Telefónica Móviles España Deliverable 3.1 WP3 2.5 -3G Communication Infrastructure.

Slides:



Advertisements
Similar presentations
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
Advertisements

0 DOD/DT/CEDCV – 20 th & 21 st January Paris meeting SAGEM RTD Activities C2-Sense project Paris – 20 & 21 January 2015.
Telefónica Móviles España WP3 meeting G Communication Infrastructure.
LMF/TTR Raimo Vuopionperä 6WINIT: Ericsson (Research) Objectives (6WINIT Kick-Off, London) Raimo Vuopionperä (Ph. D.), NomadicLab (LMF/TTR)
LONG: Laboratories Over Next Generation Networks. Project Description & WP1: Management.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
LONG: Laboratories Over Next Generation Networks. LONG Laboratories Over Next Generation Networks Jordi Domingo-Pascual Josep Mangues-Bafalluy Advanced.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SALSA-NetAuth SALSA-FWNA BoF Kevin Miller Duke University Internet2 Member Meeting May 2005.
Module 5: Configuring Access to Internal Resources.
Telefónica Móviles España GPRS (General Packet Radio Service)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 BAN Security Services MobiHealth Plenary Session Santorini 2003/05/26-27.
Doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 1 March 2004 WLAN Backend System Security and WLAN Interworking Security Andrew Myers British.
Supporting Packet-Data QoS in Next-Generation Cellular Networks R. Koodli and Mikko Puuskari Nokia Research Center IEEE Communication Magazine Feb, 2001.
GPRS Muhammad Al-khaldi Sultan Al-Khaldi
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Telecommunication Networks Group Technical University Berlin Secure WLAN Operation and Deployment in Home and Small to Medium Size Office Environments.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
ALPINE SEARCH AND RESCUE FOR SLOVENIA AND ITALY. ALPSAR IN SHORT  Budget: € ,00  EC Contribution: € ,25 (75%)  Duration: 24 Months 
Telefónica Móviles España WP3 meeting G Communication Infrastructure Madrid, November 12 & 13, 2002.
 ====!"§==Systems= IPonAir T-Systems Nova Content Project goals Reference architecture Reference scenarios Terminology and definition Design principles.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
MIMCom 2006: Deploying a campus area network for the University Teaching Hospital Lusaka – Zambia Midterm Presentation March 24th 2006 Project Team: Michael.
ITEA Easy Wireless project (EW-VTT) Milla Huusko
1 MOBY DICK Mobility and Differentiated Services in a Future IP Network (Keyaction IV.5.2 Terrestrial Wireless Systems and Networks) Hans Joachim Einsiedler.
Telefónica Móviles España Status of trial-ready GPRS and UMTS networks in the trial countries.
WSB / MobiHealth Hugo Geuverink MobiHealth WP3 meeting 12/13 November 2002, Madrid.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 WP2 UPF Contribution to MobiHealth Security in the MobiHealth BAN Enschede 2002/09/18-20.
Feedback for Multi-connection China mobile Jin Peng Jun Wang
Telefónica Móviles España MobiHealth Infrastructure WP G Communication Infrastructure.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Seamless Handover in Terrestrial Radio Access Networks: A Case Study 第 5 組 彭瑱瑞 李政穎 陳冠男 郝晉杰.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
T Multimedia Seminar Carlos Herrero55828H Osmo Tolvanen46958L.
INFS 6225 Object-Oriented Systems Analysis & Design Chapter 11: Physical Architecture Layer Design.
MobiHealth Communication Infrastructure Measurement strategy of E2E communication link MobiHealth WP3 meeting November 13, 2002 MobiHealth Team, University.
1 Contribution of IST projects to EMTEL on user requirements Krisztina Cziner Helsinki University of Technology EMTEL meeting, Stockholm, 1st of Sept,
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Demonstrators and Pan-European Services Laboratory WP5 session.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 reTHINK Deliverables, How To Read reThink deliverables quick starter.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 MobiHealth Security Requirements and Proposal MobiHealth Security Requirements and Proposal Madrid 2002/11/12-13.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
An Analysis on NAT Security
Virtual Private Networks
Virtual Private Network
Integration of and Third-Generation Wireless Data Networks
Internet Security CS457 Seminar Zhao Cheng
Providing Teleworker Services
Virtual Private Networks (VPN)
Implementing TMG Server Publishing
MobiHealth Communication Infrastructure
Providing Teleworker Services
Providing Teleworker Services
Providing Teleworker Services
Presentation transcript:

Telefónica Móviles España Deliverable 3.1 WP G Communication Infrastructure

2 Index Introduction to GPRS and UMTS networks –Architecture overview –Services GPRS and UMTS situation in each trial site –GPRS communication architecture Commercially available providers GPRS Roaming partnership Coverage maps –UMTS state

3 Technical requirements and limitations in each trial scenario –Bandwidth –Coverage and availability –Reliability Conclusions about TCP and UDP performance –Traffic management –Security –Mobility Index (II)

4 GPRS situation in each trial site Selected operators: No problems related to coverage areas. Roaming: Not available between the trial sites with the selected operators CountryOperator GermanyD2- Vodafone SpainTelefónica Móviles (Partner) SwedenTelia (Partner) The NetherlandsO2

5 UMTS situation in each trial site CountrySituation GermanyNot available SpainPossible testbed in Madrid SwedenPossible testbed in other area The NetherlandsPossible testbed in Enschede

6 Technical requirements and limitations in each trial scenario (I) BANDWIDTH ScenarioBW (Kbps)GPRSUMTS Nurse12.57Yes Outdoor15.80Yes Trauma paramedic3.07Yes Patient paramedic1.90Yes High-risk pregnancies 3.62Yes Cardio14.82Yes Lighthouse4.76Yes RA28.90NoYes Respiratory insufficiency 6.40Yes Discharge1.30Yes

7 Technical requirements and limitations in each trial scenario (II) RELIABILITY Conclusions about TCP vs UDP –TCP protocol is suitable for transporting BAN control data from the End-Host to BAN –The BAN data can be transported using UDP although some data may be lost

8 Technical requirements and limitations in each trial scenario (III) TRAFFIC MANAGEMENT Operators involved can´t guarantee the priority of the data over the voice so data traffic may be affected by a voice congestion situation.

9 Technical requirements and limitations in each trial scenario (IV) SECURITY Two security services are required for patients data in GPRS/UMTS networks: Data confidentiality and authentication Security protocols used in MobiHealth from the MS to the server: –Transport Layer SSL connection, data encryption, X.509 certificates-based client, Server authentication –Data link layer security provided by the Radio Access Network (authentication and data encryption)

10 Technical requirements and limitations in each trial scenario (V) MOBILITY GPRS: –Roaming functionality allows the users to establish GPRS connections from a foreign country. – If the user roams to another network during a GPRS connection, the link goes down. – In the same network, the handovers don't produce any disconnection. UMTS: Only handover could be supported at first phase.

Telefónica Móviles España MobiHealth Architecture WP G Communication Infrastructure

12 MobiHealth architecture overview BTS BSC SGSN GGSN Radius INTERNE T BAN Operator network WSB Surrogate Host LookUp Service BAN Data Repositor y Back-End System End-user applicatio n

13 MobiHealth architecture Technical Support INTERNE T BAN Operato r network BESys Technical support (CMG & UT) VPN Tunnel VPN Concentrator

14 The MobiHealth infrastructure consists of: –Main components: operator network, WSB, SH, LUS, BDR, technical support centres. –Supplementary components: VPN concentrators, Firewall. Definition of the required SW and associated costs: –WSBs and VPN concentrator provided by CMG. –SHs, LUS, BDR: provided by UT (over Linux OS) Definition of the required HW and associated costs: –WSBs and VPN concentrator provided by CMG. –SHs, LUS, BDR: 4 hich-end PCs. Costs?? Achievements

15 Deliverable D3.1 planning New deadline: 1st March 2003 Responsible: Marta Olivar (TME) TASKS: 1.Definition of the structure of the document (December 2002) 2.Definition of the needed contributions of the partners (December 2002) (TME) 3.Collect contributions from the partners (7 January January 2003) (TME) 4.Edition of first version and delivery of first draft (17 January 2003) (TME) 5.Collect comments from the contributors (17 January January 2003) (TME) 6.Edition of final version (1st February February 2003) (TME) 7.Internal delivery of the final version (17 February February 2003) (TME) 8.Delivery to the EC (28 February 2003) (Rainer)

16 Deliverable D3.2 “MobiHealth System” Planning Deadline: May 2003 Responsible: Hugo Geuverink (CMG) TASKS: 1.Definition of the main purpose and the objective of the deliverable ( January 2003) (WP3 participants) 2.Definition of the structure of the document (30 January February 2003) (WP3 participants) 3.Definition of the needed contributions of the partners (17 February February 2003) (CMG) 4.Collect contributions from the partners (24 February March 2003) (CMG) 5.Edition of first version and delivery of first draft (17 March April 2003) (CMG) 6.Collect comments from the contributors and from all the partners (21 April May 2003) (CMG) 7.Edition of final version (5 May -16 May 2003) (CMG) 8.Internal delivery of the final version (19 May 2003) (CMG) 9.Delivery to the EC (Before 30 May 2003) (Rainer)