70
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 WiFi Offload Architectures Peter Gaspar CSE, SP Mobile, Emerging Theater December 2011

WiFiOffload Architectures - cisco.com · Offload of expensive 3G Data ... Authentication needed for WiFi? Types of devices targeted for offload (smartphones, PCs, any device)? Mobility

Embed Size (px)

Citation preview

Cisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 1

WiFi Offload ArchitecturesPeter GasparCSE, SP Mobile, Emerging Theater

December 2011

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

• Motivation

• Offload Architectures

• Cisco SP WiFi Solution Core

• Cisco SP WiFi Solution Radio

• Summary

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 3

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

There will be 5B mobile devices and

2B M2M nodes

Video will be 66% of all mobile traffic by 2015

Global mobile traffic will grow 26X to 6.3 EB/mo

Source: Cisco Visual Networking Index (VNI) Global Mobile Data Forecast, 2010–2015

Mobile Video Driving Traffic Explosion

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Spectrum is Precious

PRO’s

Licensed spectrum

Operator managed network

LTE Femtos

CON’s

Prohibitive costs

Complex provisioning

Limited licensed spectrum

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 6

Small Cells Increase Existing Capacity

Macro

Consumer

Business Community

1000

100

10

1

1990 1995 2000 2005 2010 2015

Gro

wth

Spectrum

Macro

Capacity

26x

Growth

Future networks supporting the mobile Internet will need

to integrate smaller cell architectures to scale

2G/3G/4G

Wi-Fi

FemtoSource: Agilent

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

64QAM/

MIMO

16QAM

QPSK

64QAM/

MIMO

16QAM

QPSK

64QAM/

MIMO

16QAM

QPSK

64QAM/

MIMO

16QAM

QPSK

1 km

Macrocell (3G/4G)Voice coverage with

uniform bandwidth, but not always where people are

Limited data capacity

Sub-optimal delivery of high BW to POPs

High CapEx/OpEx: $400K

Poor spectral efficiency

New sites: Zoning issues

Wi-Fi/Femto/PicoDelivers targeted coverage

and capacity

Support high-capacity data

Precision delivery of high BW to POPs

Lower CapEx/OpEx

Good spectral efficiency

Low environmental impact

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

Improve Experiences

Three-screen experience and sessions

Video quality experience

Reduce Costs

Manage “Over The Top”

Optimize use of network assets

Increase Revenues

New business models

New services and partnerships

ARPU

(Revenue)

Data Traffic

(Costs)

$

Gap

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

Customer Retention

Superior performance advantages in WLAN coverage (4G-like Experience)

More flexible application delivery in WLAN (Facetime, Skype video calls, IPTV)

New Revenue Models

Localized advertising revenues (Mobile Service Advertising Protocol)

Business to Business Revenue opportunities

Offload of expensive 3G Data

OPEX savings on existing Macro 3G network

CAPEX savings on network expansion / capacity demand growth

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 10

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

• 3GPP Access

2G, 3G, LTE

• Non-3GPP IP Access

Trusted – own WiFi or trusted partner, encryption over the air, authentication

Untrusted – 3rd party public hotspot, home access point etc.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

• Used architecture depends on operator’s preferences

3rd party WiFi or own build WiFi?

Charging requirements for WiFi traffic?

Authentication needed for WiFi?

Types of devices targeted for offload (smartphones, PCs, any device)?

Mobility requirements?

Visiting customers and one-time customers integration?

• Selection of the suitable architecture is important to

Make sure offload will be utilized by subscribers (simple setup, available devices, benefits for subsriber…)

Reach expected level of service quality

The cost of the solution is balanced by the benefits

Achieve flexibility for future expansion

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

Architecture

Subscriber

Administration Needed

UE

ConfigurationPolicy Mobility

3rd Party

Networks

3rd Party

Offload

Contract with 3rd

partyyes no no yes

Transparent

Auto Logon

Purchase

User/Passwordyes

If routed to

coreExpandable If Roaming

EAP

Authentication

Non SIM

Subscribers onlyminimal

If routed to

coreExpandable

If EAP

Roaming

Hotspot 2.0Non SIM

Subscriber onlyno

If routed to

coreExpandable If Roaming

MIP Mobility Client Installation no yes yesYes, non

encrypted

I-WLAN and

MobilityClient Installation no yes yes

Yes,

encrypted

ProxyMIP no no yes

yes

(not seamless)

If MAG

enabled

Authentication

Mobility

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

BTS GGSN

AP

SGSN

Interne

t

Interne

t

Subscriber

3rd Party

3GPP Radio

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

PCEF

BTS GGSN

AP

SGSN

Interne

t

Interne

t

Subscriber

3rd Party

3GPP Radio

IPw

IPr

1. Subscriber activates service with WiFi SP

2. Subscriber configures the device to connect to WiFi SP

3. When in reach, device connects to WiFi using the configured method

4. All data traffic sent to WiFi SP,

5. 3GPP data session can be disconnected

1.

2.

4.

3.

5.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

BTS GGSN

AP

SGSN

Interne

t

Interne

t

Subscriber

3rd Party

3GPP Radio

IPw

IPr

1.

2.

4.

3.

5.

• Subscriber Administration

• Needs to have service from 3rd party

• UE Configuration

• Configures the SSID and authentication according to 3 rd party SPs requirements

• Configures precedence of WLAN over 3GPP Radio (if not default) and precedence

of the SSID

• Policy

• Traffic is not crossing mobile operator’s network, so no MO’s policies are possible

• Mobility

• Each radio has own IP address. Subscriber needs to configure, which interface is

to be used.

• Because Mobile Operator has no WLAN service agreement with subscriber,

mobility is not possible

• 3rd Party

• Based on use of 3rd party network

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN

AAA Portal

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Non-SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN

AAA Portal

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Non-SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

IPw

IPr

1.

2.4.

3.6.

7.

1. Subscriber associates to SSID

2. DHCP server assigns IP address

3. First packet triggers authentication, if subscribers MAC is not registered yet, AAA instructs

BNG to redirect

4. HTTP request redirected to log-in portal, subscriber logs-in or purchases one time access

(SMS, Credit Card etc.)

5. Portal update AAA with user’s MAC address

6. If user has logged in, AAA returns authentication success

7. Internet traffic can flow directly. BNG can do basic policing

8. For advanced policing and charging, traffic should be routed to core network’s PCEF

function

8.

5.

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN

AAA Portal

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Non-SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

IPw

IPr

1.

2.

4.3.5.

6.

7.

1. Subscriber associates to SSID

2. DHCP server assigns IP address

3. First packet triggers authentication, if subscriber has not logged in yet, AAA instructs ISG

to redirect

4. HTTP request redirected to log-in portal, subscriber logs-in or purchases one time access

(SMS, Credit Card etc.)

5. If user has logged in, AAA returns authentication success

6. Internet traffic can flow directly. ISG can do basic policing

7. For advanced policing and charging, traffic should be routed to core network’s PCEF

function

• Subscriber Administration

• Needs to purchase service from Mobile Operator, so he is provided with username

and password

• UE Configuration

• Configures the SSID

• Configures precedence of WLAN over 3GPP Radio

• Needs to enter username/password every time login expires

• Policy

• Traffic to be charged and policed, needs to be routed to the core of the network

• Basic policing can be implemented on ISG

• Mobility

• Each radio has own IP address. Subscriber needs to configure, which interface is

to be used.

• No seamless mobility.

• Mobile IP and I-WLAN can be added to the architecture to provide mobility

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Subscriber needs to know the correct SSID

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN

AAA PortalHLR

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

IPw

IPr

1.

2.

4.

3. 6.

7.

1. Subscriber associates to SSID

2. 802.1x EAP-SIM(AKA) request to AP

3. AP (or WLC) sends RADIUS auth-request

4. AAA server checks SIM credentials with HSS, optionally, AAA can register MAC

address as authenticated

5. Only after successful authentication, IP address is assigned

6. Optional: BNG may be used for basic policy control. First packet triggers

authentication, subscribers MAC is already registered (step 4)

7. Internet traffic can flow directly. Optionally, ISG can do basic policing

8. For advanced policing and charging, traffic should be routed to core network’s

PCEF function

8.

5.

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

IPw

IPr

1.

2.

4.

3. 6.

7.

1. Subscriber associates to SSID

2. 802.1x EAP-SIM(AKA) request to AP

3. AP (or WLC) sends RADIUS auth-request

4. AAA server checks SIM credentials with HSS, optionally, AAA can register MAC

address as authenticated

5. Only after successful authentication, IP address is assigned

6. Optional: ISG may be used for basic policy control. First packet triggers

authentication, subscribers MAC is already registered (step 4)

7. Internet traffic can flow directly. Optionally, ISG can do basic policing

8. For advanced policing and charging, traffic should be routed to core network’s

PCEF function

8.

5.

Visiting Subscriber – same as TAL architecture with

ISG, AAA and Portal

Non-SIM Subscriber - uses EAP-FAST or EAP-TLS

instead of EAP-SIM(AKA). User credentials need to be

provided to subscriber ―offline‖ or by Portal

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

IPw

IPr

1.

2.

4.

3. 6.

7.

1. Subscriber associates to SSID

2. 802.1x EAP-SIM(AKA) request to AP

3. AP (or WLC) sends RADIUS auth-request

4. AAA server checks SIM credentials with HSS, optionally, AAA can register MAC

address as authenticated

5. Only after successful authentication, IP address is assigned

6. Optional: ISG may be used for basic policy control. First packet triggers

authentication, subscribers MAC is already registered (step 4)

7. Internet traffic can flow directly. Optionally, ISG can do basic policing

8. For advanced policing and charging, traffic should be routed to core network’s

PCEF function

8.

5.

• Subscriber Administration

• Non-SIM subscriber needs to purchase service and receive credentials

• UE Configuration

• Configures the SSID

• Configures precedence of WLAN over 3GPP Radio

• One time configuration for EAP authentication

• Policy

• Traffic to be charged and policed, needs to be routed to the core of the network

• Basic policing can be implemented on ISG

• Mobility

• Each radio has own IP address. Subscriber needs to configure, which interface is

to be used.

• No seamless mobility.

• Mobile IP and I-WLAN can be added to the architecture to provide mobility

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Visited network may not support EAP. In such case subscriber needs to know his

username/password and log-in to visited login page

• Subscriber needs to know the correct SSID

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

802.11

Apple

Airport

Web

Auth

WISPr

1.0

Apple

iPhone

WISPr

2.0 HS2.0

1997 1999 2003 2007 2010 2011

TRUSTED WI-FI

NETWORK802.1x/802.11i 3G Offload

EAP-FAST

EAP-SIMEAP-TLS

802.1x

802.11i

UNTRUSTED WI-FI NETWORKWeb-Based Auth/No EncryptionMostly Hotspot Side Business

Username

Password

Username

Password

Username

PasswordEAP-SIM

Portal

Page

Auto

Portal Page

Auto

Portal Page

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

Roam, Authenticate, Monetize

SEAMLESS

Simplifies network discovery and selection for

seamless cellular data offload

SECUREExtends existing

SIM-based authentication

techniques over encrypted Wi-Fi

RELIABLECarrier-class

solution

PROFITABLEEnables location-based and value-added services

802.1x , EAP-SIM

Auto SIM credentials

Encrypted

Wi-Fi Link802.11i

1

802.11u

2 3 4

Mobile ―concierge‖ service

Mobile Service Advertisement Protocol

(MSAP)

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

Authentication and RoamingHotspot

(Today)

NGH

(HS2.0 Spec)

Network Discovery and Selection SSID 802.11u

L2 Authentication None 802.11x

Layer 2 Air Encryption None 802.11i

L3 AuthenticationWebAuth

WISPr

EAP-SIM,

AKA, TLS, TTLS

Hotspot Network Untrusted Trusted

IPR No Yes

Interoperable No Yes

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

• Subscriber Administration

• Non-SIM subscriber needs to purchase service and receive credentials

• UE Configuration

• Configures the SSID

• Configures precedence of WLAN over 3GPP Radio

• One time configuration for EAP authentication

• Policy

• Traffic to be charged and policed, needs to be routed to the core of the network

• Basic policing can be implemented on ISG

• Mobility

• Each radio has own IP address. Subscriber needs to configure, which interface is

to be used.

• No seamless mobility.

• Mobile IP and I-WLAN can be added to the architecture to provide mobility

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Visited network may not support EAP. In such case subscriber needs to know his

username/password and log-in to visited login page

• Subscriber needs to know the correct SSID

WBA initiative Hotspot 2.0 greatly simplifies subscribers interaction

needed for WLAN connections by specifying standardized set of protocols:• 802.11u

• exchange of services provided on AP• which SSID provides service of subscribers home operator

• 802.1x• EAP-SIM• EAP-TLS

• EAP-FAST• Roaming – WRIX specification

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

Integration

• Option 1: Through existing PCEF

+ reuses existing components and PCC interfaces

+ reuse of inline services

- Needs RADIUS proxy and support for IP sessions on PCEF

- challenging on status synchronization

• Option 2: New PCEF on Wireless Access Gateway (BNG/Cisco ISG, dedicated PCEF)

+ part of WiFi architecture, therefore synchronization is solved

- Needs new Gx/Gy interfaces on the backoffice systems (IOTs, licenses etc.)

- Needs separate inline services integration into new PCEF

• Option 3: Integration into packet core (GTP for 3G, PMIP for LTE)

+ reuse of components and PCC interfaces

+ path to session persistency – gateway and anchor point in the same box

+ reuse of inline services

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

Charging Intermezzo

AP

AP

AP

AP

AP

BTS

WLC

WLC

Cisco

ISG

eWAG

GGSN

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

AP

AP

AP

AP

AP

BTS

WLC

WLC

Cisco

ISG

eWAG

GGSN

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

GTP Tunnel/

PMIP Tunnel

L2 connection

1. EAP-SIM is used to authenticate user and create session

on Cisco ISG

2. After successful authentication, MAG function of Cisco

ISG opens PDP context on GGSN and gets IP address

assigned

3. MAG pushes the IP to client and finishes session creation

4. All traffic is sent to GGSN which can reuse PCC deployed

for 3G users

Charging Intermezzo

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

Charging Intermezzo

AP

AP

AP

AP

AP

BTS

WLC

WLC

Cisco

ISG

eWAG

GGSN

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

Visiting

Subscriber

Non-SIM

Subscriber

SIM

Subscriber

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

GTP Tunnel

L2 connection

1. EAP-SIM is used to authenticate user and create session

on Cisco ISG

2. After successful authentication, MAG function of Cisco

ISG opens PDP context on GGSN and gets IP address

assigned

3. MAG pushes the IP to client and finishes session creation

4. All traffic is sent to GGSN which can reuse PCC deployed

for 3G users

• Policy

• Greatly simplified PCC architecture – no new Gx/Gy interfaces, no new PCEF/DPI

box in the network

• No RADIUS message proxying needed

• 3GPP compliant charging

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

• Characteristics

UE has two active radios, two IP addresses

No interconnection between RAN controllers of the two networks

Each RAN provides internal mobility

WLAN RAN may be operator’s own or 3rd party

Authentication differs between WLAN and 3GPP

Encryption not provided by WLAN (except when EAP is used)

• Consequence

UE decides when to handover between radios without knowledge of the RAN and therefore client software is required

Anchor point is needed (Home Agent or Local Mobility Agent) to work with client for service continuity

• Mobility is independent of access architecture (TAL, EAP etc.). Access must be authenticated before mobility tunnel is created.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN

AP

AAA PortalHSS

HA PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

MIP Client

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN

AP

AAA PortalHSS

HA PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

MIP Client

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

1.2.

4.

3.

6.

1. Subscriber opens PDP context and gets IPr assigned

2. MIP Client registers with HA and gets IPm assigned.

Different HA can be selected for varios PDNs.

3. Data communication is anchored on the HA

4. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

5. MIP registers new location with HA

6. Data flows over WLAN now, still anchored on HA

5.

IPw

IPr

IPmMIP Tunnel

MIP Tunnel IPr – Assigned on 3G

IPw – Assigned on WLAN

IPm – Assigned by HA

If GGSN integrates HA function,

IPr can be used as home address and IPm is not needed

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN

AP

AAA PortalHSS

HA PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

MIP Client

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

1.2.

4.

3.

6.

1. Subscriber opens PDP context and gets IPr assigned

2. MIP Client registers with HA and gets IPm assigned

3. Data communication is anchored on the HA

4. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

5. MIP registers new location with HA

6. Data flows over WLAN now, still anchored on HA

5.

IPw

IPr

IPm

• Subscriber Administration

• Mobile IP client download and installation

• UE Configuration

• Besides authentication setup, no extra configuration. All configuration is

predefined in client software

• Policy

• All traffic is anchored at HA

• PCEF function is close/integrated to HA, all traffic can be policed

• Mobility

• Seamless mobility

• Client Software decides when the handover is needed

• All communication from Internet goes to Ipm

• User data over WLAN is encrypted if EAP is used

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Works over 3rd party networks, unencrypted

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG

GGSN/

HA

AP

AAA PortalHSS

PCEF

PCRF Billing

PDG

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

I-WLAN

Client

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN

AP

AAA PortalHSS

PCEF

PCRF Billing

PDG

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

I-WLAN

Client

IPSec

IPr

IPw

1.

2.

4.3.

5.

IPp

1. Subscriber opens PDP context and gets IPr assigned

2. Data communication flows through the GGSN

3. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

4. I-WLAN Client opens IPSec session towards PDG,

request includes the W-APN required, IPp is assigned for

WLAN communication

5. Data flows over WLAN now

IPr – Assigned on 3G

IPw – Assigned on WLAN

IPp – Assigned by PDG to tunnel

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN/

HA

AP

AAA PortalHSS

PCEF

PCRF Billing

PDG

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

I-WLAN

Client

IPSec

IPr

IPw

1.

2.

4.3.

6.

1. Subscriber opens PDP context and gets IPr assigned, this

should also be his Home Address

2. Data communication is anchored on the GGSN

3. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

4. I-WLAN Client opens IPSec session towards PDG,

request includes the W-APN required, IPp is assigned

5. I-WLAN Client connects to the HA and registers IPp as his

CoA

6. Data flows over WLAN now, still anchored on GGSN/HA

5.

IPp

IPr – Assigned on 3G

IPw – Assigned on WLAN

IPm – Assigned by HA

GGSN integrates HA function, IPr

is used as home address

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN

AP

AAA PortalHSS

PCEF

PCRF Billing

TTG

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

Gn ’

I-WLAN

Client

IPSec

IPr

IPw

GTP

ePDG

1.

2.

4.3.

6.

1. Subscriber opens PDP context and gets IPr assigned

2. Data communication is anchored on the GGSN

3. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

4. I-WLAN Client opens IPSec session towards TTG

5. I-WLAN Client requests PDP (GTP Tunnel) handover

from 3GPP access

6. Data flows over WLAN now, still anchored on GGSN

5.

• Subscriber Administration

• I-WLAN client download and installation

• UE Configuration

• Besides authentication setup, no extra configuration. All configuration is

predefined in client software

• Policy

• All traffic is anchored at GGSN/HA

• PCEF function is close/integrated to GGSN, all traffic can be policed

• Mobility

• Seamless mobility

• Client Software decides when the handover is needed

• All communication from Internet goes to IPr (assigned from GGSN)

• User data over WLAN are encrypted

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Works over 3rd party networks, encrypted

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG/M

AG

GGSN/

MAG

AP

AAA PortalHSS

P-GW

LMA(H

A)

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41

P-GW

LMA(H

A)

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG/M

AG

GGSN/

MAG

AP

AAA PortalHSS

PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

1.

2.

6.

1. ProxyMIP enabled subscriber opens PDP context

2. GGSNs MAG function registers with LMA and requests

home address of subscriber (IPm)

3. IPm is assigned over GTP to the PDP context

4. All traffic is switched between GTP and PMIP tunnels

5. User moves to WiFi, BNG requests home address

form LMA (again IPm is returned)

6. BNG assignes IPm to UE on L2 connection between

UE and BNG

7. BNG switches traffic between L2 connection and PMIP

tunnel

4.

IPm

IPm

PMIP Tunnel

IPm – Assigned by LMA

Integrating LMA with GGSN

simplifies architecture

PMIP Tunnel

GTP

L2 connection

3.

5.

7.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43

AP

AP

AP

AP

AP

BTS

WLC

WLC

BNG/M

AG

GGSN/

MAG

AP

AAA PortalHSS

LMA(H

A)PCEF

PCRF Billing

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

1.

2.

6.

1. ProxyMIP enabled subscriber opens PDP context

2. GGSNs MAG function registers with LMA and requests

home address of subscriber (IPm)

3. IPm is assigned over GTP to the PDP context

4. All traffic is switched between GTP and PMIP tunnels

5. User moves to WiFi, BNG requests home address

form LMA (again IPm is returned)

6. BNG assignes IPm to UE on L2 connection between

UE and BNG

7. BNG switches traffic between L2 connection and PMIP

tunnel

4.

IPm

IPm

PMIP Tunnel

IPm – Assigned by LMA

Integrating LMA with GGSN

simplifies architecture

PMIP Tunnel

GTP

L2 connection

3.

5.

7.

• Subscriber Administration

• None

• UE Configuration

• Besides authentication setup, no extra configuration.

• Policy

• All traffic is anchored at GGSN/HA

• PCEF function is close/integrated to GGSN, all traffic can be policed

• Mobility

• IP persistency

• Not seamless. Handover time depends on OS or drivers because UE has to deal

with single IP address on two active interfaces and trigger switchover.

• Client Software (connection manager) is needed, if handover should be

deterministic and seamless.

• All communication from Internet goes to Ipm (assigned by LMA)

• User data over WLAN are encrypted if EAP is used

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Works over 3rd party networks, encrypted

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN/

LMA

AP

AAA PortalHSS

PCEF

PCRF Billing

PDG/M

AG

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

I-WLAN

Client

IPSec

IPr

IPw

1.

2.

4.

3.

6.

1. Subscriber opens PDP context and gets IPr assigned, this

should also be his Home Address

2. Data communication is anchored on the GGSN

3. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

4. I-WLAN Client opens IPSec session towards PDG,

request includes the W-APN required

5. PDGs MAG function requests IP from LMA. This is

assigned to IPSec tunnel

6. PDG switches traffic between IPSec and PMIP tunnel

5.

IPr

IPr – Assigned on 3G as home

IPw – Assigned on WLAN

GGSN integrates LMA function,

IPr is used as home address

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45

AP

AP

AP

AP

AP

BTS

WLC

WLC

ISG

GGSN/

LMA

AP

AAA PortalHSS

PCEF

PCRF Billing

PDG/M

AG

SGSN

Interne

t

Interne

t

3rd Party

Hot Zone

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

I-WLAN

Client

IPSec

IPr

IPw

1.

2.

4.

3.

6.

1. Subscriber opens PDP context and gets IPr assigned, this

should also be his Home Address

2. Data communication is anchored on the GGSN

3. Subscriber reaches WLAN coverage and UE

authenticates with WLAN using one of the methods

earlier. UE gets IPw assigned

4. I-WLAN Client opens IPSec session towards PDG,

request includes the W-APN required

5. PDGs MAG function requests IP from LMA. This is

assigned to IPSec tunnel

6. PDG switches traffic between IPSec and PMIP tunnel

5.

IPr

IPr – Assigned on 3G as home

IPw – Assigned on WLAN

GGSN integrates LMA function,

IPr is used as home address

• Subscriber Administration

• I-WLAN client download and installation

• UE Configuration

• Besides authentication setup, no extra configuration. All configuration is

predefined in client software

• Policy

• All traffic is anchored at GGSN/HA

• PCEF function is close/integrated to GGSN, all traffic can be policed

• Mobility

• Seamless mobility

• Client Software does not need to support Mobile IP, but should function as

connection manager

• All communication from Internet goes to IPr (assigned from GGSN)

• User data over WLAN are encrypted

• 3rd Party

• If 3rd party has roaming agreement with mobile operator, registered users may

login in visited network

• Works over 3rd party networks, encrypted

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46

• Two active radios in UE

Network does not have full control about active connections on the UE

Same IP address can be assigned to two interfaces for certain period of time

UE decides when which radio is to be used

• Consequence

Each OS can behave differently, depending on the IP stack implementation

Handover can take from milliseconds to multiple seconds

For seamless handover, intelligent connection manager is needed

• However

Most application do not require seamless handover

IP persistency is enough

• Example YouTube – What happens after change from 3GPP to WLAN

No Handover – Video needs to be reloaded after user moved from 3GPP to WLAN

IP Persistency (PMIP) – Video pauses and needs to be restarted.

Seamless Handover (PMIP with Connection manager) – user does not notice

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

• In 3G, only PMIP for I-WLAN is specified

However, customer architectures can include standard IETF elements either as standalone or integrated into packet core elements

• In LTE, MIP is integral part of specification

• Client Mobile IP

DSMIPv6 for S2c interface

PDN-GW as HA

• Proxy Mobile IP

PMIPv6 used

PDN-GW as LMA

ePDG as MAG (S2b interface)

Trusted non-3GPP access as MAG (S2a interface)

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48

AP

AP

AP

AP

AP

eNB

WLC

WLC

BNG/M

AG

P-GW

LMA

AP

AAA PortalHSS

ePDG

PCEF

PCRF Billing

S-GW

Interne

t

Interne

t

3rd Party

Untrusted

Hot Zone

Trusted

Hot Spots

3GPP Radio

On-Net

DHCP

Gx Gy

S2c

DSMIPv6

S2c

DSMIPv6

SWu

IPSec

SWu

IPSec

S2b

PMIPv6S2a

PMIPv6

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49

3GPP TS 23.402

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50

3GPP TS 23.402

LMA

MAG

MAG

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51

3GPP TS 23.402

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52

3GPP TS 23.402

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53

3GPP TS 23.402

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54

Architecture

Subscriber

Administration Needed

UE

ConfigurationPolicy Mobility

3rd Party

Networks

3rd Party

Offload

Contract with 3rd

partyyes no no yes

Transparent

Auto Logon

Purchase

User/Passwordyes

If routed to

coreExpandable If Roaming

EAP

Authentication

Non SIM

Subscribers onlyminimal

If routed to

coreExpandable

If EAP

Roaming

Hotspot 2.0Non SIM

Subscriber onlyno

If routed to

coreExpandable If Roaming

MIP Mobility Client Installation no yes yesYes, non

encrypted

I-WLAN and

MobilityClient Installation no yes yes

Yes,

encrypted

ProxyMIP no no yes

yes

(not seamless)

If MAG

enabled

For Your

Reference

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55

• MSAP (Cisco proprietary)

Advertisement push

Localized and targeted

• Access Network Discovery and Selection Function (ANDSF)

Centralized database of policies for connection managers

UE can contact the ANDSF to update the rules like: Priority of different access types,

time of day for priorities, timers for handover etc.

Later, it will also be possible to bound application to certain access type

• Breakout for Seamless mobility

Send cheap traffic directly to Internet

Send traffic to core only if policy needed

• Voice integration

IMS integration (client)

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56

Offload New Revenues

Operator Benefits Macro network savings (OPEX)

Cost efficient network expansions (CAPEX)

Advertisement revenues

Service for one-time customersRoaming ChargesB2B revenues

Enablers in the

Architecture

EAP-SIM Authentication

(WLAN/3G Mobility)RoamingPreconfigured devices

Cisco MSAP

Portal based authenticationRoaming

Subscriber

Communication

Flat WLAN rate for monthly fee

4G coverage (speed)Loose policies in WLAN coverageRural (Villages) Broadband Coverage

Time-limited use of WLAN with online

payment (CC, SMS)Roaming for visiting customersManaged WLAN coverage

Managed Enterprise WLAN with UCWholesale WLAN

Targeted and localized advertisement

Reduction of Churn (more services, better network quality, innovation leadership…)

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 57

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58

Access + Aggregation + Core

Open/Walled Garden

Internet/Core

VideoAudioServers

AAA

Server

Policy

Server

Web

Portal

DHCP

Server

Subscriber Policy Layer

ASR 1000

Access

Unified Architecture

Radio Intelligence

Access Aggregation

Seamless

Experienc

e

Access

Network SP

HLR/HSS Policy

Server

Web

Portal

DH CP

Server

Subscriber Policy Layer

Mobile Packet Core

Converged

Core

Mobile

Network SP

ASR 5000

Controller

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59

Macro

Coverage

Cell

Packet

Core

Radio

Network

Controller

Licensed

Femto

Cell

Packet

Core

Femto

Controller

Wi-Fi

Controller

Trusted

Unlicensed

SP Wi-Fi

Un-

trusted

Wi-Fi

AP

ePDG

TTG

I-WLAN

IPSec Access

HS 2.0

Inter-Tech H/O

Packet

Core

UE UE

Packet

Core

Packet

Core

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60

Separation of Platform and Functions

In-Line

Services*

Stateful Firewall

Dynamic Policy

Enhanced Charging Service

Content Filtering

Heuristic DPI

Peer-to-Peer Detectionand Control

Intelligent Traffic Control

TPO

Control = Green Bearer = Purple

Network

Function

Modules*

Session Control Manager: P-CSCF, I-CSCF, S-CSCF

GGSN HA A-BG PGW

SGSN PDSN HSGW ASN GW TTG PDG Femto GW MME SGW

Platforms ASR5K EMS

*Current and future solutions

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61

CAPWAP C&U Plane

Standalone

Hotspot/SMB

Stadium

Metro and

Integrated

Hotspot

Cellular/WiMAX

Native

Rx

Gx

I-WLAN / IPSec / IKEv2

PMIPv6

CAPWAP RRM (optional)

CAPWAP

RRM

L2VPN

L2VPN

L2VPN

CMIPv4

PMIPv4

Iuh/IPSec

ASNGWPDSNGGSN

TTGPDGHA

PCEF

ResidentialAP CPE

AP

AP

AP

FemtoAP

AccessZone Router

WLCOn prem.

Content

ISG

WLC

Cloud

WLC Portal/PCRF

Portal

IP Services

Carrier Core Network

CellularBase

Station

Third Party AP

Agg.

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 62

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63

Not All Access Points Are the Same

Sophisticated spectrum Intelligence to monitor the airwaves;

detect, locate and classify interference; alert Ops; and reconfigure the network to avoid Improves Network Reliability

Optimized RF utilization by moving 5 GHz capable client

out of the congested 2.4 GHz channelsImproves Network Throughput

Extends reliable multicast into the wireless network by

converting multicast to unicast at the APQuality Video over WLAN

Best in class Radio Resource Management coupled with

beamforming to deliver focused power to clientsImproves Network Throughput and Coverage

ClientLink

CleanAir

BandSelect

VideoStream

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64

Reduction in Coverage

Holes for 11a/g devices

Higher data rates with fewer

dropped packets

Miercom Testing Validation

ClientLink Benefits Miercom Testing Results

Increases overall

wireless system

channel capacity

Faster 11a/g transactions

opens airtime to increase 11n performance

Improves throughput for

existing 802.11a/g

devices

Extends useful life of older

devices, saving upgrade costs

Throughput vs. Distance Up to 65% increase in

throughput for 11a/g

devices

Up to 27%

Improvement in

Channel Capacity

Fewer coverage holes

in dynamic RF

environments

ClientLink Disabled ClientLink Enabled

Channel Util of 74.2% Channel Util of 45.2%

ClientLink Disabled ClientLink Enabled

< 14 Mbps

> 14 Mbps

25%

75%56%44%

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 65

Silicon-level intelligence to automatically mitigate the impact of

wireless interference, optimize network performance and reduce

troubleshooting costs

Classification processed on Access Point

Interference impact & data sent to WLC for real-time action

WCS & MSE store data for location, history, and troubleshooting

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66

OUTDOOR INDOOR

Cisco Confidential 66© 2011 Cisco and/or its affiliates. All rights reserved.

• 1550 Series—four models

• DOCSIS 3.0 and EuroDOCSIS 3.0 option

• Dual radio APs and dual band stick antennas

• RF excellence with:CleanAir

ClientLink

RRM

VideoStream

• 3500 Series

• 2x3 MIMO

• RF excellence with:

CleanAir

ClientLink

RRM

VideoStream

Band Select

• 1140 or 1260 Series

• 2x3 MIMO

• RF excellence with:ClientLink

BandSelect

RRM

VideoStream

For reliable, high-performance rich media experience

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67

Accelerated Deployment and Reduced OpEx

Provisioning: Automatic image download

Self-Configuring:Zero-touch configuration

Operational management through CAPWAP standard

interface for visibility, control, troubleshooting,

and reporting

Wireless Control System (WCS)

Based on Customer Experience

Operational Management Reduced

by

Deployment Time Reduced by

Network Visibility, Stability, and End-User Performance

Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 68

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69

Offload Architectures

Each MO has different motivation for Offload

Multiple technologies can be deployed depending on requirements

Flexibility is needed to adopt the architecture to new business models

Flexible and Modular Core

Different levels of offload integration are supported

Step-by-step deployment as requirements grow

Integrated core functions in the ASR 5000

Developed in-line with 3GPP standards

Outstanding Radio Performance

Years of experience

Controller based for better RRM, Security and Mobility

CleanAir, ClientLink, BandSelect, VideoStream

Industry leading outdoor access points