WO2006034662A1 - System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff - Google Patents
System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff Download PDFInfo
- Publication number
- WO2006034662A1 WO2006034662A1 PCT/DE2004/002181 DE2004002181W WO2006034662A1 WO 2006034662 A1 WO2006034662 A1 WO 2006034662A1 DE 2004002181 W DE2004002181 W DE 2004002181W WO 2006034662 A1 WO2006034662 A1 WO 2006034662A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- point
- ssg
- server
- wimax
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/10—Access point devices adapted for operation in multiple networks, e.g. multi-mode access points
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2858—Access network architectures
- H04L12/2859—Point-to-point connection between the data network and the subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
Definitions
- nomadic data access is to be understood as the data access by a user at any access point.
- the user is usually not mobile for the duration of the data access, but if he is still moving, he is maintaining his session. (Session) not guaranteed.
- Nomadic, broadband, wireless (wireless) data access especially in the public sector, today takes place primarily at selected access points (hotspots) through the so-called WLAN technology (wireless LAN). In this case, subscribers can currently achieve data rates of up to 54 Mbit / s.
- the success of this technology is due, among other things, to the fact that the protocol stack is down to the lowest
- Layers (layer) is identical to that of the usual LAN. Thus, it was possible to elegantly "wireless" the well-known wired LAN service: Substantially: physical layer PHY and medium access layer MAC (802.3, CSMA / CD) were replaced by 802.11 (CSMA / CA,
- WiMAX An illustration of the WiMAX can be found in the publication "IEEE Standard 802.16: A Technical Overview of the Wireless MAN Air Interface for Broadband Wireless Access”; IEEE Communications Magazine, June 2002, pages 98-107.
- WLAN users who are actually “cordless LAN users", experience the service "cellular LAN” as a welcome extension of the "service area” from “hotspot-limited” to "everywhere", or at least “regionally”.
- Wixed network is usually via landline connections (telephone line Te ⁇ ), with real broadband via DSL at about the same time as the access via WLAN widespread found.
- WLAN has its roots in the LAN
- broadband access via DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- PPP Point-to-Point-Protocol
- the task of this layer is to monitor the stability of a connection (an occupied telephone line costs money if a program crashes, must be triggered, ie the connection must be interrupted).
- PPP Point-to-Point-Protocol
- WLL wireless local loop
- the air interface which is suitable for wireless DSL, is also 802.16, WiMAX.
- Wireless LAN subscribers want to know the WiMax service in a manner analogous to their WLAN service; H. Authentication, billing etc. take place analogously to WLAN, as a rule offered by a mobile radio operator with the aid of an already existing or new mobile radio subscription (IMSI, MSISDN).
- IMSI already existing or new mobile radio subscription
- DSL subscribers are typically landline customers with a subscription coupled to the subscriber line number.
- WiMax service mobile.DSL and Cellular. LAN coexist were ⁇ and thus solutions for both must be designed.
- WLL-DSL deployment is always planned for nomadic access by all manufacturers of WiMax equipment. This results from the evolution of the standard and thus from the availability of appropriate chipsets. Thus, it remains operators who z. B. want to offer a pure WLAN extension (today's wireless LAN provider, MNO), not spared to deal with the DSL access and its stuntwirkun ⁇ conditions on their networks, as they offer systems at a later date, if full mobility supportive products based on 802.16e are available, at the present time already pure DSL solutions are installed.
- MNO wireless LAN provider
- Figure 1 Evolution of the LAN Figure 2 Evolution of the fixed-line data connection Figure 3 typical DSL architecture Figure 4 typical WLAN architecture Figure 5 WiFi / WiMax / DSL architecture Figure 6 WiMax base station,. • Figure 7 Address-sensitive Access Control Server The following is a brief description of the architecture and mechanisms of today's systems:
- FIG. 3 describes the architecture components necessary for the description of the solution:
- a subscriber represented by a notebook (PC) would like to call a service of a service provider on the Internet, represented by an application server (AS).
- AS application server
- he uses, for example, a browser and calls the information (URL) of the service / service provider by means of a suitable transmission protocol, such as http, 1.
- the http messages are sent via TCP / IP to the destination address of the server.
- the IP packets are sent in a PPP frame via Ethernet to the DSL modem (at home) 41, where it is converted to the corresponding DSL transmission technology and sent to a DSL-terminating unit (DSLAM, DSL Access Multiplexer), z. B. in the OrtsVjust, sent,
- BRAS Broadband Remote Access Server
- the BRAS determines if a subscriber is already authenticated and to allow him access to the Internet. For example, assign him an IP address.
- the subscriber would first be asked to enter his authentication parameters (such as user name and password). Following this, they would be sent to an AAA server by means of the RADIUS protocol, checked there and, in the case of good, a corresponding message would be returned, 44.
- the BRAS assigns the subscriber device a temporary IP address and allows access to the Internet, in the example to the corresponding URL address or, via the DNS (Domain Name Server) determined associated IP address of the application server the transmitted by the terminal kete deliver or received from there IP packets to the No ⁇ tebook.
- DNS Domain Name Server
- Typical operators of DSL terminating units DSLAM and / or BRAS are local fixed network operators.
- AAA-S Internet Service Providers ISP. The participant often has to pay two fees: the connection and the Internet access.
- Typical manufacturers of DSL-terminating units DSLAM and corresponding modems are Telco equipment manufacturers, typical manufacturers of BRAS are manufacturers of Internet equipment.
- FIG. 4 a describes a typical WLAN architecture, as installed by some mobile radio operators.
- Essential components are a WLAN access point, AP, z. B. over
- the Access Zone Router has u. a. via the DHCP function (Dynamic Host Configuration Protocol), which assigns IP addresses in LAN networks on request to end devices. This function is essential for (W) LAN networks, as there is no assignment here.
- DHCP Dynamic Host Configuration Protocol
- This function is essential for (W) LAN networks, as there is no assignment here.
- B. in the case of DSL.
- the subscriber IP traffic is forwarded to a so-called service selection gateway, SSG.
- SSG service selection gateway
- the task of the SSG is to set up source-IP addresses depending on services, to specify permitted destination IP addresses and to generate corresponding billing information (RADIUS messages).
- the control of the SSG, z As the establishment of services on an ad hoc basis, via an access control server. Unknown to the SSG (because not yet administered) IP addresses are authenticated and authorized with the aid of the access control server with the aid of a portal server.
- IP addresses are authenticated and authorized with the aid of the access control server with the aid of a portal server.
- a subscriber, PC finds access to a WLAN AP at a WLAN hotspot. The subscriber wants to use the service of a service provider on the Internet and selects the corresponding URL by means of an access protocol, http.
- the WLAN access point, AP is topologically (and most of the existing implementations) designed as a bridge.
- a bridge transmits data packets on the basis of the MAC address (layer 2) and transmits all protocols running on the Ethernet. For the stations involved, a bridge usually works transparently.
- the participant Since the participant still has no IP address, he gets a locally valid, temporary IP address z. For example, by means of a DHCP realized on the basis of an AZR. With this source IP address, the participant attempts to address the application server or, via DNS, to determine and contact the corresponding destination IP address. In this case, the SSG knows that no service has yet been set up for the source IP address, ie. H. the participant is allowed to do this
- the HTTP request is routed to a portal server via inclusion of an access control server, access control server.
- the participant now gets displayed instead of the desired Internet page a portal page in which he is asked to authenticate himself. For this, the participant inputs his credentials (user name, password) as well as the desired service (eg one hour internet, with billing to the GSM account).
- the portal server now contacts (possibly indirectly via Access Control
- the access control server at the SSG set up a service corresponding to the authentication / authorization result, the subscriber may now, for. B. Internet Access, the SSG removes the "redirect" to the portal server, the participants will now get the desired Internet page displayed. At the same time, billing can now be initiated by the SSG (via the Access Control Server).
- the access routes to / from the hotspot are usually secured by means of a firewall / VPN.
- Figure 5 shows the architecture that enables a WiMax service based both on native Ethernet access (WLAN-like) and DSL access (PPPoE).
- DSL Access takes place with respect to the control (control) and charging functions as described in Figure 4.
- DSL Access can, if he z. B. is offered by a fixed network operator for its fixed DSL customers, analogous to Figure 3 If the DSLAM is replaced by the WiMAx base station and the DSL modem is replaced by a WiMax modem.
- a portable radio operator can offer its WLAN customers WLAN-similar WiMax
- a DSL operator can offer its DSL customers Nomadischen DSL access, but not WLAN customers address.
- the mobile operator must support DSL access. He is accustomed to support Wi-Fi access either by permanent subscription or temporarily for "FIyBy users" who decide ad hoc (spontaneously, one time only) for this service.
- the mobile radio operator can handle the situation in an excellent way that subscribers use this service at the most different places at any time.
- the DSL operator is accustomed to couple DSL services to a fixed subscriber line.
- nomadic access e.g., if a subscriber can "thaw" on any DSLAM (which would be the case in the case of a WiMax base station), his previous infrastructure is not designed.
- a Wimax base station is designed as "DSLAM" in the case of a PPPoE based Access and as a Wireless Bridge in the case of native Ethernet Access.
- DSLAM distributed subscriber packets
- SSG service access control entity
- the treatment of the second case namely a native Ethernet subscriber (WLAN-like) receives WiMax access via a Wi-Max base station, is essentially to be treated analogously to the case of a normal WLAN access. More difficult to handle is the case in which PPPoE DSL users behave nomadic. The simplest way to handle this is the case when a subscriber can dial into the network by means of (for example, a fixed) subscription and is authenticated via BRAS / AAA and charged according to time or volume. This is the usual DSL behavior, but completely unsatisfactory for nomadic access:
- the access should be able to be charged differently by the network operator, depending on the attractiveness of the access point, different fees may apply, so that the use in certain places, such as at the airport, may be more expensive than elsewhere.
- Nomadic participants expect much more flexible tariff systems, often bundled with other services: they would like to be able to choose ad hoc between 1 hour of Internet Access for 5 euros or 15 minutes for 2 euros;
- PPPoE subscribers are first authenticated via BRAS / AAA. Thereafter, the IP data stream (payload) is fed to the SSG.
- IP data stream payload
- data packets with unauthenticated IP source addresses now strike.
- the standard behavior of the SSG is now a redirection / redirect to a portal server, usually including an access control server.
- a portal page would now be opened which prompts the subscriber to enter his subscriber identifier (name and password) and to select the desired service.
- subscriber identifier name and password
- this behavior (at least the first part, the request for inputting the subscriber access data) does not make sense.
- the interaction between the Access Control Server and the Portal Server must be such that the Access Control Server and / or Portal Server behave differently when such a Redirect occurs (or only in such a case).
- a subscriber is either not shown a portal page (for example, if he has booked a flatrate, there is no reason to continue to "bother" him after authentication via BRAS / AAA), or he becomes one Portal page in which a selection of different services is offered, but not re-authentication is ver ⁇ reached.
- the Access Control Server and / or Portal Server would have to be informed "in advance" that the incoming Redirect must be specially treated. This would require a coordinated, synchronized dialog between BRAS, SSG and Access Control Server / Portal Server.
- BRAS and SSG are in the most common cases competing products of different manufacturers, interworking is unimaginable, there are particularly high demands on performance and reliability, the development efforts are very high.
- the operator / integrator combines both components: BRAS and SSG, each with its own components for controlling and connecting to the backend, in the case of Siemens an access control server and a portal server (part of the wireless system) Integration Platform, WIP).
- a feature of this invention disclosure is now to modify the units Access Control Server and Portal Server so that depending on the access (directly SSG or BRAS / SSG) different behavior bez.
- the control of an SSG follows: direct access via SSG (WLAN-like access): force an authentication / authorization, eg.
- SSG WLAN-like access
- BRAS / SSG control of the SSG, as if a forced authentication / authorization has already been done.
- services in the SSG
- are set up which, in the first case, have taken place only after a forced authentication / authorization.
- only the (no longer necessary) authentication or else authentication and authorization can be suppressed.
- a further, essential feature consists in enabling the components Access Control Server ./ Portal Server to enable a distinction of the access type (SSG or BRAS / SSG) without modification of the key components SSG and BRAS.
- This is done in a particularly advantageous manner in that the BRAS allocates an address from a specific value range specified only for this access type when allocating the source IP address. Now appear IP packets with a non auth / aut. Source IP address on the SSG, this can now, due to the value range of the IP address, by administration of the Access Control Server, instructed a redirect to another instance (eg on the Access Control Server), eg. For example, an instance that makes unauthenticated IP addresses of a specific value range accessible to typical further processing.
- SSG Service Selection Gateway
- IP data streams are routed in different ways on the basis of their IP or MAC addresses, depending on set rules, eg. For example, for all non-authenticated IP traffic, a direct access to an authentication instance takes place; in the case of authenticated traffic, premium users are forwarded in lines with high bandwidth, data packets of economy users are continued in narrowband data channels
- the invention covers the following aspects:
- a system consisting of an access control entity (SSG), an access control server, a portal server, authentication / authorization authorities (AAA), a Remote Access Server (BRAS), Netzzugangseinrich ⁇ tions (WiMax base stations) and troubleendeinrichtun ⁇ conditions (notebook, PC) and subscriber access facilities (WiMAx modem, WLAN card), thereby characterized by the state of the tech- nik distinguish that
- the network access device transmits traffic of different access type (PPPoE, native Ethernet) to different network entities (SSG, BRAS) point-to-point oriented data access (PPPoE) first via a BRAS, there an authentication / Authorization takes place, and then the data stream is passed through an access control entity (SSG)
- PPPoE packet data protocol
- SSG access control entity
- Point-to-multipoint oriented data access (native Ethernet, WLAN) is led directly to an access control entity (SSG)
- SSG access control entity
- Access Control Server Different control authorities incite different access control procedures (portal server).
- the access device (WiMax base station) is capable of point-to-point oriented traffic (PPPoE) from To differentiate point-to-multipoint oriented traffic (native Ethernet, WLAN)
- PPPoE point-to-point oriented traffic
- WLAN wireless Ethernet
- WiMax base station for point-to-point oriented traffic (PPPoE) traffic over a fixed route (BRAS) leads and is thus topologically as a broadband access device (DSLAM) pronounced
- the access device for point-to-multipoint-oriented data traffic (native Ethernet, WLAN) leads the data stream to another, fixed route (SSG), and thus topologically as a layer 2 switch (bridge) or layer 3 switch (Router) is pronounced
- the device can be designed for wired and wireless access.
- SSG Access Control Instance
- the device may exist in one form together with a portal server.
- a method for controlling point-to-point oriented traffic (PPPoE) and point-to-multipoint oriented data traffic (native Ethernet, WLAN) in a data messaging system characterized in that
- Point-to-point oriented data traffic is provided with temporary terminal access identifiers (IP addresses) of a value range
- point-to-multipoint oriented data is provided with identifiers of another range of values, within the system on the basis of the assigned identifier pa ⁇ kete, which come from a point-to-point connection, can be distinguished from data packets that a point-to-point Multipoint connection originate.
- Such a system allows mobile operators to establish a WiMax system that allows nomadic access for DSL subscribers, while fully exploiting the flexibility of service provisioning and billing for previous nomadic services (WLAN).
- the mobile operator gains thereby a market advantage, since he temporally with DSL operators can roll out the service.
- the system offers fixed network operators, city network operators and ISP the possibility of enabling DSL access in nomadic (mobile) form, while taking into account future WLAN-like mobility scenarios. He can add to his rigid, simple service landscape access to the full service landscape.
- SSG carrier-grade network elements
- BRAS carrier-grade network elements
- FIG. 6 shows a WiMax base station which transmits incoming subscriber traffic differently: Traffic in which IP packets arrive directly on the transport layer (eg Ethernet) are switched to an SSG (bridge or router), IP packets transmitted in a PPP frame are sent to the BRAS ,
- SSG bridge or router
- FIG. 7 describes the mode of operation of an access control server. Per Administration (Redirect) controls the SSG different instances. Authentication is not enforced for (original) PPPoE Access, for native Ethernet Access, authentication takes place via a portal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/DE2004/002181 WO2006034662A1 (de) | 2004-09-30 | 2004-09-30 | System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff |
EP04786893A EP1797671A1 (de) | 2004-09-30 | 2004-09-30 | System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff |
DE112004003025T DE112004003025A5 (de) | 2004-09-30 | 2004-09-30 | System zum nomadischen Datenzugriff von Teilnehmerendeinrichtungen, Vorrichtungen in diesem System sowie ein Verfahren zum Datenzugriff |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/DE2004/002181 WO2006034662A1 (de) | 2004-09-30 | 2004-09-30 | System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006034662A1 true WO2006034662A1 (de) | 2006-04-06 |
Family
ID=34959213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2004/002181 WO2006034662A1 (de) | 2004-09-30 | 2004-09-30 | System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1797671A1 (de) |
DE (1) | DE112004003025A5 (de) |
WO (1) | WO2006034662A1 (de) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007115503A1 (fr) * | 2006-04-10 | 2007-10-18 | Huawei Technologies Co., Ltd. | Dispositif d'accès pour communications |
WO2008022584A1 (fr) * | 2006-08-11 | 2008-02-28 | Huawei Technologies Co., Ltd. | Système multibordure wimax et un système multibordure pour wimax et l'interconnexion de réseaux filaires |
CN100466821C (zh) * | 2006-08-24 | 2009-03-04 | 华为技术有限公司 | 无线接入网及其中分组的传输和终端的切换方法 |
EP2273730A1 (de) * | 2008-04-02 | 2011-01-12 | Alcatel Lucent | Verfahren und vorrichtung zum verarbeiten des zugangs eines benutzerendgeräts in einem festzugangsnetz |
CN102281301A (zh) * | 2011-08-25 | 2011-12-14 | 中兴通讯股份有限公司 | 一种将IPv6终端接入流媒体服务器的方法和系统 |
CN102801685A (zh) * | 2011-05-23 | 2012-11-28 | 中兴通讯股份有限公司 | 一种Web认证方法及系统 |
CN103220149A (zh) * | 2013-04-07 | 2013-07-24 | 杭州华三通信技术有限公司 | 一种Portal认证方法和设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020044567A1 (en) * | 2000-08-10 | 2002-04-18 | Voit Eric A. | Automatic programming of customer premises equipment for vertical services integration |
US20030036375A1 (en) * | 2001-08-17 | 2003-02-20 | Weijing Chen | Public wireless local area network |
EP1331774A2 (de) * | 2002-01-24 | 2003-07-30 | Kabushiki Kaisha Toshiba | Kommunikationseinrichtung mit Wählfunktion |
US20030171112A1 (en) * | 2000-09-01 | 2003-09-11 | Siemens Aktiengesellschaft | Generic wlan architecture |
US20040017800A1 (en) * | 2000-09-29 | 2004-01-29 | Alfred Lupper | Method for connection of data terminal devices to a data network |
-
2004
- 2004-09-30 EP EP04786893A patent/EP1797671A1/de not_active Withdrawn
- 2004-09-30 WO PCT/DE2004/002181 patent/WO2006034662A1/de not_active Application Discontinuation
- 2004-09-30 DE DE112004003025T patent/DE112004003025A5/de not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020044567A1 (en) * | 2000-08-10 | 2002-04-18 | Voit Eric A. | Automatic programming of customer premises equipment for vertical services integration |
US20030171112A1 (en) * | 2000-09-01 | 2003-09-11 | Siemens Aktiengesellschaft | Generic wlan architecture |
US20040017800A1 (en) * | 2000-09-29 | 2004-01-29 | Alfred Lupper | Method for connection of data terminal devices to a data network |
US20030036375A1 (en) * | 2001-08-17 | 2003-02-20 | Weijing Chen | Public wireless local area network |
EP1331774A2 (de) * | 2002-01-24 | 2003-07-30 | Kabushiki Kaisha Toshiba | Kommunikationseinrichtung mit Wählfunktion |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007115503A1 (fr) * | 2006-04-10 | 2007-10-18 | Huawei Technologies Co., Ltd. | Dispositif d'accès pour communications |
WO2008022584A1 (fr) * | 2006-08-11 | 2008-02-28 | Huawei Technologies Co., Ltd. | Système multibordure wimax et un système multibordure pour wimax et l'interconnexion de réseaux filaires |
CN100466821C (zh) * | 2006-08-24 | 2009-03-04 | 华为技术有限公司 | 无线接入网及其中分组的传输和终端的切换方法 |
EP2273730A1 (de) * | 2008-04-02 | 2011-01-12 | Alcatel Lucent | Verfahren und vorrichtung zum verarbeiten des zugangs eines benutzerendgeräts in einem festzugangsnetz |
EP2273730A4 (de) * | 2008-04-02 | 2014-01-01 | Alcatel Lucent | Verfahren und vorrichtung zum verarbeiten des zugangs eines benutzerendgeräts in einem festzugangsnetz |
CN102801685A (zh) * | 2011-05-23 | 2012-11-28 | 中兴通讯股份有限公司 | 一种Web认证方法及系统 |
CN102281301A (zh) * | 2011-08-25 | 2011-12-14 | 中兴通讯股份有限公司 | 一种将IPv6终端接入流媒体服务器的方法和系统 |
CN102281301B (zh) * | 2011-08-25 | 2017-10-03 | 南京中兴新软件有限责任公司 | 一种将IPv6终端接入流媒体服务器的方法和系统 |
CN103220149A (zh) * | 2013-04-07 | 2013-07-24 | 杭州华三通信技术有限公司 | 一种Portal认证方法和设备 |
Also Published As
Publication number | Publication date |
---|---|
DE112004003025A5 (de) | 2007-09-06 |
EP1797671A1 (de) | 2007-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1316230B1 (de) | Generische wlan-architektur | |
DE60209858T2 (de) | Verfahren und Einrichtung zur Zugriffskontrolle eines mobilen Endgerätes in einem Kommunikationsnetzwerk | |
DE60206246T2 (de) | Verteiltes netzwerk kommunikationssystem, das einer anzahl von anbietern schnurloser kommunikationsdienste erlaubt eine gemeinsame netzinfrastruktur zu teilen | |
DE602004011783T2 (de) | Beschränkter WLAN-Zugriff für eine unbekannte Mobilstation | |
EP1323278B1 (de) | Verfahren zum anschluss von datenendeinrichtungen an ein datennetz | |
DE60308620T2 (de) | Roaming-Dienst, der mehrere Anbieter für mobile Datenkommunikation abdeckt | |
DE202006020961U1 (de) | Zugangspunkt für Mobilkommunikationsnetz | |
DE102007039516A1 (de) | Verfahren zum benutzerspezifischen Konfigurieren eines Kommunikationsports | |
DE60222810T2 (de) | Verfahren, system und einrichtung zur dienstauswahl über ein drahtloses lokales netzwerk | |
EP1565801B1 (de) | Verfahren zur authentisierung und vergebührung eines teilnehmers eines funknetzes | |
DE112005001833T5 (de) | System und Verfahren zum Herbeiführen des sicheren Einsatzes von Netzwerken | |
WO2006034662A1 (de) | System zum nomadischen datenzugriff von teilnehmerendeinrichtungen, vorrichtungen in diesem system sowie ein verfahren zum datenzugriff | |
DE102006040313B3 (de) | Verfahren und Anordnung zur automatischen Konfiguration eines lokalen Funknetzwerkes | |
WO2003079706A1 (de) | Verfahren und kommunikationssystem zum anbinden alternativer zugriffsnetze an ein kommunikationssystem, insbesondere gprs/umts | |
EP1542401B1 (de) | Netzzugangsvorrichtung für funkbasierte drahlose lokale Netze | |
EP2067308B1 (de) | Verfahren zur authentifizierung eines dsl-nutzers | |
EP1227692A1 (de) | Verfahren zur Übergabe von funkbasierten Datenverbindungen mit Qualitätsmerkmalen zwischen Funkbasisstationen | |
DE60209322T2 (de) | Anschluss von Benutzergeräten Selektivezugangschnittstelle von einem ISP-router | |
DE102007030775B3 (de) | Verfahren zum Filtern von Netzwerkdiensten und Netzwerkdiensteinhalten | |
WO2012126991A2 (de) | Verfahren zum leiten von telekommunikationsverbindungen (tk-verbindungen) zu einem mobilfunk-endgerät sowie mobilfunk-gateway und mobilfunk-endgerät | |
DE60202663T2 (de) | System und Verfahren zum Zuteilen dynamischer IP-Adressen | |
DE102008010426B4 (de) | IP-basiertes Kommunikationsverfahren für Mobilfunkgeräte | |
DE10344348B4 (de) | Verfahren zum Betreiben einer drahtlosen Verbindung, mobiles Kommunikationsendgerät sowie Netzzugangsknoten | |
WO2003036995A2 (de) | Verfahren zur durchführung von augenblicklichem nachrichtenverkehr (instant messaging) mit paketvermittelten daten | |
DE102004032715B4 (de) | Kommunikationssystem, Verfahren zum Steuern eines Kommunikationssystems, Steuereinrichtung und Verfahren zum Bereitstellen eines WLAN-Dienstes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004786893 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1120040030250 Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004786893 Country of ref document: EP |
|
REF | Corresponds to |
Ref document number: 112004003025 Country of ref document: DE Date of ref document: 20070906 Kind code of ref document: P |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2004786893 Country of ref document: EP |