UMTS Core Network

Total Page:16

File Type:pdf, Size:1020Kb

UMTS Core Network UMTS Core Network V. Mancuso, I. Tinnirello GSM/GPRS Network Architecture Radio access network GSM/GPRS core network BSS PSTN, ISDN PSTN, MSC GMSC BTS VLR MS BSC HLR PCU AuC SGSN EIR BTS IP Backbone GGSN database Internet V. Mancuso, I. Tinnirello 3GPP Rel.’99 Network Architecture Radio access network Core network (GSM/GPRS-based) UTRAN PSTN Iub RNC MSC GMSC Iu CS BS VLR UE HLR Uu Iur AuC Iub RNC SGSN Iu PS EIR BS Gn IP Backbone GGSN database Internet V. Mancuso, I. Tinnirello 3GPP RelRel.’99.’99 Network Architecture Radio access network 2G => 3G MS => UE UTRAN (User Equipment), often also called (user) terminal Iub RNC New air (radio) interface BS based on WCDMA access UE technology Uu Iur New RAN architecture Iub RNC (Iur interface is available for BS soft handover, BSC => RNC) V. Mancuso, I. Tinnirello 3GPP Rel.’99 Network Architecture Changes in the core Core network (GSM/GPRS-based) network: PSTN MSC is upgraded to 3G MSC GMSC Iu CS MSC VLR SGSN is upgraded to 3G HLR SGSN AuC SGSN GMSC and GGSN remain Iu PS EIR the same Gn GGSN AuC is upgraded (more IP Backbone security features in 3G) Internet V. Mancuso, I. Tinnirello 3GPP Rel.4 Network Architecture UTRAN Circuit Switched (CS) core network (UMTS Terrestrial Radio Access Network) MSC GMSC Server Server SGW SGW PSTN MGW MGW New option in Rel.4: GERAN (GSM and EDGE Radio Access Network) PS core as in Rel.’99 V. Mancuso, I. Tinnirello 3GPP Rel.4 Network Architecture MSC Server takes care Circuit Switched (CS) core of call control signalling network The user connections MSC GMSC are set up via MGW Server Server (Media GateWay) SGW SGW PSTN “Lower layer” protocol conversion in SGW MGW MGW (Signalling GateWay) RANAP / ISUP PS core as in Rel.’99 SS7 MTP IP Sigtran V. Mancuso, I. Tinnirello 3GPP Rel.5 Network Architecture UTRAN CS core (UMTS Terrestrial Radio PSTN Access Network) MGW New core network part: IMS (IP Multimedia HSS System) GERAN Internet (GSM and EDGE Radio Access Network) SGSN GGSN PS core V. Mancuso, I. Tinnirello 3GPP Rel.5 Network Architecture The IMS can establish CS core multimedia sessions PSTN (using IP transport) MGW via PS core between UE and Internet (or IMS (IP IMS other/ Internet another IMS) Multimedia HSS Call/session control System) using SIP (Session Initiating Protocol) SGSN GGSN Interworking with the PSTN may be required for some time ... PS core V. Mancuso, I. Tinnirello New Service Concept Content provider Content provider Service provider Service provider Carrier provider all want to make profit End user End user V. Mancuso, I. Tinnirello OSA (Open Services Architecture/Access) OSA is being standardised, so that services provided by different service/content providers can be created and seamlessly integrated into the 3G network (this is the meaning of “open” architecture) OSA means in practice: Service Creation Environment (SCE) API = Application API API API Programming Interface 3G network (Standardised) V. Mancuso, I. Tinnirello CAMEL (2G & 3G) CAMEL (Customised Applications for Mobile network Enhanced Logic) is a set of “IN” (intelligent network) type functions and procedures that make operator-specific IN services available to subscribers who roam outside their home network. CAMEL = IN technology + global mobility CAMEL Service Environment (CSE) is a logical entity in the subscriber’s home network which processes IN related procedures CSE ≈ SCP in home network V. Mancuso, I. Tinnirello The IMS The IP Multimedia Subsystem Vincenzo Mancuso, PhD V. Mancuso, I. Tinnirello The IMS The Third generation networks aim to merge two most valuable resources in communication technology, along with local PSTN networks Cellular Networks The Internet Use packet switching, IP The IP Multimedia Subsystem or IMS is the solution to integrate all the services that the internet provides with the cellular and other networks Triple Play: coordination of voice, video and data V. Mancuso, I. Tinnirello IMS ValueValue--addedadded services IMS also can provide integrated service to the user Third party developed services can be provided by operators, thus developing value-added services Appropriate charging for multimedia sessions, according to the content and the service offered V. Mancuso, I. Tinnirello IMS Service Integration Problem Statement: various networks providing services have a “vertical infrastructure” no horizontal links between networks The challenge: to integrate these networks and to create new applications that would provide service to next generation networks V. Mancuso, I. Tinnirello Component #1: the media transport After many other services, introduction of real time voice/video on Internet The 1 st problem is easy: how to transmit voice/video? IP packets RTP (Real-Time Protocol) is a protocol which transports an encoded multimedia stream as pieces, with a timestamp on each piece, and sends Codec them using UDP/IP RTP Any encoding is permitted for voice/video with UDP a Codec: MP3, ACC, MPEG4, AMR… IP Several streams (voice+video) can be sent in parallel with the same timestamp The timestamp is used by the receiver to play the voice/video in a regular way for quality RTP is the media transport V. Mancuso, I. Tinnirello Component #2: session initiation The 2 nd problem is more difficult: how to initiate the call? how to know the IP- Registration of Betty’s phone and address address of the called phone? It is necessary to have a table which translates a symbolic name “Betty” into an IP address Each time a terminal service is put on, it must notify its presence to update the table So, thanks to an access to this table, it is possible to make the address resolution : name -> IP Registration of John’s phone and address address The control of the address table creates a tough competition… V. Mancuso, I. Tinnirello Why IMS? Solutions to make the address resolutions MSN, Yahoo, AOL have designed a calling architecture hyper- centralized: 1 table worldwide, only 1 operator Skype promotes a hyper- “The introduction and development of decentralized architecture: solution like Skype is highly significant as it alters the notion of 1 table per terminal with telecommunications operators by peer-to-peer update making the process fully electronic“ between terminals IDATE - ART, 2004 Operators dislike such approaches, so they push a way very similar to e-mail: centralization per domain. This approach is named “Internet Protocol Multimedia Subsystem”, IMS. V. Mancuso, I. Tinnirello IMS User Identities Sip:[email protected] tel:+17324567888 [email protected] m Private User Identity IMS Subscriber Sip:[email protected] tel:+88028112347 Public User Identities V. Mancuso, I. Tinnirello User Identity Private identity Public Service User Identity 1 Profile 1 Issued by home provider Implicitly Registered ID Used for AAA Private Public Set 1 Service Saved on ISIM (not modifiable) User Identity 1 User Identity 2 Profile 2 Public identity Public User Identity 3 Normal SIP address (URI or TEL) IMS Implicitly Subscription Registered ID Set 2 Identifies the user publicly Public Service User Identity 4 Profile 3 User has one or more identities Used for routing Private Public User Identity 2 User Identity 5 Can be grouped into implicit registration sets Implicitly Registered ID Set 3 If one of the set is registered then the others are as well Public Service User Identity 6 Profile 4 At least one is stored on ISIM In case no ISIM is provided » Use a temporary identity derived from USIM during initial registration (derived from IMSI) » PIDs are then provided by the S-CSCF in its reply to the registration V. Mancuso, I. Tinnirello UICC Universal Integrated Circuit Card Used to store data, including authentication information Contains one or more applications SMS Phonebook … SIM GSM Subscriber Identity Module USIM UMTS SIM ISIM IMS SIM Applications are independent SIM, USIM and ISIM can coexist on the same UICC … but SIM cannot be used for IMS access (for security reasons) V. Mancuso, I. Tinnirello IP Multimedia Subsystem Next-gen An enabler A standard network of new architecture applications Converged Services SIP Rich Communications IMS Push ---222---Talk SIP Video Clips PushPush----2222----ViewView Sports, News PushPush----2222----XXXX IP Network Presence, LocationLocation---- SIP Voice based Services SIP SIP ServiceService----layerlayer SIP Picture Messaging, EEE-E---mailmail MM Messaging IMIMIM ControlControl----layerlayer At Home On the Move In the Office Streaming Games, Audio, Video Music IMS is access agnostic, cost reducing, and service Downloads TransportTransport----layerlayer enhancing Interactive Services, Interactive Gaming IMS gives the customer & carrier choice V. Mancuso, I. Tinnirello IMS Goals & Tools V. Mancuso, I. Tinnirello IMS goals Combine latest trends in tech Run fast, no time for standardization of services Mobile/Nomadic internet Create a platform for multimedia services … and their development Exploit/allow mobile packet- switching networks Not a mere circuit-switching replacement V. Mancuso, I. Tinnirello IMS requirements Support for establishing IP Multimedia Sessions Audio, video, messaging… Support for mechanisms to negotiate QoS distinguish users operators want to control QoS Support for interworking with Internet with packet-switching networks Support for roaming Home and visited network Inter-operators roaming … V. Mancuso, I. Tinnirello IMS requirements (cont’d) … Support for user activity control policies imposed by the operator (general policies and per-user policies) accomplish to service agreements Support for fast service creation don’t require service standardization Standardize service capabilities instead Support for multiple access Not only GPRS, UMTS IP is independent on lower protocol layers V. Mancuso, I. Tinnirello Protocols in IMS 3GPP reuses protocol developed by other standards development organizations ETSI (European Telecommunications Standard Institute) IETF (Internet Engineering Task Force) ITU-T (International Telecommunications Union - Telecommunications) 3GPP interacts with standards development organizations as for the development of existing and new protocols Protocols RTP for media transport Session control protocols AAA protocols Other V.
Recommended publications
  • Evolution of Switching Techniques Frequency Division Multiplexing
    Evolution of Switching Techniques 1. Dedicate Channel. Separate wire frequency division multiplexing (FDM) time division multiplexing (TDM) Multiplexor (MUX) Demultiplexor (Concentrator) DEMUX individual lines shared individual lines high speed line Frequency Frequency Channel 1 available bandwidth 2 1 2 3 4 1 2 3 4 1 2 3 4 3 4 FDM Time TDM Time chow CS522 F2001—Multiplexing and Switching—10/17/2001—Page 1 Frequency Division Multiplexing (FDM) chow CS522 F2001—Multiplexing and Switching—10/17/2001—Page 2 Wavelength Division Multiplexing chow CS522 F2001—Multiplexing and Switching—10/17/2001—Page 3 Impact of WDM z Many big organizations are starting projects to design WDM system or DWDN (Dense Wave Division Mutiplexing Network). We may see products appear in next three years.In Fujitsu and CCL/Taiwan, 128 different wavelengthes on the same strand of fiber was reported working in the lab. z We may have optical routers between end systems that can take one wavelenght signal, covert to different wavelenght, send it out on different links. Some are designing traditional routers that covert optical signal to electronical signal, and use time slot interchange based on high speed memory to do the switching, the convert the electronic signal back to optical signal. z With this type of optical networks, we will have a virtual circuit network, where each connection is assigned some wave length. Each connection can have 2.4 gbps tremedous bandwidth. z With inital 128 different wavelength, we can have about 10 end users. If each pair of end users needs to communicate simultaneously, it will use 10*10=100 different wavelength.
    [Show full text]
  • Lecture 8: Overview of Computer Networking Roadmap
    Lecture 8: Overview of Computer Networking Slides adapted from those of Computer Networking: A Top Down Approach, 5th edition. Jim Kurose, Keith Ross, Addison-Wesley, April 2009. Roadmap ! what’s the Internet? ! network edge: hosts, access net ! network core: packet/circuit switching, Internet structure ! performance: loss, delay, throughput ! media distribution: UDP, TCP/IP 1 What’s the Internet: “nuts and bolts” view PC ! millions of connected Mobile network computing devices: server Global ISP hosts = end systems wireless laptop " running network apps cellular handheld Home network ! communication links Regional ISP " fiber, copper, radio, satellite access " points transmission rate = bandwidth Institutional network wired links ! routers: forward packets (chunks of router data) What’s the Internet: “nuts and bolts” view ! protocols control sending, receiving Mobile network of msgs Global ISP " e.g., TCP, IP, HTTP, Skype, Ethernet ! Internet: “network of networks” Home network " loosely hierarchical Regional ISP " public Internet versus private intranet Institutional network ! Internet standards " RFC: Request for comments " IETF: Internet Engineering Task Force 2 A closer look at network structure: ! network edge: applications and hosts ! access networks, physical media: wired, wireless communication links ! network core: " interconnected routers " network of networks The network edge: ! end systems (hosts): " run application programs " e.g. Web, email " at “edge of network” peer-peer ! client/server model " client host requests, receives
    [Show full text]
  • Circuit-Switched Coherence
    Circuit-Switched Coherence ‡Natalie Enright Jerger, ‡Mikko Lipasti, and ?Li-Shiuan Peh ‡Electrical and Computer Engineering Department, University of Wisconsin-Madison ?Department of Electrical Engineering, Princeton University Abstract—Circuit-switched networks can significantly lower contention, overall system performance can degrade by 20% the communication latency between processor cores, when or more. This latency sensitivity coupled with low link uti- compared to packet-switched networks, since once circuits are set up, communication latency approaches pure intercon- lization motivates our exploration of circuit-switched fabrics nect delay. However, if circuits are not frequently reused, the for CMPs. long set up time and poorer interconnect utilization can hurt Our investigations show that traditional circuit-switched overall performance. To combat this problem, we propose a hybrid router design which intermingles packet-switched networks do not perform well, as circuits are not reused suf- flits with circuit-switched flits. Additionally, we co-design a ficiently to amortize circuit setup delay. This observation prediction-based coherence protocol that leverages the exis- motivates a network with a hybrid router design that sup- tence of circuits to optimize pair-wise sharing between cores. The protocol allows pair-wise sharers to communicate di- ports both circuit and packet switching with very fast circuit rectly with each other via circuits and drives up circuit reuse. reconfiguration (setup/teardown). Our preliminary results Circuit-switched coherence provides overall system perfor- show this leading to up to 8% improvement in overall system mance improvements of up to 17% with an average improve- performance over a packet-switched fabric. ment of 10% and reduces network latency by up to 30%.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • F. Circuit Switching
    CSE 3461: Introduction to Computer Networking and Internet Technologies Circuit Switching Presentation F Study: 10.1, 10.2, 8 .1, 8.2 (without SONET/SDH), 8.4 10-02-2012 A Closer Look At Network Structure: • network edge: applications and hosts • network core: —routers —network of networks • access networks, physical media: communication links d. xuan 2 1 The Network Core • mesh of interconnected routers • the fundamental question: how is data transferred through net? —circuit switching: dedicated circuit per call: telephone net —packet-switching: data sent thru net in discrete “chunks” d. xuan 3 Network Layer Functions • transport packet from sending to receiving hosts application transport • network layer protocols in network data link network physical every host, router network data link network data link physical data link three important functions: physical physical network data link • path determination: route physical network data link taken by packets from source physical to dest. Routing algorithms network network data link • switching: move packets from data link physical physical router’s input to appropriate network data link application router output physical transport network data link • call setup: some network physical architectures require router call setup along path before data flows d. xuan 4 2 Network Core: Circuit Switching End-end resources reserved for “call” • link bandwidth, switch capacity • dedicated resources: no sharing • circuit-like (guaranteed) performance • call setup required d. xuan 5 Circuit Switching • Dedicated communication path between two stations • Three phases — Establish (set up connection) — Data Transfer — Disconnect • Must have switching capacity and channel capacity to establish connection • Must have intelligence to work out routing • Inefficient — Channel capacity dedicated for duration of connection — If no data, capacity wasted • Set up (connection) takes time • Once connected, transfer is transparent • Developed for voice traffic (phone) g.
    [Show full text]
  • Application Note: 2-Cell Test Environment
    Application Note 2-cell Test Environment MD8475A Signalling Tester 1. Background to LTE Rollout Mobile phones appearing in the late 1980s soon experienced rapid evolution of functions from 1990 to 2000 and also spread worldwide as key communications infrastructure. The mobile phone is not limited to just two-way communications between two people but also supports sending and receiving of Short Message Services (SMS), web browsing using the Internet, application and video download, etc., and has become a popular and key cultural tool supporting a fuller lifestyle for many people. Figure 1. Evolution on UE According to one research company, total mobile phone (terminal) shipments at the end of 2010 were valued at $38 billion split between 45% for 2G phones and 49% for 3G. Table 1. Mobile Terminal Shipments Mobile Terminal Shipments ($38 billion total) LTE 1.3% WiMAX 4.0% W-CDMA 40.0% CDMA 9.3% GSM 45.4% 1 MD8475A-E-F-1 The purpose of the shift from 2G to 3G systems was to make more efficient use of frequency bandwidths and was closely related to the explosive growth of the Internet. While still maintaining the easy portability of a mobile phone, users were able to access the information they needed easily at any time and place using the Internet. Similarly to growth of 3G technology, the requirements of LTE systems, which is are positioned in the market as 3.9G to maintain competitiveness with coming 4G systems, are being examined. Connectivity with IP-based core networks must be maintained to support multimedia applications and ubiquitous networks using the packet domain.
    [Show full text]
  • Lecture #9 3G & 4G Mobile Systems E-716-A
    Integrated Technical Education Cluster Banna - At AlAmeeria ‎ © Ahmad El E-716-A Mobile Communications Systems Lecture #9 3G & 4G Mobile Systems Instructor: Dr. Ahmad El-Banna December 2014 1 Ok, let’s change ! change Ok, let’s 2 E-716-A, Lec#9 , Dec 2014 © Ahmad El-Banna Banna Agenda - Evolution from 2G to 3G © Ahmad El 3G Systems Objectives Alternative Interfaces UMTS , Lec#9 , Dec 2014 Dec Lec#9 , , A - 716 3.5G (HSPA) - E 4G (LTE) 3 Evolution from 2G Banna - 2G IS-95 GSM- IS-136 & PDC © Ahmad El GPRS IS-95B 2.5G HSCSD EDGE , Lec#9 , Dec 2014 Dec Lec#9 , , A - 716 - E Cdma2000-1xRTT W-CDMA 3G EDGE Cdma2000-1xEV,DV,DO 4 TD-SCDMA Cdma2000-3xRTT 3GPP2 3GPP Banna GSM to 3G - High Speed Circuit Switched Data Dedicate up to 4 timeslots for data connection ~ 50 kbps Good for real-time applications c.w. GPRS Inefficient -> ties up resources, even when nothing sent © Ahmad El Not as popular as GPRS (many skipping HSCSD) Enhanced Data Rates for Global Evolution GSM HSCSD Uses 8PSK modulation 9.6kbps (one timeslot) 3x improvement in data rate on short distances GSM Data Can fall back to GMSK for greater distances Also called CSD Combine with GPRS (EGPRS) ~ 384 kbps , Lec#9 , Dec 2014 Dec Lec#9 , , A Can also be combined with HSCSD - GSM GPRS 716 WCDMA - E General Packet Radio Services Data rates up to ~ 115 kbps EDGE Max: 8 timeslots used as any one time Packet switched; resources not tied up all the time 5 Contention based.
    [Show full text]
  • F5 and the Growing Role of GTP for Traffic Shaping, Network Slicing, Iot, and Security
    OVERVIEW F5 and the Growing Role of GTP for Traffic Shaping, Network Slicing, IoT, and Security For years, F5 BIG-IP solutions have managed GPRS Tunneling Protocol (GTP) traffic. Now, in part due to EU regulations, GTP traffic growth is much higher than ever before. International trends show that mobile data is increasing, as is the demand for smart and secure GTP traffic handling. In this document, we will explain GTP, where it is typically used, and where BIG-IP solutions provide significant value. What is GTP? GTP is a group of IP-based communication protocols used to carry General Packet Radio Service (GPRS) within GSM, UMTS, and LTE networks. In 3GPP architectures, GTP and Proxy Mobile IPv6-based interfaces are specified on various interface points. GTP in GPRS (2.5G and 3G) Networks GTP is a set of three separate protocols: GTP Control (GTP-C), GTP User (GTP-U), and GTP Prime (GTP’). GTP-C is used within the GPRS core network for signaling between gateway GPRS support nodes (GGSN) and serving GPRS support nodes (SGSN), as demonstrated by the Gn interface on the diagram below. GTP-C allows the SGSN to activate and deactivate a user’s session, adjust quality- of-service parameters, or update sessions when subscribers arrive from another SGSN. HLR MSC Gr Gs luPS Internet Gi Gn SGSN RNC UMTS Radio Network (RAN) GGSN Gb Corporate SGSN PCU GSM Radio Network Network (BSS) Figure 1: GTP in GPRS (2.5G and 3G networks). OVERVIEW | F5 and the Growing Role of GTP 2 GTP-U carries user data within the GPRS core network, and between the radio access network and core network.
    [Show full text]
  • Research on Super 3G Technology
    03-10E_T-Box_3.3 06.12.26 10:07 AM ページ 55 NTT DoCoMo Technical Journal Vol. 8 No.3 Part 2: Research on Super 3G Technology In this part 2 of the Super 3G research that is being conducted to achieve a smooth transition from 3G to 4G, we present technology that is currently being studied for standardization as technical details. Sadayuki Abeta, Minami Ishii, Yasuhiro Kato and Kenichi Higuchi At the RAN WG1 meeting of November 2005, there was 1. Introduction agreement by many companies that high commonality is As explained in part1, Super 3G, the so-called Evolved extremely important and wireless access should be the same for URAN and UTRAN or Long term evolution by the 3rd FDD (paired spectrum) and TDD (unpaired spectrum). As this Generation Partnership Project (3GPP) has been extensively common wireless access system for FDD and TDD, Orthogonal studied since 2005. Agreement on the requirement was reached Frequency Division Multiple Access (OFDMA), which features in June of 2005 to begin investigation of specific technologies. highly efficient frequency utilization was approved for the In June 2006, it was agreed that investigation of the feasibility downlink and Single-Carrier Frequency Division Multiple of the basic approach for satisfying the requirements was essen- Access (SC-FDMA) was approved for the uplink at the tially completed, and effort shifted to the work item phase to December 2005 Plenary Meeting. start the detailed specifications work. Here, we explain technol- The features of the wireless access system are described in ogy that has been proposed as study items.
    [Show full text]
  • An Overview of DWDM Networks
    Telecommunication / Telecommunication An Overview of DWDM Networks 1.0 Introduction by Shaowen Song n traditional optical fiber networks, information is transmit- ted through optical fiber by a single lightbeam. In a Wilfrid Laurier University, Waterloo, ON I wavelength division multiplexing (WDM) network, the vast optical bandwidth of a fiber (approximately 30 THz corre- Abstract sponding to the low-loss region in a single-mode optical fiber) is carved up into wavelength channels, each of which carries a data stream indi- This article provides an overview of the applications of Dense Wavelength Division Multiplexing (DWDM) technology. It exam- vidually. The multiple channels of information (each having a different ines the network architecture and the recent development of two carrier wavelength) are transmitted simultaneously over a single fiber. The reason why this can be done is that optical beams with different major DWDM-based networks, namely the backbone network and the residential access network. The DWDM applications in Local wavelengths propagate without interfering with one another. When the Area Networks (LANs) are not included in the article. The article number of wavelength channels is above 20 in a WDM system, it is generally referred to as Dense WDM or DWDM. We use DWDM as a also looks into the future of broadband integrated service networks based on the DWDM technology. general term in this article. DWDM technology can be applied to different areas in the telecommu- nication networks, which includes the backbone networks, the residential access networks, and also the Local Area Networks (LANs). Sommaire Among these three areas, developments in the DWDM-based backbone network are leading the way, followed by the DWDM-based LANs.
    [Show full text]
  • Analysis of Wifi and Wimax and Wireless Network Coexistence
    International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 ANALYSIS OF WIFI AND WIMAX AND WIRELESS NETWORK COEXISTENCE Shuang Song and Biju Issac School of Computing, Teesside University, Middlesbrough, UK ABSTRACT Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE 802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown to most people. However compared to WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi. KEY WORDS WiMAX, WiFi, wireless network, wireless coexistence, network simulation 1. INTRODUCTION With the development of multimedia communication, people need wireless broadband access with higher speed, larger coverage and mobility. The emergence of WiMAX (Worldwide Interoperability for Microwave Access) technology met the people's demand for wireless Internet to some extent. If wireless LAN technology (WLAN) solves the access problem of the "last one hundred meters", then WiMAX technology is the best access solution of the "last mile". Though WiMAX is an emerging and extremely competitive wireless broadband access technology, the development prospects of its market is still unknown. Hybrid networks as a supplement to cell based or IP packet based services, can fully reflect the characteristics of wide network coverage.
    [Show full text]
  • Security for the Core Network of Third Generation Mobile Systems
    Security for the core network of third generation mobile systems GUNTER HORN, DIRK KROSELBERG Siemens AG, Corporate Technology, D-81730 Muenchen, Germany STEFANPUTZ T-Mobil, P.O. Box 300463, D-53184 Bonn, Germany ROLAND SCHMITZ T-Nova Technology Centre, D-64307 Darmstadt, Germany Keywords: UMTS, MAP Security, Multimedia domain, SIP, IPSec, IKE, Key Management Abstract: This contribution gives a survey of the present standardisation activities by 3GPP (3'd Generation Partnership Project1) in the area of security for signalling in the core network of third generation mobile systems. We give an overview of the protocols that need to be secured, present the basic principles behind the overall security architecture and describe the key management and format of secured messages, as far as they have already been finalised. In particular, we address core network security aspects of the 3GPP multimedia domain. 1 3GPP was formed by regional standards organisations from Europe, Asia and North America to produce specifications for a third generation mobile system named UMTS which is designed to evolve from GSM core network. There is a competing effort known as 3GPP2 with partners from North America and Asia. The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35413-2_36 R. Steinmetz et al. (eds.), Communications and Multimedia Security Issues of the New Century © IFIP International Federation for Information Processing 2001 298 1. THREATS TO CORE NETWORK SECURITY FOR MOBILE RADIO NETWORKS The core network of mobile radio systems is the part of the network which is independent of the radio interface technology of the mobile terminal.
    [Show full text]