Aptilo Networks
  • SOLUTIONS
    • Carrier Wi-Fi
      • Carrier Wi-Fi details
      • Operator Managed Guest Wi-Fi
      • Virtual Service Provider
      • Wi-Fi Monetization
      • Hotspot 2.0
    • Guest Wi-Fi
      • Enterprise Guest Wi-Fi
      • Hospitality Wi-Fi
      • Healthcare Wi-Fi
      • Airport Wi-Fi
      • Retail Wi-Fi
    • Mobile Data Offloading
      • Offloading Details
      • Authentication
      • Policy & Charging
      • 3GPP Wi-Fi Access
    • Wi-Fi Calling
      • What is Wi-Fi Calling?
      • Wi-Fi Calling Details
      • VoWiFi / VoLTE entitlement
    • IoT Connectivity
  • CLOUD
    • Cellular IoT Connectivity
      • IoT Security
    • Zero-touch Wi-Fi IoT
    • Aptilo Guest Wi-Fi Cloud (eng)
      • Consent & Personal Data
      • Wi-Fi Marketing
      • WiFi4EU
    • Aptilo Guest Wi-Fi Cloud (sv)
      • Samtycke & Personuppgifter
      • Wi-Fi Marknadsföring
      • WiFi4EU
  • PRODUCTS
    • Aptilo SMP
      • Scalability and Availability
      • System reporting
      • Aptilo ServiceGlue
    • Aptilo SMP Wi-Fi
      • Wi-Fi AAA
      • Wi-Fi Policy
      • Subscriber Management
      • Consent & Personal Data
      • Captive Portal
      • Wi-Fi Analytics
      • Wi-Fi Marketing
      • Prepaid and Charging
    • Aptilo SMP IoT
    • Aptilo SMP Applications
      • Aptilo SMP Venue Wi-Fi Mgr
      • Aptilo SMP SIM Authentication
      • Aptilo SMP Wi-Fi Calling
      • Aptilo SMP 3GPP AAA+
    • Aptilo Access Controller
  • SERVICES
    • Aptilo Managed Service
    • Aptilo Support
  • PARTNERS
  • COMPANY
    • About Us
    • Management
    • Awards
    • Careers
    • Resources
    • Privacy Policy
  • NEWS
    • Aptilo Blog
    • Press Releases
    • Aptilo in the News
    • Subscribe to News
    • Events
  • CONTACT US
  • Search
  • Menu Menu
Cellular and Wi-Fi convergence

Wi-Fi and Cellular Convergence – Opportunities Today

April 22, 2022/in Carrier Wi-Fi /by Johan Terve

This is an excerpt from our white paper Wi-Fi in the 5G Era – Strategy Guide for Operators. The full white paper is available here if you like what you read. Don’t hesitate to contact us if you have any questions.

Download White Paper

Business and technical consolidation trends all point in the same direction: Mobile and fixed networks are coming together – for the benefit of everyone in the industry and consumers.

5G introduces new network architectural concepts for Wi-Fi integration with the mobile core (non-3GPP access). In this post, we first explore the opportunities for mobile operators today and then the basic concepts of trusted and untrusted Wi-Fi access.  In our next blog post about Wi-Fi and Cellular convergence, we will dive into what is new within 5G, introduced in 3GPP releases 15 and 16. After that blog post, we will cover the new Access Traffic Steering, Switching & Splitting (ATSSS) function, the ‘Holy Grail’ of mobile data offloading. Spoiler alert; ATSSS complexity and reliance on device support mean it will likely take years to come to market.

WI-FI AND CELLULAR CONVERGENCE – OPPORTUNITIES TODAY

While Wi-Fi and cellular are on a gradual path to technical convergence, there can be no question that corporate fixed-cellular convergence, aka consolidation, has already been happening for a long time. Some years ago, dominant mobile operators trended towards acquiring cable and fiber operations. More recently, fixed service providers and cablecos have either acquired mobile operators or have become MVNOs themselves.

All of this is seeding the ground for technology and services convergence in addition to the more apparent corporate consolidation.

But, as already discussed in one of our blog posts, if genuine technical Wi-Fi and mobile (5G) convergence are to happen, service providers also need to break free from conventional organizational ‘silos’ and compartmentalized thinking on what technologies do and do not belong to mobile and fixed wireless services, respectively.

We believe there is significant untapped business potential in breaking such operator ‘silos’ to achieve progress in service and technological convergence.

Some of these opportunities do not need significant infrastructure investments, nor do operators need to wait for new convergence (3GPP) standards or equipment to emerge.

Selective Wi-Fi Offload is the answer

Selective Wi-Fi Offload is the answer Mobile network traffic data may indicate overcapacity. But that is often only true as a high-level average. There will always be some cell sites suffering from congestion and some only serving a handful of subscribers. Selective Wi-Fi offload is the answer: Build Wi-Fi capacity where it is needed most to make users happy (Churn zone) and always for indoor coverage.

If regulations allow it, mobile operators may even take the bold step to replace cellular with Wi-Fi at some locations (CAPEX overload zone).

Here is our suggested list of reasonably simple network changes that would create a ‘Wi-Fi offload’ service and hence a quick new source of revenue for operators:

  • Create an additional SSID (network name) supporting the 802.1x protocol on all of your existing Wi-Fi footprint.
  • Enable SIM-based Wi-Fi services authentication (using the EAP-SIM/AKA protocol).
  • Introduce selective offloading of mobile traffic to Wi-Fi at various locations.

By introducing the correct configurations and by provisioning devices correctly, such a scheme would create an additional layer of mobile network capacity using Wi-Fi. But this would also require that mobile and fixed parts of the operator organization collaborate.

Let’s now look into how to integrate Wi-Fi with the mobile core. The 3GPP standard offers two main strategies to integrate Wi-Fi networks with the mobile core: Trusted and untrusted non-3GPP (Wi-Fi) access.

UNTRUSTED NON-3GPP (WI-FI) ACCESS

Untrusted non-3GPP Access

Untrusted non-3GPP (Wi-Fi) access was first introduced in the Wi-Fi specification in 3GPP Release 6 (2005). At that time, Wi-Fi access points featuring advanced security features were rare. Hence Wi-Fi was considered open and unsecured by default. Untrusted access includes any Wi-Fi access that the operator has no control over, such as public hotspots, subscribers’ home Wi-Fi, and corporate Wi-Fi. It also consists of Wi-Fi that does not provide sufficient security mechanisms such as authentication and radio link encryption.

The fact that untrusted non-3GPP access works over any Wi-Fi network is the reason that it is the method of choice for Wi-Fi Calling.

The untrusted model requires no changes to the Wi-Fi network but impacts the device side because it needs an IPsec client to reside on the device. The device is connected through a secure IPsec tunnel directly to an IPsec Terminating Gateway in the Mobile Core, which is connected through an encrypted tunnel to the Packet Gateway. The Packet Gateway is used for both cellular and Wi-Fi traffic.

This integration on the core network side also means that Wi-Fi service management platforms, such as the Aptilo Service Management Platform™ (SMP), must interface with mobile core network HLR/HSS/AMF for SIM Authentication (EAP-SIM/AKA/AKA’ or 5G-AKA). This provides the same level of authentication security as in the cellular network. It may also be required to interface with mobile core network policy functions. In addition to authentication of the device, the SIM authentication process produces cryptographic keys used for IPsec tunnel establishment.

TRUSTED NON-3GPP (WI-FI) ACCESS

Trusted non-3GPP Access

Trusted non-3GPP (Wi-Fi) access was first introduced with the LTE standard in 3GPP Release 8 (2008). Trusted access is often assumed to be operator-built Wi-Fi access with encryption (enabled by 802.1x) in the Wi-Fi radio access network (RAN) and a secure authentication method (EAP). However, it is always up to the home operator to decide what is considered trusted.

In the case of trusted access, the device (UE) is connected through a Wireless Access Gateway in the Wi-Fi core. This Wireless Access Gateway is connected through a secure tunnel directly with the Packet Gateway, also used for cellular traffic in the Mobile Core.

SIM Authentication is also essential for trusted non-3GPP access. In addition to authentication of the device, it produces cryptographic keys used for encryption in the secure Wi-Fi network (802.1x).

 

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
To all posts
© 2001-2022 I Aptilo Networks
  • LinkedIn
  • Facebook
  • Twitter
Operators have to re-think IoT – Hyperscale Innovation Hyperscale IoT innovation Layers in a Hyperscale IoT solutionLayers in a Hyperscale IoT Connectivity Solution Scroll to top

We use cookies to improve and personalize your browsing experience. This site may also include cookies from third parties. By using this site, you consent to the use of cookies.

OKLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy
Accept settingsHide notification only