Internet DRAFT - draft-pularikkal-opsawg-wifi-calling
draft-pularikkal-opsawg-wifi-calling
Operations and Management Area Working Group B. Pularikkal
Internet-Draft Cisco Systems
Intended status: Informational T. Pauly
Expires: January 4, 2018 Apple Inc.
M. Grayson
S. Gundavelli
Cisco Systems
S. Touati
Ericsson
July 3, 2017
Carrier Wi-Fi Calling Deployment Considerations
draft-pularikkal-opsawg-wifi-calling-03
Abstract
Carrier Wi-Fi Calling is a solution that allows mobile operators to
seamlessly offload mobile voice signaling and bearer traffic onto Wi-
Fi access networks, which may or may not be managed by the mobile
operators. Mobile data offload onto Wi-Fi access networks has
already become very common, as Wi-Fi access has become more
ubiquitous. However, the offload of mobile voice traffic onto Wi-Fi
networks has become prevalent only in recent years. This was
primarily driven by the native Wi-Fi Calling client support
introduced by device vendors. The objective of this document is to
provide a high level deployment reference to Mobile Operators and Wi-
Fi Operators on Carrier Wi-Fi Calling.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 4, 2018.
Pularikkal, et al. Expires January 4, 2018 [Page 1]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Architecture Overview . . . . . . . . . . . . . . . . . . . . 6
4. Wi-Fi Calling Deployment Considerations . . . . . . . . . . . 8
4.1. Wi-Fi to Packet Core Integration . . . . . . . . . . . . 8
4.1.1. Untrusted Model . . . . . . . . . . . . . . . . . . . 8
4.1.1.1. IPSec Tunnel Negotation . . . . . . . . . . . . . 9
4.1.2. Hybrid Model . . . . . . . . . . . . . . . . . . . . 10
4.1.3. Trusted Model . . . . . . . . . . . . . . . . . . . . 11
4.1.4. Model Selection Criteria . . . . . . . . . . . . . . 13
5. Subscriber Onboarding into Wi-Fi Access Network . . . . . . . 14
5.1. Authentication and Identity Management . . . . . . . . . 14
5.2. Hotspot 2.0 for Seamless Onboarding . . . . . . . . . . . 15
5.2.1. Hotspot 2.0 Inter-Operator Roaming for Wi-Fi Calling 17
6. Wi-Fi calling deployment in restrictive networks . . . . . . 17
7. RF Network Performance Optimization . . . . . . . . . . . . . 18
7.1. Radio Resource Management . . . . . . . . . . . . . . . . 18
7.2. Wi-Fi Roaming Optimization . . . . . . . . . . . . . . . 19
7.2.1. Fast BSS Transition . . . . . . . . . . . . . . . . . 19
7.2.2. 802.11k based Neighbor Reports . . . . . . . . . . . 19
7.2.3. 802.11v based Assisted Roaming and Load Balancing . . 20
8. QoS Deployment Considerations for Wi-Fi Calling . . . . . . . 20
8.1. Wi-Fi Access Network QoS . . . . . . . . . . . . . . . . 20
8.2. End to End QoS . . . . . . . . . . . . . . . . . . . . . 21
9. Wi-Fi Calling Client Considerations . . . . . . . . . . . . . 23
9.1. Access Selection Criteria . . . . . . . . . . . . . . . . 23
9.2. Inter-RAT Handover . . . . . . . . . . . . . . . . . . . 24
9.3. MTU Considerations . . . . . . . . . . . . . . . . . . . 24
9.4. Congestion Management . . . . . . . . . . . . . . . . . . 24
9.5. NAT Traversal . . . . . . . . . . . . . . . . . . . . . . 25
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 25
Pularikkal, et al. Expires January 4, 2018 [Page 2]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
11. Informative References . . . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 26
1. Introduction
There are several SP Managed and Over the Top Voice Solutions
deployed today which can leverage Wi-Fi access networks. Some of
these solutions rely on standalone applications installed on the
Mobile Handset and other Mobile devices such as tablets. Also there
are solutions, which leverage dedicated hardware built exclusively to
support Voice over Wi-Fi.e.g,in enterprise type environments. The
scope of this document is VoWiFi solutions, which are deployed by
Mobile Network Operators also known as Wireless Carriers. VoWiFi
from the context of Mobile Voice offload is often referred to as
Carrier Wi-Fi Calling. The deployment of Carrier Wi-Fi Calling
requires some kind of integration between the Wi-Fi Access network
and Mobile Packet Core. Carrier Wi-Fi calling solutions deployed
today predominantly uses an 'untrusted Wi-Fi'model that delivers
simple IP connectivity to facilitate Mobile Packet Core integration.
With this 'untrusted' approach, Mobile Operators are able to make use
of the existing Wi-Fi deployment footprint regardless of whether it
is owned by the MNOs or by their roaming partners or Wi-Fi Operators
without any kind of partnership with the MNOs. This model has
definitely allowed MNOs to accelerate the adoption of Wi-Fi calling.
However, this comes with some caveats, as depending on the Wi-Fi
network, there may be no visibility or control over it by the MNO,
impacting its ability to carry voice calls without compromising end
user experience.
It is in the interest of both MNOs as well as Wi-Fi Operators to
improve the quality of experience for Wi-Fi Calling delivered over a
Wi-Fi access network. MNOs have the incentive to make sure that the
end user experience does not get compromised while the voice service
is offloaded over Wi-Fi access. Wi-Fi operators have the business
incentive to enter into roaming partnerships with the MNOs and
support Wi-Fi calling with certain Service Level Agreements. In some
deployments, it is possible for the MNOs to own some Wi-Fi hotspot
deployments. In such cases, MNO will effectively be the Wi-Fi
operator as well.
Objective of this document is to provide a Carrier Wi-Fi Calling
deployment reference to Wi-Fi Operators and MNOs with primary focus
on the Wi-Fi Access Network and the Wi-Fi to Packet Core integration
aspects.
Pularikkal, et al. Expires January 4, 2018 [Page 3]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
2. Terminology
Service Provider (SP)
Refers to a provider of telecommunications services such as
Broadband Operator or Mobile Operator. An SP may provide several
telecommunications services.
APP
Refers to computer program typically designed to run on Mobile
devices such as smartphones and tablets.
Wireless Fidelity (Wi-Fi)
Technology that allows devices to wirelessly connect using 2.4 GHz
and 5.0 GHz unlicensed radio bands. Wi-Fi is defined as part of
IEEE 802.11 standards
Voice over Wi-Fi (VoWiFi)
Any solution, which supports voice services over Wi-Fi.
Mobile Network Operator (MNO)
A wireless communications service provider who owns and operates
licensed wireless access network and the backend infrastructure to
offer mobile voice, data and multimedia services.
3rd Generation Partnership Project (3GPP)
3GPP unites seven telecommunications standards development
organizations known as Organizational Partners and provides their
members with a stable environment to produce the reports and
specifications that define 3GPP technologies
Groups Special Mobile Association (GSMA)
GSMA represents the interests of mobile operators worldwide,
uniting nearly 800 operators with more than 250 companies in the
broader mobile ecosystem, including handset and device makers,
software companies, equipment providers and internet companies, as
well as organizations in adjacent industry sectors.
User Equipment (UE)
Term represents any device used directly by an end user to
communicate.
Pularikkal, et al. Expires January 4, 2018 [Page 4]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
Wireless Local Area Network (WLAN)
Refers to IEEE 802.11 based Wi-Fi access networks and represents
an extended service set consisting of multiple access points.
Long Term Evolution (LTE)
Is the fourth generation 3GPP standard set for wireless
communication of mobile devices in end-to-end IP environment.
Evolved Packet Core (EPC)
Represents the Core Network in the 3GPP LTE system Architecture.
Packet Data Network (PDN)
PDN represents a network in the packet core a Mobile UE device
wants to communicate with. PDN generally is mapped to a set of
related services.
Access Point Name (APN)
APN represents a set of services available to a specific PDN.
Typically UE devices will be configured to access multiple APNs
corresponding various services in the packet core.
Trusted WLAN Access Gateway (TWAG)
Performs the gateway function between a trusted WLAN access
network and packet core. It acts as the default gateway and DHCP
Server for UE devices connected to the WLAN access network for
trusted Wi-Fi to packet core integration model.
Evolved Packet Data Gateway (ePDG)
ePDG performs the gateway function between WLAN access network and
Mobile Packet core in an untrusted model. Main function of ePDG
is to secure the data transmission with a UE connected to the EPC.
PDN Gateway (P-GW)
P-GW is the subscriber session anchor in EPC. It enforces policy
and also has a role in IP persistence in roaming scenarios. Based
up on the policy, P-GW steers traffic towards various PDN networks
corresponding to various APNs.
IP Multi-Media Subsystem (IMS)
Pularikkal, et al. Expires January 4, 2018 [Page 5]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
An Architectural framework for delivering IP multimedia services.
And is defined in 3GPP
Policy and Charging Rule Function (PCRF)
A system in EPC, which detects service data flows, applies
policies and QoS to subscriber flows to and supports flow based
charging
Session Initiation Protocol (SIP)
SIP is an application layer control protocol that can establish,
modify and terminate multimedia sessions or calls.
Real-time Transport Protocol (RTP)
RTP is a transport protocol, which provides end-to-end delivery
services for data with real-time characteristics such as
interactive audio and video.
Proxy Mobile IPv6 (PMIPv6)
PMIPv6 is a network based mobility management protocol
standardized by IETF and adopted in 3GPP.
GPRS Tunneling Protocol (GTP)
Group of IP based communications protocols used in 3GPP
architectures.
S2a Interface
Is the interface between TWAG and P-GW and can be either GTP or
PMIPv6 based
S2b Interface
Interface between ePDG and P-GW and can be either GTP or PMIPv6
3. Architecture Overview
This section provides a very high level overview of the end-to-end
Architecture for Carrier Wi-Fi Calling. It is outside the scope of
this document to provide a detailed Architecture description, as all
the functional entities and the protocol interfaces are well defined
in the 3GPP and GSMA specifications [3GPPTS23.402,GSMAIR61,GSMAIR51].
Figure-01 below is used to describe the Architecture components at a
high level.
Pularikkal, et al. Expires January 4, 2018 [Page 6]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
+-----+ +-----+
| 3GPP+-----+ HSS |
| AAA | +-----+
+-----+
|
| +-----+
| | PCRF|
| +-----+
| |
+-------+ |
+---+ +-----+ Backhaul| TWAG /| +-----+
|UE +---+WLAN +----------+ ePDG +----+ PGW |
+---+ +-----+ | | +-----+
+-------+ |
|
+-----+
| IMS |
+-----+
Figure 1: High Level Architecture
The UE is the end user device such as a smartphone running native Wi-
Fi Calling client. The UE is connected to a Wi-Fi access network,
which is represented by the block WLAN in the diagram. Depending up
on the trust model, TWAG or ePDG gateway is used to integrate the
WLAN access network to the MNO packet core.More details around this
untrusted and trusted approaches are covered in the next section.
The P-GW acts as the common anchor for the subscriber sessions
regardless of whether the UE is connected to Wi-Fi or LTE (not
shown), allowing the preservation of the IP Session during a handover
between LTE and Wi-Fi. IMS provides several functions related to SIP
based call control signaling, namely SIP authentication, basic
telephony services, supplementary services, interworking with other
IMS systems, and offload into circuit switched voice networks. In
addition to voice, the same IMS infrastructure may be leveraged for
other multi-media functions such as video calling. The IMS framework
consists of several functional entities and is omitted for the sake
of simplicity here. PCRF performs classical Policy and Charging Rule
functions in the Mobile Packet Core. For the Wi-Fi calling solution,
it will trigger the establishment of the default and dedicated
bearers on the S2a or S2b interfaces for SIP and RTP traffic between
the PGW and the TWAG/ePDG.
Pularikkal, et al. Expires January 4, 2018 [Page 7]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
4. Wi-Fi Calling Deployment Considerations
This section covers deployment considerations for an end-to-end Wi-Fi
calling Architecture that can influence the quality of experience,
availability and monetization aspects of the solution offering.
4.1. Wi-Fi to Packet Core Integration
There are three different Architecture options available for Wi-Fi to
Packet Core integration for the deployment of Wi-Fi calling. Each of
these models are described in the sub-sections below:
4.1.1. Untrusted Model
This model is built around the assumption that the Wi-Fi access
network is 'unmanaged' or untrusted from the MNOs perspective. Since
this model does not rely on any security or data privacy
implementations on the Wi-Fi access network, it requires the
establishment of an IPSec tunnel between the UE device and the Mobile
Packet Core. The ePDG gateway acts as the IPSec tunnel termination
point on the packet core side. The ePDG handles the user
authentication as well as the establishment of an S2b packet data
network connection towards the P-GW using the GTP based S2b
interface. This Architecture model is illustrated in figure-2 below.
Pularikkal, et al. Expires January 4, 2018 [Page 8]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
+--------------+ +----------+ +-------+
| +----------+ | IMS-APN | | | |
| | SWu | | Traffic | | | |
| | Client +------------------------------------+ |
| | | | Other APN | | | ePDG |
| | | | traffic | | | |
| | +------------------------------------+ |
| | | | | | +-------+
| +----------+ | | | | |
| | | | S2b| |S2b
| UE | | WLAN | | +---+
| | | Access | | |
| +----------+ | LBO | | +-------+ +-------+
| | Native | | Traffic | | |IMS APN| | Other |
| | | | | | | PGW | | APN |
| | Client +-------------------+ | | | | PGW |
| | | | | | | +-------+ +-------+
| +----------+ | | | | | |
+--------------+ +----------+ | |
| | |
| +-------+ +-------+
| | IMS | | App |
| | | | Server|
v +-------+ +-------+
Figure 2: Untrusted Wi-Fi to Packet Core Integration Model for Wi-Fi
Calling
The Wi-Fi calling client implementation uses the ePDG client for IMS
APN while the default PDN or Internet APN traffic is locally
offloaded (Local Breakout LBO) into the Wi-Fi access network. The
"untrusted Wi-Fi" architecture supports multiple APN over SWu,
allowing the MNO to also route specific applications traffic
associated with one or more APN through the Packet Core, in addition
to the IMS APN, if required.
4.1.1.1. IPSec Tunnel Negotation
The IPSec tunnel from the UE to the ePDG is negotiated using IKEv2.
The parameters for tunnel negotation in Wi-Fi Calling are as follows:
o The Initiator Identifier (IDi) will be in ID_RFC822_ADDR (email
address) form, and be based on the UE's IMSI@Realm.
Pularikkal, et al. Expires January 4, 2018 [Page 9]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
o The Responder Identifier (IDr) will be in ID_FQDN form, and be the
APN name that the tunnel should access through the ePDG.
o EAP should be used for mutual authentication. When on a device
with a SIM card, EAP-AKA should be used. On other devices, EAP-
TLS is preferred. EAP-Only authentication (in which the server
certificate is not sent in an CERT payload) may be used to reduce
packet size, but only with mutually authenticating EAP types such
as EAP-AKA or EAP-TLS.
o Strong encryption and authentication algorithms should be used,
such as ENCR_AES_CBC, PRF_HMAC_SHA2_256, AUTH_HMAC_SHA2_256_128,
and Diffie-Hellman Group 14.
o The Configuration Request should specify an IPv4 or IPv6 addresses
used for handover. The UE may also request ePDG-specific
attributes such as P_CSCF_IP4_ADDRESS and P_CSCF_IP6_ADDRESS.
4.1.2. Hybrid Model
3GPP TS 23.402 also defines the concept of "trusted Wi-Fi"
architecture, providing another method to integrate with the packet
core. The trustworthiness of an access network itself is left to the
MNO to decide, but it generally relies on some level of control by
the MNO of the Wi-Fi access network either in a direct or indirect
manner. One of the key characteristics of the "Trusted Wi-Fi"
architecture as defined in 3GPP Release 11, is the client-less
approach to support the packet core integration. This solution
lacked the support for multiple APNs signaling for the UE when over
the Wi-Fi access network, therefore all Wi-Fi offloaded traffic was
assumed to be part of the default PDN or Internet APN. With this
limitation, Wi-Fi calling cannot be supported as it require its own
IMS APN. The hybrid architecture proposed here combines the 3GPP
release 11 "trusted Wi-Fi" architecture, with the ePDG based
untrusted Wi-Fi architecture. This hybrid model simultaneously
supports IMS and other applications specific APNs using the untrusted
Wi-Fi model, with the TWAG selectively offloading their traffic,
while using the S2a interface for all other default PDN traffic
toward the default PGW. This Architecture model is illustrated in
figure 3 below
Pularikkal, et al. Expires January 4, 2018 [Page 10]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
+------+ +---------+
| IMS | | Other |
| Core | |Services |
+------+ +---------+
| |
+------+ +-------+
+--------------+ +-----------+ |IMS | | Other |
| +----------+ | | | |P-GW | | P-GW |
| | SWu | | | +-------+ | +------+ +-------+
| | Client | | | |SIPTO | | | |
| | | | | ++NAT | | | +--------+
| +----------+ | | +-------+ | | |
| | | | +------+
| UE +------+ TWAG | S2b | ePDG |
| | | +--------+ |
| +----------+ | | | +------+
| | Native | | | |
| | Client | | | |
| | | | | | S2a +-------+
| +----------+ | | +--------+Default|
+--------------+ +-----------+ | PGW |
+-------+
|
|
+
XXXXXXXX
XX XX
X X
XInternetX
X X
XX XX
XXXXXXX
Figure 3: Hybrid Wi-Fi to Packet Core integration model for Wi-Fi
calling
4.1.3. Trusted Model
Enhancements introduced in 3GPP release 12 SaMOG specifications
provides the ability to support multiple APN over Wi-Fi access making
the support of Wi-Fi calling, and other applications specific APNs
possible without the need for IPSec connectivity between the UE and
the Packet core. This Architecture model is illustrated in figure 4
below
Pularikkal, et al. Expires January 4, 2018 [Page 11]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
+-------+
| IMS |
| Core |
+-------------+ +-----------+ +-------+
| | | | |
| +--------+ | Flow mapped | | |
| |IMS APN | | to VMAC-01 | | +-------+
| | +-----------------+ | |IMS APN|
| |Client | | | +-------+ P-GW |
| +--------+ | | | +-------+
| | | |
| | |Release 12 |
| | | TWAG |
| | | | +-------+
| | | | |Default|
| | | +-------+ APN |
| +--------+ | Flow mapped | | | P-GW |
| |Default | | to VMAC-02 | | +-------+
| | APN +-----------------+ | |
| |Client | | | | |
| +--------+ | | | |
+-------------+ +-----------+ |
XXXXXX
XX XXX
XX XX
X X
X X
X Internet X
X X
X XX
X XX
XX XXXX
XXXXXX
Figure 4: Trusted Wi-Fi to Packet Core integration model for Wi-Fi
calling
Pularikkal, et al. Expires January 4, 2018 [Page 12]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
4.1.4. Model Selection Criteria
Each of the Wi-Fi to Packet Core Architecture models described in the
previous sections comes with its own pros and cons. And selection of
a specific architecture model depends on several factors. Some of
these factors, which can help determine the appropriate model, are
listed below:
*Wi-Fi Access Network Ownership: There are several ownership models
available when it comes to Wi-Fi to packet core integration. Wi-Fi
Access network may be deployed by the MNO to leverage as another RAT
to complement 3G and LTE. Alternatively the Mobile Network Operator
may deploy a Managed Wi-Fi network for the Enterprise and SMB
customers. The MNO managed Wi-Fi footprint is only portion of the
overall Wi-Fi deployment. Third parties such as broadband service
providers today own a significant portion of the Wi-Fi access
network. For third party owned Wi-Fi access, the Mobile Network
Operator may or may not have a direct roaming partnership with the
Wi-Fi operator. The ownership model influences the choice of packet
core integration architecture.
*Backhaul Network Ownership: From the context of this discussion
here, the backhaul refers to the connectivity between WLAN Access
network and the Packet core. It consists of a combination of wired
access network of the hotspot, Broadband access last mile, Wi-Fi
operator core network, Internet etc. These connectivity aspects will
be deciding factor for the choice of Wi-Fi packet integration model.
For example, Wi-Fi access network may be owned and or operated by the
MNO, but if the backhaul involved a third party connection or
Internet where MNO does not have control over security and QoS, an
untrusted packet core integration may be the viable solution.
*Mobile Offload Requirements: Choice of the Wi-Fi to packet core
integration model is not only influenced by voice offload but data
offload as well. The untrusted Wi-Fi and the hybrid architectures do
support a flexible offload model, allowing the Mobile Network
Operator to choose which traffic to backhaul to the Mobile Packet
Core to provide charging and added value services, while also
leveraging local breakout capabilities on the device. Using the
untrusted, and when applicable, the hybrid models allow the Mobile
Network Operator to leverage their deployed network architecture for
Wi-Fi calling. This makes both the hybrid and the untrusted Wi-Fi
architectures valid options to consider depending on the Wi-Fi
network ownership requirements.
*Device Capabilities: This greatly influences the choice of Wi-Fi to
packet core integration. For example, a trusted approach with
multiple PDN support requires the capability on the device to comply
Pularikkal, et al. Expires January 4, 2018 [Page 13]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
with 3GPP release 12 SaMOG enhancements, while the untrusted or
hybrid model can leverage existing implementations and do provide a
similar level of functionality.
*Support of Non-SIM devices: The MNO can provide value-added
services, including voice services on Non-SIM devices The Untrusted
Wi-Fi architecture is compatible with Non-SIM devices and provide the
same capabilities to these devices as for the SIM devices.
*Network Readiness: This is another influencing factor for the choice
of the trust model, as there are dependencies on the Packet Core
network elements as well as Wi-Fi access network for the
implementation of these models.
5. Subscriber Onboarding into Wi-Fi Access Network
Subscriber onboarding into a Wi-Fi access network is the process of
getting connected to a WLAN access network and be able to offload
mobile traffic successfully. In order to provide a seamless end user
experience for Wi-Fi calling, the handset should be able to get
connected to the WLAN with minimum or no user interaction. A
seamless WLAN onboarding is critical for the smooth hand off of the
voice call from LTE to Wi-Fi. There are several factors, which can
influence the Wi-Fi onboarding experience. Proper choice of the
available deployment options can ensure the subscriber onboarding
experience is quite seamless.
5.1. Authentication and Identity Management
Before the UE device can successfully get associated with a WLAN
access network it needs to get authenticated with the WLAN network.
There are several types of user authentication options in use such as
Web Portal based authentication, EAP-TTLS, EAP-TLS, EAP-SIM, EAP-AKA
etc. Choice of the authentication mechanism depends up on the
deployment preferences of the Wi-Fi operator. Web portal based
authentication relies on an Open SSID configuration. Once the portal
has successfully authenticated the UE device, the traffic is carried
over the WLAN air interface without any encryption. EAP
authentication mechanisms relies on secured SSIDs mandate the 802.11i
based air encryption of the subscriber data in the WLAN access
network.
In order to support Wi-Fi calling, one of the EAP based mechanisms
will be preferred over the web portal based authentication. In the
case of Web based authentication, the user needs to manually enter
the username and password credentials or in some cases sign up for a
service via Operator portal. But with any of the EAP methods, once
the credentials have been established on the UE device, then
Pularikkal, et al. Expires January 4, 2018 [Page 14]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
authentication happens automatically without user intervention and
greatly improves the onboarding experience.
If the Wi-Fi operator decides to use a secured SSID for subscriber
authentication, choice of the EAP method depends up on the business
model. A Standalone Wi-Fi operator may need to rely on non-SIM based
EAP authentication mechanisms such as EAP-TTLS or EAP-TLS for their
home subscribers. A Wi-Fi operator who has a roaming partnership
with an MNO could allow the uSIM credentials of the MNO subscriber to
be used for the access. In this case, the Wi-Fi operator will act as
a proxy and authenticate the customer credentials with the MNO HSS.
Identity management deals with establishing subscriber identity and
associated credentials on the UE device for WLAN onboarding.
Identity management and authentication goes hand in hand. Option
leverages the same set of identity and credentials (unified identity)
for WLAN onboarding and packet core connectivity will simplify the
identity management for Wi-Fi calling. However this requires that
the WLAN access network is either owned by the MNO or by their
roaming partner. With unified identity, typically uSIM credentials
will be leveraged for both WLAN onboarding as well as packet core
connectivity for SIM devices, and an EAP method used for Non-SIM
devices.
5.2. Hotspot 2.0 for Seamless Onboarding
Ability for a handset to Seamlessly get connected to WLAN access
network is one of the key factors which will influence the overall
subscriber experience with Wi-Fi calling. Passpoint specifications
defined by the Wi-Fi alliance under the Hotspot 2.0 program supports
automatic discovery, selection and onboarding of Wi-Fi clients on to
a compatible Wi-Fi access network. Figure-5 below is used to
illustrate the hotspot 2.0 solution at a high level:
Pularikkal, et al. Expires January 4, 2018 [Page 15]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
+----------------+
| Wi-Fi Operator |
| AAA Server / |
| AAA Proxy |
| |
+----------------+
|
|
|
+----------------+ XXXXX
+-----------+ | | XXX XXX
| | | +----------+ | XX XX
| | | | ANQP | | XX XXX
| UE | | | Server | | X XX
| | | | | | XX Roaming X
| +-------+ +------+ +----------+ +---------XXInterconnectXX
| | ANQP | | | | XX X
| | Client| | | | XX XX
| | | | | +----------+ | XX XXX
| +-------+ | | | AP/AC | | XX XX
+-----------+ | | | | XXX XXX
| +----------+ | X+X
+----------------+ |
| |
| |
| +------------+
XXXXX | MNO |
XX XXX | AAA Server |
X XX | |
XX XX +------------+
X External X |
XX Network XX |
X Access X |
XX XX +------------+
XX XX | HSS |
XX XXX | |
XXXX XXX +------------+
XXXX
Figure 5: Hotspot 2.0 with Service Provider Roaming
ANQP server is the component, which assists with the automatic
discovery of WLAN network resources by the UE device. ANQP server is
Pularikkal, et al. Expires January 4, 2018 [Page 16]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
typically collocated on the Access Point (AP) or the Access
Controller (AC). A Hotspot 2.0 compatible UE device will have a
built in ANQP client. When a UE roams into the coverage area of a
Hotspot 2.0 enabled network, it automatically learns about the
network capability via Beacon or Probe Response. Then UE requests a
set of network and service level information from the WLAN network.
Based up on the info UE can decide which WLAN access is the most
preferred and the type credentials it can use for getting connected.
5.2.1. Hotspot 2.0 Inter-Operator Roaming for Wi-Fi Calling
MNOs can enter into roaming partnership, which will allow Wi-Fi
calling clients to automatically get connected to the WLAN access.
This also allows the devices to leverage uSIM credentials or EAP
credentials for Non-SIM devices for getting authenticated with the
WLAN network. The Wi-Fi operator AAA will function as a proxy in
this case and completes the authentication by interfacing with the
MNO AAA Server and HSS, for EAP_SIM/EAP_AKA in the MNO packet core.
6. Wi-Fi calling deployment in restrictive networks
The use of IPSec to establish a connection to the ePDG, require that
the access network allow IPSec tunnel establishment. But some
networks won't allow IPSec traffic either as a security policy or as
a side-effect of only allowing "web traffic". In addition, many
mainly corporate environments do deploy an HTTP proxy which will also
prevent the establishment of an IPSec tunnel. Performing changes to
these deployments may not always be possible or cost effective for
the corporation or the public venues, especially in an "Untrusted Wi-
Fi" model without the MNO involvement. In such situations, the
mobile device can leverage the IPSec TCP encapsulation as described
in draft-pauly-ipsecme-tcp-encaps-04 and in 3GPP TS 24302, which
define the encapsulation of IPsec traffic in TCP. The Mobile device
shall enable the TCP encapsulation only after failling to establish
an IPSec connection to the ePDG. Figure 6 below shows the TCP
encapsulation with the use for TLS to traverse a Proxy and reach the
ePDG.
Pularikkal, et al. Expires January 4, 2018 [Page 17]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
+------------+ +----------+ +-------+
| +--------+ | TCP with HTTP | | TCP with TLS | |
| | SWu +===================+==========+=================+ |
| | Client ------------------------------------IPSEC------- |
| | +===================+==========+=================+ ePDG |
| |Proxy | | then TLS | Proxy | | |
| |Config | | through proxy | Firewall | +-------+
| +--------+ | +----------+ |
| UE | |
+------------+ +-------+
| |
| IMS |
| PGW |
+-------+
Figure 6: Use of TCP encapsulation for IPSec
When an HTTP proxy is deployed, the UE should connect to the eDPG
through the proxy and then establish a TLS connection toward the
ePDG. TLS is not used for securing the link, but to traverse the
HTTP Proxy, and is configured with NULL-Cipher. This model allows
Wi-Fi calling to operate even in restrictive networks.
7. RF Network Performance Optimization
Quality of the Wi-Fi calling experience would be as good or as bad as
Radio network itself. Three network performance KPIs which impact
the quality of voice are latency, jitter and packet drops. A healthy
network is critical to ensure that these KPIs will meet the
thresholds allowed to meet the acceptable voice quality. This
section primarily talks about various performance optimization
mechanisms available on the Wi-Fi Radio network.
7.1. Radio Resource Management
Radio Resource Management (RRM) aka Wi-Fi SON refers to the co-
ordinated fine-tuning of the various RF network parameters among
access points connected in a Wi-Fi network. It is very typical for
Wi-Fi deployments from multiple operators to co-exist in the same
hotspot. Scope RF fine tuning will be limited to the access points
which are managed by the same operator in a specific hotspot. RRM
fine-tuning will be typically performed by a centralized entity such
as Access Controller. Some deployments which may not leverage AC
such as Residential Gateways could leverage a cloud based RRM or SON
Server. RRM controller continuously analyze the existing RF
environment automatically adjust the power and channel configurations
of access points to help mitigate issues such as co-channel interface
and signal coverage. A proper implementation of RRM can greatly
Pularikkal, et al. Expires January 4, 2018 [Page 18]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
influence the RF performance and will have a positive impact on
network KPIs that influence the Wi-Fi calling experience.
7.2. Wi-Fi Roaming Optimization
Roaming from the context of the discussion here refers to the hand of
of a UE device from one Access Point to another Access Point in the
same Extended Services Set (ESS) or mobility domain. Unlike cellular
roaming between base stations, which is initiated by the network, in
Wi-Fi the roaming is initiated by the UE device. A UE typically
decides to disconnect from the current access point when some of the
RF measurements such as RSSI, SNR etc. drops below certain threshold.
There are other APs in the range with acceptable measurements the UE
will start re-association process with one of the target APs. End
user experience for a Wi-Fi call, which is active at the time of the
hand off, will depend up on multiple factors. One critical factor is
the time taken for the UE traffic to resume during the hand off.
Also it is important that UE is able to make the optimum selection of
the target AP from the list of available APs in the range. Discussed
below are few IEEE 802.11 based mechanisms available to optimize the
roaming.
7.2.1. Fast BSS Transition
IEEE 802.11r based fast BSS transition (FT) helps reduce the handoff
time for a UE when it roams from one AP to another with in an ESS,
which is enabled, with an EAP based authentication. Without FT, the
UE will have to go through the full authentication process with the
RADIUS server and device fresh set of encryption for 802.11i air
encryption. When FT is enabled, the client will have an initial
handshake with the target AP while still connected to the original
AP. This handshake allows client and target APs to derive the
encryption keys in advance to reduce the hand off time. Fast
Transition can significantly improve the end user experience for the
voice calls, which are active during a hand off.
7.2.2. 802.11k based Neighbor Reports
IEEE 802.11k enhancements allow a UE device to request from the
current AP to which it is connected for a recommended list of
neighboring APs for roaming. Up on receiving the client request, the
AP responds with a list of neighbors on the same WLAN with the Wi-Fi
channel numbers. Neighbor list is created by the AP based up on the
Radio Resource Measurements and includes the best potential roaming
targets for the UE. Neighbor list allows UE to reduce the scanning
time when it is time to roam into a new AP in the same WLAN and there
by improves the roaming performance. It is recommended to enable
Pularikkal, et al. Expires January 4, 2018 [Page 19]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
802.11k along with Fast BSS transmission for optimum roaming
performance.
7.2.3. 802.11v based Assisted Roaming and Load Balancing
Typical WLAN deployments will have APs with overlapping coverage
areas. This is done on purpose to seamless handoff and also to
address capacity requirements. Load distribution of UEs in the same
coverage area may be helpful to proactively manage the bandwidth
requirements and there by improve the subscriber experience. In the
most rudimentary form, some of the load balancing solutions relies on
the brute force method of ignoring the association requests from a UE
by the APs with high load. Another more sophisticated mechanism is
to leverage 802.11v based network assisted roaming. 802.11v allows
unsolicited BSS transmission management messages from AP towards the
client with a list of preferred APs to make roaming decisions. If
the AP is experiencing high load, or bad connectivity from the client
it may send an unsolicited BSS transmission management frame with the
recommended list of APs to roam into. Depending up on the client
implementation, it may or may not honor this info while making oaming
decisions.
8. QoS Deployment Considerations for Wi-Fi Calling
This section covers the traffic prioritization mechanisms available
in various segments of the overall traffic path of the Wi-Fi calling
signaling and bearer sessions. Flexibility control of the QoS
implementations will depend up on various factors such as ownership
and management of the WLAN access network, Wi-Fi to packet core
integration model etc.
8.1. Wi-Fi Access Network QoS
Traffic prioritization in the WLAN for Carrier Wi-Fi calls can be
achieved by implementing Wi-Fi Multimedia (WMM). WMM consists of a
subset of IEEE 802.11e enhancements for Wi-Fi. WMM defines four
Access Categories, AC1, AC2, AC3 and AC4. AC1 is mapped against
voice, AC2 is mapped against video, AC3 is mapped against best effort
traffic and AC3 is mapped against Background traffic. Each of these
Access Categories is mapped against one or more 802.11e User Priority
(UP) values. UP has range from 0 to 7. Higher UP values typically
gets more expedited over the air treatment EDCA mechanism for channel
access defined in 802.11e is modified to make sure that traffic in
higher UP queues get higher priority treatment. WMM can only
leveraged if the client can do the right classification and Access
points also support it.
Pularikkal, et al. Expires January 4, 2018 [Page 20]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
8.2. End to End QoS
While QoS on the WLAN access network is critical, that by it may not
be sufficient to maintain the subscriber quality of experience. It
is important to enable QoS prioritization across all the network
segments, which form part of the end-to-end voice path. Flexibility
of the QoS implementation along the network segments will depend up
on the trust models, which are discussed earlier. For example, if
the transit path between WLAN network and Packet Core is include
Internet, no QoS prioritization can be implemented over the Internet
backhaul. How ever for deployment scenarios in which all network
segments along the voice traffic path are managed either by the
Mobile operator or their partners, then it makes much easier to
implement end to end QoS. End to end QoS Classification for Wi-Fi
calling is illustrated in figure 7 below.
Pularikkal, et al. Expires January 4, 2018 [Page 21]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
Voice UP 6 Voice DSCP 46
Voice Sig. UP 4 Voice Sig. DSCP 24
+--------------+ +---------------+
| WMM or WMM+AC| | DiffSrv QoS |
| | | |
v v v v
+----+ +--------+ +--------+
| | | WLAN | | |
| | | | | |
| UE | | +----+ | | TWAG/ |
| +-----------+ | AP/| +---------+ ePDG | <------+
| | | | AC | | | | |
| | | +----+ | | | |
+----+ +--------+ +--------+ |
| Dedictated |
Voice QCI 1| and |
Sig. QCI 5 | Default |
| Bearers |
| |
+--------+ <------+
| |
| P+GW |
| | <------+
+--------+ |
| |
| DiffSrv |
| QoS |
| |
+--------+ |
| | |
| IMS | <------+
| |
+--------+
Figure 7: End-to-end QoS Reference Model
This QOS reference model assumes that, MNO or their roaming partners
manage all the segments in the end-to-end path for voice signaling
and voice bearer traffic. Model also assumes that transit path
between WLAN and Packet core is private and secured and does not
traverse Internet.
Pularikkal, et al. Expires January 4, 2018 [Page 22]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
QoS reference model leverages WLAN access network leverages WMM that
is described in the previous section, UP value of 6 is typically used
for voice bearer traffic and UP value of 4 is used for voice
signaling traffic. In order for voice to get the proper
prioritization, WMM needs to be supported and enabled on both UE and
the WLAN network.
In the transit IP network between WLAN and packet core, DSCP based
QoS prioritization can be deployed if the connectivity is part of a
managed transport. DSCP value of 46 is typically used for marking
voice bearer and DSCP value of 24 is typically used for marking voice
signaling. Proper traffic prioritization will depend up on whether
DiffSrv QoS is enabled in the transit network.
Between P-GW and ePDG or TWAG, dedicated bearer with QCI value 1 will
be established dynamically for voice calls. For signaling traffic a
default bearer with QCI value of 5 will be used. These QCI values
are mapped against specific QoS SLAs and allocation retention
policies (ARP).
9. Wi-Fi Calling Client Considerations
Wi-Fi Calling client device functionality requirements depend on the
on the models used for WLAN to packet core integration. At a minimum
the clients should support IMS User Agent as defined in the 3GPP spec
and be able to send and receive both IMS signaling and bearer traffic
over a Wi-Fi access point. In addition, an SWu client that supports
IPSec will can use ePDG-based packet core integration. This section
talks about some of the client side implementation considerations for
Wi-Fi calling.
9.1. Access Selection Criteria
The client device must select which RAT (cellular or Wi-Fi) it will
use for communication to the cellular network. Commonly deployed
access selection criteria is described below:
Device Local Policy Profile: In this case, the logic is defined by
locally configured policy. Local policy may allow the end user to
set prereferences. It is also possible for carriers to push these
profiles to the device. Some MNOs may prefer cellular instead of Wi-
Fi for voice service when both RAT technologies are available. Some
other carriers may have Wi-Fi preferred approach for IMS APN when
both RAT technologies are available. If Passpoint is enabled on the
Wi-Fi access network, the client may take into account network
loading conditions learned from the ANQP server to decide whether to
offload IMS traffic into the Wi-Fi network.
Pularikkal, et al. Expires January 4, 2018 [Page 23]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
9.2. Inter-RAT Handover
Inter-RAT handover refers to the handover of an active voice call
without service disruption when the UE switches out from one RAT
technology to another. Implementations must support handovers
between Wi-Fi and LTE.
Handover between LTE and Wi-Fi is acheived by maintaining IP or IPv6
addresses between the LTE interface and the IPSec tunnel over Wi-Fi.
If the IPSec tunnel is negotiated while a call is already in
progress, the IKEv2 Configuration Request should specify the local
address of the LTE interface in order to get assigned the same
address on the IPSec tunnel. Similarly, handover from an IPSec
tunnel over Wi-Fi to LTE requires the LTE interface to be brought up
with the same address as the tunnel. Maintaining the address allows
the client to not interrupt TCP or UDP connections that are using the
local address for communication. In a system that uses POSIX
sockets, for example, the handover must be done in such a way that
the sockets do not need to be closed and re-opened.
9.3. MTU Considerations
When handing over between LTE and IPSec tunnels over Wi-Fi, the
client device should be aware of the Maximum Transmission Unit (MTU)
of each interface. It is possible that the effective MTU for the
IPSec tunnel (which can be calculated as the MTU of the Wi-Fi
interface minus the overhead for ESP encryption) is notably smaller
than the effective MTU of the LTE interface. For UDP flows, they
should avoid sending large datagrams that could get fragmented when
handing over between RATs. For TCP flows, the Maximum Segment Size
based on the MTU SHOULD be re-calculated upon handover.
9.4. Congestion Management
Radio Network Performance management and QoS considerations described
earlier can significantly contribute to the overall QoE for Wi-Fi
calling. A client driven congestion management mechanism can
positively augment the overall experience. The idea is to
dynamically change the bandwidth requirements for the call based up
on the network congestion conditions. Network resource requirements
(bandwidth, packets per second etc.) per call are directly
proportional to the type of codec and the packetization rate.
Sometimes it may be desirable to switch out to a lower audio codec to
keep the drop, delay and jitter characteristics under acceptable
levels during periods of network congestion. Explicit Congestion
Notification for RTP over UDP defined in RFC 6679 can be used to
inform network congestion to the end clients. But this requires the
Pularikkal, et al. Expires January 4, 2018 [Page 24]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
network elements to mark the ECN bits on the IP header of the packet
when congestion conditions are encountered.
9.5. NAT Traversal
Since NATs are very commonly deployed primarily due to the shortage
of IPv4 address space, a client side implementation should support
NAT traversal for Wi-Fi calling. IPSec implementation on the client
side should support the detection of NAT gateways as defined in RFC
7296 specification. If a NAT gateway is detected, client should send
all subsequent IPSec traffic from port 4500. If NAT is detected ESP
packets must be UDP encapsulation using port 4500. If NAT devices
are not detected, SWu may use pure ESP encapsulation without UDP. It
is important to understand the implications on firewall rules with
and without NAT so that the Wi-Fi calling does not get blocked by the
firewall. Many deployments may allow ESP with UDP encapsulation by
default but may block ESP only tunnels.
10. Acknowledgements
Authors would like to acknowledge the inputs and advice provided by
Eduardo Abrantes and Ajoy Singh.
11. Informative References
[IR51] "IMS Profile for Voice, Video and SMS over untrusted Wi-Fi
access Version 5.0", 2017.
[IR92] "IMS Profile for Voice and SMS Version 10.0", 2016.
[RFC4066] Liebsch, M., Ed., Singh, A., Ed., Chaskar, H., Funato, D.,
and E. Shim, "Candidate Access Router Discovery (CARD)",
RFC 4066, DOI 10.17487/RFC4066, July 2005,
<http://www.rfc-editor.org/info/rfc4066>.
[RFC4187] Arkko, J. and H. Haverinen, "Extensible Authentication
Protocol Method for 3rd Generation Authentication and Key
Agreement (EAP-AKA)", RFC 4187, DOI 10.17487/RFC4187,
January 2006, <http://www.rfc-editor.org/info/rfc4187>.
[RFC4555] Eronen, P., "IKEv2 Mobility and Multihoming Protocol
(MOBIKE)", RFC 4555, DOI 10.17487/RFC4555, June 2006,
<http://www.rfc-editor.org/info/rfc4555>.
[RFC4881] El Malki, K., Ed., "Low-Latency Handoffs in Mobile IPv4",
RFC 4881, DOI 10.17487/RFC4881, June 2007,
<http://www.rfc-editor.org/info/rfc4881>.
Pularikkal, et al. Expires January 4, 2018 [Page 25]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
[RFC5213] Gundavelli, S., Ed., Leung, K., Devarapalli, V.,
Chowdhury, K., and B. Patil, "Proxy Mobile IPv6",
RFC 5213, DOI 10.17487/RFC5213, August 2008,
<http://www.rfc-editor.org/info/rfc5213>.
[RFC5568] Koodli, R., Ed., "Mobile IPv6 Fast Handovers", RFC 5568,
DOI 10.17487/RFC5568, July 2009,
<http://www.rfc-editor.org/info/rfc5568>.
[RFC5944] Perkins, C., Ed., "IP Mobility Support for IPv4, Revised",
RFC 5944, DOI 10.17487/RFC5944, November 2010,
<http://www.rfc-editor.org/info/rfc5944>.
[RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility
Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July
2011, <http://www.rfc-editor.org/info/rfc6275>.
[RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T.
Kivinen, "Internet Key Exchange Protocol Version 2
(IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October
2014, <http://www.rfc-editor.org/info/rfc7296>.
[TS22228] "Service requirements for the Internet Protocol (IP)
multimedia core network subsystem (IMS); Stage 1", 2010.
[TS23402] "3rd Generation Partnership Project; Technical
Specification Group Services and System Aspects;
Architecture Enhancements for non-3GPP Accesses.", 2009.
[TS23852] "Study on S2a Mobility based on GPRS Tunneling Protocol
(GTP) and Wireless Local Area Network (WLAN) access to the
Enhanced Packet Core (EPC) network (SaMOG); Stage 2",
2011.
[TS29273] "Evolved Packet System (EPS); 3GPP EPS AAA interfaces",
2011.
Authors' Addresses
Byju Pularikkal
Cisco Systems
170 West Tasman Drive
San Jose
United States
Email: byjupg@cisco.com
Pularikkal, et al. Expires January 4, 2018 [Page 26]
Internet-DrafCarrier Wi-Fi Calling Deployment Considerations July 2017
Tommy Pauly
Apple Inc.
1 Infinite Loop
Cupertino, California 95014
US
Email: tpauly@apple.com
Mark Grayson
Cisco Systems
10 New Square Park
Feltham
United Kingdom
Email: mgrayson@cisco.com
Sri Gundavelli
Cisco Systems
170 West Tasman Drive
San Jose
United States
Email: sgundave@cisco.com
Samy Touati
Ericsson
300 Holger Way
San Jose, California 95134
US
Email: samy.touati@ericsson.com
Pularikkal, et al. Expires January 4, 2018 [Page 27]