- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Interoperability Standards [教程]
Interoperability Standards 802.21, UMA/GAN 802.11u Industry Standards Interoperability Overview Motivation 802.21 GAN/UMA 802.11u Industry Standards Different Networks Available in Different Areas Operators Approaches Handover Standards 802.21 Media Independent Handover (MIH) 802.21 Motivation Incorrect Network Selection Ability of a device to choose it’s connection was hopeless. You could often connect at L2, but not at the network layer. The PC would often connect to the wrong one of many available APs, based on signal strength criteria alone. Increasing number of interfaces on devices Problem could extend to cover multiple interfaces. Various fast handover mechanisms in IETF MIPv4, FMIPv6 IETF anticipated L2 constructs in standardized form Triggers, events, hints etc, but 802 was not providing them in a standard form or a media independent form Types of Handover Based on Control Model Terminal Controlled Terminal makes use of some MIH services Terminal Initiated, Network Assisted Terminal makes use of MIH Information Service Network Initiated and Network Controlled Network makes use of MIH Event and Command Service, plus Information Service knowledge, to decide if handover is needed/desired, to decide the target, and to command the terminal to handover UMA UMA Overview UMA allows to access the mobile voice and data services of the cellular network over a Wireless LAN Subscribers are enabled to roam and handover between cellular networks and wireless networks UMA Architecture Mobile devices access the Core Network through Unlicensed Mobile Access Network (UMAN). UMAN has 3 major entities Unlicensed wireless network IP access network UMA Network controller (UNC) UNC authorizes and authenticates the Mobile devices for accessing the Core Network UMA Security Authentication Authenticate MS with UNC to make secure tunnel Based GSM or UMTS credentials Protocol of authentication is IKEv2 GSM : EAP-SIM or UMTS : EAP-AKA Mutual Authentication of MS and Mobile
您可能关注的文档
最近下载
- T_CATCM 030—2024(柔毛淫羊藿规范化生产技术规程).pdf VIP
- JJF(吉) 149-2025 温室气体 产品碳足迹量化方法与要求 雪地轮胎.docx VIP
- JJF(吉) 148-2025 电能质量分析仪校准规范.docx VIP
- JJF(吉) 147-2025 钳形电流表检定装置校准规范.docx VIP
- JJF(吉) 146-2025 超声波测厚仪厚度标准器校准规范.docx VIP
- JJF(吉) 143-2024 在线挥发性有机化合物氢火焰离子化分析仪校准规范.docx VIP
- 小型交通建设工程平安工地建设工程项目开工前安全生产条件核查表.docx VIP
- JJF(吉) 142-2024 工程类比长仪校准规范.docx VIP
- JJF(吉) 140-2024 水泥浆体自由泌水率和自由膨胀率试验仪校准规范.docx VIP
- JJF(吉) 154-2025 动车运行参数在线校准规范.docx VIP
原创力文档


文档评论(0)