Mobile Broadband Networks

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Broadband Networks WHITE PAPER Mobile Broadband Networks An Aggregated View of Wireless Application and Network Traffic for Global Mobile Network Operators (MNOs) www.ixiacom.com 915-3114-01 Rev. B, December 2013 2 Table of Contents Executive Summary .................................................................................................................................... 4 I. Mobile Broadband Networks Background ................................................................................................ 5 II. Measuring Resiliency and Identifying Stress Fractures in Mobile Network Infrastructure ...................16 III. Mobile Protocols and Super Flows .......................................................................................................17 IV. BreakingPoint Application Profiles ...................................................................................................... 20 VI. Glossary ............................................................................................................................................... 26 3 Executive Summary By the end of 2013, the number of mobile-connected devices will exceed the number of people on earth, and by 2017 there will be nearly 1.4 mobile devices per capita.1 Google Android™ phones, the Apple® iPhone™, the Apple iPad™ and similar devices continue to feed an insatiable consumer appetite for continuous availability of rich content and high- speed premium services. "Mobile broadband subscriptions overtook fixed broadband subscriptions in 20082, and show an astonishingly high growth rate of some 30% per year".3 To meet this demand, mobile carriers are responding with aggressive rollouts of next-generation networks and network infrastructures that will provide subscribers with a wireless experience comparable to the wired residential broadband experience. As mobile carriers move forward with next-generation converged networks, they are deploying network and security devices designed for wireline broadband and traditional networks. These network and security devices have not been evaluated to support a real- world mix of mobile applications, malicious traffic, and extreme load from tens of millions of mobile subscribers. If carriers continue to use this strategy, they will not be able to satisfy wireless network resiliency, security, and performance requirements. The result will be an ongoing escalation of service failures on every mobile network. By the end of 2013, If quality of service (QoS) is a main focus for a mobile carrier, then continuous service the number of failures should be the impetus for change. Mobile carriers have taken the first step in making needed changes by investing in upgrades to their infrastructures to handle mobile-connected the rapid rate of technology innovation, application growth, and ever-present security devices will exceed vulnerabilities. As this report will detail, mobile carriers must also validate network equipment and systems using real traffic and security threats to certify that the production the number of network will be resilient when faced with extreme load, stress, and attacks. people on earth, and To prepare this report, Ixia examined 100 terabytes of aggregate mobile traffic data by 2017 there will provided by Ixia BreakingPoint customers in North America and Europe. The paper be nearly 1.4 mobile outlines the traffic that these mobile networks are transporting, including the size of the traffic, overall percentages and individual applications. It also provides recommendations 1 devices per capita. for mobile network operators (MNOs) and outlines the steps BreakingPoint has taken to help MNOs and equipment manufacturers measure the resiliency of their network equipment and systems to ensure that they perform as expected. Data collection from mobile carriers in North America and Europe was conducted over a 24-hour period on a normal weekday and is representative of an average day. The data provides no indication of the number of carrier subscribers. Therefore, any per-user analysis would be purely speculative. Where possible, we note similarities and differences between the regions. Additionally, we examine some open questions about the effects of the Apple iPhone and Google Android devices on wireless networks, which have a significant impact on the traffic that is passing through the network. As with any network, capacity varies by location, whether it is cell tower, backhaul, or the core network. The references to capacity are in regard to backhaul and the core network; the signaling and radio frequency aspects of mobile broadband are a topic for future discussion. 1 Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2012-2017. http://www.cisco. com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 2 ITU (2013): http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_ data.xls 3 The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU, September 2013 4 Using the data provided in this paper, BreakingPoint has updated its own line of products with the ability to simulate the real traffic mix seen on today’s mobile network. Mobile operators using BreakingPoint products can then verify whether the network elements they are deploying will perform adequately when faced with the distinct traffic, unique load peaks, security attacks, and applications running on mobile networks. That level of visibility into infrastructure devices allows mobile operators to identify key weaknesses and potential vulnerabilities to provide the high-level of service demanded by mobile subscribers. I. Mobile Broadband Networks Background The traditional Mobile broadband use has risen dramatically, and in some cases, demand has exceeded wireline network network capacity. According to the International Telecommunication Union (ITU), "Mobile internet subscriptions have increased nearly tenfold over the last six years, from 268 components used million in 2007 to 2.1 billion in 2013.4 Although Europe had a head start in both cellular and in today's mobile mobile broadband deployments, the Americas are quickly growing, with the United States (US) surpassing Europe in 3G market penetration as of 2008.5 According to Pyramid networks may not Research, 4G subscriptions are expected to globally grow tenfold over five years, from 88 effectively handle 6 million in 2012 to 864 million in 2017. the mix of mobile The convergence of those growth drivers has led to a dramatic change in the type of traffic traffic and load, handled by mobile network operators. Networks must advance to handle the broadband traffic already threating to overtake capacity and Long-Term Evolution (LTE) is in the sites resulting in more of many carriers. In FierceWireless, Phil Golstein writes, "The United States is one of the retransmits on most advanced LTE markets in the world, along with South Korea, Japan and to a lesser extent, Germany. If we are to believe the carriers' predictions, by the end of 2013 there will mobile devices, be four U.S. operators covering at least 200 million people with LTE."7 mobile radio Mobile traffic is experiencing tremendous growth, so it is important to note that the frequencies, and network infrastructure components used to transport that traffic are the same components the signaling used in broadband and wireline network data connections. As the paper will reveal, application traffic running across a mobile network is very different from wireline network infrastructure. traffic. The traditional wireline network components used in today's mobile networks may not effectively handle the mix of mobile traffic and load, resulting in more retransmits on mobile devices, mobile radio frequencies, and the signaling infrastructure. The increase in retransmits leads to dropped calls, network resource outages, a negative customer experience, business disruption, and delays in bringing new mobile devices and/or premium services to market. As the mix of network traffic increases in volume and complexity, it is critical that MNOs validate both the security and the performance of their network infrastructure, understanding the unique conditions and patterns of mobile traffic. That will act as verification of the components’ ability to handle the unique characteristics of mobile data traffic. It will also allow MNOs to more efficiently manage capacity, reduce time to market with premium services, and ensure a quality subscriber experience. Since Ixia provides network operators with the ability to validate network infrastructure elements through the simulation of real-world application traffic, real-time security attacks, and maximum load, it is in a unique position to see all sides of the network 4 The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU, September 2013 5 comScore. (2008, Sept) comScore Reports that the U.S. Catches Up With Western Europe in Adoption of 3G Mobile Devices. [Online]. http://ir.comscore.com/releasedetail.cfm?ReleaseID=332170 6 Pyramid Research, quarterly mobile data forecast, February 2013 7 FierceWireless, Progress report: A snapshot of U.S. LTE deployments in 2013. http://www.fiercewireless. com/special-reports/progress-report-snapshot-us-lte-deployments-2013#ixzz2n7O6JW7y 5 equation. Although carriers are, understandably, protective of the details of their specific traffic mix, they are also concerned with the massive stability, security, and performance
Recommended publications
  • OFC/NFOEC 2011 Program Archive
    OFC/NFOEC 2011 Archive Technical Conference: March 6-10, 2011 Exposition: March 8-10, 2011 Los Angeles Convention Center, Los Angeles, CA, USA At OFC/NFOEC 2011, the optical communications industry was buzzing with the sounds of a larger exhibit hall, expanded programming, product innovations, cutting-edge research presentations, and increased attendance March 6 - 10 in Los Angeles. The exhibit hall grew by 20 percent over last year, featuring new programming for service providers and data center operators, and more exhibitors filling a larger space, alongside its core show floor programs and activities. The more than 500 companies in the exhibition hall showcased innovations in areas such as 100G, tunable XFPs, metro networking, Photonic Integrated Circuits, and more. On hand to demonstrate where the industry is headed were network and test equipment vendors, sub-system and component manufacturers, as well as software, fiber cable and specialty fiber manufacturers. Service providers and enterprises were there to get the latest information on building or upgrading networks or datacenters. OFC/NFOEC also featured expanded program offerings in the areas of high-speed data communications, optical internetworking, wireless backhaul and supercomputing for its 2011 conference and exhibition. This new content and more was featured in standing-room only programs such as the Optical Business Forum, Ethernet Alliance Program, Optical Internetworking Forum Program, Green Touch Panel Session, a special symposium on Meeting the Computercom Challenge and more. Flagship programs Market Watch and the Service Provider Summit also featured topics on data centers, wireless, 100G, and optical networking. Hundreds of educational workshops, short courses, tutorial sessions and invited talks at OFC/NFOEC covered hot topics such as datacom, FTTx/in-home, wireless backhaul, next generation data transfer technology, 100G, coherent, and photonic integration.
    [Show full text]
  • OFC/NFOEC 2012 Archive
    OFC/NFOEC 2012 Archive Technical Conference: March 4-8, 2012 Exposition: March 6-10, 2012 Los Angeles Convention Center, Los Angeles, CA, USA The optical communications industry’s leading event wrapped up last week in Los Angeles with increased attendance, a larger show floor and plenty of buzz and enthusiasm surrounding the innovations presented in the technical sessions. Nearly 800 technical presentations covered topics such as an elastic optical network for enabling terabit speeds, a graphene-based optical modulator, a record-speed wireless data bridge, and optical interconnects for enabling future computers. The popular post-deadline paper session, which saw a spike of 25% more submissions this year, featured the most timely breakthroughs in the research field – including a record 405 Terabit/s transmission speed demonstrated by a team of researchers in Japan. OFC/NFOEC’s most well-attended program, the Plenary and Awards Session, featured three high-level speakers on three unique topics. Isao Sugino, R&D director in Japan’s Ministry of Internal Affairs and Communications gave a comprehensive overview the devastation caused to the telecommunication networks in Japan after the March 2011 earthquake and tsunami, as well as a look at what Japan is doing to protect its ICT infrastructure against future disasters. Greg Papadopoulos, venture partner with New Enterprise Associates and former CTO of Sun Microsystems, spoke on exa-scale computing and what it means for the optics industry. Google’s Vice President of Access Networks, Milo Medin, spoke on the current “age of abundance” and what that means for bandwidth, network speeds, and consumer demand.
    [Show full text]
  • Converged Network Lifecycle Solutions Table of Contents
    Converged Network Lifecycle Solutions Table of Contents Ixia Solutions ............................................................................................................................2 Broadband Access and Services Testing ............................................................................. 3 Router and Switch Testing .....................................................................................................4 Carrier Ethernet Testing ......................................................................................................... 6 Virtualization Testing ............................................................................................................... 8 Automotive Ethernet Testing .................................................................................................. 9 IPv6 Testing............................................................................................................................. 10 MPLS Testing .......................................................................................................................... 12 Voice Testing ........................................................................................................................... 13 Multiplay Network Testing .................................................................................................... 15 Security Testing ......................................................................................................................17 Wireless Network Testing ....................................................................................................
    [Show full text]
  • 5G for Dummies®, Ixia Special Edition
    These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. 5G Ixia Special Edition by Kalyan Sundhar and Lawrence C. Miller These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. 5G For Dummies®, Ixia Special Edition Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2017 by John Wiley & Sons, Inc., Hoboken, New Jersey No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Ixia and the Ixia logo are trademarks or registered trademarks of Ixia Corporation. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Converged Network Lifecycle Solutions Table of Contents
    Converged Network Lifecycle Solutions Table of Contents Ixia Solutions ............................................................................................................................2 Broadband Access and Services Testing ............................................................................. 3 Router and Switch Testing .....................................................................................................4 Carrier Ethernet Testing ......................................................................................................... 6 Virtualization Testing ............................................................................................................... 8 Automotive Ethernet Testing .................................................................................................. 9 IPv6 Testing............................................................................................................................. 10 MPLS Testing .......................................................................................................................... 12 Voice Testing ........................................................................................................................... 13 Multiplay Network Testing .................................................................................................... 15 Security Testing ......................................................................................................................17 Wireless Network Testing ....................................................................................................
    [Show full text]
  • Annual Report 2020
    ANNUAL REPORT 2020 ACCELERATING INNOVATION TO CONNECT & SECURE THE WORLD Keysight Technologies Inc. 1400 Fountaingrove Parkway Santa Rosa California 95403 Ronald S. Nersesian Chairman, President & Chief Executive Officer January 29, 2021 To our stockholders, Keysight delivered an exceptional finish to fiscal year 2020, driven by strong execution and broad-based demand for our differentiated solutions. We faced unprecedented challenges during the year due to the Covid-19 pandemic, but remained focused on keeping employees safe and healthy, while continuing to deliver on our commitments to our customers and shareholders. Despite macro-economic and supply chain disruptions, full-year orders of $4.5 billion were a record high for Keysight, and we achieved all-time high profitability and cash flow. Revenue declined 2 percent over last year and totaled $4.22 billion and earnings per share grew 2 percent, or 3 percent on a non-GAAP basis. These results demonstrate the durability and strength of Keysight’s financial operating model. Keysight has driven strong value creation since becoming an independent public company in November 2014, having achieved compound annual non-GAAP revenue growth of 8 percent, while expanding non-GAAP gross margins by 810 basis points and increasing non-GAAP operating margin by 720 basis points. Non-GAAP earnings per share grew 14 percent on a compound annual basis over this period. Keysight’s stock has appreciated 243 percent since it began trading six years ago; a compounded annual growth rate of 23 percent. We continue to execute against our strategy of transforming from hardware-centric products to software-centric solutions.
    [Show full text]
  • Solutions Overview
    SOLUTIONS OVERVIEW 915-0117-01 Rev B CONTENTS IXIA SOLUTIONS Wi-Fi Testing 28 Overview 4 Wireless Network Testing 30 TEST SOLUTIONS SECURITY SOLUTIONS Broadband Access and Services Testing 6 Security Resilience 33 Carrier Ethernet Testing 7 Security Testing 34 Data Center/Cloud Testing 8 Faster Security Breach Detection 36 DevOps Testing 10 Higher Speed Ethernet Solutions 11 VISIBILITY SOLUTIONS Network Visibility Architecture 38 IoT Testing 13 Network Access Visibility Solutions 40 IP Network Assessment and Diagnostics 14 Inline Network Visibility Solutions 41 IPv6 Testing 16 Out-of-Band Network Visibility Solutions 42 MPLS Testing 17 Cloud Visibility Solutions 43 Multiplay Network Testing 18 Application Visibility Solutions 44 Network Emulation 20 Active Network Monitoring and Assessment 45 Protocol Conformance Testing 21 Router and Switch Testing 22 SUPPORT Specialized Testing 24 Ixia Global Support 47 Automotive Ethernet 24 Ixia Professional Services 48 Video Testing 25 Virtualization Testing 26 ACRONYMS Acronyms 50 Voice Testing 27 IXIA SOLUTIONS OVERVIEW Ixia provides testing, visibility, and security solutions, strengthening applications across physical and virtual networks. Ixia’s solutions emulate realistic media-rich traffic and network conditions so that customers can optimize and validate the design, performance, and security of their pre-deployment and production networks. Ixia’s solutions flow across all network types and designs: from enterprises and government agencies to service providers and network equipment manufacturers (NEMs). Applications do great things, but they all have bugs and blind spots. Making them stronger means better testing, security resilience, and monitoring ability. Ixia takes a three-pronged approach to making applications stronger with IxTest™, IxSecure™, and IxVision™ architecture capabilities.
    [Show full text]
  • Keysight-Ixia-Solutions-Overview
    Solutions Overview Contents Ixia Solutions Overview................................4 Broadband Access and Services Testing .........7 Router and Switch Testing ...........................31 Carrier Ethernet Testing ................................9 Software-Defined Networking .......................34 Data Center / Cloud Testing ........................11 Router and Switch Testing ...........................36 Higher-Speed Ethernet Solutions ..................14 Industrial Ethernet Testing ............................38 IoT Testing ..................................................16 Chip Design Performance Testing .................39 IP Network Assessment and Diagnostics ......18 Network Interface Card Testing ....................40 IP V6 Testing ...............................................20 Video Testing ...............................................42 MPLS Testing ..............................................22 Virtualization Testing ....................................44 Multiplay Network Testing ............................24 Voice Testing ...............................................46 Network Emulation ......................................27 Wi-Fi Testing ...............................................48 Protocol Conformance Testing......................29 Wireless Network Testing .............................50 Inline Security ..............................................55 Threat Detection ..........................................63 Decryption ..................................................58 Network Security Resilience
    [Show full text]
  • Solutions Overview Contents
    Solutions Overview Contents Ixia Solutions Overview................................4 Broadband Access and Services Testing .........7 Router and Switch Testing ...........................31 Carrier Ethernet Testing ................................9 Software-Defined Networking .......................34 Data Center / Cloud Testing ........................11 Router and Switch Testing ...........................36 Higher-Speed Ethernet Solutions ..................14 Industrial Ethernet Testing ............................38 IoT Testing ..................................................16 Chip Design Performance Testing .................39 IP Network Assessment and Diagnostics ......18 Network Interface Card Testing ....................40 IP V6 Testing ...............................................20 Video Testing ...............................................42 MPLS Testing ..............................................22 Virtualization Testing ....................................44 Multiplay Network Testing ............................24 Voice Testing ...............................................46 Network Emulation ......................................27 Wi-Fi Testing ...............................................48 Protocol Conformance Testing......................29 Wireless Network Testing .............................50 Inline Security ..............................................55 Threat Detection ..........................................63 Decryption ..................................................58 Network Security Resilience
    [Show full text]