Heterogenous networks scenarios

Slides:



Advertisements
Similar presentations
References Overview User attention is by far the most precious resource in a world where computational and networking infrastructure is becoming cheaper.
Advertisements

ICAO Aviation Considerations for Internet Mobility Services ICAO WG N-1 Meeting #5 Montreal, Canada November 7-10, 2005 ACP/SWGN1-5 th meeting FL 502.
Cellular Networks.
Doc.: 802_Handoff_EC_Opening_Plenary_Report r2 Submission November David Johnston, IntelSlide Handoff ECSG EC Opening Plenary Report David.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
May 2011 doc.: IEEE wng0 SubmissionSamsung Electronics, SNU Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Media-Independent Pre-Authentication (draft-ohba-mobopts-mpa-framework-01.txt) (draft-ohba-mobopts-mpa-implementation-01.txt) Ashutosh Dutta, Telcordia.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
1 Scenario template. 2 PART 1: INTRODUCTION ➔ Your organisation ➔ Starting point of your project ➔ The target group ➔ What do you want to achieve? SERVICE.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposal for IEEE Study Group on Security Signaling Optimization.
WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS 通訊工程所 蔡名岳
The EBSCO eBooks App Authenticating the App Tutorial support.ebsco.com.
Usage Scenarios for CSE Group Name: WG2(ARC-WG) Source: Shingo Meeting Date: Agenda Item: Message.
Doc.: _Handoff_EC_Closing_Report Submission July David Johnston, IntelSlide Handoff ECSG EC Closing Report David Johnston.
GSM – formerly: Groupe Spéciale Mobile (founded 1982) – now: Global System for Mobile Communication – Pan-European standard (ETSI, European Telecommunications.
Mobera – Understanding Your Requirements. Target – A Case Study Value (£m Revenue) Fixed Line10,139,479,259,068,93 Mobile / Cellular.
A policy-based per-flow mobility management system design
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
URP Usage Scenarios for Mobility James Kempf Sun Microsystems, Inc.
Problem Scope Objective To demonstrate/determine clearly the need for an edge protocol that allows a user to interact with an agent in the network for.
INFSO-RI Enabling Grids for E-sciencE The gLite File Transfer Service: Middleware Lessons Learned form Service Challenges Paolo.
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
May 2011 doc.: IEEE wng0 SubmissionSamsung Electronics, SNU Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Authentication/Authorization for possible deployments Relevant scenarios for CAFE.
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Introduction & use-cases FedAuth IETF78 Maastricht, July 27, 2010
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: DCN:21-07-xxx Title: Security Optimization During Handovers: SG Proposal Date Submitted: xx,
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Able to transfer and adapt their skills Able to understand the consequences of their actions Able to use software and devices efficiently Responsible.
and LMAP liaison Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
Common Mistakes to Avoid During Android App Development.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Trend of Mobility Management Yen-Wen Chen Ref: 1.Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services 2.Transport.
By Sanjay S Pawar Ashutosh Jha Chavi Asrani.  Can end user access internet anywhere seamlessly  How easy is it to connect  Are there any common ways.
Anticipated Handovers
Unified Mobility Management Network Research Division
Network Based Connectivity and Mobility Management for IPv4 draft-chowdhury-netmip4-00.txt Kuntal Chowdhury IETF-65.
Media-Independent Pre-authentication (MPA) Framework
Cloud-Assisted VR.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
Requirements for Seamless Handoff between WLAN and Cellular Networks
Security and Privacy Consideration of aq
Cloud-Assisted VR.
How to Map COEN U or W Drive Servers Drive Manually
Exam Dumps.  Published: November 30, 2017  Languages: English  Audiences:IT professionals  Technology: Microsoft Azure  Credit toward certification:
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Maryna Komarova (ENST)
פחת ורווח הון סוגיות מיוחדות תהילה ששון עו"ד (רו"ח) ספטמבר 2015
Pre-association Service Discovery Use Cases
Principles/Paradigms Of Pervasive Computing
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
802 Handoff ECSG Closing Plenary Report
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Domain Identification for predictive handover among different domains
TDR authentication requirements
Presentation transcript:

Heterogenous networks scenarios Current cellular networks use access dependant user identifiers Movement between two different access technologieswithin the same administrative domain implies re-authentication and authorisation Seamless mobility requires avoiding re-authentication/authorisation at the new AR. An access independent user identifier will allow the transfer of user credentials to the new AR regardless of the type of access technology used. The alternative to the above is to ‘mandate ’ one identifier to be used for all current and future L2 ’s. A possible but difficult target to achieve.