MNO Cloud Use Case 3 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_116.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
The Internet Useful Definitions and Concepts About the Internet.
Introduction to Web Database Processing
1 Virtual Forensics Lab Steve Kim (Client) Marilyn Silva Rajeswari Ian Anu Nagpal Anthony Glover 1.
Advanced Java Class Web Applications – Part 0 (Introduction)
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Introduction to Web Interface Technology (CSE2030)
Remote mailbox access gateway Software lab project.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Technion – Israel Institute of Technology Department of Electrical Engineering Software Lab Remote Mailbox based on.NET technology Michael and Eugene Shamis.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Lexmark Print Management
1 Generic SMS Gateway for AtLink Enterprise Voice Integration Instructor: Dr. Kwok-Bun Yue, Ph.D Mentor: Mr. Dilhar De Silva Team #6: Dang Nguyen Huy Do.
Lesson 19 Internet Basics.
MNO Cloud Use Cases Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#42Tdoc SA3LI11_104.
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Discussion on LI for Mobile Clouds
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
INTRODUCTION TO WEB DATABASE PROGRAMMING
IT 210 The Internet & World Wide Web introduction.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
MNO Cloud Use Cases 4 to 9 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#44Tdoc.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
HTML+JavaScript M2M Applications Viewbiquity Public hybrid cloud platform for automating and visualizing everything.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Network Firewall Technologies By: David W Chadwick Implementing a Distributed Firewall By: Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
CIS 250 Advanced Computer Applications Internet/WWW Review.
Computer Emergency Notification System (CENS)
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Integrating and Troubleshooting Citrix Access Gateway.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
LO2 Understand the key components used in networking.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
1 Seminar: Pervasive Computing 2004 Automatic mobile device configuration: Status & open challenges Stefan Hoferer Supervisor: Andreas Fasbender.
Data communication and Networks
TMG Client Protection 6NPS – Session 7.
Module 3: Enabling Access to Internet Resources
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Web Development Web Servers.
Professional Web Designing For Absolute Beginners
IIS.
Computer Networks Protocols
Comodo Dome Data Protection
Presentation transcript:

MNO Cloud Use Case 3 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_116 San Fanscico, 15 Nov– 18 Nov 2011

Introduction This document provides additional use cases Refer to documents Tdoc SA3LI11_103 and Tdoc SA3LI11_104 for background material

List of Potential Cloud Use Cases relevant to LI Work Use Case 1: Filing Sharing Service with single MNO Use Case 2: MNO uses a Cloud server – Use Case 2a: MNO uses a Cloud server that provides redirection Use Case 3: The MNO hosts a cloud in its network Use Case 4: SMB or Enterprise use multiple MNO networks Use Case 5: Same as Use Case 4, but each MNO has a Cloud Server that proxies (extension of Use Case 2) Use Case 6: Same as use case 6, however MNO cloud server provides redirection (extension of Use Case 2a) to the 3rd party cloud App server Use Case 7: SMB or Enterprise use multiple MNO with their own Clouds (extension of Use Case 4) Use Case 8: Enterprise extension to the cloud Use Case 9; Local Break out

Use Case 3 The MNO hosts a cloud in its network – Dynamic triggering or other LI solutions will allow capture of all data – Is the data useable?

Use Case 3 What identifiers/ identities will be used for Cloud applications – Non 3gpp access, identifications, identities captured IP address, HTTP get Header information, User name/ PSW Open ID? – 3gpp access Via different access device (assuming web type login) Via SMS, – Can SMS short codes be sent to entire media to home PC – Media, ie voice commands Application Identification of Cloud applications – File Share, Address Book, Global File share, Converged Messaging system,… Crypto keys, will operator have access to them or will the LI function provide clear text – App server / vendor / controlled – User defined and controlled Mikey interaction

Use Case 3 Protocol structure and media types of the cloud – Ie does the cloud use and or install java applets on client to view contents, are they keyed to crypto variables in the user device, will LEA be able to get visibility – Are these time sensitive and time dated – Are there proprietary media types Do they have DRM wrappers – Does it logs and or other files to IP address as a set of rules – Is geo-location tagging done by the application – Protocol types Smtp, SRTP,

Use Case 3 Other issues – Redundant databases or geographic data bases Synchronization – Deposits in User accounts, may be time stamped differently Deposits into user account by other people – File sharing, or other sharing apps – Global file share for small business – Remote Wipe capabilities Does the app have remote wipe for IT security How is this communicated to LEA Can it be disabled via a warrant/ regulatory Domain