WSB / MobiHealth Hugo Geuverink MobiHealth WP3 meeting 12/13 November 2002, Madrid.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Encrypting Wireless Data with VPN Techniques
Enabling Secure Internet Access with ISA Server
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Hypertext Transfer PROTOCOL ----HTTP Sen Wang CSE5232 Network Programming.
Telefónica Móviles España WP3 meeting G Communication Infrastructure.
Technical Overview July, 2004.
MovilForum Test Platform Telefónica Móviles España.
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
V1.00 © 2009 Research In Motion Limited Introduction to BlackBerry Smartphone Web Development—The BlackBerry Infrastructure Trainer name Date.
Active Directory: Final Solution to Enterprise System Integration
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
Circuit & Application Level Gateways CS-431 Dick Steflik.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Remote Networking Architectures
NetComm Wireless VPN Functionality Feature Spotlight.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Telefónica Móviles España WP3 meeting G Communication Infrastructure Madrid, November 12 & 13, 2002.
Intranet, Extranet, Firewall. Intranet and Extranet.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
CSE 8343 Group 3 Advanced OS Inter Operability Between IPv4 and IPv6 Team Members Aman Preet Singh Rohit Singh Nipun Aggarwal Chirag Shah Eugene Novak.
Module 8: Managing Client Configuration and Connectivity.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
© NOKIApage: 1 Wireless IP Solutions Enabled by GPRS Chris Briglin Head of Marketing GPRS Business Program Nokia Telecommunications.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Introduction to BlackBerry Smartphone Web Development —Introduction to Browser Push Trainer name Date V1.00 © 2009 Research In Motion Limited.
Telefónica Móviles España Status of trial-ready GPRS and UMTS networks in the trial countries.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Enabling Embedded Systems to access Internet Resources.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 WP2 UPF Contribution to MobiHealth Security in the MobiHealth BAN Enschede 2002/09/18-20.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Telefónica Móviles España MobiHealth Infrastructure WP G Communication Infrastructure.
Lemonade Requirements for Server to Client Notifications
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
WWW Programming Model. WWW Model The Internet WWW architecture provides a flexible and powerful programming model. Applications and content are presented.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Telefónica Móviles España Deliverable 3.1 WP G Communication Infrastructure.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 MobiHealth Security Requirements and Proposal MobiHealth Security Requirements and Proposal Madrid 2002/11/12-13.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Unit 3 Virtualization.
Web fundamentals: Clients, Servers, and Communication
Network Infrastructure Services Supporting WAP Clients
NET 536 Network Security Firewalls and VPN
Working at a Small-to-Medium Business or ISP – Chapter 8
Module Overview Installing and Configuring a Network Policy Server
Working at a Small-to-Medium Business or ISP – Chapter 7
Welcome To : Group 1 VC Presentation
Working at a Small-to-Medium Business or ISP – Chapter 7
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

WSB / MobiHealth Hugo Geuverink MobiHealth WP3 meeting 12/13 November 2002, Madrid

filename / 2© 2001 / Agenda Scenario nr. 1 Scenario nr. 2 Advantages of Wireless Service Broker Benefits of WSB / WAP 2.0 TCP / UDP / W-TCP: advantages / dis-advantages Conclusion

filename / 3© 2001 / GGSN - WSB configured Connectivity AppServer Sensor Front-End BT MBU Wireless Service Broker™ GPRS/UMTS Internet Firewall SGSN GGSN VPN

filename / 4© 2001 / GGSNGGSN WSBWSB RADIUSDRADIUSD Fix IP nr GGSN Fix IP nr WSB TCP/IP (IP nr client) Radius info MSISDN + Username + Password Subscriber DB. Authorization Authentication GGSN - WSB configured Connectivity

filename / 5© 2001 / Advantages GSN - WSB configured Connectivity Use of VPN infrastructure Easier to achieve Cheaper to achieve Easier to maintain Radius Forwarding accounting Easier and more secure Authentication Separation of different operators subnets by Virtual GW’s

filename / 6© 2001 / Disadvantages GGSN - WSB configured Connectivity Operators have to accept (Operator dependent solution) Wan’t work in visited networks

filename / 7© 2001 / Agenda Scenario nr. 1 Scenario nr. 2 Advantages of Wireless Service Broker Benefits of WSB / WAP 2.0 TCP / UDP / W-TCP: advantages / dis-advantages Conclusion

filename / 8© 2001 / NO GGSN - WSB configured Connectivity AppServer Sensor Front-End BT MBU Wireless Service Broker™ at Hospital side GPRS/UMTS Internet Firewall

filename / 9© 2001 / Surrogate MBU Secure HTTP Jini Lookup Service End User Application Surrogate Host MobiHealth domain E-Health domain Data Repository Wireless Service Broker Surrogate Host / WSB Secure HTTP Firewall

filename / 10© 2001 / HOSPHOSP WSBWSB RADIUSDRADIUSD Radius info MSISDN + Username + Password from Hospital Subscriber DB. Authorization Authentication Radius info from Hospital

filename / 11© 2001 / Advantages NO GGSN - WSB configured Connectivity End to End security Radius info will be get from Hospital and MBU No radius forwarding Global solution => Non operator independent Only roaming agreement needed

filename / 12© 2001 / Disadvantages NO GGSN - WSB configured Connectivity No Radius forwarding => only Proxy authentication Athentication more complex No added-value from operators

filename / 13© 2001 / Advantages WSB / Surrogate Host, Hospital side Central Authentication / Authorization (Patient, Doctor…) Maintain Subscriber DB Hospital by Virtual gateway and seperate DB Radius info from Hospital -MSISDN -Username -Password Firewall function for Internet Traffic

filename / 14© 2001 / Disadvantages WSB / Surrogate Host, Hospital side No Radius info from Operator

filename / 15© 2001 / Advantages MBU / WSB W-TCP protocol Secure HTTP Application level security Only body encrypted Information in Header usable

filename / 16© 2001 / Disadvantages MBU / WSB WSB has to ask MBU for Username/Password for authentication and authorization Username / Password maintenance

filename / 17© 2001 / Agenda Scenario nr. 1 Scenario nr. 2 Advantages of Wireless Service Broker Benefits of WSB / WAP 2.0 TCP / UDP / W-TCP: advantages / dis-advantages Conclusion

filename / 18© 2001 / Advantages of the Wireless Service Broker (1) Optimized connection between BAN, WSB and Hospital Wireless TCP Cost saving for subscriber (patient) Central Authentication and Authorization Broker management facility Statistics Services Profiles Differentiation over Billing (Hospital / Insurance company / Patient)

filename / 19© 2001 / Advantages of the Wireless Service Broker (2) Push capability Surrogate Host => MBU Activate when MBU in sleep mode Deliver control information when device available Device always reachable Push over IP, when no connection, Session Initiation Request Support of all Bearers Surrogate Host => Doctor (notification message)

filename / 20© 2001 / Advantages of the Wireless Service Broker (3) Out of coverage (WAP standard) PPG stored data (control information) until MBU is alive PPG = Push Proxy Gateway Firewall function for Internet traffic Maintain Subscriber DB by Virtual Gateway Replication of solution possible on same platform via Virtual Gateway’s Scalability WAP 2.0 Standard

filename / 21© 2001 / Agenda Scenario nr. 1 Scenario nr. 2 Advantages of Wireless Service Broker Benefits of WSB / WAP 2.0 TCP / UDP / W-TCP: advantages / dis-advantages Conclusion

filename / 22© 2001 / Benefits of WSB / WAP 2.0 Update of WAP to be 3G-ready W-TCP instead of UDP / TCP No protocol conversion in WAP 2.0 (better security) End to End security (secure HTTP) in both ways ! Richer mark-up languages tailored for mobiles, with improved support for: Color Image formats, including color images Style sheets Important when status request from Content server > Patient

filename / 23© 2001 / Agenda Scenario nr. 1 Scenario nr. 2 (proposal) Advantages of Wireless Service Broker Benefits of WSB / WAP 2.0 TCP / UDP / W-TCP advantages / dis-advantages Conclusion

filename / 24© 2001 / TCP advantages / disadvantages Advantages: Reliable, all data will be send Data packages in right order Disadvantages: Bad performance due to resending mechanisme Whole window will be send again Slow initial congestion Influence of network behaviour

filename / 25© 2001 / UDP advantages / disadvantages Advantages: Better performance Disadvantages: Not Reliable, not all data will be received One or more packages (even >50%) of data could be lost Create retry mechanisme Packages received in different order Create mechanisme to set packages in right order WAP 1.x standard Influence of network behaviour

filename / 26© 2001 / W-TCP advantages / disadvantages Advantages: Reliable Retry mechanisme, only lost packages will be send again Initial congestion better by configuration of parameter cwnd Better performance then TCP Wireless Serice Broker support W-TCP MBU (Linux) support W-TCP WAP 2.0 standard Disadvantages: Influence of network behaviour

filename / 27© 2001 / Agenda Scenario nr. 1 Scenario nr. 2 (proposal) Advantages of Wireless Service Broker Benefits of WSB / WAP 2.0 TCP / UDP / W-TCP advantages / dis-advantages Conclusion

filename / 28© 2001 / Conclusion Proposal CMG Scenario 2 (WSB at Hospital side, no GGSN – WSB configuration, W-TCP and secure HTTP) Central Authorisation / Authentication Push Capability Maintain subscriber DB by Virtual Gateway Replication on same platform via Virtual Gateway Global solution -No radius info from operator -No configuration at GGSN Firewall function Internet traffic

filename / 29© 2001 / QUESTIONS ?