SlideShare una empresa de Scribd logo
1 de 21
3G Mobile Internet Access
Access mode examples



© E.O‟Connor – February 2011
Provides an overview of 2.5 / 3G packet data service
technology & details of the various access methods
including how end-to-end authentication works

CONTENTS


                                                       2
CORE ELEMENTS
 The General Packet Data Service (GPRS) of GSM Phase 2, onwards consists
  of a number of core elements:
      Packet Control Unit (PCU) to „divert‟ the data from the basestation controller (BSC)
      Serving GPRS Support Node (SGSN)
      Gateway GPRS Support Node (GGSN)
      Domain Name Server to resolve Access Point Names


 Plus optionally an Authentication, Authorisation & Accounting (AAA) server
  offering:
    Remote Authentication Dial-In User Service (RADIUS) for user authentication
    Dynamic Host Configuration Protocol (DHCP) for IP address assignment and;
    a Domain Name System (DNS) for URL resolution


 UMTS keeps same functionality whilst renaming BSC / PCU combination as
  the Radio Network Controller (RNC)




                                                                                              3
PACKET NETWORK ELEMENTS
                                     SM-SC




                         PCU          DNS                                        Other PLMN


                 BSC
                                                SGSN
                                                                          GGSN                AAA

                                                              BG                                          RADIUS


                   BSC / RNC                                                   <APN>                                     DHCP

                                                                         GGSN                  Internet
                                                                                          (or Enterprise PDN)
                                                                                                                     DNS
                           PCU


                       BTS /
                       Node B          VLR          HLR


                          AAA    Authentication, Authorisation & Accounting server   PCU      Packet Control Unit
                          APN    Access Point Name                                   PDN      Packet Data Network (X25)
                          BG     Border Gateway                                      PLMN     Public Land Mobile Network
                          BSC    Basestation Controller                              RADIUS   Remote Authentication Dial-In User Service
TE   MT + USIM            BTS    Basestation Transceiver                             RNC      Radio Network Controller (3G)
                          DHCP   Dynamic Host Configuration Protocol server          SM-SC    Short Message Service Centre
                          DNS    Domain Name System server                           SGSN     Serving GPRS Support Node
                          GGSN   Gateway GPRS Support Node                           TE       Terminal Equipment (i.e. computer)
                          HLR    Home Location Register                              (U)SIM   Universal Subscriber Identity Module
                          MT     Mobile Terminal (MT + TE = Mobile Station)          VLR      Visitor Location Register            4
ACCESS MODES
 3GPP Specifications define two network access approaches:
     “Transparent” where no authentication other than the standard wireless USIM – HLR
      network access authentication is performed and;
     “Non-transparent” where in addition user authentication is performed with the GGSN
      involved in the process


 In reality the distinction is vague…

   IP PDP access                              PPP PDP Access
                                              (from Release 98 of 3GPP Standards onwards)
   „Basic‟ IP (= Transparent)                 PPP Relay

   IP with Protocol Configuration Options     PPP terminated at the GGSN

   DHCP Relay & Mobile IP
   (from Release 99 onwards)


 Majority of mobile operators have implemented “Simple” IP & “IP with
  Protocol Configuration Options” modes only

                                                                                            5
IPv4 over PPP, transparent mode

‘Simple’ IP
‘BASIC’ IP
 In „Basic‟ IP access mode the mobile operator network assigns a static or dynamic IP
  address to the terminal or application. This access mode may still use an AAA server to
  perform the IMSI or MS-ISDN authentication and subsequent IP address assignment (note:
  static IP address assignment is necessary if network-initiated PDP context activation is
  required).

 The limitation of this approach is that any external network must trust the wireless network
  operator to provide user authentication. There is nothing to prevent an individual getting hold
  of a terminal and accessing the network associated with the APN as no password or two-
  factor authentication (password + token) is used.

 This access mode is most suitable for services that require minimum interaction between the
  user and the terminal to set up connectivity, and is the default access mode for most web
  browsing applications, especially on Smartphones. Of course a Virtual Private Network (VPN)
  can be created once a „public‟ IP address has been assigned to the terminal to provide end-
  to-end authentication and security.




                                                                                                    7
IPv4 over PPP, non-transparent mode example
See: 3GPP 29-061, Section 11.2.1.2 IPv4 Non Transparent access to an Intranet or ISP


IP with Protocol Configuration Options
STEP-BY-STEP
Step by step the following interactions occur:
1.    The TE issues the appropriate AT commands to the MT to request a data session. The AT command string (+CGDCONT) specifies
      the Access Point Name (APN) of the terminating end point for the eventual end-to-end session.
2.    In a secure network the APN terminates within the appropriate firewalled Trusted Network‟s IP domain and hence leads to a private IP
      address assignment.
3.    The TE and MT then enter the link establishment phase using Link Control Protocol (LCP) – itself part of the PPP suite of protocols
      – to set the maximum receive unit and authentication protocol (CHAP or PAP) to be used in the subsequent phase.
4.    The MT then issues a CHAP-Challenge request specifying a unique ID plus a random number value.
5.    The TE authenticates itself towards the MT with a CHAP-Response including the received ID, plaintext username and a „response‟
      which is an MD5 hash value generated using the MD5 algorithm based on the received ID and random number value plus the TE-
      stored user password.. The MT stores this response locally.
6.    The MT sends a forced positive CHAP-Success response to the TE, regardless of whether the calculated contents of the CHAP-
      Response message are correct. Both the TE and MT must be configured for „CHAP‟ else authentication will fail.
7.    The TE then commences the IP Control Protocol (IPCP) phase to establish an IP connection. IPCP is responsible for configuring,
      enabling, and disabling the IP protocol on both ends of the point-to-point link. IPCP uses the same packet exchange mechanism as
      the LCP.
8.    The MT then triggers an Activate-PDP-Context towards the network with the authentication method („CHAP‟), username, the MD5
      hash (calculated from the user password), the original MT-generated random number value and ID, encapsulated within the Protocol
      Configuration Options (PCO) element of the PDP payload.
9.    The Serving GPRS Support Node (SGSN) interrogates the network-based Domain Name Service (DNS) server to resolve the APN to
      a real IP address representing the routing point for the subsequent session.
10.   The SGSN then triggers a Create-PDP-Context-Request towards the GGSN and hence the APN end point, which will be within the
      Trusted Network‟s domain. The SGSN forwards the PCO information element received in the Activate-PDP-Context message
      unchanged within the Create-PDP-Context-Request message‟s PCO element.
11.   The GGSN deduces from the APN (using configuration tables) the server(s) to be used for address allocation, authentication and
      PCO retrieval, the protocol (e.g. RADIUS and DHCP) to be used and the communication and security features needed to
      communicate with the server(s). In this example, the PCO fields include a request for dynamic allocation of DNS and WINS primary
      and secondary servers which are rejected by the GGSN.


                                                                                                                                             9
STEP-BY-STEP
Continued:
12.    Following a repeat of steps 7 through 11, at the GGSN the session is held until the RADIUS client authenticates the user with the
       RADIUS server using an Access-Request message. This message includes the username and MD5 Hash information forwarded
       within the PCO element of the Activate-PDP-Context and Create PDP-Context requests.
13.    The RADIUS server stores the plaintext username and can calculate the expected MD5 hash to see if the supplied end-user
       information is valid based on the additional information contained within the Access-Request message and derived from the PCO
       element. If so, an Access-Accept is passed back to the GGSN to permit an IP address to be obtained from the DHCP server, else an
       Access-Reject is issued.
14.    Assuming Access-Accept is granted by the RADIUS server the GGSN then interrogates the DHCP server to obtain a dynamic private
       IP address that will be assigned to the TE application. Note this IP address is assigned from the Trusted Network‟s private IP address
       space and hence the TE application will appear as if it belongs to the Trusted Network‟s domain. If an Access-Reject is received the
       GGSN will communicate this back to the MT / TE via the SGSN using the Create-PDP-Context message with the appropriate rejection
       „User authentication failed‟ cause.
15.    The DHCP-Offer is provided to the GGSN by the DHCP server with the offered IP address.
16.    The GGSN responds to the SGSN with a Create-PDP-Context response with the PCO field including the offered IP address and the
       cause field set to „Request Accepted‟; the SGSN in turn responds with an Activate-PDP-Context response towards the MT and the MT
       responds with a Configure-Nak (Acknowledge) command to the TE.
17.    If this IP address is acceptable to the TE application, the TE responds with a Configuration-Request, that is ultimately delivered back
       to the DHCP server.
18.    The DHCP server acknowledges the response sending a DHCP-Ack back via the GGSN and SGSN and finally the MT sends a
       Configure-Ack command to the TE. At this point the dynamic IP address is assigned to the TE and the authenticated end-to-end
       session is established, allowing any application using IP to communicate with network-side resources. For example, web browsing or
       File Transfer Protocol (FTP).



Note: IP addresses shown in following diagrams are for example only. The Trusted Network-facing side of the GGSN uses the IP address
space of the Trusted Network, performing IP address translation internally.



                                                                                                                                             10
Mobile Station                           Air Intf.                                Core Network                                                     Trusted Network
   1                  TE                            MT                SGSN            DNS Server
                                                                                                            GGSN (Traffic Plane: DHCP Relay)
                                                                                                                                                           RADIUS      DHCP Server           DNS
                                                                                                           RADIUS Client      DHCP Proxy Client
                           R-reference point                                                                                                Gi-interface

AT +CGDCONT=1,              TE & MT configured for „CHAP‟
"IP", "trusted.net"

AT DT *99***1#
                              PPP LCP
                            Configuration
                              Request

                                LCP Ack
                       (Auth Protocol: CHAP)




                       Configuration Ack
                       (Auth protocol: CHAP)


                       Configuration Ack


                                                         MT ‘challenges’ TE

                           CHAP Challenge
                       (CHAP ID, Random No.)



                           CHAP Response                 MT stores the authentication parameters
                        (CHAP ID, Username,
                       MD5 Hash of Password)             (ID, Random number, MD5 Hash, Username)


                            CHAP Success




                              IPC Config.                TE requests dynamic allocation of:
                                Request                                                                                                           CHAP: Challenge Handshake Authentication Protocol
                                                         IP address:                         0.0.0.0                                              IPCP: IP Control Protocol
                           (Interface identifier,
                                                         Primary DNS Server IP address:      0.0.0.0
                               compression)                                                                                                       LCP: Link Control Protocol Negotiation
                                                         Primary WINS server IP address:     0.0.0.0
                                                         Secondary DNS server IP address:    0.0.0.0                                              PDP: Packet Data Protocol
                              IPC Config.
                                                         Secondary WINS server IP address:   0.0.0.0                                              MD5: Message Digest Scheme 5
                                Request
                                                                                                                                                  MRU: Maximum Receive Unit
                                                                                                                                                  TEID: Terminal End-point Identifier
                           IPC Config. Ack

                 0.0.0.0                                                                                     10.2.1.73            10.10.11.1                                  10.2.2.10
                                                                                                       IP addresses as ‘seen’ by the Trusted Network
Mobile Station                        Air Intf.                                       Core Network                                                        Trusted Network
2               TE                            MT                 SGSN                DNS Server
                                                                                                                GGSN (Traffic Plane: DHCP Relay)
                                                                                                                                                            RADIUS         DHCP Server           DNS
                                                                                                               RADIUS Client      DHCP Proxy Client


                                                   Activate PDP                                                           GGSN performs:
Protocol Configuration Options
                                                     Context                                                              • APN to IP address translation via Core Network DNS
(PCO) information element:                     (APN, QoS, PDP-Type,
                                                   NSAPI, PCO)                                                            • Check on allowable PCO IE options and hence:
• CHAP information: Username +                                            DNS Query                                           • Determination of static vs dynamic allocation of IP addresses
  Random number + MD5 Hash                                                   (APN)                                            • Allocation of RADIUS Client or RADIUS Client & DHCP
• IPCP Configure-Request information                                                                                      • Translates the PCO, DHCP options and RADIUS attributes
                                                                         DNS Response
                                                                        (GGSN IP Address)


                                                                           Create PDP Context Request
                                                                           (APN, QoS, PDP-Type, TEID, PCO)


                                                                           Create PDP Context Response                  Reject: Client can only request IP address
                                                                              (PCO: IPCP „Configure-reject‟)


                                                 Activate PDP
                                               Context Response
                                               (PCO: IPCP „Configure-
                                                       reject‟)
                   IPCP Config Reject
                      (No DNS / DHCP)


                        IPC Config.
                                                   TE (client) requests dynamic allocation:
                          Request
                     (Interface identifier,
                                                   IP address:                               0.0.0.0
                         compression)


                                                   Activate PDP
                                                     Context
                                               (APN, QoS, PDP-Type,
                                                   NSAPI, PCO)
                                                                            Create PDP Context Request                                                CHAP: Challenge Handshake Authentication Protocol
                                                                           (APN, QoS, PDP-Type, TEID, PCO)                                            IPCP: IP Control Protocol
                                                                                                                                                      LCP: Link Control Protocol Negotiation
                                                                                                                                                      PDP: Packet Data Protocol
                                                                                                                                                      MD5: Message Digest Scheme 5
                                                                                                                                                      MRU: Maximum Receive Unit
                                                                                                                                                      TEID: Terminal End-point Identifier


              0.0.0.0                                                                                           10.2.1.73           10.10.11.1                                    10.2.2.10
                                                                                                                                                                                                     12
                                                                                                       IP addresses as ‘seen’ by the Trusted Network
Mobile Station                      Air Intf.                                 Core Network                                                                 Trusted Network
  3                TE                      MT                     SGSN         DNS Server
                                                                                                        GGSN (Traffic Plane: DHCP Relay)
                                                                                                                                                          RADIUS                  DHCP Server         DNS
                                                                                                       RADIUS Client      DHCP Proxy Client



                                                             GGSN RADIUS Client configured to pass                      RADIUS Access-Request
                                                                                                                                                                    RADIUS Server stores:
                                                             PCO CHAP authentication parameters in                     (Username, Password, Challenge)              • User name & password
                                                             Access-Request message                                                                                 Calculates:
                                                                                                                                                                    • MD5 Hash based on received information
                                                                                                                         RADIUS Access-Accept
                                                                                                                                                                      from MT and compares with received
                                    DHCP Proxy Client:                                                                                                                MD5 Hash
                                    • Acts as proxy on behalf of TE DHCP client


                                                                                                                                          DHCP Discover
                                                                                                                                      (Client IP address: 0.0.0.0,
                                                                                                                                  Relay Agent IP address: 10.10.11.1,
                                                                                                                                         Host Name: “GGSN”)


                                                                                                                                                         DHCP Offer
                                                                                                                                                                                          DHCP offer of IP
                                                                                                                                                (Client IP address: 10.10.11.2,           address
                                                                                                                                                 Subnet Mask: 255.255.255.0,
                                                                                                                                                IP address lease time: 4 hours
                                                                                   Create PDP Context Response                                       Server ID: 10.2.2.10)
                                                                                       (PCO: IPCP „Configure-nak‟)


                                                  Activate PDP
                                                Context Response
                                                (PCO: IPCP „Configure-
                                                        nak‟)

                        IPC Config. Nak
                     (IP address: 10.10.11.2)
                                                   Negotiable offer of IP address
IP address is
acceptable
                     IPC Config. Request
                     (IP address: 10.10.11.2)


                                                   Activate PDP
                                                     Context
                                                (PCO: IPCP „Configure-
                                                      Request‟)
                                                                         Create PDP Context Request
                                                                         (PCO: IPCP „Configure-Request‟)


                                                                                                                                          DHCP Request
                                                                                                                                   (Option 12: Host Name: “GGSN”)


                10.10.11.2                                                                                 10.2.1.73            10.10.11.1                                             10.2.2.10
                                                                                                                                                                                                             13
                                                                                                  IP addresses as ‘seen’ by the Trusted Network
Mobile Station                      Air Intf.                                        Core Network                                                                  Trusted Network
 4                TE                     MT                      SGSN                DNS Server
                                                                                                               GGSN (Traffic Plane: DHCP Relay)
                                                                                                                                                                  RADIUS                  DHCP Server           DNS
                                                                                                              RADIUS Client      DHCP Proxy Client



                                                                                                                                                                 DHCP Ack                         ACK to confirm
                                                                                                                                                        (IP address lease time: 4 hours
                                                                                                                                                          Subnet Mask: 255.255.255.0
                                                                                                                                                                                                  terminal acceptance.
                                                                                                                                                          Server Identifier: 10.2.2.10)
                                                                                         Create PDP Context Response
                                                                                             (PCO: IPCP „Configure-ack‟)


                                                 Activate PDP
                                               Context Response
                                               (PCO: IPCP „Configure-
                                                       ack‟)


Trusted                IPC Config. Ack
                    (IP address: 10.10.11.2)
Network’s IP
address
assigned                                                                                                             Data Session




DNS ‘update’

                                                                                                  DHCP Inform
                                                        (Client IP address: 10.10.11.2, Relay agent IP address: 10.2.1.77, Option 12 Host name: „MyComputer‟)


                                                                                                    DHCP Ack
                                                                 (Subnet mask: 255.255.255.0, DNS: 10.2.2.10, Domain Name: „trustednetwork.local‟)


                                                                                                                                                                                                 DNS A Record         DNS
                                                                                                                                                                                                   Update
                                                                                                                                                                                                                      Update




                                                                                                                    10.2.1.77 (DHCP Relay)
               10.10.11.2                                                                                       10.2.1.73               10.10.11.1                                             10.2.2.10
                                                                                                                                                                                                                  14
                                                                                                        IP addresses as ‘seen’ by the Trusted Network
Details of how CHAP information is carried between
the application and the RADIUS server using the
PCO Information Element

Challenge Handshake
Authentication Protocol
END-TO-END AUTHENTICATION
 Many organisations require end-to-end security, starting with verifying who
  the remote user is…
         To ensure that Terminal Equipment (TE) applications are not allowed internet or intranet access until positively
          authenticated, Mobile Terminals (MT) support both Password Access (PAP) & Challenge Handshake Authentication
          (CHAP) protocols
         CHAP is used by Point-to-Point Protocol (PPP) servers to validate the identity of remote clients
         PAP is not recommended as the user‟s details – username & password – are transmitted unencrypted


   CHAP periodically verifies the identity of the client by using a three-way handshake
         This happens at the time of establishing the initial link, and may happen again at any time afterwards


   Verification is based on a shared secret (such as the user's password)
     1.   After completion of the link establishment phase, the authenticator sends a „challenge‟ message to the peer (in this
          case the client)
     2.   The peer responds with a value calculated using a one-way hash function, such as an MD5 checksum hash
     3.   The authenticator checks the response against its own calculation of the expected hash value. If the values match,
          the authenticator acknowledges the authentication; otherwise it should terminate the connection
     4.   At random intervals the authenticator sends a new challenge to the peer & repeats steps 1 through 3




                                                                                                                                 16
END-TO-END AUTHENTICATION
 CHAP provides protection against playback attack# through the use of an
  incrementally changing identifier and of a variable challenge-value.
          CHAP requires that both the client and server know the plaintext of the secret, although it is never sent over the
           network.


 CHAP authentication in GPRS / UMTS is used in two slightly different ways.
          Between the GGSN and the RADIUS Server, authentication follows the four-step process described. The GGSN has a
           „RADIUS client‟ configured with a shared secret key communicating securely with the RADIUS Server.

          Between the TE and MT, and thereafter with the RADIUS server, a modified authentication process is followed in
           keeping with the standard GPRS authentication model.
               The PPP is only used between the TE and MT with the MT sending a forced acknowledgement back to the TE regardless
                of the TE‟s response.
               The MT stores this information and then forwards both the original MT challenge and TE response to the RADIUS server
                for authentication. This reflects the decisions made by the original ETSI standardisation committees seeking to extend
                packet data operation to peripheral equipment in the mobile domain.


 The Protocol Configuration Options (PCO) Information Element of the Create / Activate
  PDP Context Packet Data Protocol (PDP) is used to carry CHAP and other PPP
  information between the Terminal Equipment and the GGSN.




# where the same data (i.e. the password) is sent again later – by someone who was eavesdropping on the original session – in an
  attempt to authenticate using the same credentials as the genuine user.                                                                17
CHAP                     (IN DETAIL)


                                   TE                                                                           MT

   A                                      Username = “Alice”
                                          User Password = “LookingGlass”
                                                                                                                 Authentication = “CHAP”
                                                                                                                 Secret Key = “packetdata”
                                          Authentication = “CHAP”                                                Device Name = “MT Name”


                                                                CHAP-Challenge

                                           ID = 01   Random Number = “87abfa444519b38af”     Name = “MT Name”
ID + User Password + Random
           Number
  MD5
Algorithm
                                                                 CHAP-Response
                                                                                                                 MT stores the authentication
    MD5 Hash Response           ID = 01     Hash Response = ee090487b82c1e1323f”      Name = “Alice”             parameters for onward
                                                                                                                 tranmission



                                                                  CHAP-Success
                                                                                                                 MT forces a positive
                                                                                   ID = 01   Name = “MT Name”    acknowledgement
                                                                                                                 CHAP-Success message




                                                                                                                                                18
CHAP                       (IN DETAIL)



B                                                                                                SGSN (& DNS)


                                                     Activate-PDP-Context
    Note: certain fields    PDP Type   NSAPI    QoS Requirements   APN = “tetra.com”    PCO
    removed for clarity




                                       “CHAP”    Random Number = “87abfa444519b38af”   ID = 01

                                        Name = “Alice”    Hash Response = ee090487b82c1e1323f”




                                                                                                                19
CHAP                     (IN DETAIL)


                                                                                                  GGSN

C                              SGSN (& DNS)

                                               Create-PDP-Context-Request
Note: additional fields                                           GGSN Address In Use
                           PDP Type    TEID    QoS Requirements                         PCO
removed for clarity                                                 = “192.34.3.45”




                                      “CHAP”    Random Number = “87abfa444519b38af”     ID = 01

                                       Name = “Alice”    Hash Response = ee090487b82c1e1323f”




                                                                                                         20
CHAP                     (IN DETAIL)


                             GGSN (NAS)
                                                                                                        RADIUS
                                                                                                        Server
D                                                                                                                    Username = “Alice”
                                                                                                                     User Password = “LookingGlass”

                                                 RADIUS Access-Request
Note: additional fields                                                        NAS IP Address =
                                                                                                     Username used to
                           Username = “Alice”   CHAP Password CHAP Challenge                                                    User Password +
removed for clarity                                                             “192.34.3.45”          lookup RADIUS
                                                                                                                                CHAP Challenge
                                                                                                     server information
                                                                                                                            MD5
                                                                                                                          Algorithm
                             Hash Response = ee090487b82c1e1323f”
                                                                                                                                Calculated MD5
                                                                                                                                Hash Response
                                                   Random Number = “87abfa444519b38af”     ID = 01
                                                                                                                          Calculated = received Hash
                                                                                                                                  Response ?




                                                                                                                                              21

Más contenido relacionado

La actualidad más candente

205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-finalOlivier Rostaing
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
 
Ir.67 v8.0- enum dns guidelines
Ir.67 v8.0- enum dns guidelinesIr.67 v8.0- enum dns guidelines
Ir.67 v8.0- enum dns guidelinesuwb_group
 
The Private Mobile Network Gsm Solution
The Private Mobile Network Gsm SolutionThe Private Mobile Network Gsm Solution
The Private Mobile Network Gsm SolutionRight ToSpectrum
 
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAMPLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAMPROIDEA
 
GGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeGGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeMustafa Golam
 
Ready for the Evolution: LTE Session delivery requirements
Ready for the Evolution: LTE Session delivery requirementsReady for the Evolution: LTE Session delivery requirements
Ready for the Evolution: LTE Session delivery requirementsAcmePacket
 
Nuruddin Ahmed (063429056)
Nuruddin Ahmed (063429056)Nuruddin Ahmed (063429056)
Nuruddin Ahmed (063429056)mashiur
 
Quality of service
Quality of serviceQuality of service
Quality of servicevmkris000
 
Cisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSCisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSEddie Kempe
 
Diameter based Interfaces and description
Diameter based Interfaces and descriptionDiameter based Interfaces and description
Diameter based Interfaces and descriptionManjeet Kaur
 
Sample template to report internet dns's performance
Sample template to report internet dns's performanceSample template to report internet dns's performance
Sample template to report internet dns's performanceMustafa Golam
 
DYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLDYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLVENKATESHAN A S
 
Lte epc trial experience
Lte epc trial experienceLte epc trial experience
Lte epc trial experienceHussien Mahmoud
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATIONDaisyWatson5
 
Diameter and Diameter Roaming
Diameter and Diameter RoamingDiameter and Diameter Roaming
Diameter and Diameter RoamingJohn Loughney
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transformaniruddh Tyagi
 

La actualidad más candente (20)

205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Ir.67 v8.0- enum dns guidelines
Ir.67 v8.0- enum dns guidelinesIr.67 v8.0- enum dns guidelines
Ir.67 v8.0- enum dns guidelines
 
The Private Mobile Network Gsm Solution
The Private Mobile Network Gsm SolutionThe Private Mobile Network Gsm Solution
The Private Mobile Network Gsm Solution
 
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAMPLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
 
GGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeGGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support Node
 
Ready for the Evolution: LTE Session delivery requirements
Ready for the Evolution: LTE Session delivery requirementsReady for the Evolution: LTE Session delivery requirements
Ready for the Evolution: LTE Session delivery requirements
 
Gb over ip
Gb over ipGb over ip
Gb over ip
 
Nuruddin Ahmed (063429056)
Nuruddin Ahmed (063429056)Nuruddin Ahmed (063429056)
Nuruddin Ahmed (063429056)
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Cisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSCisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoS
 
Diameter Overview
Diameter OverviewDiameter Overview
Diameter Overview
 
Diameter based Interfaces and description
Diameter based Interfaces and descriptionDiameter based Interfaces and description
Diameter based Interfaces and description
 
Sample template to report internet dns's performance
Sample template to report internet dns's performanceSample template to report internet dns's performance
Sample template to report internet dns's performance
 
DYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLDYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOL
 
Lte epc trial experience
Lte epc trial experienceLte epc trial experience
Lte epc trial experience
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 
Diameter and Diameter Roaming
Diameter and Diameter RoamingDiameter and Diameter Roaming
Diameter and Diameter Roaming
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transform
 

Destacado (7)

L2tp1
L2tp1L2tp1
L2tp1
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
Remote access service
Remote access serviceRemote access service
Remote access service
 

Similar a 3G Mobile Internet

Copy Of Copy Of Gprs
Copy Of Copy Of GprsCopy Of Copy Of Gprs
Copy Of Copy Of Gprsakash
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 
IPLOOK GGSN product information
IPLOOK GGSN product information IPLOOK GGSN product information
IPLOOK GGSN product information IPLOOK Networks
 
2003 salih 3_gdata1
2003 salih 3_gdata12003 salih 3_gdata1
2003 salih 3_gdata1tapansaha26
 
PGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationPGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationMustafa Golam
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
General Packet Radio Service (GPRS)
General Packet Radio Service (GPRS) General Packet Radio Service (GPRS)
General Packet Radio Service (GPRS) Partha Bhunia
 
Gprs persentation
Gprs persentation Gprs persentation
Gprs persentation sumit singh
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lteMorg
 
19080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v119080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v1vedaarunachalam
 
Hybrid IP PBX February 2014
Hybrid IP PBX February 2014Hybrid IP PBX February 2014
Hybrid IP PBX February 2014Matrixcomsec Ttg
 
12 module
12  module12  module
12 moduleAsif
 

Similar a 3G Mobile Internet (20)

GPRS
GPRSGPRS
GPRS
 
Copy Of Copy Of Gprs
Copy Of Copy Of GprsCopy Of Copy Of Gprs
Copy Of Copy Of Gprs
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
Gprs Tutorial
Gprs TutorialGprs Tutorial
Gprs Tutorial
 
IPLOOK GGSN product information
IPLOOK GGSN product information IPLOOK GGSN product information
IPLOOK GGSN product information
 
2003 salih 3_gdata1
2003 salih 3_gdata12003 salih 3_gdata1
2003 salih 3_gdata1
 
PGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationPGW GGSN Optional Services Configuration
PGW GGSN Optional Services Configuration
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
General Packet Radio Service (GPRS)
General Packet Radio Service (GPRS) General Packet Radio Service (GPRS)
General Packet Radio Service (GPRS)
 
Gprs persentation
Gprs persentation Gprs persentation
Gprs persentation
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lte
 
19080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v119080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v1
 
gsm,umts.ppt
gsm,umts.pptgsm,umts.ppt
gsm,umts.ppt
 
Hybrid IP PBX February 2014
Hybrid IP PBX February 2014Hybrid IP PBX February 2014
Hybrid IP PBX February 2014
 
12 module
12  module12  module
12 module
 
Gprs[1]
Gprs[1]Gprs[1]
Gprs[1]
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

3G Mobile Internet

  • 1. 3G Mobile Internet Access Access mode examples © E.O‟Connor – February 2011
  • 2. Provides an overview of 2.5 / 3G packet data service technology & details of the various access methods including how end-to-end authentication works CONTENTS 2
  • 3. CORE ELEMENTS  The General Packet Data Service (GPRS) of GSM Phase 2, onwards consists of a number of core elements:  Packet Control Unit (PCU) to „divert‟ the data from the basestation controller (BSC)  Serving GPRS Support Node (SGSN)  Gateway GPRS Support Node (GGSN)  Domain Name Server to resolve Access Point Names  Plus optionally an Authentication, Authorisation & Accounting (AAA) server offering:  Remote Authentication Dial-In User Service (RADIUS) for user authentication  Dynamic Host Configuration Protocol (DHCP) for IP address assignment and;  a Domain Name System (DNS) for URL resolution  UMTS keeps same functionality whilst renaming BSC / PCU combination as the Radio Network Controller (RNC) 3
  • 4. PACKET NETWORK ELEMENTS SM-SC PCU DNS Other PLMN BSC SGSN GGSN AAA BG RADIUS BSC / RNC <APN> DHCP GGSN Internet (or Enterprise PDN) DNS PCU BTS / Node B VLR HLR AAA Authentication, Authorisation & Accounting server PCU Packet Control Unit APN Access Point Name PDN Packet Data Network (X25) BG Border Gateway PLMN Public Land Mobile Network BSC Basestation Controller RADIUS Remote Authentication Dial-In User Service TE MT + USIM BTS Basestation Transceiver RNC Radio Network Controller (3G) DHCP Dynamic Host Configuration Protocol server SM-SC Short Message Service Centre DNS Domain Name System server SGSN Serving GPRS Support Node GGSN Gateway GPRS Support Node TE Terminal Equipment (i.e. computer) HLR Home Location Register (U)SIM Universal Subscriber Identity Module MT Mobile Terminal (MT + TE = Mobile Station) VLR Visitor Location Register 4
  • 5. ACCESS MODES  3GPP Specifications define two network access approaches:  “Transparent” where no authentication other than the standard wireless USIM – HLR network access authentication is performed and;  “Non-transparent” where in addition user authentication is performed with the GGSN involved in the process  In reality the distinction is vague… IP PDP access PPP PDP Access (from Release 98 of 3GPP Standards onwards) „Basic‟ IP (= Transparent) PPP Relay IP with Protocol Configuration Options PPP terminated at the GGSN DHCP Relay & Mobile IP (from Release 99 onwards)  Majority of mobile operators have implemented “Simple” IP & “IP with Protocol Configuration Options” modes only 5
  • 6. IPv4 over PPP, transparent mode ‘Simple’ IP
  • 7. ‘BASIC’ IP  In „Basic‟ IP access mode the mobile operator network assigns a static or dynamic IP address to the terminal or application. This access mode may still use an AAA server to perform the IMSI or MS-ISDN authentication and subsequent IP address assignment (note: static IP address assignment is necessary if network-initiated PDP context activation is required).  The limitation of this approach is that any external network must trust the wireless network operator to provide user authentication. There is nothing to prevent an individual getting hold of a terminal and accessing the network associated with the APN as no password or two- factor authentication (password + token) is used.  This access mode is most suitable for services that require minimum interaction between the user and the terminal to set up connectivity, and is the default access mode for most web browsing applications, especially on Smartphones. Of course a Virtual Private Network (VPN) can be created once a „public‟ IP address has been assigned to the terminal to provide end- to-end authentication and security. 7
  • 8. IPv4 over PPP, non-transparent mode example See: 3GPP 29-061, Section 11.2.1.2 IPv4 Non Transparent access to an Intranet or ISP IP with Protocol Configuration Options
  • 9. STEP-BY-STEP Step by step the following interactions occur: 1. The TE issues the appropriate AT commands to the MT to request a data session. The AT command string (+CGDCONT) specifies the Access Point Name (APN) of the terminating end point for the eventual end-to-end session. 2. In a secure network the APN terminates within the appropriate firewalled Trusted Network‟s IP domain and hence leads to a private IP address assignment. 3. The TE and MT then enter the link establishment phase using Link Control Protocol (LCP) – itself part of the PPP suite of protocols – to set the maximum receive unit and authentication protocol (CHAP or PAP) to be used in the subsequent phase. 4. The MT then issues a CHAP-Challenge request specifying a unique ID plus a random number value. 5. The TE authenticates itself towards the MT with a CHAP-Response including the received ID, plaintext username and a „response‟ which is an MD5 hash value generated using the MD5 algorithm based on the received ID and random number value plus the TE- stored user password.. The MT stores this response locally. 6. The MT sends a forced positive CHAP-Success response to the TE, regardless of whether the calculated contents of the CHAP- Response message are correct. Both the TE and MT must be configured for „CHAP‟ else authentication will fail. 7. The TE then commences the IP Control Protocol (IPCP) phase to establish an IP connection. IPCP is responsible for configuring, enabling, and disabling the IP protocol on both ends of the point-to-point link. IPCP uses the same packet exchange mechanism as the LCP. 8. The MT then triggers an Activate-PDP-Context towards the network with the authentication method („CHAP‟), username, the MD5 hash (calculated from the user password), the original MT-generated random number value and ID, encapsulated within the Protocol Configuration Options (PCO) element of the PDP payload. 9. The Serving GPRS Support Node (SGSN) interrogates the network-based Domain Name Service (DNS) server to resolve the APN to a real IP address representing the routing point for the subsequent session. 10. The SGSN then triggers a Create-PDP-Context-Request towards the GGSN and hence the APN end point, which will be within the Trusted Network‟s domain. The SGSN forwards the PCO information element received in the Activate-PDP-Context message unchanged within the Create-PDP-Context-Request message‟s PCO element. 11. The GGSN deduces from the APN (using configuration tables) the server(s) to be used for address allocation, authentication and PCO retrieval, the protocol (e.g. RADIUS and DHCP) to be used and the communication and security features needed to communicate with the server(s). In this example, the PCO fields include a request for dynamic allocation of DNS and WINS primary and secondary servers which are rejected by the GGSN. 9
  • 10. STEP-BY-STEP Continued: 12. Following a repeat of steps 7 through 11, at the GGSN the session is held until the RADIUS client authenticates the user with the RADIUS server using an Access-Request message. This message includes the username and MD5 Hash information forwarded within the PCO element of the Activate-PDP-Context and Create PDP-Context requests. 13. The RADIUS server stores the plaintext username and can calculate the expected MD5 hash to see if the supplied end-user information is valid based on the additional information contained within the Access-Request message and derived from the PCO element. If so, an Access-Accept is passed back to the GGSN to permit an IP address to be obtained from the DHCP server, else an Access-Reject is issued. 14. Assuming Access-Accept is granted by the RADIUS server the GGSN then interrogates the DHCP server to obtain a dynamic private IP address that will be assigned to the TE application. Note this IP address is assigned from the Trusted Network‟s private IP address space and hence the TE application will appear as if it belongs to the Trusted Network‟s domain. If an Access-Reject is received the GGSN will communicate this back to the MT / TE via the SGSN using the Create-PDP-Context message with the appropriate rejection „User authentication failed‟ cause. 15. The DHCP-Offer is provided to the GGSN by the DHCP server with the offered IP address. 16. The GGSN responds to the SGSN with a Create-PDP-Context response with the PCO field including the offered IP address and the cause field set to „Request Accepted‟; the SGSN in turn responds with an Activate-PDP-Context response towards the MT and the MT responds with a Configure-Nak (Acknowledge) command to the TE. 17. If this IP address is acceptable to the TE application, the TE responds with a Configuration-Request, that is ultimately delivered back to the DHCP server. 18. The DHCP server acknowledges the response sending a DHCP-Ack back via the GGSN and SGSN and finally the MT sends a Configure-Ack command to the TE. At this point the dynamic IP address is assigned to the TE and the authenticated end-to-end session is established, allowing any application using IP to communicate with network-side resources. For example, web browsing or File Transfer Protocol (FTP). Note: IP addresses shown in following diagrams are for example only. The Trusted Network-facing side of the GGSN uses the IP address space of the Trusted Network, performing IP address translation internally. 10
  • 11. Mobile Station Air Intf. Core Network Trusted Network 1 TE MT SGSN DNS Server GGSN (Traffic Plane: DHCP Relay) RADIUS DHCP Server DNS RADIUS Client DHCP Proxy Client R-reference point Gi-interface AT +CGDCONT=1, TE & MT configured for „CHAP‟ "IP", "trusted.net" AT DT *99***1# PPP LCP Configuration Request LCP Ack (Auth Protocol: CHAP) Configuration Ack (Auth protocol: CHAP) Configuration Ack MT ‘challenges’ TE CHAP Challenge (CHAP ID, Random No.) CHAP Response MT stores the authentication parameters (CHAP ID, Username, MD5 Hash of Password) (ID, Random number, MD5 Hash, Username) CHAP Success IPC Config. TE requests dynamic allocation of: Request CHAP: Challenge Handshake Authentication Protocol IP address: 0.0.0.0 IPCP: IP Control Protocol (Interface identifier, Primary DNS Server IP address: 0.0.0.0 compression) LCP: Link Control Protocol Negotiation Primary WINS server IP address: 0.0.0.0 Secondary DNS server IP address: 0.0.0.0 PDP: Packet Data Protocol IPC Config. Secondary WINS server IP address: 0.0.0.0 MD5: Message Digest Scheme 5 Request MRU: Maximum Receive Unit TEID: Terminal End-point Identifier IPC Config. Ack 0.0.0.0 10.2.1.73 10.10.11.1 10.2.2.10 IP addresses as ‘seen’ by the Trusted Network
  • 12. Mobile Station Air Intf. Core Network Trusted Network 2 TE MT SGSN DNS Server GGSN (Traffic Plane: DHCP Relay) RADIUS DHCP Server DNS RADIUS Client DHCP Proxy Client Activate PDP GGSN performs: Protocol Configuration Options Context • APN to IP address translation via Core Network DNS (PCO) information element: (APN, QoS, PDP-Type, NSAPI, PCO) • Check on allowable PCO IE options and hence: • CHAP information: Username + DNS Query • Determination of static vs dynamic allocation of IP addresses Random number + MD5 Hash (APN) • Allocation of RADIUS Client or RADIUS Client & DHCP • IPCP Configure-Request information • Translates the PCO, DHCP options and RADIUS attributes DNS Response (GGSN IP Address) Create PDP Context Request (APN, QoS, PDP-Type, TEID, PCO) Create PDP Context Response Reject: Client can only request IP address (PCO: IPCP „Configure-reject‟) Activate PDP Context Response (PCO: IPCP „Configure- reject‟) IPCP Config Reject (No DNS / DHCP) IPC Config. TE (client) requests dynamic allocation: Request (Interface identifier, IP address: 0.0.0.0 compression) Activate PDP Context (APN, QoS, PDP-Type, NSAPI, PCO) Create PDP Context Request CHAP: Challenge Handshake Authentication Protocol (APN, QoS, PDP-Type, TEID, PCO) IPCP: IP Control Protocol LCP: Link Control Protocol Negotiation PDP: Packet Data Protocol MD5: Message Digest Scheme 5 MRU: Maximum Receive Unit TEID: Terminal End-point Identifier 0.0.0.0 10.2.1.73 10.10.11.1 10.2.2.10 12 IP addresses as ‘seen’ by the Trusted Network
  • 13. Mobile Station Air Intf. Core Network Trusted Network 3 TE MT SGSN DNS Server GGSN (Traffic Plane: DHCP Relay) RADIUS DHCP Server DNS RADIUS Client DHCP Proxy Client GGSN RADIUS Client configured to pass RADIUS Access-Request RADIUS Server stores: PCO CHAP authentication parameters in (Username, Password, Challenge) • User name & password Access-Request message Calculates: • MD5 Hash based on received information RADIUS Access-Accept from MT and compares with received DHCP Proxy Client: MD5 Hash • Acts as proxy on behalf of TE DHCP client DHCP Discover (Client IP address: 0.0.0.0, Relay Agent IP address: 10.10.11.1, Host Name: “GGSN”) DHCP Offer DHCP offer of IP (Client IP address: 10.10.11.2, address Subnet Mask: 255.255.255.0, IP address lease time: 4 hours Create PDP Context Response Server ID: 10.2.2.10) (PCO: IPCP „Configure-nak‟) Activate PDP Context Response (PCO: IPCP „Configure- nak‟) IPC Config. Nak (IP address: 10.10.11.2) Negotiable offer of IP address IP address is acceptable IPC Config. Request (IP address: 10.10.11.2) Activate PDP Context (PCO: IPCP „Configure- Request‟) Create PDP Context Request (PCO: IPCP „Configure-Request‟) DHCP Request (Option 12: Host Name: “GGSN”) 10.10.11.2 10.2.1.73 10.10.11.1 10.2.2.10 13 IP addresses as ‘seen’ by the Trusted Network
  • 14. Mobile Station Air Intf. Core Network Trusted Network 4 TE MT SGSN DNS Server GGSN (Traffic Plane: DHCP Relay) RADIUS DHCP Server DNS RADIUS Client DHCP Proxy Client DHCP Ack ACK to confirm (IP address lease time: 4 hours Subnet Mask: 255.255.255.0 terminal acceptance. Server Identifier: 10.2.2.10) Create PDP Context Response (PCO: IPCP „Configure-ack‟) Activate PDP Context Response (PCO: IPCP „Configure- ack‟) Trusted IPC Config. Ack (IP address: 10.10.11.2) Network’s IP address assigned Data Session DNS ‘update’ DHCP Inform (Client IP address: 10.10.11.2, Relay agent IP address: 10.2.1.77, Option 12 Host name: „MyComputer‟) DHCP Ack (Subnet mask: 255.255.255.0, DNS: 10.2.2.10, Domain Name: „trustednetwork.local‟) DNS A Record DNS Update Update 10.2.1.77 (DHCP Relay) 10.10.11.2 10.2.1.73 10.10.11.1 10.2.2.10 14 IP addresses as ‘seen’ by the Trusted Network
  • 15. Details of how CHAP information is carried between the application and the RADIUS server using the PCO Information Element Challenge Handshake Authentication Protocol
  • 16. END-TO-END AUTHENTICATION  Many organisations require end-to-end security, starting with verifying who the remote user is…  To ensure that Terminal Equipment (TE) applications are not allowed internet or intranet access until positively authenticated, Mobile Terminals (MT) support both Password Access (PAP) & Challenge Handshake Authentication (CHAP) protocols  CHAP is used by Point-to-Point Protocol (PPP) servers to validate the identity of remote clients  PAP is not recommended as the user‟s details – username & password – are transmitted unencrypted  CHAP periodically verifies the identity of the client by using a three-way handshake  This happens at the time of establishing the initial link, and may happen again at any time afterwards  Verification is based on a shared secret (such as the user's password) 1. After completion of the link establishment phase, the authenticator sends a „challenge‟ message to the peer (in this case the client) 2. The peer responds with a value calculated using a one-way hash function, such as an MD5 checksum hash 3. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection 4. At random intervals the authenticator sends a new challenge to the peer & repeats steps 1 through 3 16
  • 17. END-TO-END AUTHENTICATION  CHAP provides protection against playback attack# through the use of an incrementally changing identifier and of a variable challenge-value.  CHAP requires that both the client and server know the plaintext of the secret, although it is never sent over the network.  CHAP authentication in GPRS / UMTS is used in two slightly different ways.  Between the GGSN and the RADIUS Server, authentication follows the four-step process described. The GGSN has a „RADIUS client‟ configured with a shared secret key communicating securely with the RADIUS Server.  Between the TE and MT, and thereafter with the RADIUS server, a modified authentication process is followed in keeping with the standard GPRS authentication model.  The PPP is only used between the TE and MT with the MT sending a forced acknowledgement back to the TE regardless of the TE‟s response.  The MT stores this information and then forwards both the original MT challenge and TE response to the RADIUS server for authentication. This reflects the decisions made by the original ETSI standardisation committees seeking to extend packet data operation to peripheral equipment in the mobile domain.  The Protocol Configuration Options (PCO) Information Element of the Create / Activate PDP Context Packet Data Protocol (PDP) is used to carry CHAP and other PPP information between the Terminal Equipment and the GGSN. # where the same data (i.e. the password) is sent again later – by someone who was eavesdropping on the original session – in an attempt to authenticate using the same credentials as the genuine user. 17
  • 18. CHAP (IN DETAIL) TE MT A Username = “Alice” User Password = “LookingGlass” Authentication = “CHAP” Secret Key = “packetdata” Authentication = “CHAP” Device Name = “MT Name” CHAP-Challenge ID = 01 Random Number = “87abfa444519b38af” Name = “MT Name” ID + User Password + Random Number MD5 Algorithm CHAP-Response MT stores the authentication MD5 Hash Response ID = 01 Hash Response = ee090487b82c1e1323f” Name = “Alice” parameters for onward tranmission CHAP-Success MT forces a positive ID = 01 Name = “MT Name” acknowledgement CHAP-Success message 18
  • 19. CHAP (IN DETAIL) B SGSN (& DNS) Activate-PDP-Context Note: certain fields PDP Type NSAPI QoS Requirements APN = “tetra.com” PCO removed for clarity “CHAP” Random Number = “87abfa444519b38af” ID = 01 Name = “Alice” Hash Response = ee090487b82c1e1323f” 19
  • 20. CHAP (IN DETAIL) GGSN C SGSN (& DNS) Create-PDP-Context-Request Note: additional fields GGSN Address In Use PDP Type TEID QoS Requirements PCO removed for clarity = “192.34.3.45” “CHAP” Random Number = “87abfa444519b38af” ID = 01 Name = “Alice” Hash Response = ee090487b82c1e1323f” 20
  • 21. CHAP (IN DETAIL) GGSN (NAS) RADIUS Server D Username = “Alice” User Password = “LookingGlass” RADIUS Access-Request Note: additional fields NAS IP Address = Username used to Username = “Alice” CHAP Password CHAP Challenge User Password + removed for clarity “192.34.3.45” lookup RADIUS CHAP Challenge server information MD5 Algorithm Hash Response = ee090487b82c1e1323f” Calculated MD5 Hash Response Random Number = “87abfa444519b38af” ID = 01 Calculated = received Hash Response ? 21