Unlicensed Mobile Access (UMA) : Introduction and Overview
Unlicensed Mobile Access (UMA) : Introduction and Overview
Unlicensed Mobile Access (UMA) : Introduction and Overview
Contents
Introduction History How it works Security Advantages & Disadvantages Service Deployment
UMA History
Development of UMA inspired by the rapid deployment of broadband and wireless LANs within homes. Wanted to create a high bandwidth, low-cost wireless access network. Several major leading mobile operators and network equipment vendors collaborated and formed the Unlicensed Mobile Access Consortium (UMAC), to promote the Unlicensed Mobile Access (UMA) technology and develop specifications for it.
Development
Companies Involved Cingular Motorola Nokia Sony Ericsson T-Mobile US These companies developed the first set of UMA specifications and published them in September 2004. The specifications were given to the 3 Generation Partnership Project (3GPP). Eight months later in April 2005, the specifications were included into their framework inside the 3GPP release 6 and renamed Generic Access Network (GAN).
rd
Timeline
Inside UMA
UMA protocol stored within the radio of the device. Tunnels through other radio layers to get to mobile network Requires an IP interface to connect to the internet IPsec module deals with tunnel to UMA controller
VoIP
Transferring voice over internet is a costly endeavor Codecs used in traditional VoIP clients are costly AMR (Adaptive Mult-Rate) used to provide cheap, effective transmission Same as used already on phones Already optimized for low power consumption
UMA SECURITY
AUTHENTICATION: Internet Key Echange version 2 (IKEv2) -choose your own algorithm Extensible Authentication Protocol (EAP)
UMA Security
CONFIDENTIALITY: IPsec
Confidentiality algorithms: 1. AES with 128bit key length 2. 3DES 3. NULL encryption
IPsec (IPv4): ----------------------------------------------------------------| new IP header | | original IP header| | |ESP |ESP | | (any options) |ESP| (any options) |TCP|Data|Trailer|Auth | ----------------------------------------------------------------|<------encrypted------------------->| |<-----authenticated-------------------->|
UMA Security
UMA Security
For Consumers
Single number for home and mobile calls Calls through wireless LAN's, can deploy your own home coverage Greatly reduced roaming charges
For Providers
Disadvantages
SERVICE DEPLOYMENT
A full site survey is necessary to determine coverage planning and WiFi channel planning The survey revolves around finding the RF characteristics of the weakest client in the network, specifically its transmit power Design Access Points to match Radio coverage of the dual-mode phone
WiFi performance is solely dependent on the phone's signal to the Access Points, similar to a phone's signal from the tower affecting calling ability
UMA Deployment
Wireless Control System gives support to standalone Access Points and also Wireless LAN Controller Wireless Control System also provides statistics on calls being made, WiFi Channel performance and coverage planning Access Points improve call quality and WiFi channel capacity to phones which are unable to to support 802.11 1n protocol