Showing posts with label GSMA. Show all posts
Showing posts with label GSMA. Show all posts

Wednesday 16 January 2019

5G Slicing Templates

We looked at slicing not long back in this post here, shared by ITU, from Huawei. The other day I read a discussion on how do you define slicing. Here is my definition:

Network slicing allows sharing of the physical network infrastructure resources into independent virtual networks thereby giving an illusion of multiple logically seperate end-to-end networks, each bound by their own SLAs, service quality and peformance guarantees to meet the desired set of requirements. While it is being officially defined for 5G, there is no reason that a proprietary implementation for earlier generations (2G, 3G or 4G)  or Wi-Fi cannot be created.

The picture above from a China Mobile presentation, explain the slice creation process nicely:

  1. Industry customers order network slices from operators and provide the network requirements, including network slice type, capacity, performance, and related coverage. Operators generate network slices according to their needs. Provide the network service requirement as General Service Template (GST).
  2. Transfer GST to NST (Network Slice Template)
  3. Trigger Network Instantiation Process
  4. Allocate the necessary resources and create the slice.
  5. Expose slice management information. Industry customers obtain management information of ordered slices through open interfaces (such as number of access users, etc.).

For each specific requirement, a slicing template is generated that is translated to an actual slice. Let's look at some examples:

Let's take an example of Power Grid. The picture below shows the scenario, requirement and the network slicing template.
As can be seen, the RAN requirement is timing and low latency while the QoS requirement in the core would be 5 ms latency with guaranteed 2 Mbps throughout. There are other requirements as well. The main transport requirement would be hard isolation.

The Network requirement for AR Gaming is high reliability, low latency and high density of devices. This translates to main RAN requirement of low jitter and latency; Transport requirement of Isolation between TICs (telecom integrated cloud) and finally Core QoS requirement of 80 ms latency and 2 Mbps guaranteed bit rate.


More resources on Network Slicing:


Tuesday 4 December 2018

Can KaiOS accelerate the transition from 2G / 3G to 4G?


The GSMA Mobile Economy 2018 report forecasts that 2G will still be around in 2025 and the dominant technology will be 3G in Africa. GSMA Intelligence Global Mobile Trends highlighted similar numbers but North Africa was missing in that report. As you can see in the picture below, 3G devices will make up 62% of the total number of devices in Sub-Saharan Africa and 37% in MENA.

Similar information was provided by Navindran Naidoo, Executive, Network Planning & Design, MTN Group in TIP Summit 2017 and Babak Fouladi, Technology and Information System (Group CTIO) , MTN Group in TIP Summit 2018. In fact Babak had a slide that showed 3G devices would make up 61%  of total devices in 2025 in Africa. Rob Shuter, Group President and CEO, MTN Group said at AfricaCom 2018 that Africa lags 7 years behind the Western countries in mobile technologies. Though this may not be universally true, its nevertheless a fact in many areas of the Continent as can be seen from the stats.

In my blog post "2G / 3G Switch Off: A Tale of Two Worlds", I said operators in many developing countries that maybe forced to switch off a technology would rather switch 3G off as they have a big base of 2G users and 3G devices can always fall back on 2G.

So what are the main reasons so many users are still on 2G devices or feature phones? Here are some that I can think off the top of my head:
  • Hand-me-downs
  • Cheap and affordable
  • Given as a gift (generally because its cheap and affordable)
  • 2G has better coverage than 3G and 4G in many parts of the world
  • Second/Third device, used as backup for voice calls
  • Most importantly - battery can last for a long time
This last point is important for many people across different parts of the world. In many developing countries electricity is at a premium. Many villages don't have electricity and people have to take a trip to a market or another village to get their phones charged. This is an expensive process. (Interesting article on this here and here). In developed countries, many schools do not allow smartphones. In many cases, the kids have a smartphone switched off in their bag or left at home. For parents to keep in touch, these kids usually have a feature phone too. 

While all feature phones that were available until couple of years ago were 2G phones, things have been changing recently. In an earlier tweet I mentioned that Reliance Jio has become a world leader in feature phones:


I also wrote about Jio phone 2 launch, which is still selling very well. So what is common between Jio phones and Nokia 8110 4G, a.k.a. Banana phone

They both use a new mobile operating system called KaiOS. So what is KaiOS?

KaiOS originates from the Firefox OS open-source project which started in 2011 and has continued independently from Mozilla since 2016. Today, KaiOS is a web-based operating system that enables a new category of lite phones and other IoT devices that require limited memory, while still offering a rich user experience through leading apps and services. KaiOS is a US-based company with additional offices in France, Germany, Taiwan, India, Brazil, Hong Kong, and mainland China. You can find a list of KaiOS powered devices here. In fact you can see the specifications of all the initial devices using KaiOS here.

Here is a video that explains why we need KaiOS:



There are couple of really good blog posts by Sebastien Codeville, CEO of KaiOS:

There is so much information in both these articles that I will have to copy and paste the entire articles to do them justice. Instead, I want to embed the presentation that Sebastien delivered at AfricaCom below:



I like the term 'smart feature phone' to distinguish between the smartphones and old dumb feature phones.

Finally, it should be mentioned that some phone manufacturers are using older version of Android to create a feature phone. One such phone is "Reinvent iMi" that is being billed as 'Slimmest Smart 3G Feature Phone' in India. It uses Android 4.1. See details here. Would love to find out more about its battery life in practice.

My only small concern is about security of old Android OS. As Android is extensively used, new vulnerabilities keep getting discovered all the time. Google patches them in newer versions of the software or sometimes releases a separate patch. All updates to the Android OS stops after 3 years. This means that older versions of Android can be hacked quite easily. See here for example.

Anyway, feature phones or 'smart feature phones' are here to stay. Better on 4G than on 2G.

Friday 22 June 2018

5G and IoT Security Update from ETSI Security Week 2018

ETSI Security Week 2018 (link) was held at ETSI's Headquarters in Sophia Antipolis, South of France last week. It covered wide variety of topics including 5G, IoT, Cybersecurity, Middlebox, Distributed Ledger Technology (DLT), etc. As 5G and IoT is of interest to the readers of this blog, I am providing links to the presentations so anyone interested can check them out at leisure.


Before we look at the presentations, what exactly was the point of looking at 5G Security? Here is an explanation from ETSI:

5G phase 1 specifications are now done, and the world is preparing for the arrival of 5G networks. A major design goal of 5G is a high degree of flexibility to better cater for specific needs of actors from outside the telecom sector (e.g. automotive industry, mission-critical organisations). During this workshop, we will review how well 5G networks can provide security for different trust models, security policies, and deployment scenarios – not least for ongoing threats in the IoT world. 5G provides higher flexibility than legacy networks by network slicing and virtualization of functions. The workshop aims to discuss how network slicing could help in fulfilling needs for different users of 5G networks.

5G will allow the use of different authentication methods. This raises many interesting questions. How are these authentication methods supported in devices via the new secure element defined in ETSI SCP, or vendor-specific concepts? How can mission-critical and low-cost IoT use cases coexist side-by-side on the same network?

The 5G promise of higher flexibility is also delivered via its Service-Based Architecture (SBA). SBA provides open 3rd party interfaces to support new business models which allow direct impact on network functions. Another consequence of SBA is a paradigm shift for inter-operator networks: modern APIs will replace legacy signaling protocols between networks. What are the relevant security measures to protect the SBA and all parties involved? What is the role of international carrier networks like IPX in 5G?

Event Objectives
The workshop intends to:

  • Gather different actors involved in the development of 5G, not only telecom, and discuss together how all their views have shaped phase 1 of 5G, to understand how security requirements were met, and what challenges remain;
  • Discuss slicing as a means to implement separate security policies and compartments for independent tenants on the same infrastructure;
  • Give an update of what is happening in 3GPP 5G security;
  • Explain to IoT players what 5G security can (and cannot) do for them, including risks and opportunities related to alternative access credentials;
  • Understand stakeholders' (PMNs, carriers, GSMA, vendors) needs to make SBA both secure and successful. How can SBA tackle existing issues in interconnect networks like fraud, tracking, privacy breaches;
  • Allow vendors to present interesting proposals for open security questions in 5G: secure credential store, firewalling SBA's RESTful APIs;
  • Debate about hot topics such as: IoT security, Slicing security, Privacy, Secure storage and processing and Security of the interconnection network.


So here are the relevant presentations:

Session 1: Input to 5G: Views from Different Stakeholders
Session Chair: Bengt Sahlin, Ericsson

Hardening a Mission Critical Service Using 5G, Peter Haigh, NCSC

Security in the Automotive Electronics Area, Alexios Lekidis, SecurityMatters

Integrating the SIM (iUICC), Adrian Escott, QUALCOMM

Smart Secure Platform, Klaus Vedder, Giesecke & Devrient, ETSI SCP Chairman

Network Slicing, Anne-Marie Praden, Gemalto

Don't build on Sand: Validating the Security Requirements of NFV Infrastructure to Confidently Run Slices, Nicolas Thomas, Fortinet

5G Enhancements to Non-3GPP Access Security, Andreas Kunz, Lenovo

Security and Privacy of IoT in 5G, Marcus Wong, Huawei Technologies

ITU-T activities and Action Plan on 5G Security, Yang Xiaoya, ITU-T SG17

Wrap up: 5G Overview from 3GPP SA3 Perspective and What is There to Be Done for Phase 2, Sander Kievit, TNO


Session 2: Security in 5G Inter-Network Signalling
Session Chair: Stefan Schroeder, T-Systems

Presentation on SBA: Introduction of the Topic and Current Status in SA3, Stefan Schroeder, T-Systems

5G Inter-PLMN Security: The Trade-off Between Security and the Existing IPX Business Model, Ewout Pronk, KPN on behalf of GSMA Diameter End to End Security Subgroup

Secure Interworking Between Networks in 5G Service Based Architecture, Silke Holtmanns, Nokia Bell Labs

Security Best Practises using RESTful APIs, Sven Walther, CA Technologies

Identifying and Managing the Issues around 5G Interconnect Security, Stephen Buck, Evolved Intelligence

Zero Trust Security Posture in 5G Architecture, Galina Pildush, Palo Alto Networks (Missing)


Session 1 & 2 Workshop Wrap up: 5G Phase 1 Conclusions and Outlook Towards Phase 2 - Stefan Schroeder, T-Systems and Bengt Sahlin, Ericsson


Session 5: Benefits and Challenges of 5G and IoT From a Security Perspective
Session Chair: Arthur van der Wees, Arthur's Legal

Setting the Scene, Franck Boissière, European Commission

ENISA's View on Security Implications of IoT and 5G, Apostolos Malatras, ENISA

Smart City Aspects, Bram Reinders, Institute for Future of Living

The Network Operators Perspective on IoT Security, Ian Smith, GSMA


Related Links:

Wednesday 7 March 2018

Quick summary of Mobile World Congress 2018 (#MWC18)


This year at MWC, I took the time out to go and see as many companies as I can. My main focus was looking at connectivity solutions, infrastructure, devices, gadgets and anything else cool. I have to say that I wasn't too impressed. I found some of the things later on Twitter or YouTube but as it happens, one cannot see everything.

I will be writing a blog on Small Cells, Infrastructure, etc. later on but here are some cool videos that I have found. As its a playlist, if I find any more, it will be added to the same playlist below.



The big vendors did not open up their stands for everyone (even I couldn't get in 😉) but the good news is that most of their demos is available online. Below are the name of the companies that had official MWC 2018 websites. Will add more when I find them.

Operators

Network Equipment Vendors

Handset Manufacturers

Chipset Manufacturers

Did I miss anyone? Feel free to suggest links in comments.


MWC Summary from other Analysts:


Tuesday 13 February 2018

Artificial Intelligence - Beyond SON for Autonomous Networks


What is the next step in evolution of SON? Artificial Intelligence obviously. The use of artificial intelligence (AI) techniques in the network supervisory system could help solve some of the problems of future network deployment and operation. ETSI has therefore set up a new 'Industry Specification Group' on 'Experiential Networked Intelligence' (ISG ENI) to develop standards for a Network Supervisory assistant system.


The ISG ENI focuses on improving the operator experience, adding closed-loop artificial intelligence mechanisms based on context-aware, metadata-driven policies to more quickly recognize and incorporate new and changed knowledge, and hence, make actionable decisions. ENI will specify a set of use cases, and the generic technology independent architecture, for a network supervisory assistant system based on the ‘observe-orient-decide-act’ control loop model. This model can assist decision-making systems, such as network control and management systems, to adjust services and resources offered based on changes in user needs, environmental conditions and business goals.


The introduction of technologies such as Software-Defined Networking (SDN), Network Functions Virtualisation (NFV) and network slicing means that networks are becoming more flexible and powerful. These technologies transfer much of the complexity in a network from hardware to software, from the network itself to its management and operation. ENI will make the deployment of SDN and NFV more intelligent and efficient and will assist the management and orchestration of the network.


We expect to complete the first phase of ENI work in 2019. It will include a description of use cases and requirements and terminology, including a definition of features, capabilities and policies, which we will publish in a series of informative best practice documents (Group Reports (GRs)).
This will of course require co-operation from many different industry bodies including GSMA, ITU-T, MEF, IETF, etc.

Will see how this goes.

Further reading:



Sunday 3 December 2017

SMS is 25 years old today

SMS is 25 years old. The first SMS, "Merry Christmas" was sent on 3rd December 1992 from PC to the Orbitel 901 handset (picture above), which was only able to receive SMS but not send it. Sky news has an interview with Neil Papworth - the man who sent the very first one back in 1992 here.

While SMS use has been declining over some time, thanks to messaging apps on smartphones like WhatsApp, Viber, Facebook messenger, etc., it is still thought to be used for sending 20 billion messages per day.

While I dont have the latest figures, according to analyst Benedict Evans, WhatsApp and WeChat combined are now at over 100bn messages per day.

According to Daily Mirror, by the end of 2017, researchers expect 32 trillion messages to be sent annually over apps compared to only 7.89 trillion text messages.


Tomi Ahonen makes an interesting in the tweet above, all cellular phone users have SMS capability by default while only smartphone users who have downloaded the messaging apps can be reached by a particular messaging app. The reach of SMS will always be more than any competing apps.


That is the reason why GSMA is still betting on RCS, an evolution of SMS to compete with the messaging apps. My old post on RCS will provide some basic info here. A very recent RCS case studies document from GSMA here also provides some good info.

RCS will have a lot of hurdles and challenges to overcome to succeed. There is a small chance it can succeed but this will require change of mindset by operators, especially billing models for it to succeed.

Dean Bubley from Disruptive Analysis is a far bigger skeptic of RCS and has written various posts on why it will fail. One such post that makes interesting reading is here.

Anyway, love it or hate it, SMS is here to stay!

See Also:

Thursday 10 August 2017

Mobile can help with United Nations SDGs, only if prices go down

I came across this interesting article in WSJ, courtesy of the Benedict Evans newsletter, which discusses how Indians are using their smartphones even more and consuming far more data than they previously did. Due to low incomes, spending money on mobile top-up is to the detriment of other sectors. To quote the article:
“There was a time when kids would come here and blow their pocket money on chips and chocolate,” said Anup Kapoor, who runs a mom-and-pop grocery shop in New Delhi. These days, “they spend every last rupee on a data recharge instead.”

United Nations have created 17 very ambitious Sustainable Development Goals (SDGs) that universally apply to all, countries will mobilize efforts to end all forms of poverty, fight inequalities and tackle climate change, while ensuring that no one is left behind.
The SDGs, also known as Global Goals, build on the success of the Millennium Development Goals (MDGs) and aim to go further to end all forms of poverty. The new Goals are unique in that they call for action by all countries, poor, rich and middle-income to promote prosperity while protecting the planet. They recognize that ending poverty must go hand-in-hand with strategies that build economic growth and addresses a range of social needs including education, health, social protection, and job opportunities, while tackling climate change and environmental protection.
I have talked about Rural connectivity on this blog and a lot more on small cells blog. In fact the heart touching end user story from Rural England was shared multiple times on different platforms. GSMA has done a good amount of work with the rural communities with their mobile for development team and have some interesting videos showing positive impacts of bringing connectivity to rural communities in Tanzania (see here and here).

While you will always hear about the challenges in bringing connectivity to these rural communities, all technological challenges can be solved. There are many highly ambitious projects using balloons, drones, creating droneways, Helikites, Satellite backhaul, drone based backhaul, mmWave backhaul, etc. The real problem to solve here are the costs (spectrum, infrastructure, etc.) and the end-user pricing.

Coming back to the first story of this post about India, when given an option about selecting mobile data or shampoo, people will probably choose mobile data. What about mobile data vs food? While there are some innovative young companies that can help bring the costs down, there is still a big hurdle to leap in terms of convincing the operators mindsets, bureaucracy, etc.

To help explain my point lets look at an excerpt from this article in Wired:
It’s the kind of problem that Vanu Bose, the founder of the small cell network provider CoverageCo, has been trying to solve with a new, ultra-energy-efficient mobile technology. Bose chose two places to pilot this tech: Vermont and Rwanda. “We picked these two locations because we knew they would be challenging in terrain and population density,” he says. “What we didn’t expect was that many of the problems were the same in Rwanda and Vermont—and in fact the rollout has been much easier in Africa.
The good news is that things are changing. Parallel Wireless (see disclosure at the bottom) is one such company trying to simplify network deployment and at the same time bring the costs down. In a recent deployment with Ice Wireless in Canada, this was one of the benefit to the operator. To quote from MobileSyrup:
A radio access network is one of the key components in the architecture of any wireless network. RANs sit between consumer-facing devices like smartphones and computers and the core network, helping connect those devices to the larger network.  
Essentially where the likes of Nokia and Huawei ask clients to buy an expensive hardware component for their RAN needs, Parallel Wireless offers allows companies like Ice Wireless to use off-the-shelf computer and server components to emulate a RAN. The company also sells wireless base stations like the two pictured above that are smaller than the average cell tower one sees in cities and less remote parts of the country.  
Besides reducing the overall price of a network deployment, Parallel’s components present several other advantages for a company like Ice Wireless.  
For instance, small base stations make it easier for the company to build redundancies into its network, something that’s especially important when a single arctic snowstorm can knock out wireless service for thousands of people.
These kind of benefits allow operators to pass on the cost reduction thereby allowing the price reduction for end users. In case of Ice Wireless, they have already got rid of roaming charges and have started offering unlimited data plans for the communities in Canada's North.

Finally, to quote David Nabarro, Special Adviser of the United Nations Secretary-General on the 2030 Agenda for Sustainable Development from the GSMA 2016 Mobile Industry Impact Report: Sustainable Development Goals:
Achieving the SDGs demands new technologies, innovations, and data collection that can integrate and complement traditional statistics. A driving force behind this data revolution is mobile technology. 
Mobile phone technology has already transformed societies around the globe, even the poorest countries and communities. It is helping to empower women, create jobs, spur financial independence, improve education, boost agriculture production, and promote better health. Mobile phones have enabled communities to monitor elections, hold governments accountable, and save lives in natural disasters. 
As we focus on implementing the Sustainable Development Goals, the mobile industry has a critical role in working with governments and the international community to expand connectivity, to lower barriers to access, and to ensure that tools and applications are developed with vulnerable communities in mind. 

With 5G just round the corner, I hope that the operators and vendors will be able to get their costs down, resulting in lower end-user prices. That would be a win-win for everyone.

*Full Disclosure: I work for Parallel Wireless as a Senior Director, Strategic Marketing. This blog is maintained in my personal capacity and expresses my own views, not the views of my employer or anyone else. Anyone who knows me well would know this.

Sunday 7 May 2017

10 years battery life calculation for Cellular IoT

I made an attempt to place the different cellular and non-cellular LPWA technologies together in a picture in my last post here. Someone pointed out that these pictures above, from LoRa alliance whitepaper are even better and I agree.

Most IoT technologies lists their battery life as 10 years. There is an article in Medium rightly pointing out that in Verizon's LTE-M network, IoT devices battery may not last very long.

The problem is that 10 years battery life is headline figure and in real world its sometimes not that critical. It all depends on the application. For example this Iota Pet Tracker uses Bluetooth but only claims battery life of  "weeks". I guess ztrack based on LoRa would give similar results. I have to admit that non-cellular based technologies should have longer battery life but it all depends on applications and use cases. An IoT device in the car may not have to worry too much about power consumption. Similarly a fleet tracker that may have solar power or one that is expected to last more than the fleet duration, etc.


So coming back to the power consumption. Martin Sauter in his excellent Wireless Moves blog post, provided the calculation that I am copying below with some additions:

The calculation can be found in 3GPP TR 45.820, for NB-IoT in Chapter 7.3.6.4 on ‘Energy consumption evaluation’.

The battery capacity used for the evaluation was 5 Wh. That’s about half or even only a third of the battery capacity that is in a smartphone today. So yes, that is quite a small battery indeed. The chapter also contains an assumption on how much power the device draws in different states. In the ‘idle’ state the device is in most often, power consumption is assumed to be 0.015 mW.

How long would the battery be able to power the device if it were always in the idle state? The calculation is easy and you end up with 38 years. That doesn’t include battery self-discharge and I wondered how much that would be over 10 years. According to the Varta handbook of primary lithium cells, self-discharge of a non-rechargable lithium battery is less than 1% per year. So subtract roughly 4 years from that number.

Obviously, the device is not always in idle and when transmitting the device is assumed to use 500 mW of power. Yes, with this power consumption, the battery would not last 34 years but less than 10 hours. But we are talking about NB-IoT so the device doesn’t transmit for most of the time. The study looked at different transmission patterns. If 200 bytes are sent once every 2 hours, the device would run on that 5 Wh battery for 1.7 years. If the device only transmits 50 bytes once a day the battery would last 18.1 years.

So yes, the 10 years are quite feasible for devices that collect very little data and only transmit them once or twice a day.

The conclusions from the report clearly state:

The achievable battery life for a MS using the NB-CIoT solution for Cellular IoT has been estimated as a function of reporting frequency and coupling loss. 

It is important to note that these battery life estimates are achieved with a system design that has been intentionally constrained in two key respects:

  • The NB-CIoT solution has a frequency re-use assumption that is compatible with a stand-alone deployment in a minimum system bandwidth for the entire IoT network of just 200 kHz (FDD), plus guard bands if needed.
  • The NB-CIoT solution uses a MS transmit power of only +23 dBm (200 mW), resulting in a peak current requirement that is compatible with a wider range of battery technologies, whilst still achieving the 20 dB coverage extension objective.  

The key conclusions are as follows:

  • For all coupling losses (so up to 20 dB coverage extension compared with legacy GPRS), a 10 year battery life is achievable with a reporting interval of one day for both 50 bytes and 200 bytes application payloads.
  • For a coupling loss of 144 dB (so equal to the MCL for legacy GPRS), a 10 year battery life is achievable with a two hour reporting interval for both 50 bytes and 200 bytes application payloads. 
  • For a coupling loss of 154 dB, a 10 year battery life is achievable with a 2 hour reporting interval for a 50 byte application payload. 
  • For a coupling loss of 154 dB with 200 byte application payload, or a coupling loss of 164 dB with 50 or 200 byte application payload, a 10 year battery life is not achievable for a 2 hour reporting interval. This is a consequence of the transmit energy per data bit (integrated over the number of repetitions) that is required to overcome the coupling loss and so provide an adequate SNR at the receiver. 
  • Use of an integrated PA only has a small negative impact on battery life, based on the assumption of a 5% reduction in PA efficiency compared with an external PA.

Further improvements in battery life, especially for the case of high coupling loss, could be obtained if the common assumption that the downlink PSD will not exceed that of legacy GPRS was either relaxed to allow PSD boosting, or defined more precisely to allow adaptive power allocation with frequency hopping.

I will look at the technology aspects in a future post how 3GPP made enhancements in Rel-13 to reduce power consumption in CIoT.

Also have a look this GSMA whitepaper on 3GPP LPWA lists the applications requirements that are quite handy.

Saturday 10 October 2015

VoLTE Roaming: LBO, S8HR or HBO

There was an interesting discussion on different roaming scenarios in the LTE Voice Summit on 29th, 30th Sep. in London. The above picture provides a brief summary of these well known options. I have blogged about LBO/RAVEL here and S8HR here. A presentation by NTT Docomo in a GSMA webinar here provides more details on these architectures (slide 29 onwards - though it is more biased towards S8HR).

Ajay Joseph, CTO, iBasis gave an interesting presentation that highlighted the problems present in both these approaches.

In case of LBO, the biggest issue is that the home operator need to do a testing with each roaming partner to make sure VoLTE roaming works smoothly. This will be time consuming and expensive.

In case of S8HR, he provided a very good example. Imagine a VoLTE subscriber from USA is visiting Singapore. He now needs to make a phone call to someone in Indonesia (which is just next to Singapore). The flow of data would be all the way from Singapore to USA to Indonesia and back. This can introduce delays and impact QoE. The obvious advantage of S8HR is that since the call setup and media go to Home PMN (Public Mobile Network), no additional testing with the Visited PMN is required. The testing time is small and rollouts are quicker.

iBasis are proposing a solution called Hub Breakout (HBO) which would offer the best of LBO and S8HR. Each VoLTE operator would need to test their interoperability only with iBasis. Emergency calls and lawful intercept that does not work with S8HR would work with the HBO solution.

While I agree that this is a good solution, I am sure that many operators would not use this solution and there may be other solutions proposed in due course as well. Reminds me of this XKCD cartoon:


Anyway, here is the iBasis presentation:



Sunday 12 July 2015

S8HR: Standardization of New VoLTE Roaming Architecture

VoLTE is a very popular topic on this blog. A basic VoLTE document from Anritsu has over 40K views and my summary from last years LTE Voice summit has over 30K views. I assume this is not just due to the complexity of this feature.

When I attended the LTE Voice summit last year, of the many solutions being proposed for roaming, 'Roaming Architecture for Voice over LTE with Local Breakout (RAVEL)' was being touted as the preferred solution, even though many vendors had reservations.

Since then, GSMA has endorsed a new VoLTE roaming architecture, S8HR, as a candidate for VoLTE roaming. Unlike previous architectures, S8HR does not require the deployment of an IMS platform in VPLMN. This is advantageous because it shortens time-to-market and provides services universally without having to depend on the capability of VPLMN.



Telecom Italia has a nice quick summary, reproduced below:

S8HR simplicity, however, is not only its strength but also its weakness, as it is the source of some serious technical issues that will have to be solved. The analysis of these issues is on the Rel13 3GPP agenda for the next months, but may overflow to Rel14. Let’s see what these issues are, more in detail:


Regulatory requirements - S8HR roaming architecture needs to meet all the current regulatory requirements applicable to voice roaming, specifically:
  • Support of emergency calls - The issues in this context are several. For example, authenticated emergency calls rely on the existence if an IMS NNI between VPLMN and HPLMN (which S8HR does not provide); conversely, the unauthenticated emergency calls, although technically feasible in S8HR, are allowed only in some Countries subject to the local regulation of VPLMN. Also, for a non-UE-detectable IMS Emergency call, the P-CSCF in the HPLMN needs to be capable of deciding the subsequent action (e.g. translate the dialed number and progress the call or reject it with the indication to set up an emergency call instead), taking the VPLMN ID into account. A configuration of local emergency numbers per Mobile Country Code on P-CSCF may thus be needed.
  • ­Support of Lawful Interception (LI) & data retention for inbound roamers in VPLMN -  S8HR offers no solution to the case where interception is required in the VPLMN for inbound roamers. 3GPP is required to define a solution that fulfill such vital regulatory requirement, as done today in circuit switched networks. Of course VPLMN and HPLMN can agree in their bilateral roaming agreement to disable confidentiality protection to support inbound roamer LI but is this practice really viable from a regulatory point of view?
Voice call continuity – The issue is that when the inbound roamers lose the LTE coverage to enter into  a 2G/3G CS area, the Single Radio Voice Call Continuity (SRVCC) should be performed involving the HPLMN in a totally different way than current specification (i.e. without any IMS NNI being deployed).
Coexistence of LBO and S8HR roaming architectures will have to be studied since an operator may need to support both LBO and S8HR VoLTE roaming architecture options for roaming with different operators, on the basis of bilateral agreement and depending on the capability.
Other issues relate to the capability of the home based S-CSCF and TAS (Telephony Application Server) to be made aware about the VPLMN identity for charging purposes and to enable the TAS to subsequently perform communication barring supplementary services. Also, where the roaming user calls a geo-local number (e.g. short code, or premium numbers), the IMS entities in HPLMN must do number resolution to correctly route the call.
From preliminary discussions held at Working Group level in SA2 (architecture) and SA3 (security) in April, it was felt useful to create a new 3GPP Technical Report to perform comprehensive technical analysis on the subject. Thus it is expected that the discussions will continue in the next months until the end of 2015 and will overheat Release 13 agenda due to their commercial and “political” nature. Stay tuned to monitor the progress of the subject or contact the authors for further information!
NTT Docomo also did some trials back in February and got some brilliant results:

In the trials, DOCOMO and KT achieved the world's first high-definition voice and video call with full end-to-end quality of service. Also, DOCOMO and Verizon achieved the world's first transoceanic high-definition VoLTE roaming calls. DOCOMO has existing commercial 3G and 4G roaming relations with Verizon Wireless and KT.
The calls were made on an IP eXchange (IPX) and network equipment to replicate commercial networks. With only two months of preparation, which also proved the technology's feasibility of speedy commercialization, the quality of VoLTE roaming calls using S8HR architecture over both short and long distances was proven to be better than that of existing 3G voice roaming services.


In fact, NTT Docomo has already said based on the survery from GSMA's Network 2020 programme that 80% of the network operators want this to be supported by the standards and 46% of the operators already have a plan to support this.


The architecture has the following technical characteristics:
(1) Bearers for IMS services are established on the S8 reference point, just as LTE data roaming.
(2) All IMS nodes are located at Home Public Land Mobile Network (HPLMN), and all signaling and media traffic for the VoLTE roaming service go through HPLMN.
(3) IMS transactions are performed directly between the terminal and P-CSCF at HPLMN. Accordingly, Visited Public Land Mobile Network (VPLMN) and interconnect networks (IPX/GRX) are not service-aware at the IMS level. The services can only be differentiated by APN or QoS levels.

These three technical features make it possible to provide all IMS services by HPLMN only and to minimize functional addition to VPLMN. As a result, S8HR shortens the time-to-market for VoLTE roaming services.

Figure 2 shows the attach procedure for S8HR VoLTE roaming. From Steps 1 to 3, there is no significant difference from the LTE data roaming attach procedure. In Step 4, HSS sends an update location answer message to MME. In order for the MME to select the PGW in HPLMN (Step 5), the MME must set the information element VPLMN Dynamic Address “Allowed,” which is included in the subscribed data, to “Not Allowed.” In Step 6, the bearer for SIP signaling is created between SGW and PGW with QCI=5. MME sends an attach accept message to the terminal with an IMS Voice over PS Session Support Indication information element, which indicates that VoLTE is supported. The information element is set on the basis of the MME’s internal configuration specifying whether there is a VoLTE roaming agreement to use S8HR. If no agreement exists between two PLMNs, the information element will not be set.

The complete article from the NTT Docomo technical journal is embedded



Tuesday 3 February 2015

5G: A 2020 Vision


I had the pleasure of speaking at the CW (Cambridge Wireless) event ‘5G: A Practical Approach’. It was a very interesting event with great speakers. Over the next few weeks, I will hopefully add the presentations from some of the other speakers too.

In fact before the presentation (below), I had a few discussions over the twitter to validate if people agree with my assumptions. For those who use twitter, maybe you may want to have a look at some of these below:







Anyway, here is the presentation.

 

Tuesday 23 December 2014

M2M embedded UICC (eSIM) Architecture and Use Cases

Machine-to-Machine UICC, also known as M2M Form Factor (MFF) and is often referred to as embedded SIM (eSIM) is a necessity for the low data rate M2M devices that are generally small, single contained unit that is also sealed. The intention is that once this M2M device is deployed, then there is no need to remove the UICC from it. There may be a necessity to change the operator for some or the other reason. This gives rise to the need of multi-operator UICC (SIM) cards.


The GSMA has Embedded SIM specifications available for anyone interested in implementing this. There are various documents available on the GSMA page for those interested in this topic further.

While the complete article is embedded below, here is an extract of the basic working from the document:

A eUICC is a SIM card with a Remote Provisioning function, and is designed not to be removed or changed. It is able to store multiple communication profiles, one of which is enabled (recognized by the device and used for communication). The network of the MNO in the enabled profile is used for communication. Profiles other than the enabled profile are disabled (not recognized by the device). With conventional SIM cards, the ICCID is used as the unique key to identify the SIM card, but with eUICC, the ICCID is the key used to identify profiles, and a new ID is defined, called the eUICCID, which is used as the unique key for the eSIM

GSMA defines two main types of profile.
1) Provisioning Profile: This is the communication profile initially stored in the eUICC when it is shipped. It is a limited-application communication profile used only for downloading and switching Operational Profiles, described next.
2) Operational Profile: This is a communication profile for connecting to enterprise servers or the Internet. It can also perform the roles provided by a Provisioning profile

An eSIM does not perform profile switching as a simple IC card function, but rather switches profiles based on instructions from equipment called a Subscription Manager. A Subscription Manager is maintained and managed by an MNO. The overall eSIM architecture, centering on the Subscription Manager, is shown in Figure 3, using the example of switching profiles within the eUICC.

An eUICC must have at least one profile stored in it to enable OTA functionality, and one of the stored profiles must be enabled. The enabled profile uses the network of MNO A for communication. When the user switches profiles, a switch instruction is sent to the Subscription Manager. At that time, if the profile to switch to is not stored in the eUICC, the profile is first downloaded. When it receives a switch instruction, the eUICC performs a switch of the enabled profile as an internal process.

After the switch is completed, it uses the network of MNO B to send notification that the switch has completed to the Subscription Manager, completing the process. The same procedure is used to switch back to the original MNO A, or to some other MNO C.

Anyway, here is the complete paper on NTT Docomo website.

Wednesday 5 November 2014

2015 will finally be the year of Voice over LTE (VoLTE)


On 4th Nov. 2009, the One Voice initiative was published by 12 companies including AT&T, Orange, Telefonica, TeliaSonera, Verizon, Vodafone, Alcatel-Lucent, Ericsson, Nokia Siemens Networks, Nokia, Samsung and Sony Ericsson. These all agreed that the IMS based solution, as defined by 3GPP, is the most applicable approach to meet their consumers expectations for service quality, reliability and availability when moving from existing CS based voice services to IP based LTE services.

On 15th Feb 2010, GSMA announced that it has adopted the work of the One Voice initiative to drive the global mobile industry towards a standard way of delivering voice and messaging services for LTE. The GSMA’s VoLTE initiative was supported by more than 40 organisations from across the mobile ecosystem, including many of the world’s leading mobile communication service providers, handset manufacturers and equipment vendors, all of whom support the principle of a single, IMS-based voice solution for next-generation mobile broadband networks. This announcement was also supported by 3GPP, Next Generation Mobile Networks alliance (NGMN) and the International Multimedia Teleconferencing Consortium (IMTC).

GSMA has produces various reference documents that map to the 3GPP standards documents as can be seen above.



As per GSA71 operators are investing in VoLTE studies, trials or deployments, including 11 that have commercially launched HD voice service. The number of HD voice launches enabled by VoLTE is forecast to reach 19 by end-2014 and then double in 2015. In July 2014 GSA confirmed 92 smartphones (including carrier and frequency variants) support VoLTE, including products by Asus, Huawei, LG, Pantech, Samsung and Sony Mobile. The newly-announced Apple iPhone 6 & 6 Plus models support VoLTE.

Things are also moving quickly with many operators who have announced VoLTE launches and are getting more confident day by day. Du, Dubai recently announced Nokia as VoLTE partner. KDDI, Japan is launching au VoLTE in December. Telstra, Australia has already been doing trials and plans to launch VoLTE network in 2015. Finally, Verizon and AT&T will have interoperable VoLTE calls in 2015.

Below is my summary from the LTE Voice Summit 2014. Let me know if you like it.


Friday 18 April 2014

International LTE Data and VoLTE Roaming - NTT Docomo


Quick recap of the Bearer Architecture: Remember the interface between S-GW and P-GW is known as S5/S8. S5 in case the S-GW and P-GW are part of the same network (non-roaming case) and S8 in case where P-GW belongs to another network than S-GW (roaming case). The S5/S8 interfaces are generally exactly the same. There is a possibility of different types of S5/S8 interfaces like GTP based and PMIP based but lets not discuss that here.

NTT Docomo published an excellent article in their magazine recently showing the different approaches to International Data roaming.


The different scenarios above are based on the guidelines provided in GSMA PRD IR.88. Each operator has to adopt one of the scenarios above, NTT Docomo has selected scenario 4. The Home PLMN (HPLMN) and the Visited PLMN (VPLMN) connect via IP eXchange (IPX).


As can be seen above, the MME in VPLMN communicates with HSS in HPLMN using Diameter Edge Agent (DEA).



Finally, it is well known that NTT Docomo is not launching VoLTE untill 2015. The above is their proposal on how they handle VoLTE while in Japan and when roaming.

The paper is an interesting read, embedded below:



Another article worth a read is the VoLTE roaming with RAVEL here.