Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 22.801  Word version:  12.0.0

Top   Top   None   None   Next
0…   5…   A…   C…

 

0  Introductionp. 4

Some mobile data applications might result in adverse impact to the mobile network, e.g. due to frequent idle-active mode changing, frequent start or stop of services, small data transmission, frequent live update, transmission of data burst. Hence, the network (both RAN and CN) may experience a flood of signalling and data traffic.
This study aims to investigate the service scenario/use cases of different mobile data applications. Their impact to the current system is generalized. Potential service and operational requirements are indentified for possible enhancements to the system.
Up

1  Scopep. 5

To make the network better suited for mobile data applications, the aim/scope of this study is to:
  • Capture real world data / analysis.
  • Identify services scenarios / use cases for mobile data applications.
  • Identify potential problems / issues caused by different mobile data applications.
  • Identify potential service and operational requirements for possible enhancements to the system.

2  Referencesp. 5

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
"Apple App Store Tops 300,000 Apps," internet source: http://www.pcmag.com/article2/0,2817,2373169,00.asp
[3]
"Crossing the 100,000 Applications Mark," internet source: http://blog.androlib.com/
[4]
"Smartphones and a 3G Network,": Signals Research Group.
[5]
"Diversity in Smartphone Usage,": H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and D. Estrin, MobiSys'10, June 2010.
[6]
"A First Look at Traffic on Smartphones,": H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin, IMC November 2010.
[7]
"An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,": S. Baset and H. Schulzrinne, IEEE Infocom 2006.
[8]
"Find*Me," internet source: https://market.android.com/details?id=com.gpsshare.ads
[9]
http://www.caida.org/data/passive/trace_stats/sanjose-B/2010/equinix-sanjose.2010-0415.dirB.df.xml
[10]
http://www.caida.org/data/passive/trace_stats/sanjose-A/2010/equinix-sanjose.2010-09.dirA.df.xml
[11]
http://www.caida.org/data/passive/trace_stats/sanjose-B/2010/equinix-sanjose.2010-09.dirB.df.xml
[12]
http://www.caida.org/data/passive/trace_stats/chicago-B/2009/equinix-chicago.2009-04.dirB.df.xml
[13]
C. Na, J. K. Chen, and T. S. Rappaport, "Measured Traffic Statistics and Throughput of IEEE 802.11b Public WLAN Hotspots with Three Different Applications,": IEEE Transactions On Wireless Communications, Nov. 2006.
[14]
F. Wamser, R. Pries, D. Staehle, K. Heck, and P. Tran-Gia, "Traffic characterization of a residential wireless Internet access,": Special Issue of the Telecommunication Systems (TS) Journal, 48: 1-2, 2010.
[15]
http://www.youtube.com/live
[16]
http://www.tuaw.com/2011/01/05/comcast-to-offer-3-000-hours-of-live-streaming-content-to-ipad/
[17]
http://www.omaha.com/article/20101205/MONEY/712059914
[18]
TS 26.346: "Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs".
[19]
http://www.kaspersky.com/news?id=207576158
[20]
http://www.appedia.com/news/2148.html
[21]
http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor
[22]
X. Geng and A.B. Whinston, "Defeating Distributed Denial of Service Attacks,": IEEE Journal of IT Professional, Volume 2, Issue 4, Jul. 2000.
Up

3  Definitions and abbreviationsp. 6

3.1  Definitionsp. 6

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
None

3.2  Abbreviationsp. 6

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
AoS
Always Online Service
Apps
Applications
CN
Core Network
DDoS
Distributed Denial of Service
EPC
Evolved Packet Core
IM
Instant Messaging
MODAI
Non-MTC Mobile Data Application Impacts
SNS
Social Network Services
SP
Service Provider
Up

4  Backgroundp. 6

4.1  Mobile data applications and their adverse system impactsp. 6

Today, there exist hundreds of thousands of mobile data applications for mobile devices [2] and [3]. Many of these applications utilize the mobile broadband connections to provide various types of communications to the users. While some of these applications focus on more "traditional" use cases such as web browsing or email reading, other emerging applications such as social networking applications help the users to "stay connected" with their friends on the go. Below is a short list of different categories of mobile data applications:
  • Web browsing
  • Email
  • Weather/News updates
  • VoIP (Skype, etc.)
  • Social Networking (Facebook)
  • Geo services (Google places/location-targeted ads)
  • Online games
  • Messaging (SMS and instant messaging)
  • etc.
A recent study [4] noted that the way social networking applications on mobile devices transmit and receive status update messages can cause significant signalling congestions in 3G networks. There are other operational characteristics of the mobile data applications, such as small data transmission and frequent start or stop of services that can cause adverse impacts to the mobile network.
So as more and more mobile data traffic is handled by the network, the signalling traffic associated with various non-mtc mobile data applications can cause high signalling burden on the network and lead to poor user experience. Also, some of these applications have "keep alive" messages that can generate large amount of signalling traffic.
As shown in Figure 1, it can be observed that, there is a many-to-many mapping between the mobile data apps and their operational characteristics/potential problems. Such mapping implies that:
  • One application can potentially cause multiple problems to the network.
  • Different applications can contribute to the same problem to the network, thereby aggravating the problems observed in the EPC and RAN.
Copy of original 3GPP image for 3GPP TS 22.801, Figure 1: Many-to-many mapping between the mobile data applications  and potential adverse system effects
Up

Up   Top   ToC