Download presentation
Presentation is loading. Please wait.
Published byMarjory Wright Modified over 8 years ago
1
Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef
2
Contents Introduction History How it works Security Advantages & Disadvantages Service Deployment
3
UMA History Development of UMA inspired by the rapid deployment of broadband and wireless LANs within homes. Wanted to create a high bandwidth, low-cost wireless access network. Several major leading mobile operators and network equipment vendors collaborated and formed the Unlicensed Mobile Access Consortium (UMAC), to promote the Unlicensed Mobile Access (UMA) technology and develop specifications for it.
4
Development Companies Involved Cingular Motorola Nokia Sony Ericsson T-Mobile US These companies developed the first set of UMA specifications and published them in September 2004. The specifications were given to the 3 rd Generation Partnership Project (3GPP). Eight months later in April 2005, the specifications were included into their framework inside the 3GPP release 6 and renamed Generic Access Network (GAN).
5
Timeline
6
HOW UMA WORKS
7
Handing Off Connection UMA device on cellular network Finds suitable Wi-Fi network in range Device will analyze network and determine if connect or not Connect to UMA controller and negotiate switch with cell network
8
Inside UMA UMA protocol stored within the radio of the device. Tunnels through other radio layers to get to mobile network Requires an IP interface to connect to the internet IPsec module deals with tunnel to UMA controller
9
VoIP Transferring voice over internet is a costly endeavor Codecs used in traditional VoIP clients are costly AMR (Adaptive Mult-Rate) used to provide cheap, effective transmission Same as used already on phones Already optimized for low power consumption
10
UMA SECURITY
11
UMA Security AUTHENTICATION: Internet Key Echange version 2 (IKEv2) -choose your own algorithm Extensible Authentication Protocol (EAP) AUTHENTICATION CONFIDENTIALITY INTEGRITY
12
UMA Security CONFIDENTIALITY: IPsec Confidentiality algorithms: 1.AES with 128bit key length 2.3DES 3.NULL encryption AUTHENTICATION CONFIDENTIALITY INTEGRITY IPsec (IPv4): ----------------------------------------------------------------- | new IP header | | original IP header| | |ESP |ESP | | (any options) |ESP| (any options) |TCP|Data|Trailer|Auth | ----------------------------------------------------------------- | |
13
UMA Security INTEGRITY: Algorithms 1.HMAC-SHAI-96 2.HMAC-MD5 3.AES-XCBC-MAC-96 AUTHENTICATION CONFIDENTIALITY INTEGRITY
14
UMA Security Weaknesses IMSI Encrypted, but transferred with Network Access ID (NAI) Mobile Station Authentication OPTIONAL (MITM attack) DoS Attack
15
UMA Security: Comparison with Other Technologies
16
ADVANTAGES AND DISADVANTAGES
17
For Consumers ● Single number for home and mobile calls ● Calls through wireless LAN's, can deploy your own home coverage ● Greatly reduced roaming charges ● One provider for home internet and cell phone coverage
18
For Providers ● Deploying Wi-Fi hotspots is cheaper than deploying WAN's ● Reduces load on cellular networks, shifting some burden to internet infrastructure ● Able to shift calls onto the cheaper internet infrastructure
19
Disadvantages ● UMA-compatible handsets are more expensive and less common ● UMA-enabled phones require two active transceivers to handle seamless call- switching ● Despite all this, it's still not as cheap as straightforward VOIP protocols
20
SERVICE DEPLOYMENT
21
Service Deployment Surveying A full site survey is necessary to determine coverage planning and WiFi channel planning The survey revolves around finding the RF characteristics of the weakest client in the network, specifically its transmit power Design Access Points to match Radio coverage of the dual-mode phone WiFi performance is solely dependent on the phone's signal to the Access Points, similar to a phone's signal from the tower affecting calling ability
22
Cisco UMA Deployment
23
UMA Deployment Wireless Control System gives support to standalone Access Points and also Wireless LAN Controller Wireless Control System also provides statistics on calls being made, WiFi Channel performance and coverage planning Access Points improve call quality and WiFi channel capacity to phones which are unable to to support 802.11 1n protocol
24
CONCLUSION AND QUESTIONS
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.