Professional Documents
Culture Documents
Basic LTE
Basic LTE
This is the common key performance parameters for LTE drive test parameter we have to work
out for LTE drive test task.
1. RSRP:
RSRP – The average power received from a single Reference signal, and Its typical range is
around -44dbm (good) to -140dbm(bad).
RSRP (dBm) = RSSI (dBm) – 10*log (12*N)
2. RSRQ:
RSRQ – Indicates quality of the received signal, and its range is typically -19.5dB(bad) to -3dB
(good).
Reference Signal Received Quality (RSRQ) is defined as the ratio N×RSRP/(E-UTRA carrier
RSSI),
where N is the number of RB’s of the E-UTRA carrier RSSI measurement bandwidth.
The measurements in the numerator and denominator shall be made over the same set of
resource blocks.
3. RSSI:
RSSI – Represents the entire received power including the wanted power from the serving cell as
well as all co-channel power and other sources of noise and it is related to the above parameters
through the following formula:
RSRQ=N*(RSRP/RSSI)
Where N is the number of Resource Blocks of the E-UTRA carrier RSSI measurement
bandwidth.
RSSI (Received Signal Strength Indicator) is a parameter which provides information about total
received wide-band power (measure in all symbols) including all interference and thermal noise.
RSSI is not reported to e-NodeB by UE. It can simply be computed from RSRQ and RSRP that
are, instead, reported by UE.
RSSI = wideband power = noise + serving cell power + interference power
So, without noise and interference, we have that 100% DL PRB activity: RSSI=12*N*RSRP
Where:
RSRP is the received power of 1 RE (3GPP definition) average of power levels received
across all Reference Signal symbols within the considered measurement frequency
bandwidth
RSSI is measured over the entire bandwidth
N, number of RBs across the RSSI, is measured and depends on the BW
4. SINR:
SINR is the reference value used in the system simulation and can be defined:
So at any point in time the UE will measure all the REs that carry the RS and average the
measurements to obtain an RSRP reading.
Channel estimation in LTE is based on reference signals (like CPICH functionality in
WCDMA)
Reference signals position in time domain is fixed (0 and 4 for Type 1 Frame) whereas in
frequency domain it depends on the Cell ID
In case more than one antenna is used (e.g. MIMO) the Resource elements allocated to
reference signals on one antenna are DTX on the other antennas
Reference signals are modulated to identify the cell to which they belong
Impact of serving cell power to RSRQ:
Example for noise limited case (no interference): If all resource elements are active and are
transmitted with equal power, then
(because RSRP is measured over 1 resource element and RSSI per resource block is measured
over 12 resource elements).
Remember that RSSI is only measured at those symbol times during which RS REs are
transmitted – We do not have to take into the count DTx!!!
So, when there is no traffic, and assuming only the reference symbols are transmitted (there are 2
of them within the same symbol of a resource block) from a single Tx antenna then the RSSI is
generated by only the 2 reference symbols so the result becomes
The total approximate overhead for the 5 MHz channel is 17.86% + 4.76% + 2.6% = 25.22%.
The peak data rate is then 0.75 x 50.4 Mbps = 37.8 Mbps.
Note that the uplink would have lower throughput because the modulation scheme for most
device classes is 16QAM in SISO mode only.
There is another technique to calculate the peak capacity which I include here as well for a 2×20
MHz LTE system with 4×4 MIMO configuration and 64QAM code rate 1:
Channel bandwidth
Network loading: number of subscribers in a cell which impacts the overhead
The configuration & capability of the system: whether it’s 2×2 MIMO, SISO, and the
MCS scheme.
Throughput Troubleshooting
DL
UL
Content
Part:1 Basic Cell Parameter Planning Part:2 Tracing Area Planning Part:3 PCI Planning
Part:4 PRACH Planning Part:5 Neighboring Cell Planning Part:6 Frequency Planning
Part:1 Basic Cell Parameter Planning
Basic Cell Parameter: ECGI Planning
ECGI = PLMN + Cell Identity
Parameter Description
3. eNodeB ID: Its value ranges from 0 to 1048575. The eNodeB ID is unique to every eNodeB in
the same PLMN. When you are planning the eNodeB ID, you need to take the network scale into
account. Generally speaking, there is small-sized network, standard-sized network, large-sized
network and shared network.
4. Cell ID: It is unique to every cell in the same eNodeB. Its value ranges from 0 to 255.
Basic Cell Parameter: eNodeB ID
1. Standard-Sized Network
The eNodeB ID appears to be ABCDEF in a standard-sized network.
The first two figures (namely AB) indicate the city where the eNodeB is located.
The last figure (namely F) indicates whether it is an indoor eNodeB or an outdoor eNodeB. If the
last figure appears to be “0”, it is an indoor eNodeB. Otherwise, it is an outdoor eNodeB.
2. Large-Sized Network
In most cases, the eNodeB ID appears to be ABCDEF.
The first two figures (namely AB) indicate the city where the eNodeB is located.
Different AB combination indicates different cities. The AB combination can indicate at most 90
cities, each of which can hold 9999 eNodeBs at most. Sometimes, the network may cover more
than 90 cities. In this case, use every AB combination to indicate two or more than two cities.
Each city can hole at most 5000 eNodeBs.
The last figure (namely F) indicates whether it is an indoor eNodeB or an outdoor eNodeB. If the
last figure appears to be “0”, it is an indoor eNodeB. Otherwise, it is an outdoor eNodeB.
In some special cases, if F appears to be “9”, it is a remote eNodeB.
3. Shared Network If it is a shared network, for example the TDD-FDD network in Hi3G
project, you will use 6-digit eNodeB ID (ABCDEF).
The first figure (namely A) indicates the network schema. “1” stands for the TDD network, and
“5” stands for the FDD network.
The second figure (namely B) indicates the city where the eNodeB is located.
The third figure (namely C) may indicate the administrative region where the eNodeB is located.
The last figure (namely F) indicates whether it is an indoor eNodeB or an outdoor eNodeB. If the
last figure appears to be “0”, it is an indoor eNodeB. Otherwise, it is an outdoor eNodeB
Parameter Description
This parameter indications the cyclic prefix(CP) of the OFDM symbol,which is used to
determine the total number of OFDM symbols within one slot. When this parameter is set
to normal cyclic prefix, it implies that seven OFDM symbols are available within one
slot. When this parameter is set to extended cyclic prefix, it implies that six OFDM
symbol are available within one slot.
TAC: It indicates a tracing area in a PLMN. It is used to manage the UE location and find
the desired UE.
o 1. The TAC is unique in a PLMN.
o 2. A cell must belong to a tracing area (TA) exclusively. When you configure the
TAC, you need to consider the quantity of cells in this TA.
o 3. The bonding relation between the TAC and the cell is determined by the cell
size, cell type (high-speed cell or low-speed cell) and TA list configuration.
Principles
o 1.Determine the size of tracing area based on the UE paging capability and the
network .
o 2.Avoid frequent IRAT cell re-selection and LAU/TAU.
o 3.Take the geographical features into account.
a) Do not place the tracing area boundary in the heavy-traffic area (e.g. downtown area, or
central business district). Place the boundary in the low-traffic area (e.g. suburban area, or
factories).
b) The tracing area boundary should be orthogonal or diagonal to the road. Moreover, keep the
overlapped part between tracing areas away from the area where UE moves in high speed.
c) Do not place different tracing area boundaries in the same small area. Otherwise, the UE may
frequently update the tracing area information or perform handovers between these tracing
areas.
o 4.Take the traffic increase tendency into account so as to provide tracing areas
with proper paging capacity, traffic capacity and expandability of the tracing area.
1)If there are cell A, cell B and cell C, the cell A and the cell B make up a group of neighboring
cells while the cell B and cell C make up another group of neighboring cells, then the cell A and
the cell C must use different PCIs.
2)When you allocating PCIs to different cells controlled by the same eNodeB, all these PCIs
should comply with the mod3 principle. Additionally, consider the mod3 principle when you
allocating the PCI to the cell and its nearest neighboring cell.
3)Cells sharing the same PCI should be far from each other as much as possible.
Part:4 PRACH Planning
Physical Random Access Channel (PRACH) is mainly used during the random access process.
The functions of random access in LTE include the following:
An example
is when the status is changed from RRC_IDLE to RRC_CONNECTED.
Two scenarios are involved in the random access process:
Scenario I: Contention-Based Access
Scenario II: Contention-Free Access
The Ncs in the high speed scenario should be proper so as to address the impact left to the
peak data rate check from the cyclic shifting caused by frequency offset.
The recommended value is given in the protocol.
Part:5 Neighboring Cell Planning
Usually, the entire LTE network adopts the same frequency band. For example, 20 MHz
bandwidth is used for the entire network. To avoid ICIC, you need to allocate different
bands for different cells. Ensure that two cells with great overlapped coverage should
better not use the same frequency resources.
Currently, frequency allocation includes four modes:
Based On Same-Frequency
Based on SFR(Non Exclusive IC)
Based on SFR(Exclusive IC)
Based on Differ-Frequency
Static ICIC Realization
Static SFR
As shown in the left figure, the whole frequency band is divided into three equal part. f1,
f2 and f3 indicate the outer cell of three sectors.
Static FFR
As shown in the right figure, the whole frequency band is divided into four parts. It is similar to
the case that the f1 in SFR mode is divided into three equal parts, each of which serves as the
outer cell area of three sectors. In this way, cell edge users (CEUs) are separated from cell center
users (CCUs), reducing the interference from the side lobe users in the neighboring cell to the
CCUs of the service cell.
End of Course
LTE KPI
KPI: Key Performance Indicator
The purpose is to check the performance of Network. We
have categories of KPI and numbers of KPI of each
category. In the Optimization process we have to check
the KPI value to monitor and optimize the radio network
performance in order to provide better subscriber quality
or to achieve better use of installed network resources .
Typically KPI can be categorized into following
subcategories:
Accessibility KPI
Retainability KPI
Mobility
KPI
Integrity
KPI
Availability
KPI
Utilization
KPI
📈 Accessibility KPI
Are used to measure properly of whether services requested by users can be accessed in given
condition, also refers to the quality of being available when users needed. eg. user request to
access the network, access the voice call, data call, ......
📈 Retainability KPI
Are used to measure how the network keep user's possession or able to hold and provide the
services for the users
📈 Mobility KPI
Are used to measure the performance of network which can handle the movement of users and
still retain the service for the user, such as handover,...
📈 Integrity KPI
Are used to measure the character or honesty of network to its user, such as what is the
throughput, latency which users were served.
📈 Availability KPI
Are used to measure the availability of network, suitable or ready for users to use services.
📈 Utilization KPI
Are used to measure the utilization of network, whether the network capacity is reached its
resource.
Utilization
KPI
Are used to measure the utilization of network, whether the network capacity is
reached its resource.
ACCESSIBILITY KPI:
☰ Call Drop
VoIP call drop arise when VoIP ERAB release is not normal. Each ERAB associated with QoS
information. Here's an illustration of two procedures being done to release ERAB namely:
ERAB release indication and the UE context release request:
MOBILITY KPI:
Handover attempt occurs at point B, when the source ENodeB (S-eNodeB) sends RRC
connection reconfiguration message to the UE. He decided to conduct inter ENodeB HO. in this
KPI, the source and the target cell work on the same frequency. The number of the attempt HO
calculated at the source cell. The number of successful HO occurs at point C. During HO, HO
amount which success is measured in the cell souce. This measurement appears typing S-
eNodeB received a UE context release message from the target eNode B (T-eNodeB), or the UE
context release command from the MME, which shows that the UE-eNodeB T has successfully
attach at the T-eNodeB.
The following scenarios illustrate intra frequency B HO - inter ENodeB:
Following the definition of Intra Frequency Out Handover Success Rate KPI:
INTEGRITY KPI:
☰ E-UTRAN IP Throughput
A KPI that shows how E-UTRAN impacts the service quality provided to an end-user.
Payload data volume on IP level per elapsed time unit on the Uu interface. IP Throughput for a
single QCI:
To achieve a throughput measurement that is independent of bursty traffic pattern, it is important
to make sure that idle gaps between incoming data is not included in the measurements. That
shall be done as considering each burst of data as one sample. ThpVolDl is the volume on IP
level and the ThpTimeDl is the time elapsed on Uu for transmission of the volume included in
ThpVolDl.
☰ E-UTRAN IP Latency
A measurement that shows how E-UTRAN impacts on the delay experienced by an end-user.
Time from reception of IP packet to transmission of first packet over the Uu.
To achieve a delay measurement that is independent of IP data block size only the first packet
sent to Uu is measured.
To find the delay for a certain packet size the IP Throughput measure can be used together with
IP Latency (after the first block on the Uu, the remaining time of the packet can be calculated
with the IP Throughput measure).
T_Lat is defined as the time between receiption of IP packet and the time when the eNodeB
transmits the first block to Uu.
Since services can be mapped towards different kind of E-RABs, the Latency measure shall be
available per QoS group.
AVAILABILITY KPI:
As for defining the cell as available, it shall be considered available when the eNodeB can
provide E-RAB service in the cell.
UTILIZATION KPI:
WiFi OffLoad
Followings are the list of topics that will be discussed in this page. I will describe these
topic at very high level as an introduction. I would write separate pages depending on the
subject.
Who is triggering the Offload ?
Overall Network Arichitecture for WiFi Offload
'Trusted vs Untrusted' Access
ANDSF, what is it ? why we need it ?
Session Mobility
Interplay between ANDSF and Mobility
Interplay between UE and ANDSF
What kind of Information are provided by ANDSF
Typical Traffic Flow via 'Untrusted Non-3GPP Access'
o Handover from LTE to WiFi
Followings are WiFi Offload Protocol Related pages on sharetechnote. Thease are mainly
for the initial procedure of the offloading happening right before data traffic starts.
Actually these initial procedure is the important topics you need to understand and the
procedure for real data traffic is not special for WiFi Offload. For example, if the WiFi
Offloading happens for Voice call, only the initial procedure (i.e, Handover process) is
specifically designed for WiF offloading. Once the handover protocol is completed, the data
protocol is same as regular IMS protocol.
WiFi OffLoad : CheckList
WiFi OffLoad : Overall Procedure of Untrusted Data Path Setup
WiFi OffLoad : ePDG Discovery
IKEv2
Just from the user's point of view, we can think of several user model as described below.
< Case 1 > UE-Initiated WiFi OffLoading
i) UE is in connected mode with LTE network while there is no WiFi Network
Available.
ii) UE start seeing WiFi signal.
iii) User switch the connection from LTE to WiFi Network.
Note : I should say this is over-simplified description. You may have a lot of questions
boggling in your mind. In what criteria, user decided to switch from LTE to WiFi ? You said
'Switch the connection to WiFi ?'. Exactly what do you mean by 'Switching' ? What is the
exact mechanism ? etc. I will get back to these question later.. for now, just get the big
picture.
Now let's think about business issues... about money. What is the motivation to go for
WiFi offloading?
What would be your motivation to Switch your communication channel from LTE to WiFi
while you are in connection?
For mobile phone user it may help him to get access to wider bandwith and probably in
lower cost or free
For mobile network operators it would help reduce the load on the LTE network by
offloading the subscriber to WiFi network
Then you may ask "What about the money for the network operator? " they may not be
able to charge for WiFi network usage as much as for LTE network but they may be able to
get some gain from load balancing and still keep some portions of the money from the
mobile user by directing to switch to the WiFi network serviced by the mobile network
operator (not free WiFi)
This is just tip of WiFi Offload and I will keep updating this page as I have further chance.
If you are eager to know the details before I update, I would recommend following
documents.
3GPP TR 22.934 Feasibility study on 3GPP system to Wireless Local Area Network
(WLAN) interworking
3GPP TS 23.261 IP flow mobility and seamless Wireless - Local Area Network
(WLAN) offload;Stage 2
3GPP TS 23.402 Architecture enhancements for non-3GPP accesses
3GPP TS 33.402 3GPP System Architecture Evolution (SAE);Security aspects of
non-3GPP accesses
Now let's get just a little bit deeper into WiFi Offload mechanism. The first thing you need
to understand is overall network architecture related to WiFi Offload. You would see
various network architecture depending various use model.
Most of the components are the ones that you are already familiar with normal LTE/IMS
operation. The component and interfaces that you need to pay attention for WiFi Offload
would be as follows : (Don't try to memorize it.. just try to follow the path with pen
whenever you are studing any specific use case).
Untrusted Non-3GPP IP
Trusted Non-3GPP IP
ePDG
3GPP AAA Server
SWu, SWn,Swa,SWm,STa,S2c,S2a,S2b
Now let's think of how WiFi network get anchored to 3GPP network (e.g, LTE network).
There are a couple of different ways to do it but if I am allowed for another
oversimplifcation, it can be only two categories. One is through 'Trusted Access Point' and
the other one is through 'Non-Trusted Access Point'. You can think of 'Trusted' as that the
WiFi Security is protected by the 3GPP network, so you would not need any separate
authentication process between 3GPP and Non-3GPP Network (WiFi). 'Non-Trusted' means
that the WiFi Security is not protected by the 3GPP network, so you need to go through
separate authentication process between 3GPP and Non-3GPP Network (WiFi)
If you see the network structure for Non-3GPP Access, you would see two different path.
One is through 'Trusted' path and the other one is through 'Untrusted' path.
In trusted access, UE would not need any separate authentication/security process when it
switches from 3GPP access to non-3GPP access (WiFi) since UE already has gone through
this process when it was camping on the 3GPP access and network trust the process and
assume that the non-3GPP access can be protected by the same security procedure. In
this access, it is highly likely that Network Operator distribute their own WiFi Access points
and let UE get access through those Access Point.
ANDSF stands for 'Access Network Discovery and Selection Function'. This is a set of
services that would answer to following questions.
I am at such and such location now, which network (3GPP or Non-3GPP) are
available for me ?
Now my mobile phone detected 3GPP network and WiFi network, which network I
have to get access to ?
Session Mobility
Mobility is a mechanism of switching between 3GPP (e.g LTE) and non-3GPP (e.g, WiFi)
networks. Largely there are two methods you can think of, NBM (Network Based Mobility -
Network Initiated) and HBM(Host Based Mobility - UE Initiated)
It provides huge set of information. so it is hard to describe everything in this section. You
can get the full sets of information about this in 3GPP as summarized below
The specification that I referred to is ETSI TS 124 312 V11.6.0 (2013-04). Since this is
relatively early stage, it is highly likely that new items or revision will be added as it goes
to new version. Try following up the latest specification as it roll out.
One of the 'Untrusted' access that attracts the widest attention as of this writing (Feb
2014) is through ePDG as shown below. Overall procedure and data path are as follows.
i) UE is in 3GPP network (e.g, LTE)
ii) UE is triggered to switch to WiFi network
iii) UE switches to WiFi network and goes to authentication server first (follow the
red line)
iv) After completing the authentication process, start user data transaction through
the green path.
Most important step in this traffic flow is Authentication and Security Association step at
the initial step where UE start communicating with 3GPP network over Non-3GPP Access
(e.g, WiFi Access Point). This initial step is described in detail in IKE based 3GPP 33.402
section.
Following is one example of WiFi Offloading From LTE network to WiFi Network. In terms
of protocol implementation on UE and Test equipment side in early phase of testing (As of
Jun 2014), the colored part has become the major target of validation. According to my
experience on testing, step 4 and step 8 is the most tricky step to come over. Especially,
passing step 4 (IKEv2) is the most difficult part to step over.
Following diagram shows overall procedure for the case where UE start communication
from LTE and switch to WiFi Network (Untrusted Non-3GPP). This case assumes that UE is
connected to LTE before the switch (Handover) and not connected in WiFi. If UE is already
connected both to LTE and WiFi before this handover, it will skip the step 2~9 and directly
jump to step 10.
< 3GPP 23.402 Figure 8.2.3-1: Handover from 3GPP Access to Untrusted Non-3GPP IP
Access with PMIPv6 on S2b >
Step 1 : UE is initially attached to LTE network. (In the most of testing situation with test
equipment, WiFi on UE turned off at this stage).
Step 2 : (In the most of testing situation with test equipment, we turn on WiFi on UE at
this time). UE start detecting WiFi network and initiate switching process to WiFi network.
Step 3 : (This may be an optional step) UE and EPC perform Access authentication
process. => This corresponds to 33.402 6 Authentication and key agreement procedures
Step 4 : UE and ePDG performs IKEv2 tunnel establishment procedure. (See the details
in IKE page or 3GPP 33.402). Following is the decription for this step in 23.402 and I add
some comments to relate 23.402 and 33.402.
The IKEv2 tunnel establishment procedure is started by the UE. The ePDG IP
address to which the UE needs to form IPsec tunnel with is discovered as specified
in clause 4.5.4.
After the UE is authenticated, UE is also authorized for access to the APN. The
procedure is as described in TS 33.234.
As part of access authentication the PDN GW identity is sent to the ePDG by the
3GPP AAA server. => This corresponds to step 5 of 33.402 Figure 8.2.2-1
If the UE supports IP address preservation during handover from 3GPP Access to
the untrusted non-3GPP IP access, the UE shall include its address (IPv4 address or
IPv6 prefix /address or both) allocated when it's attached to 3GPP Access into the
CFG_Request sent to the ePDG during IKEv2 message exchange. => This
corresponds to step 2 of 33.402 Figure 8.2.2-1
Step 5 : ePDG sends the Proxy Binding Update message to PDN GW. Followings are
conveyed in this message
o MN-NAI
o Lifetime
o Access Technology Type
o Handover Type Indicator
o GRE key for downlink traffic
o UE Address Info
Step 6B : PDN GW and AAA Server performs the following transaction.
PDN GW sends following information to AAA Server
o PDN GW Identity
o APN corresponding to the UE's PDN Connection
AAA Server sends Authorization information to PDN GW
Step 7 : PDN GW processes the Proxy Binding Update from ePDG and update the binding
cache entry for the UE. and then sends Proxy Binding Acknowledgement message. This
message carries following information.
o MN-NAI
o Lifetime
o GRE key for uplink traffic
o UE Address Info
o Charging ID
Step 8 : ePDG and UE continues the IKEv2 exchange and IP address configuration => This
corresponds to step 15 of 33.402 Figure 8.2.2-1
Step 9 : End of the Handover procedure. At this step, we would have two IP tunnels as
follows
IP sec tunnel between UE and ePDG
PMIPv6 tunnel between ePDG and PDN GW
Step 10 : This is for the case for connectivity to multiple PDNs. UE establishes connectivity
to each PDN that is being transferred from 3GPP access.
Introduction:
The deployment of cellular networks and WLAN hotspots are increasing due to
increase in user demands. Both cellular and WLAN technologies are complement
to each other. Both wifi data service provider and mobile operator are interested
in roaming between wifi and cellular networks.
Complementary nature of cellular and wifi technologies can provide cost effective
business. It offers wireless multimedia and high data rate services to large
population. The integration of two technologies help operators to provide access
independent services, better utilization of spectrum resources, standardized
inter-working, low cost infrastructure, promotion of multimode terminals, flexible
integration of new access networks at IP level and so on.
Cellular network
There are different cellular networks such as 2G (GSM), 3G (WCDMA), 3.5G
(HSPA+), 4G (LTE, Mobile WiMAX), 4.5G (LTE Advanced), 5G NR (New Radio)
etc. in increasing order of their data transfer speed.
There are three main elements in cellular data network architecture viz. Base
Station (i.e. network side), Mobile subscriber (i.e. user side) and internet
backbone. This is shown in figure-1, the cellular system connects with PSTN and
PSDN to provide support for circuit switched data traffic and packet switched
data traffic. Refer Cellular Tutorial for more information on cellular network
basics.
The silent features of cellular data network are as follows.
• Cellular network is available nation wide due to roaming functionality.
• Cellular data users will be charged as per different subscription rates and usage
in various countries.
• Coverage range is higher due to cellular tower height and transmit power as per
planned RF link budget.
WiFi network
The WiFi network follow various IEEE WLAN wireless standards such as
802.11a, 11b, 11g, 11n, 11ac (wifi5), 11ax (wifi6) etc.
WiFi network is not available everywhere. Now-a-days wifi hotspots are available
in business offices, malls, airports, railway stations etc.
Figure-3 : Wifi data network architecture
There are two elements in wifi data network architecture viz. AP (Access point) or
router and STAs (Stations). WiFi operates on 2.4 GHz And 5 GHz frequency
bands. WiFi operates in two modes which are adhoc and infrastructure.
The silent features of wifi data network are as follows.
• WiFi data users are not charged and it is available free of cost at most of the
public places.
• It supports different data rates as per wifi standard used by APs (i.e. routers)
and STAs (stations) which is much larger than cellular data rates.
• Coverage range is lesser compare to cellular network.
Benefits or advantages of Cellular wifi
(WLAN) integration
Following are the benefits or advantages of Cellular wifi (WLAN) integration :
➨It helps to offload cellular data traffic to WLAN network in the areas having
higher user density.
➨It helps wifi service provider to increase its subscriber database by pulling
cellular data traffic users from partner cellular networks.
➨The integration helps end users with enhanced performance by offering
greater coverage, high data rates and low overall cost.
➨The cellular wifi integration provide customers with single billing and service
support. Moreover it offers secure communication environment and trusted
relationship.
➨It helps to promote multimode terminals at lower cost.
➨The integration take benefits of higher data speed from wifi network and large
area coverage/high mobility support from cellular network.