Sei sulla pagina 1di 12

1.

INTRODUCTION
Unlicensed Mobile Access (UMA) technology provides access to GSM and GPRS mobile services over unlicensed spectrum technologies, including Bluetooth and 802.11. By deploying UMA technology, service providers can enable subscribers to roam and handover between cellular networks and public and private unlicensed wireless networks using dual-mode mobile handsets. With UMA, subscribers receive a consistent user experience for their mobile voice and data services as they transition between networks. In order to promote the widespread adoption of UMA technology, a number of leading companies within the wireless industry have jointly developed a set of open specifications. UMA technology has its origins with the wireless (cellular/mobile) community and the technology's specifications have been developed with collaboration from the Third Generation Partnership Project (3GPP) and other standards bodies. UMA's main objective is to allow a common way for dual-mode wireless handsets to move (roam) between "unlicensed" wireless network connections like those provided in a Wi-Fi (IEEE 802.11) or a Bluetooth transmission, and a GSM or General Packet Radio Service (GPRS) network connection. Unlike the multi-part IMS architecture, the UMA architecture is less complicated, with the principle component called the UMA Network Controller (UNC). The architecture also includes security components like AAA and security gateways. The UNC typically sits inside the unlicensed network zone and sits between the Unlicensed Mobile Access Network (UMAN) and a carriers licensed mobile network. The UMS knows where to route calls as they come and go through a wireless access point; it connects to wireless access points (like an 802.11 router) via the IP network core on the unlicensed side and to the core mobile network on the other side. It is responsible for monitoring and (in cooperation with the AAA server) for users' authentication as the move in and out of the UMAN range and it is designed to complete a transparent hand-off between the networks. The UNC is also responsible for storing the users location so the mobile network knows where to route calls for a dual mode handset that is in range of the UMAN. Specifically, the UNC "tunnels" GSM/GPRS connections over a Bluetooth or Wi-Fi connection. UMA stands for Unlicensed Mobile Access. It is a wireless technology that allows seamless transition between wireless WANS (e.g. GSM, 3G, EDGE, GPRS, etc.) and wireless LAN (e.g. Wi-Fi, Bluetooth). This means that a user can initiate a call over GSM, for example, and the calls switches from the GSM network to the offices Wi-Fi network once the user walks into range and vice-versa. UMA is one of the ways to FMC (fixed mobile convergence).

2. THEORETICAL DESCRIPTION
1

2.1 How does it work A mobile subscriber with a UMA-enabled, dual-mode handset moves within range of an unlicensed wireless network to which the handset is allowed to connect. Upon connecting, the handset contacts the UMA Network Controller (UNC) over the broadband IP access network to be authenticated and authorized to access GSM voice and GPRS data services via the unlicensed wireless network. If approved, the subscribers current location information stored in the core network is updated, and from that point on all mobile voice and data traffic is routed to the handset via the Unlicensed Mobile Access Network (UMAN) rather than the cellular radio access network (RAN). ROAMING: When a UMA-enabled subscriber moves outside the range of an unlicensed wireless network to which they are connected, the UNC and handset facilitate roaming back to the licensed outdoor network. This roaming process is completely transparent to the subscriber. HANDOVER: If a subscriber is on an active GSM voice call or GPRS data session when they come within range (or out of range) of an unlicensed wireless network, that voice call or data session can automatically handover between access networks with no discernible service interruption. Handovers are completely transparent to the subscriber.

Fig 1.1 UMA working When a handset already in communication through a wireless WAN enters the area of a wireless LAN network, it presents itself to the WANs GAN controller as being on a different base station of the WAN and shifts to the wireless LAN network. In a word, the unlicensed LAN is presented as a pseudo part of the licensed WAN, and thus the transition is smoothly allowed. Once the user moves out the range of the unlicensed wireless LAN, the connection is roamed back to the wireless WAN. This whole process is completely transparent to the user. Transparency here means (as it curiously does with networks) that the user does not know (or need to know) the hassle of the handing over. It just happens seamlessly without the user noticing. 2.2 Basic requirements for using UMA services
2

To offer UMA dual-mode services, mobile operators need handsets, network controllers, call controller, the security to protect the mobile operator voice network from Internet- based threats, and wireless access points for their subscribers. 2.3 Participating companies of the UMA In order to promote the widespread adoption of UMA technology, a number of leading companies within the wireless industry have jointly developed a set of open specifications. In order to promote the widespread adoption of UMA technology, a number of leading companies within the wireless industry will have to jointly develop a set of open specifications. These specifications should be made available through the Web site, and may be used by vendors and carriers of wireless communications systems and applications to develop and deploy interoperable solutions. In addition to developing and maintaining the initial specifications, the participating companies are actively working with the 3GPP standards organization to use the specifications as the basis for the development of a formal standard.

Alcatel British Telecom Cingular Ericsson Kineto Wireless Motorola Nokia Nortel Networks O2 Research in Motion Rogers Wireless Siemens Sony Ericsson T-Mobile US

3. UMA TECHNOLOGY
3

Unlicensed Mobile Access (UMA) technology enables access to GSM and GPRS mobile services over unlicensed spectrum, including Bluetooth and WiFi. Highlights of UMA Technology: Seamless delivery of mobile voice and data services over unlicensed wireless networks. Provides the same mobile identity on Cellular RAN and unlicensed wireless networks. Seamless transitions (roaming and handover) between Cellular RAN and unlicensed wireless networks. Preserves investment in existing/future mobile core network infrastructure Independent of underlying unlicensed spectrum technology (e.g. WiFi, Bluetooth) Transparent to existing, standard CPE devices (e.g. access points, routers and modems) Utilizes standard always on" broadband IP access networks (e.g. DSL, Cable, T1/E1, Broadband Wireless, FTTH) Security equivalent to current GSM mobile networks No impact to operations of Cellular RAN (e.g. spectrum engineering, cell planning.)

3.1 UMA functional architecture

Fig 3.1 Architecture The UMA functional architecture consists of 5 basic components:4

UNC ( UMA Network Controller) Security gateway Authentication, Authorization and Accounting (AAA) infrastructure Dual mode handset Standard Wi-fi access point

3.1.1 UNC The UNC provides dual-mode handsets with alternative access to GSM voice and GPRS data services. 1) For voice traffic, the UNC integrates directly in to an operator Mobile Switching Center (MSC) through the A interface. 2) For data traffic, the UNC integrates directly in to an operator serving GPRS support node (SGSN) through the Gb interface 3.1.2 Security gateway: The introduction of a UMA solution into an operator network raises numerous security implications. The security gateway provides two important security roles in the UMA: 1) Secure authentication of mobile subscribers. 2) Termination of secure tunnels from the handset. 3.1.3 Authentication, authorization, and accounting(AAA)in f r a s t r u c t u r e : The AAA infrastructure interacts with numerous elements in the UMA architecture. 1) Security gateway: The AAA infrastructure interacts directly with the security gateway to validate mobile credentials during IPSec tunnel establishment. This includes the use of EAP mechanisms for SIM-based authentication using either EAP-SIM or EAP-AKA. 2) HLR: The AAA infrastructure includes a MAP Gateway function for communication to the operator HLR using the SS7 transport protocol. During authentication, the AAA infrastructure is responsible for converting RADIUS authentication messages from the security gateway into SS7 MAP Invoke messages to the HLR. This allows the existing HLR to verify a user on the UMA using the IMSI/triplets sequence that is standard for GSM/GPRS authentication.

3.1.4 Dual-mode handset:


5

The dual-mode handset allows an end user to connect to either a public GSM radio network or a private Wi-Fi or Blue-tooth radio network and maintain the same service capabilities. 3.1.5 Standard Wi-Fi access point A standard Wi-Fi access point (or hotspot) is used to provide Wi-Fi access to a dual-mode handset. This Wi-Fi access point may be enhanced with specific Quality of Service (QoS) and security mechanisms, such as rate-limiting for uplink traffic, Call Admission control to limit the number of dual-mode handsets that may associate with it, etc. 3.2 Modes of operation: UMA technology provides alternative access to GSM and GPRS core network services via IPbased broadband connections. In order to deliver a seamless user experience, the specifications define a new network element (the UMA Network Controller, UNC) and associated protocols that provide for the secure transport of GSM/GPRS signaling and user plane traffic over IP. The UNC interfaces into the core network via existing 3GPP specified A/Gb interfaces A typical UMA handset will have four modes of operation: 1) GERAN-only: uses only cellular networks. 2) GERAN-preferred: uses cellular networks if available, otherwise the 802.11 radio. 3) GAN-preferred: uses a 802.11 connection if an access point is in range, otherwise the cellular network. 4) GAN-only: uses only the 802.11 connection. In all cases, the handset scans for GSM cells when it first turns on, to determine its location area. This allows the carrier to route the call to the nearest GANC, set the correct rate plan, and comply with existing roaming agreements. 4. PROTOCOLS IN THE UMA SYSTEM In the UMA system, only two protocols have been standardized specifically for the purpose of providing UMA access to the mobile network. UMA Radio Resource protocol (Generic Access Resource Control and Generic Access Circuit Switched Resources) UMA Radio Link Control protocol (Generic Access Packet Switched Resources These help in: GSM Services supporting abilities by UMA. CS Telephony CS Supplementary Services CS Emergency call Short Message Service (SMS) General Packet Radio Service (GPRS) Location Services (LCS) Multimedia Messaging Service (MMS) UMA provides an access to GPRS core and therefore it can be used as one access method to IMS based services too. Depending on terminal implementations IMS services can be used to enrich CS voice which provides potential for increasing revenue from longer calls when additional
6

value added services are used simultaneously. UMA network enables simultaneous CS and PS services. Service continuity between UMA and GSM may involve some limitation due to lower bandwidth in GSM GPRS, and potentially limiting active service being CS voice call in case dual transfer mode is not supported in GSM access. In terminal side, convergence can be implemented at least in the following elements: Multi-radio Mobile Terminal:-This type of future device is capable of being connected both on cellular networks, as well as on local WLAN type networks. This means that the operator can move part of the traffic to local area networks, e.g. in homes and in public hot spots. Personal Computer:-These can be equipped with WLAN cards, WAN mobile cards (GPRS/EDGE/WCDMA) etc, and thus be semi-mobile. A special software (Client) is typically needed to be interoperable with the operator services e.g. SIP Client to implement real time services using CPS.

The UMA solution designing should kept in mind providing mechanisms for automatic roaming between the GSM and UMA systems .

Fig 4.1 automatic roaming between the GSM and UMA systems A. Roaming from GSM to UMA consists of two elementary procedures: UMA Authentication, and UMA Discovery and Registration. Roaming from UMA to GSM is basically a UMA DeRegistration procedure

B. The MS attempts to roam into the UMA access and joins a WLAN access point. As a first step of roaming to UMA, the MS needs to initiate the IKEv2 authentication procedure for EAPSIM authentication. C. The SEGW sends an EAP Response/Identity message to the AAA Server, which in turn triggers the starting of EAP-SIM authentication. D. First, mutual EAP-SIM authentication procedure messages are exchanged between the AAA Server and the MS, where the SEGW relays the messages. Second, within the EAP-SIM procedure the AAA Server may need to retrieve the subscribers GSM authentication data from the HLR, unless this information is cached from earlier EAP-SIM authentications. After successful EAP-SIM message exchange, the SEGW and the MS complete the IKEv2 signalling. The Extensible Authentication Protocol (EAP) is used to perform SIM authentication of WLAN subscribers to the network. The IEEE 802.1x standard utilizes the EAP protocol for general authentication. The EAP supports multiple authentication mechanisms and handling of new authentication mechanisms as extension EAP types or EAP methods one of which is the EAP SIM.

5. Advantages

Instead of erecting expensive base stations to cover dead zones, GAN allows carriers to add coverage using low cost 802.11 access points. Subscribers at home have very good coverage. In addition, GAN relieves congestion (meaning that networks can, through GAN, essentially piggyback on other infrastructure) on the GSM or UMTS spectrum by removing common types of calls and routing them to the operator via the relatively low cost Internet GAN makes sense for network operators that also offer Internet services. Operators can leverage sales of one to promote the other, and can bill both to each customer. Some other operators also run networks of 802.11 hotspots, such as T-Mobile. They can leverage these hotspots to create more capacity and provide better coverage in populous areas. The carrier does not pay for much of the service, the party who provides the Internet and Wi-Fi connection pays for a connection to the Internet, effectively paying the expensive part of routing calls from the subscriber.

For subscribers:

Subscribers do not rely on their operator's ability to roll out towers and coverage, allowing them to fix some types of coverage dead zones (such as in the home or workplace) themselves. The cheaper rates for 802.11 use, coupled with better coverage at home, make more affordable and practical the use of cellphones instead of land lines. Using IP over 802.11 eliminates expensive charges when roaming outside of a carrier's network. GAN is currently the only commercial technology available [citation needed] that combines GSM and 802.11 into a service that uses a single number, a single handset, a single set of services and a single phone directory for all calls. GAN can migrate between IP and cellular coverage and is thus seamless; in contrast, calls via third-party VOIP plus a data phone are dropped when leaving high-volume data coverage. Basis for differentiated charging to subscribers by leveraging unlicensed radio access MVNO's, ISP's and fixed operators entry to mobile business High speed packet access with handovers to macro network over the UMA's Gb interface Dual transfer mode service at hotspots

6. Disadvantages

Subscribers must upgrade to Wi-Fi/UMA enabled handsets to take advantage of the service. Calls may be more prone to disconnect when the handset transitions from Wi-Fi to the standard wireless service and vice versa (because the handset moved out or within the WiFi's range). How much this is a problem may vary based on which handset is used. The UMA may use different frequency that is more prone to some types of interference Some setup may be required to provide connection settings (such as authentication details) before advantages may be experienced. This may take time for subscribes and require additional support to be provided. The costs of support may be for more than the wireless phone company: network administrators may be asked to help a user enter appropriate settings into a phone (that the network administrator may know little about). The phones that support multiple signals (both the UMA/Wi-Fi and the type of signal used by the provider's towers) may be more expensive, particularly to manufacture, due to additional circuitry/components required This uses the resources of the network providing the Wi-Fi signal (and any indirect network that is then utilized when that network is used). Bandwidth is used up. Some types of network traffic (like DNS and IPsec-encrypted) need to be permitted by the network, so a decision to support this may impose some requirement(s) regarding the network's security (firewall) rules. Using GAN/UMA on a mobile requires the WiFi module to be enabled. This in turn drains the battery faster, and reduces both the talk time and standby time when compared to disabling GAN/UMA (and in turn WiFi).

10

7. CONCLUSION The UMA architecture provides an essential prerequisite for dual-mode services protecting the mobile operators voice network from services originating the Internet. Because the security infrastructure that is used to offer dual-mode services can be reused for other services, the investment in the UMA solution provides a competitive advantages for tomorrows. Service as well as todays. In order to promote the widespread adoption of UMA technology, a number of companies within the cellular &wireless industry have jointly developed a set of openspecifications.UMA lets mobile operators deliver voice, data and multimedia applications to mobile phones on Wi-Fi access network using dual-mode mobile handsets. An Open test specification is under development that can be used to facilitate interoperability testing between implementations. The test specifications will be available through web site. Companies planning to implement products based on the UMA specifications should seek bilateral compliancy testing agreements directly with other vendors. In principle, the UMA specifications ensure interoperability similar to any other industry specifications, but the specifications may include options and parameters that have to be agreed bilaterally with other vendors. The UMA participating companies do not guarantee interoperability and the specifications may be upgraded without notice.

11

8. REFERENCES: [1] UMA Specifications UMA TechnologyExtending Mobile Services to Unlicensed Sprectrum http://www.umatechnology.org/specifications/index.htm [2] Philips Electronics Announces Complete Unlicensed Mobile Access (UMA) Semiconductor Reference Design Mitsui& Co. Venture Partners http://www.mitsuivp.com/cgi_bin/WebObjects/f1f2557f0f.woa/wa/read/102ef056b5c/ [3] Alex Goldman Wi-Fi /Cellular Convergence: Evaluating UMA Wi-Fi Planet http://www.wi-fiplanet.com/news/article.php/3463271 [4] Glenn Fleishman Unlicensed Mobile Access on Verge of Deploying WNN Wi-Fi Net News http://wi-finetnews.com/archives/004825.html

12

Potrebbero piacerti anche