Unlicensed Mobile Access (UMA)<br />Presented By <br />KATHAN BHATT (07CE109)<br />Guided By <br />Mrs. PAYAL PATEL<br />Gandhinagar Institute of Technology<br />
CONTENTS<br />What is UMA<br />Overview<br />Working<br />UMA Architecture <br />UMA Network Controller<br />Security<br />Advantages<br />Disadvantages<br />Conclusion<br />Gandhinagar Institute of Technology<br />
What is UMA<br /><ul><li>UMA allows to access the mobile voice and data services of the cellular network over a Wireless LAN
Subscribers are enabled to roam and handover between cellular networks and wireless networks
UMA Technology specification was published in September 2004
3GPP approved the specification as “Generic Access”
The 3rd Generation Partnership Project, 3GPP is the collaboration agreement that brings together a number of telecommunications standards bodies.</li></ul>Gandhinagar Institute of Technology<br />
Overview<br /><ul><li>A mobile subscriber with a UMA enabled handset moves into a permitted unlicensed wireless network.
Once connected the handset contacts the UMA network controller over the broadband IP access network to be authenticated and authorized toaccess GSM (Global System for Mobile communication) voice and GPRS(General Packet Radio Service) data services via the unlicensed wireless network.
If approved, the subscriber’s current location information stored in the core network is updated, and from that point on all mobile voice and data traffic is routed to the handset via the Unlicensed Mobile Access Network (UMAN) rather than the cellular radio access network (RAN).</li></ul>Gandhinagar Institute of Technology<br />
Overview<br /><ul><li>ROAMING: When a UMA-enabled subscriber moves outside the range of an unlicensed wireless network to which they are connected, the UNC and handset facilitate roaming back to the licensed outdoor network. This roaming process is completely transparent to the subscriber.
HANDOVER: If a subscriber is on an active GSM voice call or GPRS data session when they come within range (or out of range) of an unlicensed wireless network, that voice call or data session can automatically handover between access networks with no discernable service interruption. Handovers are completely transparent to the subscriber. </li></ul>Gandhinagar Institute of Technology<br />
Working of UMA<br />Gandhinagar Institute of Technology<br />
UMA Architecture<br /><ul><li>Mobile devices access the Core Network through Unlicensed Mobile Access Network (UMAN).
UNC authorizes and authenticates the Mobile devices for accessing the Core Network</li></ul>Gandhinagar Institute of Technology<br />
UMA Network Controller<br />Gandhinagar Institute of Technology<br />
Parts of Network Controller <br />IP<br />The protocol which specifies the format of information 'packets' transported over the Internet, including how the packets are addressed for delivery.<br />Media Gateway<br />A Media gateway is a translation device or service that converts digital media streams between disparate telecommunications networks.<br />AAA<br />Authentication, Authorization and Accounting<br />HLR/HSS<br />Home Location Register/Home Subscriber Server<br />Gandhinagar Institute of Technology<br />
UMA and Baseline Security<br />Although UMA creates new business opportunities for GSM service providers, the introduction of the UMA Network Controller (UNC) into the GSM/GPRS core also exposes the network to new security threats.<br />GSM service providers need to consider the following security implications of adding the UNC into their network in order to protect their investment, brand image and new revenue generating services:<br /> • UMA high speed access opens traditional GSM/GPRS radio access network to a public IP world<br /> • UMA is vulnerable to many GSM/GPRS alike attacks<br /> • UNC is publicly reachable<br /> • Many existing known security concerns in WLAN, GSM/GPRS are part of the risks within UMA enabled services.<br />Gandhinagar Institute of Technology<br />
Advantages<br /><ul><li>Seamless roaming and handover between unlicensed wireless networks and licensed cellular networks.
Maintain the same mobile device identification on unlicensed wireless networks and licensed cellular networks.
Better coverage area and relatively better quality and low cost service for the subscriber.
Better coverage area, better quality service, increase in revenue for the operator.</li></ul>Gandhinagar Institute of Technology<br />
Disadvantages<br /><ul><li>Subscribers must upgrade to Wi-Fi/UMA enabled handsets to take advantage of the service.
Increasingly, consumers are taking advantage of unlimited or otherwise high-volume data tariffs to make VoIP calls via Skype. While this is an advantage for subscribers, this is a disadvantage for mobile operators who increasingly are looking to UMA as a competitive response to Skype. </li></ul>Gandhinagar Institute of Technology<br />
Conclusion<br /><ul><li>UMA enabled handsets will be available in greater numbers very soon, complete with a very low power consuming 802.11g WLAN chips. It is unlikely to see any reasonable growth for the UMA Bluetooth markets, since the range is limited and access points aren’t available.
Still, it is not clear whether UMA will be a big hit or not. The operators need to have enough customers with UMA enabled handsets so that their investments to the network side would be profitable. In some countries, such as the United States, UMA is more attractive than in others, due to the worse existing cell coverage. Also, the pricing point is critical for the customers, so that they are willing to buy a UMA enabled mobile handset as well as have the additional radios switched on, sacrificing some standby time. We estimate that UMA in its current form will be properly in use, if it ever will, in around 2 years.</li></ul>Gandhinagar Institute of Technology<br />
References<br />www.clevister.com<br />www.wikipedia.com<br />www.google.com<br />Gandhinagar Institute of Technology<br />
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.