FIXED MOBILE CONVERGENCE - PowerPoint PPT Presentation

Loading...

PPT – FIXED MOBILE CONVERGENCE PowerPoint presentation | free to download - id: 70ef73-YzExN



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

FIXED MOBILE CONVERGENCE

Description:

FIXED MOBILE CONVERGENCE Sravanthi Suparna Swathi Shilpa – PowerPoint PPT presentation

Number of Views:39
Avg rating:3.0/5.0
Slides: 68
Provided by: labs157
Learn more at: http://www.cse.unt.edu
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: FIXED MOBILE CONVERGENCE


1
FIXED MOBILE CONVERGENCE
  • Sravanthi
  • Suparna
  • Swathi
  • Shilpa

2
Topics
  • Introduction
  • Architecture of FMC
  • Technologies in FMC
  • FMC with IP
  • FMC with IMS
  • FMC with SIP
  • FMC with UMA

3
Cellular Networks
  • Wide coverage
  • Large number of users
  • Low speeds (in kbps)
  • High deployment costs

4
Wired Networks
  • High speeds
  • High Band width
  • Low coverage
  • Inexpensive to set up

5
Fixed Mobile Convergence
  • Way of connecting wireless to wire line
    infrastructure
  • The ultimate goal of convergence is to deliver
    seamless experience across multiple locations,
  • multiple devices and
  • multiple types of use
  • (The Yankee group, Nov 2004)

6
Features of FMC
  • Multi N/w Deployment
  • (Referencehttp//www.baypackets.com/fixed_mobile_
    convergence.html)

7
Features of FMC
  • Unified Service of fixed and mobile n/ws with
    one phone, one number and one bill
  • Seamless roaming between cellular, Wi-Fi,
    Wi-Max and what ever wireless technology comes
    next.
  • More reliable mobile service with wider coverage
    at lower cost. Closer integration between public
    and enterprise phone networks.
  • Friendly user interfaces that makes it easy to
    make and manage calls (the user has a choice to
    select the type of network depending upon cost
    and convenience).

8
  • Friendly user interface that makes it easy to
    make and manage calls (the user has a choice of
    N/w depending upon chose and convenience).

9
Levels of FMC
  • Network Convergence Fixed/mobile networks
    physically share transportation infrastructure.
    (access N/w core N/w)
  • Commercial Convergence Resources of Fixed/mobile
    networks are pooled.
  • Service Convergence Seamless delivery of
    Fixed/mobile telephony and supporting services is
    achieved. (voice, IM, SMS)
  • Terminal Convergence

10
FMC Access technologies
  • Digital subscriber line (DSL)
  • 24 Mbps? downstream
  • 3 Mbps? upstream.
  • converged multimedia applications
  • Wireless local area network (WLAN)
  • low-cost, high-bandwidth
  • A user with WLAN access could be connected
    through appropriate multi-access (WLAN and
    cellular) terminals to the Internet, to the PSTN,
    or to mobile network(s).

11
FMC Access Technologies
  • Wireless Interoperability for Microwave Access
    (WiMAX)
  • Broadband wireless access (BWA). 2 - 11 GHz
    frequency band range(as per IEE specification in
    2004).
  • Unlicensed Mobile Access (UMA)roaming between a
    cellular network and fixed IP-based wireless
    networks .

12
FMC in some places include
  • Multi Media Messaging Service (MMS)
  • WLAN with CDMA service
  • Integrated Portal Service

13
Multi Media Messaging Service (MMS)
  • MMS allows mobile phone users send and receive
    messages with formatted text graphics,
    photographs and audio video clips.
  • With the integration of digital camera and mobile
    phone, MMS usage increases.

14
WLAN with CDMA
  • In a zone where an access point is established,
    subscribes use WLAN service. When the subscribers
    are out of zone, they use CDMA .
  • High speed, low price from WLAN
  • Wide coverage from CDMA

15
Integrated Portal Service
  • Integration of mobile and Web-based portals.
  • It provides aggregated content and services
    through a mobile Internet network.

16
Current Typical Solutions for FMC
  • IP-PBX or soft-switch with mobile n/w interface
  • IMS based coverage solution
  • UMA Dual Mode solution

17
What is IP-PBX???
  • The Internet Protocol Private Branch eXchange (IP
    PBX) is telephone switching equipment that
    resides in a private business instead of the
    telephone company.
  • An IP PBX delivers employees dial-tone, the
    ability to conference, transfer, and dial other
    employees by extension number as well as many
    other features. (Virtual Private Network
    Services..)
  • Voice transmissions are sent via data packets
    over a data network instead of the traditional
    phone network
  • Least Routing of cellular.
  • 3G ???(not applicable to 3G)

18
Converged Fixed-Mobile solution
Fixed N/W
IPPBX
IP Phone
WLAN AP
Mobile N/W
Dual Mode Device (IP-PBX client)
19
Reference http//www.nmscommunications.com/file/W
ebinarNov05 FixedMobileConvergenc
e.pdf
20
  • IP Enabled PBX functions on one device while on
    campus utilizing the WLAN (802.11 b/g)
    infrastructure.
  • Reduces on-campus and inter-campus calls.
  • Only with in campus
  • 3G????(not applicable because IP-PBX does not
    support)
  • (companies like Nokia, Avaya, Motorola use this
    technology).

21
IP Multimedia Subsystem
  • - Suparna

22
Introduction to IMS
  • IMS stands for IP Multimedia Subsystem
  • IMS is a key enabler of Fixed-Mobile Convergence
  • IMS is an architecture that merges the
    applications and capabilities of the Internet
    with both wireless and wire line telephony, and
    promotes fixed/mobile convergence.
  • An IMS/SIP approach enables both voice and data
    applications to run over IP, rather than locking
    it into the mobile carriers' legacy networks.

23
Layered Approach
  • Access Network
  • Transport ( Connectivity) layer
  • Core Network
  • Control Layer
  • Service Layer

24
IMS Architecture Overview
25
Functional Architecture
26
Horizontal Integration of IMS
27
Advantages of Horizontal Integration
  • Service Enablers and common functions can be
    reused for multiple operations
  • Operations competence required is more generic
  • Helps to provide interoperability and reaming and
    other such functions more economically to the
    consumer

28
Interoperability in IMS
29
Advantages over Existing Systems
  • The core network is independent of a particular
    access technology ( GSM, WCDMA, CDMA and also
    WLAN)
  • Integrated mobility for all network applications
  • Easier migration of applications from fixed to
    mobile users
  • Faster deployment of new services based on
    standardized architecture

30
Advantages over Existing Systems
  • New applications such as presence information,
    videoconferencing, Push to talk over cellular
    (POC), multiparty gaming, community services and
    content sharing.
  • Evolution to combinational services, for example
    by combining instant messaging and voice
  • User profiles are stored in a central location

31
Issues Related to IMS
  • Benefits need to be further articulated in terms
    of actual savings.
  • IMS is "operator friendly" which means that it
    provides the operator with comprehensive control
    of content at the expense of the consumer.
  • IMS uses the 3GPP variant of SIP, which needs to
    interoperate with the IETF SIP.
  • IMS is an optimization of the network, and
    investments for such optimization are
    questionable.

32
Substitution of legacy system
33
(No Transcript)
34
References
  • http//www.motorola.com/networkoperators/pdfs/new/
    IMS-WhitePaper.pdfsearch'IP20multimedia20subsy
    stem
  • http//www.ericsson.com/technology/whitepapers/ims
    _ip_multimedia_subsystem.pdf
  • http//www.insightcorp.com/ExecSummaries/fmc05Exec
    Sum.pdf
  • http//en.wikipedia.org/wiki/IP_Multimedia_Subsyst
    emBasic_Principles

35
FMC using SIP
36
FMC using SIP
  • FMC solutions aimed at wireline operators take an
    opposite approach from those aimed at wireless
    providers
  • Wireline-oriented FMC solutions are based on SIP
    standards
  • SIP approach has benefits since SIP has already
    entered the emerging wireless network (via 3GPP)
    and is inherently compatible with IMS
    architecture

37
INTRODUCTION to SIP
  • H.323 protocol
  • Session initiation protocol
  • SIP considered to be a simpler, more flexible
    alternative to H.323 with the ability to support
    advanced services.

38
What is SIP
  • SIP or Session Initiation Protocol is an
    application-level control protocol for setting
    up, changing and terminating multimedia sessions
    between participants on IP data networks.
  • SIP is a text-based protocol, similar to HTTP and
    SMTP, for initiating interactive communication
    sessions between users. Such sessions include
    voice, video, chat, interactive games, and
    virtual reality.

39
SIP Architecture
40
SIP Entities
  • User Agent
  • User Agent Client
  • User Agent Server
  • Proxy Server
  • Redirect Server
  • Registrar Server

41
How SIP works
  • Long distance calls through the traditional
    telephony
  • Telephony system works via a cog and wheel setup
  • SIP refers to a protocol that allows computers to
    talk to each other without going through a
    central station.
  • SIP is typically offered in two formats, computer
    based and hardware based

42
SIP based telephony
43
SIP Session Establishment and Termination
44
Services that SIP can provide
  • Call Hold
  • Consultation Hold
  • Unattended Transfer
  • Call forward on Busy/NoAnswer/Unconditiona
  • 3-Way Conference
  • Find-Me
  • Incoming/Outgoing Call Screening
  • Call Waiting

45
SIP structure
46
SIP based session management
47
SIP in IMS
  • The key technology behind IMS is the SIP protocol
  • Advantages of SIP
  • Simple
  • Extensible
  • Flexible
  • Familiar

48
SIP in IMS
49
SIP based FMC solution
50
SIP in FMC
  • FMC is likely to bring to reality the following
    scenarios hitherto considered impossible.
  • A cell phone user may start receiving calls on
    his SIP home phone when he enters his home,
    saving spectrum and charges for the home roaming
    usage. This kind of hand-off is both extremely
    non-intrusive and cost beneficial.
  • Enterprise subscribers may roam their mobile
    number into a business environment via one to
    many SIP devices. This may be offered by a
    service bureau as a managed service.

51
Contd
  • Enterprise subscribers may roam their mobile
    numbers in their enterprise network via one to
    several SIP devices. This further establishes
    that none of the existing infrastructure will be
    rendered a waste.
  • Mobile subscribers may continue enjoying all
    enhanced services available on their home PLMN
    networks in any roaming network they are visiting
    and on their landline networks as well.
  • Mobile subscribers may seamlessly roam between
    locations with calls transparently following them
    irrespective of whether they are in a cable zone
    or a public WiFi hot spot.

52
UMA
53
What is UMA?
  • Unlicensed Mobile Access
  • Unlicensed Mobile Access (UMA) technology
    provides access to GSM and GPRS mobile services
    over unlicensed spectrum technologies, including
    Bluetooth and 802.11.
  • It establishes a standard for seamless hand-off
    and roaming between a cellular network and fixed
    IP-based wireless networks .

54
UMA (Unlicensed Mobile Access)
  • UMA lets mobile operators deliver voice, data and
    IMS/SIP(IP Multi media Subsystem /Session
    Initiated Protocol) applications to mobile phones
    on Wi-Fi access network using dual-mode mobile
    handsets.
  • In order to promote the widespread adoption of
    UMA technology, a number of leading companies
    within the wireless industry have jointly
    developed a set of open specifications.


55
UMA Protocols
  • UMA is on top of it at the transport layer (Layer
    4) and has its own set of control protocols .

56
UNC
  • The UMA specification is based around UNC.
  • What is UNC???
  • A UMA Network Controller (UNC) acts as a
    virtual base station,
  • providing handoff
  • between cellular
  • and Wi-Fi networks.

57
Cellular /UMA
58
How UMA Technology Works
  • A mobile subscriber with a UMA-enabled, dual-mode
    handset moves within range of an unlicensed
    wireless network to which the handset is allowed
    to connect.
  • Upon connecting, the handset contacts the UMA
    Network Controller (UNC) over the broadband IP
    access network to be authenticated and authorized
    to access GSM voice and GPRS data services via
    the unlicensed wireless network.

59
(Contd..)
  • If approved, the subscribers current location
    information stored in the core network is
    updated, and from that point on all mobile voice
    and data traffic is routed to the handset via the
    Unlicensed Mobile Access Network (UMAN) rather
    than the cellular radio access network (RAN).

60
Roaming
  • When a UMA-enabled subscriber moves outside the
    range of an unlicensed wireless network to which
    they are connected, the UNC and handset
    facilitate roaming back to the licensed outdoor
    network. This roaming process is completely
    transparent to the subscriber.

61
Handover
  • Handover in
  • The mobile station moves from macro network to a
    UMAN.
  • Handover out
  • The mobile station moves from UMAN to macro
    network.
  • Handover UMA
  • The mobile station moves with in a UMAN or from
    UMAN to UMAN.

62
Handoff Specifications
  • Subject to mode selection, UMA shall support
    seamless handover in and handover out ,provided
    the following conditions are true
  • The mobile station stays within the limits of
    service (pedestrian state of motion)
  • The mobile station remains during the time of
    handover within the coverage of both the
    networks.
  • UMA shall manage bandwidth during handover
    between macro network and UMAN.

63
(No Transcript)
64
Security in UMA
  • Different security mechanism operate at
    different levels
  • MS to AP UMA does not mandate any security
    mechanism, but can coexist with those available,
    such WPA, WPA2, or WEP.
  • MS to UNC The UNC includes a security gateway
    that provides mutual authentication and
    encryption for the traffic across the WLAN and
    the broadband connection.
  • MS to core mobile network The encryption and
    authentication methods used by the MS when using
    the GERAN are also used to protect UMA
    connections.
  • MS to application server An additional
    end-to-end data application mechanism (for
    example, HTTPS) may be used if needed.

65
Advantages Availability Pricing
  • UMA could be used to provide better in-building
    coverage for customers who don't get a good
    cellular signal in some areas, including
    basements.
  • It enables service providers to deliver voice at
    a lower cost when handsets are within range of an
    unlicensed wireless network.

66
Issues
  • If a customer doesn't have a wireless network
    already in the house, a wireless access point
    would be needed in addition to a broadband link .
  • The most expensive and technologically
    challenging component of UMA solution is the
    Wi-Fi and cellular handset, because of
    battery-life limitations, cost, and size .
  • UMA cannot guarantee the quality of a voice call
    or the throughput of a data connection and
    traffic prioritization with QoS can significantly
    improve performance, especially in a residential
    environment where traffic is likely to be less
    heavy than in the enterprise.

http//www.arcchart.com/blueprint/show.asp?id368
67
Conclusion
  • FMC will mean a greater flexibility, more
    freedom, lower costs and simplified
    communications and is more advance than many
    other technologies by giving the user best of
    both worlds.
About PowerShow.com