By Rebecca Copeland
Read Online or Download Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile (Informa Telecommunications and Media) PDF
Similar networking books
As converged networks and mobility are used increasingly more in day-by-day company, those applied sciences must be optimized to help company specifications. you'll leam in regards to the new Cisco clever info community (IIN) version and the Cisco Service-Oriented community structure (SONA) as architectural frameworks for converged networks.
Regardless of the positive factors that make Voice over IP so appealing from the point of view of rate and suppleness of mobile prone, companies will purely undertake it as soon as they have decided even if, and below what situations, the standard of VoIP might be passable to clients. In those pages you can find every little thing you want to comprehend to respond to these questions, either now and sooner or later as different packet-switched voice prone emerge.
- Active Directory: Designing, Deploying, and Running Active Directory (4th Edition)
- FINITE ELEMENT METHOD PROGRAMMING WITH MATHEMATICA - AIRPLANE DESIGN
- Multi-Standard CMOS Wireless Receivers: Analysis and Design
- Wireless Communications & Networks (2nd Edition)
Additional info for Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile (Informa Telecommunications and Media)
Both the User ID and the equipment ID now must be recognized and managed, as well as dynamically or permanently associated. When laptops connect via WLAN, WiFi, or WiMAX, they are temporarily tethered to a port and therefore deemed to be in a Fixed network, while Mobile handset signals connect via cells that hand over control in mid-call. Through IMS, both mobile and nomadic users can have their services made available when they log in from an external network. The mobility principle of Visited Network and Home Network is retained in IMS.
Security is not achieved by a single box but rather through measures taken in various parts of the network and at various points of interaction, both in the NNI (Network-to-Network Interface) and the UNI (User-toNetwork Interface). The following table lists functions within IP communication that need protecting from various risks. It lists the type of security relevant for the function, along with examples of methods that can be applied to mitigate these risks. ), Random challenge NNI and UNI authentication Mutual authentication MAC, AUTN Session initiation Service authorization IKE, ESP, SIP screening Invoking AS AS registration, third-party registration HTTPS, ALG Media payload Media screening, packet filtering, tunneling SA/IPSec, ALG, TLS Charging Charging rules enforcement COPS/Diameter Authorization of resources QoS profiles, end-to-end QoS Encryption, IPSec protocol QoS enforcement Traffic shaping (anti-DoS) Secure COPS/Diameter Inter-operator routing NNI mutual authentication Border Gateway filtering IKE, ESP, TLS SIP Screening, IPSec Internal network elements and servers Topology hiding, generic addressing NAT/PAT, DNS queries for FQDN resolution Service provider’s access Application authentication Filter/authorize operations AKA/HTTPS Digest SIP screening, Applications gateway User provisioning Administrative privileges, data Encryption privacy Source: Compiled from multiple sources.
By service-level control or from the transport network 12 n Converging NGN Wireline and Mobile 3G Networks with IMS entirely. When using IP-CAN without SBLP, the Bearer is established according to the user’s subscription, IP Bearer resources, admission control parameters, and roaming agreements. When using IP-CAN with SBLP, decisions are made according to service-level requirements and network rules that are controlled by the PDF (Policy Decision Function) or its more advanced successor, the PCRF (Policy and Charging Rules Function).