scispace - formally typeset
Open Access

Diameter Base Protocol

Pat Calhoun, +4 more
- Vol. 3588, pp 1-147
TLDR
The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting framework for applications such as network access or IP mobility, and needs to be supported by all Diameter implementations.
Abstract
The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work in both local Authentication, Authorization & Accounting and roaming situations. This document specifies the message format, transport, error reporting, accounting and security services to be used by all Diameter applications. The Diameter base application needs to be supported by all Diameter implementations.

read more

Citations
More filters
Proceedings ArticleDOI

Integration of 802.11 and third-generation wireless data networks

TL;DR: This paper addresses the problem of integration of these two classes of networks to offer such seamless connectivity and describes two possible integration approaches - namely tight integration and loose integration and advocate the latter as the preferred approach.

A Presence Event Package for the Session Initiation Protocol (SIP)

TL;DR: This document describes the usage of the Session Initiation Protocol (SIP) for subscriptions and notifications of presence, defined as the willingness and ability of a user to communicate with other users on the network.
Patent

Extranet workgroup formation across multiple mobile virtual private networks

Jan Forslow
TL;DR: In this paper, the authors describe a network-based mobile workgroup system allowing a selected set of users from two or more mobile virtual private networks to form an extranet workgroup in a secure manner.
Journal ArticleDOI

Design and implementation of a WLAN/cdma2000 interworking architecture

TL;DR: This work describes in detail the implementation of a loosely coupled integrated network which provides two kinds of roaming services, a SimpleIP service and a Mobile-IP service, and presents, in detail, two new components used to build these services.
Journal ArticleDOI

Security for 5G and Beyond

TL;DR: This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges.