• Aucun résultat trouvé

Interconnection Between 3G-SGSN and WLAN Access Point by Emulating RNC

Dans le document WLANs and WPANs towards 4G Wireless (Page 65-69)

3G and Its Interworking with WLAN

2.7 Interconnection Between 3G-SGSN and WLAN Access Point by Emulating RNC

With this interconnection, the IEEE 802.11 WLAN network is connected to the UMTS CN via the Iu-PS interface. Figure 2.13 shows this heterogeneous network architecture.

IEEE 802.11 WLAN–based RAN is connected via aninterworking unit (IWU), as shown in Figure 2.13, which is an RNC emulator. This is needed to exchange the packets between IEEE 802.11 WLAN network and UMTS.

The function of the IWU is similar to an RNC in the (UMTS terrestrial RAN) UTRAN. It has to relay the Iu bearer service on the CN side to the distribution network [IEEE 802.3 local area network(LAN)] bearer service on the other side. The adapted UMTS bearer concept includes an appropri-ate location and mobility management for the terminals in the IEEE 802.11 WLAN coverage area. Due to the very small cell size of IEEE 802.11 WLAN systems, the access points are not directly connected to the UMTS CN. This reduces the signaling load caused by mobility and location management. A distribution network connects the WLAN access points and enlarges the cov-erage area of this radio access form. The IEEE 802.11 WLAN is treated as a routing area associated with the 3G-SGSN. Thus, the WLAN looks like an RNC to the UMTS network. A user, whether connected to the UMTS net-work or the WLAN, will always be treated as a UMTS user. The UMTS

Figure 2.13 Interconnection between IEEE 802.11 WLAN AP and 3G-SGSN through an IWU that emulates RNC.

mobility management will have to maintain information about the user even when it is connected to a WLAN network. The IWU entity is the RNC emulator, which is presented in Figure 2.14.

The RNC emulator could be a LAN entity or a UMTS entity imple-mented in the networks. The LAN entity avoids encapsulation for routing to the UMTS network. For this type interconnection, a dual IEEE 802.11 WLAN/UMTS mode mobile station is required to use both networks, as shown in Figure 2.15.

The intertechnology roaming arises when the user is connected to the WLAN network. For this interconnection, the users have to interface to the UMTS Packet Data Convergence Protocol (PDCP) network through the RNC emulator. UMTS-specific protocol such as is on top of the IEEE 802.11 MAC and the PHY layers implemented. UMTS-related signaling protocols are carried out between the protocols in themobile station (MS) and the RNC emulator. The RNC emulator is a black box that hides WLAN-specific features from the UMTS network. The IP protocol is used to transfer packet-switched data over the Iu interface as well as in the CN.

TheGPRS Tunneling Protocol for UMTS(GTP-U) on the top of this trans-port IP layer provides a tunneling service through the CN until the access network encapsulates the user data. Hence, if IP packets are transmitted on user level, two IP layer exist in the packet-switched architecture.

Figure 2.14 Protocol stack of the RNC emulator is a UMTS and WLAN entity.

The IEEE 802.11 WLAN coverage area is represented as one routing area for the CN. If the mobile node leaves or enters a routing area, an update message is sent to the CN of UMTS. Hence, the 3G-SGSN can simply dis-tinguish the different RANs via the routing areas. Running IP sessions are not interrupted because the IP address of a terminal is not changed. The pro-cedure is completely transparent to the user. However, if a mobile leaves the IEEE 802.11 WLAN coverage area, the service quality will degrade, espe-cially for those sessions that made use of the high throughput capabilities of IEEE 802.11 WLAN system.

The current UMTS approach foresees that within the CN,differentiated services(DiffServ) are used on the transport IP level to differentiate between different traffic classes. This approach can be mapped quite easily on both the IEEE 802.11 WLAN distribution network and the IEEE 802.11 WLAN bearer. If switched Ethernet implements the IEEE 802.11 WLAN distribution network, the DiffServ classes can be mapped onto IEEE 802.1p priorities and then to IEEE 802.11 WLAN MAC connections, and vice versa. Figure 2.16 shows the UMTS bearer concept [18] with IEEE 802.11 WLAN access inte-grated. The UMTS bearer is not changed with respect to the different radio interfaces. The RAB must be adapted to the new, underlyingdistribution net-work(DN) bearer and the IEEE 802.11 WLAN bearer.

Figure 2.15 IEEE 802.11 WLAN/UMTS dual mode protocol stacks architecture of mobile station.

2.7.1 Pros and Cons of Emulating RNC

The main advantage of this interconnection together with the dual mode WLAN/UMTS protocol stack on MS, as shown in Figure 2.16, is that the mobility management, roaming, billing, and location-related issues are taken care of by UMTS network.Subscriber identity module(SIM) andUMTS SIM (USIM)–based authentication of a subscriber for WLAN offers a 2G/2.5G and 3G operator the following benefits:

The WLAN subscriber credentials are of identical format to 2G/2.5G or 3G and therefore easier to integrate subscriber into the current HLR. Therefore, all existing roaming capabilities and settle-ments are inherited from GSM.

The security level offered by WLAN will be identical to that of GSM/GPRS/UMTS. GSM SIM-based security is based on a challenge-response mechanism. It offers better tamper resistance because SIM runs an operator-specific confidential algorithm, which takes a 128-bitrandom number(RAND) and a secret key, Ki, stored on the SIM as an input to produce a 32-bit response (SRES) and a 64-bit data encryption keys, Kc(n), as an output. Kc(n) are never sent over the air, nor are they used in calculation for message authentication code for RAND and SRES. Kc(n), together with international mobile subscriber identity (IMSI) and Ki, are used by the network and the client to calculate independently the key K that will be used for the encryption of data over the air interface. So the

Figure 2.16 Adapted UMTS bearer concept using IEEE 802.11 WLAN bearer.

only data exposed over the air interface are the random numbers, K(n).

Strong security provided in the UMTS network and QoS for real-time services may now be provided over WLAN, thereby resolving the drawbacks of current IEEE 802.11a/b/g WLAN threats. Minimum changes are required in the UMTS network, and this will create a master-slave relation-ship between UMTS and WLAN as discussed in Section 2.6. This is not optimal. Using UMTS PDCP frames over WLAN may create bottlenecks.

In this scenario, the UMTS backbone may be a bottleneck for the WLAN traffic. WLAN data rates with 11 Mbps with IEEE 802.11b and 54 Mbps with IEEE 802.11a would be degraded to the speed of the UMTS terminal (2 Mbps). This type of interconnection requires modifications to standard WLAN terminals, which in turn would make them more expensive. Two attractive WLAN components (i.e., speed and price) would be lost in this type of connection.

2.8 Interconnection Between GGSN and WLAN Access Point by

Dans le document WLANs and WPANs towards 4G Wireless (Page 65-69)