Authentication in Next Generation Network

Authentication in Next Generation Network

G. C. Manna, Vishnu Suryavanshi
Copyright: © 2015 |Pages: 27
DOI: 10.4018/978-1-4666-8687-8.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Next generation Network has been evolved based on the concept of integration of voice, data and mobile networks, single point control for provisioning of all services and single account for all services of an user or corporate over an all IP platform. User authentication of next generation network depends on Session Initiation Protocol but existing networks do not directly support this protocol. The new networks authentication policy together with existing networks authentication policy completes the authentication process. Authentication steps for each type of network with trace routes involving associated protocols has been discussed in the chapter.
Chapter Preview
Top

Background

Early telephones were hardwired to communicate with only a single other telephone using overhead lines. Later telephone exchange switchboards located at central offices were used to provide the switching or interconnection of two or more individual subscriber lines for calls made between them, rather than requiring direct lines between subscriber stations. Common battery non multiple/multiple switch boards with line jacks were extended to each customer premises on overhead lines. Such switch boards were managed by operators to connect the customers with each other and there was no secrecy of communication& there were time delay as well.

Complete Chapter List

Search this Book:
Reset