White Paper Excerpt

Wi-Fi and Cellular Convergence

What’s New in 5G

Business and technical consolidation trends all point in the same direction: Mobile and fixed networks are coming together – for the benefit of everyone in the industry and consumers.

5G introduces new network architectural concepts for Wi-Fi integration with the mobile core (non-3GPP access). In our previous blog post, we explored the opportunities for mobile operators today and the basic concepts of trusted and untrusted Wi-Fi access. This post will dive into what is new within 5G, introduced in 3GPP releases 15 and 16. After this blog post, we will cover the new Access Traffic Steering, Switching & Splitting (ATSSS) function, the ‘Holy Grail’ of mobile data offloading. Spoiler alert: ATSSS complexity and reliance on device support mean it will likely take years to come to market.

Wi-Fi in the 5G era – White Paper

This is an excerpt from our white paper Wi-Fi in the 5G Era – Strategy Guide for Operators. The full white paper is available here if you like what you read. Don’t hesitate to contact us if you have any questions.

Wi-Fi in the 5G era White paper download

Trusted and Untrusted Wi-Fi Network Integration to 5G Core

Standardization and network technology history tell us that not all functions in a standard will be deployed in real networks. They will not be implemented by vendors and service providers unless there are sound commercial reasons.

The 3G and 4G versions of Wi-Fi data plane integration are excellent examples. Most mobile operators have focused on local break-out of Wi-Fi traffic from their secure Wi-Fi networks (802.1x).

With no operational rationale or commercial reasons to backhaul Wi-Fi traffic to the Mobile Core, operators have opted to use secure SIM-based authentication, sometimes combined with policy control from the Mobile Core. There is no reason to exert extra load on the Mobile Core when operators can apply all required policies for Wi-Fi locally.

Device manufacturers also control much of what is possible and implemented. It took almost ten years for device manufacturers to decide to implement the IPsec client needed for untrusted Wi-Fi access. In their view, it simply took that long for a good commercial reason to materialize. This reason came with Wi-Fi Calling, which was in their own and their customers’ best interest.

So, are operators likely to implement the 5G 3GPP standards for Wi-Fi access? We believe so, and there are a few reasons for that. But such implementations will take time. First – as already discussed in this paper – operators more than ever need to embrace Wi-Fi in the 5G era. Secondly, a new breed of carrier-grade Wi-Fi (Wi-Fi 6) is here. Thirdly, the new Access Traffic Steering, Switching & Splitting (ATSSS) 3GPPP standard will finally give operators a good reason to backhaul traffic to the Mobile Core. We will dive deeper into ATSSS in our next blog post.

3GPP Access Acronyms in 3G, 4G and 5G

It can be overwhelming and confusing with all these acronyms that come with new 3GPP releases. So for the benefit of those of you familiar with the acronyms for 3G and 4G, please refer to this ‘translation table. Note that these are just ‘functions’ and may be delivered as one combined solution, deployed as containerized functions, or the same virtual or physical gateway node.”

Architecture Trusted and Untrusted Integration to 5G Core

3GPP Access: Trusted and untrusted Wi-Fi integration to 5G core

The simplified diagram shows Wi-Fi service integration with the new service-based 5G Core (5GC) introduced in 3GPP release 15 (untrusted) and 16 (trusted).

The first thing to observe is that this architecture is Radio network (RAN) agnostic since both the Cellular and Wi-Fi access use the same interfaces (N1-N3).

N1 Control Plane Interface

The N1 is a control plane interface between the device (UE) and the Access and Mobility Function (AMF). It is primarily used to transfer information about the connection, mobility, and session from the UE to the AMF.

This interface is used both for Cellular and Wi-Fi (for 5G Capable Devices), and it is physically transported the same way to the AMF as shown by the N2 interface.

N2 Control Plane Interface

The N2 is the control plane interface between the access network and the 5G Core. It is primarily used for connection management, UE context and Protocol Data Unit (PDU) session management, and UE mobility management.

N3 Data Plane Interface

The N3 is the data plane interface between the access network and the User Plane Function (UPF) in the 5G Core. The UPF is the packet gateway transporting data to the internet.

How It Is All Connected

For Cellular networks, the N2 and N3 interfaces connect the base station (gNB) with the AMF and UPF. For Wi-Fi, they use the non-3GPP interworking and gateway functions (N3IWF, TNGF, TWIF) to connect with the AMF and UPF.

5G introduces a new principle for non-3GPP access: Simultaneous connections via cellular and Wi-Fi are now possible by using multiple non-access stratum (NAS) connections over the N1 interface. This is a prerequisite for the new ATSSS standard and the same authentication procedures, EAP-AKA’ and 5G-AKA, are used for both Cellular and Wi-Fi.

New EAP Protocol and Unusual Use of IPsec

A new protocol, EAP-5Ghas been introduced to support NAS messages over Wi-Fi networks. The IKEv2 and EAP-5G protocols are used to establish an IPsec tunnel for signaling during the registration procedure between the device and the interworking and gateway functions. The EAP-5G protocol is then used to encapsulate NAS messages over the IKEv2 protocol.

Another interesting new principle is the use of IPsec also for trusted Wi-Fi networks. Why would you want to use an IPsec connection – albeit with null encryption to avoid double encryption – in a secure Wi-Fi network? It turns out that implementations in devices and gateways with dual support for both trusted and untrusted access will probably be easier to implement in this case. Add to this the benefits of a fixed anchor point in the Mobile Core to facilitate mobility and ATSSS.

Let’s now examine the new functions for non-3GPP access. Again, please note that these functions are not the same as physical gateways. In practice, these functions could all reside in the same gateway. One vendor could also provide the control plane (N1-N2), while another supplies the data plane (N3).

Non-3GPP Interworking Function (N3IWF)

The Non-3GPP Interworking Function (N3IWF) is the IPsec tunnel terminating node for 5G, similar to the ePDG for integration with the 4G Core. It is located in the Mobile Core and communicates with the Access and Mobility Function (AMF) control plane over the N1 and N2 interface. For the data plane, it communicates with the User Plane Function (UPF) over the N3 interface.

Trusted Non-3GPP Gateway Function (TNGF)

The trusted non-3GPP Gateway Function (TNGF) is for 5G the equivalent to the Wireless Access Gateway (WAG) used for trusted access to the 4G Core. The TNGF is located in a trusted environment, often the Wi-Fi network, and communicates with the Access and Mobility Function (AMF) control plane over the N1 and N2 interface. For the data plane, it communicates with the User Plane Function (UPF) over the N3 interface. As discussed, the device and the TGNF are connected using an IPsec tunnel with null encryption.

Trusted WLAN Interworking Function (TWIF)

The trusted WLAN Interworking Function (TWIF) is a new 5G function for interoperability with legacy devices. This is to resolve the contingency that some devices may support 5G SIM authentication but do not support 5G NAS signaling over trusted Wi-Fi access. These devices lack the support for the EAP-5G and IKEv2 protocols. 3GPP refers to such devices as non-5G-Capable over WLAN (N5CW). The TWIF contains the NAS protocol stack and exchanges NAS messages with the AMF on behalf of these types of devices.

The TWIF is located in a trusted environment, often the Wi-Fi Network, and communicates with the Access and Mobility Function (AMF) control plane over the N1 and N2 interface. For the data plane, it communicates with the User Plane Function (UPF) over the N3 interface. Just as in the case of TNGF, the device connects with the TWIF using an IPsec tunnel with NULL encryption.

Related insights

Enea publishes the definitive technical guide to Wi-Fi Offloading

Read more

Tags: Carrier Wi-Fi, Wi-Fi AAA, Wi-Fi Authentication, Wi-Fi Monetization, Wi-Fi Offloading

EAP and SIM authentication

EAP and Seamless Access with SIM Authentication

Read more

Tags: Wi-Fi Offloading

Wi-Fi Offloading How

New White Paper: Wi-Fi Offloading – How?

Read more

Tags: Wi-Fi Offloading

Secure Wi-Fi with 802.1x and WPA2/WPA3

Read more

Tags: Carrier Wi-Fi, Wi-Fi AAA, Wi-Fi Authentication, Wi-Fi Offloading

Leading the Next Wave of Zero-Touch Wi-Fi IoT Innovation 

Read more

Tags: IoT CCS, IoT Security, OpenRoaming, Wi-Fi IoT