Mobile Broadband Networks
Total Page:16
File Type:pdf, Size:1020Kb
WHITE PAPER Mobile Broadband Networks An Aggregated View of Wireless Application and Network Traffic for Global Mobile Network Operators (MNOs) www.ixiacom.com 915-3114-01 Rev. B, December 2013 2 Table of Contents Executive Summary .................................................................................................................................... 4 I. Mobile Broadband Networks Background ................................................................................................ 5 II. Measuring Resiliency and Identifying Stress Fractures in Mobile Network Infrastructure ...................16 III. Mobile Protocols and Super Flows .......................................................................................................17 IV. BreakingPoint Application Profiles ...................................................................................................... 20 VI. Glossary ............................................................................................................................................... 26 3 Executive Summary By the end of 2013, the number of mobile-connected devices will exceed the number of people on earth, and by 2017 there will be nearly 1.4 mobile devices per capita.1 Google Android™ phones, the Apple® iPhone™, the Apple iPad™ and similar devices continue to feed an insatiable consumer appetite for continuous availability of rich content and high- speed premium services. "Mobile broadband subscriptions overtook fixed broadband subscriptions in 20082, and show an astonishingly high growth rate of some 30% per year".3 To meet this demand, mobile carriers are responding with aggressive rollouts of next-generation networks and network infrastructures that will provide subscribers with a wireless experience comparable to the wired residential broadband experience. As mobile carriers move forward with next-generation converged networks, they are deploying network and security devices designed for wireline broadband and traditional networks. These network and security devices have not been evaluated to support a real- world mix of mobile applications, malicious traffic, and extreme load from tens of millions of mobile subscribers. If carriers continue to use this strategy, they will not be able to satisfy wireless network resiliency, security, and performance requirements. The result will be an ongoing escalation of service failures on every mobile network. By the end of 2013, If quality of service (QoS) is a main focus for a mobile carrier, then continuous service the number of failures should be the impetus for change. Mobile carriers have taken the first step in making needed changes by investing in upgrades to their infrastructures to handle mobile-connected the rapid rate of technology innovation, application growth, and ever-present security devices will exceed vulnerabilities. As this report will detail, mobile carriers must also validate network equipment and systems using real traffic and security threats to certify that the production the number of network will be resilient when faced with extreme load, stress, and attacks. people on earth, and To prepare this report, Ixia examined 100 terabytes of aggregate mobile traffic data by 2017 there will provided by Ixia BreakingPoint customers in North America and Europe. The paper be nearly 1.4 mobile outlines the traffic that these mobile networks are transporting, including the size of the traffic, overall percentages and individual applications. It also provides recommendations 1 devices per capita. for mobile network operators (MNOs) and outlines the steps BreakingPoint has taken to help MNOs and equipment manufacturers measure the resiliency of their network equipment and systems to ensure that they perform as expected. Data collection from mobile carriers in North America and Europe was conducted over a 24-hour period on a normal weekday and is representative of an average day. The data provides no indication of the number of carrier subscribers. Therefore, any per-user analysis would be purely speculative. Where possible, we note similarities and differences between the regions. Additionally, we examine some open questions about the effects of the Apple iPhone and Google Android devices on wireless networks, which have a significant impact on the traffic that is passing through the network. As with any network, capacity varies by location, whether it is cell tower, backhaul, or the core network. The references to capacity are in regard to backhaul and the core network; the signaling and radio frequency aspects of mobile broadband are a topic for future discussion. 1 Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2012-2017. http://www.cisco. com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 2 ITU (2013): http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_ data.xls 3 The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU, September 2013 4 Using the data provided in this paper, BreakingPoint has updated its own line of products with the ability to simulate the real traffic mix seen on today’s mobile network. Mobile operators using BreakingPoint products can then verify whether the network elements they are deploying will perform adequately when faced with the distinct traffic, unique load peaks, security attacks, and applications running on mobile networks. That level of visibility into infrastructure devices allows mobile operators to identify key weaknesses and potential vulnerabilities to provide the high-level of service demanded by mobile subscribers. I. Mobile Broadband Networks Background The traditional Mobile broadband use has risen dramatically, and in some cases, demand has exceeded wireline network network capacity. According to the International Telecommunication Union (ITU), "Mobile internet subscriptions have increased nearly tenfold over the last six years, from 268 components used million in 2007 to 2.1 billion in 2013.4 Although Europe had a head start in both cellular and in today's mobile mobile broadband deployments, the Americas are quickly growing, with the United States (US) surpassing Europe in 3G market penetration as of 2008.5 According to Pyramid networks may not Research, 4G subscriptions are expected to globally grow tenfold over five years, from 88 effectively handle 6 million in 2012 to 864 million in 2017. the mix of mobile The convergence of those growth drivers has led to a dramatic change in the type of traffic traffic and load, handled by mobile network operators. Networks must advance to handle the broadband traffic already threating to overtake capacity and Long-Term Evolution (LTE) is in the sites resulting in more of many carriers. In FierceWireless, Phil Golstein writes, "The United States is one of the retransmits on most advanced LTE markets in the world, along with South Korea, Japan and to a lesser extent, Germany. If we are to believe the carriers' predictions, by the end of 2013 there will mobile devices, be four U.S. operators covering at least 200 million people with LTE."7 mobile radio Mobile traffic is experiencing tremendous growth, so it is important to note that the frequencies, and network infrastructure components used to transport that traffic are the same components the signaling used in broadband and wireline network data connections. As the paper will reveal, application traffic running across a mobile network is very different from wireline network infrastructure. traffic. The traditional wireline network components used in today's mobile networks may not effectively handle the mix of mobile traffic and load, resulting in more retransmits on mobile devices, mobile radio frequencies, and the signaling infrastructure. The increase in retransmits leads to dropped calls, network resource outages, a negative customer experience, business disruption, and delays in bringing new mobile devices and/or premium services to market. As the mix of network traffic increases in volume and complexity, it is critical that MNOs validate both the security and the performance of their network infrastructure, understanding the unique conditions and patterns of mobile traffic. That will act as verification of the components’ ability to handle the unique characteristics of mobile data traffic. It will also allow MNOs to more efficiently manage capacity, reduce time to market with premium services, and ensure a quality subscriber experience. Since Ixia provides network operators with the ability to validate network infrastructure elements through the simulation of real-world application traffic, real-time security attacks, and maximum load, it is in a unique position to see all sides of the network 4 The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU, September 2013 5 comScore. (2008, Sept) comScore Reports that the U.S. Catches Up With Western Europe in Adoption of 3G Mobile Devices. [Online]. http://ir.comscore.com/releasedetail.cfm?ReleaseID=332170 6 Pyramid Research, quarterly mobile data forecast, February 2013 7 FierceWireless, Progress report: A snapshot of U.S. LTE deployments in 2013. http://www.fiercewireless. com/special-reports/progress-report-snapshot-us-lte-deployments-2013#ixzz2n7O6JW7y 5 equation. Although carriers are, understandably, protective of the details of their specific traffic mix, they are also concerned with the massive stability, security, and performance