logo

Location Management in Wireless ATM

Dec, 11 2020, 03:04 pm [IST]
Location Management in Wireless ATM

As for all networks supporting mobility, special functions are required for looking up the current position of a mobile terminal, for providing the moving terminal with a permanent address, and for ensuring security features such as privacy, authentication, or authorization. These and more functions are grouped and team location management.

Requirements for location management

Several requirements for location management have been identified,

Transparency of mobility: A user should not notice the location management function under normal operation. Any change of location should be performed without user activity. This puts certain constraints on the permissible time delay of the functions associated with location management. Furthermore, transparent roaming between different domains should be possible. This may include roaming between networks based on different technologies using, for example, a dual-mode terminal.

Security: In order to provide a security level high enough to be accepted for mission-critical use, a wireless ATM system requests special features. All location and user information corrected for location management and accounting should be protected against unauthorized disclosure.

This protection is especially critical for roaming profiles which allowed the precise tracking of single Terminals. As the air interface is very simple to access, special access limitations must be executed to, for example, put out public users from private wireless ATM networks. But users should also be able to define the network their terminal is allowed to access. Required security features involve authentication of users and terminals, but also access points. Additionally, encryption is required, at least between terminal and access point, But preferably end-to-end.

Efficiency and scalability: imagine wireless ATM networks with Minions of users like today's mobile phone networks. Every function and system involved in location management must be scalable and efficient. This includes distributed servers for location storage, accounting, and authentication.

Furthermore, the performance of all operations should be practically independent of network size, number of current connections, and network load. Thus, clustering of switches and hierarchies of domains should be possible to increase the overall performance of the system by dividing the load.

In contrast to many existing cellular networks, wireless ATM should work with a more efficient, integrated signaling scheme. All signaling required for location management should therefore be incorporated into the existing signaling mechanism, for example, by adding new information elements to existing messages. This allows for the utilization of the existing signaling mechanisms in the fixed ATM network which are efficient.

Identification: location management must give the means to recognize all entities of the network. Radio cells, wireless ATM networks, terminals, and switches require unique identifiers and mechanisms to exchange identity data. This specification also covers information for a terminal concerning its current location and its current point of attachment. furthermore, in addition to the permanent ATM end system address, a needs a routable temporary AESA as soon as it is outside its home network. This temporary AESA must be forwarded to the terminal's home location.

Inter- working and Standards: All location management functions must co-operate with existing ATM functions from the fixed network especially routing. Furthermore, location management in wireless ATM has to be harmonized with other location management schemes, such as location management in current GSM networks, future UMTS networks, the internet using mobile IP, or internet switch special features.

This harmonization could for instance lead to two-level location management if mobile IP is used on top of wireless ATM. All protocols used in wireless ATM for database updates, registration, etc. Have to be standardized to permit mobility across provider network boundaries. However, inside the administrative domain proprietary enhancements and optimizations could be applied.

Procedures and entities

Several entities that support location management have been identified. The mobile terminal, which is wireless for the applications considered here, executes functions to initiate location updates and participates in authentication under privacy protocols.

Many end-user mobility supporting switches are necessary to identify connection setup messages destined for the WMDs and to invoke location resolution functions. Furthermore, EMASs redirect connections, and Some of them maintain location and authentication servers.

Location servers (LS) maintain a database containing the current AESA and the permanent AESA of a WMT. They also keep track of further service-specific parameters of a terminal and user, such as quality of service of connections. Location servers may be part of an EMAS. An authentication server maintains a secure database of authentication and privacy-related information for each WMT. This also includes access to rights and equipment identification.


Share this: FACEBOOK TWITTER WHATSAPP


YOU MAY LIKE

MOST VIEWED

Details About Software Quality Assurance

Dec, 16 2020, 12:02 pm [IST]
Details About Software Quality Assurance

SOFTWARE ENGINEERING

Software quality assurance Software quality is described as conformance to explicitly state functional and performance requirements, explicitly documented standards and implicit features that are anticipated of all professionally developer software ... Read More


Details About Tunnelling and Encapsulation in Mobile IP

Dec, 10 2020, 02:19 pm [IST]
Details About Tunnelling and Encapsulation in Mobile IP

MOBILE COMMUNICATIONS

A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint. Packets entering a tunnel are forwarded inside the tunnel leave the tunnel unchanged. Tunneling, that is, sending a packet through a tunnel, is achieved by using encapsulation ... Read More


Details About Software Architecture

Dec, 06 2020, 12:17 pm [IST]
Details About Software Architecture

SOFTWARE ENGINEERING

The overall structure of the software components and how the success provides a conceptual integrated file system. In other words, architecture is the hierarchical structure of program components, how these components interact, and the structure of data that are used by the components ... Read More


Details About Real-Time And Distributed System Design

Dec, 04 2020, 01:28 pm [IST]
Details About Real-Time And Distributed System Design

SOFTWARE ENGINEERING

Real-time and distributed system design The real-time system is a software system the correct functioning of the system depends on the results produced by the system the time at which these results are produced ... Read More


Explanation About Software Project Lifecycle Model

Dec, 02 2020, 12:39 pm [IST]
Explanation About Software Project Lifecycle Model

SOFTWARE ENGINEERING

Waterfall Model The waterfall model also called classic life cycle requirements is well defined and stable. It suggests a systematic, sequential approach to software development. It begins with customer specification of requirements and processes through planning, modeling, instruction, and deployment ... Read More


Software Design Concepts in Software Engineering

Dec, 13 2020, 12:01 pm [IST]
Software Design Concepts in Software Engineering

SOFTWARE ENGINEERING

Software Design A software design is an essential engineering description of some software product that is to be established. A design can be determined to the customer's requirements and can be assessed for quality against predefined patterns ... Read More


Go to Top

FOLLOW US: FACEBOOK

About Us | Contact Us | Disclaimer | Privacy Policy | Sitemap | Terms and Conditions

Copyright © 2021 TeluguAsami. All rights reserved.