The new ISTAT network for capturing interview data: the technological architecture

Size: px
Start display at page:

Download "The new ISTAT network for capturing interview data: the technological architecture"

Transcription

1 The new ISTAT network for capturing interview data: the technological architecture Stefania BERGAMASCO*, Gabriele BUDANO*, Luciana QUATTROCIOCCHI and Antonio TOMA* *ISTAT - Information Technology Division *ISTAT - Social Statistic Department ISTAT - Via Cesare Balbo Rome Italy bergamas@istat.it, budano@istat.it,quattrociocc@istat.it,toma@istat.it 1. Introduction Abstract: ISTAT has recently activated a development project aimed to deploy the information system supporting the new continuos EU Labour Force Survey (LFS). To fulfil the EU LFS ISTAT is working for the adoption of a new data collection system based on a Computer Aided Personal Interview (CAPI) technique. A net of 350 professional interviewers recruited by ISTAT carries out the interviews. They have to interview households and afterwards have to send the interview data to head-office with a daily frequency. The purpose of this paper is to illustrate the communication system that is being developed. The communication system is based on a secure virtual private network (SVPN) for the interviewers based on the IP-Provider supplying PSTN, ISDN, GSM, GPRS technology for transmission. Keywords: network system communication, networking security, interviewers' network ISTAT has recently activated a development project aimed to deploy the information system supporting the new continuos EU Labour Force Survey (LFS). To fulfil the EU LFS ISTAT is working for the adoption of a new data collection system based on a Computer Aided Personal Interview (CAPI) technique. A net of 350 professional interviewers recruited by ISTAT carries out the interviews. The main tasks of the interviewers are the following: To receive weekly the file containing the list of households, the questionnaire updates and the formative and informative material; To contact the households; To carry out CAPI interviews; To transmit every day the files containing the data collected and the list of interviewed households; To communicate any problems about contacts and interview, notebook hardware and software. Besides, every interviewer is monitored by a regional supervisor and by ISTAT LFS head- 167

2 Stefania Bergamsco, Gabriele Bubano, Luciana Quattrociocchi and Antonio Toma office. So both the organisational and technological architecture can be modelled like three level distributed architectures[2]. In addition the monitoring system and the receiving system of data interviews have to be located on ISTAT Intranet, otherwise a real-time control of the continuous survey should not be possible. This brief description of the system functional requirements points out that the main issues about the deployment architecture is the availability and reliability of system communication and the networking security. To sum up, the targets of the architectural design are: faster data speed rate and always on mobility; instantaneous connection set-up; support for multiple protocols, including IP; security system in order to guarantee the data security and integrity and interviewer authentication. In the next chapters we describe the technological solutions that ISTAT is going to deploy. 2. The global architecture for the interviewers' network The role of the system communication is to connect the interviewers to the central part of the CAPI system, transfer data between CAPI database and the interviewers CAPI notebook In the following figure we describe the overall architecture of interviewers' network. Figure 1 The interviewers' network In the above representation we can see that the system is a complex system that we can subdivide in three main subsystems: A CAPI sever in which are stored questionnaire versions, data interviews, all information 168

3 The new ISTAT network for capturing interview data: the technological architecture related to monitoring and households' list. This CAPI server represents the heart of system; A multi-way connection from a physical point of view: the interviewers can connect by PSTN, ISDN, GSM and GPRS; this service is supplied by an Italian telecommunication company via an IP provider service; The SPVN: the network infrastructure that allows sending and receiving confidential data by strong authentication and strong encryption; this solution is tightly integrated in the ISTAT secure network project. 3. The communication system In order to obtain a whole solution for system communication able to provide a "transmission from everywhere", ISTAT is evaluating a service offered by an Italian telecommunication company WIND, which supplies a mobile office service based on GPRS technology integrated with the IP-provider WINDIP-VPN solution. Before to present the solution we have designed we introduce a glossary finalised to explain the architecture. Glossary GSM: Global System (for) Mobile (Communications) ADSL: Asymmetric Digital Subscriber Line PSTN: Public Switched Telephone Network ISDN: Integrated Services Digital Network GPRS: General Packet Radio Service GGSN: Gateway GPRS Service Node SGSN: Service GPRS Service Node HLR: Home Location Register PVC: Permanent Virtual Circuit ATM: Asynchronous Transfer Mode VPN: Virtual Private Network AAA: Authentication, Authorisation and accounting CPE: Customer Premises Equipment NAS: Network Access Server BAS: Broadband Access Server POP: Point Of Presence 3.1 The integrated GPRS and IP-PROVIDER solution GPRS is an enhancement to existing GSM that introduces packet data transmission, enabling always on mobility. This means that users can choose to be permanently logged on to , internet access and other services, but do not have to pay for these services unless sending or receiving information. GPRS is implemented by adding new packet data nodes and upgrading existing nodes to provide a routing path for packet data between the mobile terminal and a gateway node. The gateway node provides inter-working with external packet data networks for access to the Internet and Intranet. The GPRS is an ideal bearer for the IP-access which completes the bearers (PSTN, ISDN and GSM) already existing in mobile office [3]. The architecture we are going to implement is represented in the figure below. 169

4 C AB 1 2 3C * 0 # Stefania Bergamsco, Gabriele Bubano, Luciana Quattrociocchi and Antonio Toma IPWind Network Server AAA Wind Home Gateway Server AAA GGSN NAS BAS Username : user@ domain Password: pwd APN: nomeazienda. it GPRS Username : user@domain Password: pwd # tel : WindIP PSTN/ ISDN/ GSM Username : user@ domain Password: pwd ADSL Wholesale TI Figure 2 The integrated GPRS and IP-PROVIDER Solution 3.2 The communication equipment To deploy the communication system we have to start the following activities: To ask WIND for providing GPRS network. ISTAT will assign an pool of IP addresses enabling the access to GGSN node ISTAT has to set up a CISCO router connected through a leased line to the Pop Wind of Rome Sizing of access queue related to the percentage of contemporary connection in order to avoid bottlenecks. At the moment, we are developing a prototype of the communication system. The trial is aimed to gather data from interviewers using different physical connection and only one type of access system. In fact the interviewers independently from the communication system (GPRS o traditional way) have to fill a unique access form in which they will insert login and password. The equipment for the interviewers will be a GPRS mobile phone connected with their CAPI notebooks suitably configured with GPRS and traditional communication software[3][4]. 170

5 The new ISTAT network for capturing interview data: the technological architecture 4. The security issues All the information out-coming and in-coming flows of the interviewer network requires strong authentication between operators, data integrity and privacy because information exchanged are confidential. The technological solution finalised to guarantee network security we have designed is tightly integrated in ISTAT SVPN[1][3]. ISTAT SVPN is based on standard Ipsec and the Public Key Infrastructure, which allow a policy of permissions where external users can access ISTAT Intranet. The technical characteristics of SVPN are: At application level: Routing function separated by security ones Security at IP level (Ipsec) Complete transparency for user and application At hardware level strong authentication and strong encryption: Hardware random number generation Private Key based on RSA 1024/2048 bit Encryption 3DES with key up to 192 bit The extension of this global solution implemented by ISTAT to the new interviewers' network needs to set up the following security interviewer kit: A smart card where key and certificate are stored A smart card driver A CryptoIP software When the interviewers send data interviews or receive a version of the questionnaire or the households assigned, they need to be authenticated and the data have to be encrypted. Smart-card and Ipsec client provide these services. In this way, the interviewers, after the phase of strong authentication by the control of Certificate Revocation List (CRL) can directly transmit and receive information in strong secure way. The data are store in the internal server CAPI and the monitoring actors (regional supervisors and head-office) can control in real-time the field work[1][4]. The solution we are going to deploy is completely independent from the CAPI application and from the transmission network (PSTN, ISDN, GSM, GPRS) so that enhancement of CAPI software and communication system will not influence the security solution. Another security issue is concerned with the data collection incoming from the CATI Company that will carry out the CATI interviews for LFS. The households will be interviewed face to face with the help of notebooks at their first inclusion in the survey and by telephone, if possible, in the recall interviews using networked desktop microcomputer. The problem arises when we have to send and receive data form ISTAT to CATI Company[2]. The solution we have designed is the same adopted for the interviewers. We are going to provide a smart card and CriptoIp client to a one and only one workstation of the CATI Company. The access permission to our Intranet will be configured allowing data transfer between our central database and the CATI Company workstation. To sum up all the security issues related to network interviewers and CATI company are going to be solved by the architectural solution represented in the figure below. 171

6 Stefania Bergamsco, Gabriele Bubano, Luciana Quattrociocchi and Antonio Toma Figure 3 - The secure interviewers' network integrated in ISTAT-SVPN 5. Conclusion New telecommunication and networking security technologies undoubtedly help the deployment of the interviewers' network. From an organisational point of view some problems remain about the interviewers familiarity with security policy and the security process management. The management of such field operators needs to delegate other tasks to the regional supervisor like the distribution of the smart cards and their substitution in case of interviewers turnover. The other problem we have pointed out is the necessity to learn to interviewers some basic methods in order to guarantee the measure of security. Field worker, out of central control, can leave the active smart-card inserted into the notebook. So we think is extremely important to train interviewers on the aspect of security[1]. 172

7 The new ISTAT network for capturing interview data: the technological architecture References [1] Balla M. Italo, Guarino A., The secure network of ISTAT, Workshop on IT Security Management, Paris, 2001 [2] Bergamasco S., M. Gandolfo, S. Terracina, A. Toma, Action Workflow Analysis: A Methodology for Analysing Statistics Production Process, Q2001 [3] Budano G., Toma A., Servizio Mobile Office su GPRS, Internal Technical Document, 2001 [4] Budano G., Guarino A, Toma A., Integrazione del progetto rete sicura ISTAT con la nuova rete di rilevazione, Internal Technical Document,

L2F Case Study Overview

L2F Case Study Overview L2F Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer 2 Forwarding

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

Configuring Security on the GGSN

Configuring Security on the GGSN CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco

More information

Teldat Secure IPSec Client - for professional application Teldat IPSec Client

Teldat Secure IPSec Client - for professional application Teldat IPSec Client Teldat Secure IPSec Client - for professional application Support of Windows 8, 7, Vista and XP (32-/64-bit) IKEv1, IKEv2, IKE Config Mode, X-Auth, certificates (X.509) Integrated personal firewall Easy

More information

isco Cisco PPPoE Baseline Architecture for the Cisco UAC

isco Cisco PPPoE Baseline Architecture for the Cisco UAC isco Cisco PPPoE Baseline Architecture for the Cisco UAC Table of Contents Cisco PPPoE Baseline Architecture for the Cisco UAC 6400...1...1 Introduction...1 Assumption...1 Technology Brief...2 Advantages

More information

SIN 133 Issue 9 June 2017

SIN 133 Issue 9 June 2017 SIN 133 Issue 9 June 2017 Suppliers' Information Note For The BT Network The BT Cardway Service SERVICE DESCRIPTION Each SIN is the copyright of British Telecommunications plc. Reproduction of the SIN

More information

Cisco PPPoE Baseline Architecture for the Cisco UAC 6400

Cisco PPPoE Baseline Architecture for the Cisco UAC 6400 Cisco PPPoE Baseline Architecture for the Cisco UAC 6400 Document ID: 12915 Contents Introduction Assumption Technology Brief Advantages and Disadvantages of PPPoE Architecture Advantages Disadvantages

More information

GSM and Similar Architectures Lesson 13 GPRS

GSM and Similar Architectures Lesson 13 GPRS GSM and Similar Architectures Lesson 13 GPRS 1 Two switching modes Circuit Switching Packet switching 2 Circuit switching A connection first sets up Then the entire data transmits through the path that

More information

Final draft ETSI ES V1.1.1 ( )

Final draft ETSI ES V1.1.1 ( ) Final draft ES 202 314-9 V1.1.1 (2006-03) Standard Fixed network Multimedia Messaging Service (F-MMS); Part 9: Combined PSTN/ISDN and broadband access; Multimedia Message communication between a fixed

More information

PPPoA Baseline Architecture

PPPoA Baseline Architecture PPPoA Baseline Architecture Document ID: 12914 Contents Introduction Assumption Technology Brief Advantages and Disadvantages of PPPoA Architecture Advantages Disadvantages Implementation Considerations

More information

RADIUS Tunnel Attribute Extensions

RADIUS Tunnel Attribute Extensions The feature allows a name to be specified (other than the default) for the tunnel initiator and the tunnel terminator in order to establish a higher level of security when setting up VPN tunneling. Finding

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

WAN Technologies CCNA 4

WAN Technologies CCNA 4 WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe

More information

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model 1. Description of Services. 1.1 SIP IP Trunk with Field Trial for Legacy PBX Verizon will assist

More information

IPv6 the Catalyst for Convergence

IPv6 the Catalyst for Convergence International Telecommunication Union IPv6 the Catalyst for Convergence Bosco Eduardo Fernandes Siemens Ag Agenda o IP the glue to convergence of multimedia content and mobility. o Benefits and Advantages

More information

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model 1. Description of Services. 1.1 SIP Centralized IP Trunk with Field Trial Verizon will assist

More information

Evolution from GSM to UMTS (IMT-2000)*

Evolution from GSM to UMTS (IMT-2000)* Evolution from GSM to UMTS (IMT-2000)* MARIO BAUMGARTEN Siemens Ltda ICN Sao Paulo - BRAZIL * This presentation is a draft submitted by the author and the final version will be available at: http://www.itu

More information

Features of Case Management in CAI Systems

Features of Case Management in CAI Systems Features of Case Management in CAI Systems Vesa Kuusela, Social Survey Unit, Statistics Finland and CMS working group set by the Blaise Corporate License Users Board (BCLUB) 1. Introduction A Case Management

More information

TECHNICAL REPORT. CPE Architecture Recommendations for Access to Legacy Data Networks. DSL Forum TR-032. May 2000

TECHNICAL REPORT. CPE Architecture Recommendations for Access to Legacy Data Networks. DSL Forum TR-032. May 2000 TECHNICAL REPORT DSL Forum TR-032 CPE Architecture Recommendations for Access to Legacy Data s May 2000 Abstract: This document describes four protocol architectures for connecting a remote ADSL termination

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Cisco DSL Router Configuration and Troubleshooting Guide Cisco DSL Router Acting as a PPPoE Client with a Dynamic IP Address

Cisco DSL Router Configuration and Troubleshooting Guide Cisco DSL Router Acting as a PPPoE Client with a Dynamic IP Address Cisco DSL Router Configuration and Troubleshooting Guide Cisco DSL Router Acting as a PPPoE Client with a Dynamic IP Address Document ID: 71118 Contents Introduction Prerequisites Requirements Components

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information

X.25 Substitution. Maintaining X.25 services over a fully supported NGN/IP infrastructure. The Challenge. How it Works. Solution

X.25 Substitution. Maintaining X.25 services over a fully supported NGN/IP infrastructure. The Challenge. How it Works. Solution Substitution Maintaining services over a fully supported NGN/ infrastructure The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers

More information

High-Touch Delivery Learning Services

High-Touch Delivery Learning Services Data Sheet High-Touch Delivery Learning Services Implementing Cisco Service Provider Mobility LTE Networks The Implementing Cisco LTE Packet Core Networks (SPLTE) Version 1.0 is an instructor-led course

More information

IP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services

IP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services IP multimedia in 3G Author: MartinHarris Orange slide 1 Structure Understanding IP multimedia in 3G Developments in 3GPP IP multimedia services IMS challenges and open issues IP multimedia roadmap slide

More information

Table of Contents. Cisco RFC1483 Bridging Baseline Architecture

Table of Contents. Cisco RFC1483 Bridging Baseline Architecture Table of Contents RFC1483 Bridging Baseline Architecture...1 Introduction...1 Assumption...1 Technology Brief...1 Advantages and Disadvantages of RFC1483 Bridging...1 Advantages...2 Disadvantages...2 Implementation

More information

Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon

Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon Intelligent Services Gateway (ISG) is a Cisco software feature set that provides a structured framework in which

More information

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains

More information

5. Functions and Procedures within GPRS

5. Functions and Procedures within GPRS GPRS Functions Page 41 5. Functions and Procedures within GPRS Within GPRS-Networks a large row of Functions and procedures have to be realised to enable the transport of packet switched data. These Functions

More information

ITU-APT Workshop on NGN Planning March 2007, Bangkok, Thailand

ITU-APT Workshop on NGN Planning March 2007, Bangkok, Thailand ITU-APT Workshop on NGN Planning 16 17 March 2007, Bangkok, Thailand 1/2 Riccardo Passerini, ITU-BDT 1 Question 19-1/2: Strategy for migration from existing to next-generation networks (NGN) for developing

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain. Lecture # (3) Communication networks

EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain. Lecture # (3) Communication networks EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain Lecture # (3) Introduction to Multimedia Communication networks Elements of Multimedia Systems Two key communication modes Person-to-person

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

Overview of GDM. Feature Description CHAPTER

Overview of GDM. Feature Description CHAPTER CHAPTER 13 This chapter provides a brief introduction to the GTP Director Module (GDM) and its implementation in the Cisco IOS software. This chapter includes the following sections: Feature Description,

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Ch.16 - Wireless WAN System Architectures

Ch.16 - Wireless WAN System Architectures Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will

More information

Telstra Mobile SMS ACCESS MANAGER Technical Guide.

Telstra Mobile SMS ACCESS MANAGER Technical Guide. Telstra Mobile SMS ACCESS MANAGER Technical Guide. Technology solutions that let you do what you do best. www.telstra.com 2 Table of Contents 1. Introduction 4 2. Selection of Access Method 4 3. Access

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA   White Paper Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction

More information

A typical WAN structure includes the following components.

A typical WAN structure includes the following components. CBCN4103 WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. A WAN is a network usually provided by a specialised company called a

More information

COPYRIGHTED MATERIAL. Introduction. Noman Muhammad, Davide Chiavelli, David Soldani and Man Li. 1.1 QoE value chain

COPYRIGHTED MATERIAL. Introduction. Noman Muhammad, Davide Chiavelli, David Soldani and Man Li. 1.1 QoE value chain 1 Introduction Noman Muhammad, Davide Chiavelli, David Soldani and Man Li Browsing through the literature, one may find many different definitions for quality of end-user experience (QoE) and quality of

More information

Configuring Network Access to the GGSN

Configuring Network Access to the GGSN CHAPTER 7 This chapter describes how to configure access from the gateway GPRS support node (GGSN) to a serving GPRS support node (SGSN), public data network (PDN), and optionally to a Virtual Private

More information

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc. REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas

More information

Remote Connectivity for SAP Solutions over the Internet Technical Specification

Remote Connectivity for SAP Solutions over the Internet Technical Specification Remote Connectivity for SAP Solutions over the Technical Specification June 2006 Remote Connectivity for SAP Solutions over the page 2 1 Introduction SAP offers secure connections over the for support

More information

NetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers

NetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers NetPro from Available on a per SIM license basis Real-time usage monitoring of Data SIMs Retain your Airtime Contracts with your existing providers No CAPEX Secure and resilient connectivity via VPN Be

More information

Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an ISDN Modem Issue 12/04

Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an ISDN Modem Issue 12/04 Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an Issue 12/04 Foreword Foreword This document describes a possible means of connecting a PC to the

More information

PPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM

PPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM This feature module describes the PPP over Ethernet (PPPoE) on ATM feature. The feature provides the ability to connect a network of hosts over a simple bridging-access device to a remote access concentrator.

More information

Internet Concepts. Learning objectives. An understanding of the services available through the Internet

Internet Concepts. Learning objectives. An understanding of the services available through the Internet lesson plan Learning objectives An understanding of the services available through the Internet An understanding of the technology underlying Internet security 0 An understanding of the risks associated

More information

Understand iwag Solution for 3G Mobile Data

Understand iwag Solution for 3G Mobile Data Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Note on. Alternative of BRI Connection For MAX-NG subscriber

Note on. Alternative of BRI Connection For MAX-NG subscriber Note on Alternative of BRI Connection For MAX-NG subscriber Released On : 12 th March 2012 CENTRE FOR DEVELOPMENT OF TELEMATICS MANDI ROAD, MEHRAULI, NEW DELHI 110030, INDIA ELECTRONICS CITY (PHASE I),

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

Configuring Virtual Asynchronous Traffic over ISDN

Configuring Virtual Asynchronous Traffic over ISDN Configuring Virtual Asynchronous Traffic over ISDN Cisco IOS software offers two solutions to send virtual asynchronous traffic over ISDN: Using International Telecommunication Union Telecommunication

More information

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003

More information

Overview of GPRS and UMTS

Overview of GPRS and UMTS CHAPTER 1 This chapter briefly introduces the 2.5G General Packet Radio Service (GPRS) and the 3G Universal Mobile Telecommunications System (UMTS) technologies, and their implementation in Cisco Gateway

More information

Inmarsat BGAN. Presentation to EBU Networks 2007 To IP and Beyond. 19 th June Alan Howell Director, Network and Systems Engineering

Inmarsat BGAN. Presentation to EBU Networks 2007 To IP and Beyond. 19 th June Alan Howell Director, Network and Systems Engineering Inmarsat BGAN Presentation to EBU Networks 2007 To IP and Beyond 19 th June 2007 Alan Howell Director, Network and Systems Engineering Outline of Presentation About Inmarsat Broadband Global Area Network

More information

Signaling Protocol Structure in GSM

Signaling Protocol Structure in GSM GSM Signaling Protocol Structure in GSM Signaling Protocol Structure in GSM Layer 1 is the physical layer which uses the channel structures over the air interface. Layer 2 is the data link layer and across

More information

This is an introductory tutorial designed for beginners to help them understand the basics of Radius.

This is an introductory tutorial designed for beginners to help them understand the basics of Radius. i About the Tutorial Radius is a protocol for carrying information related to authentication, authorization, and configuration between a Network Access Server (NAS) that desires to authenticate its links

More information

BCRAN. Section 9. Cable and DSL Technologies

BCRAN. Section 9. Cable and DSL Technologies BCRAN Section 9 Cable and DSL Technologies Cable and DSL technologies have changed the remote access world dramatically. Without them, remote and Internet access would be limited to the 56 kbps typical

More information

GGSN Configuration Example

GGSN Configuration Example This chapter provides information for configuring the system to function as a Gateway GPRS Support Node (GGSN) in General Packet Radio Service (GPRS) or Universal Mobile Telecommunications System (UMTS)

More information

IPv6 impact on 3G Networks: An operator s view

IPv6 impact on 3G Networks: An operator s view IPv6 impact on 3G Networks: An operator s view Why IPv6 CS & SS7 GSM Internet IP H.323, SIP MEGACO R99 R4 R5 Packetization of voice transports networks occurred first in fixed ones. 3GPP has recognized

More information

Wide Area Networks (WANs) Slide Set 6

Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals

More information

GPRS security. Helsinki University of Technology S Security of Communication Protocols

GPRS security. Helsinki University of Technology S Security of Communication Protocols GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting

More information

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware

More information

TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000

TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000 TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000 Bosco Eduardo Fernandes Chair ICTG (IT-Media) and Manufacturers Sector Group UMTS Forum www.umts-forum.org Qatar 29 September 01

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Network Security CSN11111

Network Security CSN11111 Network Security CSN11111 VPN part 2 12/11/2010 r.ludwiniak@napier.ac.uk Five Steps of IPSec Step 1 - Interesting Traffic Host A Router A Router B Host B 10.0.1.3 10.0.2.3 Apply IPSec Discard Bypass IPSec

More information

Analysis of VPN Protocols

Analysis of VPN Protocols Analysis of VPN Protocols ECE 646 Final Project Presentation Tamer Mabrouk Touhidur Satiar Overview VPN Definitions Emergence of VPN Concept of Tunneling VPN Classification Comparison of Protocols Customer

More information

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service

More information

Configuring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC

Configuring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC Configuring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC Document ID: 12889 Contents Introduction Before You Begin Conventions Prerequisites Components Used Configure Network

More information

SURVEY ON BROADBAND AND WIRELESS USAGE IN SINGAPORE 2002

SURVEY ON BROADBAND AND WIRELESS USAGE IN SINGAPORE 2002 SURVEY ON BROADBAND AND WIRELESS USAGE IN SINGAPORE 2002 Summary Report Page 1 of 23 Infocomm Development Authority of Singapore 8 Temasek Boulevard #14-00 Suntec Tower Three Singapore 038988 Republic

More information

VPN. Agenda VPN VPDN. L84 - VPN and VPDN in IP. Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP)

VPN. Agenda VPN VPDN. L84 - VPN and VPDN in IP. Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) VPN Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS

More information

Thomson Reuters. FCN Services

Thomson Reuters. FCN Services Thomson Reuters FCN Services Zajil International Telecom is one of the primary FCN Service providers in the MENA region designated and certified by Thomson Reuters as an approved solutions provider for

More information

Data Communications. From Basics to Broadband. Third Edition. William J. Beyda

Data Communications. From Basics to Broadband. Third Edition. William J. Beyda Data Communications From Basics to Broadband Third Edition William J. Beyda University of California Extension, Berkeley Siemens Information and Communication Networks, Inc. Prentice Hall Upper Saddle

More information

NGN: The Evolution of Wireless Networks

NGN: The Evolution of Wireless Networks NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.

More information

Configuring the Cisco 827 Router as a PPPoE Client With NAT

Configuring the Cisco 827 Router as a PPPoE Client With NAT Configuring the Cisco 827 Router as a PPPoE Client With NAT Document ID: 8514 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify

More information

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students

More information

Children s Health System. Remote User Policy

Children s Health System. Remote User Policy Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

Enabling the Wireless Internet

Enabling the Wireless Internet Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 13 Virtual Private Networks

CS 393 Network Security. Nasir Memon Polytechnic University Module 13 Virtual Private Networks CS 393 Network Security Nasir Memon Polytechnic University Module 13 Virtual Private Networks Course Logistics HW due Monday. HW 6 posted. Due in a week. Questions regarding homework are best answered

More information

GPRS Overview Applications over GPRS

GPRS Overview Applications over GPRS GPRS Overview Applications over GPRS KI/ERA/LKG/T Johan Mellberg johan.mellberg@era.ericsson.se +46 8 585 313 99 GPRS - Applications GPRS - Data Network Connectivity Content Network Structure GPRS Attach

More information

Circuit switched network

Circuit switched network GPRS-Services Page 12 2. GPRS-Services GPRS integrates a vast sum of additional services in a GSM-network. For this it will be necessary to define a subscriber profile that corresponds with services the

More information

The Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough

The Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough The Evolution and Future of Mobile Communication Systems Written by David G Ainscough Copyright 2001 D.G.Ainscough Chapter 5 : UMTS (Universal Mobile Telecommunication System)...3 5.1 UMTS Introduction...5

More information

Network Node for IMT-2000

Network Node for IMT-2000 Network Node for IMT-2000 vkenya Tanaka vmitsuyuki Mizuno vkazuhiro Sato (Manuscript received August 30, 2002) Fujitsu has developed a Mobile Switching Node for IMT-2000 3G Networks. This system is an

More information

Optimising 3G Migration

Optimising 3G Migration Optimising 3G Migration Sub-Regional Seminar on IMT-2000 Warsow,, 2-42 4 October 2001 Marie FROMENT Marketing Manager Alcatel Mobile Network Division marie.froment@alcatel.fr Optimising 3G Migration Outline

More information

Agenda. Networking Intro MPLS Tech MPBN WAN MPBN Functionality Security Monitoring

Agenda. Networking Intro MPLS Tech MPBN WAN MPBN Functionality Security Monitoring Agenda Networking Intro MPLS Tech MPBN WAN MPBN Functionality Security Monitoring Where MPBN Functions : 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Hub NIC Card

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

VPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010

VPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010 Communication Technologies Last Points (briefly) VPNs Virtual Private Networks Main objective o Enable communication between two LANs as if they were together and separated. Telemedicina e e-saúde 2009/10

More information

Configuring PPP over ATM with NAT

Configuring PPP over ATM with NAT CHAPTER 4 The Cisco Secure Router 520 ADSL-over-POTS and Cisco Secure Router 520 ADSL-over-ISDN routers support Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) clients and network address

More information

Wireless LAN, WLAN Security, and VPN

Wireless LAN, WLAN Security, and VPN Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate

More information

Chapter 10. Glossary

Chapter 10. Glossary Chapter 10 Glossary 137 ADSL Asymmetric Digital Subscriber Line: New broadband, consumer-focused data delivery technology utilising existing telephone systems (e.g. for use with connecting to the Internet).

More information

Industrial Control System Security white paper

Industrial Control System Security white paper Industrial Control System Security white paper The top 10 threats to automation and process control systems and their countermeasures with INSYS routers Introduction With the advent of M2M (machine to

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

A-B I N D E X. backbone networks, fault tolerance, 174

A-B I N D E X. backbone networks, fault tolerance, 174 I N D E X A-B access links fault tolerance, 175 176 multiple IKE identities, 176 182 single IKE identity with MLPPP, 188 189 with single IKE identity, 183 187 active/standby stateful failover model, 213

More information