WHITE PAPER

Mobile Broadband Networks

An Aggregated View of Application and Network Traffic for Global Mobile Network Operators (MNOs)

www.ixiacom.com 915-3114-01 Rev. B, December 2013 2 Table of Contents

Executive Summary...... 4

I. Mobile Broadband Networks Background...... 5

II. Measuring Resiliency and Identifying Stress Fractures in Mobile Network Infrastructure...... 16

III. Mobile Protocols and Super Flows...... 17

IV. BreakingPoint Application Profiles...... 20

VI. Glossary...... 26

3 Executive Summary

By the end of 2013, the number of mobile-connected devices will exceed the number of people on earth, and by 2017 there will be nearly 1.4 mobile devices per capita.1 Google Android™ phones, the Apple® iPhone™, the Apple iPad™ and similar devices continue to feed an insatiable consumer appetite for continuous availability of rich content and high- speed premium services. "Mobile broadband subscriptions overtook fixed broadband subscriptions in 20082, and show an astonishingly high growth rate of some 30% per year".3 To meet this demand, mobile carriers are responding with aggressive rollouts of next-generation networks and network infrastructures that will provide subscribers with a wireless experience comparable to the wired residential broadband experience.

As mobile carriers move forward with next-generation converged networks, they are deploying network and security devices designed for wireline broadband and traditional networks. These network and security devices have not been evaluated to support a real- world mix of mobile applications, malicious traffic, and extreme load from tens of millions of mobile subscribers. If carriers continue to use this strategy, they will not be able to satisfy resiliency, security, and performance requirements. The result will be an ongoing escalation of service failures on every mobile network.

By the end of 2013, If quality of service (QoS) is a main focus for a mobile carrier, then continuous service the number of failures should be the impetus for change. Mobile carriers have taken the first step in making needed changes by investing in upgrades to their infrastructures to handle mobile-connected the rapid rate of technology innovation, application growth, and ever-present security devices will exceed vulnerabilities. As this report will detail, mobile carriers must also validate network equipment and systems using real traffic and security threats to certify that the production the number of network will be resilient when faced with extreme load, stress, and attacks. people on earth, and To prepare this report, Ixia examined 100 terabytes of aggregate mobile traffic data by 2017 there will provided by Ixia BreakingPoint customers in North America and Europe. The paper be nearly 1.4 mobile outlines the traffic that these mobile networks are transporting, including the size of the traffic, overall percentages and individual applications. It also provides recommendations 1 devices per capita. for mobile network operators (MNOs) and outlines the steps BreakingPoint has taken to help MNOs and equipment manufacturers measure the resiliency of their network equipment and systems to ensure that they perform as expected.

Data collection from mobile carriers in North America and Europe was conducted over a 24-hour period on a normal weekday and is representative of an average day. The data provides no indication of the number of carrier subscribers. Therefore, any per-user analysis would be purely speculative. Where possible, we note similarities and differences between the regions.

Additionally, we examine some open questions about the effects of the Apple iPhone and Google Android devices on wireless networks, which have a significant impact on the traffic that is passing through the network. As with any network, capacity varies by location, whether it is cell tower, backhaul, or the core network. The references to capacity are in regard to backhaul and the core network; the signaling and radio frequency aspects of mobile broadband are a topic for future discussion.

1 Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2012-2017. http://www.cisco. com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 2 ITU (2013): http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_ data.xls 3 The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU, September 2013

4 Using the data provided in this paper, BreakingPoint has updated its own line of products with the ability to simulate the real traffic mix seen on today’s mobile network. Mobile operators using BreakingPoint products can then verify whether the network elements they are deploying will perform adequately when faced with the distinct traffic, unique load peaks, security attacks, and applications running on mobile networks. That level of visibility into infrastructure devices allows mobile operators to identify key weaknesses and potential vulnerabilities to provide the high-level of service demanded by mobile subscribers. I. Mobile Broadband Networks Background The traditional Mobile broadband use has risen dramatically, and in some cases, demand has exceeded wireline network network capacity. According to the International Union (ITU), "Mobile internet subscriptions have increased nearly tenfold over the last six years, from 268 components used million in 2007 to 2.1 billion in 2013.4 Although Europe had a head start in both cellular and in today's mobile mobile broadband deployments, the Americas are quickly growing, with the United States (US) surpassing Europe in 3G market penetration as of 2008.5 According to Pyramid networks may not Research, 4G subscriptions are expected to globally grow tenfold over five years, from 88 effectively handle 6 million in 2012 to 864 million in 2017. the mix of mobile The convergence of those growth drivers has led to a dramatic change in the type of traffic traffic and load, handled by mobile network operators. Networks must advance to handle the broadband traffic already threating to overtake capacity and Long-Term Evolution (LTE) is in the sites resulting in more of many carriers. In FierceWireless, Phil Golstein writes, "The United States is one of the retransmits on most advanced LTE markets in the world, along with South Korea, Japan and to a lesser extent, Germany. If we are to believe the carriers' predictions, by the end of 2013 there will mobile devices, be four U.S. operators covering at least 200 million people with LTE."7 mobile radio Mobile traffic is experiencing tremendous growth, so it is important to note that the frequencies, and network infrastructure components used to transport that traffic are the same components the signaling used in broadband and wireline network data connections. As the paper will reveal, application traffic running across a mobile network is very different from wireline network infrastructure. traffic. The traditional wireline network components used in today's mobile networks may not effectively handle the mix of mobile traffic and load, resulting in more retransmits on mobile devices, mobile radio frequencies, and the signaling infrastructure. The increase in retransmits leads to dropped calls, network resource outages, a negative customer experience, business disruption, and delays in bringing new mobile devices and/or premium services to market.

As the mix of network traffic increases in volume and complexity, it is critical that MNOs validate both the security and the performance of their network infrastructure, understanding the unique conditions and patterns of mobile traffic. That will act as verification of the components’ ability to handle the unique characteristics of mobile data traffic. It will also allow MNOs to more efficiently manage capacity, reduce time to market with premium services, and ensure a quality subscriber experience.

Since Ixia provides network operators with the ability to validate network infrastructure elements through the simulation of real-world application traffic, real-time security attacks, and maximum load, it is in a unique position to see all sides of the network

4 The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU, September 2013 5 comScore. (2008, Sept) comScore Reports that the U.S. Catches Up With Western Europe in Adoption of 3G Mobile Devices. [Online]. http://ir.comscore.com/releasedetail.cfm?ReleaseID=332170 6 Pyramid Research, quarterly mobile data forecast, February 2013 7 FierceWireless, Progress report: A snapshot of U.S. LTE deployments in 2013. http://www.fiercewireless. com/special-reports/progress-report-snapshot-us-lte-deployments-2013#ixzz2n7O6JW7y

5 equation. Although carriers are, understandably, protective of the details of their specific traffic mix, they are also concerned with the massive stability, security, and performance problems they are now experiencing. Because of these concerns, some of the largest mobile operators in North America and Europe have provided 100 terabytes of aggregated traffic data for Ixia to analyze. Careful examination of the data supports the conclusion that mobile network traffic patterns are unique in their application mix and usage patterns as detailed throughout this paper. Mobile Growth Continues Unabated

Since Ixia provides North American and European mobile network carriers are witnessing unprecidented network operators growing demand for data services on their networks. While the application and device mixes are similar, some important differences are noted. These are likely due to factors with the ability to such as earlier 3G deployments in Europe and different market share among handset validate network manufacturers. Even so, mobile growth in the US is increasing at a rapid pace as shown in infrastructure Figure 1. elements through the simulation of real-world application traffic, real-time security attacks, and maximum load, it is in a unique position to see all sides of the network equation.

Figure 1: US Wireline and Mobile Breoadband Penetration8.

Wireline broadband use went from 150 petabytes per month in 2002 to 1,600 petabytes per month in 2008, a 1,000% increase in only six years. Looking at the wireless curve, we expect the same growth in data consumption between 2010 and 2013, half the time it took wireline to reach that level.

Because it is the easiest metric to understand, bandwidth is always the selling point for new network technologies. However, MNOs need to look beyond bandwidth. If quality of experience is to improve, the latency inherent in applications, device mixes, and layer 1 and layer 2 technologies needs more attention. For example, MDI and MOS have been created to measure quality of experience (QoE) in streaming applications, and those are particularly sensitive to excessive latency. As we continue to examine the data, we will discuss the need to validate for both latency and bandwidth in order to guarantee a smooth transition to 4G and beyond.

8 C. Sharma. (2009, Jul.) Managing Growth and Profits in the Yottabyte Era. [Online]. http://www. chetansharma.com/Managing_Growth_and_Profits_in_the_Yottabyte_Era.pdf

6 North American Wireless Carrier

The mobile traffic data Ixia received from one of the largest NA wireless carriers, which has approximately 89 million subscribers in the United States,9 was collected using one or more products in the NIKSUN NetOmni Suite.10 Twenty monitoring points within the network were used for gathering the data during a normal weekday in January 2010. The NA wireless carrier data totaled 76 terabytes, and no exclusions were made in the collection. To give a full picture of the NA wireless carrier’s total network, it has been reported elsewhere11 that in 2008 its network recorded 3,500 terabytes per month, which equates to 117 terabytes per day. The top five applications represent 90% of the total and consume more than 69 terabytes as seen in Table 1.

Application Gigabytes Percentage Web based 59059.00 77.03% Blackberry® 3940.64 5.14% Flash RTMP 2631.62 3.43% IPsec ESP 2261.98 2.95% POP3s 1111.33 1.45% MNOs need to look Total 69004.57 90.00% beyond bandwidth. If Table 1: Top Five Applications for the North American Provider quality of experience

Of the remaining 34 applications, only port 10000 comprised more than 1% of the total is to improve, the estimated throughput. Port 10000 represents NDMP, Webmin, and several malware latency inherent applications,12 and the data could represent any combination of those. Going beyond the top five applications and grouping application types together provides further insight, as seen in applications, in Table 2. device mixes, and layer 1 and layer 2 Category Terabytes Percentage of Traffic technologies needs Web 59.059 77.03% more attention. Blackberry® 3.940 5.14% Streaming 3.309 4.32% Mail 2.104 2.74% P2P 0.607 0.79% VoIP 0.341 0.45% Gaming 0.190 0.25% IM 0.096 0.12% Other 7.023 9.16% Total 76.669 100.00%

Table 2: North American Traffic Categorization

No other application types exist in the Web-browsing category, so its value remains unchanged (Table 2). Since “Web” encompasses all HTTP-based traffic, the assumption is that most HTTP streaming media is included here, and possibly some HTTP-based peer-

9 Verizon Wireless. About Us Overview. [Online]. http://aboutus.vzw.com/aboutusoverview.html 10 NIKSUN Inc. NIKSUN NetOmni. [Online]. http://www.niksun.com/product. php?id=1 11 Wikipedia contributors. (2010, Jan) File:IPhone sales per quarter simple.svg.[Online]. http://en.wikipedia. org/wiki/File:IPhone_sales_per_quarter_simple.svg 12 Speedguide.net. Port 10000 (tcp/udp). [Online]. http://www.speedguide. net/port.php?port=10000

7 to-peer (P2P) services, notably Gnutella. The only streaming media that was individually categorized was RTSP. However, at only 677 gigabytes, it is a small portion of the traffic. BlackBerry traffic represents BlackBerry Messenger and push-mail traffic. The mail applications POP3/POP3S, IMAP/IMAPS, and SMTP totaled 2.1 terabytes, or 2.74% of traffic.

P2P and VoIP applications, which represent large amounts of data on wireline networks, were mostly absent, at .79% and .45%, respectively. Gaming was also a small percentage of the traffic, at 0.25%. The relatively-high latency of wireless networks could explain why gaming and VoIP are such a small amount of the traffic. The initial claims to consumers about 3G are for increased bandwidth, but reducing latency will be critical to ensuring that applications such as VoIP, streaming, and gaming are usable on wireless networks.

While the Android Market represents only .28% of traffic, Hitslink.com reported that the Android market share increased more than 50% in the last two months of 2009.13 That coincides with the introduction of the DROID™ by Motorola, which was released on November 6, 2009,14 with sales estimates between 100,000 and 250,000 units for the week of its release.15 Although that is significantly less than the iPhone’s 42 million, it is an appreciable number, and all Android devices can use the Android Market. The mobile Web European Wireless Carrier has evolved beyond The European wireless carrier represented has approximately 16.6 million subscribers,16 a basic browsing and figure that includes approximately 750,000 Virgin Mobile subscribers because of a Mobile now delivers a full Virtual Network Operator (MVNO) agreement. suite of rich content The European wireless carrier traffic reports that Ixia received were generated using to mobile users. Cisco® Service Control Application for Mobile Networks to provide a granular traffic breakdown.17 The data was collected on a weekday in August 2009. Ixia was not notified of any exclusion in the collection data. The number of collection points used in gathering the data was not provided. Overall, the traffic was 90% downlink and 10% uplink, and the maximum advertised network speeds are 4.5 Mbps down and 1.7 Mbps up.18 In fairness to the carrier, it does state the more reasonable expected speeds of 2.0 Mbps down and 700 Kbps up. While simple Web browsing is the single largest application, it is important to note the diverse set of HTTP applications, as seen in Table 3.

Also of note is that although these applications share HTTP as a transport, they may behave differently on the network and must be modeled separately. The mobile Web has evolved beyond basic browsing and now delivers a full suite of rich content to mobile users.

Other popular applications for mobile broadband users are apparent, as seen in Table 4.

13 Hitslink.com. Browsing by Device Category Trend. [Online]. http://marketshare.hitslink.com/report. aspx?qprid=61&sample=13 14 Wikipedia contributors. Motorola Droid. [Online]. http://en.wikipedia. org/w/index.php?title=Motorola_ Droid&oldid=343270307 15 A. Thomson H. Miller. (2009, Nov.) Motorola Probably Sold 100,000 Droids in First Days (Update2). [Online]. http://www.bloomberg.com/apps/news?pid=newsarchive&sid=a4IZD2kI6dh8 16 AG. (2009, Nov.) UNITED STATES SECURITIES AND EXCHANGE COMMISSION Form 6-K. [Online]. http://www.sec.gov/ Archives/edgar/data/946770/000094677009000085/dtagq309.htm 17 . (2009, Oct.) Cisco Service Control Application for Mobile Networks. [Online]. http://www. cisco.com/en/US/products/ps6501/index.html 18 T-Mobile UK. What speeds can I expect when using Mobile Broadband? [Online]. http://support.tmobile. co.uk/help-and-support/index?page=support&cat=USB_STICK_620&tab=0&id=FA990

8 Application Gigabytes Percentage Browsing 5994.848 37.04% Flash (non-YouTube™/Myspace/ 2559.834 15.82% Yahoo!) YouTube 2474.825 15.29% HTTP Audio/Video 967.212 5.98% Misc. Upload/Download 551.373 3.40% BitTorrent 529.225 3.27% Streaming 454.851 2.80% HTTPS 315.706 1.95% BBC iPlayer 306.180 1.89% Total 14816.020 100.00%

Table 3: Top 10 Applications for the European Provider

Category Gigabytes Percentage Grouping various Web 13247.465 81.84% application P2P 810.512 5.01% types can more Streaming 765.281 4.73% Email 78.933 0.49% clearly illustrate Gaming 46.297 0.29% the application VoIP 39.393 0.24% breakdown for the IM 31.450 0.19% network Other 1166.730 7.21% Total 16186.061 100.00%

Table 4: European Traffic Categorization

Grouping various application types can more clearly illustrate the application breakdown for the network (Table 4). P2P applications were the second largest group for the European wireless carrier. Cisco has reported19 seeing a relative decline in P2P since 2008. It represents less than 5% of the total traffic, not the more than 20% seen on fixed networks.20

BitTorrent was the largest of these applications, yet its minimum, maximum and average rates were only 22 Mbps, 148 Mbps, and 49 Mbps, respectively. As a reference point, the aggregate minimum, maximum, and mean throughput rates were 388 Mbps, 2.657 Gbps, and 1.5 Gbps, respectively. BitTorrent traffic spiked at 2300 GMT and quickly fell off at 0700 GMT. A plausible explanation is that users are delaying their P2P use until the evening.

However, while the European wireless carrier is using some form of traffic shaping on its network, information on traffic shaping policies was not provided. Therefore, no assumptions are made. Nevertheless, mobile P2P traffic is not yet present in the volume

19 Cisco Systems. (2008, Oct.) Approaching the Zettabye Era. [Online]. http://www.cisco.com/en/US/solutions/ collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481374.pdf and Cisco Systems. (2009, Oct.) Cisco Visual Networking Index: Usage Study. [Online]. http://www.cisco.com/en/US/solutions/collateral/ ns341/ns525/ns537/ns705/Cisco_VNI_Usage_WP.html 20 The Cooperative Association for Internet Data Analysis. (2010, Jan.) Internet Traffic Classification. [Online]. http://www.caida.org/research/traffic-analysis/classification-overview/#discussion

9 reported to be present on fixed networks,18, 20, 21 and it is not consuming large amounts of bandwidth, even at its daily peak. Taken together, all of those facts indicate that the chokepoints with regard to mobile P2P are either the cell towers or the backhaul links, which corroborates other findings.22

It would be interesting to see the P2P impact in future reports as well as its ratio to streaming traffic. If it follows the same trend as fixed networks, then streaming should surpass P2P for the European provider in as little as one year. Carriers should not mistake that, however, to mean that P2P traffic will decline on an absolute level, because, as has already been shown, overall traffic is expected to grow—and P2P with it. Instead, it will Grouping various likely decline relative to other applications.19, 21 application Since music and video are the most popular media types downloaded via P2P networks,21 types can more carriers should leverage that and provide value-added content in the form of streaming media. That will also allow carriers to define data consumption on their own terms as far clearly illustrate as quality of service, routing policies and bandwidth management. Options could include the application using caching and content distribution networks to achieve results similar to those already realized by fixed networks. breakdown for the network The European wireless carrier could be an example that strategy, by capitalizing on what might otherwise be viewed as detrimental applications on its network. By providing its own video-on-demand (VoD) service, the European wireless carrier is able to provide a service that reduces the load of P2P and other streaming applications on its network. Now the European wireless carrier can choose where to place the content in its network and potentially reduce core network bandwidth consumption of video streaming.

Only one reference to VoD was found23 on the European wireless carrier Web site. It is possible that if VoD were positioned more prominently and marketed more aggressively, the European wireless carrier would see an increase in its own video streaming relative to other services (currently 45th on the list). The European wireless carrier Fair Use Policy for its “unlimited” mobile broadband plans includes a monthly cap of 3GB, so VoD would be lucrative if subscribers were to incur overages. Using a conservative estimate of 1 Mbps for a streaming video means that a single 90-minute movie would consume at least 675MB, with higher bit rates common.24

The European wireless carrier data also shows that mobile broadband networks are starting to closely resemble fixed networks in many regards. Many applications are being seen for the first time on mobile networks because of increased handset functionality. In addition, more traditional devices such as laptops and netbooks are being brought onto the mobile network via data cards and USB dongles. Those networks can be called “transitional networks” because they represent an evolution from traditional voice-only wireless networks toward the rich application mix of fixed networks.

Two notable exclusions are VoIP and instant messaging, for which the data shows traffic is low. Those services likely are not widely used because of the phone’s native talk and

21 ipoque. (2009) Internet Study 2008/2009. [Online]. http://www.ipoque.com/resources/internetstudies/ internet-study-2008_2009 22 Allot Communications. (2009, July) Global Mobile Broadband Traffic Report, Q2/2009. [Online]. http://www. allot.com/download/Allot_GMBT_Report.pdf 23 T-Mobile UK. FAQ. [Online]. http://support.t-mobile.co.uk/help-andsupport/index?iqaction=5&answerid=167 77216&highlightinfo=6291627,24,44&type=open&page=answeropen&url=http%3A%2F%2Fsupport.t-mobile. co.uk%2Fhelp-andsupport%2Findex%3Fpage%3Dcontent%26id%3DFA1101%26actp%3Dsearch%26viewloca le%3Den_GB&searchid=1264517201257#__highlight 24 Amazon.com. Amazon MP3 Music Downloads Frequently Asked Questions. [Online]. http://www.amazon. com/gp/help/customer/display.html?nodeId=200154210&#specvideo

10 SMS/MMS capabilities or because the applications are being blocked.2526 One should not expect mobile networks to align exactly with fixed networks but should expect to see some similarities, in both benign and malicious traffic. The malware traffic that plagues fixed networks will seep into wireless networks in step with the entrance of traditional endpoint devices.27

The European wireless carrier data also shows that mobile broadband networks are Figure 2: North American Application Mix starting to closely resemble fixed networks in many regards.

Figure 3: European Application Mix

25 T. Keating. (2007, Jun.) T-Mobile blocks VoIP - again! [Online]. http://blog.tmcnet.com/blog/tomkeating/voip/ tmobile-blocks-voip-again.asp 26 Fring.com. (2008, Dec) VoIP Blocking in the UK. [Online]. http://www.fring.com/forums/showthread. php?t=13906 27 iGillott Research, 2007

11 Figure 4: Traffic Comparison

Figure 5: Non-Web Traffic Comparison

12 Comparison of North American and European Application Mixes

Although the European wireless carrier’s data had a more granular classification of applications, the traffic is quite similar, as noted in Figure 4. Web browsing dominates both data sets, and streaming has a similar percentage. Mail protocols make up a greater percentage in the North American data set, and P2P applications were a larger fraction of traffic in Europe.

Mobile broadband is beginning to move out of its early adopter phase. Therefore, one would expect that some of the applications seen on university networks would also be used over wireless networks, as university students are also early adopters. High latency, cost and bandwidth are all barriers to those applications.

First, latency can be extremely detrimental to streaming, VoIP, and gaming applications. Although LTE/4G latency is projected to decrease, it will still be higher than on wireline networks. There is little that MNOs can do at the base station physical and link layers to reduce latency, so reducing it elsewhere will be a crucial factor for those applications. Offloading is only a Second, mobile broadband still commands a premium price over wireline broadband, so business users would be more likely target customers than, say, P2P users. As cost stopgap measure, decreases and availability increases, more users will move to mobile broadband, following and carriers’ a pattern similar to the migration from landline to mobile phones. LTE/4G deployments Finally, the amount of bandwidth available still lags behind wireline offerings. Using P2P must at least keep as an example, it makes little sense to pay more for a slower connection when other options are available. Factoring those together, mobile networks simply are not ready pace with the for the load about to be placed on them. The migration to mobile broadband will not be rapid adoption of business as usual. smartphones and Mobile Devices other devices.

One nagging question remains regarding the Apple iPhone: would traffic patterns be the same on both iPhone and non-iPhone networks with different devices? Several stories exist about AT&T’s network being unable to handle all of the iPhone traffic, especially when iPhone density is high.28, 29 However, AT&T is not alone. The first UK carrier to support the iPhone, O2, has apologized for issues on its own network.30 It seems as though there was pent-up demand for network capacity, which was realized only by the introduction of the iPhone.

As mentioned earlier, Android traffic was up more than 50% for November and December 2009, which closely correlates to the DROID release date. Many customers choose the iPhone either because of contractual obligations or its earlier market availability, but the Android sales numbers show consumers are willing to choose alternative devices a significant fraction of the time.

28 C. Kang. (2010, Jan.) Lots of iPhone/AT&T woes at CES. [Online]. http://www.washingtonpost.com/wp-dyn/ content/article/2010/01/07/AR2010010704803.html 29 Michael Calore. (2009, March) SXSW: IPhone Influx Pushes AT&T to the Limit [Updated]. [Online]. http:// www.wired.com/epicenter/2009/03/sxsw-atts-spott/ 30 A. Parker. (2009, Dec.) O2 says sorry for snags in London network. [Online]. http://www.ft.com/cms/ s/0/3b911fd4-f41a-11de-ac55-00144feab49a.html

13 Now that mature handsets are mainstream, one must wonder if carriers’ networks will be able to support such a large number of devices. According to Cisco, an iPhone is capable of generating 30 times the amount of traffic of a feature phone. A laptop with a data card generates 450 times as much data. Additionally, mobile data will double every year through 2014.31 Network equipment manufacturers must be prepared with products that will meet those demands as carriers upgrade their networks to handle the increased load.

Although the market share for mobile devices will be discussed later in this paper, AdMob Mobile Metrics reports32, 33 provide two important points. The approximate traffic breakdown of the most popular devices for an Alternate North American wireless carrier did not change drastically from October to December, as shown in Table 5.

Distributed Denial Manufacturer October December of Service (DDoS) Apple 68.00% 72.00% attacks are no Samsung 11.00% 10.00% longer the domain LG 10.00% 10.00% of casual vandals RIM 2.00% 2.00% Other 2.00% 2.00% but are more likely now to be criminally Table 5: Alternate North American Carrier Devices or financially Over the same time frame, the North American wireless carrier saw a massive shift in its motivated. traffic mix, as shown in Table 6.

Manufacturer October December RIM 35.00% 10.00% Samsung 28.00% 12.00% LG 22.00% 9.00% Motorola 6.00% 55.00% Other 4.00% 2.00% HTC 1.00% 10.00%

Table 6: North American Carrier Devices

While the traffic breakdown remained constant for the Alternate North American wireless carrier, the North American wireless carrier shows strong growth for DROID by Motorola and DROID ERIS™ by HTC devices, at 25% and 9%, respectively (Table 6). The growth can be attributed to a combination of three factors. The first is new subscribers with new devices. The second factor is users who switched over to one of the Android devices, as it appears that Research in Motion (RIM), Samsung, and LG device traffic decreased on a relative basis. Third, since these numbers are relative, the volume of traffic generated by the Android devices reduced the relative amount of traffic from other handsets.

31 Cisco Systems. (2010, Feb.) Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2009-2014. [Online]. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/ white_paper_c11-520862.html 32 AdMob. (2009, Nov.) AdMob Mobile Metrics Report October 2009. [Online]. http://www.cisco.com/en/US/ solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 33 AdMob. (2010, Jan.) AdMob Mobile Metrics Report. [Online]. http://metrics.admob.com/wpcontent/ uploads/2010/01/AdMob-Mobile-Metrics-Dec-09.pdf

14 It is apparent that Android phones have caused a massive shift in data use on the North American wireless carrier’s network, a shift also likely seen by AT&T with the successive release of each iPhone model. That equates to an absolute increase in data consumption. The AdMob data shows that for all US carriers, there were 4.983 billion requests in October, compared to 5.545 billion requests in December, an 11.27% increase in a two- month period.

How will carriers deal with the surge in mobile broadband consumption? Alternatives such as femtocells and Wi-Fi offloading are available, but subscriber sentiment is varied with regard to the different technology and location used for layers 1 and 2.33,34 There is also an upward trend of requests using Wi-Fi connections.31, 32 If that growth continues proportional to all mobile traffic, it seems that carriers will initially be able to add capacity at the same rates that they are now. Unfortunately, for those carriers offering quadruple play services, the problem is just being shifted to a wireline network. The bandwidth problem may be solved, but the latency issues for mobile content delivery still exist.

Devices like the iPhone are accelerating demand by increasing the functional utility of mobile networks. Subscriber usage patterns clearly show a transition from a traditional view of mobile networks. Offloading is only a stopgap measure, and carriers’ LTE/4G deployments must at least keep pace with the rapid adoption of smartphones and other devices.8

Over time, the application mix will more closely match fixed networks. Using the mobile traffic and application data it was given, Ixia has created Application Profiles and Super Flows, all of which are customizable so that customer networks can be accurately modeled, simulated and measured using BreakingPoint products. Additionally, Ixia will deliver Application Profiles and Super Flows in future BreakingPoint Application and Threat Intelligence (ATI) to ensure that customers have the latest models available for Unfortunately, mobile broadband networks. for those carriers Security Considerations for Mobile Network Operators offering quadruple play services, the Mobile networks are subject to unique security threats as well as the threats faced by problem is just being traditional wireline networks. For example, Distributed Denial of Service (DDoS) attacks are no longer the domain of casual vandals but are more likely now to be criminally or shifted to a wireline financially motivated. A hacker, for instance, may disable a MNO’s network or threaten to network. The do so in order to extort money. The hacker may attack a MNO’s subscriber database in order to capture exploitable personal information, as was the case in the highly publicized bandwidth problem attack on T-Mobile in 2004.35 may be solved, but Because of the constrained bandwidth available to MNOs for signaling, researchers have the latency issues theorized that a successful denial of service affecting more than a million mobile users for mobile content could be conducted from behind a single cable modem.36 Increasingly, attacks are directed not just against bandwidth constraints but at other critical resources as attackers take aim delivery still exis at firewalls, load-balancers, and back-end database infrastructures.37

34 Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005. [Online]. http://www. securityfocus.com/news/10271 35 Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005. [Online]. http://www. securityfocus.com/news/10271 36 K. Sabnani. (2009, Jun.) DOS Attacks Threaten Mobile Network Security. [Online]. http://www.theregister. co.uk/2009/06/08/mobile_dos_threat/ 37 Arbor Networks. (2010 Feb.) Worldwide Infrastructure Security Report, 5th Edition [Online]. http://www. arbornetworks.com/report

15 Validating the resiliency of MNO infrastructure deployments requires the ability to subject infrastructure components to the well-known and growing class of wireline security threats and the emerging set of mobile-specific attacks, within the context of Mobile networks are heavy legitimate mobile traffic. Only with this combination can both the resiliency of the network components, as well as the impact of attacks on legitimate traffic, be understood. subject to unique BreakingPoint’s MNO partners are evaluating their current and planned deployments under security threats as those exact conditions. well as the threats II. Measuring Resiliency and Identifying Stress faced by traditional wireline networks. Fractures in Mobile Network Infrastructure After evaluating the traffic data provided by NA and European mobile carriers, Ixia was able to import the intelligence into its products to provide a more comprehensive assessment of network elements to be responsible for mobile traffic. The following section details what Ixia provides and how mobile network operators can use these products to harden their infrastructure and provide customers with an enhanced quality of experience.

During the design, development and deployment phases, mobile carriers can reduce their risk if they know precisely how network equipment will perform, given their specific traffic and application mix, load and user behavior. By measuring the performance and security claims made by network equipment vendors, mobile operators will know whether a network device will perform “as advertised” in the real world.

BreakingPoint Application Simulator is a feature of BreakingPoint products that allows users to generate real-world application traffic, using more than 200 application protocols at realistic speeds blended with live security attacks. Nearly every major application is supported, with more being added as requested. For realistic modeling, those applications can be combined with more than 6,000 security strikes in a blended stream and directed at infrastructure components. It is critical to measure infrastructure performance and stability with that type of blended stream to accurately predict real-world behavior and stress fractures; security threats will not be encountered in isolation, and their impact on performance of benign traffic must be measured and understood.

BreakingPoint products use the concepts of Flows, Super Flows, and Application Profiles to organize benign traffic. A single application protocol, client, and server define a Flow. A Super Flow is a collection of Flows used to create a realistic application. An example of a Super Flow would be a Web request, which is actually a DNS request (or multiple DNS requests) combined with an HTTP request (or multiple HTTP requests).

Finally, Application Profiles are weighted collections of Super Flows used to simulate the actual traffic mix of a network. For enhanced realism and stability testing, mobile operators can also use BreakingPoint products to apply protocol fuzzing to valid application traffic, intentionally injecting errors in order to stress a device’s ability to deal with malformed packet or protocol data.

BreakingPoint also includes a cyber attack library of more than 6,000 attacks and an integrated security search capability, which lets the user define attack types (by category, vulnerability, keyword, etc.) and automatically updates when Ixia publishes new attacks. No manual intervention is required to subject infrastructure components to the latest DDoS or other security threats. For example, a MNO may create a smart strike list consisting of mobile handset vulnerabilities and threats to large core routers from the strike library, which is updated frequently.

16 Ixia has also released a one-click BreakingPoint Resiliency Score™ for completely automated resiliency measurement, and detailed Resiliency Methodologies for validating infrastructure performance against DDoS and Botnet attacks. The combination of new mobile-specific Super Flows and integrated fuzzing and strike capability makes resiliency testing for MNOs a straightforward proposition with BreakingPoint. III. Mobile Protocols and Super Flows

Based on these current mobile Application Profiles, new Super Flows were created to enable BreakingPoint products to simulate real world stateful application and attack traffic. Those include h.264 mp4 streaming video, the Apple App Store, BlackBerry, and Push to Talk. Additionally, the HTTP application was modified to include support for mobile browsers. A new HTTP mobile Super Flow was added that defaults to using a mix of iPhone, Android, BlackBerry, Opera®, Nokia®, and Windows® mobile devices. A customer may choose to use one or multiple browser types.

To accurately simulate mobile browsing, the breakdown of the mobile browser had to be determined. BreakingPoint gathered a list of the most popular mobile browsers for November 2009 through January 2010,38, 39 and the numbers were adjusted slightly to exclude the iPod touch, which does not have a cellular data connection.

Although the US browser market share for the iPhone is nearly double that of all BlackBerry devices, it does not represent device market share. Instead, the amount of Web traffic for all iPhone users is nearly twice that of all BlackBerry users. iPhones make up around 25% of smartphones, while BlackBerry handsets have a 42% share.40 In fact, US Based on these iPhone users consume around 273MB of data per month, while BlackBerry users consume current mobile 41 just 54MB, so the average iPhone consumption is five times that of a BlackBerry. Application The situation is slightly different in Europe. First, iPhone users represent slightly less of Profiles, new all Web browsing. Second, BlackBerry is a distant fourth. The prominence of the Nokia and Opera browsers can likely be attributed to that fact that both companies began and remain Super Flows were in Europe. Finally, since Opera runs on multiple hardware platforms, it could be drawing created to enable from multiple manufacturers. BreakingPoint 38 StatCounter.com. (2010, Feb.) Top 9 Mobile Browsers in the United States from Nov 09 to Jan 10. products to simulate [Online]. http://gs.statcounter.com/chart.php?bar=1&statType_hidden=mobile_browser®ion_hid den=US&granularity=monthly&statType=Mobile%20Browser®ion=United%20States%20of%20 real world stateful America&fromMonthYear=2009-11&toMonthYear=2010-01&csv=1 39 StatCounter.com. (2010, Feb.) Top 9 Mobile Browsers in Europe from Nov 09 to Jan 10. [Online]. http:// application and gs.statcounter.com/chart.php?bar=1&statType_hidden=mobile_browser®ion_hidden=eu&granularity =monthly&statType=Mobile%20Browser®ion=Europe&fromMonthYear=2009-11&toMonthYear=2010- attack traffic. 01&csv=1 40 comScore. (2010, Feb.) comScore Reports December 2009 U.S. Mobile Subscriber Market Share. [Online]. http://www.comscore.com/Press_Events/Press_Releases/2010/2/comScore_Reports_ December_2009_U.S._Mobile_Subscriber_Market_Share 41 Consumer Reports. (2010, Feb.) Exclusive: iPhones hog much more data than other smartphones. [Online]. http://blogs.consumerreports.org/electronics/2010/02/iphone-data-usage-smart- phonessmartphonesblackberry-mb-network-att-carrier-istress.html?EXTKEY=I91CONL&CMP=OTCConsume ristRSS

17 HTTP Mobile Protocol

To support those browser types, a new Super Flow had to be implemented. The new Super Flow performs actions similar to what a mobile user would do. Mobile browsers have matured to the point that they can deliver content as well as desktop browsers, but their usage patterns and interaction models differ. BreakingPoint focuses on short, high bandwidth sessions, including those as predefined options to reduce configuration effort for users. 1. Basic Web browsing (gzipped/chunked) 2. HTTP audio download 3. Pipelined HTTP request 4. HTTP video download Finally, to support mobile browsers, new user agents were added to the HTTP application simulation. 1. iPhone The new Super Flow 2. BlackBerry performs actions a. 8310 Curve™ similar to what a b. 9000 Bold™ c. 9630 Tour™ mobile user would 3. Android do. a. DROID by Motorola b. HTC Dream™ c. Samsung Moment™ 4. Nokia a. S60™ b. X3 c. E71™ 5. Opera ƒƒ a. Mobile v9.51 ƒƒ b. Mini i. v8.0 ii. v9.6 iii. v9.8 6. Windows Mobile a. HTC Touch Pro™ b. HTC Artemis™ BlackBerry Services Protocol

BlackBerry devices use push e-mail and the BlackBerry Messenger service, both of which are encrypted. Both of those are needed to simulate that service, which represented approximately 5% of the North American traffic.

18 H.264 Streaming Protocol

The h.264 standard is used in YouTube videos for both the iPhone and the iTunes store. Android devices also use h.264-encoded videos. The videos in this Super Flow use the MP4 container format.

BBC iPlayer™ Protocol

The BBC iPlayer service is available in the UK, and it runs on several platforms, including the Nokia S60 and Apple iPhone. BBC iPlayer also has desktop players and content, including TV and radio shows.

IPsec Protocol

IPsec is required for IPv6. However, it was designed to be used with IPv4 as well. It can provide IP authentication and encryption, which are useful for creating a VPN. The IPsec traffic that was seen in those collections was ESP and/or NAT-T.

Tunneled IP Protocol from BreakingPoint

GRE, which is defined by RFC 2784, allows the creation of stateless network layer tunnels. IP-in-IP is defined by RFC 2003 and is used specifically for tunneling IP traffic over an IP network layer. Both GRE and IP-in-IP IP protocol numbers 47 and 4, respectively, were seen.

Apple App Store Protocol

The Apple App Store was launched simultaneously with iPhone OS 2.0 in July 2008. Several portions of the App Store protocol are needed to simulate iPhone traffic. While the full protocol is proprietary, the relevant portions are browsing, purchasing, and downloading.

Android Market Protocol

The Android Market was launched in October 2008 and is similar to the Apple App Store, except that all of the different Android devices may access it. Although the Android Market was only a small fraction of traffic seen, it will grow, and BreakingPoint has chosen to create a simulation for it. As with the Apple App Store, the relevant actions are browsing, purchasing, and downloading.

RTMP Protocol

RTMP allows for multiplexing Flash video and audio streams over TCP. Although BreakingPoint already has support for Adobe Flash file simulation, adding RTMP provides us with the ability to better simulate streaming Flash video and audio. Adobe released the specification in June 2009.

19 OpenVPN Protocol

OpenVPN is an open source SSL VPN implementation using TCP or UDP with the ability to create encrypted tunnels and work with NAT gateways.

Xbox Live Protocol

Xbox Live is the online gaming service originally created for use with the Microsoft Xbox platform. Mobile devices will also be supported in the future, so this is an application simulation that will continue to evolve. IV. BreakingPoint Application Profiles

Using these Super Flows, Ixia then constructed Application Profiles to match the data. All of those weights and values are customizable to fine-tune the application mix and bandwidth for any simulation.

Using these Application Profile: European Wireless Carrier Full Weekday Super Flows, Ixia 2010

then constructed Table 9 represents the top 10 applications seen in the European wireless carrier collection, Application Profiles which comprises 87% of average daily traffic. The traffic weights are based on the averages for the entire 24-hour period during which the collection was performed. The to match the data. BreakingPoint Raw Super Flow can be used to create generic TCP and UDP data and is used here to represent the remaining traffic that is below the 1% threshold.

Super Flow Weight (Percentage) HTTP Mobile Protocol from BreakingPoint 37% HTTP Flash Video Protocol from BreakingPoint 31% HTTP Video Protocol from BreakingPoint 4% HTTP Audio Protocol from BreakingPoint 2% HTTP Compressed Protocol from BreakingPoint 4% BitTorrent Data Transfer Protocol from BreakingPoint 3% BBC iPlayer Protocol from BreakingPoint 2% HTTPS Protocol from BreakingPoint 2% Gnutella Protocol from BreakingPoint 3% eDonkey Data Transfer Protocol from BreakingPoint 1% BreakingPoint Raw 11%

Table 9: European Weekday Profile

20 Application Profile: European Wireless Carrier Daytime 2010

This profile is intended to model from 8:00 a.m. to 11:00 p.m. The values in Table 10 are not drastically different from those in Table 9. P2P traffic is reduced during the daytime hours, as are video and audio consumption.

Super Flow Weight (Percentage) HTTP Mobile Protocol from BreakingPoint 37% HTTP Flash Video Protocol from BreakingPoint 28% HTTP Video Protocol from BreakingPoint 3% HTTP Audio Protocol from BreakingPoint 2% HTTP Compressed Protocol from BreakingPoint 4% BitTorrent Data Transfer Protocol from BreakingPoint 3% BBC iPlayer Protocol from BreakingPoint 2% HTTPS Protocol from BreakingPoint 2% Gnutella Protocol from BreakingPoint 1% BreakingPoint Raw 18%

Table 10: European Daytime Profile

Application Profile: European Wireless Carrier Weeknight 2010

This profile is intended to model from 11:00 p.m. to 8:00 a.m. The main changes are the rise in P2P traffic and video/audio traffic, which would correspond to a rise in after- work recreational Internet use. The reason that P2P is not higher is that there is an extended ramp-down time, from 11:00 p.m. to around 1:00 a.m., which causes the weight for BitTorrent to be skewed lower. Without this ramp-down period, the weight would be around 35% for BitTorrent.

Super Flow Weight (Percentage) HTTP Mobile Protocol from BreakingPoint 29% HTTP Flash Video Protocol from BreakingPoint 32% HTTP Video Protocol from BreakingPoint 5% HTTP Audio Protocol from BreakingPoint 4% HTTP Compressed Protocol from BreakingPoint 4% BitTorrent Data Transfer Protocol from BreakingPoint 6% BBC iPlayer Protocol from BreakingPoint 1% HTTPS Protocol from BreakingPoint 1% Gnutella Protocol from BreakingPoint 1% eDonkey Data Transfer Protocol from BreakingPoint 1% BreakingPoint Raw 16%

Table 11: European Weeknight Profile

21 Application Profile: North American Wireless Carrier Weekday 2010

In Table 12, weights greater than 100 have been used to provide a richer application mix. Dividing the weight and the sum of all weights and then multiplying by 100 will determine the actual percentage. That will allow Super Flows below a 1% threshold. In this example, the weights sum to 10,000, so they will correlate directly to percentages. So HTTP Mobile Protocol will be 77.03% of traffic, while AOL Instant Messenger set at .12%

Super Flow Weight HTTP Mobile Protocol from BreakingPoint 7703 BlackBerry® ServicesProtocol from BreakingPoint 514 RTMP Protocol from BreakingPoint 343 IPsec ESP Protocol from BreakingPoint 295 POP3-Advanced over SSL Protocol from BreakingPoint 143 Tunneled IP Protocol from BreakingPoint 143 RTSP Protocol from BreakingPoint 88 BitTorrent Data Transfer Protocol from BreakingPoint 76 POP3-Advanced Protocol from BreakingPoint 74 SIP/RTP Simple Call Protocol from BreakingPoint 44 SMTP Email Protocol from BreakingPoint 43 IMAPv4-Advanced Protocol from BreakingPoint 39 IMAPv4-Advanced over SSL Protocol from BreakingPoint 38 IPsec NAT-T Protocol from BreakingPoint 28 Android Market Protocol from BreakingPoint 28 SMTP Email over SSL Protocol from BreakingPoint 17 World of Warcraft™ Protocol from BreakingPoint 15 NNTP Protocol from BreakingPoint 14 AOL Instant Messenger Protocol from BreakingPoint 12 Open VPN Protocol from BreakingPoint 11 Xbox Live Protocol from BreakingPoint 10 BreakingPoint Raw 312

Table 12: North American Weekday Profile

22 Application Profile: North American Wireless Carrier Daytime 2010

As with the European daytime profile, entertainment applications have a reduced daytime presence. Gaming has been removed, and BitTorrent has been reduced from .78% to .5%. Mail was increased to 5.89% total—0.5% each for POP3/POP3s, IMAP/IMAPs and SMTP.

Super Flow Weight HTTP Mobile Protocol from BreakingPoint 7703 BlackBerry® ServicesProtocol from BreakingPoint 514 RTMP Protocol from BreakingPoint 343 IPsec ESP Protocol from BreakingPoint 295 POP3-Advanced over SSL Protocol from BreakingPoint 195 Tunneled IP Protocol from BreakingPoint 143 POP3-Advanced Protocol from BreakingPoint 124 As with the SMTP Email Protocol from BreakingPoint 93 European IMAPv4-Advanced Protocol from BreakingPoint 89 IMAPv4-Advanced over SSL Protocol from BreakingPoint 88 daytime profile, RTSP Protocol from BreakingPoint 88 entertainment BitTorrent Data Transfer Protocol from BreakingPoint 50 applications have SIP/RTP Simple Call Protocol from BreakingPoint 44 a reduced daytime IPsec NAT-T Protocol from BreakingPoint 34 presence. Android Market Protocol from BreakingPoint 28 SMTP Email over SSL Protocol from BreakingPoint 17 NNTP Protocol from BreakingPoint 14 AOL Instant Messenger Protocol from BreakingPoint 12 Open VPN Protocol from BreakingPoint 11 BreakingPoint Raw 291

Table 13: North American Daytime Profile

23 Application Profile: North American Wireless Carrier Weeknight 2010

Email has been reduced to 1.64%, and gaming and P2P have both increased by 1%.

Super Flow Weight HTTP Mobile Protocol from BreakingPoint 7703 BlackBerry® ServicesProtocol from BreakingPoint 514 RTMP Protocol from BreakingPoint 343 IPsec ESP Protocol from BreakingPoint 295 BitTorrent Data Transfer Protocol from BreakingPoint Tunneled IP Protocol from BreakingPoint 143 POP3-Advanced over SSL Protocol from BreakingPoint 143 RTSP Protocol from BreakingPoint 88 World of Warcraft™ Protocol from BreakingPoint 15 Xbox Live Protocol from BreakingPoint 10 SIP/RTP Simple Call Protocol from BreakingPoint 44 IPsec NAT-T Protocol from BreakingPoint 28 Android Market Protocol from BreakingPoint 28 POP3-Advanced Protocol from BreakingPoint 74 SMTP Email Protocol from BreakingPoint 43 SMTP Email over SSL Protocol from BreakingPoint 17 IMAPv4-Advanced Protocol from BreakingPoint 39 NNTP Protocol from BreakingPoint 14 IMAPv4-Advanced over SSL Protocol from BreakingPoint 38 AOL Instant Messenger Protocol from BreakingPoint 12 Open VPN Protocol from BreakingPoint 11 BreakingPoint Raw 312

Table 14: North American Weeknight Profile

24 V. Conclusion

Mobile carriers may be investing more than $72B into infrastructure in 2010,42 but are they spending it in the right places? The data contained in this paper indicates where mobile carriers should concern themselves when committing dollars to their infrastructure.

As is clearly apparent from BreahkingPoint’s examination of traffic data from major European and North American mobile carriers, mobile network traffic is changing dramatically. Mobile phones have evolved from voice and simple Web browsing into mini computers and gaming platforms running bandwidth-intensive applications like video, VoIP, P2P and multi-player games. The mobile carrier traffic BreakingPoint reviewed also shows that mobile broadband data consumption is trending beyond traditional fixed- network traffic and is plagued by both mobile-specific and traditional wireline security threats. The problem is only compounded by the release of more feature-rich smartphones and tablets and the adoption of laptop data dongles, which offer both heavy bandwidth demands and malware target opportunities.

Beyond the unique distinctions of mobile network traffic, network outages make it evident that carriers must begin viewing their infrastructure in a different manner. To The data contained avoid trafficand security-related outages, mobile carriers must be prepared to handle in this paper the increased load on their networks from smartphone and tablet devices. The volume of data and complexity of those devices is much greater than that of traditional phones. indicates where That does not mean simply building out more infrastructure. In fact, it points to validating mobile carriers network equipment and systems based on the mobile network traffic mix and patterns presented in this paper. With an increasing set of mobile devices and a shift toward should concern latency-intolerant traffic, it is critical that MNOs thoroughly measure the resiliency of their themselves network infrastructure components. That must be accomplished using a real-world blend of mobile-specific and fixed network traffic and security threats prior to deployment or when committing service rollouts in production. dollars to their In response, Ixia has created new application simulations and Super Flows that match infrastructure. the real traffic profiles of mobile network operators during different times of the day. By blending those traffic flows with BreakingPoint protocol fuzzing and thousands of BreakingPoint security attacks, MNOs and equipment manufacturers can quickly expose the vulnerabilities and weaknesses hidden throughout their infrastructure. With the weakness and vulnerabilities identified, MNOs are able to take the remedial action necessary to ensure highly resilient services and devices.

42 GSMA (2010, Feb.) Mobile Broadband Investment Set to Soar as HSPA Connections Pass 200 Million [Online]. http://www.mobileworldlive.com/mobile-broadband-investment-set-to-soar-as-hspa-connections- pass-200-million

25 VI. Glossary

3G: The family of ITU standards known as International Mobile -2000. Typical download throughput 200Kbps–2 Mbps.43

4G: Next-generation network standards pertaining to IMT-Advanced. Minimum expected download throughput between 20–100Mbps. LTE-Advanced and WiMAX are both efforts to meet IMT-Advanced requirements.44

ESP: Encapsulating Security Payload, IP protocol 50, an IPsec protocol that provides confidentiality, and optionally, authentication.

GRE: Generic Routing Encapsulation, an IP tunneling protocol created by Cisco Systems.

LTE: Long Term Evolution, an evolutionary approach to upgraded 3G networks that provides increased data rates and allows MNOs to support increased numbers of users.

LTE-Advanced: Further evolution of LTE to comply with IMT-Advanced requirements and support download rates of up to 1Gbps.45

MDI: Media Delivery Index, a measure of multimedia content delivery quality that measures loss and jitter in a network.

MNO: Mobile network operator. Used interchangeably with Mobile Carrier.

Mobile broadband: Broadband, as defined by the ITU, is “transmission capacity that is faster than primary rate Integrated Services Digital Network (ISDN) at 1.5 or 2.0 Megabits per second (Mbits).”46 Here we refer to 3G and later technologies as mobile broadband.

MOS: Mean opinion score, a quality of experience rating for multimedia content delivery.

MVNO: Mobile Virtual Network Operator. A mobile service operator without licensed spectrum or network that leases wireless capacity from other carriers to resell to end customers.47

NAT-T: Network Address Translation Traversal, a method of enabling hosts behind NAT gateways to use IPsec.

Petabyte: 1015 bytes, or 1,000 terabytes.

43 International Telecommunication Union. (2008, Jul.) What really is a Third Generation (3G) Mobile Technology. [Online]. http://www.itu.int/ITU-D/imt-2000/DocumentsIMT2000/What_really_3G.pdf 44 3G Americas. (2008, Oct.) Defining 4G: Understanding the ITU Process for the Next Generation of Wireless Technology. 45 T. Nakamura. (2009, Oct.) Proposal for Candidate Radio Interface Technologies for IMT Advanced Based on LTE Release 10 and Beyond (LTEAdvanced). [Online]. http://www.3gpp.org/IMG/pdf/2009_10_3gpp_IMT. pdf 46 International Telecommunication Union. (2003, Sept.) The Birth of Broadband Frequently Asked Questions. [Online]. http://www.itu.int/osg/spu/publications/birthofbroadband/faq.html 47 TELUS. Glossary. [Online]. http://about.telus.com/investors/en/glossary.html

26 Smartphone: An advanced mobile device or personal digital assistant (PDA) that provides text messaging, e-mail, multimedia downloads, and social networking (e.g., Facebook Mobile) functionality in addition to voice.47

Terabyte: 1012 bytes, or 1,000 gigabytes.

WiMAX: Worldwide Interoperability for Microwave Access, a 4G technology defined in IEEE 802.16-2004 and IEEE 802.16e-2005.

27 WHITE PAPER

915-3114-01 Rev. B, December 2013