Corporate Telecommunication Networks - Mobility for Enterprise Communications

RTR/TISPAN-00011

General Information

Status
Published
Publication Date
28-Jun-2012
Current Stage
12 - Completion
Due Date
13-Jul-2012
Completion Date
29-Jun-2012
Ref Project
Standard
tr_102477v020101p - Corporate Telecommunication Networks - Mobility for Enterprise Communications
English language
34 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


Technical Report
Corporate Telecommunication Networks -
Mobility for Enterprise Communications

2 ETSI TR 102 477 V2.1.1 (2012-06)

Reference
RTR/TISPAN-00011
Keywords
mobility, network
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2012.
All rights reserved.
TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
3 ETSI TR 102 477 V2.1.1 (2012-06)
Contents
Intellectual Property Rights . 5
Foreword . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 6
3 Definitions and abbreviations . 9
3.1 Definitions . 9
3.2 Abbreviations . 11
4 Void . 13
5 Background . 13
6 Mobility types and terms . 15
6.1 Mobility types . 15
6.1.1 Terminal mobility . 15
6.1.2 User mobility . 16
6.1.3 Session mobility . 16
6.1.4 Service mobility . 16
6.2 Mobility across different network infrastructures . 16
6.2.1 Mobility across access network technologies . 16
6.2.2 Mobility across administrative network domains . 17
6.3 Mobility modes . 17
6.3.1 Nomadic mode . 17
6.3.2 Portable mode . 17
6.3.3 Mobile mode . 17
7 Basic functionalities to enable mobility . 18
7.1 Mobility management . 19
7.1.1 Handover of media connections and sessions . 20
7.1.1.1 Handover for support of intra-/inter-technology mobility . 20
7.1.1.2 Handover for support of intra-/inter-domain mobility . 20
7.1.2 Mobility management support for IP-networks . 21
7.1.2.1 Network-level mobility management . 21
7.1.2.2 Application-level mobility management . 21
7.1.2.3 Standardization efforts in mobility management . 22
7.2 Identity and access management . 22
7.2.1 User and terminal identification. 23
7.2.2 Authentication . 23
7.2.3 Access management . 24
7.3 Device/configuration management and policy enforcement . 24
7.4 Location management . 25
7.5 Reachability management . 25
7.6 Virtual Desktop Infrastructure . 25
8 Requirements and standardization gaps . 26
8.1 Nomadic deployments . 28
8.1.1 Scenario: Hot-desking within the enterprise network (NGCN) . 28
8.1.2 Scenario: Remote access from a public network . 29
8.2 Portable deployments . 29
8.2.1 Scenario: Changing location of a terminal while keeping communication sessions alive . 30
8.2.2 Scenario: Changing terminal while keeping communication sessions alive . 30
8.3 Mobile deployments . 31
8.3.1 Scenario: Continuous connection across different public networks with the same access technology . 31
ETSI
4 ETSI TR 102 477 V2.1.1 (2012-06)
8.3.2 Scenario: Continuous connection across an enterprise and a public mobile network with different
access technologies . 32
9 Summary of standardization gaps . 32
9.1 General issues . 32
9.2 Mobility management . 33
9.3 Identity and access management . 33
9.4 Device/configuration management . 33
9.5 Reachability management and location management . 33
History . 34

ETSI
5 ETSI TR 102 477 V2.1.1 (2012-06)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://ipr.etsi.org).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Report (TR) has been produced by ECMA International in close collaboration with ETSI Technical
Committee Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) in
the context of a Common Work Item.
Introduction
The present document identifies key mobility issues for IP-based enterprise communications. It defines terms for
different types of mobility, describes basic functionality in support of mobility, and lists common deployment scenarios.
For each scenario the report identifies functional requirements and standardization gaps related to the management of
mobility, identity, terminals and reachability.
The present document is based upon the practical experience of ECMA member companies and the results of their
active and continuous participation in the work of ISO/IEC JTC1, ITU-T, ETSI, IETF and other international and
national standardization bodies. It represents a pragmatic and widely based consensus.
st
Compared to the 1 Edition, the present document has been completely rewritten, taking into account more recent
information and identifying requirements and standardization gaps.
ETSI
6 ETSI TR 102 477 V2.1.1 (2012-06)
1 Scope
Mobility for enterprise communications is the ability for persons and objects, e.g. vehicles, sensors and other machines,
belonging to the enterprise to use communication and information services regardless of changes in their physical
location. This includes also the ability to be reached by other persons or objects for communications.
The present document encompasses the mobility of enterprise users connecting to enterprise and public IP networks
using wired and wireless terminals for voice, data and converged services. It defines terms for different types of
mobility, describes basic functionality in support of mobility, and lists common deployment scenarios. For each
scenario the report identifies functional requirements and standardization gaps with the main focus on the management
of mobility, identity, terminals and reachability. However, it does not provide technical solutions but lays the
foundations for triggering standardization projects in areas where gaps have been identified.
More general aspects of enterprise communications based on Next Generation Corporate Networks (NGCN) and
interconnection with Next Generation Networks (NGN) are covered by the companion series of ECMA Technical
Reports on NGCN [i.1], [i.2], [i.3] and [i.4].
2 References
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
2.1 Normative references
Not applicable.
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ECMA TR/95: "Next Generation Corporate Networks (NGCN) - General".
NOTE: Available at http://www.ecma-international.org/publications/techreports/E-TR-095.htm.
[i.2] ECMA TR/96: "Next Generation Corporate Networks (NGCN) - Identification and Routing".
NOTE: Available at http://www.ecma-international.org/publications/techreports/E-TR-096.htm.
[i.3] ECMA TR/100: "Next Generation Corporate Networks (NGCN) - Security of Session-based
Communications".
NOTE: Available at http://www.ecma-international.org/publications/techreports/E-TR-100.htm.
[i.4] ECMA TR/101: "Next Generation Corporate Networks (NGCN) - Emergency Calls".
NOTE: Available at http://www.ecma-international.org/publications/techreports/E-TR-101.htm.
[i.5] ECMA TR/102: "Personal Networks - Overview and Standardization Needs".
NOTE: Available at http://www.ecma-international.org/publications/techreports/E-TR-102.htm.
ETSI
7 ETSI TR 102 477 V2.1.1 (2012-06)
[i.6] IETF RFC 2904: "AAA Authorization Framework".
NOTE: Available at http://tools.ietf.org/html/rfc2904.
[i.7] IETF RFC 3261: "SIP: Session Initiation Protocol".
NOTE: Available at http://tools.ietf.org/html/rfc3261.
[i.8] IETF RFC 3344: "IP Mobility support for IPv4".
NOTE: Available at http://tools.ietf.org/html/rfc3344.
[i.9] IETF RFC 3515: "The Session Initiation Protocol (SIP) Refer Method".
NOTE: Available at http://tools.ietf.org/html/rfc3515.
[i.10] IETF RFC 3748: "Extensible Authentication Protocol (EAP)".
NOTE: Available at http://tools.ietf.org/html/rfc3748.
[i.11] IETF RFC 3775: "IP Mobility support in IPv6".
NOTE: Available at http://tools.ietf.org/html/rfc3775.
[i.12] IETF RFC 3856: "A Presence Event Package for the Session Initiation Protocol (SIP)".
NOTE: Available at http://tools.ietf.org/html/rfc3856.
[i.13] IETF RFC 3891: "The Session Initiation Protocol (SIP) 'Replaces' Header".
NOTE: Available at http://tools.ietf.org/html/rfc3891.
[i.14] IETF RFC 3920: "XML streams, SASL, TLS, stringprep profiles, stanza semantics".
NOTE: Available at http://tools.ietf.org/html/rfc3920.
[i.15] IETF RFC 3921: "XMPP extensions for basic instant messaging and presence".
NOTE: Available at http://tools.ietf.org/html/rfc3921.
[i.16] IETF RFC 4282: "The Network Access Identifier".
NOTE: Available at http://tools.ietf.org/html/rfc4282.
[i.17] IETF RFC 4301: "Security Architecture for the Internet Protocol".
NOTE: Available at http://tools.ietf.org/html/rfc4301.
[i.18] IETF RFC 4511: "Lightweight Directory Access Protocol (LDAP): The Protocol".
NOTE: Available at http://tools.ietf.org/html/rfc4511.
[i.19] IETF RFC 4831: "Goals for Network-Based Localized Mobility Management (NETLMM)".
NOTE: Available at http://tools.ietf.org/html/rfc4831.
[i.20] IETF RFC 5213: "Proxy Mobile IPv6".
NOTE: Available at http://tools.ietf.org/html/rfc5213.
[i.21] IETF RFC 5246: "The Transport Layer Security (TLS) Protocol Version 1.2".
NOTE: Available at http://tools.ietf.org/html/rfc5246.
[i.22] IETF RFC 5247: "Extensible Authentication Protocol (EAP) Key Management Framework".
NOTE: Available at http://tools.ietf.org/html/rfc5247.
ETSI
8 ETSI TR 102 477 V2.1.1 (2012-06)
[i.23] IETF RFC 5281: "Extensible Authentication Protocol Tunneled Transport Layer Security
Authenticated Protocol Version 0 (EAP-TTLSv0)".
NOTE: Available at http://tools.ietf.org/html/rfc5281.
[i.24] IETF RFC 5589: "Session Initiation Protocol (SIP) Call Control - Transfer".
NOTE: Available at http://tools.ietf.org/html/rfc5589.
[i.25] IETF RFC 5849: "The OAuth 1.0 Protocol".
NOTE: Available at http://tools.ietf.org/html/rfc5849.
[i.26] ITU-T Recommendation G.1010: "End-user multimedia QoS categories".
NOTE: Available at http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-G.1010-200111-I!!PDF-
E&type=items.
[i.27] ETSI TS 123 228: "Digital cellular telecommunications system (Phase 2+); Universal Mobile
Telecommunications System (UMTS); LTE; IP Multimedia Subsystem (IMS); Stage 2
(3GPP TS 23.228)".
[i.28] 3GPP Technical Report 22.8de V0.1.0 (2010-08): "3rd Generation Partnership Project; Technical
Specification Group Services and System Aspects; Feasibility Study on Support for 3GPP Voice
Interworking with Enterprise IP-PBX (VINE)".
NOTE: Available at http://www.3gpp.org/ftp/tsg_sa/WG1_Serv/TSGS1_51_Seoul/Docs/S1-102379.zip.
[i.29] IEEE 802.1X: "IEEE Standard for Local and metropolitan area networks - Port-Based Network
Access Control".
NOTE: Available at http://www.ieee802.org/1/pages/802.1x-rev.html.
[i.30] IEEE 802.21: "Media independent handover".
NOTE: Available at http://www.ieee802.org/21/.
[i.31] Liberty Alliance Identity Federation Framework V.1.2 (ID-FF).
NOTE: Available at
http://projectliberty.org/resource_center/specifications/liberty_alliance_id_ff_1_2_specifications/?f=resou
rce_center/specifications/liberty_alliance_id_ff_1_2_specifications.
[i.32] OASIS: "Web Services Federations".
NOTE: Available at http://www.oasis-open.org/committees/documents.php?wg_abbrev=wsfed.
[i.33] OASIS, XACML 2.0 Core: "eXtensible Access Control Markup Language (XACML) V 2.0".
NOTE: Available at http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf.
[i.34] OASIS: "Security Assertion Markup Language (SAML) 1.0/1.1/2.0".
NOTE: Available at http://www.oasis-open.org/specs.
[i.35] OMA Device Management V2.0.
NOTE: Available at http://www.openmobilealliance.org/Technical/release_program/dm_v2_0.aspx.
[i.36] OpenID Authentication 1.1/2.0.
NOTE: Available at http://wiki.openid.net/OpenID_Authentication_2.
[i.37] OSGi Alliance: "JSR 232 Mobile Operational Management".
NOTE: Available at http://www.osgi.org/JSR232/HomePage.
ETSI
9 ETSI TR 102 477 V2.1.1 (2012-06)
[i.38] WiFi Alliance: "WPA2 (WiFi Protected Access 2)".
NOTE: Available at http://www.wi-fi.org/knowledge_center/wpa2.
[i.39] SPICE Project: "Spice remote computing protocol definition v1.0".
NOTE: Available at http://www.spicespace.org/docs/spice_protocol.pdf.
[i.40] SPICE Project: "VD Interfaces".
NOTE: Available at http://www.spicespace.org/docs/vd_interfaces.pdf.
[i.41] IST ENABLE Project Report: "ENABLE - Enabling efficient and operational mobility in large
heterogeneous IP networks", ISBN 978-84-691-0647-1.
NOTE: Available at http://www.ipv6tf.org/pdf/enablebook.pdf.
[i.42] "Claims-based Identity for Windows", Report from David Chappell & Associates, 2009.
NOTE: Available at http://www.davidchappell.com/writing/white_papers/Claims-
Based_Identity_for_Windows_v2.pdf.
[i.43] IEEE 802.16: "IEEE Standard for Local and metropolitan area networks - Part 16: Air Interface for
Broadband Wireless Access Systems".
[i.44] IEEE 802.11: "IEEE Standard for Information technology - Telecommunications and information
exchange between systems Local and metropolitan area networks - Specific requirements -
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply:
access network: network entity that provides connectivity between a user's terminal and an enterprise or a public core
network
accounting: process of collecting resource usage measurements and apportioning charges for services provided by a
network operator or service provider
authentication: proof that an identity is genuine, e.g. the user is as claimed
authorization: process or result of assigning certain execution rights or a role to an authenticated user or entity
availability: property of being accessible and usable upon demand by an authorized entity
core network: portion of a communication system composed of networks, system equipment and infrastructures
providing services and connections between access networks, service provider networks and other networks
corporate network: telecommunication network serving a corporation, i.e. a single organization, an extended
enterprise, or an industry application group as defined by the International Chamber of Commerce (ICC)
NOTE: Sets of equipment [Customer Premises Equipment (CPE) and/or Customer Premises Networks (CPN)]
are typically located at geographically dispersed locations and are interconnected to provide networking
services to a defined group of users. A CN can employ connection-oriented and connectionless
technology.
domain: collection of physical or functional network entities belonging to a restricted geographical area, a topological
IP-area or owned/administered by an enterprise, a public carrier or a service provider
ETSI
10 ETSI TR 102 477 V2.1.1 (2012-06)
enterprise network: corporate network comprising session layer capabilities and optionally application layer
capabilities hosted on one or more infrastructures
NOTE: Infrastructures can include the enterprise's own infrastructure (dedicated NGCN), the infrastructure of one
or more hosting NGNs, the infrastructure of one or more hosting NGCNs or any combination of these.
end-to-end security: security (including privacy and information integrity) for the exchange of information between
two or more end points that relies on protocols and mechanisms that are implemented exclusively on those endpoints
enterprise-grade service: performance level for security, availability and service perception that is comparable to
PBX-based services
firewall: security means to shield an enterprise IP-network from unwanted traffic by blocking certain IP addresses and
port numbers or certain application data content
fixed-line network: WAN or MAN provided by a fixed-line operator (e.g. enterprise) which provides in general wired
access, which may be extended locally by wireless access networks (DECT, WLAN, etc.)
foreign domain: administrative domain of a visited network
handover (also known as handoff): process of transferring an ongoing network association of a mobile terminal/user
from one point of attachment to another in case of crossing a cell or network boundary
home domain: domain that administers the account of a mobile user/terminal
home network: network that is in a mobility architecture the central source for mobility services to the mobile
user/terminal and which interacts with the visited network
hotspot: wireless access point to the public internet based on WLAN technology
identity: name by which the user of a network is known
internet: public IP network
intranet: closed IP-network of an enterprise used for data or converged communication services by members of the
enterprise
IP network: public or private network offering connectionless packet-mode services based on the Internet Protocol (IP)
as the network layer protocol
IP-PBX: PBX capable of IP-based communications between users
location: information identifying the network point of attachment (PoA) through which a user/terminal is currently
accessing a network or the user's terminal's geographical position
mobile network: wireless WAN or MAN that provides continuous connectivity to mobile terminals
mobile terminal: device which is able to access the enterprise network from different locations
mobile user: user who accesses ICT resources of the enterprise from different locations
moving network: LAN or WLAN that is installed in a moving vehicle, e.g. train, and connected to a mobile network
multihoming: property of a device by which it can use more than one IP address at any given point of time
Next Generation Network: packet based public network able to provide telecommunication services, able to make use
of multiple QoS enabled transport technologies and in which service related functions are independent of underlying
transport related technologies
Next Generation Corporate Network: self-contained corporate network designed to take advantage of emerging IP-
based communications solutions and that can have its own applications and service provisioning
NOTE: An NGCN can be an entire enterprise network if none of that network is based on public network
infrastructure.
portal: web-based based interface that provides a single access point to dispersed information, e.g. corporate portals
provide enterprise-wide information to employees
ETSI
11 ETSI TR 102 477 V2.1.1 (2012-06)
presence: set of data representing the status and availability of a person/object or a group of persons/objects for
communication
privacy: right of individuals to control or influence what information related to them may be collected and stored and
by whom that information may be disclosed
Private Cloud: server farm for a closed user group
profile: total set of user or terminal related information, preferences, rules and settings, e.g. access rights
Quality of Service (QoS): level of performance for the transport of data
roaming: service that enables users/terminals to use access networks and mobility services of a network operator which
is different from the operator of the user's home domain
session: temporary interactive information interchange between two or more nodes in a network architecture
single sign-on: access control mechanism where a user logs on once and gains access to a number of applications and
services without being prompted to log in again at each of them
terminal: device enabling users to access services via an access network
transit network: network that provides interconnection between networks
user: person, organization or technical object that accesses a network in order to communicate using the services
provided by that network
rd
Virtual Private Cloud: Private Cloud provided by a 3 party service provider
Virtual Private Network (VPN): virtual network that can deliver ubiquitous and secure connectivity over a shared
network infrastructure (e.g. public carrier networks) using the same access policies as an enterprise network
visited network: network that interacts with the home network to provide mobility services to the mobile enterprise
user/terminal at PoAs in a foreign network
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AAA Authentication, Authorization and Accounting
AD Active Directory
AN Access Network
API Application Program Interface
ASA Access Service Authorizer
ASP Access Service Provider
CN Correspondent Node
CoA Care of Address
CPE Customer Premises Network
CRM Customer Relation Management
DECT Digital Enhanced Cordless Telecommunications
DHCP Dynamic Host Configuration Protocol
DM Device Management
DSL Digital Subscriber Line
EAP Extensible Authentication Protocol
ERM Enterprise Risk Management
ERP Enterprise Resource Planning
FA Foreign Agent
FS Federation Services
GSM Global System for Mobile communication
HA Home Agent
HO HandOver
HTTP HyperText Transfer Protocol
IAM Identity and Access Management
ICA Independent Computing Architecture
ETSI
12 ETSI TR 102 477 V2.1.1 (2012-06)
ICT Information Communication Technology
IETF Internet Engineering Task Force
IMEI International Mobile Equipment Identity
IMS IP Multimedia Subsystem
IP Internet Protocol
IP-PBX Internet Protocol - Private Branch eXchange
ISP IP-Service Provider
ITC Information and Telecommunication Communication
ITU-T International Telecommunication Union - Telecommunication sector
IVR Interactive Voice Response
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
LTE Long Term Evolution
MAC Address Media Access Control Address
MAC Media Access Control
MAN Mobile Access Network
MIP Mobile IP
MM Mobility Management
MN Mobile Node
MSA Mobility Service Authorizer
MSP Mobility Service Provider
NAI Network Access Identifier
NAT Network Address Translator
NETLMM Network-based Localized Mobility Management
NGCN Next Generation Corporate Network
NGN Next Generation Network
NIC Network Interface Card
OMA Open Mobile Alliance
OSI Open Systems Interconnection Reference Model
PBX Private Branch Exchange
PC Personal Computer
PIN Personal Identification Number
PKI Public Key Infrastructure
PoA Point of Attachment
PSTN Public Switched Telephone Network
QoS Quality of Service
RDP Remote Display Protocol
RFC Request For Comment
SAML Security Assertion Markup Language
SID Security Identifier
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SLA Service Level Agreement
SOA Service Oriented Architecture
SOHO Small Office Home Office
SQL Structured Query Language
SSL Secure Socket Layer protocol
SSO Single-Sign--On
TLS Transport Layer Security
UMTS Universal Mobile Telecommunications System
USB Universal Serial Bus
USIM Universal Subscriber Identity Module
VDI Virtual Desktop Infrastructure
VM Virtual Machine
VNC Virtual Network Computing
VoIP Voice over IP
VPC Virtual Private Cloud
VPN Virtual Private Network
WAN Wide Area Network
WEBDAV Web Distributed Authoring and Versioning
ETSI
13 ETSI TR 102 477 V2.1.1 (2012-06)
WIMAX Worldwide Interoperability for Microwave Access
NOTE: See IEEE 802.16 [i.43].
WLAN Wireless LAN
WMAN Wireless Metropolitan Area Network
WWAN Wireless Wide Area Network
XACML eXtensible Access Control Marker Language
XMPP Extensible Messaging and Presence Protocol
4 Void
5 Background
Globalization of the economy and the need for more responsive business processes (also referred to as the 'Real Time
Enterprise') have created new demands on enterprise networks and data centers. Progress in digital technology is
transforming corporate networks and will ultimately transform the way companies provide and use communications and
information technology (ICT) for the enterprise in order to improve business value. Examples are the migration from
separate voice and data networks to a converged IP network, providing both information access and real time
communication in a single network. Other important developments are:
• integration of the enterprise's communication services with its business processes to enhance workflows;
• increase of hosted ICT services offered by ISPs or public carriers for non-core enterprise tasks;
• demand for access to ICT resources from everywhere, meaning mobility;
• fast growing variety in types and applications of ICT.
For the support of mobility, the architecture of the enterprise ICT infrastructure must support access by the mobile
workforce. The architecture therefore has to provide interfaces to the basic functions of the data center, e.g. ERP and
work flows, for a diversity of mobile/portable terminals. In addition interfaces are needed to enable the provision of
services, for exchange of data and communications in a managed and secure way.
In the highly responsive enterprise of the future (real-time enterprise) the office no longer represents the actual physical
location where all of the employees are situated, but the environment they are working in - at the office, at an industrial
plant, at home or on the road - with a range of digital appliances that continues to diversify and proliferate. Next
generation public networks (NGN) and next generation corporate networks (NGCNs [i.1]) are extending their reach to
provide mobility with wireless or wired technology, e.g. high-bandwidth wireless hotspots, digital cellular or DSL
access to address the needs of anytime, anywhere at any device communications. This includes besides the support of
interpersonal communication (e.g. via voice/video), person-to-machine (e.g. IVR), machine-to-person (e.g. broadcast or
alarms) and machine-to-machine communications (e.g. automatic software updates of terminals).
Examples for mobility applications in enterprise communications are:
• Public transport, logistics:
- voice over WLAN and mobile data for personnel, e.g. at loading docks;
- access to enterprise resources during travel.
• Hospitals:
- communications services and database access to patients;
- patient personal communications;
- monitoring patients;
- data-interchange with ambulance;
ETSI
14 ETSI TR 102 477 V2.1.1 (2012-06)
- easy ad-hoc access to patient data (for authorized personnel only) - anywhere;
- voice over WLAN for nurses and doctors;
- information on where to find personnel within premises.
• Large industrial plants, campus areas:
- machine-to-machine communication;
- many "mobile" people (many meetings, projects, various large buildings, etc.);
- mobile access to data, e.g. for service personnel;
- remote and distributed inventory management.
Figure 1 depicts an example of an enterprise network environment for mobility using enterprise (solid lines) and public
network (dotted lines) connections.
Application Fixed Desktops Mobile Devices
Mobile Desktops
SoftSwitch
Servers
Mobility
Mgmt Server
SIP
signalling
Enterprise
Public
LAN/WLAN/WMAN
WMAN/WLAN
(Mobile Networks, Hotspots)
Application
DesktopP
Servers
hones
Local Loop
IP- PSTN
Trunking
Gateway
Public IP-based WAN (Fixed-line Carrier Network, Internet)
Private
Enterprise Network Connection
WLAN/LAN
Public Network Connection
(hotel, home,…)
Figure 1: Enterprise network environment for mobility
ETSI
15 ETSI TR 102 477 V2.1.1 (2012-06)
As shown in figure 1, mobility for enterprise communication is supported not only by the corporate LAN/WAN but also
by the emerging IP-based public mobile and fixed networks, including the Internet. Of high importance for mobility are
WLAN islands (hotspots) that provide broadband data access and voice telephony (VoWLAN), either on the enterprise
campus or in public areas, Other promising technologies for enterprise mobility are WIMAX, moving networks, self-
organizing mobile networks (e.g. adhoc and meshed networks) and personal networks [i.5]. However, these
technologies are out of scope of the present document.
As ICT has become an integral part of business processes the provision of mobility may introduce serious risks to
business continuity, due to the opening of the ICT network infrastructure to foreign network domains. In addition, the
emergence of new mobile platforms (e.g. smart phones, netbooks) and the rapid growth of mobile applications have
triggered the infiltration of personal devices into the workplace. Therefore enterprise ICT departments are challenged to
exploit changed mobility technology and user behaviour for the benefit of business processes without threatening the
security of enterprise data and infrastructure.
For economic reasons the enterprise information and communication infrastructure has to rely on the same technologies
and standards as used for the public infrastructure, however the selection of components and their standardization
should take into account the special needs of enterprises. Clause 8 'Requirements and Standardization Gaps' elaborates
this in more detail.
6 Mobility types and terms
Mobility provided by an enterprise information and communication system comes in various forms and with various
limitations. A large number of terms have been introduced to describe different types of mobility, often with different
terms used for the same thing or with the same term used for different things. This clause describes mobility types and
their extensions as they are used in the present document.
6.1 Mobility types
The key elements for providing mobility in an information and communication system are:
• terminal connectivity;
• user access;
• persistence of communication sessions;
• service availability.
The corresponding mobility types are introduced below. Their provision depends on the capabilities of the involved
access and core networks and also on the hardware and software of the terminal.
NOTE: Depending on the deployment, two or more mobility types may be used in combination. Clause 8
evaluates this for a set of deployment scenarios.
6.1.1 Terminal mobility
Terminal mobility denotes the ability of a terminal to have transparent network connectivity (OSI layers 1-4) even after
it has moved between different network Points of Attachment (PoA).
In the case of an enterprise network, terminal mobility is typically provided to certified devices (e.g. laptops, PDAs,
smart-phones, SIP-phones) which are in most cases identified by a unique hardware identifier, e.g. by the MAC address
of the network interface card. In public mobile networks the terminal is usually identified by the IMEI of the terminal.
NOTE: Terminal mobility is also known as device mobility.
ETSI
16 ETSI TR 102 477 V2.1.1 (2012-06)
6.1.2 User mobility
User mobility denotes the ability of a user to access information and services with a single identity even after moving
between different PoAs, either as a result of his/her terminal moving or as a result of change of terminal In addition,
user mobility can include the possibility of accessing services from several terminals simultaneously.
An important requirement for user mobility is that the user registers with his home network (and in some cases with the
visited network, too) by supplying suitable means for identification and authentication, e.g. user identity, account name,
password, PIN, cryptographic information, biometric evidence, etc. This information can be entered by the user or,
particularly where a cryptographic key is required, obtained from a token (e.g. smart card, SIM, USIM, USB-stick, etc.)
or soft key store. The involved networks have to provide appropriate means for identity and access management.
NOTE: User mobility is also known as personal mobility.
6.1.3 Session mobility
Session mobility denotes the ability of a network or networks and the involved terminals to maintain active
communication sessions, regardless of whether the terminal has moved to a different network PoA or the user has
switched to another terminal. Session mobility comes always in conjunction with terminal and/or user mobility.
6.1.4 Service mobility
Service mobility is the capability of the network(s) concerned to provide to the user/terminal transparent support for
subscribed and personalized services regardless of whether the terminal has moved to a different network PoA or the
user has switched to another terminal Such services are usually contracted by SLAs or roaming agreements between the
operators of the involved network access domains and the enterprise ICT administration.
Examples are:
• ability to use the same dial plan for establishing outgoing communications as in the enterprise network;
• support of using call control services provided by the enterprise PBX;
• ability to receive caller identification information from enterprise directories.
Similar to session mobility, service mobility comes in conjunction with terminal and/or user mobility.
6.2 Mobility across different network infrastructures
Each of the mobility types described in clause 6.1 can be extended by attributes describing their ability to operate across
different access technologies, or different administrative network domains or both.
6.2.1 Mobility across access network technologies
To extend the description of terminal mobility the following terms are used. All other mobility types are not affected, as
they are agnostic to the access network technology.
• Intra-technology mobility:
supports terminal mobility within or across networks using the same access network technology.
NOTE 1: Intra-technology mobility is also known as horizontal mobility.
• Inter-technology mobility:
supports terminal mobility within or across networks using different access network technologies. Examples
are transitions from LAN to WLAN, WMAN to WLAN. or DECT to GSM.
NOTE 2: Inter-technology mobility is also known as vertical mobility.
ETSI
17 ETSI TR 102 477 V2.1.1 (2012-06)
6.2.2 Mobility across administrative network domains
The following attributes extend terminal, user, session and service mobility according to their ability to operate across
different administrative domains.
• Intra-domain mobility:
denotes the support of a mobility type inside a single administrative domain.
NOTE 1: Intra-domain mobility is also known as micro-mobility.
• Inter-domain mobility:
denotes the support of a mobility type across networks of different administrative domains, e.g. across
administrative subnetworks of an enterprise network or across public and enterprise network domains. In some
cases inter-domain mobility is provided on the basis of a roaming contract between the provide
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...