Key Technologies and Architectures h l d A h for Next Generation - - PowerPoint PPT Presentation

key technologies and architectures h l d a h for next
SMART_READER_LITE
LIVE PREVIEW

Key Technologies and Architectures h l d A h for Next Generation - - PowerPoint PPT Presentation

Key Technologies and Architectures h l d A h for Next Generation Mobile Networks Krishan K. Sabnani, SVP , Networking Research, Bell Labs August 27, 2007 The Network Evolution Yesterday Today Networks were designed to


slide-1
SLIDE 1

h l d A h Key Technologies and Architectures for Next Generation Mobile Networks

Krishan K. Sabnani, SVP , Networking Research, Bell Labs August 27, 2007

slide-2
SLIDE 2

The Network Evolution

Yesterday… … Today…

Volume of data traffic exceeds voice traffic

  • Networks were designed to

carry voice traffic

  • Data traffic mostly overlaid
  • Networks are designed to

carry primarily data traffic

  • V
  • ice traffic overlaid on
  • Data traffic mostly overlaid
  • n voice networks (using

modems)

  • V
  • ice traffic overlaid on

data networks (e.g. V

  • IP)

… Tomorrow…

Content traffic becomes dominant

  • Future networks should be designed primarily for efficient content distribution

and content search/location Content distrib tion sho ld not onl be o erlaid b t b ilt in from gro nd p — Content distribution should not only be overlaid, but built in from ground up

  • Future networks should also be able to effectively carry best-effort data traffic and

QoS-sensitive multimedia traffic

2 ACM MobiArch | Aug 27, 2007

slide-3
SLIDE 3

BT’s Current UK Network

PSTN

PSTN

Leased lines

Copper

ATM

DSL KStream PDH access

IP

Fibre

SDH

SDH VC-12

access

PDH

access PDH access

MSH -SDH

SDH VC-4 PDH End U ~5.5k i ~2k ~300 i ~100 i ~15 i ~1k

3 ACM MobiArch | Aug 27, 2007

User sites sites sites sites sites sites

slide-4
SLIDE 4

BT’s Simplified 21CN UK Network

Multi-service access Converged core Copper

Class 5 Call Server

IP-MPLS-WDM

DSL

Fibre &

WWW

Copper

Agg Box

Content ISP

Wireless Wireless

End ~5.5k ~100

4 ACM MobiArch | Aug 27, 2007

User sites sites

slide-5
SLIDE 5

Tomorrow’s Converged Network

R di A

Enterprise Networks 3G Cellular Networks

Radio Controller Access Router

Networks

Quality

  • f Service

( f i ) Edge Router

Al O

A

Next-Gen Metro N t k

(e.g. for voice) QoS-Enabled Services Enablement Layer

Always-On Global Roaming

Edge Access Router

Networks

Packet Core Network Edge Router Router

Home Networks

User Mobility

Network Intelligence

Router

Personalization

Access Router

4G/Mesh

Traffic Type (Multimedia)

5 ACM MobiArch | Aug 27, 2007

slide-6
SLIDE 6

Enabling Technologies

  • Future Telecom Networks will need secure, quality-enabled, high-

speed, and well-managed converged packet cores

  • Bell Labs has several breakthrough programs to enable this change.

Here are three examples:

S f R A hi d l i h i d l i f d

  • S
  • ftRouter: A new architecture to deal with increased complexity of data

networking

  • Base S

tation Router: An access router which terminates all radio network processing

  • AWARE S

ystem for Wireless DDoS Defense

6 ACM MobiArch | Aug 27, 2007

slide-7
SLIDE 7

Enabling Technologies

  • Future Telecom Networks will need secure, quality-enabled, high-

speed, and well-managed converged packet cores

  • Bell Labs has several breakthrough programs to enable this change.

Here are three examples:

S f R A hi d l i h i d l i f d

  • S
  • ftRouter: A new architecture to deal with increased complexity of data

networking

  • Base S

tation Router: An access router which terminates all radio network processing

  • AWARE S

ystem for Wireless DDoS Defense

7 ACM MobiArch | Aug 27, 2007

slide-8
SLIDE 8

Routers Are Becoming Increasingly Complex

email WWW phone... SMTP HTTP RTP... TCP UDP

Complexity is an IP “ Middle-Age” problem!

IP provides end-to-end datagram delivery service to

TCP UDP… IP Ethernet PPP…

p g y protocols/ applications

IP can use any link-layer technology that delivers packets

CSMA async sonet... copper fiber radio...

Emerging Applications are driving more functions into IP

, expanding the “ waist” of the IP hour glass

email WWW phone

Router vendors incorporate all new IP functions into

routers C l it i d th h t th t k

email WWW phone... SMTP HTTP RTP... TCP UDP…

mobile mcast NAT

Complexity is spread throughout the network

Achieving network-wide obj ectives such as traffic

engineering requires complex translation of global

IP Ethernet PPP… CSMA async sonet...

IP

mobile mcast IPSec diff-serv

engineering requires complex translation of global

  • bj ectives to configuration information in numerous

individual routers

Misconfiguration or uncoordinated configuration can

8 ACM MobiArch | Aug 27, 2007

copper fiber radio...

g g result in poor performance or even network instability

slide-9
SLIDE 9

Solution: SoftRouter

Disaggregation of router hardware from software addresses this problem and has the potential for maj or additional advantages problem and has the potential for maj or additional advantages

Bell Labs has a research program that disaggregates router control and

transport planes (called S

  • ftRouter-based approach)

Transport plane: packet forwarding element Control plane: control element server and feature server

p

Control element servers and transport plane communicate using standard

protocols

Approach similar to S

  • ftS

witch-based disaggregation of class 5 switches

9 ACM MobiArch | Aug 27, 2007

slide-10
SLIDE 10

SoftRouter: New Router Architecture

Decoupling: S

eparate complex control plane processing from the transport plane S I l t t l l i f ti d di t d

Servers: Implement control plane processing functions on dedicated

external control plane servers

Standard Interface: Define standard protocol for control plane servers to

p p interface to the forwarding elements

Proprietary API

Control plane processing Feature Server Control Element Server

API

processing

Standard protocol

Forwarding plane processing

Transport Plane

Packet Forwarding Element

10 ACM MobiArch | Aug 27, 2007

Current Router Model SoftRouter Model

slide-11
SLIDE 11

Enabler for Chaining Packet Processing Services

Unix allows processing to be composed via “ pipes”

cat infile > prog1 | prog2 | prog3 > outfile

Vision of packet services processing Vision of packet services processing service cards + service chaining = “ network pipes”

Packet S ervice 1 Packet S ervice 2 Packet S ervice 3 Card 3 Card Card 3 Service C L2/L3 Service Service L2/L3

11 ACM MobiArch | Aug 27, 2007

slide-12
SLIDE 12

Comprehensive Service Management

Reprogrammable service cards + reconfigurable service routing allow flexible composition of edge functions flexible composition of edge functions Bell Labs S

  • lution built around service routing

Allows easy configuration fault performance management for edge Allows easy configuration, fault, performance management for edge

services

Configuration: on demand loading of services and definition of service

g g chains

Fault: active detection and recovery of faulty “ services” Performance: resource control and statistics on current service

performance

12 ACM MobiArch | Aug 27, 2007

slide-13
SLIDE 13

Service Chaining Primitives

A service chain specifies an ordered sequence of services to be performed for a packet flow Abstractly, a service chain is defined by composing individual apps using AND or OR operator

app2 app2

and

app1

  • r

app1 app3 app3

Packets should be duplicated to both app2 and app3 – flow replication Packets should be sent to either app2

  • r app3 on a flow basis – load balancing

13 ACM MobiArch | Aug 27, 2007

Note: Pt-to-pt case is a degenerate case of either, packet leaving app1 should go to app2

slide-14
SLIDE 14

Example Service Chain

app5 app6

d

app3 app4

  • r

app7

and

app2 app1 app5 app6 app8 app9 app10

14 ACM MobiArch | Aug 27, 2007

slide-15
SLIDE 15

Example Application: Integrated Edge Packet Processing

Security:

Stop attacks to

y packet filtering/ DDoS protection IP S ervices Platform with programmable services card loaded with packet processing applications

Stop attacks to and from mobiles

Control: P2P control/

Control services a

P2P control/ Bandwidth mgmt

mobile receives

Application Acceleration/Enhancement:

Enhance application experience

Acceleration/Enhancement: Transcoding/Caching/Voice Quality

experience

15 ACM MobiArch | Aug 27, 2007

slide-16
SLIDE 16

Enabling Technologies

  • Future Telecom Networks will need secure, quality-enabled, high-

speed, and well-managed converged packet cores

  • Bell Labs has several breakthrough programs to enable this change.

Here are three examples:

S f R A hi d l i h i d l i f d

  • S
  • ftRouter: A new architecture to deal with increased complexity of data

networking

  • Base S

tation Router: An access router which terminates all radio network processing

  • AWARE S

ystem for Wireless DDoS Defense

16 ACM MobiArch | Aug 27, 2007

slide-17
SLIDE 17

Base Station Router: Push Intelligence to the Edge

Current wireless networks are complex, involving many network elements, and result in high cost and high latency Base S tation Router terminates all air-interface-specific functions in the base Base S tation Router terminates all air-interface-specific functions in the base station

Packet b kh l

Telephone

O

Mobile Switching Center Base Station

O

Radio Controller backhaul

circuit voice

Telephone Network

O

Mobile Router Packet Backhaul

packet data

O

Mobile Router

Internet

Base Station

Collapsing Radio Access Network elements into the base station simplifies network and reduces latency Pushing IP intelligence to the base station results in

Base Station Router

17 ACM MobiArch | Aug 27, 2007

g g better Quality of Service support

slide-18
SLIDE 18

BSR: Flattening the Network

GTP

Gateway IP Network

GRE MM/SM/CC GTP U IP TCP/UDP GTP GTP TCP/UDP IP

Gateway Switch Node Serving S it h

GRE Tunnel

MoIP HA IP Switch

GRE UDP IP RLC MAC PDCP RRC GTP-U UDP IP AAL5 IP UDP GTP-U GTP

Switch Node Radio

RRC MM/SM/CC IP UDP GRE GRE Tunnel

IP Switch

FP AAL2 ATM AAL2 ATM AAL5 ATM ATM

Radio Network Controller

RLC MAC PDCP RRC MAC-HS FP MAC-HS L1

Base Station

C S L1 L1 MAC-HS

Base Station Router

L1 MAC-HS

Mobile Terminal

MAC-HS MAC RLC PDCP RRC MAC-HS MAC RLC PDCP RRC

Mobile Terminal

18 ACM MobiArch | Aug 27, 2007

MM/SM/CC IP MM/SM/CC IP

slide-19
SLIDE 19

BSR: Flattening the Network

GTP

IP Network

GRE MM/SM/CC GTP U IP TCP/UDP GTP GTP TCP/UDP IP

GGSN SGSN

GRE Tunnel

MoIP HA IP Switch

GRE UDP IP RLC MAC PDCP RRC GTP-U UDP IP AAL5 IP UDP GTP-U GTP

SGSN

RRC MM/SM/CC IP UDP GRE GRE Tunnel

IP Switch

Access-specific functions at the edge

FP AAL2 ATM AAL2 ATM AAL5 ATM ATM

RNC

RLC MAC PDCP RRC MAC-HS

Local multimedia or

Location-Based-S ervices servers

FP MAC-HS L1

Node B

C S L1 L1 MAC-HS

BSR

L1 MAC-HS

Easier deployment and integration with wireline services Improved fault tolerance and reliability

UE

MAC-HS MAC RLC PDCP RRC

UE

MAC-HS MAC RLC PDCP RRC

19 ACM MobiArch | Aug 27, 2007

MM/SM/CC IP MM/SM/CC IP

slide-20
SLIDE 20

Benefits of Flattening the Network – Driving Simplicity

Lower latency due to flat IP architecture Fewer bottleneck nodes as traffic is offloaded Capex, Opex optimization Centralized aspects confined at IP layer for lower scaling cost Future-proof technology innovation S i lifi l ti t IMS d LTE Centralized aspects confined at IP layer for lower scaling cost S implifies evolution to IMS and LTE

BSR integrates all

  • f this into a single

box

20 ACM MobiArch | Aug 27, 2007

slide-21
SLIDE 21

Key Differentiators: Full Plug & Play

Step 0 : Factory

Product identifications are programmed and labeled

Step 3 : Plug the Femto

P th F t p g (bar code and identification)

Step 2 : Subscription Confirmed

Power-on the Femto Auto-Configuration procedures starts:

  • A. Initialization to connect to BSR

Gateways

  • B. Authentication

Step 2 : Subscription Confirmed

End user receives confirmation of the subscription and login information

  • C. Auto-configuration of initial

parameters

  • D. Check Femto location
  • E. Registration of authorized

terminal

Step 1 : User’s Subscription

Th b ib t information Includes the Femto if he/she had subscribed by web terminal

Step 4 : Femto is working !

U i fi ti The user subscribes to the service (in a shop or

  • n the web)

He/she selects the type

  • f CPE and service set

User receives a confirmation call or SMS on his mobile Register up to 16 terminals He/she fill-in his/her personal details

21 ACM MobiArch | Aug 27, 2007

FemtoBSR System fully integrated in Customer’s IT to enable Plug & Play

slide-22
SLIDE 22

Key Differentiators: Security Architecture

Future picocells and femtocells will be deployed in non-secured locations (homes, public locations, etc) Need a secure environment inside the cell where trust related functions can be Need a secure environment inside the cell where trust -related functions can be safely executed, eg:

  • Cell and user authentication
  • Integrity checks for signaling and control messaging

CELL SITE VAUL T

  • Integrity checks for signaling and control messaging
  • Secure key storage
  • Data encryption

Home Agent

Public/private IP network

CELL SITE VAUL T

  • Shared secret

key

inter-cell site

Secure Tunnels

Signaling &

MoIP

Protocol

Authentication Center

Keys

Signaling

Protocol

SIM

Signaling & Control Bearer path Keys inter-cell site

stack Stack

Bearer path

The Cellsite Vault is a tamper resistant trusted computing and storage environment

22 ACM MobiArch | Aug 27, 2007

The Cellsite Vault is a tamper-resistant, trusted, computing and storage environment within the BSR for where all security-related functions are safely performed

slide-23
SLIDE 23

Lucent Technologies' Base Station Router Receives CTIA Emerging Technology Award

Revolutionary Product Takes Top Honors for Most Innovative In- Building Solution

LAS VEGAS – Lucent Technologies (NYS E:LU) today announced that its Base S tation Router (BS R) product was selected as the first place winner of a CTIA WIRELES S 2006 Wireless Emerging Technologies (E-tech) Award in the category of WIRELES S 2006 Wireless Emerging Technologies (E tech) Award in the category of “ Most Innovative In-Building S

  • lution.” Award recipients were announced

yesterday in a ceremony at the Las Vegas Convention Center during the CTIA WIRELES S trade show. The Wireless E-tech Awards program is designed to give industry recognition and exposure to the best wireless products and services in the areas of Consumer, Enterprise and Network technology Nearly 200 applications were submitted and Enterprise and Network technology. Nearly 200 applications were submitted and reviewed by a panel of recognized members of the media, industry analysts and executives, as well as select show attendees. Products were j udged on innovation, functionalit y, technological importance, implementation and overall , y, g p , p “ wow” factor.

23 ACM MobiArch | Aug 27, 2007

slide-24
SLIDE 24

Enabling Technologies

  • Future Telecom Networks will need secure, quality-enabled, high-

speed, and well-managed converged packet cores

  • Bell Labs has several breakthrough programs to enable this change.

Here are three examples:

S f R A hi d l i h i d l i f d

  • S
  • ftRouter: A new architecture to deal with increased complexity of data

networking

  • Base S

tation Router: An access router which terminates all radio network processing

  • AWARE S

ystem for Wireless DDoS Defense

24 ACM MobiArch | Aug 27, 2007

slide-25
SLIDE 25

Wireless Data Networks Subject to Existing and New Types of Attacks

Complex Signaling Mobile Endpoint

New Network

Finite Air Resources

Network Constraints

Internet

HA PDSN RNC

BTS

HA ASN

BTS

WiMax EV-DO

GGSN

Internet

SGSN RNC

BTS

HA PDSN RNC

BTS

UMTS

New Network

  • Spam
  • Virus

Existing IP Threats New Wireless Threats

  • Signaling DoS
  • Battery Drain

Network Vulnerabilities

  • Virus
  • Worms
  • Malware
  • Phishing
  • Battery Drain
  • RF DoS
  • Paging Attacks
  • Wireless unfriendly

25 ACM MobiArch | Aug 27, 2007

Phishing

  • DDoS
  • Wireless-unfriendly

apps (e.g. P2P)

slide-26
SLIDE 26

AWARE: A Bell Labs 3G/4G Wireless Security Solution

Home PDSN RNC BTS

Inline Mitigation

Agent

Internet

PDSN RNC BTS

A A

Mi i i i li

Aware Detector Aware Central EMS

  • AWARE Detector is a behavioral based packet inspection engine with

Mitigation signaling

  • AWARE Detector is a behavioral-based packet inspection engine with

algorithms tuned to the specifics of the wireless network architecture & protocols W h d l d l ith b d t ffi fili d t ti ti l

  • We have developed algorithms based on traffic profiling and statistical

models that can detect low volume wireless DoS attacks

  • The system detects and mitigates traffic that will cause RNC signaling

l d i li k i l d d

  • verload, unnecessary airlink usage, paging overload, and unnecessary

subscriber battery drain

  • Mitigation: signaling to inline elements to block unwanted traffic and mobile

26 ACM MobiArch | Aug 27, 2007

quarantine to remove infected or malicious mobile from wireless network

slide-27
SLIDE 27

Denial of Service - Signaling Attacks on 3G Networks

Structure of Signaling Overload

Internet

Attack leverages active

mobile sessions in the network Wireless Core

RNC

S

mall amounts of data are sent to re-initiate the session after it is released Core

Bearer Path

BTS

causing extra signaling load

Impact

Signaling

Impact

g g Path

Low-volume attack

generates signaling ti t th RNC congestion at the RNC

Overload of the RNC will

result in a denial of service b ib

27 ACM MobiArch | Aug 27, 2007

to subscribers

slide-28
SLIDE 28

Denial of Service - Battery-Drain and RF Channel Exhaustion

Internet

Structure of a

Attack leverages active

Wireless Core

Structure of a Battery-Drain Attack

RNC RNC

Attack leverages active

mobile sessions and sends packets to prevent transition to dormancy Core

Bearer Path

BTS

transition to dormancy (e.g., low volume 40 bytes every 10 seconds)

Signaling

Attack in Progress

Wastes radio resources

Impact

g g Path

400 500 600 t (m A

Wastes radio resources

Drains mobile battery

100 200 300 Current

Attack Mitigated Dormant

28 ACM MobiArch | Aug 27, 2007

0:00 0:30 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 5:30 6:00 6:30 7:00 7:30 8:00 8:30 9:00 9:30 Tim e (m inutes:seconds)

slide-29
SLIDE 29

Battery Drain on live UMTS Wireless PC Card

Observed affect on energy consumption due to unwanted traffic

300

ALU-launched battery- External scans induced Observed affect on energy consumption due to unwanted traffic coming from various Internet sources and other mobiles

250

ALU launched battery drain attack External scans induced battery drain

200

mA)

` 150

Current (

50 100 50

29 ACM MobiArch | Aug 27, 2007

0:00 1:00 2:00 3:00 4:00 5:00 6:00 7:00 8:00 9:01 10:01 11:01 12:01 13:01 14:01 15:01 16:01

Time (minutes:seconds)

slide-30
SLIDE 30

Recent Abuse Observed on North American Carrier’s 3G Network

Detection Evasion: need to identify subscriber not IP address One subscriber’s abusive behavior:

Uploaded 1GB / Downloaded 3.5GB S

ame subscriber’s mobile used 24 different IP address when performing scans on other mobiles

Communicated with P2P sites - 5k

eDonkey & 37k Gnutella sites Malfunction Device Impact

  • n Wireless Network:

O 3G k Worms and Port Scans (attempt/response)

R lt i i ifi t t d i

One 3G network was

continuously experiencing Denial of S ervice overloads

Result in significant wasted air resources

Port 135: 10+ different worms (31,213 / 2,326) Port 137: Chode worm (135,483 / 2925)

due to a malfunctioning air card S l th

Port 139: 10+ different worms (59,698 / 4063) Port 1026: MS

message spam (67,034 / 436) ll f b kd

S

everal man-months were required to identify the device

Port 5900: install of backdoor program, (96,159 / 2,380) Mobile scanner: scans 4426 mobiles on 6 different ports

30 ACM MobiArch | Aug 27, 2007

slide-31
SLIDE 31

Conclusions

M l i di i h j d i f k

  • Multimedia content is the maj or driver for next-gen networks.
  • These networks have to be QoS
  • enabled, reliable, secure, and

manageable manageable.

  • Bell Labs has several programs to enable the mobile networks of the

future: S

  • ftRouter, Base S

tation Router, and AWARE DDoS System. , , y

  • Mobile networking has a truly exciting future.

31 ACM MobiArch | Aug 27, 2007