16
Confidential Information © GSMA 2011  All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy Fraud Forum Webinar LTE Demystified Prepared by Henry Hayter Document Number FR Doc 31 01 Meeting Date 9 Jan 2012 Meeting Venue Conference call & webinar  For Approval For Information X Version 1.0 Securi ty Classif icat ion Confi dent ial to GSMA Full ,  Associate, Rapporteurs & Parent Group Members

Lte Overview Ic 310756

Embed Size (px)

DESCRIPTION

adasdasssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssaddddddddddddddddddsss

Citation preview

Page 1: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 1/16

Confidential Information© GSMA 2011

 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy

Fraud Forum Webinar LTE Demystified

Prepared by Henry Hayter 

Document Number FR Doc 31_01

Meeting Date 9 Jan 2012

Meeting Venue Conference call & webinar  

For Approval

For Information X

Version 1.0

Security Classification Confidential to GSMA Full,

 Associate, Rapporteurs & ParentGroup Members

Page 2: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 2/16

Confidential 2

 Agenda / Contents

Why LTE?

Overview of LTE

Key New Terms

LTE and 3G/GPRS – a comparison

LTE Mobile Operation

Sampled LTE Roaming Scenarios LTE Roaming Considerations for Operators

Questions and Answers

Page 3: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 3/16

Confidential 3

0.240.6

1.2

2.2

3.8

6.3

2010 2011 2012 2013 2014 2015

Terabytes per Month (Millions)

Source: Cisco VNI Mobile, 2011

Soaring Mobile Data

Why LTE?

Page 4: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 4/16

Confidential 4

The Mobile Operator’s Challenge

2000-2005 2005-2010 2010-2015

User Paid

Revenues

Total Cost of

Ownership

Traffic

Non-user

Paid

Revenue

Consumer demand continues to grow

Projections flat or even decline

Need to meet user traffic demand at profitable level

Efficient network

and operations

New Business

Models

Page 5: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 5/16

Confidential 5Evolved Packet Core

Existing and New Business Model Enablement

Machine-to-Machine Over-the-TopIMS Services

SMS RCS

Voice

eNode

B

LTE (4G)

MME

SGW

HSS PGW

PCRF

Page 6: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 6/16

Confidential 6

Overview of LTE improvements

New and improved radio interface (OFDMA)

Newer, flatter, all-IP architecture (EPC)

More control over subscribers’ QoE

Page 7: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 7/16

Confidential 7

Key New Terms for LTE networks

Term Definition

EPC Evolved Packet Core – Evolution of the 2G/3G packet core networks to an all-IP based core

E-UTRAN Evolved Universal Terrestrial Radio Access Network – the 4G LTE wireless network

HSS Home Subscriber Server – database of subscriber profiles (similar to HLR in GSM)

MMEMobility Management Entity – key control-node for LTE that can support monitoring of idle UE,

authentication with HSS, select the S-GW, and bearer activation/de-activation

PCRFPolicy and Charging Rules Function – supports the creation of rules around subscribers’

network usage (“V” PCRF is in the visited network, “H” PCRF is the home network)

PDN Packet Data Network – external IP network such as the public Internet or private IP network

P-GWPDN Gateway - provides connectivity from UE to external packet data networks, performs

policy enforcement and packet screening

S-GW Serving Gateway - provides routing and forwarding between E-UTRAN and PDN

UE User Equipment – handsets, tablets, PCs, etc. that connect to the wireless network

Page 8: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 8/16

Confidential 8

LTE and GPRS networks – a comparison

Packet Core

SGSN GGSN

HLR

Internet

Intranet

Evolved Packet Core

eNode

B

LTE (4G)

MME

SGW

HSS

PGW

PCRF

BTS BSC

GPRS, EDGE (2.x G)

Node

B

RNC

UMTS, HSxPA (3.x G)

Page 9: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 9/16

Confidential 9

 Authent ication

Subscriber Data

Quota Mgmt

Bandwidth Mgmt

Charging

MME HSS PGW PCRFSGW

Mobility Management

Setup PhaseSetup Phase Data Transfer  

LTE Mobile Phases

Page 10: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 10/16

Confidential 10

Introduction to LTE Roaming – network view

LTE Roaming network traffic is separated into categories

 –  Signaling (S6a, S9)

 –  User Data or Bearer (S8)

2 types of Roaming in LTE defined by 3GPP; Home Routed and Local

Breakout

 –  Home Routed - the traffic from the UE is sent to the home EPC (network)

 –  Local Breakout - the traffic from the UE is serviced by the visited EPC (network)

Page 11: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 11/16

Confidential 11

Interfaces for LTE networks

11TNS Confidential

Interface Function

Gx Provides transfer of policy (QoS) and charging rules from PCRF to P-GW

Gxc Serves similar function as Gx when PMIP is used rather than GTP

S1-u Defines the user plane between the E-UTRAN and S-GW

S1-MME Used for signaling between the E-UTRAN and MME

S6a Enables transfer of subscription and authentication data between MME and HSS

S6d Enables transfer of subscription and authentication data between SGSN and HSS

S8Provides user plane and control plane between the S-GW and the P-GW (bearer between

home and visited networks)

S9Transfers (QoS) policy and charging control information between HPCRF and VPCRF (in

support of local breakout)

S11 Used by MME to control path switching and bearer establishment in S-GW

Sgi Used to connect the P-GW to the PDN

Page 12: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 12/16

Confidential 12

Diagram - LTE+LTE Home Routed

IPX

Evolved Packet Core

eNode

B

LTE (4G)

MME

SGW

HSS PGW

PCRF

Evolved Packet Core

MME

SGW

HSS

PGW

PCRFeNode

B

LTE (4G)

Mobili ty Management

IPX

User (Bearer) Data

Policy Information

HPMN

VPMN

Page 13: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 13/16

Confidential 13

Diagram - LTE+LTE Local Breakout

IPX

Evolved Packet Core

eNode

B

LTE (4G)

MME

SGW

HSS PGW

PCRF

Evolved Packet Core

MME

SGW

HSS

PGW

PCRFeNode

B

LTE (4G)

IPX

HPMN

VPMN

Mobili ty Management

User (Bearer) Data

Policy Information

Page 14: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 14/16

Confidential 14

LTE Roaming – NRTRDE Support

LTE is already supported by NRTRDE, using GPRS record types

 –  P-GW is populated in the GGSN address field

 –  S-GW is populated in the SGSN address field

 –  Refer to TD.35 for complete information

NRTRDE for GPRS is not mandatory by default

 –  Your obligations for GPRS depend on your roaming agreements

VoLTE is not supported by NRTRDE

 –  3GPP has approved a CR to make the IMSI available from S-CSF

• (Rel 8+)

 –   All roaming records available at the HPMN

Page 15: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 15/16

Confidential 15

LTE – Different Fraud Considerations

Will airtime frauds become comparatively insignificant?

 –  Probably, except in VoLTE

Focus on potential high impact frauds – e.g. involving financial

services

 –  M-Banking, M-Commerce

Execution of fraud via Hacking and Malware

Motives may change:

 –  Financial gain is commonly the primary motive

 –  But Hacking and Malware may be motivated by “glory hunters”

 –  Be careful not to focus on analysis solely by “value”

Fraud analysis required at bearer level and service level

Page 16: Lte Overview Ic 310756

7/17/2019 Lte Overview Ic 310756

http://slidepdf.com/reader/full/lte-overview-ic-310756 16/16

Confidential 16

Questions?