The new ISTAT network for capturing interview data: the technological architecture
|
|
- Francis Melton
- 6 years ago
- Views:
Transcription
1 The new ISTAT network for capturing interview data: the technological architecture Stefania BERGAMASCO*, Gabriele BUDANO*, Luciana QUATTROCIOCCHI and Antonio TOMA* *ISTAT - Information Technology Division *ISTAT - Social Statistic Department ISTAT - Via Cesare Balbo Rome Italy bergamas@istat.it, budano@istat.it,quattrociocc@istat.it,toma@istat.it 1. Introduction Abstract: ISTAT has recently activated a development project aimed to deploy the information system supporting the new continuos EU Labour Force Survey (LFS). To fulfil the EU LFS ISTAT is working for the adoption of a new data collection system based on a Computer Aided Personal Interview (CAPI) technique. A net of 350 professional interviewers recruited by ISTAT carries out the interviews. They have to interview households and afterwards have to send the interview data to head-office with a daily frequency. The purpose of this paper is to illustrate the communication system that is being developed. The communication system is based on a secure virtual private network (SVPN) for the interviewers based on the IP-Provider supplying PSTN, ISDN, GSM, GPRS technology for transmission. Keywords: network system communication, networking security, interviewers' network ISTAT has recently activated a development project aimed to deploy the information system supporting the new continuos EU Labour Force Survey (LFS). To fulfil the EU LFS ISTAT is working for the adoption of a new data collection system based on a Computer Aided Personal Interview (CAPI) technique. A net of 350 professional interviewers recruited by ISTAT carries out the interviews. The main tasks of the interviewers are the following: To receive weekly the file containing the list of households, the questionnaire updates and the formative and informative material; To contact the households; To carry out CAPI interviews; To transmit every day the files containing the data collected and the list of interviewed households; To communicate any problems about contacts and interview, notebook hardware and software. Besides, every interviewer is monitored by a regional supervisor and by ISTAT LFS head- 167
2 Stefania Bergamsco, Gabriele Bubano, Luciana Quattrociocchi and Antonio Toma office. So both the organisational and technological architecture can be modelled like three level distributed architectures[2]. In addition the monitoring system and the receiving system of data interviews have to be located on ISTAT Intranet, otherwise a real-time control of the continuous survey should not be possible. This brief description of the system functional requirements points out that the main issues about the deployment architecture is the availability and reliability of system communication and the networking security. To sum up, the targets of the architectural design are: faster data speed rate and always on mobility; instantaneous connection set-up; support for multiple protocols, including IP; security system in order to guarantee the data security and integrity and interviewer authentication. In the next chapters we describe the technological solutions that ISTAT is going to deploy. 2. The global architecture for the interviewers' network The role of the system communication is to connect the interviewers to the central part of the CAPI system, transfer data between CAPI database and the interviewers CAPI notebook In the following figure we describe the overall architecture of interviewers' network. Figure 1 The interviewers' network In the above representation we can see that the system is a complex system that we can subdivide in three main subsystems: A CAPI sever in which are stored questionnaire versions, data interviews, all information 168
3 The new ISTAT network for capturing interview data: the technological architecture related to monitoring and households' list. This CAPI server represents the heart of system; A multi-way connection from a physical point of view: the interviewers can connect by PSTN, ISDN, GSM and GPRS; this service is supplied by an Italian telecommunication company via an IP provider service; The SPVN: the network infrastructure that allows sending and receiving confidential data by strong authentication and strong encryption; this solution is tightly integrated in the ISTAT secure network project. 3. The communication system In order to obtain a whole solution for system communication able to provide a "transmission from everywhere", ISTAT is evaluating a service offered by an Italian telecommunication company WIND, which supplies a mobile office service based on GPRS technology integrated with the IP-provider WINDIP-VPN solution. Before to present the solution we have designed we introduce a glossary finalised to explain the architecture. Glossary GSM: Global System (for) Mobile (Communications) ADSL: Asymmetric Digital Subscriber Line PSTN: Public Switched Telephone Network ISDN: Integrated Services Digital Network GPRS: General Packet Radio Service GGSN: Gateway GPRS Service Node SGSN: Service GPRS Service Node HLR: Home Location Register PVC: Permanent Virtual Circuit ATM: Asynchronous Transfer Mode VPN: Virtual Private Network AAA: Authentication, Authorisation and accounting CPE: Customer Premises Equipment NAS: Network Access Server BAS: Broadband Access Server POP: Point Of Presence 3.1 The integrated GPRS and IP-PROVIDER solution GPRS is an enhancement to existing GSM that introduces packet data transmission, enabling always on mobility. This means that users can choose to be permanently logged on to , internet access and other services, but do not have to pay for these services unless sending or receiving information. GPRS is implemented by adding new packet data nodes and upgrading existing nodes to provide a routing path for packet data between the mobile terminal and a gateway node. The gateway node provides inter-working with external packet data networks for access to the Internet and Intranet. The GPRS is an ideal bearer for the IP-access which completes the bearers (PSTN, ISDN and GSM) already existing in mobile office [3]. The architecture we are going to implement is represented in the figure below. 169
4 C AB 1 2 3C * 0 # Stefania Bergamsco, Gabriele Bubano, Luciana Quattrociocchi and Antonio Toma IPWind Network Server AAA Wind Home Gateway Server AAA GGSN NAS BAS Username : user@ domain Password: pwd APN: nomeazienda. it GPRS Username : user@domain Password: pwd # tel : WindIP PSTN/ ISDN/ GSM Username : user@ domain Password: pwd ADSL Wholesale TI Figure 2 The integrated GPRS and IP-PROVIDER Solution 3.2 The communication equipment To deploy the communication system we have to start the following activities: To ask WIND for providing GPRS network. ISTAT will assign an pool of IP addresses enabling the access to GGSN node ISTAT has to set up a CISCO router connected through a leased line to the Pop Wind of Rome Sizing of access queue related to the percentage of contemporary connection in order to avoid bottlenecks. At the moment, we are developing a prototype of the communication system. The trial is aimed to gather data from interviewers using different physical connection and only one type of access system. In fact the interviewers independently from the communication system (GPRS o traditional way) have to fill a unique access form in which they will insert login and password. The equipment for the interviewers will be a GPRS mobile phone connected with their CAPI notebooks suitably configured with GPRS and traditional communication software[3][4]. 170
5 The new ISTAT network for capturing interview data: the technological architecture 4. The security issues All the information out-coming and in-coming flows of the interviewer network requires strong authentication between operators, data integrity and privacy because information exchanged are confidential. The technological solution finalised to guarantee network security we have designed is tightly integrated in ISTAT SVPN[1][3]. ISTAT SVPN is based on standard Ipsec and the Public Key Infrastructure, which allow a policy of permissions where external users can access ISTAT Intranet. The technical characteristics of SVPN are: At application level: Routing function separated by security ones Security at IP level (Ipsec) Complete transparency for user and application At hardware level strong authentication and strong encryption: Hardware random number generation Private Key based on RSA 1024/2048 bit Encryption 3DES with key up to 192 bit The extension of this global solution implemented by ISTAT to the new interviewers' network needs to set up the following security interviewer kit: A smart card where key and certificate are stored A smart card driver A CryptoIP software When the interviewers send data interviews or receive a version of the questionnaire or the households assigned, they need to be authenticated and the data have to be encrypted. Smart-card and Ipsec client provide these services. In this way, the interviewers, after the phase of strong authentication by the control of Certificate Revocation List (CRL) can directly transmit and receive information in strong secure way. The data are store in the internal server CAPI and the monitoring actors (regional supervisors and head-office) can control in real-time the field work[1][4]. The solution we are going to deploy is completely independent from the CAPI application and from the transmission network (PSTN, ISDN, GSM, GPRS) so that enhancement of CAPI software and communication system will not influence the security solution. Another security issue is concerned with the data collection incoming from the CATI Company that will carry out the CATI interviews for LFS. The households will be interviewed face to face with the help of notebooks at their first inclusion in the survey and by telephone, if possible, in the recall interviews using networked desktop microcomputer. The problem arises when we have to send and receive data form ISTAT to CATI Company[2]. The solution we have designed is the same adopted for the interviewers. We are going to provide a smart card and CriptoIp client to a one and only one workstation of the CATI Company. The access permission to our Intranet will be configured allowing data transfer between our central database and the CATI Company workstation. To sum up all the security issues related to network interviewers and CATI company are going to be solved by the architectural solution represented in the figure below. 171
6 Stefania Bergamsco, Gabriele Bubano, Luciana Quattrociocchi and Antonio Toma Figure 3 - The secure interviewers' network integrated in ISTAT-SVPN 5. Conclusion New telecommunication and networking security technologies undoubtedly help the deployment of the interviewers' network. From an organisational point of view some problems remain about the interviewers familiarity with security policy and the security process management. The management of such field operators needs to delegate other tasks to the regional supervisor like the distribution of the smart cards and their substitution in case of interviewers turnover. The other problem we have pointed out is the necessity to learn to interviewers some basic methods in order to guarantee the measure of security. Field worker, out of central control, can leave the active smart-card inserted into the notebook. So we think is extremely important to train interviewers on the aspect of security[1]. 172
7 The new ISTAT network for capturing interview data: the technological architecture References [1] Balla M. Italo, Guarino A., The secure network of ISTAT, Workshop on IT Security Management, Paris, 2001 [2] Bergamasco S., M. Gandolfo, S. Terracina, A. Toma, Action Workflow Analysis: A Methodology for Analysing Statistics Production Process, Q2001 [3] Budano G., Toma A., Servizio Mobile Office su GPRS, Internal Technical Document, 2001 [4] Budano G., Guarino A, Toma A., Integrazione del progetto rete sicura ISTAT con la nuova rete di rilevazione, Internal Technical Document,
L2F Case Study Overview
L2F Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer 2 Forwarding
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationCustom Connect. All Area Networks. customer s guide to how it works version 1.0
All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the
More informationConfiguring Security on the GGSN
CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco
More informationTeldat Secure IPSec Client - for professional application Teldat IPSec Client
Teldat Secure IPSec Client - for professional application Support of Windows 8, 7, Vista and XP (32-/64-bit) IKEv1, IKEv2, IKE Config Mode, X-Auth, certificates (X.509) Integrated personal firewall Easy
More informationisco Cisco PPPoE Baseline Architecture for the Cisco UAC
isco Cisco PPPoE Baseline Architecture for the Cisco UAC Table of Contents Cisco PPPoE Baseline Architecture for the Cisco UAC 6400...1...1 Introduction...1 Assumption...1 Technology Brief...2 Advantages
More informationSIN 133 Issue 9 June 2017
SIN 133 Issue 9 June 2017 Suppliers' Information Note For The BT Network The BT Cardway Service SERVICE DESCRIPTION Each SIN is the copyright of British Telecommunications plc. Reproduction of the SIN
More informationCisco PPPoE Baseline Architecture for the Cisco UAC 6400
Cisco PPPoE Baseline Architecture for the Cisco UAC 6400 Document ID: 12915 Contents Introduction Assumption Technology Brief Advantages and Disadvantages of PPPoE Architecture Advantages Disadvantages
More informationGSM and Similar Architectures Lesson 13 GPRS
GSM and Similar Architectures Lesson 13 GPRS 1 Two switching modes Circuit Switching Packet switching 2 Circuit switching A connection first sets up Then the entire data transmits through the path that
More informationFinal draft ETSI ES V1.1.1 ( )
Final draft ES 202 314-9 V1.1.1 (2006-03) Standard Fixed network Multimedia Messaging Service (F-MMS); Part 9: Combined PSTN/ISDN and broadband access; Multimedia Message communication between a fixed
More informationPPPoA Baseline Architecture
PPPoA Baseline Architecture Document ID: 12914 Contents Introduction Assumption Technology Brief Advantages and Disadvantages of PPPoA Architecture Advantages Disadvantages Implementation Considerations
More informationRADIUS Tunnel Attribute Extensions
The feature allows a name to be specified (other than the default) for the tunnel initiator and the tunnel terminator in order to establish a higher level of security when setting up VPN tunneling. Finding
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationDigital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model
Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model 1. Description of Services. 1.1 SIP IP Trunk with Field Trial for Legacy PBX Verizon will assist
More informationIPv6 the Catalyst for Convergence
International Telecommunication Union IPv6 the Catalyst for Convergence Bosco Eduardo Fernandes Siemens Ag Agenda o IP the glue to convergence of multimedia content and mobility. o Benefits and Advantages
More informationDigital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model
Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model 1. Description of Services. 1.1 SIP Centralized IP Trunk with Field Trial Verizon will assist
More informationEvolution from GSM to UMTS (IMT-2000)*
Evolution from GSM to UMTS (IMT-2000)* MARIO BAUMGARTEN Siemens Ltda ICN Sao Paulo - BRAZIL * This presentation is a draft submitted by the author and the final version will be available at: http://www.itu
More informationFeatures of Case Management in CAI Systems
Features of Case Management in CAI Systems Vesa Kuusela, Social Survey Unit, Statistics Finland and CMS working group set by the Blaise Corporate License Users Board (BCLUB) 1. Introduction A Case Management
More informationTECHNICAL REPORT. CPE Architecture Recommendations for Access to Legacy Data Networks. DSL Forum TR-032. May 2000
TECHNICAL REPORT DSL Forum TR-032 CPE Architecture Recommendations for Access to Legacy Data s May 2000 Abstract: This document describes four protocol architectures for connecting a remote ADSL termination
More informationImplementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,
More informationCisco DSL Router Configuration and Troubleshooting Guide Cisco DSL Router Acting as a PPPoE Client with a Dynamic IP Address
Cisco DSL Router Configuration and Troubleshooting Guide Cisco DSL Router Acting as a PPPoE Client with a Dynamic IP Address Document ID: 71118 Contents Introduction Prerequisites Requirements Components
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSchool of Computer Sciences Universiti Sains Malaysia Pulau Pinang
School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content
More informationX.25 Substitution. Maintaining X.25 services over a fully supported NGN/IP infrastructure. The Challenge. How it Works. Solution
Substitution Maintaining services over a fully supported NGN/ infrastructure The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers
More informationHigh-Touch Delivery Learning Services
Data Sheet High-Touch Delivery Learning Services Implementing Cisco Service Provider Mobility LTE Networks The Implementing Cisco LTE Packet Core Networks (SPLTE) Version 1.0 is an instructor-led course
More informationIP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services
IP multimedia in 3G Author: MartinHarris Orange slide 1 Structure Understanding IP multimedia in 3G Developments in 3GPP IP multimedia services IMS challenges and open issues IP multimedia roadmap slide
More informationTable of Contents. Cisco RFC1483 Bridging Baseline Architecture
Table of Contents RFC1483 Bridging Baseline Architecture...1 Introduction...1 Assumption...1 Technology Brief...1 Advantages and Disadvantages of RFC1483 Bridging...1 Advantages...2 Disadvantages...2 Implementation
More informationConfiguring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon
Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon Intelligent Services Gateway (ISG) is a Cisco software feature set that provides a structured framework in which
More informationMWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router
MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains
More information5. Functions and Procedures within GPRS
GPRS Functions Page 41 5. Functions and Procedures within GPRS Within GPRS-Networks a large row of Functions and procedures have to be realised to enable the transport of packet switched data. These Functions
More informationITU-APT Workshop on NGN Planning March 2007, Bangkok, Thailand
ITU-APT Workshop on NGN Planning 16 17 March 2007, Bangkok, Thailand 1/2 Riccardo Passerini, ITU-BDT 1 Question 19-1/2: Strategy for migration from existing to next-generation networks (NGN) for developing
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationEEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain. Lecture # (3) Communication networks
EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain Lecture # (3) Introduction to Multimedia Communication networks Elements of Multimedia Systems Two key communication modes Person-to-person
More informationDigital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model
Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist
More informationOverview of GDM. Feature Description CHAPTER
CHAPTER 13 This chapter provides a brief introduction to the GTP Director Module (GDM) and its implementation in the Cisco IOS software. This chapter includes the following sections: Feature Description,
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationMonitoring Remote Access VPN Services
CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,
More informationCh.16 - Wireless WAN System Architectures
Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will
More informationTelstra Mobile SMS ACCESS MANAGER Technical Guide.
Telstra Mobile SMS ACCESS MANAGER Technical Guide. Technology solutions that let you do what you do best. www.telstra.com 2 Table of Contents 1. Introduction 4 2. Selection of Access Method 4 3. Access
More informationCopyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper
Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction
More informationA typical WAN structure includes the following components.
CBCN4103 WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. A WAN is a network usually provided by a specialised company called a
More informationCOPYRIGHTED MATERIAL. Introduction. Noman Muhammad, Davide Chiavelli, David Soldani and Man Li. 1.1 QoE value chain
1 Introduction Noman Muhammad, Davide Chiavelli, David Soldani and Man Li Browsing through the literature, one may find many different definitions for quality of end-user experience (QoE) and quality of
More informationConfiguring Network Access to the GGSN
CHAPTER 7 This chapter describes how to configure access from the gateway GPRS support node (GGSN) to a serving GPRS support node (SGSN), public data network (PDN), and optionally to a Virtual Private
More informationREMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.
REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas
More informationRemote Connectivity for SAP Solutions over the Internet Technical Specification
Remote Connectivity for SAP Solutions over the Technical Specification June 2006 Remote Connectivity for SAP Solutions over the page 2 1 Introduction SAP offers secure connections over the for support
More informationNetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers
NetPro from Available on a per SIM license basis Real-time usage monitoring of Data SIMs Retain your Airtime Contracts with your existing providers No CAPEX Secure and resilient connectivity via VPN Be
More informationRemote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an ISDN Modem Issue 12/04
Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an Issue 12/04 Foreword Foreword This document describes a possible means of connecting a PC to the
More informationPPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM
This feature module describes the PPP over Ethernet (PPPoE) on ATM feature. The feature provides the ability to connect a network of hosts over a simple bridging-access device to a remote access concentrator.
More informationInternet Concepts. Learning objectives. An understanding of the services available through the Internet
lesson plan Learning objectives An understanding of the services available through the Internet An understanding of the technology underlying Internet security 0 An understanding of the risks associated
More informationUnderstand iwag Solution for 3G Mobile Data
Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services
More informationIntranets and Virtual Private Networks (VPNs)
Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private
More informationImplementing Security in Windows 2003 Network (70-299)
Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating
More informationNote on. Alternative of BRI Connection For MAX-NG subscriber
Note on Alternative of BRI Connection For MAX-NG subscriber Released On : 12 th March 2012 CENTRE FOR DEVELOPMENT OF TELEMATICS MANDI ROAD, MEHRAULI, NEW DELHI 110030, INDIA ELECTRONICS CITY (PHASE I),
More informationSecure VPNs for Enterprise Networks
Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using
More informationConfiguring Virtual Asynchronous Traffic over ISDN
Configuring Virtual Asynchronous Traffic over ISDN Cisco IOS software offers two solutions to send virtual asynchronous traffic over ISDN: Using International Telecommunication Union Telecommunication
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationOverview of GPRS and UMTS
CHAPTER 1 This chapter briefly introduces the 2.5G General Packet Radio Service (GPRS) and the 3G Universal Mobile Telecommunications System (UMTS) technologies, and their implementation in Cisco Gateway
More informationInmarsat BGAN. Presentation to EBU Networks 2007 To IP and Beyond. 19 th June Alan Howell Director, Network and Systems Engineering
Inmarsat BGAN Presentation to EBU Networks 2007 To IP and Beyond 19 th June 2007 Alan Howell Director, Network and Systems Engineering Outline of Presentation About Inmarsat Broadband Global Area Network
More informationSignaling Protocol Structure in GSM
GSM Signaling Protocol Structure in GSM Signaling Protocol Structure in GSM Layer 1 is the physical layer which uses the channel structures over the air interface. Layer 2 is the data link layer and across
More informationThis is an introductory tutorial designed for beginners to help them understand the basics of Radius.
i About the Tutorial Radius is a protocol for carrying information related to authentication, authorization, and configuration between a Network Access Server (NAS) that desires to authenticate its links
More informationBCRAN. Section 9. Cable and DSL Technologies
BCRAN Section 9 Cable and DSL Technologies Cable and DSL technologies have changed the remote access world dramatically. Without them, remote and Internet access would be limited to the 56 kbps typical
More informationGGSN Configuration Example
This chapter provides information for configuring the system to function as a Gateway GPRS Support Node (GGSN) in General Packet Radio Service (GPRS) or Universal Mobile Telecommunications System (UMTS)
More informationIPv6 impact on 3G Networks: An operator s view
IPv6 impact on 3G Networks: An operator s view Why IPv6 CS & SS7 GSM Internet IP H.323, SIP MEGACO R99 R4 R5 Packetization of voice transports networks occurred first in fixed ones. 3GPP has recognized
More informationWide Area Networks (WANs) Slide Set 6
Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals
More informationGPRS security. Helsinki University of Technology S Security of Communication Protocols
GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting
More informationCisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.
Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware
More informationTECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000
TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000 Bosco Eduardo Fernandes Chair ICTG (IT-Media) and Manufacturers Sector Group UMTS Forum www.umts-forum.org Qatar 29 September 01
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationNetwork Security CSN11111
Network Security CSN11111 VPN part 2 12/11/2010 r.ludwiniak@napier.ac.uk Five Steps of IPSec Step 1 - Interesting Traffic Host A Router A Router B Host B 10.0.1.3 10.0.2.3 Apply IPSec Discard Bypass IPSec
More informationAnalysis of VPN Protocols
Analysis of VPN Protocols ECE 646 Final Project Presentation Tamer Mabrouk Touhidur Satiar Overview VPN Definitions Emergence of VPN Concept of Tunneling VPN Classification Comparison of Protocols Customer
More informationLecture 8 Winter 2006 Enterprise and Personal Communications Networks
Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service
More informationConfiguring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC
Configuring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC Document ID: 12889 Contents Introduction Before You Begin Conventions Prerequisites Components Used Configure Network
More informationSURVEY ON BROADBAND AND WIRELESS USAGE IN SINGAPORE 2002
SURVEY ON BROADBAND AND WIRELESS USAGE IN SINGAPORE 2002 Summary Report Page 1 of 23 Infocomm Development Authority of Singapore 8 Temasek Boulevard #14-00 Suntec Tower Three Singapore 038988 Republic
More informationVPN. Agenda VPN VPDN. L84 - VPN and VPDN in IP. Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP)
VPN Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS
More informationThomson Reuters. FCN Services
Thomson Reuters FCN Services Zajil International Telecom is one of the primary FCN Service providers in the MENA region designated and certified by Thomson Reuters as an approved solutions provider for
More informationData Communications. From Basics to Broadband. Third Edition. William J. Beyda
Data Communications From Basics to Broadband Third Edition William J. Beyda University of California Extension, Berkeley Siemens Information and Communication Networks, Inc. Prentice Hall Upper Saddle
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationConfiguring the Cisco 827 Router as a PPPoE Client With NAT
Configuring the Cisco 827 Router as a PPPoE Client With NAT Document ID: 8514 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify
More informationImplementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004
Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students
More informationChildren s Health System. Remote User Policy
Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,
More informationEnabling the Wireless Internet
Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 13 Virtual Private Networks
CS 393 Network Security Nasir Memon Polytechnic University Module 13 Virtual Private Networks Course Logistics HW due Monday. HW 6 posted. Due in a week. Questions regarding homework are best answered
More informationGPRS Overview Applications over GPRS
GPRS Overview Applications over GPRS KI/ERA/LKG/T Johan Mellberg johan.mellberg@era.ericsson.se +46 8 585 313 99 GPRS - Applications GPRS - Data Network Connectivity Content Network Structure GPRS Attach
More informationCircuit switched network
GPRS-Services Page 12 2. GPRS-Services GPRS integrates a vast sum of additional services in a GSM-network. For this it will be necessary to define a subscriber profile that corresponds with services the
More informationThe Evolution and Future of Mobile Communication Systems. Written by David G Ainscough Copyright 2001 D.G.Ainscough
The Evolution and Future of Mobile Communication Systems Written by David G Ainscough Copyright 2001 D.G.Ainscough Chapter 5 : UMTS (Universal Mobile Telecommunication System)...3 5.1 UMTS Introduction...5
More informationNetwork Node for IMT-2000
Network Node for IMT-2000 vkenya Tanaka vmitsuyuki Mizuno vkazuhiro Sato (Manuscript received August 30, 2002) Fujitsu has developed a Mobile Switching Node for IMT-2000 3G Networks. This system is an
More informationOptimising 3G Migration
Optimising 3G Migration Sub-Regional Seminar on IMT-2000 Warsow,, 2-42 4 October 2001 Marie FROMENT Marketing Manager Alcatel Mobile Network Division marie.froment@alcatel.fr Optimising 3G Migration Outline
More informationAgenda. Networking Intro MPLS Tech MPBN WAN MPBN Functionality Security Monitoring
Agenda Networking Intro MPLS Tech MPBN WAN MPBN Functionality Security Monitoring Where MPBN Functions : 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Hub NIC Card
More informationAutomating VPN Management
Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,
More informationVPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010
Communication Technologies Last Points (briefly) VPNs Virtual Private Networks Main objective o Enable communication between two LANs as if they were together and separated. Telemedicina e e-saúde 2009/10
More informationConfiguring PPP over ATM with NAT
CHAPTER 4 The Cisco Secure Router 520 ADSL-over-POTS and Cisco Secure Router 520 ADSL-over-ISDN routers support Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) clients and network address
More informationWireless LAN, WLAN Security, and VPN
Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate
More informationChapter 10. Glossary
Chapter 10 Glossary 137 ADSL Asymmetric Digital Subscriber Line: New broadband, consumer-focused data delivery technology utilising existing telephone systems (e.g. for use with connecting to the Internet).
More informationIndustrial Control System Security white paper
Industrial Control System Security white paper The top 10 threats to automation and process control systems and their countermeasures with INSYS routers Introduction With the advent of M2M (machine to
More informationService Managed Gateway TM. Configuring IPSec VPN
Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling
More informationA-B I N D E X. backbone networks, fault tolerance, 174
I N D E X A-B access links fault tolerance, 175 176 multiple IKE identities, 176 182 single IKE identity with MLPPP, 188 189 with single IKE identity, 183 187 active/standby stateful failover model, 213
More information