Identity Management in Federated Telecommunication Systems

Size: px
Start display at page:

Download "Identity Management in Federated Telecommunication Systems"

Transcription

1 Identity Management in Federated Telecommunication Systems Christian Hauser Institute of Communication Networks and Computer Engineering University of Stuttgart 07/07/2006 IKR Universität Stuttgart

2 Outline Background I: Daidalos Background II: Changing World of Operators Requirements by the Network Requirements by Group Support Conclusions The Daidalos Consortium Page 2

3 Daidalos at a Glance Consortium Telco Operators Industry, SME Research labs, academia The Daidalos Consortium Page 3

4 Daidalos at a Glance Surroundings 2G 3G Release 5 and beyond IPv6-based network with mobility, QoS and AAA, SOA, Web Services IPv4 IPv6 Daidalos The Daidalos Consortium Page 4

5 Customer Operator 3 rd Party Daidalos at a Glance Platform Access Router 2.5/3G IPv6 Internet DVB-H Service Providers / Third Party Administrative domain 1 Admin. domain 2 Daidalos II II Platform 1 DII Platform 2 Pervasive Service Service Provisioning Federation / SLA Support PSS1 Support SPS1 Mobile Router Moving Network adhoc adhoc WLAN/ WMAN DSL/ Cable/ Ethernet Gateway PSTN The Daidalos Consortium Page 5

6 Daidalos Environment Tradition Operator driven tradition in telecommunications Intelligence in the network, no E2E paradigm Revenue by (usage based) selling of communications High importance of scalability, availability, commercialization Strong monitoring Strong need for accountability Few operators Horizontal federation Operator provides for both, network and services Walled-Garden business model Contract-based cooperation and trust between equal peers Competition in cooperation Strong legal requirements (from voice calls) The Daidalos Consortium Page 6

7 Daidalos Environment Disruption Connectivity becomes commodity Shrinking costs and ARPU for bit-pipe search for new revenues Convergence with Internet and Broadcast worlds Shrinking barriers (technological, financial, ) for network and service provision Specialized micro-operators enter the field more competitors Less trust in small operators Full mesh of contracts not feasible Increased variety of networked services growing importance of vertical federation No provider provides for full range of services More open business models joint service provision ( service composition ) Focus business on core competence Network provision and operation Contractual ownership of users Identity management The Daidalos Consortium Page 7

8 Daidalos Focus in Identity Work Two flavors of Identity Management Integration of different subscriptions Goals Example Relation Usability for user and services Single Sign-On for different sites Many-to-one link identities Separation of user profile into different compartments Goals Example Relation Privacy by restricting view on user attributes several virtual identities (VIDs) per user VID 1: {pseudonym1, location} VID 2: {pseudonym2, credit card number} One-to-many unlink identities Network support needed for overall compartmentalization Usability support needed Full integration of broadcast/multicast (Triple Play) Networks and services Groups as entities like single users link unlink The Daidalos Consortium Page 8

9 Daidalos Focus in Identity Work Two flavors of Identity Management Integration of different subscriptions Goals Example Relation Usability for user and services Single Sign-On for different sites Many-to-one link identities Separation of user profile into different compartments Goals Example Relation Privacy by restricting view on user attributes several virtual identities (VIDs) per user VID 1: {pseudonym1, location} VID 2: {pseudonym2, credit card number} One-to-many unlink identities Network support needed for overall compartmentalization Usability support needed Full integration of broadcast/multicast (Triple Play) Networks and services Groups as entities like single users link unlink The Daidalos Consortium Page 9

10 Network Support for VIDs Location Credit Card No IP-Address Pseudonym1 Location IP-Address Pseudonym2 Credit Card No IP-Address Service 1 Service 2 Goal Problem Approach Communication network must not introduce attributes for linking VIDs Anonymization not wanted by operators» Contradicts monitoring and accountability» Restricts communication to overlay network above IP Cross layer optimization not possible» Functions in network ( revenue generation) limited» Introduces overhead Adapt network protocols to support VIDs The Daidalos Consortium Page 10

11 Network Support for VIDs Location Credit Card No IP-Address Pseudonym1 Location IP-Address Pseudonym2 Credit Card No IP-Address Service 1 Service 2 Goal Communication network must not introduce attributes for linking VIDs Problem Anonymization not wanted by operators» Contradicts monitoring and accountability» Restricts communication to overlay network above IP Cross layer optimization not possible» Functions in network ( revenue generation) limited» Introduces overhead Approach Adapt network protocols to support VIDs Standardization also for network protocols The Daidalos Consortium Page 11

12 Broadcast Integration Broadcast environment Broadcast contents TV services Radios services Push services Telecom contents Call services Interactive services Personalised services Broadcast networks One to many Telecom environment Telecom networks One to one Broadcast usage Telecom usage INTEGRATION Multimedia contents A/V/D contents Push services Interactive services Personalised services DAIDALOS environment Heterogeneous networks IPv6 WLAN MBMS DVB UMTS New usage After voice/data convergence a new integration of different worlds The Daidalos Consortium Page 12

13 Broadcast Integration Broadcast environment Broadcast contents TV services Radios services Push services Telecom contents Call services Interactive services Personalised services Broadcast networks One to many Telecom environment Telecom networks One to one Broadcast usage Telecom usage INTEGRATION Multimedia contents A/V/D contents Push services Interactive services Personalised services DAIDALOS environment Heterogeneous networks IPv6 WLAN MBMS DVB UMTS New usage After voice/data convergence a new integration of different worlds Standardization also for group identities The Daidalos Consortium Page 13

14 Mobility/Security Requirements Mobility of terminals, users, sessions, services Terminal as endpoint is no longer suitable Locator changes in mobile environments Performance of reconfiguration after move (Req) Addressing of (virtual) identities (Req) Dynamic address resolution (Req) Fast handover mechanisms Authentication/Authorization and Encryption (Req) Consumers need to prove authorization (Req) Identifier to bind packet flows to IPSec SA The Daidalos Consortium Page 14

15 Operational Requirements Accountability For charging, for tracking down misbehaving users/providers, for monitoring and SLA compliance checking, (Req) Identifier for packet flows and service usage (Req) Identity escrow possibilities QoS Network elements must know how to treat packet (Req) Scalability/Performance The Daidalos Consortium Page 15 Identifier for (aggregated) flow» On layers 2 and 3 ( limitations of encryption possibilities) Wireless link remains slow and a scarce resource One state per VID in enabler explosion of state Distribution of state (e.g., user attributes) (Req) Minimize interaction with user device (Req) Scalable enablers (Req) Distributed systems (consistency, discovery, trust, )

16 Pervasiveness Requirements Context-aware user profile Location, situation, network connectivity, More and dynamic attributes in user profile (Req) (Req) Personalization Scalability for many attributes in user profile Support of dynamic attributes in user profile System should be tailored for user Learning capabilities to improve personalization Based on processing of user interaction More interactions screened better personalization (Req) Track usage across all VIDs The Daidalos Consortium Page 16

17 Federation Requirements Number of providers will grow cooperation Horizontal Vertical same functionality, extended service area complementing functionality, same service area Providers must name the user and exchange context (Req) (Req) Organizational streamlining, e.g., regulation Technical standardization: Structure, semantics, interaction/protocol flow One single standard unlikely (Req) Mapping functions/interworking in general Providers do not disclose everything Legal/regulative restrictions Business secrets (Req) Operation with incomplete data Service composition in infrastructure (Req) (Req) Delegation principles VID scenario VID2 VID1 Service composer VID4 VID3 The Daidalos Consortium Page 17

18 Group Requirements No longer only single users as entities Multihoming blurs boundaries (single users vs. groups) Ex: Several IP-Addresses per entity already for multihoming Goal: Generic mechanisms to also handle groups Expected challenges Technical primitives Semantic issues Organizational issues Ex: Multiple IP-addresses per entity, group signatures, group key mgmt. Ex: What is context of a group? Ex: Conflicting policies (AuthN/AuthZ, personalization), Who signs for a group (dependent on purpose of group)? (Req) Standards must support groups The Daidalos Consortium Page 18

19 Conclusions An operator s perspective on identity management Focus: Privacy protection by splitting profile into VIDs ID Mgmt. is more than exchange of identity information Additional requirements to be solved/standardized VIDs need support in network/service infrastructure (Full) anonymous communication not wanted by operators Analysis of nearly each protocol/function and often adaptation Group support Users need usability support for VID selection Focus of Daidalos identity work Pragmatic solutions: Perfect protection not feasible No/weak protection against traffic/usage pattern analysis etc. Conflicting requirements too strong in operator environment (scalability, performance, usability, ) Carefully chosen attacker model necessary The Daidalos Consortium Page 19

20 Main Aspects for Standardization Exchange of identity information: Structure/semantics/ protocol flow/regulative framework/discovery/trust Large number of identity profile attributes High dynamics of identity profile attributes Service composition with VIDs VID orchestration Delegation of authorization to services acting on behalf of user Group support in standards Network/service usage: Accountability, monitoring Scalability/performance Architecture of enabling services themselves Communication overhead (especially on wireless link) Analysis of communication/service platforms about VID linking information and possibly (re)standardization Addresses, flow identifiers, Here, evaluation standards could help The Daidalos Consortium Page 20

Operator requirements for multicast mobility

Operator requirements for multicast mobility Operator requirements for multicast mobility Requirements from a Global Operator s perspective Dirk von Hugo, Deutsche Telekom Laboratories Motivation. Future demand for mobile multicast services. Market

More information

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom

IPv6 and 4G. Christian Bonnet Michelle Wetterwald Institut Eurécom IPv6 and 4G Christian Bonnet Michelle Wetterwald Institut Eurécom Agenda Introduction Architecture Mobile Terminal Function Elements Mobility scenarios QoS Multicasting Conclusion Introduction : 4G Attributes

More information

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Demo 1. Network Path and Quality Validation in the Evolved Packet Core Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer

More information

Enabling Multimedia Broadcast/Multicast Services over Converged Networks N. Baker *, M. Zafar *, A. Al-Hezmi **, M. Fuchs ***

Enabling Multimedia Broadcast/Multicast Services over Converged Networks N. Baker *, M. Zafar *, A. Al-Hezmi **, M. Fuchs *** Enabling Multimedia Broadcast/Multicast Services over Converged Networks N. Baker *, M. Zafar *, A. Al-Hezmi **, M. Fuchs *** *Mobile & Ubiquitous Systems Group, CCCS Research, UWE, Bristol, UK BS16 1QY

More information

The Internet of the future: What could it be and what are the challenges

The Internet of the future: What could it be and what are the challenges The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Views on Wireless Network Convergence

Views on Wireless Network Convergence Views on Wireless Network Convergence Yan PENG, Bin XIA, Meng LIANG Version 1.0 Agenda Motivations for Wireless Network Convergence Convergence Categories Issues on IP based Convergence A Possible Evolution

More information

Privacy and Identity Management in a Layered Pervasive Service Platform

Privacy and Identity Management in a Layered Pervasive Service Platform Privacy and Identity Management in a Layered Pervasive Service Platform Marc BARISCH, Martin NEUBAUER, Joao PAGAIME 2, Joao GIRAO 2, Rui L. AGUIAR 3 University of Stuttgart, Institute of Communication

More information

Enabling Multicast QoS in a B3G Environment

Enabling Multicast QoS in a B3G Environment Enabling Multicast QoS in a B3G Environment Diogo Gomes dgomes@av.it.pt Instituto de Telecomunicações - Aveiro Summary The importance of Broadcast technologies to Telecom Operators Multicast Services over

More information

Requirements for the Operations and Management of 4G Networks

Requirements for the Operations and Management of 4G Networks ITC19/ Performance Challenges for Efficient Next Generation Networks LIANG X.J. and XIN Z.H.(Editors) V.B. IVERSEN and KUO G.S.(Editors) Beijing University of Posts and Telecommunications Press 981-990

More information

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager HP and IPv6 Deployment Bill Medlin HP-UX IPv6 Project Manager OUTLINE Why IPv6? Current HP-UX IPv6 Features IPv6 Customer Experience HP-UX and IPv6 Deployment HP Strategy for IPv6 page 2 Why IPv6? Immediate

More information

MOBILE VIDEO WITH MOBILE IPv6

MOBILE VIDEO WITH MOBILE IPv6 MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

G-Lab: A Future Generation Internet Research Platform

G-Lab: A Future Generation Internet Research Platform Institute of Computer Science Department of Distributed Systems Prof. G-Lab: A Future Generation Internet Research Platform www3.informatik.uni-wuerzburg.de Institute of Computer Science University of

More information

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division Networks, Carriers and IT France Télécom T vision Networks, Carriers

More information

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

Krishan Sabnani Bell Labs. Converged Networks of the Future

Krishan Sabnani Bell Labs. Converged Networks of the Future Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation

More information

Evolutionary Trends towards Beyond 3G Mobile Networks

Evolutionary Trends towards Beyond 3G Mobile Networks Evolutionary Trends towards Beyond 3G Mobile Networks Cornel Pampu, Cornelia Kappler, Morten Schläger / SN MN PG NT MN 4 November 17th, 2006 The new company Nokia Siemens Networks is expected to start

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless

More information

MIP6 Route Optimization Enhancements

MIP6 Route Optimization Enhancements MIP6 Route Optimization Enhancements draft-arkko-mip6-ro-enhancements-00 Jari Arkko, jari.arkko@ericsson.com Christian Vogt, chvogt@tm.uka.de IETF 61, Washington D.C. Mobopts Meeting, November 10, 2004

More information

NGN Interconnection Standards & Protocols

NGN Interconnection Standards & Protocols NGN Interconnection Standards & Protocols A G E N D A NGN ENVIRONMENT LICENSING CONDITIONS REGULATORY INITIATIVES INTERCONNECTION PROTOCOLS ISSUES R. R. Mittar DDG(NGN), TEC NGN CONCEPT Central Office

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies

Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies Fixed versus Mobile Turning Convergence into Reality Dieter Schuler, Wouter Franx Lucent Technologies Agenda Fixed Mobile Convergence Service Definition Operator Challenges IP Multimedia Subsystem the

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need

More information

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,

More information

Impact of architecture on governance: IPv6 and Internet post-ip

Impact of architecture on governance: IPv6 and Internet post-ip Impact of architecture on governance: IPv6 and Internet post-ip Jean-Michel Cornu, Chief scientist Fing Internet Governance: Transparency Trust and Tools (IG3T) Technical Normalcy and Internet Governance:

More information

Next Generation Networks Convergence, evolution and roadmaps

Next Generation Networks Convergence, evolution and roadmaps Next Generation Networks Convergence, evolution and roadmaps Dr. Sathya Rao,Telscom Consulting, Berne Rao@telscom.ch NGN Applications Requirement IP Everywhere The Internet Protocol is becoming pervasive

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP Networks: Ensuring quality through proactive link management White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity

More information

Unified Charging and Billing Solution. Unified Next Generation of Charging Systems in Mobile Networks

Unified Charging and Billing Solution. Unified Next Generation of Charging Systems in Mobile Networks Unified Charging and Solution. Unified Next Generation of Charging Systems in Mobile Networks Daniel Donhefner Nokia Siemens Networks Business Support Systems Research and Development 1 Motivation and

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Alcatel-Lucent Technology Training

Alcatel-Lucent Technology Training Global Training offer Enterprise Educational Services November the 20th, 2009 1 Alcatel-Lucent Technology Training Global Training Offer November the 20th, 2009 All Rights Reserved Alcatel-Lucent 2009

More information

CONVERGENCE Glossary (version of 30/10/2012)

CONVERGENCE Glossary (version of 30/10/2012) Glossary (version of 30/10/2012) Term Access Rights Advertise Application Business Scenario CA CCN Cl_Auth_SC Cl_Auth_User_Pw Clean-slate architecture CoApp CoApp Provider CoMid CoMid Provider CoMid Resource

More information

Making My Book Social Acknowledgements Before We Begin About This Book

Making My Book Social Acknowledgements Before We Begin About This Book Table of About the Author Making My Book Social Acknowledgements Before We Begin About This Book page xvii xviii xxi xxiv xxviii Part I What s In Your Area Network? 1 1 It s a Small Wireless World 3 1.1

More information

Service & Network Management

Service & Network Management Peter.Fellows@certis.co.uk Service & Network Management Introduction Content Requirements and Expectations. Telecommunications Network Management (TMN) Theory and Reality Pressures for change: causes and

More information

Hybrid system and new business model

Hybrid system and new business model Hybrid system and new business model July 2014 Jérôme DAVID - Strategic Marketing Manager The explosion of data traffic over telecom networks is changing both business rules and network deployment methods

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

Katerina Apostolaki, kapo@intracom.gr Marketing Manager

Katerina Apostolaki, kapo@intracom.gr Marketing Manager Cloud for Telcos Katerina Apostolaki, kapo@intracom.gr Marketing Manager As an introduction Broadband is refered as a network infrastructure capable of reliably delivering diverse convergent services through

More information

Continued improvement in semiconductor and computing. technologies brought exponential growth to wireless industry. The

Continued improvement in semiconductor and computing. technologies brought exponential growth to wireless industry. The 23 Chapter-1 INTRODUCTION Continued improvement in semiconductor and computing technologies brought exponential growth to wireless industry. The huge number of advance mobile devices and integrated applications

More information

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style

More information

SOA in the pan-canadian EHR

SOA in the pan-canadian EHR SOA in the pan-canadian EHR Dennis Giokas Chief Technology Officer Solution Architecture Group Canada Health Infoway Inc. 1 Outline Infoway EHR Solution EHRS Blueprint Approach EHR Standards Oriented Architecture

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

Components and Concepts of the Ambient Networks Architecture

Components and Concepts of the Ambient Networks Architecture Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,

More information

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how

More information

Service Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com

Service Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com Service Oriented Architecture Based Integration Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com Mike Rosen ACCESS TO THE EXPERTS Consultant Chief Enterprise Architect for service and

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

IP Core Network Realization

IP Core Network Realization IP Core Network Realization Ruben Montoya Technical Marketing Engineering Mobile Wireless Group 2001, Cisco Systems, Inc. All rights reserved. 1 IP Core Network Realization - Agenda Introduction Major

More information

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated 3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Use Case: Service Aggregation

Use Case: Service Aggregation Use Case: Service Aggregation Service Aggregation of Telecommunications Services Mark Evenson A1TA Alfonso Castro Escudero Telfónica I+D Service Aggregator Use Case Telecommunications Industry Context

More information

Cisco Virtual Office: Flexibility and Productivity for Your Workforce

Cisco Virtual Office: Flexibility and Productivity for Your Workforce Cisco Virtual Office: Flexibility and Productivity for Your Workforce The Cisco Virtual Office solution provides secure, rich network services to workers at locations outside of the traditional corporate

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

Kommunikationsdienste im Internet Möglichkeiten und Risiken

Kommunikationsdienste im Internet Möglichkeiten und Risiken Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen

More information

Internet Communications Using SIP

Internet Communications Using SIP Internet Communications Using SIP Delivering VolP and Multimedia Services with Session Initiation Protocol Second Edition Henry Sinnreich Alan B. Johnston WILEY Wiley Publishing, Inc. Contents Foreword

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Networking Research: Trends and Issues

Networking Research: Trends and Issues 1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of

More information

Voice over IP (VoIP) Past, Present Future. Alejandro de la Fuente Arash Jamshidi

Voice over IP (VoIP) Past, Present Future. Alejandro de la Fuente Arash Jamshidi Voice over IP (VoIP) Past, Present Future Alejandro de la Fuente Arash Jamshidi 1 VoIP History 1995: Vocaltec in Israel introduced the first VoIP product (InternetPhone) 1998: Less than 1% of calls in

More information

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen

More information

New Business Planning Group KT. March 2005

New Business Planning Group KT. March 2005 The Project New Business Planning Group KT March 2005 Today s Telco - Broadband Downfall of Main Revenue Stream PSTN Business Leased-line Broadband take-up over first 10 years is faster than previous services

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

MANAGED TELEPHONE AND INTERNET SERVICES

MANAGED TELEPHONE AND INTERNET SERVICES MANAGED TELEPHONE AND INTERNET SERVICES Managed Business Solutions Market Brief Insert service provider logo here 2001 Nortel Networks. All Rights Reserved. CONTENTS Introduction...2 Managed Business Solutions...

More information

How to Design a Communication Network over Distribution Networks

How to Design a Communication Network over Distribution Networks How to Design a Communication Network over Distribution Networks Overview. Key issue: IP technology. Design rules. GAD Project. Experience. Conclusions. Acknowledgments. Overview Increase of the energy

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

FMC (Fixed Mobile Convergence)

FMC (Fixed Mobile Convergence) FMC (Fixed Mobile Convergence) What About Security? Vancouver June 2008 Franck Veysset, Orange Labs Firstname.lastname at orange-ftgroup dot com Agenda Introduction - FMC? WIFI-SIP overview UMA overview

More information

IP Telephony and ENUM

IP Telephony and ENUM NGN IP Telephony and ENUM APEC TEL 30 Next Generation Networks James Seng Assistant Director, Enabler Technologies What is Voice over IP? ) ) ) 1010101000010 1001010101010 1001010101010 0101010001001 TCP/IP

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

SpiderCloud E-RAN Security Overview

SpiderCloud E-RAN Security Overview SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5

More information

networks transformation

networks transformation networks transformation to face usage evolution and traffic growth Alain Maloberti Senior Vice President, Orange Labs Networks SAWAS Africa 2 th December 2014 usage evolution video traffic growth IT-network

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Contents. About the Author. List of Contributors

Contents. About the Author. List of Contributors Contents Preface About the Author List of Contributors xiii xv xvii 1 Introduction 1 1.1 Mobile Middleware 1 1.2 Mobile Applications and Services 2 1.3 Middleware Services 3 1.4 Transparencies 5 1.5 Mobile

More information

A Performance Management architecture for QoS enabled heterogeneous networks

A Performance Management architecture for QoS enabled heterogeneous networks IST MOBILE SUMMIT 2007 1 A Performance Management architecture for QoS enabled heterogeneous networks Nikos Koutsouris, Krzysztof Loziak, Marek Sikora, Nuno Sénica and Efstathios Sykas Abstract In a composite

More information

How To Understand The Benefits Of An Oss Architecture

How To Understand The Benefits Of An Oss Architecture IMS Management Issues. OSS challenges in a NGN environment. Dr. André Zehl Senior Manager Technology Strategy a.zehl @ t-online.net Deutsche Telekom AG Products & Innovation 3rd International FOKUS IMS

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org info@open-mtc.org 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

A Framework to Mobility and Interactivity for Convergent Technologies

A Framework to Mobility and Interactivity for Convergent Technologies A Framework to Mobility and Interactivity for Convergent Technologies Rodrigo F. Maia, Denis Gabos, Eduardo Bertassi, Ian Korolkovas, Edison Spina, Moacyr Martucci Jr. Department of Computing Engineering

More information

Cisco Certified Network Professional - Routing & Switching

Cisco Certified Network Professional - Routing & Switching Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:

More information

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

ICTTEN5204A Produce technical solutions from business specifications

ICTTEN5204A Produce technical solutions from business specifications ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor

More information

The challenge of IP Data Retention to Traditional Approach. mario.mene@retentia.com

The challenge of IP Data Retention to Traditional Approach. mario.mene@retentia.com IP Data Retention The challenge of IP Data Retention to Traditional Approach 27 February 2007 mario.mene@retentia.com Summary The challenge The typical solution Retentia s approach DRS: the solution for

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Service Performance Management: Pragmatic Approach by Jim Lochran

Service Performance Management: Pragmatic Approach by Jim Lochran www.pipelinepub.com Volume 3, Issue 12 Service Performance Management: Pragmatic Approach by Jim Lochran As the mix of service provider offerings become more IP centric, the need to overhaul existing service

More information

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation Agenda The Opportunity Key Problems The Promise of IPv6 What is Microsoft doing Call to Action

More information