Professional Documents
Culture Documents
Solution Overview
Workshop America Movil
Florian Hartmann
Sales Manager, Latin America Service Provider
May 2017
1
Agenda
• Introduction
• VoWIFI Call-flows
• Conclusion
What is VoWiFi ?
• Apple ios 8 release introduced Wi-Fi calling feature
3
VoWiFi – Business Drivers
10,000 Cisco VNI Projection ( 2015 – 2020 )
Minutes of Use (Billions) per Year
4
VoWiFi Use Cases
• Untrusted Voice over WIFI
IMS IMS
SWu ePDG
PGW
Network Trusted VoWiFi
Client
• Wi-Fi access network is trusted and managed
UE TWAG
Internet • As per 3GPP Release 11 ,one of the key characteristic of
PGW
“Trusted Wi-Fi” architecture is the client-less approach to
Native
Internet
support packet core integration
Client • TWAG lacks the support for multiple APN’s signaling over S2a
VoWIFI Trusted Network (Hybrid) for the UE with PGW .With this , all the offloaded Wi-Fi traffic
assumed to be part of Internet APN
SIPTO
• VoWiFi can’t be supported as it requires it’s own IMS APN
SWu IP Match
ePDG PGW
IMS
Network
• Hybrid architecture recommended ,i.e. combination of Release
NAT Pool
Client 173.38.1.0/24 11 trusted Wi-Fi and Un-trusted VoWiFi architecture
TWAG • Hybrid model support’s simultaneous offloading of IMS APN
UE SIPTO Enabled and Internet APN traffic when user moves from cellular to
DHCP NO IP Match trusted Wi-Fi access network
PGW Internet
Allocated
173.38.0.1 • As per 23.402, UE can be connected with only one non-3GPP
access
VoWIFI Trusted Network – Optimised Routing using SIPTO (Hybrid)
VoWiFi Trusted /Untrusted Use Case Architecture
Use Cases
• Un-Trusted / Un-Managed VoWiFi for
sim-based subscribers
• Trusted/Managed VoWiFi for sim-based
subscribers
3GPP AAA
PGW
PCRF, OCS
HSS
IMS
UE
EMS/NMS
AP/WLC
VoWIFI Initial Attach – Untrusted Network
UE AP / WLC EPDG 3GPP AAA HSS
UE performed EPDG Selection
8
Architecture Guidelines and Best Practices
• ePDG Discovery
• PGW Selection
• Seamless Mobility
• UE Dependencies
• Location Information
• Emergency Calling
• Quality of Service
• Security Framework
EPDG Discovery
Internet Service Provider GSMA Operator Network EPDG Selection Options
UE
Local Caching
Root DNS Server
Authoritative
EPDG UE can dynamically derive ePDG FQDN as
DNS Server DNS Server
per the 3GPP standards
Recursive DNS Query
FQDN :epdg.epc.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org EPDG FQDN format :
Based on the MCC and MNC value, Root DNS
Iterative DNS Query selects the Operator authoritative DNS Server epdg.epc.mnc<MNC>.mcc<MCC>.pub.
3gppnetwork.org
FQDN :epdg.epc.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org
DNS Response
Following possible option available for
Authoritative DNS Server Details ( IP Address ) UE to derive PLMN
13
EPDG Discovery
Internet Service Provider GSMA Operator Network Regulatory Aspects
Local Caching Authoritative
UE
DNS Server
Root DNS Server
DNS Server
EPDG • International Roaming
Recursive DNS Query • National Roaming
FQDN :epdg.epc.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org • Country specific regulatory aspects
Based on the MCC and MNC value, Root DNS
Iterative DNS Query selects the Operator authoritative DNS Server
FQDN :epdg.epc.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org
Trusted VoWiFi Use case
• Locally optimized ePDG FQDN resolution
DNS Response
Authoritative DNS Server Details ( IP Address )
WIFI LTE
Untrusted LTE
Network Network
UE GAPs
• Most UEs today qualifying WiFi network based on
MME/ RSSI strength
EPDG
SGW
• Most UEs today have toggling Issue with data
IMS
EPC Core Internet
offload
Network
Location Information
LEA VoWIFI Operator Platform with Details WIFI ISP Platform with Details
Post Crime
Request for details Untrusted Network
MSISDN Check System for details
• Outer IPSec IP address and port no.via S2B
MSISDN Call Details
to PGW
Details related to call • Outer IPSec IP address, port number and AP
mac id via SWm to AAA
Details related to call Since the call Originated from
Untrusted Network, Outer IP • 3rd Party Geo location provider like Maxmind,
Since the call Originated from Address of the Subscriber Neustar IP Intelligence..
Untrusted Network, Outer IP IPSec Tunnel Provided
Address of the Subscriber
IPSec Tunnel Provided
SWu
2
Context S2B
3
Best Practice
• Secure internet facing interface • Isolate management traffic
• ACL on all context
Deployment Challenges and Best Practices
• IPSec Profile
• MTU
• Stale Sessions
• DRA Caching
IKEv2 and IPSec Profile
Protocol Type Supported Options
PGW 1
• When UE initiates re-attach, ePDG locally
S2B cleans up the existing session and performs
PGW selection for new session
Un-trusted / • If PGW selected is same old one, the session
UE Un-managed
IPSec Access
ePDG IMS will be replaced in PGW
Client Network • If PGW selected is different from old one, the
old PGW will hold a stale session
S2B
PGW 2 No clear guidelines from 3GPP to address this
problem
Recommended Approach
• EPDG will compare the PGW details with existing S2B session and initiates the delete session request to
Old PGW if the PGW selected is different from the old one.
MTU
• End to end MTU should be consistent to
ensure the quality of experience
UE SWu S2B SGI • Different protocol stack and encapsulation
IPSec ePDG PGW IMS
method used across the interfaces could
Client
cause fragmentation
• Fragmentation of IPSec packet could cause
additional processing at UE and may delay in
IPV4 / IPV4 / IPV4 / packet delivery to application in UE
IPV6 IPV6 IPV6 • NAT / Firewall devices may drop the small
fragmented IPSec packets as threat
GTP ESP
ESP
IPv4 / UDP
IPV6
IPv4 /
ESP IPV6
ESP
Solution Recommended
• Calculate Max payload EPDG can send in Swu interface without fragmentation
• EPDG max payload shall be configured as IMS MTU
• PGW MTU shall be IMS MTU + additional headers
Conclusion
• VoWiFi has moved from novelty to necessity and it enables new business
opportunity for service operators
• VoWiFi virtually turns every WiFi access point into cellular tower and it extents
operators network instantly
• VoWiFi complements VoLTE by reusing the same IMS investments and provides
better solution for indoor coverage issue