Professional Documents
Culture Documents
www.ixiacom.com
Table of Contents
Executive Summary..................................................................................................................................... 4
I. Mobile Broadband Networks Background................................................................................................. 5
II. Measuring Resiliency and Identifying Stress Fractures in Mobile Network Infrastructure....................16
III. Mobile Protocols and Super Flows........................................................................................................ 17
IV. BreakingPoint Application Profiles....................................................................................................... 20
VI. Glossary................................................................................................................................................ 26
Executive Summary
By the end of 2013, the number of mobile-connected devices will exceed the number of
people on earth, and by 2017 there will be nearly 1.4 mobile devices per capita.1 Google
Android phones, the Apple iPhone, the Apple iPad and similar devices continue to
feed an insatiable consumer appetite for continuous availability of rich content and highspeed premium services. "Mobile broadband subscriptions overtook fixed broadband
subscriptions in 20082, and show an astonishingly high growth rate of some 30% per
year".3 To meet this demand, mobile carriers are responding with aggressive rollouts of
next-generation networks and network infrastructures that will provide subscribers with a
wireless experience comparable to the wired residential broadband experience.
As mobile carriers move forward with next-generation converged networks, they are
deploying network and security devices designed for wireline broadband and traditional
networks. These network and security devices have not been evaluated to support a realworld mix of mobile applications, malicious traffic, and extreme load from tens of millions
of mobile subscribers. If carriers continue to use this strategy, they will not be able to
satisfy wireless network resiliency, security, and performance requirements. The result
will be an ongoing escalation of service failures on every mobile network.
If quality of service (QoS) is a main focus for a mobile carrier, then continuous service
failures should be the impetus for change. Mobile carriers have taken the first step
in making needed changes by investing in upgrades to their infrastructures to handle
the rapid rate of technology innovation, application growth, and ever-present security
vulnerabilities. As this report will detail, mobile carriers must also validate network
equipment and systems using real traffic and security threats to certify that the production
network will be resilient when faced with extreme load, stress, and attacks.
To prepare this report, Ixia examined 100 terabytes of aggregate mobile traffic data
provided by Ixia BreakingPoint customers in North America and Europe. The paper
outlines the traffic that these mobile networks are transporting, including the size of the
traffic, overall percentages and individual applications. It also provides recommendations
for mobile network operators (MNOs) and outlines the steps BreakingPoint has taken
to help MNOs and equipment manufacturers measure the resiliency of their network
equipment and systems to ensure that they perform as expected.
Data collection from mobile carriers in North America and Europe was conducted over
a 24-hour period on a normal weekday and is representative of an average day. The data
provides no indication of the number of carrier subscribers. Therefore, any per-user
analysis would be purely speculative. Where possible, we note similarities and differences
between the regions.
Additionally, we examine some open questions about the effects of the Apple iPhone
and Google Android devices on wireless networks, which have a significant impact on
the traffic that is passing through the network. As with any network, capacity varies
by location, whether it is cell tower, backhaul, or the core network. The references to
capacity are in regard to backhaul and the core network; the signaling and radio frequency
aspects of mobile broadband are a topic for future discussion.
1
2
3
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2012-2017. http://www.cisco.
com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html
ITU (2013): http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_
data.xls
The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU,
September 2013
Using the data provided in this paper, BreakingPoint has updated its own line of products
with the ability to simulate the real traffic mix seen on todays mobile network. Mobile
operators using BreakingPoint products can then verify whether the network elements
they are deploying will perform adequately when faced with the distinct traffic, unique
load peaks, security attacks, and applications running on mobile networks. That level of
visibility into infrastructure devices allows mobile operators to identify key weaknesses
and potential vulnerabilities to provide the high-level of service demanded by mobile
subscribers.
The traditional
wireline network
components used
in today's mobile
networks may not
effectively handle
the mix of mobile
traffic and load,
resulting in more
retransmits on
mobile devices,
mobile radio
frequencies, and
the signaling
infrastructure.
As the mix of network traffic increases in volume and complexity, it is critical that
MNOs validate both the security and the performance of their network infrastructure,
understanding the unique conditions and patterns of mobile traffic. That will act as
verification of the components ability to handle the unique characteristics of mobile data
traffic. It will also allow MNOs to more efficiently manage capacity, reduce time to market
with premium services, and ensure a quality subscriber experience.
Since Ixia provides network operators with the ability to validate network infrastructure
elements through the simulation of real-world application traffic, real-time security
attacks, and maximum load, it is in a unique position to see all sides of the network
4
5
6
7
The State of Broadband 2013: Universalizing Broadband, a Report by the Broadband Commission/ITU,
September 2013
comScore. (2008, Sept) comScore Reports that the U.S. Catches Up With Western Europe in Adoption of 3G
Mobile Devices. [Online]. http://ir.comscore.com/releasedetail.cfm?ReleaseID=332170
Pyramid Research, quarterly mobile data forecast, February 2013
FierceWireless, Progress report: A snapshot of U.S. LTE deployments in 2013. http://www.fiercewireless.
com/special-reports/progress-report-snapshot-us-lte-deployments-2013#ixzz2n7O6JW7y
equation. Although carriers are, understandably, protective of the details of their specific
traffic mix, they are also concerned with the massive stability, security, and performance
problems they are now experiencing. Because of these concerns, some of the largest
mobile operators in North America and Europe have provided 100 terabytes of aggregated
traffic data for Ixia to analyze. Careful examination of the data supports the conclusion that
mobile network traffic patterns are unique in their application mix and usage patterns as
detailed throughout this paper.
C. Sharma. (2009, Jul.) Managing Growth and Profits in the Yottabyte Era. [Online]. http://www.
chetansharma.com/Managing_Growth_and_Profits_in_the_Yottabyte_Era.pdf
Application
Gigabytes
Percentage
Web based
59059.00
77.03%
Blackberry
3940.64
5.14%
Flash RTMP
2631.62
3.43%
IPsec ESP
2261.98
2.95%
POP3s
1111.33
1.45%
Total
69004.57
90.00%
Category
Terabytes
Percentage of Traffic
Web
59.059
77.03%
Blackberry
3.940
5.14%
Streaming
3.309
4.32%
2.104
2.74%
P2P
0.607
0.79%
VoIP
0.341
0.45%
Gaming
0.190
0.25%
IM
0.096
0.12%
Other
7.023
9.16%
Total
76.669
100.00%
to-peer (P2P) services, notably Gnutella. The only streaming media that was individually
categorized was RTSP. However, at only 677 gigabytes, it is a small portion of the traffic.
BlackBerry traffic represents BlackBerry Messenger and push-mail traffic. The mail
applications POP3/POP3S, IMAP/IMAPS, and SMTP totaled 2.1 terabytes, or 2.74% of
traffic.
P2P and VoIP applications, which represent large amounts of data on wireline networks,
were mostly absent, at .79% and .45%, respectively. Gaming was also a small percentage
of the traffic, at 0.25%. The relatively-high latency of wireless networks could explain why
gaming and VoIP are such a small amount of the traffic. The initial claims to consumers
about 3G are for increased bandwidth, but reducing latency will be critical to ensuring that
applications such as VoIP, streaming, and gaming are usable on wireless networks.
While the Android Market represents only .28% of traffic, Hitslink.com reported that
the Android market share increased more than 50% in the last two months of 2009.13
That coincides with the introduction of the DROID by Motorola, which was released on
November 6, 2009,14 with sales estimates between 100,000 and 250,000 units for the
week of its release.15 Although that is significantly less than the iPhones 42 million, it is
an appreciable number, and all Android devices can use the Android Market.
17
of any exclusion in the collection data. The number of collection points used in gathering
the data was not provided. Overall, the traffic was 90% downlink and 10% uplink, and the
maximum advertised network speeds are 4.5 Mbps down and 1.7 Mbps up.18 In fairness to
the carrier, it does state the more reasonable expected speeds of 2.0 Mbps down and 700
Kbps up. While simple Web browsing is the single largest application, it is important to
note the diverse set of HTTP applications, as seen in Table 3.
Also of note is that although these applications share HTTP as a transport, they may
behave differently on the network and must be modeled separately. The mobile Web has
evolved beyond basic browsing and now delivers a full suite of rich content to mobile
users.
Other popular applications for mobile broadband users are apparent, as seen in Table 4.
13
14
15
16
17
18
Application
Gigabytes
Percentage
Browsing
5994.848
37.04%
Flash (non-YouTube/Myspace/
Yahoo!)
2559.834
15.82%
YouTube
2474.825
15.29%
HTTP Audio/Video
967.212
5.98%
Misc. Upload/Download
551.373
3.40%
BitTorrent
529.225
3.27%
Streaming
454.851
2.80%
HTTPS
315.706
1.95%
BBC iPlayer
306.180
1.89%
Total
14816.020
100.00%
Category
Gigabytes
Percentage
Web
13247.465
81.84%
P2P
810.512
5.01%
Streaming
765.281
4.73%
78.933
0.49%
Gaming
46.297
0.29%
VoIP
39.393
0.24%
IM
31.450
0.19%
Other
1166.730
7.21%
Total
16186.061
100.00%
Grouping various
application
types can more
clearly illustrate
the application
breakdown for the
network
Cisco Systems. (2008, Oct.) Approaching the Zettabye Era. [Online]. http://www.cisco.com/en/US/solutions/
collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481374.pdf and Cisco Systems. (2009, Oct.)
Cisco Visual Networking Index: Usage Study. [Online]. http://www.cisco.com/en/US/solutions/collateral/
ns341/ns525/ns537/ns705/Cisco_VNI_Usage_WP.html
20 The Cooperative Association for Internet Data Analysis. (2010, Jan.) Internet Traffic Classification. [Online].
http://www.caida.org/research/traffic-analysis/classification-overview/#discussion
reported to be present on fixed networks,18, 20, 21 and it is not consuming large amounts
of bandwidth, even at its daily peak. Taken together, all of those facts indicate that the
chokepoints with regard to mobile P2P are either the cell towers or the backhaul links,
which corroborates other findings.22
Grouping various
application
types can more
clearly illustrate
the application
breakdown for the
network
It would be interesting to see the P2P impact in future reports as well as its ratio to
streaming traffic. If it follows the same trend as fixed networks, then streaming should
surpass P2P for the European provider in as little as one year. Carriers should not mistake
that, however, to mean that P2P traffic will decline on an absolute level, because, as has
already been shown, overall traffic is expected to growand P2P with it. Instead, it will
likely decline relative to other applications.19, 21
Since music and video are the most popular media types downloaded via P2P networks,21
carriers should leverage that and provide value-added content in the form of streaming
media. That will also allow carriers to define data consumption on their own terms as far
as quality of service, routing policies and bandwidth management. Options could include
using caching and content distribution networks to achieve results similar to those already
realized by fixed networks.
The European wireless carrier could be an example that strategy, by capitalizing on what
might otherwise be viewed as detrimental applications on its network. By providing its
own video-on-demand (VoD) service, the European wireless carrier is able to provide a
service that reduces the load of P2P and other streaming applications on its network. Now
the European wireless carrier can choose where to place the content in its network and
potentially reduce core network bandwidth consumption of video streaming.
Only one reference to VoD was found23 on the European wireless carrier Web site. It is
possible that if VoD were positioned more prominently and marketed more aggressively,
the European wireless carrier would see an increase in its own video streaming relative to
other services (currently 45th on the list). The European wireless carrier Fair Use Policy
for its unlimited mobile broadband plans includes a monthly cap of 3GB, so VoD would
be lucrative if subscribers were to incur overages. Using a conservative estimate of 1
Mbps for a streaming video means that a single 90-minute movie would consume at least
675MB, with higher bit rates common.24
The European wireless carrier data also shows that mobile broadband networks are
starting to closely resemble fixed networks in many regards. Many applications are being
seen for the first time on mobile networks because of increased handset functionality.
In addition, more traditional devices such as laptops and netbooks are being brought
onto the mobile network via data cards and USB dongles. Those networks can be called
transitional networks because they represent an evolution from traditional voice-only
wireless networks toward the rich application mix of fixed networks.
Two notable exclusions are VoIP and instant messaging, for which the data shows traffic is
low. Those services likely are not widely used because of the phones native talk and
21
10
SMS/MMS capabilities or because the applications are being blocked.2526 One should not
expect mobile networks to align exactly with fixed networks but should expect to see
some similarities, in both benign and malicious traffic. The malware traffic that plagues
fixed networks will seep into wireless networks in step with the entrance of traditional
endpoint devices.27
The European
wireless carrier
data also shows that
mobile broadband
networks are
starting to closely
resemble fixed
networks in many
regards.
11
12
Mobile Devices
Offloading is only a
stopgap measure,
and carriers
LTE/4G deployments
must at least keep
pace with the
rapid adoption of
smartphones and
other devices.
One nagging question remains regarding the Apple iPhone: would traffic patterns be the
same on both iPhone and non-iPhone networks with different devices? Several stories
exist about AT&Ts network being unable to handle all of the iPhone traffic, especially
when iPhone density is high.28, 29 However, AT&T is not alone. The first UK carrier to
support the iPhone, O2, has apologized for issues on its own network.30 It seems as
though there was pent-up demand for network capacity, which was realized only by the
introduction of the iPhone.
As mentioned earlier, Android traffic was up more than 50% for November and December
2009, which closely correlates to the DROID release date. Many customers choose the
iPhone either because of contractual obligations or its earlier market availability, but
the Android sales numbers show consumers are willing to choose alternative devices a
significant fraction of the time.
28 C. Kang. (2010, Jan.) Lots of iPhone/AT&T woes at CES. [Online]. http://www.washingtonpost.com/wp-dyn/
content/article/2010/01/07/AR2010010704803.html
29 Michael Calore. (2009, March) SXSW: IPhone Influx Pushes AT&T to the Limit [Updated]. [Online]. http://
www.wired.com/epicenter/2009/03/sxsw-atts-spott/
30 A. Parker. (2009, Dec.) O2 says sorry for snags in London network. [Online]. http://www.ft.com/cms/
s/0/3b911fd4-f41a-11de-ac55-00144feab49a.html
13
Now that mature handsets are mainstream, one must wonder if carriers networks will be
able to support such a large number of devices. According to Cisco, an iPhone is capable
of generating 30 times the amount of traffic of a feature phone. A laptop with a data
card generates 450 times as much data. Additionally, mobile data will double every year
through 2014.31 Network equipment manufacturers must be prepared with products that
will meet those demands as carriers upgrade their networks to handle the increased load.
Although the market share for mobile devices will be discussed later in this paper,
AdMob Mobile Metrics reports32, 33 provide two important points. The approximate traffic
breakdown of the most popular devices for an Alternate North American wireless carrier
did not change drastically from October to December, as shown in Table 5.
Distributed Denial
of Service (DDoS)
attacks are no
longer the domain
of casual vandals
but are more likely
now to be criminally
or financially
motivated.
Manufacturer
October
December
Apple
68.00%
72.00%
Samsung
11.00%
10.00%
LG
10.00%
10.00%
RIM
2.00%
2.00%
Other
2.00%
2.00%
Manufacturer
October
December
RIM
35.00%
10.00%
Samsung
28.00%
12.00%
LG
22.00%
9.00%
Motorola
6.00%
55.00%
Other
4.00%
2.00%
HTC
1.00%
10.00%
Cisco Systems. (2010, Feb.) Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update,
2009-2014. [Online]. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/
white_paper_c11-520862.html
32 AdMob. (2009, Nov.) AdMob Mobile Metrics Report October 2009. [Online]. http://www.cisco.com/en/US/
solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html
33 AdMob. (2010, Jan.) AdMob Mobile Metrics Report. [Online]. http://metrics.admob.com/wpcontent/
uploads/2010/01/AdMob-Mobile-Metrics-Dec-09.pdf
14
It is apparent that Android phones have caused a massive shift in data use on the North
American wireless carriers network, a shift also likely seen by AT&T with the successive
release of each iPhone model. That equates to an absolute increase in data consumption.
The AdMob data shows that for all US carriers, there were 4.983 billion requests in
October, compared to 5.545 billion requests in December, an 11.27% increase in a twomonth period.
How will carriers deal with the surge in mobile broadband consumption? Alternatives
such as femtocells and Wi-Fi offloading are available, but subscriber sentiment is varied
with regard to the different technology and location used for layers 1 and 2.33,34 There is
also an upward trend of requests using Wi-Fi connections.31, 32 If that growth continues
proportional to all mobile traffic, it seems that carriers will initially be able to add capacity
at the same rates that they are now. Unfortunately, for those carriers offering quadruple
play services, the problem is just being shifted to a wireline network. The bandwidth
problem may be solved, but the latency issues for mobile content delivery still exist.
Devices like the iPhone are accelerating demand by increasing the functional utility of
mobile networks. Subscriber usage patterns clearly show a transition from a traditional
view of mobile networks. Offloading is only a stopgap measure, and carriers LTE/4G
deployments must at least keep pace with the rapid adoption of smartphones and other
devices.8
Over time, the application mix will more closely match fixed networks. Using the mobile
traffic and application data it was given, Ixia has created Application Profiles and Super
Flows, all of which are customizable so that customer networks can be accurately
modeled, simulated and measured using BreakingPoint products. Additionally, Ixia will
deliver Application Profiles and Super Flows in future BreakingPoint Application and
Threat Intelligence (ATI) to ensure that customers have the latest models available for
mobile broadband networks.
Unfortunately,
for those carriers
offering quadruple
play services, the
problem is just being
shifted to a wireline
network. The
bandwidth problem
may be solved, but
the latency issues
for mobile content
delivery still exis
34 Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005. [Online]. http://www.
securityfocus.com/news/10271
35 Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005. [Online]. http://www.
securityfocus.com/news/10271
36 K. Sabnani. (2009, Jun.) DOS Attacks Threaten Mobile Network Security. [Online]. http://www.theregister.
co.uk/2009/06/08/mobile_dos_threat/
37 Arbor Networks. (2010 Feb.) Worldwide Infrastructure Security Report, 5th Edition [Online]. http://www.
arbornetworks.com/report
15
After evaluating the traffic data provided by NA and European mobile carriers, Ixia
was able to import the intelligence into its products to provide a more comprehensive
assessment of network elements to be responsible for mobile traffic. The following section
details what Ixia provides and how mobile network operators can use these products to
harden their infrastructure and provide customers with an enhanced quality of experience.
During the design, development and deployment phases, mobile carriers can reduce their
risk if they know precisely how network equipment will perform, given their specific
traffic and application mix, load and user behavior. By measuring the performance and
security claims made by network equipment vendors, mobile operators will know whether
a network device will perform as advertised in the real world.
BreakingPoint Application Simulator is a feature of BreakingPoint products that allows
users to generate real-world application traffic, using more than 200 application protocols
at realistic speeds blended with live security attacks. Nearly every major application is
supported, with more being added as requested. For realistic modeling, those applications
can be combined with more than 6,000 security strikes in a blended stream and directed
at infrastructure components. It is critical to measure infrastructure performance and
stability with that type of blended stream to accurately predict real-world behavior and
stress fractures; security threats will not be encountered in isolation, and their impact on
performance of benign traffic must be measured and understood.
BreakingPoint products use the concepts of Flows, Super Flows, and Application Profiles
to organize benign traffic. A single application protocol, client, and server define a Flow.
A Super Flow is a collection of Flows used to create a realistic application. An example of
a Super Flow would be a Web request, which is actually a DNS request (or multiple DNS
requests) combined with an HTTP request (or multiple HTTP requests).
Finally, Application Profiles are weighted collections of Super Flows used to simulate
the actual traffic mix of a network. For enhanced realism and stability testing, mobile
operators can also use BreakingPoint products to apply protocol fuzzing to valid
application traffic, intentionally injecting errors in order to stress a devices ability to deal
with malformed packet or protocol data.
BreakingPoint also includes a cyber attack library of more than 6,000 attacks and an
integrated security search capability, which lets the user define attack types (by category,
vulnerability, keyword, etc.) and automatically updates when Ixia publishes new attacks.
No manual intervention is required to subject infrastructure components to the latest
DDoS or other security threats. For example, a MNO may create a smart strike list
consisting of mobile handset vulnerabilities and threats to large core routers from the
strike library, which is updated frequently.
16
Ixia has also released a one-click BreakingPoint Resiliency Score for completely
automated resiliency measurement, and detailed Resiliency Methodologies for validating
infrastructure performance against DDoS and Botnet attacks. The combination of new
mobile-specific Super Flows and integrated fuzzing and strike capability makes resiliency
testing for MNOs a straightforward proposition with BreakingPoint.
Based on these
current mobile
Application
Profiles, new
Super Flows were
created to enable
BreakingPoint
products to simulate
real world stateful
application and
attack traffic.
17
2. BlackBerry
a. 8310 Curve
b. 9000 Bold
c. 9630 Tour
3. Android
a. DROID by Motorola
b. HTC Dream
c. Samsung Moment
4. Nokia
a. S60
b. X3
c. E71
5. Opera
a. Mobile v9.51
b. Mini
i. v8.0
ii. v9.6
iii. v9.8
6. Windows Mobile
a. HTC Touch Pro
b. HTC Artemis
18
IPsec Protocol
IPsec is required for IPv6. However, it was designed to be used with IPv4 as well. It can
provide IP authentication and encryption, which are useful for creating a VPN. The IPsec
traffic that was seen in those collections was ESP and/or NAT-T.
RTMP Protocol
RTMP allows for multiplexing Flash video and audio streams over TCP. Although
BreakingPoint already has support for Adobe Flash file simulation, adding RTMP provides
us with the ability to better simulate streaming Flash video and audio. Adobe released the
specification in June 2009.
19
OpenVPN Protocol
OpenVPN is an open source SSL VPN implementation using TCP or UDP with the ability to
create encrypted tunnels and work with NAT gateways.
Super Flow
HTTP Mobile Protocol from BreakingPoint
37%
31%
4%
2%
4%
3%
2%
2%
3%
1%
BreakingPoint Raw
11%
20
Weight (Percentage)
Super Flow
Weight (Percentage)
37%
28%
3%
2%
4%
3%
2%
2%
1%
BreakingPoint Raw
18%
Super Flow
Weight (Percentage)
29%
32%
5%
4%
4%
6%
1%
1%
1%
1%
BreakingPoint Raw
16%
21
Super Flow
HTTP Mobile Protocol from BreakingPoint
7703
514
343
295
143
143
88
76
74
44
43
39
38
28
28
17
15
14
12
11
10
BreakingPoint Raw
312
22
Weight
Super Flow
Weight
7703
514
343
295
195
143
124
93
89
88
88
50
44
34
28
17
14
12
11
BreakingPoint Raw
291
As with the
European
daytime profile,
entertainment
applications have
a reduced daytime
presence.
23
Super Flow
Weight
7703
514
343
295
143
143
88
15
10
44
28
28
74
43
17
39
14
38
12
11
BreakingPoint Raw
312
24
V. Conclusion
Mobile carriers may be investing more than $72B into infrastructure in 2010,42 but are they
spending it in the right places? The data contained in this paper indicates where mobile
carriers should concern themselves when committing dollars to their infrastructure.
As is clearly apparent from BreahkingPoints examination of traffic data from major
European and North American mobile carriers, mobile network traffic is changing
dramatically. Mobile phones have evolved from voice and simple Web browsing into mini
computers and gaming platforms running bandwidth-intensive applications like video,
VoIP, P2P and multi-player games. The mobile carrier traffic BreakingPoint reviewed
also shows that mobile broadband data consumption is trending beyond traditional fixednetwork traffic and is plagued by both mobile-specific and traditional wireline security
threats. The problem is only compounded by the release of more feature-rich smartphones
and tablets and the adoption of laptop data dongles, which offer both heavy bandwidth
demands and malware target opportunities.
Beyond the unique distinctions of mobile network traffic, network outages make it
evident that carriers must begin viewing their infrastructure in a different manner. To
avoid trafficand security-related outages, mobile carriers must be prepared to handle
the increased load on their networks from smartphone and tablet devices. The volume
of data and complexity of those devices is much greater than that of traditional phones.
That does not mean simply building out more infrastructure. In fact, it points to validating
network equipment and systems based on the mobile network traffic mix and patterns
presented in this paper. With an increasing set of mobile devices and a shift toward
latency-intolerant traffic, it is critical that MNOs thoroughly measure the resiliency of their
network infrastructure components. That must be accomplished using a real-world blend
of mobile-specific and fixed network traffic and security threats prior to deployment or
service rollouts in production.
In response, Ixia has created new application simulations and Super Flows that match
the real traffic profiles of mobile network operators during different times of the day.
By blending those traffic flows with BreakingPoint protocol fuzzing and thousands
of BreakingPoint security attacks, MNOs and equipment manufacturers can quickly
expose the vulnerabilities and weaknesses hidden throughout their infrastructure. With
the weakness and vulnerabilities identified, MNOs are able to take the remedial action
necessary to ensure highly resilient services and devices.
42 GSMA (2010, Feb.) Mobile Broadband Investment Set to Soar as HSPA Connections Pass 200 Million
[Online]. http://www.mobileworldlive.com/mobile-broadband-investment-set-to-soar-as-hspa-connectionspass-200-million
25
VI. Glossary
3G: The family of ITU standards known as International Mobile Telecommunications-2000.
Typical download throughput 200Kbps2 Mbps.43
4G: Next-generation network standards pertaining to IMT-Advanced. Minimum expected
download throughput between 20100Mbps. LTE-Advanced and WiMAX are both efforts to
meet IMT-Advanced requirements.44
ESP: Encapsulating Security Payload, IP protocol 50, an IPsec protocol that provides
confidentiality, and optionally, authentication.
GRE: Generic Routing Encapsulation, an IP tunneling protocol created by Cisco Systems.
LTE: Long Term Evolution, an evolutionary approach to upgraded 3G networks that
provides increased data rates and allows MNOs to support increased numbers of users.
LTE-Advanced: Further evolution of LTE to comply with IMT-Advanced requirements and
support download rates of up to 1Gbps.45
MDI: Media Delivery Index, a measure of multimedia content delivery quality that measures
loss and jitter in a network.
MNO: Mobile network operator. Used interchangeably with Mobile Carrier.
Mobile broadband: Broadband, as defined by the ITU, is transmission capacity that is
faster than primary rate Integrated Services Digital Network (ISDN) at 1.5 or 2.0 Megabits
per second (Mbits).46 Here we refer to 3G and later technologies as mobile broadband.
MOS: Mean opinion score, a quality of experience rating for multimedia content delivery.
MVNO: Mobile Virtual Network Operator. A mobile service operator without licensed
spectrum or network that leases wireless capacity from other carriers to resell to end
customers.47
NAT-T: Network Address Translation Traversal, a method of enabling hosts behind NAT
gateways to use IPsec.
Petabyte: 1015 bytes, or 1,000 terabytes.
43 International Telecommunication Union. (2008, Jul.) What really is a Third Generation (3G) Mobile
Technology. [Online]. http://www.itu.int/ITU-D/imt-2000/DocumentsIMT2000/What_really_3G.pdf
44 3G Americas. (2008, Oct.) Defining 4G: Understanding the ITU Process for the Next Generation of Wireless
Technology.
45 T. Nakamura. (2009, Oct.) Proposal for Candidate Radio Interface Technologies for IMT Advanced Based on
LTE Release 10 and Beyond (LTEAdvanced). [Online]. http://www.3gpp.org/IMG/pdf/2009_10_3gpp_IMT.
pdf
46 International Telecommunication Union. (2003, Sept.) The Birth of Broadband Frequently Asked Questions.
[Online]. http://www.itu.int/osg/spu/publications/birthofbroadband/faq.html
47 TELUS. Glossary. [Online]. http://about.telus.com/investors/en/glossary.html
26
Smartphone: An advanced mobile device or personal digital assistant (PDA) that provides
text messaging, e-mail, multimedia downloads, and social networking (e.g., Facebook
Mobile) functionality in addition to voice.47
Terabyte: 1012 bytes, or 1,000 gigabytes.
WiMAX: Worldwide Interoperability for Microwave Access, a 4G technology defined in IEEE
802.16-2004 and IEEE 802.16e-2005.
27
WHITE PAPER