Professional Documents
Culture Documents
Network architecture
Complete integration of fixed and mobile networks may result in a structure based on a Generic Radio
Access Network (UMTS RAN), a backbone transport network (UMTS CN) and a service network . This
will replace the many existing boundaries between current network types such as GSM, DECT, ISDN,
PSTN and ATM.
The target architecture for future networks resulting from the integration of former fixed and
mobile networks should be based around GMM (Global Multimedia Mobility and UMTS
(Universal Mobile Telecommunication System).
During the transition from current networks to this integrated network, there will be interface problems.
To solve these problems a generic interface (Iu) between radio access networks and core networks has
been defined. On the access network side the adaptation to this interface will be part of the access
network, while the interworking to the different types of core networks will be performed in dedicated
interworking units (IWU), as shown in fig. 1.
Page 1 of 4
UMTS
UMTS
DECT
GSM
MT
Iu
UMTS RAN
GSM
Air I/F
RFP
RAN
UMTS CN
IWU
B-ISDN
Bu
IWU
N-ISDN
Nu
IWU
PDN
Pu
IWU
GSM
IWU
B-ISDN/UMTS CN
N-ISDN/UMTS CN
PDN/UMTS CN
Au /
Gbu
GSM/UMTS CN
CORE NETWORK
Fig. 1: UMTS/GMM reference configuration with a generic Iu-interface between the access
network and the core network
Key: CN: Core network, IWU: interworking unit, RAN: radio access network, RFP: radio fixed
part, MT: mobile terminal
Services
Service providers need to create new services in an economic way in heterogeneous networks in a multi
operator environment. The use of a client/server approach or an Intelligent Network (IN) based approach
allow for clear separation between the network operator and the service provider.
Services should be provided either by using the Client/Server approach or by the IN-based
approach. The relevant interface specifications should be provided to service providers.
Integrated networks offer a greater scale of services than any individual separate network. The
communication cost for the user will depend on the number and types of services used. To minimise such
cost, the user should be in a position to increase/decrease the number and type of services he is using at
any one time. However, this has to be within limits imposed by the contract the user has with the service
or network provider.
Page 2 of 4
Terminal mobility
A fundamental feature of integrated networks will be the ability to move between different networks. This
problem can be solved between selected networks (e.g., between DECT and GSM) by duplicating different
elements within a single terminal, but more general solutions can be seen in the emerging Software Radio
development. Software Radio allows the terminal to automatically adapt its behaviour to the actual radio
environment.
It must be possible for mobile terminal devices to move between heterogeneous networks.
Most current systems are dedicated to a very limited set of services, and follow a single standard. Hence
there is only need for a relatively low number of different terminal and equipment types. However,
integrated systems will offer a large variety of different terminals and other items of equipment due to the
increased scale of services and service features.
Users will not be prepared to carry out complicated processes to set-up their equipment for the particular
system they are connected to.
It must be possible to easily connect multi-system equipment to a system ("plugnplay").
Security of information
Sensitive data is more at risk in integrated systems than it is in separate systems. Some of the reasons are
the more complex and difficult to monitor system structures, a wider user base, a wider range of complex
services, and increased data traffic which is vulnerable to commercial espionage.
For these reasons, the use of integrated networks requires a higher standard for data protection than
current networks. This will inevitably be costly and varying degrees of protection will be needed for
different users and services. The user should be given the chance to adapt the security level to his actual
type of communication.
It must be possible to guarantee a high degree of security and privacy which might be changed
(increased or decreased) by the user during actual usage. This also includes authentication,
ciphering, integrity, key management, etc.
Integrated networks are likely to carry some data which is so sensitive that its level of security must be
protected at all times. An example might be train control information carried for railways. In such a case,
end-users must not be able to change the level of security applied to the information, since this could be
vulnerable to malicious intervention. There is thus a need to lock the level of security for some types of
information.
It must be possible to guarantee a high degree of transmission and data safety which should
not changed (increased / decreased) by the user during actual usage; this also includes typical
privacy and security features such as authentication, ciphering, etc.
Charging
The user must be in a position to have a view of his actual communication costs at any time. No hidden
cost increases (eg a change to routing) can be allowed, at least without informing the user about this fact.
Part of a clear cost overview is the rendering of account only by one service provider. This means that
Page 3 of 4
Conclusions
The transition from the current disparate networks to integrated fixed and mobile networks is feasible.
However, it introduces a higher level of complexity in management than we currently have.
For this integration to be successful, we need to define and develop:
Interworking units
Client/server or IN-based services
Terminals which can seamlessly move between networks
Security and charging systems which can cope with the added complexity
More details of the ACTS guidelines can be found at
http://www.infowin.org/ACTS/ANALYSYS/CONCERTATION/glindex.htm
Wes Carter
ACTSLINE
Page 4 of 4