Feeds

GSM SIMplicity for WLAN sign-on

Ericsson twofer

  • alert
  • submit to reddit

High performance access to file storage

We live in a world of complex technology. Especially the world of personal computers, and even worse when we take them out of the office and still want to connect them back to the network, writes
Rob Bamforth, of Bloor Research
. Mobile phone networks are much simpler by comparison. Switch on, use, get billed (or pay up front). All the complicated stuff happens behind the scenes.

As far as computer networking goes, public wireless local area networks (public WLANs or Wi-Fi) are a simple idea, but the user authentication and billing is neither simple nor consistent. No wonder so many companies view the issue of roaming between different WLAN providers as a market opportunity. Part of the problem is that portable computers haven't had unique identities unlike mobile phones. The other issue is that computer standards aren't quite as strictly applied as those in the mobile phone industry.

Ericsson has decided to tackle this and last week demonstrated the first SIM-card logon for WLAN, based on 3GPP standards. 3GPP, the 3G Project Partnership, is the agglomeration of international standards bodies that develops and publishes the third generation wireless standards. The major standards bodies from around the world - US (T1), Europe (ETSI), Japan (ARIB), Korea (ETRI) and China (CWTS) are represented, as are the major technology companies.

The demonstration showed a WLAN connected laptop authenticated by a GSM network with the same ease as a regular mobile phone call over GSM. Anyone who's signed up his or her laptop to use any current WLAN hotspot will know just how different the experience is to using a mobile phone.

Ericsson provides a single sign-on for both GSM and Public WLAN, so not only a simpler logon, but also one bill. It forms part of Ericsson's Mobile Operator Wireless LAN (MO-WLAN) solution. This is a Wi-Fi, Wireless Internet Service Provisioning system, targeted at mobile operators. In addition to the existing components for service provisioning, user authentication, billing and network management, Ericsson has added a new piece with the Ericsson WLAN Authentication Server.

The widespread adoption and use of enforced written standards provides the simplicity of operation of the mobile phone. This simplicity paved the way for mass-market adoption. The Internet protocols provided de facto open standards from TCP to HTTP and led to a similar explosive growth of heterogeneous networks of computers from all manufacturers and operating systems.

The next generation mobile networks will be based on the convergence of mobile telephony and IP computer networks. It's important at these early stages of development that standards are developed from both sides to give us BOB - Best Of Both.

For Public WLAN to continue to grow, proprietary solutions must give way to open standards, compatibility must be verified, and billing must be as seamless as with mobile telephony. This appears to be a strong step on the way.

© IT-Analysis.com

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.