Wanted to create a high bandwidth, low-cost wireless access network. Several major leading mobile operators and network equipment vendors collaborated and formed the Unlicensed Mobile Access Consortium (UMAC), to promote the Unlicensed Mobile Access (UMA) technology and develop specifications for it.

4 Development Companies Involved Cingular Motorola Nokia Sony Ericsson T-Mobile US These companies developed the first set of UMA specifications and published them in September 2004. The specifications were given to the 3 rd Generation Partnership Project (3GPP). Eight months later in April 2005, the specifications were included into their framework inside the 3GPP release 6 and renamed Generic Access Network (GAN).

5 Timeline

6 HOW UMA WORKS

7 Handing Off Connection UMA device on cellular network Finds suitable Wi-Fi network in range Device will analyze network and determine if connect or not Connect to UMA controller and negotiate switch with cell network

8 Inside UMA UMA protocol stored within the radio of the device. Tunnels through other radio layers to get to mobile network Requires an IP interface to connect to the internet IPsec module deals with tunnel to UMA controller

9 VoIP Transferring voice over internet is a costly endeavor Codecs used in traditional VoIP clients are costly AMR (Adaptive Mult-Rate) used to provide cheap, effective transmission  Same as used already on phones  Already optimized for low power consumption

10 UMA SECURITY

11 UMA Security AUTHENTICATION: Internet Key Echange version 2 (IKEv2) -choose your own algorithm Extensible Authentication Protocol (EAP) AUTHENTICATION CONFIDENTIALITY INTEGRITY

12 UMA Security CONFIDENTIALITY: IPsec Confidentiality algorithms: 1.AES with 128bit key length 2.3DES 3.NULL encryption AUTHENTICATION CONFIDENTIALITY INTEGRITY IPsec (IPv4): ----------------------------------------------------------------- | new IP header | | original IP header| | |ESP |ESP | | (any options) |ESP| (any options) |TCP|Data|Trailer|Auth | ----------------------------------------------------------------- | |

13 UMA Security INTEGRITY: Algorithms 1.HMAC-SHAI-96 2.HMAC-MD5 3.AES-XCBC-MAC-96 AUTHENTICATION CONFIDENTIALITY INTEGRITY

14 UMA Security Weaknesses IMSI Encrypted, but transferred with Network Access ID (NAI) Mobile Station Authentication OPTIONAL (MITM attack) DoS Attack

15 UMA Security: Comparison with Other Technologies

16 ADVANTAGES AND DISADVANTAGES

17 For Consumers ● Single number for home and mobile calls ● Calls through wireless LAN's, can deploy your own home coverage ● Greatly reduced roaming charges ● One provider for home internet and cell phone coverage

18 For Providers ● Deploying Wi-Fi hotspots is cheaper than deploying WAN's ● Reduces load on cellular networks, shifting some burden to internet infrastructure ● Able to shift calls onto the cheaper internet infrastructure

19 Disadvantages ● UMA-compatible handsets are more expensive and less common ● UMA-enabled phones require two active transceivers to handle seamless call- switching ● Despite all this, it's still not as cheap as straightforward VOIP protocols

20 SERVICE DEPLOYMENT

21 Service Deployment Surveying A full site survey is necessary to determine coverage planning and WiFi channel planning The survey revolves around finding the RF characteristics of the weakest client in the network, specifically its transmit power Design Access Points to match Radio coverage of the dual-mode phone WiFi performance is solely dependent on the phone's signal to the Access Points, similar to a phone's signal from the tower affecting calling ability

22 Cisco UMA Deployment

23 UMA Deployment Wireless Control System gives support to standalone Access Points and also Wireless LAN Controller Wireless Control System also provides statistics on calls being made, WiFi Channel performance and coverage planning Access Points improve call quality and WiFi channel capacity to phones which are unable to to support 802.11 1n protocol

24 CONCLUSION AND QUESTIONS


Download ppt "Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef."

Similar presentations


Ads by Google