Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.

Slides:



Advertisements
Similar presentations
Loading Welcome To My Presentation. Hybrid Next Generation Mobile System Analysis Based on Internet Applications A Presentation On Prepared by Abu Sayed.
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
IPWireless Overview Thierry Maupile Fastnet Futures April 2, 2003.
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
MMS Multimedia Messaging Service Sajid Hussain Introduction What is MMS? The Multimedia Messaging Service (MMS) is as its name suggests the ability to.
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Research Seminar on Telecommunications Business IPSEC BUSINESS Henri Ossi.
WAN Technologies Dial-up modem connections Cheap Slow
Capacity Limit Problem in 3G Networks By Fahd Ahmad Saeed.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
1 Cellular communications Cellular communications BASIC TELECOMMUNICATIONS.
Subject: Broadband Wireless Technologies for the Delivery of Converged Services Broadband Wireless Technologies for the.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
VoFi standards & deployment models Thenu Kittappa.
1Presentation_ID Spring VON 2001 Session G Wireless: Future of VoIP 4G: The End of the Intelligent Network Dana blair
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Completing the Convergence Puzzle: A Survey and A Roadmap IEEE Wireless Communications ‧ June 2009 DJAMAL-EDDINE MEDDOUR, USMAN JAVAID, AND NICOLAS BIHANNIC,
March 15, 2008 PM of FMC 1 Rich Watson Director of Technical Marketing DiVitas Networks – Mountain View March 15, 2008.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
GENERIC ACCESS NETWORK TOWARD FIXED–MOBILE CONVERGENCE
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Unlicensed Mobile Access Presented by: Alexei, Ashley, Ryan, Tommy.
Implementing VoIP in a wireless world Herman Abel Product Manager Aculab (booth 402) Phone:
Femto Network Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 9: Σύγκλιση Σταθερών και Κινητών Επικοινωνιών (Fixed-Mobile Convergence) Διδάσκων: Βασίλειος Σύρης Τμήμα:
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
PRESENTATION ON. What is a Wi-Fi Hotspot? A Wi-Fi hotspot is location or access point where you can access wireless broadband using a wireless enabled.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
802.16: WiMAX A World Without Wires Presented by Eric Goldman 1 – First Published May 2007.
WIRELESS NETWORKS. Wireless?  A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier.  The last link with the.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Wi-Fi Technology.
MOBILE COMMUNICATION SYSTEM
5 G.
Virtual Private Networks
Providing Teleworker Services
4G-WIRELESS NETWORKS PREPARED BY: PARTH LATHIGARA(07BEC037)
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Unlicensed Mobile Access (UMA )
Providing Teleworker Services
Wireless ATM PRESENTED BY : NIPURBA KONAR.
Providing Teleworker Services
Providing Teleworker Services
Mountain Connect 2019 Off-Network Communications Challenges
Providing Teleworker Services
Presentation transcript:

Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef

Contents Introduction History How it works Security Advantages & Disadvantages Service Deployment

UMA History Development of UMA inspired by the rapid deployment of broadband and wireless LANs within homes. Wanted to create a high bandwidth, low-cost wireless access network. Several major leading mobile operators and network equipment vendors collaborated and formed the Unlicensed Mobile Access Consortium (UMAC), to promote the Unlicensed Mobile Access (UMA) technology and develop specifications for it.

Development Companies Involved Cingular Motorola Nokia Sony Ericsson T-Mobile US These companies developed the first set of UMA specifications and published them in September The specifications were given to the 3 rd Generation Partnership Project (3GPP). Eight months later in April 2005, the specifications were included into their framework inside the 3GPP release 6 and renamed Generic Access Network (GAN).

Timeline

HOW UMA WORKS

Handing Off Connection UMA device on cellular network Finds suitable Wi-Fi network in range Device will analyze network and determine if connect or not Connect to UMA controller and negotiate switch with cell network

Inside UMA UMA protocol stored within the radio of the device. Tunnels through other radio layers to get to mobile network Requires an IP interface to connect to the internet IPsec module deals with tunnel to UMA controller

VoIP Transferring voice over internet is a costly endeavor Codecs used in traditional VoIP clients are costly AMR (Adaptive Mult-Rate) used to provide cheap, effective transmission  Same as used already on phones  Already optimized for low power consumption

UMA SECURITY

UMA Security AUTHENTICATION: Internet Key Echange version 2 (IKEv2) -choose your own algorithm Extensible Authentication Protocol (EAP) AUTHENTICATION CONFIDENTIALITY INTEGRITY

UMA Security CONFIDENTIALITY: IPsec Confidentiality algorithms: 1.AES with 128bit key length 2.3DES 3.NULL encryption AUTHENTICATION CONFIDENTIALITY INTEGRITY IPsec (IPv4): | new IP header | | original IP header| | |ESP |ESP | | (any options) |ESP| (any options) |TCP|Data|Trailer|Auth | | |

UMA Security INTEGRITY: Algorithms 1.HMAC-SHAI-96 2.HMAC-MD5 3.AES-XCBC-MAC-96 AUTHENTICATION CONFIDENTIALITY INTEGRITY

UMA Security Weaknesses IMSI Encrypted, but transferred with Network Access ID (NAI) Mobile Station Authentication OPTIONAL (MITM attack) DoS Attack

UMA Security: Comparison with Other Technologies

ADVANTAGES AND DISADVANTAGES

For Consumers ● Single number for home and mobile calls ● Calls through wireless LAN's, can deploy your own home coverage ● Greatly reduced roaming charges ● One provider for home internet and cell phone coverage

For Providers ● Deploying Wi-Fi hotspots is cheaper than deploying WAN's ● Reduces load on cellular networks, shifting some burden to internet infrastructure ● Able to shift calls onto the cheaper internet infrastructure

Disadvantages ● UMA-compatible handsets are more expensive and less common ● UMA-enabled phones require two active transceivers to handle seamless call- switching ● Despite all this, it's still not as cheap as straightforward VOIP protocols

SERVICE DEPLOYMENT

Service Deployment Surveying A full site survey is necessary to determine coverage planning and WiFi channel planning The survey revolves around finding the RF characteristics of the weakest client in the network, specifically its transmit power Design Access Points to match Radio coverage of the dual-mode phone WiFi performance is solely dependent on the phone's signal to the Access Points, similar to a phone's signal from the tower affecting calling ability

Cisco UMA Deployment

UMA Deployment Wireless Control System gives support to standalone Access Points and also Wireless LAN Controller Wireless Control System also provides statistics on calls being made, WiFi Channel performance and coverage planning Access Points improve call quality and WiFi channel capacity to phones which are unable to to support n protocol

CONCLUSION AND QUESTIONS