NAME: Mobility Management CATEGORY:
Wireless Context Patterns
- DIAGRAM:
- CONTEXT: In a mobile wirless network world , the flexibility of users moving from one location area
which consists of a set of cell , to another area is called "roaming". As a result of roaming, users change to location areas other than their own home
area.
- PROBLEM: How do you enable users mobility between location areas of the same provider or between
location areas of different provider.
- FORCES:
-
- Mobile communication service providers are responsible for keeping information about the user's permanently registered in their network as well the
ones currently visiting them.
- Information about mobile user's home, previous and current location are essentia to enable mobile communication services when one or several
providers are involved in roaming.
- A robust method of validating the true identity of a subscriber in a wireless environment requires no subcriber intervention and no
exchange of keys and algorithms through air interface.
- SOLUTION:
- Create two kinds of repositories to handle the mobile user's information : one is the home database and the other is
visitor's database.
- Perform Authentication operation in both mobile station and network sides based on an encryption
algorithm and a secret key number.
- RATIONALE: Wireless computing keeps you connected whether you are in the office, at home or on the go. THe key issue here is mobility.