Beruflich Dokumente
Kultur Dokumente
Use Case
AWTG Limited
7th Floor, Westgate House, Westgate Road,
London, W5 1YY.
Tel. 0208 799 0368, Fax. 0208 728 9610
www.awtg.co.uk
Introduction ................................................................................................................................................. 2
Conclusion ................................................................................................................................................... 7
References ................................................................................................................................................... 7
Figure 7. Wireshark Trace showing connection established and IP addresses assigned from the pool
Connect to 3G network
Monitor EAP-AKA authentication
Start ICMP traffic
Switch on the WiFi
Monitor WiFi Authentication
Monitor effect on ICMP traffic
Results:
Figure 8. Only four packets lost during 3G to WiFi handover
As expected, when we switched on the WiFi after initiating
ICMP traffic while the 3G connection was established, the UE
connects to WiFi by going through EAP-AKA authentication Step 4: WiFi to 3G handover, EAP-AKA authentication
in the WiFi core. A GTP tunnel is established between the In step 3, we monitored the packet flow and service impact
eWAG and the Cisco GGSN. The UE is allocated another IP of 3G to WiFi handover. In this step we observe the
address from the client pool, we verify the address allocated signalling flow of WiFi to 3G handover.
to the handset by issuing the "show subs all” command on To test WiFi to 3G handover we take the following steps.
the ASR5K, we note that the IP addresses are maintained Ensure handset is connected to WiFi and 3G is also
from the previous addresses allocated when connected to enabled.
3G. This info is stored in the Log file for all the test cases. After verification of connectivity, verify that the
During the 3G handover to WiFi we found some ICMP traffic handset is receiving an IP address from WiFi client IP
packets were lost. We use Wireshark traces to verify the call
Address pool.
flows for GTP, IP and Radius messages stored in the file
“WiFi connectivity 226” Initiate the ICMP traffic.
Switch off WiFi and observed the packet flow and
impact on ICMP traffic.