Title: Guest lecture at UNIK Challenges for the Mobile Operator
1Guest lecture at UNIKChallenges for the Mobile
Operator
- Josef Noll
- Telenor RD, Norway
- Research Manager
- josef.noll_at_telenor.com
2Challenges for the mobile operator
- New radio technologies ? traffic vanishes into
private networks - Services in WLAN/Bluetooth bands ? reduces
traffic in mobile network, e.g. BTs Bluephone - IP telephony ? will press the price down
- Mobile Instant Messenger ? reduces SMS/MMS
income
Today identify the challenges
3Other/open access networks
- New radio technologies ? traffic vanishes into
private networks - Services in WLAN/Bluetooth bands ? reduces
traffic in mobile network, e.g. BTs Bluephone - Expensive Mobile Network
- No way out
- Use the phone as authentication tool
- Move higher up in the value chain
4Service development
Mobile telephony
5Radio principles
- Noise Interference (e.g. multi-path) cause
- Delay constraint, Delay jitter, Bit error rate
- Bandwidth / throughput
- Availability, Reliability, Precedence (priority)
and service interruptions - Limited cell capacity, e.g. UMTS 700 kbit/s 1
Mbit/s
- C Capacity kbit/s
- P Signal Power
- W Bandwidth
- N0 Noise
6Expensive indoor coverage
UMTS download
WLAN, Bluetoothdownload
?wall 15-25 dB (UMTS)? range reduction to 1/3
7Future world multiple access
LMDS, DVB, DAB, WLL
SAT broadcast
GSM/GPRS, UMTS, 802.11, .16, .20, DECT
802.11, UWB DECT,BluetoothFireWire
DVB, FireWire
ISDN, xDSLfibre
CATV, el. power
8PAN/LAN characteristics
- ISM band 2.4 2.485 GHz
- 802.11 DSSS or FHSS, 2 Mbit/s
- 802.11b (WiFi) DSSS, 3 channels (26 MHz), 11, 5,
2 Mbit/s - 802.11g OFDM up to 22 Mbit/s
- Bluetooth 1 MHz channels FHSS, max 700 kbit/s
- HomeRF ( DECT data), - FHSS from 802.11- DECT
voice (TDMA) - ----------- not decided --------------
- 802.16 Broadband wireless
- 802.20 Flash OFDM
- License exempt band
- 5 GHz (5,15-5,35 5,47-5,725)
- 802.11a OFDM, max 54 Mbit/s(not Europe)
- Europe (ERC 1999) - DFS and TPC required
- Hiperlan/2 OFDM, QoS max 54 Mbit/s
- 802.11h 802.11a DFS, TPC
- ----------- both ----------------------
- 802.11d signal exchange between access points
- 802.11e QoS control
- 802.11i PKI security support
9Optimise accessEnable the Open Access Network
Open access network
GSM/GPRS
Subscribersfixed lines
Millions of fixed lines function asfeeder lines
for open pico-base stations
Personalised and broadband services
Supported by seamless authentication based on
the Mobile Phone
10Research challenges
- Understand radio characteristics of different
access systems - Mobile operator has no time, just buys systems
- Development cycle is much shorter
- Standardisation versus ad-hoc
- Interworking between radio systems
- Dedicated application layer?
- Pilot channel for all systems?
- Public system based on private xDSL access
- BT Bluephone, WiFi phone
- Open access challenges
- Broadband services in home network
11Provide appropriate security infrastructure
UMTS security radio encryptionWLAN 802.11i,
WPA, EAP/SIM
12WLAN 802.11 security
- EAP Extensible Authentication Protocol, uses
802.1x for sub-protocolls - EAP/TLS user and network can cross identify
(difficult with many users) - EAP/LEAP Cisco proprietary standard
- EAP/PEAP username/passwd based authentication
- EAP/SIM GSM or SmartCard for authentication
- WEB Wireless Equivalency Privacy (easy to get)
- TKIP Temporal Key Integrity, WEB key packing
and encryption - WPA wireless protected access, WiFi alliance
for TKIP distrib, standard from 1.1.2004 - AES, next generation standard encryption
replaces DES i USA, foreseen for 802.11i - WPA2, WPA with AES
- 802.1x port based access control
- 802.11i uses AES as advanced WEB for encrypted
connection
13The Mobile takes it all
SIM with RFID PKI
14Four-in-one Your mobile integrates them all
Patent pending
15The mobile is the key
Seamless authentication
16Research challenges
- Understand security of different access systems
- Access versus application security
- Application (scenario) based security
infrastructure - Identify security requirements for scenarios
- Establish global security, e.g. PKI
authorisation
17Challenges for the mobile operator
- IP telephony ? will press the price down
- Enabling Easy interfaces for "Mobile
Communications" (that's what we are best in) - Integrate Calendar, Contacts Call/SMS/IM
functionality. "My phone is easier to handle than
an IP phone". - Have desktop pages on the phone with automatic
update according to functionality. - Integrate the phone on the PC. If PC in
vicinity, the phone authenticates, and defines
the contacts/contact list.
18Mobile Instant Messenger challenges
- Mobile Instant Messenger ? reduces SMS/MMS
income - Use IM as basis for operator services
- Enhance Phone with presence information
- Enabling access to corporate data on the mobile.
Items security compatibility - Enter the vertical market with dedicated program
packages, e.g. Police reporting on the mobile
phone
19Conclusions
- The last time we were connected by a wire was at
birth! Motorola - No cable, thats the challenge
- Various radio systems GSM, UMTS WLAN,
Bluetooth, DVB, - Limitations battery, integration
- High data rates through close range
communications (inhouse) - Provide seamless login and security through SIM,
keep the customer