You are on page 1of 4

ACTSLINE Guideline Summary NIF-G2

The Integration of Fixed and Mobile Networks


in a B-ISDN Environment
A number of ACTS projects have tested the strategies needed for network evolution as we move towards
integrated fixed and mobile networks. The experiences of these projects have been brought together in a
Guideline entitled The Integration of Fixed and Mobile Networks in a B-ISDN Environment . The
guideline is one of a series covering the interworking and integration of fixed and mobile networks and
services and describes the integration of Radio Access Networks (RANs) with the core network.
The number of different combinations of networks which is possible as we evolve from the current
separate, but interconnected networks, to integrated networks is vast. For that reason, the study
concentrated on the areas of most interest to Europe. It ignored any networks which were exclusively nonEuropean and it concentrated on DECT and GSM in the access network, and ISDN and ATM in the core
network.
The guideline looked at:
Network architecture
Capabilities needed in terminal equipment
The provision of services
Security problems
Charging problems

Network architecture
Complete integration of fixed and mobile networks may result in a structure based on a Generic Radio
Access Network (UMTS RAN), a backbone transport network (UMTS CN) and a service network . This
will replace the many existing boundaries between current network types such as GSM, DECT, ISDN,
PSTN and ATM.
The target architecture for future networks resulting from the integration of former fixed and
mobile networks should be based around GMM (Global Multimedia Mobility and UMTS
(Universal Mobile Telecommunication System).
During the transition from current networks to this integrated network, there will be interface problems.
To solve these problems a generic interface (Iu) between radio access networks and core networks has
been defined. On the access network side the adaptation to this interface will be part of the access
network, while the interworking to the different types of core networks will be performed in dedicated
interworking units (IWU), as shown in fig. 1.

Page 1 of 4

ACTSLINE Guideline Summary NIF-G2

UMTS

UMTS

DECT

DECT DECT RAN Iu I/F

GSM
MT

Iu

UMTS RAN

GSM
Air I/F

GSM RAN Iu I/F

RFP

RAN

UMTS CN

IWU
B-ISDN

Bu

IWU
N-ISDN

Nu

IWU
PDN

Pu

IWU
GSM
IWU

B-ISDN/UMTS CN

N-ISDN/UMTS CN

PDN/UMTS CN

Au /
Gbu

GSM/UMTS CN
CORE NETWORK

Fig. 1: UMTS/GMM reference configuration with a generic Iu-interface between the access
network and the core network
Key: CN: Core network, IWU: interworking unit, RAN: radio access network, RFP: radio fixed
part, MT: mobile terminal

Network equipment re-use


Service providers and network operators (and users, to a certain extent) have invested a huge amount of
capital from which they need to continue to earn revenue. In a similar way, a lot of work will be carried
out in the interworking phase which the subsequent system integration phase should benefit from. It is
expected that most of the interworking units will become part of the integrated system, for economic
reasons as well as technical reasons.
For these reasons, existing network resources and service implementations must be re-used
whenever possible. Experience and equipment from the network interworking phase should
also be used whenever possible.

Services
Service providers need to create new services in an economic way in heterogeneous networks in a multi
operator environment. The use of a client/server approach or an Intelligent Network (IN) based approach
allow for clear separation between the network operator and the service provider.
Services should be provided either by using the Client/Server approach or by the IN-based
approach. The relevant interface specifications should be provided to service providers.
Integrated networks offer a greater scale of services than any individual separate network. The
communication cost for the user will depend on the number and types of services used. To minimise such
cost, the user should be in a position to increase/decrease the number and type of services he is using at
any one time. However, this has to be within limits imposed by the contract the user has with the service
or network provider.

Page 2 of 4

ACTSLINE Guideline Summary NIF-G2


Users must be able to modify their profile according to a level of authorisation agreed in the
contract.

Terminal mobility
A fundamental feature of integrated networks will be the ability to move between different networks. This
problem can be solved between selected networks (e.g., between DECT and GSM) by duplicating different
elements within a single terminal, but more general solutions can be seen in the emerging Software Radio
development. Software Radio allows the terminal to automatically adapt its behaviour to the actual radio
environment.
It must be possible for mobile terminal devices to move between heterogeneous networks.
Most current systems are dedicated to a very limited set of services, and follow a single standard. Hence
there is only need for a relatively low number of different terminal and equipment types. However,
integrated systems will offer a large variety of different terminals and other items of equipment due to the
increased scale of services and service features.
Users will not be prepared to carry out complicated processes to set-up their equipment for the particular
system they are connected to.
It must be possible to easily connect multi-system equipment to a system ("plugnplay").

Security of information
Sensitive data is more at risk in integrated systems than it is in separate systems. Some of the reasons are
the more complex and difficult to monitor system structures, a wider user base, a wider range of complex
services, and increased data traffic which is vulnerable to commercial espionage.
For these reasons, the use of integrated networks requires a higher standard for data protection than
current networks. This will inevitably be costly and varying degrees of protection will be needed for
different users and services. The user should be given the chance to adapt the security level to his actual
type of communication.
It must be possible to guarantee a high degree of security and privacy which might be changed
(increased or decreased) by the user during actual usage. This also includes authentication,
ciphering, integrity, key management, etc.
Integrated networks are likely to carry some data which is so sensitive that its level of security must be
protected at all times. An example might be train control information carried for railways. In such a case,
end-users must not be able to change the level of security applied to the information, since this could be
vulnerable to malicious intervention. There is thus a need to lock the level of security for some types of
information.
It must be possible to guarantee a high degree of transmission and data safety which should
not changed (increased / decreased) by the user during actual usage; this also includes typical
privacy and security features such as authentication, ciphering, etc.

Charging
The user must be in a position to have a view of his actual communication costs at any time. No hidden
cost increases (eg a change to routing) can be allowed, at least without informing the user about this fact.
Part of a clear cost overview is the rendering of account only by one service provider. This means that

Page 3 of 4

ACTSLINE Guideline Summary NIF-G2


each customer will expect one stop shop dealing with the network and will not expect to separately pay
all the individual providers of the different parts of his service..
It must be possible for the user to keep a view of the actual charging situation as well as
receiving his bills from one service provider.
In integrated networks., the number of features (e.g., Quality of Service, service types, bandwidth, etc.) is
much higher than in current networks and must be taken into account for the bill. This requires a flexible
negotiation system when setting-up the call, where the user can pre-define a number of communication
parameters (and pay for them). This will also require automatic screening and tracing systems built in and
distributed in the integrated network(s).
It must be possible to introduce a tariffing system which takes into account all actual service
parameters (e.g., Quality of Service, used bandwidth, duration, distance, etc.).

Conclusions
The transition from the current disparate networks to integrated fixed and mobile networks is feasible.
However, it introduces a higher level of complexity in management than we currently have.
For this integration to be successful, we need to define and develop:
Interworking units
Client/server or IN-based services
Terminals which can seamlessly move between networks
Security and charging systems which can cope with the added complexity
More details of the ACTS guidelines can be found at
http://www.infowin.org/ACTS/ANALYSYS/CONCERTATION/glindex.htm

Wes Carter
ACTSLINE

Page 4 of 4

You might also like