Download Converging NGN Wireline and Mobile 3G Networks with IMS: by Rebecca Copeland PDF

By Rebecca Copeland

Show description

Read Online or Download Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile (Informa Telecommunications and Media) PDF

Similar networking books

Optimizing Converged Cisco Networks. Student Guide

As converged networks and mobility are used increasingly more in day-by-day company, those applied sciences must be optimized to help company specifications. you'll leam in regards to the new Cisco clever info community (IIN) version and the Cisco Service-Oriented community structure (SONA) as architectural frameworks for converged networks.

VoIP Service Quality: Measuring and Evaluating Packet-Switched Voice

Regardless of the positive factors that make Voice over IP so appealing from the point of view of rate and suppleness of mobile prone, companies will purely undertake it as soon as they have decided even if, and below what situations, the standard of VoIP might be passable to clients. In those pages you can find every little thing you want to comprehend to respond to these questions, either now and sooner or later as different packet-switched voice prone emerge.

Additional info for Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile (Informa Telecommunications and Media)

Sample text

Both the User ID and the equipment ID now must be recognized and managed, as well as dynamically or permanently associated. When laptops connect via WLAN, WiFi, or WiMAX, they are temporarily tethered to a port and therefore deemed to be in a Fixed network, while Mobile handset signals connect via cells that hand over control in mid-call. Through IMS, both mobile and nomadic users can have their services made available when they log in from an external network. The mobility principle of Visited Network and Home Network is retained in IMS.

Security is not achieved by a single box but rather through measures taken in various parts of the network and at various points of interaction, both in the NNI (Network-to-Network Interface) and the UNI (User-toNetwork Interface). The following table lists functions within IP communication that need protecting from various risks. It lists the type of security relevant for the function, along with examples of methods that can be applied to mitigate these risks. ), Random challenge NNI and UNI authentication Mutual authentication MAC, AUTN Session initiation Service authorization IKE, ESP, SIP screening Invoking AS AS registration, third-party registration HTTPS, ALG Media payload Media screening, packet filtering, tunneling SA/IPSec, ALG, TLS Charging Charging rules enforcement COPS/Diameter Authorization of resources QoS profiles, end-to-end QoS Encryption, IPSec protocol QoS enforcement Traffic shaping (anti-DoS) Secure COPS/Diameter Inter-operator routing NNI mutual authentication Border Gateway filtering IKE, ESP, TLS SIP Screening, IPSec Internal network elements and servers Topology hiding, generic addressing NAT/PAT, DNS queries for FQDN resolution Service provider’s access Application authentication Filter/authorize operations AKA/HTTPS Digest SIP screening, Applications gateway User provisioning Administrative privileges, data Encryption privacy Source: Compiled from multiple sources.

By service-level control or from the transport network 12 n Converging NGN Wireline and Mobile 3G Networks with IMS entirely. When using IP-CAN without SBLP, the Bearer is established according to the user’s subscription, IP Bearer resources, admission control parameters, and roaming agreements. When using IP-CAN with SBLP, decisions are made according to service-level requirements and network rules that are controlled by the PDF (Policy Decision Function) or its more advanced successor, the PCRF (Policy and Charging Rules Function).

Download PDF sample

Rated 4.47 of 5 – based on 10 votes