Seamless continuity of PS-services in WLAN/3G interworking

Seamless continuity of PS-services in WLAN/3G interworking Seamless continuity of PS-services in WLAN/3G interworking

16.04.2015 Views

Computer Communications 29 (2006) 1055–1064 www.elsevier.com/locate/comcom Seamless continuity of PS-services in WLAN/3G interworking Paulo Pinto a, *, Luis Bernardo a , Pedro Sobral b a Universidade Nova de Lisboa, Lisboa, Portugal b Universidade Fernando Pessoa, Porto, Portugal Received 13 December 2004; revised 18 May 2005; accepted 3 June 2005 Available online 28 June 2005 Abstract The seamless continuity of services between 3G networks and WLANs will give users the feeling of a common environment towards the wireless technology. Three main aspects must be considered to obtain seamless continuity: an enabling interworking architecture, fast intersystem handovers (they must be fast enough in terms of human senses), and, in the case of real-time services, a similar quality of service (QoS) in both networks. This paper focuses on the two first issues. It presents an interworking architecture based on a 3G core-level integration of the WLANs. The GPRS network is available all the time forming a primary network, and WLANs are used as a complement when they are available. The switching times between networks are very low and the transitions are lossless. Our proposal does not disrupt with the current 3GPP standardization efforts making it viable in a medium time frame. This paper presents an overview of the architecture, describes the relevant events in the switching process (where the authentication and authorization procedures have an important role), and gives simulated values for the switching times. q 2005 Elsevier B.V. All rights reserved. Keywords: 4G networks; Interconnection 3G/WLAN; Seamless continuity of services 1. Introduction The integration of wireless LANs (WLANs) and thirdgeneration (3G) mobile networks, such as Global System for Mobile Communication/General Packet Radio Service (GSM/GPRS) and Universal Mobile Telecommunications Systems (UMTS) is opening up a broad range of possibilities due to the successful deployment of both technologies. This range begins with low-level issues of radio access integration until fulfilling one of the characteristics identified by the Wireless World Research Fund, namely the definition of a component-based architecture that will enable users, application developers, service and content providers, and manufacturers to efficiently and flexibly create new services [1]. The main subject of this paper is dedicated to the first issue but having the second in mind. The interconnection of 3G systems with WLAN in general is being defined by 3GPP in a series of 6 scenarios * Corresponding author. Tel.: C21 294 9642; fax: 21 294 8532. E-mail address: pfp@uninova.pt (P. Pinto). 0140-3664/$ - see front matter q 2005 Elsevier B.V. All rights reserved. doi:10.1016/j.comcom.2005.06.002 [2]. The various scenarios describe an increasing level of integration between the two systems: (1) common billing, with the objective of having a single customer relationship; (2) 3G based access control, where the 3G provides the AAA procedures to WLAN users with an equal security level (although a single sign-in approach is not yet an objective); (3) access to 3G packet-switched (PS) services, to allow an operator to extend these services to the WLAN (this is the current state of the art in the standards); (4) access to 3G PS services with service continuity, with the objective that the services of scenario 3 would survive a change of access between the two systems; (5) the same as scenario (4) with seamless continuity, the services not only survive but there is seamless continuity. By seamless continuity it is meant minimizing aspects such as data loss and break time; and (6) access to 3G circuitswitched (CS) services with mobility, which means access to services provided by the entities of the Circuit Switched Core Network over WLAN with seamless continuity. Currently, [3] describes the architecture for scenarios 2 and 3. Its approach to scenario 3 is to interconnect both systems at IP-level following an interconnection architecture known as loosely coupled approach [4]. Although [3]

Computer Communications 29 (2006) 1055–1064<br />

www.elsevier.com/locate/comcom<br />

<strong>Seamless</strong> <strong>cont<strong>in</strong>uity</strong> <strong>of</strong> <strong>PS</strong>-<strong>services</strong> <strong>in</strong> <strong>WLAN</strong>/<strong>3G</strong> <strong>in</strong>terwork<strong>in</strong>g<br />

Paulo P<strong>in</strong>to a, *, Luis Bernardo a , Pedro Sobral b<br />

a Universidade Nova de Lisboa, Lisboa, Portugal<br />

b Universidade Fernando Pessoa, Porto, Portugal<br />

Received 13 December 2004; revised 18 May 2005; accepted 3 June 2005<br />

Available onl<strong>in</strong>e 28 June 2005<br />

Abstract<br />

The seamless <strong>cont<strong>in</strong>uity</strong> <strong>of</strong> <strong>services</strong> between <strong>3G</strong> networks and <strong>WLAN</strong>s will give users the feel<strong>in</strong>g <strong>of</strong> a common environment towards the<br />

wireless technology. Three ma<strong>in</strong> aspects must be considered to obta<strong>in</strong> seamless <strong>cont<strong>in</strong>uity</strong>: an enabl<strong>in</strong>g <strong>in</strong>terwork<strong>in</strong>g architecture, fast <strong>in</strong>tersystem<br />

handovers (they must be fast enough <strong>in</strong> terms <strong>of</strong> human senses), and, <strong>in</strong> the case <strong>of</strong> real-time <strong>services</strong>, a similar quality <strong>of</strong> service<br />

(QoS) <strong>in</strong> both networks. This paper focuses on the two first issues. It presents an <strong>in</strong>terwork<strong>in</strong>g architecture based on a <strong>3G</strong> core-level<br />

<strong>in</strong>tegration <strong>of</strong> the <strong>WLAN</strong>s. The GPRS network is available all the time form<strong>in</strong>g a primary network, and <strong>WLAN</strong>s are used as a complement<br />

when they are available. The switch<strong>in</strong>g times between networks are very low and the transitions are lossless. Our proposal does not disrupt<br />

with the current <strong>3G</strong>PP standardization efforts mak<strong>in</strong>g it viable <strong>in</strong> a medium time frame. This paper presents an overview <strong>of</strong> the architecture,<br />

describes the relevant events <strong>in</strong> the switch<strong>in</strong>g process (where the authentication and authorization procedures have an important role), and<br />

gives simulated values for the switch<strong>in</strong>g times.<br />

q 2005 Elsevier B.V. All rights reserved.<br />

Keywords: 4G networks; Interconnection <strong>3G</strong>/<strong>WLAN</strong>; <strong>Seamless</strong> <strong>cont<strong>in</strong>uity</strong> <strong>of</strong> <strong>services</strong><br />

1. Introduction<br />

The <strong>in</strong>tegration <strong>of</strong> wireless LANs (<strong>WLAN</strong>s) and thirdgeneration<br />

(<strong>3G</strong>) mobile networks, such as Global System for<br />

Mobile Communication/General Packet Radio Service<br />

(GSM/GPRS) and Universal Mobile Telecommunications<br />

Systems (UMTS) is open<strong>in</strong>g up a broad range <strong>of</strong><br />

possibilities due to the successful deployment <strong>of</strong> both<br />

technologies. This range beg<strong>in</strong>s with low-level issues <strong>of</strong><br />

radio access <strong>in</strong>tegration until fulfill<strong>in</strong>g one <strong>of</strong> the<br />

characteristics identified by the Wireless World Research<br />

Fund, namely the def<strong>in</strong>ition <strong>of</strong> a component-based<br />

architecture that will enable users, application developers,<br />

service and content providers, and manufacturers to<br />

efficiently and flexibly create new <strong>services</strong> [1]. The ma<strong>in</strong><br />

subject <strong>of</strong> this paper is dedicated to the first issue but hav<strong>in</strong>g<br />

the second <strong>in</strong> m<strong>in</strong>d.<br />

The <strong>in</strong>terconnection <strong>of</strong> <strong>3G</strong> systems with <strong>WLAN</strong> <strong>in</strong><br />

general is be<strong>in</strong>g def<strong>in</strong>ed by <strong>3G</strong>PP <strong>in</strong> a series <strong>of</strong> 6 scenarios<br />

* Correspond<strong>in</strong>g author. Tel.: C21 294 9642; fax: 21 294 8532.<br />

E-mail address: pfp@un<strong>in</strong>ova.pt (P. P<strong>in</strong>to).<br />

0140-3664/$ - see front matter q 2005 Elsevier B.V. All rights reserved.<br />

doi:10.1016/j.comcom.2005.06.002<br />

[2]. The various scenarios describe an <strong>in</strong>creas<strong>in</strong>g level <strong>of</strong><br />

<strong>in</strong>tegration between the two systems: (1) common bill<strong>in</strong>g,<br />

with the objective <strong>of</strong> hav<strong>in</strong>g a s<strong>in</strong>gle customer relationship;<br />

(2) <strong>3G</strong> based access control, where the <strong>3G</strong> provides the<br />

AAA procedures to <strong>WLAN</strong> users with an equal security<br />

level (although a s<strong>in</strong>gle sign-<strong>in</strong> approach is not yet an<br />

objective); (3) access to <strong>3G</strong> packet-switched (<strong>PS</strong>) <strong>services</strong>,<br />

to allow an operator to extend these <strong>services</strong> to the <strong>WLAN</strong><br />

(this is the current state <strong>of</strong> the art <strong>in</strong> the standards); (4)<br />

access to <strong>3G</strong> <strong>PS</strong> <strong>services</strong> with service <strong>cont<strong>in</strong>uity</strong>, with the<br />

objective that the <strong>services</strong> <strong>of</strong> scenario 3 would survive a<br />

change <strong>of</strong> access between the two systems; (5) the same<br />

as scenario (4) with seamless <strong>cont<strong>in</strong>uity</strong>, the <strong>services</strong> not<br />

only survive but there is seamless <strong>cont<strong>in</strong>uity</strong>. By<br />

seamless <strong>cont<strong>in</strong>uity</strong> it is meant m<strong>in</strong>imiz<strong>in</strong>g aspects such<br />

as data loss and break time; and (6) access to <strong>3G</strong> circuitswitched<br />

(CS) <strong>services</strong> with mobility, which means access<br />

to <strong>services</strong> provided by the entities <strong>of</strong> the Circuit<br />

Switched Core Network over <strong>WLAN</strong> with seamless<br />

<strong>cont<strong>in</strong>uity</strong>.<br />

Currently, [3] describes the architecture for scenarios 2<br />

and 3. Its approach to scenario 3 is to <strong>in</strong>terconnect both<br />

systems at IP-level follow<strong>in</strong>g an <strong>in</strong>terconnection architecture<br />

known as loosely coupled approach [4]. Although [3]


1056<br />

P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064<br />

provides an answer to scenario 3 there is the feel<strong>in</strong>g that<br />

higher scenarios raise low-layer considerations [5].<br />

In this paper we present an architecture that can handle<br />

scenarios 4 and 5 based on a core-level coupl<strong>in</strong>g <strong>of</strong> the<br />

systems. Extensions <strong>of</strong> this architecture might handle<br />

scenario 6 as well but this is out <strong>of</strong> the scope <strong>of</strong> the paper.<br />

The paper beg<strong>in</strong>s with a description <strong>of</strong> the core-level<br />

approach <strong>in</strong>troduc<strong>in</strong>g the <strong>in</strong>novative aspects <strong>of</strong> the<br />

architecture. Section 4 presents the authentication, authorization<br />

and account<strong>in</strong>g (AAA) procedures. They are critical<br />

to the handover times. Our AAA procedures follow very<br />

closely the <strong>3G</strong>PP standard (which is already at an advanced<br />

state). However, they show a different perspective, not so<br />

<strong>3G</strong> centric, for the <strong>in</strong>ter-relation between the networks. The<br />

application <strong>of</strong> our architecture to scenarios 3, 4, and 5<br />

precede the presentation <strong>of</strong> the simulations results and the<br />

conclusions.<br />

2. Initial assumptions<br />

Throughout the paper we assume that mobile stations<br />

(MS) will have two (or more) wireless <strong>in</strong>terfaces that can<br />

work simultaneously. We also assume that the security<br />

control provided by the smart card called UMTS Subscriber<br />

Identity Module (USIM) and the global roam<strong>in</strong>g agreements<br />

amongst <strong>3G</strong>PP operators form the largest operational AAA<br />

system <strong>in</strong> the world to date. This system could be used by<br />

organizations not <strong>in</strong>terested on sett<strong>in</strong>g up and manage a<br />

system <strong>of</strong> their own. F<strong>in</strong>ally, we assume that <strong>WLAN</strong>s are<br />

owned by any bus<strong>in</strong>ess organizations that rely on the <strong>3G</strong><br />

operators for just authentication (therefore exclud<strong>in</strong>g<br />

authorization). The organizations must trust each other up<br />

to the po<strong>in</strong>t <strong>of</strong> user identification and validation but rema<strong>in</strong><br />

<strong>in</strong>dependent <strong>in</strong> other aspects (for <strong>in</strong>stance, user data directed<br />

to one network must not be understood by the other). A good<br />

example <strong>of</strong> such an organization is a University. It has<br />

already a <strong>WLAN</strong> <strong>in</strong>stalled and has a community that can use<br />

the local facilities for free at the sole discretion <strong>of</strong> the<br />

University <strong>services</strong>; and visitors that can use the <strong>WLAN</strong> to<br />

access <strong>3G</strong> systems but not local <strong>services</strong>. For each access to<br />

the <strong>3G</strong> system the University should be paid a fee.<br />

3. Overview <strong>of</strong> the architecture<br />

In our architecture the user is always connected to the<br />

GPRS network. Any use <strong>of</strong> a <strong>WLAN</strong> is complementary.<br />

There are two major consequences: all the control features<br />

(pag<strong>in</strong>g, compulsory registration update, user location, etc.)<br />

rema<strong>in</strong> as they are today and are only needed <strong>in</strong> the GPRS<br />

network; and there is no need for total <strong>in</strong>ter-system vertical<br />

handovers such as they are def<strong>in</strong>ed <strong>in</strong> [6] (only a data-part<br />

handover is performed). A similar approach <strong>of</strong> a primary<br />

network was taken by MIRAI [7]. In their case there is a<br />

controll<strong>in</strong>g network (not for data) that has ma<strong>in</strong>ly the<br />

controll<strong>in</strong>g functionality <strong>of</strong> the GPRS (with some add-ons<br />

such as choos<strong>in</strong>g a data RAN - Radio Access Network). Our<br />

approach <strong>of</strong> hav<strong>in</strong>g the GPRS as the primary network makes<br />

sense for two ma<strong>in</strong> reasons: if users want to use <strong>WLAN</strong>s to<br />

<strong>in</strong>terconnect to the <strong>3G</strong> systems they are obviously <strong>3G</strong> users<br />

and have access to GPRS; and GPRS is already ubiquitous.<br />

This section provides an overview <strong>of</strong> the architecture. A<br />

thorough description and some discussion can be found<br />

<strong>in</strong> [8].<br />

A <strong>WLAN</strong> RAN is a set <strong>of</strong> islands. Each island is formed<br />

by a set <strong>of</strong> cells and is controlled by an Island Manager (IM).<br />

Islands do not cover the entire space (i.e. there will be dark<br />

areas). All islands <strong>of</strong> a certa<strong>in</strong> technology are seen by the<br />

primary network as a Hotspot Network (HN) - a secondary<br />

network. The IM has the functionality <strong>of</strong> an access gateway<br />

to the <strong>3G</strong> system, AAA server for the <strong>WLAN</strong>, and AAA<br />

proxy towards the <strong>3G</strong> system.<br />

A user is connected to the GPRS network and can be<br />

connected to other HN networks simultaneously. Each HN<br />

supports the notion <strong>of</strong> a session (i.e. IEEE 802.11 has one,<br />

HiperLan has another, etc.). A session is a high level<br />

concept to allow the ma<strong>in</strong>tenance <strong>of</strong> context dur<strong>in</strong>g<br />

disconnection periods when the user is mov<strong>in</strong>g <strong>in</strong> a dark<br />

area <strong>of</strong> a certa<strong>in</strong> HN. As the GPRS is always active this<br />

concept <strong>of</strong> session is useful, and is not seen <strong>in</strong> other systems.<br />

For <strong>in</strong>stance, the user began a 802.11 session at the airport,<br />

took a taxi to a hotel, and when he is <strong>in</strong> the hotel, the same<br />

session is still on us<strong>in</strong>g the <strong>WLAN</strong> <strong>in</strong>frastructure <strong>of</strong> the hotel<br />

(it is assumed that both have agreements with the users’<br />

<strong>3G</strong>PP operator). On the way from the airport to the hotel, if<br />

the user needs to be contacted <strong>in</strong> the context <strong>of</strong> that session<br />

the primary network can be used.<br />

Fig. 1 shows the architecture for the data traffic (no<br />

access control, bill<strong>in</strong>g, etc.). All elements <strong>of</strong> the current <strong>3G</strong><br />

core work unchanged except the SGSN (Serv<strong>in</strong>g GPRS<br />

Support Node) and the HSS (Home Subscriber Server) that<br />

must have its database enlarged to store the new type <strong>of</strong><br />

locations <strong>of</strong> MSs. Two new components are added: the<br />

HNAC (Hotspot Network Area Controller) which controls<br />

one (or more) island, and the GHSN (Gateway Hotspot<br />

network Support Node) which is responsible for context<br />

management and Internet access (here ‘context’ has a<br />

similar mean<strong>in</strong>g as used for the PDP context <strong>in</strong> GPRS). The<br />

thicker l<strong>in</strong>es belong to the core but they are not present <strong>in</strong><br />

the current <strong>3G</strong> core. So, all high speed traffic goes through<br />

them not overload<strong>in</strong>g the current <strong>3G</strong> <strong>in</strong>frastructure. The<br />

HNAC <strong>in</strong>terfaces the other components <strong>of</strong> the core behav<strong>in</strong>g<br />

as a SGSN. Therefore, no changes on the other components<br />

are needed. The only exception is the SGSN itself that must<br />

have a physical <strong>in</strong>terface to the HNAC and must<br />

communicate with it for the purpose <strong>of</strong> <strong>in</strong>ter-system<br />

handovers (see below). The GHSN has the functionality<br />

similar to the GGSN. It could even be <strong>in</strong>cluded <strong>in</strong> the<br />

current GGSN. The connection to the <strong>WLAN</strong> is performed<br />

by the IM that <strong>in</strong>teracts with the HNAC at IP level and<br />

<strong>in</strong>terfaces the <strong>WLAN</strong> Access Po<strong>in</strong>t at L2 or L3. The Local


P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064 1057<br />

MS<br />

UTRAN radio<br />

<strong>in</strong>terface<br />

BS<br />

<strong>WLAN</strong><br />

AP<br />

<strong>WLAN</strong> radio<br />

<strong>in</strong>terface<br />

IMSI IP 1<br />

<strong>3G</strong><br />

GGSN<br />

SGSN<br />

IP 2<br />

L2/L3<br />

distribution<br />

network<br />

IPa<br />

IM<br />

A<br />

HNAC<br />

core<br />

network<br />

HSS<br />

GHSN<br />

IP 3<br />

Local<br />

Router<br />

Fig. 1. Data traffic paths <strong>in</strong> the hybrid network.<br />

Router enables local users to use the Internet directly if<br />

they wish.<br />

Our core-level approach to wireless systems <strong>in</strong>tegration<br />

has subtle but important differences when compared to the<br />

tightly approach referred <strong>in</strong> the literature [4]. First <strong>of</strong> all the<br />

control part never leaves the UMTS. Therefore there is no<br />

need for control procedures <strong>in</strong> <strong>WLAN</strong> (pag<strong>in</strong>g, assignment<br />

<strong>of</strong> cell or rout<strong>in</strong>g area identifiers); second, no core <strong>in</strong>terfaces<br />

are exposed to the exterior <strong>of</strong> the core creat<strong>in</strong>g possible<br />

security and operational problems; third, the AAA<br />

procedures are exactly similar to the current standard (no<br />

vectors leave the core).<br />

The solution <strong>in</strong> [3] is not directly comparable to our work<br />

because they connect both networks at IP level. In their<br />

system a new component is also <strong>in</strong>stalled <strong>in</strong> the core—PDG<br />

(Packet Data Gateway). The PDG allows for the <strong>in</strong>troduction<br />

<strong>of</strong> the user <strong>in</strong>to the system at IP level provid<strong>in</strong>g IP<br />

access to <strong>3G</strong> <strong>services</strong>. It is more comparable to our GHSN<br />

than to our HNAC. Furthermore, the <strong>WLAN</strong> traffic goes<br />

directly <strong>in</strong>to the core <strong>in</strong> our solution whereas <strong>in</strong> [3] it goes<br />

via an external IP network to the PDG.<br />

As shown <strong>in</strong> Fig. 1, applications can use one out <strong>of</strong> three<br />

IP addresses: IP 1 address uses the standard GPRS; IP 2<br />

address uses the HN network; and IP 3 address uses the local<br />

<strong>in</strong>ternet access <strong>of</strong> the LAN. Applications just choose the<br />

address related to the network they want to use preferably.<br />

IP 1 and IP 2 addresses work all the time: for the case <strong>of</strong> IP 1<br />

the UTRAN is used but the SGSN can use the HNAC,<br />

send<strong>in</strong>g the packets via <strong>WLAN</strong> when a <strong>WLAN</strong> is available;<br />

for the case <strong>of</strong> IP 2 the <strong>WLAN</strong> is used. When the MS is<br />

outside <strong>of</strong> <strong>WLAN</strong> coverage the traffic goes via UTRAN and<br />

via the SGSN to the HNAC. This is done automatically but<br />

applications can receive signals and halt the transmission <strong>of</strong><br />

packets momentarily. In the sequel it will become clear how<br />

the data and control paths are established, and the different<br />

communication possibilities between the core and the MS.<br />

The GPRS part <strong>of</strong> the system is conform to the standard:<br />

the MS has its identification at core level <strong>in</strong> the form <strong>of</strong> the<br />

IMSI (International Mobile Subscriber Identity) and the<br />

attachment procedure for GPRS is the standard one<br />

(with temporary identifiers). In the GPRS part the IP 1<br />

session is established after a PDP context creation with the<br />

GGSN.<br />

The <strong>WLAN</strong> part has two authentication phases (Fig. 2).<br />

The <strong>WLAN</strong> authentication gives access to local <strong>services</strong><br />

(<strong>in</strong>clud<strong>in</strong>g direct Internet access). The MS is given a local IP<br />

address (IPa), and a routable IP address IP 3 . Traffic us<strong>in</strong>g IP 3<br />

uses the Local Router (Fig. 1) only. The <strong>3G</strong> authentication<br />

gives access to the <strong>3G</strong> core via <strong>WLAN</strong>. The MS is identified<br />

at the core by IPa, <strong>in</strong>stead <strong>of</strong> the IMSI. When it creates a<br />

context with the GHSN it is given the address IP 2 for<br />

external Internet access. When the user moves from one<br />

island to another the IPa changes but the IP 2 rema<strong>in</strong>s<br />

the same.<br />

An important feature <strong>in</strong> our architecture is the connection<br />

between the HNAC and the SGSN (<strong>in</strong>terface A <strong>in</strong> Fig. 1). It<br />

allows each <strong>of</strong> these components to communicate with the<br />

MS via the other one. It can be used, for <strong>in</strong>stance, to<br />

ma<strong>in</strong>ta<strong>in</strong> IP sessions <strong>in</strong> HN dark areas; to access SMS (Short<br />

Message Service) via <strong>WLAN</strong>, etc. - the MS identified by the<br />

IMSI can be contacted via UTRAN (Universal Terrestrial<br />

Radio Access Network) us<strong>in</strong>g the IMSI, or via <strong>WLAN</strong><br />

us<strong>in</strong>g the IPa.<br />

In terms <strong>of</strong> data path GTP-U (GPRS Tunnel<strong>in</strong>g Protocol -<br />

for User Plan) tunnels are used. Currently <strong>in</strong> GPRS a<br />

tunnel is established between the GGSN and the SRNC<br />

MS AP (a) (b)<br />

B<br />

1. authentication<br />

2. association<br />

3. <strong>WLAN</strong> authentication / authorization<br />

4. <strong>3G</strong> authentication / authorization / etc.<br />

(a) – IM and <strong>WLAN</strong> AAA Server<br />

(b) – <strong>3G</strong>PP AAA Server<br />

HSS HNAC GHSN<br />

Fig. 2. Four phases for AAA procedures.


1058<br />

P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064<br />

(Serv<strong>in</strong>g Radio Network Controller). In our architecture this<br />

tunnel is replaced by two half tunnels: one from GGSN to<br />

SGSN and another from SGSN to SRNC (and similarly for<br />

the <strong>WLAN</strong> - one from GHSN to HNAC and another from<br />

HNAC to IM). This half tunnel def<strong>in</strong>ition is pretty much a<br />

return to the first standardization phase <strong>of</strong> GPRS. The reason<br />

for the partition is to allow the SGSN (or HNAC) to use<br />

other radio networks through <strong>in</strong>terface A.<br />

Note that the MS never leaves the UMTS for control<br />

purposes. The handovers are just performed for the data<br />

part. The consequence is that the GPRS radio <strong>in</strong>terface must<br />

always be active. This is the price to pay for not hav<strong>in</strong>g<br />

control procedures <strong>in</strong> secondary networks (it is not obvious<br />

how pag<strong>in</strong>g, cell or rout<strong>in</strong>g area identifiers etc., would be<br />

def<strong>in</strong>ed <strong>in</strong> secondary networks and how their coexistence<br />

with the <strong>3G</strong> network would be). Nevertheless, the power<br />

consumption is not so dramatic and is comparable to the<br />

current situation <strong>of</strong> a MS when it is <strong>in</strong> standby.<br />

4. Associations and context creation<br />

Before a new secondary radio access becomes ready to<br />

be used there are two operations that take some time:<br />

security associations and QoS guarantees (for real-time<br />

<strong>services</strong>). The latter one is out <strong>of</strong> the scope <strong>of</strong> this paper. The<br />

former is probably longer and [3] conta<strong>in</strong>s a very clear<br />

def<strong>in</strong>ition <strong>of</strong> the process that we will follow very closely<br />

here. The major change here is a greater autonomy <strong>of</strong> the<br />

<strong>WLAN</strong> owner to authorize its users. [3] is, naturally, very<br />

<strong>3G</strong> centric.<br />

Fig. 2 shows the four ma<strong>in</strong> phases. We assume that we<br />

are us<strong>in</strong>g an IEEE 802.11 <strong>WLAN</strong>.<br />

After a Beacon frame is received, the MS authenticates<br />

us<strong>in</strong>g the standard open-system authentication. This is a<br />

very weak procedure just to give free access to some trivial<br />

local <strong>services</strong> (announcements, etc.). The second phase is an<br />

association to the SSID <strong>in</strong> order to exchange data packets.<br />

These are standard procedures and the packets <strong>in</strong>volved are<br />

shown <strong>in</strong> Fig. 3.<br />

The third phase is <strong>in</strong>itiated by the MS and the purpose is<br />

to identify itself and get authorization to use the local<br />

facilities. This phase is the one that deviate the most from<br />

MS<br />

Beacon<br />

AP<br />

[3]. We use the AKA method [9] supported by the EAP<br />

(Extensible Authentication Protocol) mechanism [10].<br />

Fig. 4 shows the various packets. The MS <strong>in</strong>itiates an<br />

authentication procedure select<strong>in</strong>g a <strong>3G</strong> PLMN (Public<br />

Land Mobile Network). The way to identify the PLMN is by<br />

us<strong>in</strong>g a network address identifier (NAI) <strong>in</strong> the form <strong>of</strong><br />

username@realm (the username is the user identification<br />

and realm is a doma<strong>in</strong> name [11] identify<strong>in</strong>g the PLMN).<br />

We assume that the <strong>WLAN</strong> has an agreement with the user’s<br />

PLMN. If it has not, an advertisement and a selection phases<br />

have to exist (see [3]). Another aspect we do not treat here is<br />

the differences between Home and Visit<strong>in</strong>g PLMNs (aga<strong>in</strong>,<br />

see [3]). The IM behaves as an AAA proxy relay<strong>in</strong>g the<br />

<strong>in</strong>formation to the <strong>3G</strong>PP AAA Server (the HNAC, for<br />

<strong>in</strong>stance). The outcome <strong>of</strong> the operation is an <strong>in</strong>dication via<br />

the secure channel between the IM and the <strong>3G</strong>PP AAA<br />

Server that the MS is what it claims to be. A possible piece<br />

<strong>of</strong> <strong>in</strong>formation can be the MSISDN (Mobile Subscriber<br />

ISDN Number) because it is not compromis<strong>in</strong>g to the <strong>3G</strong><br />

system. This is conveyed <strong>in</strong> the EAP-Success packet just<br />

before po<strong>in</strong>t 1. At po<strong>in</strong>t 1 the IM consults its data base and<br />

two th<strong>in</strong>gs can happen: the user is a member <strong>of</strong> the<br />

community (student, teacher, etc.), or he is not.<br />

If he is a member, the IM provides the MS with IP<br />

addresses: IPa, IP address IP 3 , the IP address <strong>of</strong> the HNAC<br />

to pursue authentication if the user wants to use the so called<br />

‘<strong>WLAN</strong> <strong>3G</strong>PP Access’, and session keys for the purpose <strong>of</strong><br />

radio <strong>in</strong>terface <strong>in</strong>tegrity protection and encryption <strong>in</strong> the<br />

<strong>WLAN</strong> session. As it was stated before, IP 3 is a routable<br />

address that enables the MS to use all the <strong>services</strong> <strong>of</strong> the<br />

local network.<br />

If he is not a member (e.g., he is a visitor at the<br />

University) the IM simply <strong>in</strong>dicates the IPa and the IP<br />

MS<br />

EAPOL Start<br />

EAP Req/Ident<br />

EAP Res/Ident<br />

EAP Req/AKA<br />

IM<br />

EAP Res/Ident<br />

EAP Req/AKA<br />

<strong>3G</strong>PP AAA<br />

Server<br />

Auth <strong>in</strong>fo Req<br />

Auth <strong>in</strong>fo Reply<br />

Subs Pr<strong>of</strong> Req<br />

Subs Pr<strong>of</strong>ile<br />

Pr<strong>of</strong>ile Ack<br />

HSS<br />

1.<br />

2.<br />

Authenti. Alg. 0 – Seq 1<br />

Authent. Alg. 0 – Seq 2<br />

Association Request<br />

Association Response<br />

EAP Res/AKA EAP Res/AKA<br />

EAP Success<br />

1<br />

EAP Success + keys + IP<br />

Fig. 3. Open-system Authentication and Association.<br />

Fig. 4. <strong>WLAN</strong> user authentication and authorization.


P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064 1059<br />

address <strong>of</strong> the HNAC. This MS can use the <strong>WLAN</strong> to reach<br />

the <strong>3G</strong> system but cannot use local <strong>services</strong>.<br />

Note that the authorization decision to use local facilities<br />

is performed by the University and the <strong>3G</strong> system is only<br />

used to authenticate users, mak<strong>in</strong>g the overall <strong>WLAN</strong> AAA<br />

management <strong>in</strong> the University simpler.<br />

Every user, recognized or not by the University, can use<br />

the <strong>WLAN</strong> to access the <strong>3G</strong> system - it is now up to the <strong>3G</strong><br />

operator to allow it or not. This is the purpose <strong>of</strong> the last<br />

phase showed <strong>in</strong> Fig. 5. The MS <strong>in</strong>itiates the procedure<br />

request<strong>in</strong>g an attach procedure to the HN. If the user was<br />

previously attached and went through a dark area, a reattach<br />

procedure should have been done <strong>in</strong>stead. The packet<br />

starts a similar procedure as before.<br />

We assumed here that the HNAC behaves as AAA server<br />

gett<strong>in</strong>g <strong>in</strong>formation from the HSS. The HNAC issues the<br />

AKA challenge and if the response is valid it creates a<br />

context with GHSN the same way a context is created <strong>in</strong><br />

GPRS with the GGSN. The f<strong>in</strong>al packet has the <strong>in</strong>dication <strong>of</strong><br />

success, session keys to be used by the MS without the<br />

knowledge <strong>of</strong> the IM or <strong>WLAN</strong>, temporary identification,<br />

and the IP 2 address to be used by the MS.<br />

Phase 3 and phase 4 are very similar but they must both<br />

exist to keep the two systems as <strong>in</strong>dependent as possible (for<br />

<strong>in</strong>stance, a user might not want to have ‘<strong>WLAN</strong> <strong>3G</strong>PP<br />

Access’, not perform<strong>in</strong>g phase 4).<br />

5. Interconnection <strong>of</strong> the different systems<br />

If the user gets authorization to use the three networks the<br />

three possible data flows together with the ma<strong>in</strong> components<br />

<strong>in</strong>volved are depicted <strong>in</strong> Fig. 6(a). Legacy applications that<br />

MS<br />

HN Attach<br />

EAP Req/Ident<br />

EAP Res/Ident<br />

EAP Req/AKA<br />

EAP Res/AKA<br />

HNAC<br />

HN Attach Ack + keys + IP<br />

HSS<br />

Retrieve authentication<br />

<strong>in</strong>formation and user pr<strong>of</strong>ile<br />

as <strong>in</strong> fig. 4<br />

Get HN Context<br />

Send New HN Context<br />

<strong>WLAN</strong> Regist<br />

Regist Confirm<br />

GHSN<br />

MS<br />

MS<br />

MS<br />

<strong>WLAN</strong><br />

<strong>WLAN</strong><br />

UTRAN<br />

UTRAN<br />

UTRAN<br />

IM<br />

IM<br />

SGSN<br />

HNAC<br />

LR<br />

SGSN<br />

A<br />

SGSN<br />

A<br />

want to use the <strong>3G</strong> <strong>services</strong> will use either IP 1 or IP 2 (the<br />

system will use <strong>WLAN</strong> preferably when available). New<br />

applications can explicitly use one or the other and control<br />

when they want to send packets. The <strong>in</strong>terface A between<br />

the SGSN and the HNAC allows other <strong>in</strong>terest<strong>in</strong>g scenarios.<br />

When the user is <strong>in</strong> an HN dark area communication us<strong>in</strong>g<br />

IP 2 can still be done us<strong>in</strong>g the GPRS, as showed <strong>in</strong> part (b).<br />

The usage <strong>of</strong> IP 1 cont<strong>in</strong>ues to use the UTRAN, obviously.<br />

Part (c) shows the case when the user is under HN coverage<br />

and decides (or the network decides automatically) that an<br />

MMS, for <strong>in</strong>stance, can be delivered via <strong>WLAN</strong>. Note that<br />

the control part (pag<strong>in</strong>g, etc.) uses always the GPRS<br />

network (the control parts are not shown <strong>in</strong> Fig. 6).<br />

Fig. 7 shows the protocol stack used to manage the<br />

communication and these various possibilities. The full<br />

stack exists <strong>in</strong> the MS. The SGSN and HNAC have only the<br />

three lower layers (up to IP). The two higher layers <strong>in</strong> the<br />

network side exist only for applications that know how to<br />

work with secondary networks and reside <strong>in</strong> application<br />

servers. The session control and application layers are part<br />

(a)<br />

HNAC<br />

HNAC<br />

LR<br />

(b)<br />

(c)<br />

GGSN IP 1<br />

GHSN<br />

IP 2<br />

IP 3<br />

GGSN<br />

GHSN<br />

IP 1<br />

IP 2<br />

GGSN IP 1<br />

GHSN<br />

IP 2<br />

IP 3<br />

Fig. 6. Different possibilities for the data flows.<br />

Applicat. A<br />

L1/L2<br />

Applicat. B<br />

Session Control<br />

IP<br />

Delivery Service<br />

L1/L2<br />

Connection<br />

Manager<br />

(CM)<br />

<strong>WLAN</strong><br />

UTRAN<br />

Fig. 5. <strong>3G</strong> user authentication and authorization<br />

Fig. 7. Protocol Stack at the MS/HNAC/SGSN.


1060<br />

P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064<br />

<strong>of</strong> the component-based architecture referred <strong>in</strong> the<br />

<strong>in</strong>troduction and allow, among other th<strong>in</strong>gs, to ma<strong>in</strong>ta<strong>in</strong><br />

user sessions between <strong>WLAN</strong> contacts. The focus <strong>in</strong> this<br />

paper is on the lower layers. The IP layer <strong>in</strong> the MS can be<br />

work<strong>in</strong>g with one <strong>of</strong> three IP addresses: IP 1 and the<br />

communication is with SGSN, IP 2 and the peer is the<br />

HNAC, or IP 3 and the peer is the IM. The Delivery Service<br />

(DS) is used <strong>in</strong> the first two cases to allow an otherwise IP<br />

direct communication between the MS and one <strong>of</strong> the<br />

elements <strong>of</strong> the core (SGSN or HNAC) to go via the other.<br />

The DSs <strong>in</strong> the two core components cooperate to <strong>of</strong>fer<br />

alternative paths for data packets - e.g., the DS <strong>in</strong> HNAC can<br />

give an IP 2 packet to the DS <strong>in</strong> the SGSN to be delivered to<br />

the MS. The IP <strong>in</strong> the MS just receives it without know<strong>in</strong>g<br />

that it came through the SGSN. Between the MS and HNAC<br />

it <strong>of</strong>fers a confirmed service <strong>of</strong> packet delivery because the<br />

<strong>WLAN</strong> path can fail <strong>in</strong> dark areas (it is assumed that the<br />

UTRAN is ubiquitous). When the <strong>WLAN</strong> path fails there is<br />

an <strong>in</strong>dication upwards to the service or application (similar<br />

to a control plane <strong>in</strong>dication) to <strong>in</strong>form it. The application is<br />

free to keep send<strong>in</strong>g data (that is sent through the UTRAN)<br />

or pause until an <strong>in</strong>dication <strong>of</strong> availability is received,<br />

mean<strong>in</strong>g that the user reappeared at another HN island.<br />

Each time data is sent for delivery by the service or<br />

application it can carry a control <strong>in</strong>dication stat<strong>in</strong>g the radio<br />

path to be used. The DS will use this <strong>in</strong>formation to deliver<br />

the packets. If no control <strong>in</strong>dication exists (legacy<br />

applications, for <strong>in</strong>stance) then the default radio path is<br />

chosen (UTRAN for IP 1 and <strong>WLAN</strong> for IP 2 ), or an<br />

automatic decision is made (if <strong>WLAN</strong> is available always<br />

use the <strong>WLAN</strong>). In the case <strong>of</strong> the <strong>WLAN</strong>, if the path is not<br />

available the UTRAN is used automatically. In summary,<br />

applications can stop send<strong>in</strong>g data if they know the MS is<br />

out <strong>of</strong> coverage, but any data sent will be delivered.<br />

For <strong>services</strong> that do not use the IP stack the choice <strong>of</strong> the<br />

radio path is performed by the core identification <strong>of</strong> the MS -<br />

either the IMSI or the IPa.<br />

When a user attaches to an island its pr<strong>of</strong>ile at the HSS is<br />

updated. Entities deliver<strong>in</strong>g <strong>3G</strong> <strong>services</strong>, such as SMS, can<br />

query the HSS for <strong>in</strong>formation and decide to use the <strong>WLAN</strong><br />

<strong>in</strong>stead <strong>of</strong> the UTRAN. The HNAC can also run an event<br />

service to notify any other core entity that a particular MS<br />

entered <strong>in</strong> an island.<br />

As stated above the <strong>WLAN</strong> part <strong>of</strong> the DS is confirmed to<br />

detect when users leave <strong>WLAN</strong> coverage. If an acknowledgement<br />

<strong>of</strong> a packet is not received at the DS <strong>in</strong> the HNAC<br />

it forces a k<strong>in</strong>d <strong>of</strong> handover. The packet that failed is sent via<br />

SGSN and the orig<strong>in</strong>ator is signaled that the user is no<br />

longer reachable by <strong>WLAN</strong> (legacy applications are not<br />

able to catch these signals, obviously). Note that no<br />

<strong>in</strong>formation is ever lost <strong>in</strong> handovers because the HNAC<br />

will transmit the packet aga<strong>in</strong> through the other <strong>in</strong>terface. A<br />

confirmed service means that the HNAC has to buffer<br />

packets. However this mechanism is equivalent to a Logical<br />

level mechanism (the timer is very small - about 40 ms). At<br />

a rate <strong>of</strong> 2 Mbps a 10 Kbyte buffer is needed per flow. Once<br />

a first packet fails, all subsequent packets will be sent by<br />

UTRAN without buffer<strong>in</strong>g (see below).<br />

A f<strong>in</strong>al po<strong>in</strong>t refers to the communication at DS level<br />

between the HNAC and the MS. There are several<br />

possibilities: one is to establish an IP tunnel (not shown <strong>in</strong><br />

the protocol stack <strong>in</strong> Fig. 7). The DS <strong>in</strong> HNAC establishes<br />

an IP-tunnel directly to the MS us<strong>in</strong>g the IPa address;<br />

another possibility is to establish an IP-tunnel to the IM and<br />

use VLANs after that (<strong>in</strong> this case IPa is just an identifier);<br />

still another possibility is to use layer 2 switch<strong>in</strong>g all over.<br />

6. Use <strong>of</strong> the architecture for scenario 3<br />

The option <strong>in</strong> [3] was to ‘provide <strong>WLAN</strong> MSs with IP<br />

bearer capability to access <strong>PS</strong> based <strong>services</strong> which are<br />

provided by PLMN’. Our approach is completely different -<br />

the <strong>WLAN</strong> MSs have the capability to jo<strong>in</strong> the <strong>3G</strong> core and<br />

access any <strong>PS</strong> service at core level, and not at IP level.<br />

However, it is <strong>in</strong>terest<strong>in</strong>g to see how <strong>PS</strong> <strong>services</strong> can be<br />

accessed us<strong>in</strong>g our architecture. We will see that some<br />

procedures def<strong>in</strong>ed <strong>in</strong> [3] are not needed and the whole<br />

process becomes much simpler. Fig. 8, taken from [3] shows<br />

the necessary components for the case <strong>of</strong> SMS (Short<br />

Message Service). The IP-SM-Gateway:<br />

† must ma<strong>in</strong>ta<strong>in</strong> an association between the users’<br />

MSISDN and its IP address;<br />

† must <strong>in</strong>terface the GMSC behav<strong>in</strong>g as an SGSN or MSC;<br />

† must support registration and authentication <strong>of</strong> the MS<br />

for SMS <strong>services</strong>;<br />

† must support security associations between the MS and<br />

itself; and communicates with the MS us<strong>in</strong>g IP based<br />

protocols.<br />

In our architecture the SGSN is contacted by the MS (via<br />

<strong>WLAN</strong>) and the SMS is just delivered. There are, <strong>of</strong> course,<br />

changes <strong>in</strong> the current logic <strong>of</strong> the components (SGSN and<br />

MS) to make them aware <strong>of</strong> different radio possibilities <strong>of</strong><br />

SME<br />

HSS /<br />

(HLR)<br />

C<br />

E<br />

MSC<br />

UE<br />

SM-SC<br />

GMSC / SMS-IWMSC<br />

Gd<br />

SGSN<br />

E’ or Gd’<br />

IP-SM-GW<br />

UE<br />

Fig. 8. Architecture for SMS support with an IP term<strong>in</strong>al.<br />

??


P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064 1061<br />

delivery but there are no extra authentications or registrations.<br />

These changes were also felt as needed <strong>in</strong> the<br />

architecture <strong>of</strong> Fig. 8 (they were left for further study).<br />

7. Interwork<strong>in</strong>g architecture for scenarios 4 and 5<br />

With our architecture, scenarios 4 and 5 <strong>of</strong> [2] are<br />

<strong>in</strong>dist<strong>in</strong>guishable because new RANs take some time to get<br />

ready but the activation is <strong>in</strong>stantaneous (strictly speak<strong>in</strong>g <strong>in</strong><br />

scenario 5 there is also some bandwidth and delay<br />

guarantees that must be satisfied, but this is out <strong>of</strong> the<br />

scope <strong>of</strong> this paper).<br />

There are two situations to analyze: (a) F<strong>in</strong>d Coverage - a<br />

user is connected to the UTRAN and a <strong>WLAN</strong> becomes<br />

active, and (b) Lose Coverage - a user us<strong>in</strong>g a <strong>WLAN</strong> walks<br />

out <strong>of</strong> coverage and the UTRAN has to be used.<br />

In the first situation the user is runn<strong>in</strong>g a service/application<br />

(us<strong>in</strong>g either the IP 1 or IP 2 addresses) and the term<strong>in</strong>al<br />

receives a Beacon frame. The situation is depicted <strong>in</strong> Fig. 9.<br />

S<strong>in</strong>ce the moment the user enters the <strong>WLAN</strong> cell until it<br />

receives the Beacon it lasts Dt1 s. The procedures described<br />

<strong>in</strong> Section 4 are then performed and will last Dt2 s.<br />

Alternatively, a re-attach procedure would have been<br />

performed if the user had already done an attach procedure<br />

previously (the elapsed times are similar). In either case,<br />

once the procedures are done there is an <strong>in</strong>dication from the<br />

DS <strong>in</strong> the HNAC upwards to the applications and to the DS<br />

<strong>in</strong> the SGSN signal<strong>in</strong>g that the connection is ON. Services/<br />

applications us<strong>in</strong>g either the SGSN or the HNAC can deliver<br />

their packets through the <strong>WLAN</strong>. So, the <strong>cont<strong>in</strong>uity</strong> <strong>of</strong> the<br />

<strong>services</strong> is seamless. It is just the time from the reception <strong>of</strong><br />

the <strong>in</strong>dication and the delivery <strong>of</strong> the packet. Both Dt1 and<br />

Dt2 are not <strong>in</strong> the critical time path because the user is us<strong>in</strong>g<br />

the UTRAN. As the attachment to secondary networks does<br />

not <strong>in</strong>volve the control part it can be performed outside the<br />

critical part (another very important difference towards the<br />

tightly coupled approach). An <strong>in</strong>terest<strong>in</strong>g time <strong>in</strong>terval is<br />

how long it takes s<strong>in</strong>ce the Beacon frame is received until<br />

the first packet arrives to the MS via <strong>WLAN</strong>.<br />

In the second situation the user walks out <strong>of</strong> coverage<br />

without mak<strong>in</strong>g a disassociation (the worst and probably the<br />

most common case). The DS <strong>in</strong> the HNAC transmits a<br />

packet and does not receive an acknowledgment. At that<br />

F<strong>in</strong>d coverage<br />

UTRAN<br />

<strong>WLAN</strong><br />

Lose coverage<br />

<strong>WLAN</strong><br />

UTRAN<br />

sense<br />

∆t1<br />

AAA<br />

∆t2<br />

Fig. 9. Handovers between RANs.<br />

moment it declares the <strong>in</strong>terface as OFF, signals upwards,<br />

and also to the DS <strong>in</strong> the SGSN. If the packet belongs to an<br />

application us<strong>in</strong>g the HNAC, the packet goes to the DS <strong>of</strong><br />

the SGSN for delivery, and all subsequent packets after that.<br />

In more general terms, all packets <strong>of</strong> this k<strong>in</strong>d will go via<br />

SGSN after the first failure. If the packet belongs to a service<br />

us<strong>in</strong>g the SGSN it is transmitted back to the DS <strong>in</strong> the SGSN<br />

and delivered. The SGSN was already signaled and will not<br />

send any more packets.<br />

The retransmission timeout for the <strong>WLAN</strong> is the critical<br />

time to consider if we want the change <strong>of</strong> networks to be<br />

seamless. It should be noted, however, that its value can be<br />

short because it is a low-level timer. A failure <strong>of</strong> a s<strong>in</strong>gle<br />

packet turns the l<strong>in</strong>k to OFF and triggers the recovery<br />

described <strong>in</strong> the previous paragraph.<br />

After a failure and a declaration <strong>of</strong> the l<strong>in</strong>k to OFF, a<br />

<strong>WLAN</strong> disconnection procedure for the MS must be<br />

<strong>in</strong>itiated. But the failure could be due to transient<br />

disturbances and the MS might still be contacted after a<br />

while, <strong>in</strong>itiat<strong>in</strong>g a re-attachment procedure. To avoid this<br />

k<strong>in</strong>d <strong>of</strong> <strong>in</strong>stability, after the l<strong>in</strong>k is declared OFF the DS <strong>in</strong><br />

the HNAC tries to send k echo packets to the DS <strong>in</strong> the MS.<br />

If they fail the user has moved away and the disconnection<br />

procedure is <strong>in</strong>itiated. If there are replies the l<strong>in</strong>k comes<br />

back to ON aga<strong>in</strong> and <strong>in</strong>dications are sent to the DS <strong>in</strong> the<br />

SGSN and upwards <strong>in</strong> the HNAC.<br />

The disconnection procedures <strong>in</strong> our architecture are<br />

much lighter than <strong>in</strong> the approach followed <strong>in</strong> [3]. The<br />

tunnel from the GHSN to the HNAC, for <strong>in</strong>stance, is not<br />

disconnected because the application can still use the<br />

UTRAN. The ma<strong>in</strong> operation is the update <strong>of</strong> the <strong>WLAN</strong><br />

user status at the HSS (applications are already aware<br />

because <strong>of</strong> the signal<strong>in</strong>g), and the disconnection <strong>of</strong> the<br />

tunnel between the DS <strong>in</strong> the HNAC and the DS <strong>in</strong> the IM (if<br />

it exists).<br />

8. Simulation results<br />

We simulated the exchange <strong>of</strong> packets us<strong>in</strong>g the ns-2<br />

with add-ons for PCF (Po<strong>in</strong>t Coord<strong>in</strong>ation Function) <strong>in</strong> 802.<br />

11 [12], and for UMTS [13]. Our choice <strong>of</strong> PCF was to<br />

consider a longer delay due to hav<strong>in</strong>g to wait for the time<br />

slot, and to use a mode that can provide certa<strong>in</strong> resource<br />

guarantees. PCF was never popular but an equivalent mode<br />

is appear<strong>in</strong>g <strong>in</strong> 801.11e.<br />

Due to <strong>in</strong>compatibilities <strong>in</strong> the address types <strong>of</strong> both addons,<br />

simulations had to run separately but the correspondent<br />

times for switch<strong>in</strong>g between simulators were registered for a<br />

complete story. The radio <strong>in</strong>terface was DSSS (Direct<br />

Sequence Spread-Spectrum) with a bandwidth <strong>of</strong> 10Mbps <strong>in</strong><br />

the band <strong>of</strong> 914 MHz. This band is an ISM (Industrial,<br />

Scientific, Medical) w<strong>in</strong>dow <strong>in</strong> USA and the ns-2 uses it.<br />

Tak<strong>in</strong>g <strong>in</strong>to account the size <strong>of</strong> our packets, the difference<br />

between us<strong>in</strong>g this w<strong>in</strong>dow or the 2,49 GHz w<strong>in</strong>dow, or<br />

between us<strong>in</strong>g 10 Mbps or 11 Mbps is irrelevant. The radio


1062<br />

P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064<br />

AP<br />

propagation model was Free-space attenuation at near<br />

distances and two ray ground approximation at far<br />

distances. For the cell dimension configuration the default<br />

values were used.<br />

In the PCF sett<strong>in</strong>g, agents were created <strong>in</strong> the ns-2 to<br />

represent the real components as shown <strong>in</strong> Fig. 10. The l<strong>in</strong>k<br />

between the IM and the HNAC was the longer one (around<br />

30 Km) with a delay <strong>of</strong> 10 ms. All the other wired l<strong>in</strong>ks had<br />

a delay <strong>of</strong> 0.1 ms. The bandwidth on all wired l<strong>in</strong>ks was<br />

10 Mbps (aga<strong>in</strong>, this is not so relevant because the traffic is<br />

low). To simulate data base accesses a value <strong>of</strong> 20 ms was<br />

used. There are four <strong>of</strong> these periods <strong>in</strong> the situation <strong>of</strong> f<strong>in</strong>d<br />

coverage (these periods could be reduced if the AAA server<br />

and the HNAC were the same component). The timeout<br />

value to recover from a failed packet from HNAC to MS via<br />

<strong>WLAN</strong> was 40 ms.<br />

The simulations focused on the handover process. There<br />

was no particular application but the analysis <strong>of</strong> the<br />

handover situations. We assumed that there were always<br />

packets to be sent (otherwise the handover is even more<br />

seamless). When mov<strong>in</strong>g from the <strong>WLAN</strong> to the UMTS<br />

(f<strong>in</strong>d coverage) the SGSN is signaled after the user has<br />

performed the AAA procedures. It then starts to send<br />

packets via <strong>WLAN</strong>. The time starts when the signal is<br />

received and ends when the packet reaches the MS via<br />

HNAC. The move from UMTS to <strong>WLAN</strong> (lose coverage) is<br />

a little bit more complex. The system is us<strong>in</strong>g the <strong>WLAN</strong><br />

and a packet is sent via HNAC (the time starts here).<br />

Meanwhile, the MS leaves the <strong>WLAN</strong> and the transmission<br />

<strong>of</strong> this packet will fail. The packet is then sent to the SGSN<br />

and to the MS (the time stops when the MS gets the packet.)<br />

Table 1 shows the values obta<strong>in</strong>ed. Cases labeled as 1 are<br />

<strong>services</strong> runn<strong>in</strong>g over SGSN (e.g. SMS). Cases labeled as 2<br />

are new applications runn<strong>in</strong>g over HNAC. There are some<br />

m<strong>in</strong>or differences because for <strong>in</strong>stance <strong>in</strong> the situation <strong>of</strong><br />

lose coverage for case 1 the packet has to be sent back to<br />

SGSN. In all other situations and cases only signal<strong>in</strong>g<br />

packets travel from HNAC to SGSN. Basically the<br />

simulations proved that these differences can be reduced<br />

to packet dimension differences and are very small (<strong>in</strong> one<br />

case the PCF slot synchronization compensate them<br />

entirely).<br />

Table 1<br />

Values for handovers<br />

IM<br />

SGSN<br />

HNAC<br />

Fig. 10. Components <strong>in</strong> the ns-2 sett<strong>in</strong>g.<br />

HSS<br />

F<strong>in</strong>d Coverage<br />

Lose Coverage<br />

Case 1 Case 2 Case 1 Case 2<br />

216.5 ms 216.5 ms 40.5C56.0 40.2C56.0<br />

16.7 ms 16.7 ms<br />

In the situation <strong>of</strong> f<strong>in</strong>d coverage the first l<strong>in</strong>e shows the<br />

time between the moment the EAPOL Start packet was sent<br />

(start <strong>of</strong> the first phase), and f<strong>in</strong>ished when the attach reply is<br />

received by the MS. The second l<strong>in</strong>e shows the real<br />

switch<strong>in</strong>g time (described above):<br />

† for case 1 it starts when the SGSN receives a signal<br />

<strong>in</strong>dicat<strong>in</strong>g that the <strong>WLAN</strong> via is ON and f<strong>in</strong>ishes when<br />

the MS receives a packet via HNAC (we assumed that a<br />

data packet was immediately available to be sent);<br />

† for case 2 it starts when the HNAC receives the attachreply<br />

(a packet is already there to be sent) and f<strong>in</strong>ishes<br />

when the MS receives the data packet.<br />

In the situation <strong>of</strong> lose coverage the times presented are<br />

the fail<strong>in</strong>g part <strong>in</strong> the <strong>WLAN</strong> plus the recover via UTRAN.<br />

As a first comment it is important to note that for the<br />

situation <strong>of</strong> f<strong>in</strong>d coverage the values <strong>of</strong> 216.5 ms are not <strong>in</strong><br />

the critical path. The MS starts these procedures but is still<br />

communicat<strong>in</strong>g us<strong>in</strong>g the UTRAN (or other <strong>WLAN</strong>s). The<br />

real switch<strong>in</strong>g time is 16.7 ms. Secondly, the overall times<br />

are very small and show that the architecture is viable.<br />

Thirdly, 37% <strong>of</strong> the preparation time <strong>in</strong> the situation <strong>of</strong> f<strong>in</strong>d<br />

coverage (216.5) is due to process<strong>in</strong>g times (four times<br />

20 ms). In some situations 20 ms can be too long and if<br />

the <strong>3G</strong>PP AAA server is <strong>in</strong>side the HNAC half <strong>of</strong> the<br />

<strong>in</strong>teractions with HSS could disappear. Lastly, 41% <strong>of</strong> the<br />

time <strong>in</strong> the situation <strong>of</strong> lose coverage is due to the timeout.<br />

This situation is the real critical one <strong>in</strong> this system but the<br />

overall time (less than 100 ms) is promis<strong>in</strong>g. Note however<br />

that this is the real critical situation <strong>in</strong> all systems [6], and<br />

our architecture behaves better due to the absence <strong>of</strong> a real<br />

vertical (fully <strong>in</strong>ter-system) handover. In these types <strong>of</strong><br />

handovers AAA procedures to the new RAN have to be<br />

done <strong>in</strong> the critical path.<br />

9. Related work<br />

Apart from the tightly and loosely coupled approaches, a<br />

hybrid approach is described <strong>in</strong> [14]. There is a component<br />

called APGW (Access Po<strong>in</strong>t Gateway) that is responsible<br />

for the <strong>in</strong>tegration. The APGW behaves like a tightly<br />

coupled device for real-time traffic and loosely coupled for<br />

non real-time traffic. The APGW does not belong to the core<br />

but because tightly coupled is used core <strong>in</strong>terfaces have to<br />

be available to the outside <strong>of</strong> the core. This is potentially<br />

dangerous and is a characteristic <strong>of</strong> the tightly coupled<br />

systems. If someone tampers with this <strong>in</strong>formation the<br />

network will suffer greatly. Another disadvantage <strong>of</strong> the<br />

tightly coupled approach is that <strong>WLAN</strong> cells must behave<br />

exactly as cellular cells. The MS moves to these cells<br />

leav<strong>in</strong>g the UMTS cells. All control procedures have to be<br />

implemented such as cell identifiers and rout<strong>in</strong>g area<br />

identifiers. Also pag<strong>in</strong>g must be supported, and IEEE 802.<br />

11 does not provide it at physical/l<strong>in</strong>k level. All these


P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064 1063<br />

concerns are miss<strong>in</strong>g <strong>in</strong> [14]. Another important miss<strong>in</strong>g<br />

issue is a description <strong>of</strong> the context creation/update towards<br />

the HSS (mak<strong>in</strong>g it difficult to <strong>in</strong>fer when the switch<strong>in</strong>g<br />

moment happens). A last disadvantage is that the APGW<br />

behaves exactly as an SGSN but it is not <strong>in</strong> the core (aga<strong>in</strong><br />

there is a potential security danger). To save time <strong>in</strong><br />

handovers they keep the PDP context and keep the signal<strong>in</strong>g<br />

connection active <strong>in</strong> UMTS when the MS goes to the<br />

<strong>WLAN</strong>. This is a non-standard procedure that can <strong>in</strong>terfere<br />

with data forward<strong>in</strong>g and control procedures (where is the<br />

MS <strong>in</strong> fact?). The current core (specially the SGSN) has to<br />

be deeply changed to support radio bearers active but<br />

dormant. [14] uses Mobile IP. This choice prevents fast<br />

handovers because packets have to be sent to the Internet<br />

and can also cause packet losses. In order to have a s<strong>in</strong>gle IP<br />

address the MS has to belong to two Foreign Agents (one <strong>in</strong><br />

the UMTS and another <strong>in</strong> the <strong>WLAN</strong>). The numerical<br />

analysis <strong>in</strong> [14] uses signal<strong>in</strong>g costs to refer to the exchange<br />

<strong>of</strong> signal<strong>in</strong>g messages. The problem is not so much how<br />

many messages are exchanged but when (if <strong>in</strong> the critical<br />

path) and the time they take (update a Home Agent takes a<br />

very long time). They propose full (control and data) <strong>in</strong>tersystem<br />

handover. Therefore, all signal<strong>in</strong>g must be done <strong>in</strong><br />

the critical time path. As they did not consider the times<br />

<strong>in</strong>volved it is difficult to assess whether their system support<br />

seamless handovers. A f<strong>in</strong>al remark is related to the way<br />

they differentiate traffic. A field at IP level (e.g. TOS - Type<br />

<strong>of</strong> Service) is used. This is a new <strong>in</strong>terpretation for this field<br />

and might complicate the <strong>in</strong>teraction with the signal<strong>in</strong>g <strong>of</strong><br />

the network.<br />

A second work is reported <strong>in</strong> [15]. A component called<br />

VGSN (Virtual GPRS Support<strong>in</strong>g Node) is used to perform<br />

the <strong>in</strong>terwork<strong>in</strong>g. Mobile IP was avoided due to its latency<br />

and packet losses and applications use only one IP address to<br />

access the Internet. The <strong>in</strong>terwork<strong>in</strong>g is based on the rules <strong>of</strong><br />

roam<strong>in</strong>g. I.e., the VGSN behaves as if it belongs to a visitor<br />

operator but several described functions <strong>of</strong> the VGSN are not<br />

possible between roam<strong>in</strong>g operators nowadays. When a user<br />

moves from UMTS to <strong>WLAN</strong> the <strong>in</strong>com<strong>in</strong>g packets from the<br />

Internet come through the GGSN to the VGSN to the MS.<br />

This means that a tunnel has to be established between the<br />

GGSN to the VGSN (<strong>in</strong> a foreign operator). The VGSN is<br />

behav<strong>in</strong>g as a SGSN (outside the core). Traffic to the Internet<br />

goes directly without pass<strong>in</strong>g through the VGSN (this can<br />

cause problems with filter<strong>in</strong>g devices because the IP address<br />

does not belong to the <strong>WLAN</strong>). [15] does not cover control<br />

aspects (cell id, rout<strong>in</strong>g area id, pag<strong>in</strong>g) when the user is<br />

outside UMTS. They also propose a standby command to be<br />

added to the standards to place a PDP context <strong>in</strong> standby<br />

mode at the old SGSN when the MS moves to the <strong>WLAN</strong>.<br />

When a MS moves from the <strong>WLAN</strong> to the UMTS the traffic<br />

goes via SGSN and VGSN to the Internet (<strong>in</strong> this case the<br />

VGSN is behav<strong>in</strong>g as a GGSN with a tunnel to the SGSN).<br />

The handover <strong>of</strong> a MS <strong>in</strong>to UMTS is performed by a RA<br />

(rout<strong>in</strong>g area) update. Aga<strong>in</strong> this is an overload <strong>of</strong> the<br />

functionality <strong>of</strong> the current RA update procedure. The MS<br />

has to store <strong>in</strong>formation about the orig<strong>in</strong>al SGSN which goes<br />

aga<strong>in</strong>st the current standards. This handover is actually rather<br />

complex because the MS starts by us<strong>in</strong>g the VGSN to <strong>in</strong>form<br />

the SGSN that it wants to cont<strong>in</strong>ue to use the <strong>WLAN</strong> IP<br />

address. The SGSN will then send packets to its local VGSN<br />

that can be different from the orig<strong>in</strong>al VGSN (creat<strong>in</strong>g more<br />

complexity about the IP address). To solve these <strong>in</strong>consistencies<br />

about the IP address and rout<strong>in</strong>g tables the authors<br />

propose the usage <strong>of</strong> a proxy ARP. F<strong>in</strong>ally, if the MS wants to<br />

use UMTS addresses it has to create another PDP context,<br />

this time with the GGSN.<br />

As a conclusion <strong>of</strong> these descriptions we can see that the<br />

current core must be changed. Either implicitly by say<strong>in</strong>g that<br />

we will not add new components but create new <strong>in</strong>terfaces<br />

and expose core <strong>in</strong>terfaces to the exterior, or assum<strong>in</strong>g that a<br />

new component must be added with very little changes to the<br />

core, and to the current procedural practices, as we propose.<br />

Second, Mobile IP cannot provide seamless handovers.<br />

Either we try to ma<strong>in</strong>ta<strong>in</strong> the same IP address as <strong>in</strong> [15] with<br />

great complexity, or we have different IP addresses managed<br />

by the applications but always accessible through any<br />

network as we do. By choos<strong>in</strong>g a certa<strong>in</strong> IP, applications<br />

are choos<strong>in</strong>g the preferred network they want to use. When<br />

they are outside <strong>of</strong> coverage <strong>of</strong> that network they are signaled<br />

and can cont<strong>in</strong>ue to use it (pass<strong>in</strong>g via the other network) or<br />

wait until the MS ga<strong>in</strong>s coverage aga<strong>in</strong>. Work<strong>in</strong>g below IP<br />

(as the DS does) keeps the system very neat and totally<br />

conformant with the current IP standards.<br />

10. Conclusions and further work<br />

In this paper we have shown that seamless <strong>cont<strong>in</strong>uity</strong> <strong>of</strong><br />

<strong>services</strong> and applications between <strong>3G</strong> networks and<br />

<strong>WLAN</strong>s can be achieved <strong>in</strong> a very easy way if a proper<br />

<strong>in</strong>terwork<strong>in</strong>g architecture is considered. We consider a<br />

primary network and <strong>in</strong>troduce HN management components<br />

<strong>in</strong> the <strong>3G</strong> core. The system does not need complete<br />

<strong>in</strong>ter-system vertical handovers because the user never<br />

leaves the primary network for control purposes mak<strong>in</strong>g the<br />

switch<strong>in</strong>g times very small. There is only data vertical<br />

handovers and consequently no need for control procedures<br />

<strong>in</strong> secondary networks.<br />

The <strong>in</strong>troduction <strong>of</strong> a new component <strong>in</strong> the core does not<br />

disrupt the standardization work done so far because it<br />

<strong>in</strong>teracts with the existent components follow<strong>in</strong>g the same<br />

behavior as the SGSN does today. The major modifications<br />

are a physical <strong>in</strong>terface at the SGSN, an update <strong>of</strong> s<strong>of</strong>tware<br />

to enable it to use the HNAC, and the enlargement <strong>of</strong><br />

possible MS status <strong>in</strong> the HSS database.<br />

As issues for further work it is important to study which<br />

QoS parameters might be important to help <strong>in</strong> the decision<br />

<strong>of</strong> us<strong>in</strong>g a certa<strong>in</strong> HN for a certa<strong>in</strong> service; and which<br />

<strong>services</strong>/applications could be <strong>in</strong>terest<strong>in</strong>g to build on higher<br />

layers <strong>of</strong> the HNAC to manage the <strong>in</strong>termittent appearances<br />

<strong>of</strong> MS <strong>in</strong> <strong>WLAN</strong> islands.


1064<br />

P. P<strong>in</strong>to et al. / Computer Communications 29 (2006) 1055–1064<br />

Acknowledgements<br />

The authors would like to thank João Reis and Bernardo<br />

Alves for their work <strong>in</strong> help<strong>in</strong>g simulat<strong>in</strong>g the system.<br />

References<br />

[1] W. Lu, et al., 4G mobile communications: toward open wireless<br />

architecture, IEEE Wireless Communication 11 (2004) 4–6.<br />

[2] GPP TR 22.934 v6.2.0, Feasibility study on <strong>3G</strong>PP system to <strong>WLAN</strong><br />

<strong>in</strong>terwork<strong>in</strong>g (Release 6), 2003.<br />

[3] GPP TR 23.234 v6.1.0, <strong>3G</strong>PP system to <strong>WLAN</strong> <strong>in</strong>terwork<strong>in</strong>g, System<br />

description (Release 6), 2004.<br />

[4] A. Salk<strong>in</strong>tzis, et al., <strong>WLAN</strong>-GPRS <strong>in</strong>tegration for next-generation<br />

mobile data networks, IEEE Wireless Communication 9 (2002) 112–<br />

124.<br />

[5] A. Salk<strong>in</strong>tzis, Interwork<strong>in</strong>g techniques and architectures for<br />

<strong>WLAN</strong>/<strong>3G</strong> <strong>in</strong>tegration toward 4G mobile data networks, IEEE<br />

Wireless Communication 11 (2004) 50–61.<br />

[6] M. Steem, R. Katz, Vertical Hand<strong>of</strong>fs <strong>in</strong> wireless overlay networks,<br />

Mobile Networks and Applications 3 (1998) 335–350.<br />

[7] G. Wu, MIRAI architecture for heterogeneous network, IEEE<br />

Communications Magaz<strong>in</strong>e (2002) 126–134.<br />

[8] P<strong>in</strong>to, P., Bernardo, L., Sobral, P., UMTS-<strong>WLAN</strong> Service Integration<br />

at Core Network Level, Third European Conference on Universal<br />

Multiservice Networks (ECUMN’04), LNCS, Spr<strong>in</strong>ger, Heidelberg,<br />

vol 3262/2004, DOI: 10.1007/b101785.<br />

[9] J. Arkko, H. Haver<strong>in</strong>en, EAP AKA Authentication, Internet Draft,<br />

draft-arkko-pppext-eap-aka-12.txt, 2004.<br />

[10] L. Blunk, J. Vollbrecht, PPP extensible authentication protocol, IETF<br />

RFC 2284 (1998).<br />

[11] P. Mockapetris, Doma<strong>in</strong> names—implementation and specification,<br />

IETF RFC 1035 (1987).<br />

[12] A. L<strong>in</strong>dgren, Support for the PCF mode <strong>of</strong> IEEE 802.11 for ns-2.1b8,<br />

http://www.sm.luth.se/~dugdale/<strong>in</strong>dex/s<strong>of</strong>tware.shtml/.<br />

[13] EURANE—Enhanced UMTS Radio Access Network Extensions for<br />

ns-2 home page, http://www.ti-wmv.nl/eurane/.<br />

[14] J. Song, S. Lee, D. Cho, Hybrid coupl<strong>in</strong>g scheme for UMTS and<br />

wireless LAN <strong>in</strong>terwork<strong>in</strong>g, Vehicular Technology Conference 4<br />

(2003) 2247–2251.<br />

[15] S. Tsao, C. L<strong>in</strong>, “VGSN: a gateway approach to <strong>in</strong>terconnect<br />

UMTS/<strong>WLAN</strong> networks”, the 13th IEEE Int, Symp. on Personal,<br />

Indoor and Mobile Radio Communications, 1, Sept. 2002 (2002)<br />

275–279.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!