Browse > Article

EDS scenario Implementation for the Multiple Network and Multiple Service Environments  

Kim, Dong-Il (Department of Information Communication Engineering, Dong-eui University)
Lee, Soong-Hee (Department of Information Communication Engineering, Inje University)
Abstract
The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.
Keywords
EDS(Event Driven Service); Multiple Service Environment; NGN(Next Generatio Network);
Citations & Related Records
연도 인용수 순위
  • Reference
1 IETF RFC 4179, "Using Universal Content Identifier (UCI) as Unifornl Resource Names (URN)", IETF RFC 4179, IETF, 2005
2 Spyridon Vassilaras et. aI., "Architecture Framework for Device Single Sign On in Personal Area Networks", Lecture Notes in Computer Science, Springer, 2006
3 TU-T Y.ldMsec, "NGN lDENTITY MANAGEMENT SECURITY", ITU-T Y.ldMsec, ITU-T,2007
4 B. Schilit, N. Adams, and R. Want., "Context-aware computing applications", IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'94), Santa Cruz, CA, US, pp. 89-101, 1994   DOI
5 lETF RFC 3761, "The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)", IETF RFC 3761, IETF, 2004
6 Tae-shik Sohn, et. aI., "Single Sign-On System enabling Mutual Authentication in Multi Domain Environments", KISS Journal, 2001
7 ITU-T Y. Sup.3, "ITU-T Y.2000 series Supplement on service scenarios for convergence services in a multiple network and application service provider environment ", ITU-T ITU-TY.2000 series YSup.3, ITU-T,2007
8 Sang-chul Shin, et. aI., "Strategy for international standardization and wide spread of RFlD/USN", KICS Journal, KICS, 2004
9 Young-gil Kim, 'Data transmission in u-ID sensor network configuration using Bluetooth', ICKIMICS 2004 Proceedings, KIMICS, 2004