Discussion on LI Requirements for Nomadic and Mobile HNBs Source: Rogers Wireless Contact: George Babut 3GPP/SA3-LI#41Tdoc SA3LI11_085 Philadelphia, 10-12.

Slides:



Advertisements
Similar presentations
Leverage existing residential gateways to securely offload mobile data.
Advertisements

Mobile IP How Mobile IP Works? Agenda What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals.
XXX IEEE MEDIA INDEPENDENT HANDOVER DCN: XXX Title: MRPM – an augmenting feature for MIH Date Submitted: July 15,
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Nomadism/FMC Use Cases and AAA Impact Mohit Thakur 14th December, 2006.
PAWS: Use Cases I-D: draft-ietf-paws-problem-stmt-usecases-rqmts Basavaraj Patil, Scott Probasco (Nokia) Juan Carlos Zuniga (Interdigital) IETF 82.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
Enabling IPv6 in Corporate Intranet Networks
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
MNO Cloud Use Case 3 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_116.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Remote Desktop Connection Techniques Wireless Communication Networks.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
MNO Cloud Use Cases Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#42Tdoc SA3LI11_104.
Sales Guide V1.00 Andy Wu Jan, Product Introduction Product Positioning The Use Scenario Competitor Analysis.
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Course 201 – Administration, Content Inspection and SSL VPN
Mobile WiMAX e The Progress and the Promise Dick Lee
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
MNO Cloud Use Cases 4 to 9 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#44Tdoc.
Mobile IP, PMIP, FMC, and a little bit more
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
1 A Cross-Layering Design for IPv6 Fast Handover Support in an IEEE e Wireless MAN Youn-Hee Han, Heejin Jang, JinHyeock Choi, Byungjoo Park and Janise.
Practical Considerations for Securely Deploying Mobility Will Ivancic NASA Glenn Research Center (216)
ITGS Types of network.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
A New Handover Mechanism for Femtocell-to-Femtocell Adviser: Frank, Yeong - Sung Lin Presented by Li Wen Fang.
Prevent Information and Overview Updated October 2013, Education Office.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
UbiConn: Providing a Ubiquitous Connectivity Experience Katherine Everitt T. Scott Saponas Susumu Harada December 6, 2004.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Module 6: Network Policies and Access Protection.
Intelligent Interconnects in the VoIP Peering Environment John Longo VP Product Marketing & Management, NextPoint.
COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY.
Virtual Teams Team 4 Chris Vance. Overview Benefits Brief History Communication Applications Company Examples Devices.
NETLMM Applicability Draft (Summary) 28 Sep
V6OPS WG IETF-72 IPv6 in Broadband Networks draft-kaippallimalil-v6ops-ipv6-bbnet Presented by: David Miles Kaippallimalil John Frank Xia July 2008.
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Easy Way to Secure the Network Definitely with Cisco ASA.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Fix The Streaming problems with Roku Mobile Application. For more details visit our website
Virtual Private Networks
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Virtual Private Networks
5G MOBILE TECHNOLOGY By J.YOGESH 08M31A0425.
A New Era in Critical Communications
NETLMM Applicability Draft (Summary)
Bluetooth.
Practical Considerations for Securely Deploying Mobility
Security in Wide Area Networks
Lecture 36.
Lecture 36.
Presentation transcript:

Discussion on LI Requirements for Nomadic and Mobile HNBs Source: Rogers Wireless Contact: George Babut 3GPP/SA3-LI#41Tdoc SA3LI11_085 Philadelphia, May 2011

Rogers WirelessDiscussion on Nomadic/Mobile HnB LI 2 Paper Objectives This discussion paper discusses the location requirements for LI scenarios applicable to Nomadic and Mobile Home NodeB use cases

Rogers WirelessDiscussion on Nomadic/Mobile HnB LI 3 Introduction Deployment of HNBs –Fixed –Nomadic –Mobile

Rogers WirelessDiscussion on Nomadic/Mobile HnB LI 4 Nomadic HNB –This may be an operator policy, allowing the subscriber to move HNB from home, office, to cottage, temporary residences (university), or used on business travel (to allow multiple devices to connect as in personal WiFi, or for use in business meeting with associates) Definition of “Nomadic” mode –Essentially a “fixed” operation mode, while being in a given fixed location, movable from one location to another, but not operational while moving from one location to another

Rogers WirelessDiscussion on Nomadic/Mobile HnB LI 5 Mobile HNB –Target attaches the HNB to a Mobile Broadband service, for example: private access to my bus, to reduce cost of several users with respect to mobile service or as I move my HNB from home to cottage; or on a train, where operators have sufficient spectrum, this mode may enhance handover of many users at once while in one IPSEC tunnel, ie one session versus many This is not the anticipated state for HNB, but for operators that allow nomadic operation, operator policies may not catch this operation and may allow this use case to occur. –The Public IP address from the mobile Broadband service is not changing Definition of “Mobile” mode –A “full” operation mode, while being in a given fixed location, movable from one location to another, and fully operational while moving from one location to another Some operators may wish to actually use HnB as picocells on trains

Rogers WirelessDiscussion on Nomadic/Mobile HnB LI 6 Location for Mobile HNB Now the location of the HNB is variable during its normal operation Location of a target on the HNB becomes an issue Any targets on the HNB may not report correctly their location A fast enough location update to keep up with this HNB mobility might be required, depending upon the national LI requirements

Rogers WirelessDiscussion on Nomadic/Mobile HnB LI 7 Conclusions We need to ensure that: –there are mechanisms that can detect changes in location for the HnB, and –that the HNB location is securely updated with trusted information in a timely manner that meets national authority requirements.