scholarly journals 5G Non-Public-Networks (NPN) Roaming Architecture

Author(s):  
Marius Corici ◽  
Pousali Chakraborty ◽  
Thomas Magedanz ◽  
Andre S. Gomes ◽  
Luis Cordeiro ◽  
...  
Keyword(s):  
2004 ◽  
Vol 23 (3) ◽  
pp. 151-159
Author(s):  
Dong-Hee Shin

I discuss experiences in the development of four broadband public networking projects in New York State in order to see an implication for future small or medium-sized enterprise over such public networks. The projects were funded under a state program to diffuse broadband/advanced telecommunication technologies in economically depressed areas of the state. Through the broadband networks, I critically argue characterization of next generation public network (NGPN) in reference to small medium-sized enterprises (SMEs). I identify several facets of an NGPN drawing on a longitudinal study of the network development in four New York communities. As broadband public networks diffuse, small businesses being left out of the loop. The idea of SME application and service may itself be at risk. My approach to the socio-technical challenges involved in the design and development of broadband public networks is outlined.


2020 ◽  
pp. 111-137
Author(s):  
Carl Stephen Clifton

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Fangzhou Zhu ◽  
Liang Liu ◽  
Simin Hu ◽  
Ting Lv ◽  
Renjun Ye

The widespread application of wireless communication technology brings great convenience to people, but security and privacy problems also arise. To assess and guarantee the security of wireless networks and user devices, discovering and identifying wireless devices become a foremost task. Currently, effective device identification is still a challenging issue, as device fingerprinting requires huge training datasets and is difficult to expand, and rule-based identification is not accurate and reliable enough. In this paper, we propose WND-Identifier, a universal and extensible framework for the identification of wireless devices, which can generate high-precision device labels (vendor, type, and product model) efficiently without user interaction. We first introduce the concept of device-info-related network protocols. WND-Identifier makes full use of the natural language features in such protocol messages and combines with the device description in the welcome page, thereby utilizing extraction rules to generate concrete device labels. Considering that the device information in the protocol messages may be incomplete or forged, we further take advantage of the application logic independence and stability of the device-info-related protocol, so as to build a multiprotocol text classification model, which maps the device to a known label. We conduct experiments in homes and public networks and present three application scenarios to verify the effectiveness of WND-Identifier.


Author(s):  
Lei Chen ◽  
Wen-Chen Hu ◽  
Ming Yang ◽  
Lei Zhang

E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.


Sign in / Sign up

Export Citation Format

Share Document