2. LTE, A CRASH COURSE
Long Term Evolution
Backward compatibility
Simplified architecture
Higher throughput and lower latency
1
3. LTE, A CRASH COURSE
First out
TeliaSonera
InOslo and Stockholm
14 December 2009
2
4. LTE, A CRASH COURSE
Pre LTE
Hirarchicalnetworks
Physicaly separated
Secure locations of devices
Separate voice channel through curcit switching
3
7. LTE, A CRASH COURSE
Features
High throughput
Reduces latency
Improved mobility
Power conserving
Flexible cell size
Interoperability
MBSFN
6
8. LTE, A CRASH COURSE
Voice
No native support
Alternatives
– VoLTE – Voice over LTE
– CSFB – Circuit Switched Fallback
– SVLTE – Simultaneous Voice and LTE
– (Skype, Google Talk, WebRTC)
7
9. LTE, A CRASH COURSE
Abbreviations
E-UTRAN – Evolved UTRAN
UE – User Equipment
eNodeB – evolved NodeB
SAE – System Architecture Evolution
SWG – Serving Gateway
MME – Mobile Management Entity
HSS – Home Subscriber Server
NAS – Non Access Stratum
PGW – PDN Gateway
8
10. LTE, A CRASH COURSE
Why is increased security
needed?
Antennas at public locations
Transport over common networks
Transport over know protocol stack
9
11. LTE, A CRASH COURSE
How is increased security
accomplished?
Certificate
and public key authentication of trusted
network equipment
IPSec from eNodeB
Key hierarchy
10
12. LTE, A CRASH COURSE
Nexus and LTE
Protocol Gateway
– Automatic Enrollment
– Automatic Renewal
– Support for both SCEP (draft23) and CMP (RFC4210)
Verified supported eNodeBs
– Ericsson RBS6000 release L12A (SCEP)
– NSN eNB release REL30 (CMP)
– Huawei eNB release eRAN 3.0 (CMP)
– Juniper SRX (SCEP)
11
Hinweis der Redaktion
When creating the new standard it needs to be able to coexist with existing standards to make transition posible (see ipv6)??With the increase of data traffic in mobile devices and the need for a better user experience (quicker load time).
A 4G modem
Old 3G architecture was hierarchicalAll connections had to go through the RNCWith LTE the architecture is flat and eNodeB´s can connect to each otherGives simpler networksLower latencyAnd higher throughputCoordination of handover is helped by
8 May 2012(red) Countries with commercial LTE service(blue) Countries with commercial LTE network deployment ongoing or planned(light blue) Countries with LTE trial systems(gray) none
Down 300Mbit/s up 75Mbit/sSub 5ms for smallip-packages and lower setup and handover timeMove at speeds up to 500km/hBy using SC-FDMA on uplink power can be savedTens of meters to 100 km radius cellsCo-exist with legacy standards (GSM/EDGE, UMTS and CDMA200)Multicast-Broadcast single frequency network, possibility for mobile TV could compete with DVB-H
LTE is IP based not circuit switched and has only support for data nativelyVoLTE = based on IMS (IP Multimedia Subsystem) a protocol above LTE packet systemCSFB = As it sounds fall back to the old Circuit Switched network as soon as the user wants to do a voice call. (longer call setup delay)SVLTE = use LTE foor data and CS for voice, phone has to selectSkype, Google Talk, WebRTC = The natural evolution, but will not happen soon since operators make much money on calls
E-UTRAN = the air interface of LTE, will replace old UMTS, HSDPA and HSUPA, higher throughput and lower latencyUE = User Equipment, i.e. the phone or modemeNodeB = E-UTRAN NodeB or Evolved Node B, is the component within the E-UTRAN that communicates with UEs, it is the antennaSAE = This is the name for the core network architectureSWG = Routes user data, anchor in handovers, and MME = A control node, UE authentication, internal handover controll between eNB, handle idle UE, select SWG for UE after authenticationHSS = Database for user/subscriber informationNAS = Mobility and the session management between UE and MME, establish and maintain IP connectivity between UE and PGWPGW = connection to the rest of the world
With the increased number of devices that will connect we will need to have antennas in more placesAs the protocol is ip based we can connect to common networks for the transport and a secure channel will be established over IPSecSince it is transported over IP there exists a vide range of tools to analyze and attack the traffic
PKI to setup trustedCommunication from antennas to MME and SWGComplex key hierarchy's to give two way authentication all the way through the network